Loading…

Flash Player 9 (or above) is needed to view presentations.
We have detected that you do not have it on your computer. To install it, go here.

Like this document? Why not share!

Online security how secure are you when you get on the internet.

on

  • 123 views

Whether you're a personal wanting for additional or less exposure on-line, or a business person ...

Whether you're a personal wanting for additional or less exposure on-line, or a business person
looking to manage and monitor what is being said on-line, we have all solutions for you. Want to
observe what is being said on-line for you and your family or especially for your kids? Don’t worry,
we cover all of them! Full info about us:
http://securitycenteronline.com/7557/20034/pdf

Statistics

Views

Total Views
123
Views on SlideShare
123
Embed Views
0

Actions

Likes
0
Downloads
1
Comments
0

0 Embeds 0

No embeds

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Online security   how secure are you when you get on the internet. Online security how secure are you when you get on the internet. Document Transcript

  • Internet technology specialists widely agree that security is becoming the primary concern of thoseusing Internet technologies. This is especially true now for Internet novices who hear stories oframpant identity theft, Trojan horses, worms, rootkits, and general spyware. Internet novices dontknow what these terms mean, but they know disaster will strike if they dont have a premiumInternet security software suite.However, even those with a fair amount of Internet experience find it difficult to know what to lookfor to protect themselves and how to configure it when they find it. As partakers in the Internet, weare left to whatever advice we can get and whatever software we can find. We have little in theway of resources to tell us which people to trust for advice. We continue on without even knowingwhat causes these Internet security vulnerabilities.One of the things many users are surprised to discover is that Internet security has a lot more todo with what programs that are installed and run on the computer than where they go on the Web.For example, the relative rarity of the software used on Apple computers makes it a less commontarget of viruses. So doing the same things on an Apple that you would do on a PC would exposeyou to less security threats. This is also true of the various Linux platforms available. Because anoverwhelming majority of users run Windows, hackers tend to develop viruses and worms forWindows vulnerabilities and for the major software programs run on Windows based PCs. So onesimple solution to the majority of security threats, for those who dont need a specific Windowsonly program, is to switch operating systems.Another thing that makes Windows an easy target for hackers is the way it is assembled with astandard set of helper applications and applets. For example, Windows Mail or Outlook Expresscome pre-configured to automatically open files. If a file has a virus, youre in trouble. This is justone example of the many holes built into Windows when it is freshly installed. Instead of beingbuilt securely from the start and then adding on features, Windows is built full of features, and thenbug fixes are added as people find the holes. Until the bug fixes are released and installed on yourcomputer before the hackers find the holes, your computer is at risk. You can also find out more athttp://www.configurationmanagementsystem.comIn addition to exploited software flaws, Internet users must take into account online security. E-commerce is perhaps the most crucial area for online security. Even if you have a secureconnection to the Internet, a secure computer and you are able to make a transaction without anycompromise of information, you could still be at risk. If the company you transact with keeps adatabase of online transactions, you are as vulnerable as their database. If you transact with manycompanies, you are as vulnerable as the weakest link among them.Article by Dean Forster at http://www.configurationmanagementsystem.comLearn more about online security at => Configuration Management System
  • Article Source:http://EzineArticles.com/?expert=Dean_Forster==== ====Whether youre a personal wanting for additional or less exposure on-line, or a business personlooking to manage and monitor what is being said on-line, we have all solutions for you. Want toobserve what is being said on-line for you and your family or especially for your kids? Don’t worry,we cover all of them! Full info about us:http://securitycenteronline.com/7557/20034/pdf==== ====