Wednesday, July 20, 2011

Computer Under Attack --Andrew

Most of the computer attack could be occurred via the internet activities and CD-Rom. First of all, Virus is one of the well-known dangers which hides in documents and is not too risky. It can only become dangerous when computer might be crashed by the virus. For instance, Trojan horse is one of the typical viruses which get the personal information and abuse it to take advantages like steal money from people’s bank account to buy something. Unfortunately, it is costly to solve this problem since a lot of efforts need to be put on the discovery and deletion of the virus. Another source of the danger is called spyware which is slightly similar to Trojan House, that is to say, it will also hide inside the computer without notification. However it seems to be less threatening since it only collects the information from the computer for commercial purposes. On the other hand, Spam, i.e. an unwanted advertisement or junk email, is the least dangerous of computer danger, and generally 50% of the email can be considered as junk email. Sometimes,through the spam, it is intended to thick you to get some information, this kind of attack is called “Phishing”. If you have already applied the spam by giving all of your information such as bank password, and as a result, you are going to lose your money. To avoid computer to be under attack, we not only have to keep our antivirus program up-to-date, but also need to be alert on the email that asked you to provide your personal details to them.

1 comment:

  1. Andrew,

    Thanks for posting on the blog. I've marked your hard copy so I'll give it back in class today!
    Emma

    ReplyDelete