DediPath is the Patron of Safe Use of the Internet

Smart Use of Internet

Cyberspace has become a place of very large criminal activity. Obviously every Internet user is exposed to it. Fortunately most of the attacks, due to its mass share character is only successful when your computer does not have basic security software (Antivirus/AntiSpyware). That is why it is important to be concerned about safety of your computer.

We strongly warn to be smart in use of the internet. Some websites, such as pornographic ones, often contain malicious software that, once installed on your computer, can paralyze your work or extract sensitive data from your computer. The most important rule is reasonable thinking and following the rules below:

1. Secure your computer with antivirus and antispyware. You can legally download this software from the Google and install it. This will protect your computer from basic viruses and hacker programs. It will block attempts to break into the network of your computer.

2. Use only the legal services and software. Pirated software may include spyware that without knowledge can install on your computer viruses and looks at your activities to pass information to undesirable people. This way you can lose access to bank account, mail and other authorized accounts.

3. Carefully look at the bank website you use during purchasing process. Please enter the address of the bank’s website without using the links sent by anyone. They can direct to the “false website of the bank that looks similiar”, which is called phishing.

4. Do not open mails from unfamiliar recipients or located at spam. They can lead to dangerous websites or programs.

Type of threats you can meet:

Pharming – advanced form of phishing; The Internet fraud scheme, which involves the change of name server addresses (DNS), so that the user enters a fake website designed to capture confidential data, such as bank login data. Attack can be done on a single computer or on a mass scale.

Typical Virus – works on a principle similar to its biological counterpart. Adding his code to the infected file. Often, viruses show their presence through a variety of graphics, sounds or other effects, as well as some of the more malicious ones that remove data from the drive, destroying or blocking anti-virus or other programs.
Retro Virus – It can immobilize or even destroy antivirus.

Mail virus – threat that any virus can be injected by placing it as an attachment or address to an unknown site.

Polymorphic virus – It can encrypt its own code and even change it automatically from time to time, which is very difficult to detect for anti-virus. Bootshield Virus – It is located in the bootloader memory, which prevents the system from booting or simultaneous startup with it.

Trojan – A program often hiding in another application, making it easy to take over manage of the computer through an outsider via the internet.

Exploit – A program that exploits vulnerabilities in operating systems or programs to get into your computer and help the hacker in taking over it or completely destroy (prevent) the application from use. When the patch is installed, the exploit becomes useless. Usually this is a threat from development mistakes.

Keyloggers – software to capture all the characters typed on the keyboard. Then the program saves it on the victim’s disk or in some types sends it even by e-mail or upload to FTP to the person who owns this virus. It is used to capture passwords to bank accounts, mail accounts et cetera.

The younger user, the more danger..

A modern parent cannot protect his or her child from everything, but can help him understand the rules and explain how he or she should behave to take care of his or her privacy. The key to this is to educate young people on the right attitudes and patterns, even in the real world. Regardless of the age and nature of the problem, try to find time to talk to a young internet user – by this, you build a bond and deepen mutual trust, which can be very important if your child is in a dangerous situation. Talk with your child about what types of material he or she publishes and how to behave when a non-close person forces him or her to send any materials. Be sure to make sure your child knows how to secure access to private digital content and pay attention to configuring settings on their social network profiles. DediPath strongly reminds to keep your profile secure with a strong password and not share it with your friends.