With the widespread use of computer technology, a danger has arisen, which is cyber attacks. So, what is this cyber attack and what is it done for? Cyber attack; bank, police, gendarmerie, state, person, firm etc. in the direction of various purposes of the people who are called as expert hackers. sites or computers. In this article, I will draw attention to the precautions that can be taken after I give a brief explanation of the attack on personal computers.
Attacks on personal computers are usually aimed at advertising. This could be a product, a website, or a publicity ad, a slogan. Social accounts can be seized to gain appreciation for their own pages. For example, your Facebook account is played and all friends are invited to the page you want to enlarge. In this way, there are many Facebook pages that increase the liking. If the attack on your personal computer is not for advertising, it is done for intelligence, punctuation, harm or fantasy. Here you can also include intelligence-intentionally-you are curious about your private life and use your personal data for this purpose. If the attack against you is not the intent, there is an option. This is the hacker's willing to use your computer during attacks. Attacks using your computer are usually DDoS attacks. DDos attack; is that many machines (computers) are directed to a single destination (site) at the same time, rendering the target system unserviceable. To do this, the hacker could infect millions of computers with viruses and then forward those millions of computers to the target site with a single command. So the target site will not respond because of excessive traffic.
There is no obligation for hackers to enter computers during cyber attacks. Computer viruses are soldiers of hackers. They can do what they can do to them. If you notice that your computer is infected with a virus, you should not be saying a virus and be extremely careful in this regard.
So how do we protect ourselves from cyber attacks, hackers and viruses? The way to protect from the cyber attacks is careful. To protect against cyber attacks;
Use social media consciously
Pay attention to privacy. Everyone, avoid sharing openly. Close your account on the search engines. Give as little information about yourself as possible and protect your privacy.
Do not trust Facebook applications. Because applications on Facebook are third party applications, these applications have nothing to do with Facebook. An application may be written to malicious people. Do not use the application you do not trust. Harmful practices are usually swallowed up in the form of followers, appreciation, profile ministers.
Do not use likes and followers. With the token code you put away, you have given all your privileges to that appraisal or knowing what application, and the application will follow others to your place, others follow you. If you want to increase provincial followers, you can use the system of scoring that works with a scoring system that does not have a more secure token code. But the risk here is that people you do not know will not be able to share your personal data, photos, etc., as they will follow you. It's all up to him now for what purpose he will use it.
Do not accept friendship requests from people you do not know. Do not add people you do not know. Do not talk to people you do not know Do not exchange files.
Your friend who added you may not be your friend. So an account that imitates your friend's account can be an attacker who adds you. In such cases, contact your friend directly or via phone to confirm that it is her.
Be careful when you like pages. Someone who wants to know about you may hide behind a page and follow you
Do not enter the future.
Be careful with sites that imitate Facebook. If you encounter a Facebook login screen with a link you clicked without logging out of Facebook, do not log in. Check your address bar because that site is not Facebook. If the host file has been tampered with, the name of the fake site can also be shown as facebook.com. Because DNS resolution on the remote machine is the next job. The computer first checks the host file to determine which site to use for this domain. So this means that if you set your facebook.com domain to google.com ipsini in your host file, if you type facebook.com in the address bar, the computer will google google.com. Be careful with this too.
Consciously use other websites
a) Be especially careful when downloading files. The file you are downloading may contain malicious software.
b) Differentiate the truth with the advertisement. Especially in download sites, an ad containing malware may be placed next to the download button. If you click on the advertisement to download the file, your computer means that you have downloaded the malware. Such software usually changes your first home page when it is run.
c) Do not fake false sites. Especially flash player, there are many malicious software sites in the style of updating java. If you come across this trick, you load malicious software with your own hand.
d) Do not enter every site. Because web sites are actually computers, they can see who is connected to them. So site management will see your ip address. Much can be done from the rope to the location. And if a hacker attacks your computer on the internet, it will definitely need your ip address.
e) Do not enter the deep web. It is not clear who is on this dark corner of the Internet. The connection is provided by the torso network and is connected anonymously to the deep web. It is not clear who is who here because everyone has a secret identity.
f) Stay away from Warez sites. Viruses are usually placed into licensed programs. I do not know how many TL's you use a software that is free of charge, is not it worth it?
g) Sites that distribute viruses. You need to be very careful in this regard too.
h) The chances of your computer being infected by the chats are high. Someone may also be using Chat services to send malware.
There are a few rules to keep in mind while using your computer
a) Use licensed software. I mentioned a little while talking about the sites. Malicious software can be installed in software that is broken down into licenses.
b) Your anti-virus program is absolutely active and up-to-date.
c) Be careful when using removable media. Especially there are many viruses that are transmitted through flash disks. Anti-virus programs It is more difficult to gather information about viruses distributed on the flash disk when defining viruses that are spread over the web. Because of this, most anti-virus programs can not detect viruses on usb disks. You can see the virus files by making your system files visible and hidden in your flash disk to see if there are any viruses on your Usb diskette. Or if you enter the usb diskette with the Winrar program you will see all the hidden files. If you have a file named autorun.inf in your flash disk, your flash is virus-infected. This autorun.inf file is actually a script. And in the file is the command to run the virus. Commands in the autorun.inf file are triggered when the icon of the diskin is clicked to open. I am thinking of sharing this virus in the next article.
d) Be up-to-date with your operating system. Especially if you are using Windows, you should definitely use genuine Windows and the system you are using is always up to date. Microsoft releases Windows vulnerabilities every week and closes those vulnerabilities with security updates. Hackers can exploit these vulnerabilities to infiltrate your computer.
e) If your computer starts to have freezing problems, your internet is overwhelming, and if your computer remains unresponsive, a virus may be running on the backplane. In such cases, the cleanest procedure is to format your computer.
Hi Passing by and Upvoted you :) !
:
“Melancholy: an appetite no misery satisfies.” ====> Emil M. Cioran