This page has been robot translated, sorry for typos if any. Original content here.


From the very beginning, as you launched your site, you need to think about its security . It's not a secret for anyone. that as long as the Internet exists, so much is used in the word "hacker" . Newspapers and magazines write about them, they talk on television and even make films. These include well-educated and skillful programmers who have learned to systematically manipulate Internet technologies, and use the knowledge to use for fraudulent purposes.

If you think that there is absolute protection of the code against this type of threat, then you are mistaken. Yes, this is today a harsh and frightening reality. Talking about protecting only the site will not be true. A computer connected to the Internet is also part of one system. Therefore, if you are sure about the existence of risks. related to the storage of information in the system, you can only significantly (depending on the means) reduce the chances of a successful attack for hackers.

Especially it is necessary to think about it to those who are engaged in electronic commerce , it is to them that the "pros" look "chained". Imagine a hacker hacking into your system and getting information about bank accounts, credit card numbers of all your customers, or stealing your keys to "purses" ... you will lose much more than saved for the maximum possible protection of your site's code.

Even, let's say you do not do anything like that and your site is absolutely unattractive to hackers, then consider another threat, in the face of banal Internet hooligans or as they are also called "vandals . " They, guided by unclear what interests, if not destroyed, they will spoil the site accurately.

As much as possible to be protected from various threats, it is devoted to it separate pages on our site. On this page, let's look at them by type.

Viruses have two characteristic features. The first of them is the conduct of destructive activity to any information, wherever it is located in the system. That leads to the loss of necessary and valuable files. The second feature is that they multiply, by e-mail and any network connections - they carry similar problems to other users. The speed of propagation is slightly lower than that of "worms".

Worms "crawl" from the computer to the computer, using the vulnerability of protection . In addition, they create a copy for each IP address found by another computer. Hence their unusually high speed of propagation. In their code they do not carry the danger of destroying and corrupting other files. Their main task is to do as many "holes" as possible in the system to penetrate into it other, more dangerous malicious programs, for example - "Trojan horses" .

The software "Trojan horse" uses the same idea as that wooden construction from the work "Troy". Under the guise of a "useful" file (created by a hacker), it penetrates the system and, depending on the tasks that the creator assigned to it, it does its job. Most often, to date - this is the theft of passwords , keys and other confidential information. Although a "Trojan" is capable of any unauthorized action. A distinctive feature of the other programs listed above is the inability to self-propagate and self-propagating. The address of "horses" is indicated by their "master".

For all other such "mucks", the network can "dig up" and other malicious programs that carry a potential danger:

  • Keyboard spies - are used to extract confidential information from the system, in particular passwords .
  • Hacker's hackneys - under the guise of useful snail, a malicious code penetrates into the computer, allowing the hacker to control your computer (change settings, run programs, etc.).
  • Dial-up programs - when connecting to the Internet, you connect not with your provider, but with anyone (for example, with a paid site of a pornographic nature), and after some time you get an invoice for paying for long-distance connection or services of a site.

This list can be continued for a long time, but tomorrow it will still not be complete. Who needs it - come up with something else. Among the most sophisticated ways is worth noting: the interception of packets (by the principle of listening to telephone conversations) and the attack of hackers using the "mirror" of the site. An example of the latter method might look something like this. The user buys something not on the site of any company, but on his "mirror" created by a hacker. At the same time, there is nothing left and no money on the credit card.

Let you not particularly intimidated by these risks, because there are and are constantly emerging new fairly effective means of combating them. Well, if you still seriously suffer from them and are in Russia, do not despair - the competent bodies in the person of division "K" really work, which are very competent on these issues.