Almost every computer will experience a decline in performance from wajtu to time, it was because of some things that can make the system crash or the system experienced heavy performance that we do not really need.
Here I will try to explain what things are slowing down our computer's performance in terms of the Software or system.
Adware
This is a program that will display ads on the computer. It would be disturbing because adware generally will use the resources of the computer, as a result computer is running slow. There is also a type of adware that appear in pop-ups that can interfere when you're working.
Brute Force
An activity to break the password by combining numbers and letters in sequence. Very dangerous if with this technique, people who are not entitled to succeed to know your password and then misused. To overcome this problem, it's good password that is used not only consist of numbers and letters but also consists of symbols like $, #, &, and others.
DDoS
Is a continuation of a Distributed Denial of Service, where a server or computer is attacked with bombarded shipment data in a very large size of many computers simultaneously. As a result the computer is difficult to access or damage to hardware not being able to accommodate very large data items.
Exploit
That is an application that tries to find and attack the weaknesses of the system to gain access to or for the purpose of infecting the system or computer.
Fake Antivirus
The way it works is by making as if a computer virus and suggest to buy anti-virus to overcome the virus.
Hoax
That is plain hoax spread through email or website. The effect is a panic or a lot of readers who were deceived. Another result is burdensome because of the Internet network of hoax chain messages are delivered to another person.
Keylogger
It is one threat that is dangerous. Keylogger will record that entered through the keyboard input to be stored or sent to someone who normally used for purposes that are not good. This is in particular to watch out for when you enter the password in public places like cafes. Password that you entered via the keyboard can be known and may be used for purposes that are not good.
One way to avoid a keylogger is to use On Screen Keyboard now must enter the password. On Screen Keyboard can be run from the Windows programs that are on Programs | Accessories | Accessbility or by typing in "OSK" from Start | Run on Windows Operating System.
Malware
Usually found on the bootsector on the disk, then change the course of the first run. Systems that are usually affected first is the Operating System. Infections in Operating System makes it easier malware to spread themselves or spread the virus on storage media such as CD ROM or Flash Disk.
Phishing
Is a form of fraud on the internet by making someone would provide important information that is not entitled to know. For example, by creating a website similar to a bank website. A victim does not realize he had been deceived and then enter the password that setealh known by the manufacturer can be used to deplete savings victim.
Rootkit
That is a program that aims to hide other programs running. Usually used to spread malware, virus, or keylogger.
Spam
Mean an unexpected email. Usually an email advertisement or a teaser for a person visiting a particular website which is actually a phishing or to disseminate malware. Messages can be sent in large quantities, so spend time to remove them.
Spyware
Is a program that works to spy on users with the purpose of obtaining critical information such as credit card numbers, PINs or passwords that can harm the victim because the leaking of such information.
Trojan
Acting as if he dalah good program that can be used to help users work. But, actually in it there are functions that endanger the overall system or to steal confidential information. Trojans easily spread to other computers.
Worm
Is malware that can multiply and then sends copies itself over a network without having a specific activity performed by users. The worm can be dangerous because it can become an entry point for viruses, malware or other destructive programs.
So my explanation may be useful.
2 komentar:
As most you already know, Java Web ADF is built on the Java Server Faces
(JSF) technology which allows developers to build web applications and
custom user interface components. JSF implicitly depends on other Java
web application technologies such as Java Server Pages (JSP) and
Servlets. At every major release, we try to align the ADF with the latest
revisions of Java technology. By doing so, not only can we take advantage
of new features and improvements but so can you as developers. Its a
delicate balancing act where we weigh the benefits of moving upto newer
versions versus the consequences of potentially breaking existing
applications.
java training
thank you for all your comments. hopefully this blog will be useful for us all
Post a Comment
Please leave a comment here
Comment spam and other promotions will be deleted