|
|
|
Different Categories of Computer Games
Computer games can be categorized mainly into PC games that are played in your computer after installation using the CDs that contain the software, downloadable pc games, and the online games. Many websites provide you with the downloadable version...
Managed Hosting - What's it all about?
A new trend, appearing in the Web Hosting industry, is the concept of Managed Web Hosting. Web hosts have been offering dedicated servers for a while now, however, because dedicated servers can be difficult to operate technically, there has been a...
The Spyware Who Loved Me
Don’t ever let anybody tell you otherwise, the Internet is not a safe place to take your computer systems without adequate protection. It wasn’t too long ago that anti-virus and firewall software could provide your systems with more than enough...
What is Data Recovery? - A brief Introduction
What is Data Recovery? Data Recovery is the process of retrieval of inaccessible or corrupt data from digital media that has become damaged in some way. Data Recovery can be used to recover data from devices as varied as Hard Disk Drives, Memory...
Windows ou Linux?
Fico rindo, quando eu ouço comentários a respeito da Microsoft, com o $ no lugar do S. Alguns dizem que a Microsoft é o mesmo que o lado negro da força ou até os Borgs da série Jornada nas Estrelas que querer assimilar tudo e todos. O computador é...
|
|
| |
|
|
|
|
|
|
A Hacker Inside Your Computer?
Imagine this nightmare scenario...
You check your e-mail program and it reports your username and password as no longer valid. You call your Internet service provider (ISP) to discuss the problem and they tell you they turned off your account due to "abuse". "Abuse!" you cry to the customer service operator, "What are you talking about?"
"Someone used your computer this past Saturday night in an attempt to hack into a government computer system. They made the attempt at 1:20 a.m. from your account," replies the rep. "Look in your windows registry for a file called QAZWSX.hsq."
You punch a few keys and sure enough the file stares right back at you. "What is it?" you ask, scared to know the answer.
"Someone used a Trojan Horse virus to remotely control your computer and cloak the identity of the hacker. Here's how to get rid of it, just..."
What you just read happened very recently to someone I know quite well. A computer hacker found an open port on his computer when he switched over from a dial-up Internet connection to an "always-on" high-speed connection.
The hacker used a robot scanning the Internet for available "ports", openings in a computer that allow data to pass back and forth from a network connection like the Internet. Once the hacker found an unprotected port on my friend's computer he simply inserted a Trojan Horse virus that rides along with Windows Notepad, a handy utility used by just about everyone who makes web pages.
When my friend activated the notepad program he also activated the virus. The virus in turn transmitted all of my friend's security information to the hacker and allowed him to gain access and control his victim's computer in the middle of the night.
Count me as the last person to sound paranoid, but, as always-on connections through DSL, cable, and T-1 lines proliferate, this story will repeat itself over and
over until people learn to protect themselves.
Most people underestimate or are completely ignorant about the importance of information they send over the Internet when surfing websites and checking email. Even if you only use a simple dial-up account, you can unknowingly transmit a significant amount of sensitive information.
You can analyze the security of your web connection for free by going to http://www.symantec.com/SecurityCheck/ . You can also verify the presence of any known viruses or Trojan horses on your computer. The information I saw when analyzing my personal computer frankly shocked me. I saw data I didn't even know existed staring me right in the face after I performed this analysis.
To protect your computer hardware and sensitive data you should obtain a software package called a "firewall". A firewall, when combined with a good anti-virus program, helps stop unauthorized access on your computer, prevents virus infection, and "cloaks" your data ports against a hacker scanning for openings.
