Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware

Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware

Interruption in the internet is very common. There are the types of interference by the irresponsible and I also added how the characteristics of this disorder:

A. Snooping

Snooping is an electronic monitoring for digital networks to find out passwords or other data of a personal nature. There are various techniques of snooping, which is shoulder surfing (direct observation of one’s display monitor to gain access), dumpster diving (to gain access to passwords and other data), sniffing digital (electronic surveillance of the network to reveal passwords or other data). It is very disturbing and very damaging indeed. And not all ISPs are protecting the privacy of consumers.

B. Spoofing

Spoofing typically use fake email sender name so we believe. And as a suggestion if we do not know who sent the email should not be opened.

C. Phishing

Usually ‘phishing’ using a trusted institution name so we want to open it. There is nothing like some of the bank where you save money to ask you to update your data. Do not update this!because the organization must actually already know your account data. And if you want to contact the Call Center, Call Center make sure it is available on your mobile phone or from outside sources. Do not use the ones from your email.

D. Pharming

Make us to enter a site that cheat. Then the “thieves” include software that is “evil” into our computer. Then make us always to the wrong sites, although we have entered the correct address.Then, as the tips, for usually we use the URL “http” to “https”.Maybe this way will be useful.

E. Cookies

HTTP cookie, web cookie, or cookies have a series of text sent by a server to a web browser which will then send it back, without change to the server each time the browser accessing the web site.HTTP cookies are used for authenticating, tracking, and maintaining specific information from the user, such as user preferences or list their electronic shopping carts. Cookies are still stored in the computer can speed up access to the website in question. However, cookies can reduce computer’s hard disk space and provide opportunities for spreading spyware through cookies to log onto the computer. This is what is feared. Cookies can also be a weakness for sites that require log-in access to the encrypted, because the Shared Computer, Cookies may be the main enemy of security, which allows us to get into other people’s pages without entering any password, even if the password has been changed. Cookies are also often referred to as IP (Internet Protocol).

F. Spyware

The latter is a derivative of spyware adware. This disturbance monitor user behavior in the Internet, browse to bring “a myriad of ads” to users. However, because adware is less dangerous (not committing theft of data), and send the results of the spyware did he collected to the author (adware generally only transmit data to marketing companies). Adware comes from the word “advertise”. I think enough for this post. Thank You

Muhlis Agung Saputro_125150300111022


One thought on “Snooping, Spoofing, Phishing, Pharming, Cookies, & Spyware

  1. subjects remembered the introduction of information technology and computer science. This refreshing and nostalgic memory of such courses one semester of teaching by our handsome teacher eheheheheh,,,,,,,
    just kidding,,,,,,,(*-*)^

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s