This page has been robot translated, sorry for typos if any. Original content here.

Risks

From the very beginning, as you launched your site, you need to think about its security . Not who is not a secret. that as long as the Internet exists, so much does the word "hacker" use in everyday life. Newspapers and magazines write about them, talk on television and even make films. These include well-educated and skillful programmers who have learned to systematically manipulate Internet technologies, and use the knowledge gained for fraudulent purposes.

If you think that there is an absolute code protection against this type of threat, then you are mistaken. Yes, this is a harsh and scary reality today. Talking about the protection of the site only will not be true. A computer connected to the Internet is also part of the same system. Therefore, if you are confident about the existence of risks. related to storing information in the system, you can only significantly (depending on the means) reduce the chances of a successful attack for hackers.

Especially it is worth thinking about this to those who are engaged in e- commerce , it is to them that the “pro” look is “riveted”. Imagine a hacker hacked your system and got information about bank accounts, credit card numbers of all your clients or stole your keys to "wallets" ... You will lose much more than you saved on the maximum possible protection of your site code.

Even, let's say you do not do anything like this and your site is absolutely unattractive for hackers, then consider another threat, in the person of banal Internet hooligans or as they are also called "vandals" . Guided by what interests they do not understand, if they do not destroy, they will spoil the site for sure.

How to protect yourself as much as possible from various threats, this is what individual pages on our site are devoted to. On this page, let's sort them out.

Viruses have two characteristic features. The first of them conduct destructive activity to any information, wherever it is located in the system. That leads to the loss of necessary and valuable files. Their second feature is that they multiply by going through e-mail and any network connections — they carry similar problems to other users. The spread rate is slightly lower than that of the "worms".

Worms crawl from computer to computer using a security vulnerability. In addition, they create a copy for each IP address of another computer found. From here and their extraordinary high speed of distribution. In their code they do not carry the danger of destruction and damage of other files. Their main task is to make as many “holes” as possible in the system in order to penetrate into it other, more dangerous malicious programs, for example, “Trojan horses” .

The Trojan Horse software uses the same idea as that wooden construction from Troy. Under the guise of a "useful" file (which the hacker created), he penetrates the system and, depending on the tasks that the creator has appointed to him, he does his job. Most often, today it is theft of passwords , keys and other confidential information. Although able to "Trojan" to any unauthorized user action. A distinctive feature of the other programs listed above is the inability to self-reproduction and self-propagation. Addressing "horses" indicates their "master".

For all other such "nastiness", other malicious programs can be "dug up" on the network, which carry the potential danger:

  • Keyloggers - used to extract confidential information from the system, in particular passwords .
  • Hacker ulitity - under the guise of useful ulitity, malicious code penetrates into the computer, allowing the hacker to control your computer (change settings, launch programs, etc.).
  • Dialer programs - when you connect to the Internet, you connect not with your provider, but with anyone (for example, with a paid pornographic site), but after some time you receive a bill for paying for a long-distance connection or services of any site.

This list can be continued for a long time, but tomorrow it will still not be complete. Who needs it - come up with something else. Among the most sophisticated ways worth noting: the interception of packets (on the principle of listening to telephone conversations) and the attack of hackers using the "mirror" of the site. An example of the latter may look something like this. The user buys any thing not on the website of any company, but on his "mirror" created by the hacker. At the same time, it remains without a thing and without money on a credit card.

Let these risks not really scare you, for there are new and quite effective means of dealing with them constantly. Well, if you still seriously suffer from them and are in Russia, then do not despair - the competent authorities in the person of the "K" unit, who are very competent in these issues, really work.