Symantec.com and McAfee.com both offer excellent personal firewall and anti-virus software from their websites or you can buy them off the shelf at your local office supply store. A wise investment for anyone on the net... before it's too late!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- "Finally – a Simple, Video-Based Training System on CD-ROM that Teaches You Step-By-Step How to Make Real Money Online-100% Guaranteed!" You can start with a few bucks and a good idea to make lots of money online! I did, and I'll teach you how no matter what product or service you sell... http://www.the-easy-way.com/33days.html
About the Author
Jim Edwards writes a syndicated newspaper column in plain language for non-technical people about current Internet issues, challenges, news, HOT new tools... and much more! "The Net Reporter" ==> http://www.the-easy-way.com/33days.html
|
|
|
|
|
| Tom's Hardware |
| : Tom's Hardware Guide is the Internet's premiere resource for hardware news and reviews. |
| www.tomshardware.com |
  |
| HardwareCentral - Your source for in-depth computer hardware info. |
| HardwareCentral is the #1 Hardware Information Resource on the 'Net. Featuring over 600 pages of Hardware information, including advice on System ... |
| www.hardwarecentral.com |
  |
| Apple - Hardware |
| Find your favorite Mac, iPod and other Apple accessories. |
| www.apple.com |
  |
| Ace Hardware |
| Nationwide (United States) hardware and home improvement retailer. Includes products, dealer locator and corporate information. |
| www.acehardware.com |
  |
| Computer hardware - Wikipedia, the free encyclopedia |
| The hardware of a computer is infrequently changed, in comparison with software and ... Personal computers, the computer hardware familiar to most people, ... |
| en.wikipedia.org |
  |
| Hardware - Wikipedia, the free encyclopedia |
| Hardware is the general term that is used to describe physical artifacts of a technology. ... In a looser sense, hardware can be major military equipment, ... |
| en.wikipedia.org |
  |
| Open Directory - Computers: Hardware |
| Hardware Central - Computing-centric community providing vital information, support, tools and interaction facilities for power computer users and ... |
| dmoz.org |
  |
| Microsoft Hardware – Home Page |
| Learn about Microsoft mice, keyboards, desktop sets, webcams, media center peripherals, gaming products, fingerprint readers and presentation tools. |
| www.microsoft.com |
  |
| AnandTech: your source for hardware analysis and news |
| Independent hands-on reviews of computer hardware such as motherboards, graphic cards, and CPUs. |
| www.anandtech.com |
  |
| hardware.com - Routers, switches, firewalls, servers, memory ... |
| Supplier of new and refurbished networking hardware and approved and compatible network accessories. Located in the United Kingdom. |
| www.hardware.com |
  |
| Slashdot: News for nerds, stuff that matters |
| From the article: "Although the news caused barely a ripple of reaction in the audience of software and hardware engineers, there are industry analysts who ... |
| hardware.slashdot.org |
  |
| InformationWeek HardwareTech Center |
| Our hardware coverage ranges from mobile computers and PDAs to servers and supercomputers, and the infrastructure issues enterprises deal with every day. ... |
| www.informationweek.com |
  |
| What is hardware? - A Word Definition From the Webopedia Computer ... |
| This page describes the term hardware and lists other pages on the Web where you can find additional information. |
| www.webopedia.com |
  |
| Google Directory - Computers > Hardware |
| Hardware Central - http://www.hardwarecentral.com/ Computing-centric community providing vital information, support, tools and interaction facilities for ... |
| www.google.com |
  |
| Gifts: Unique Gifts & Gift Ideas at Restoration Hardware |
| At Restoration Hardware, you'll explore an exceptional world of high quality unique gifts. Browse our products to find gift ideas & more at Restoration ... |
| www.restorationhardware.com |
  |
| HwB: The Hardware Book |
| HwB provides you with circuits, pinouts, cable/adapter descriptions and other technical information. |
| www.hardwarebook.net |
  |
| Reg Hardware: Product News and Gadget Reviews from The Register |
| More Gadgets Stuff. 5th December 2006 12:09 GMT. Author: Reg Hardware ... 27th November 2006 15:31 GMT. Author: The Hardware Widow ... |
| www.reghardware.co.uk |
  |
| red hat hardware compatibility lists |
| hardware.redhat.com/ - Similar pages |
|
  |
| TrueValue.com |
| Here's our tip to hang strands of lights with ease. Jeanenne & Jim Tucker Plantation True Value Hardware Richmond, TX ... |
| www.truevalue.com |
  |
| A complete illustrated Guide to the PC Hardware |
| A complete illustrated Guide to the PC Hardware, Logic and Architecture. 500 easy-read articles about the modern PC. Understand the basic architecture of ... |
| www.karbosguide.com |
  |
|