النتائج (
الإنجليزية) 2:
[نسخ]نسخ!
Weaknesses in the Internet is the Internet vulnerable to flaws and weaknesses in the defenses. This weakness may be due to bugs and flaws in the system design. The reason for some of the weaknesses in the wrong data entry, as often allows the implementation of direct language phrases or SQL commands. And sometimes it fails programmed to check the size of stored data, as this leads to a flood of data, which causes the corruption of the stack or binary tree areas in memory. and often allows vulnerabilities an attacker could circumvent the program to bypass screening access or execute commands on the host for this program system . There are a number of weaknesses which have your computer or your network vulnerable to them. It is the most common are Validation software such as data entry errors caused by symbols text format, wrong and deal with changing symbols to cover program errors therefore be interpreted these symbols, and the introduction of SQL statements and scripts included conflicting-site within Web applications. It is also common weaknesses crash stack overflow and the data in the cache as well as symbolic links to files (Symlinks). Examine weaknesses there may be weaknesses in all operating systems such as Windows, Macintosh, Linux, OpenVMS, and others. It can examine the weaknesses in the network and servers through a special test them in which to examine the servers and e-pages and firewalls and so on to see how exposure to vulnerabilities. You can download and examine the weaknesses of programs from the Internet. 3. Security problems security problem occurs when the penetrating your system through one of the attackers or intruders (the hacker), viruses or other types of malicious programs. The more targeted people in security breaches are the people who are surfing the Internet, where penetration cause annoying problems such as slow down Movement browsing and snapped at regular intervals. It can not be access to the data and at worst can penetrate the user's personal information. In the case of programming or wrong settings errors in Web server, it is permissible to allow the entry of remote users unauthorized to confidential documents containing personal information or to obtain information about the host machine for the server, allowing a break of the system. You can also execute the orders of these persons on the host server device enabling them to modify the system and the launch of dumped attacks, leading to a temporary disruption of the machine, and the Alagracah attacks (DoS) aimed at slower or Shell data traffic over the network. It is also during Alagracah distributed attacks (DDoS), the aggressor is using a number of computers seized by the attack on a computer or other computers. This is the main program of the attacks Alagracah distributed installation (DDoS) in a PC using the account stolen. The spy on the network data and interception of information transmitted between the server and the browser can be possible if you leave the network or servers open and weaknesses exposed. Hacker hacker is a person who It creates and modifies computer software and hardware. This term has become a meaningful negative since become known as the person who is taking advantage of the system by obtaining unauthorized access to systems and carry out unwanted and illegal. However, this term (hacker) can be called on the person who uses his skills to develop computer software and management of computer systems and the security of your computer. Computer viruses Computer viruses are the most common among information security problems faced by people and businesses. The computer virus is an unwanted program and enters the device without permission and enters copies of itself in computer programs, and the virus is a malicious software or spam. And other programs spammed called worms or trojans or advertising or spyware programs. Can malicious programs to be only for the inconvenience caused by the effect on the computer uses and Tbtiah and cause outages and breakdowns at regular times and affecting the various programs and documents that the user may wish to access. The most dangerous malicious programs that can become a security problem by obtaining your personal information from your e-mails and other data stored in your device. As for publicity programs and spyware are often troublesome and lead to the emergence of pop-up advertising windows on the screen. The spyware gathering your personal information and submit them to ask others to get it for commercial purposes. You can protect your computer and protect yourself by using the appropriate programs to combat malicious unwanted programs that could be devastating consequences. For more information, see the "How to protect your computer from viruses?". Banditry (Phishing) uses the term (Phishing) to express identity theft, which is a criminal act, where the person or deception, cheating the company by sending an e-mail message claiming to be from a company regular and asked to get the message recipient of personal information such as bank account details, passwords and credit card details. The information is used to access bank accounts over the Internet and access to the companies' web sites that request personal information to enter the site. There are programs to combat banditry Phishing and reveal the true identity of the sender, and the best way to protect the person from publishing personal information on request is that the person is alert and cautious and has sufficient awareness , there is there any known bank or a real institution asking their customers to send personal information via e-mail. E-mail we should always remember that e-mail does not guarantee the privacy, Fajsusith similarity postcard privacy. And it navigates the e-mail on its way to the recipient across many servers, where it can be accessed by the people who run the system and people who sneak him in an irregular manner. The only way to make sure that to some extent from the privacy of your e-mail is encrypted. See the following paragraphs ..
يجري ترجمتها، يرجى الانتظار ..
