Svg as foreboding
Generally speaking, the hype around Scalable Vector Graphics (SVG) began almost immediately after the W3C assembled the SVG Working Group, led by Chris Lilley, and announced the standard. This happened…

Continue reading →

Comparison of virtual hosting and dedicated server
The Internet is a powerful platform for maintaining and promoting any business. In order to make the site’s presence on the network permanent, it is necessary to find and determine…

Continue reading →

Warning network attacks.
An intrusion into a computer system usually begins with a preliminary assessment of the flaws in the protection of the network perimeter of your server connected to the network. In…

Continue reading →

8 things that in no case can not be done on the Internet, so as not to lose personal data

With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems, in particular, cybernetic crime. Malefactors on the Web can be incredibly creative in their quest to gain access to the user’s financial information or any other personal data. Here are a few things that you definitely never do on the Web.

1. Reply to suspicious emails.
Hackers just love to send fake notifications from different banks. Most often used for this message that the user must reset the password or his account was hacked. The victim may also offer to open the attachment. Using such letters, hackers not only collect data, but can also infect a computer. Remember, banks never solve issues in this way and never ask for your details.

2. Pay by card is not clear where
You should always pay attention to the URL of the place where you are going to pay by card. Attackers can fake whole resources by changing several characters in the name. Therefore, proven places should be added to your bookmarks. It is also recommended to enter the address manually. In addition, the site must have a secure connection “https”. You can check the site with the help of Whois services, which provide data and the owner of the domain, as well as information about how paid it is.

3. Agree to “upgrade browser”
Any messages on the Internet in the spirit of “Your browser is outdated” should be ignored. It is almost always an attempt by criminals to spread malware or steal data. Remember that most modern applications are updated on their own (if they are licensed).

4. Transfer money to a friend
One of the most common methods of fraud in social networks. Hackers hack a user account, and then ask his friends in one form or another to help financially, even “put money on the phone.” You should not give money to anyone until you communicate with your friend personally outside the social network.

5. Agree to pay for unlocking a PC
In recent years, extortion programs have become incredibly popular. They limit the work of the PC, blocking files and systems, and require a “ransom.” Most often it is a small amount in cryptocurrency. Paying hackers is not worth it, since they almost never unlock anything, and getting them money only motivates them to continue to commit such crimes.

If you become a victim of such a hack, you should use special tools from anti-virus companies. For example, Kaspersky WindowsUnlocker (it is absolutely free). In addition, you should regularly update the system and software, install an antivirus and use only licensed software.

6. Leave too much information about yourself
Technology has gone very far, and today the user can become a victim of even the digital theft of his identity. Most often this happens if he leaves too much information about himself, and also uploads too many photos to the network. In addition, it is not recommended to leave a personal phone number on the network, as it may be included in the spam mailing lists.

7. Install a pirate sofa

Needless to say that using unlicensed software is bad. Anyone who still does this gets minus five points to karma. If karma motivation is not enough, then it is worth remembering that hackers love to insert malicious code into software distributed through third-party sources.
In official stores, however, caution should also be exercised. No need to install alternative versions of known programs for the sake of gaining access to “enhanced functionality”.

8. Transmit important data through public Wi-Fi
When using an unprotected network at home or in public places, you should not only transfer any important data, but even enter account names and passwords, make purchases, enter the online bank. It is worth using only a secure connection or your mobile Internet. Free cheese is only in a mousetrap!

Are you interested in cyber security issues? Here is a little romance, about 10 unsurpassed hackers in the history of mankind who have left their mark on history.

Your online office of & nb p; Micro oft
The Windows Live family brought together a variety of user services, designed for both ordinary Web users and professional communities of developers, scientists, and researchers. There is even a 3D…


Ordering a SERM service: the principles of online reputation management and the price of a question
It is quite difficult to earn a good reputation in the market of any company, including financial, and sometimes it takes more than one year. But often the company's brilliant…


Internet times of Khrushchev: why in the Soviet Union did not create their own computer network
It is known that the Internet in its current form is the development of the computer network ARPANET, developed in the USA in 1969. However, few people know that in…


8 things that in no case can not be done on the Internet, so as not to lose personal data
With the spread of the Internet, the era of accessible content, fast exchange of information and rapid communication at any distance began. However, along with all this came the problems,…