Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware
Interruption in the internet is very common. There are the types of interference by the irresponsible and I also added how the characteristics of this disorder:
Snooping is an electronic monitoring for digital networks to find out passwords or other data of a personal nature. There are various techniques of snooping, which is shoulder surfing (direct observation of one’s display monitor to gain access), dumpster diving (to gain access to passwords and other data), sniffing digital (electronic surveillance of the network to reveal passwords or other data). It is very disturbing and very damaging indeed. And not all ISPs are protecting the privacy of consumers.
Spoofing typically use fake email sender name so we believe. And as a suggestion if we do not know who sent the email should not be opened.
Usually ‘phishing’ using a trusted institution name so we want to open it. There is nothing like some of the bank where you save money to ask you to update your data. Do not update this!because the organization must actually already know your account data. And if you want to contact the Call Center, Call Center make sure it is available on your mobile phone or from outside sources. Do not use the ones from your email.
Make us to enter a site that cheat. Then the “thieves” include software that is “evil” into our computer. Then make us always to the wrong sites, although we have entered the correct address.Then, as the tips, for usually we use the URL “http” to “https”.Maybe this way will be useful.
HTTP cookie, web cookie, or cookies have a series of text sent by a server to a web browser which will then send it back, without change to the server each time the browser accessing the web site.HTTP cookies are used for authenticating, tracking, and maintaining specific information from the user, such as user preferences or list their electronic shopping carts. Cookies are still stored in the computer can speed up access to the website in question. However, cookies can reduce computer’s hard disk space and provide opportunities for spreading spyware through cookies to log onto the computer. This is what is feared. Cookies can also be a weakness for sites that require log-in access to the encrypted, because the Shared Computer, Cookies may be the main enemy of security, which allows us to get into other people’s pages without entering any password, even if the password has been changed. Cookies are also often referred to as IP (Internet Protocol).
The latter is a derivative of spyware adware. This disturbance monitor user behavior in the Internet, browse to bring “a myriad of ads” to users. However, because adware is less dangerous (not committing theft of data), and send the results of the spyware did he collected to the author (adware generally only transmit data to marketing companies). Adware comes from the word “advertise”. I think enough for this post. Thank You
Muhlis Agung Saputro_125150300111022