1 / 16

Precautions must be taken before access to the Internet

Precautions must be taken before access to the Internet. By .. shamma salem Maitha Mohammed.

asasia
Télécharger la présentation

Precautions must be taken before access to the Internet

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Precautions must be taken before access to the Internet By .. shammasalem MaithaMohammed

  2. The online world as it is informative VhoaidhamLmL problems as is the case with hardware hackers we all know what is happening in the online world of breakthroughs for the privacy of others, so you must take security precautions that you check the safety in the world of monsters mlI. .. Does not retain under any circumstance in any photographs but whatever it cost you move them on floppy dis and make sure you clear it up from the trash ... Beware of special users of the internet sisters ..

  3. However, ifI think that steal photos from your computer Impossible you are wrong .. The contrary, that the pictures constitute the first spoils are looking for hardware hackersII .. Does not retain any personal information inside your computer Gerhamn as messages or information such as bank account numbers, Credit Cards .. Anyasmk you registered when installing windows Promptly change ..

  4. Though I do not know how .. Went to the page of information and tricks Sowictaraf sites and on the way in a very easyHow is the breakthrough device??Wondering how many of us are breakthrough devices .. Is it possible to penetrate any device .. Is it easily penetrate the devices .. In order to explain the process let's you should clarify some of the terminology

  5. used and the translation from English into ArabicIP = concerned with protocol used in InternetIP-No = No service providerServer = serverClient = client or customerPatch or Torjan = names used for spywarePort = port or portAnd now you must know that it can not be a connection device except in the case

  6. The existence of a file spy inside your computer and the process is as followsWhen a device file, a spy or what is called AltorjanBalkhademfanah not immediately open the port in Port-au-Suppose your file Anghazk injured spyware software bus is a programUsed to spyAnd is one of the best known, because its own patch or server is highly prevalent in hardware ... HassannaAsibjhazk file and now it will bus is heading to the file and does the work of RegistryFix

  7. Or open a port or port number 12345 can each have a program from a client Kesbalent bus as we ... Alclint .... Can penetrate your machine for itDevice found important factor in the process of penetration, the file of espionage-related device can then control the device and without the feeling that ... What can he do to your device ... FollowingLock deviceStole a bus and your WordpressDrag any file to your deviceSend files to your computer

  8. Delete some files from your computer6 - opening and closing the CD Rom or normally run windows .. And otherHow do I find you a hacker??TermsPort Scan = Finder ports or ports SurveyorThey make a mistake many of us thought that the hacker knows the device to be given a break .. This line is not so, but there is also an important factor will be remembered for later .. So how penetrates the

  9. device or any deviceIn fact, that most of the hardware hackers rely on programs called Port Scanao Finder ports any ports ... The program is run ... and then Idalmchterq figures IB virtual .. It also says no to any of the counting Sign Ahaddaly hundred .. In other words, put the following numbers as an example ... It figures, EP212.234.123.10212,234,123,200Note the numbers in the boxes, which last are ten = two hundred

  10. Find any requests in the My IP address, which starts from the number212.234.123.10To the number two hundred212,234,123,200If there is any device holds any number of any B between the latest figures spy infected file, it does log the IP number and sends it to the hacker ... and Iqmbektabh figures in the box My IP address as shown in the diagram above

  11. Can not penetrate a person is given any particular person, but knowing the numberAlai ... B ... Special Abjahazh .. and the IP number of the user or the numbers used are called DinamkNmbr it any variable and fixed ... other words, let's say you called the internet and found that IP number is your212,123,123,345Then I went out from the Internet or closed connection, and then re-contact Badechms minutes, the figure has changed as the following example ..

  12. 212,123,123,201As for the manner in which access to a particular person, that is when not using a program that is used in the conversation .. such as the famous Alaskjo .. Which is one of theThe biggest risks that you can detect numbers ... walleye. B ... To its users no matter how they tried to hide ...How to get the hardware files spyware or virus??

  13. In the name of God the MercifulThe biggest and fastest ways to spread spyware or viruses in oneThree methodsI. ..Either send them directly to your computer through programs of conversation when someone does send a file to you .. The tricks and, unfortunately, many files and Aseptajhzathm spy files or destructive viruses by sending images

  14. Them ... Was unaware of much that it is possible and simply insert a file virus and spy-in-picture by using the many programs and without that person feels the future for pictures Abeche, but the reverse will see the picture and very naturally and Ma, but is unaware that the file has been sent to his computer ... And can also haveExperience in programming at CNN Allwegol Basic or Plus Plus or otherA special program that makes it helped him to add any file in images orother

  15. Secondly ...Posted By Alamil Many of us turn away from sources of messagesNot known and the attached files not to download it Dropping programs from suspicious sites If what is the solutionThe solution is simple and very comfortableFirst ... Do not receive any file from any person when you use chat programs. Someone you know only from personal knowledgeII .. When you access any Emil from an unknown source .. AtakatrBlually to open immediately remove it you will not lose anything

  16. III .. Do not take down any program from unknown locations, but you have programs revealing viruses, spyware ... As II advise not to use the Internet only to having a program that works to protect his papa dit every two weeks .. any ... Any renewal of the information ... A program is indispensable to recognize that spyware or viruses and can be addressed in yourWithout damaging the operating system

More Related