Skip to main content

Posts

Showing posts from June, 2019

Computer Security, Law Enforcement Officials, and Personal Privacy Issues

Computer security system is an effort made to secure the performance and computer processes. The application of computer security in daily life is useful as a guardian of system resources so that it is not used, modification of interruptions and is disturbed by unauthorized people. There are benefits from the use of a computer security system that is maintaining a computer system from accessing someone who does not have the right to access the computer system. Computer security systems are increasingly needed today along with the increasing use of computers throughout the world. Factor of computer crime   Some things that make computer crime continue to occur and tend to increase are as follows: Increased use of computers and the internet, the amount of software that was initially used to audit a system by looking for weaknesses and loopholes that might be misused to scan other people's systems, the amount of software to infiltrate available on the Intern...

A Thing called Ransomware

A Thing called Ransomware Ransom malware, or   ransomware , is a type of malware that prevents users from accessing their system or personal files and demands ransom payment in order to regain access. The earliest variants of ransomware were developed in the late 1980s, and payment was to be sent via snail mail. In this day, ransomware authors order that payment be sent via cryptocurrency or credit card. There are several different ways that ransomware can infect your computer. One of the most common methods today is through malicious spam, or  malspam , which is unsolicited email that is used to deliver malware. The email might include booby-trapped attachments, such as PDFs or Word documents. It might also contain links to malicious websites. Malspam uses  social engineering  in order to trick people into opening attachments or clicking on links by appearing as legitimate—whether that’s by seeming to be from a trusted institution or a friend. Cybercriminals...

What is phising ?

Source : https://dewailmu.id Phising is a method to do some scamming to steal data from target, phising mean fishing, so phising is fishing target to the trap. Phising also steal important data like account or credit card (also called carding). Phising also use email to scam the target, the suspect send email to target, the email resemble the official, the email contain link direct to fake website, the target think its not fake and they will fill the data, and data will be sent to the suspect. The data will used by the suspect, they also can sell it.                 How to prevent phising ?. First, don’t click randomly at any link and fill the data, just click trusted link or website, or check twice or more times because the suspect make use of inaccuracy. Example, the suspect make link named Faceook.com, which it should be facebook.com. second, don...

Malware ( Malicious Software)

   is a program that is made to cause damage or can infiltrate people's computers. Malware comes from the Mali word which means "malicious intent" and ware which means "software". certainly those who can make this malware are people who already understand in terms of security and software.  this program enters via e-mail, internet downloads and programs that have been infected with the virus. this program can not only cause system damage, but can also retrieve data or information that is affected by the malware. This malware arises from downloading software from an illegal place where the malware program has been downloaded.  malware also includes several things, namely: a virus is a device that can spread on the system and can also interfere with the performance of the system that it has entered, trojan house is a device that can enter to damage the system and can also steal data or information from system users he was broken. , as well as other dangerous thing...

Inside The Internet

Internet is a global computer network providing a variety of information and communication, very real and part of our everyday lives. Internet is networks of networks. It means all of activity which using internet are real. Internet never breaks and never stop. Inside the internet is nothing controls, everyone can open everything. Internet can be links academic, emails, social media posts, google searches, and others.  1. Internet Protocol/Transmission Control Protocol (IP/TCP) is a set of rules for routing and addressing packets of data to smaller pieces, it’s called packets. In every packets of IP,  data arrives where it is needed. Its like a language of the internet.  2. Internetworking is a process of connecting different networks by using devices. These are physical hardware devices which have the ability to connect different networks and ensure error free data communication.  IP address is a unique identifier assigned to a device that connects...

Ethics on Social Media

        In this globalization era, technology grew rapidly especially in terms of social networking. According to Hootsuite, at least 45% recorded from the human total population has used social media last January 2019s. It showed how influencing social media now. Social media itself, help us to communicate with many people from the various circle. Whether it for a personal or public interest. The trend for using chat apps has grown since last 2000s along with the emergence of diverse social media and becomes society choice like Facebook, Instagram, WhatsApp, Path, etc. Not only can give good impacts such make us easier to exchange information with others but also can give bad impacts if it used arbitrarily like spreading hoax which can harm to others. Therefore, it would be nice if we, as social media users, use our social media as well as possible. As we know, social media gives us the freedom to be able to communicate with anyone. But it not means we ca...

Introducing To Basics Network

Introducing to basics network. Computer network is a network with wireless media cable made by IT experts to provide "communication" between computers more effectively and efficiently. This computer network is connected starting from 2 or more computers that are interconnected with each other to achieve certain goals. For example sharing resources (printer or file) and surfing the internet. In this case, the methods used for sharing and information keep changing and growing. This is inversely proportional to the "human network" which is limited to face-to-face conversations, media that are successfully captured and captured by communication. The existence of this computer network innovation makes travel data and information more widespread and more variables that can help all sectors of life. In the practice of applying a computer network, each part of the computer can request or receive a service called (the client) and that provides or sends ...