Protocols of protection and the use of encriptados archives are part of the methods not to be victims of hackers.

The computer science attacks are bread of every day at present. We only think that at the beginning of the decade of the 90, each hour was developed to a virus, however today, exist three virus every second, demonstrating the importance of being prot©g© well.

Shelp of another form, every day they are generated around 315,000 new malicious codes that are on the lookout of some vulnerability in your system. By all this it is that every time more it has been exposed to being victims of a computer science attack.

By the same it is that in hostname we want to help you to protect your equipment and personal information with some recommendations, that will allow to help us to understand acting of the hackers and to identify the areas in which we are weaker.

It reviews the advice next.


They are small programs or devices of hardware that work of remote way and that records everything what it is written in the computer.

How I can solve it? You can enter the Administrator of Tasks of the eyelash €œProcesses or Services€ of your computer and to review if there is something strange, of which you do not remember. Also you have the option to generate a virtual keyboard, which will give the possibility you of tipear with mouse, without it is registry.


This technique enough is used at present to realise swindles online. It consists of duplicating until in minimum details a true website, but with another servant. An e-mail is sent to him to the person or victim, so that it hooks, hoping to that this one believes that is entering the real site, introducing for this its user and password. Much in banking sites occurs.

How I can solve it? The banks do not send this type of invitations by means of mail, therefore, you do not trust when a bank requests accesses to you by means of this means. In addition, when you enter the site of the bank, it reviews that the bar of directions has the formal direction of the bank and that it owns a padlock, that it indicates that the connection with that site is safe.


Robbery of InformationThese are applications that rob the passwords and the data that the same users leave stored, for example, in the cookies that occupy of form reiterated in the navigators.

How I can solve it? To memorise your passwords or begins to use masterful systems of password as Keepass and Loggin Control, among others alternative.


This is a technique that uses a software that operates in a network Ethernet and that registers the information of a certain computer and all their traffic Web.

How I can solve it? It sends your information in based archives or uses safe connections based on SSL, as HTTPS and other mechanisms that offer security. One recommends the formats PGP or GnuPG for the encryption of these post office.


This it is a method that is looked much like phishing, but as far as connections and consists basically of an identity impersonation, to traverse which the attacker falsifies a direction IP of a servant that the victim occupies, at the precise moment at which it introduces his data.

This usually appears in networks that are of public access, as the places with WiFi gratuitous or great networks without control of services.

How I can solve it? Although he is not simple to detect, he is recommendable not to trust opened networks operations important as to accede to your bank account or to realise purchases online.

More forms of computer science attacks exist many, but it is so that you become an idea of the important thing that is the technological and computer science security, not only for the company €“ for them it is recommended to go to a good service of hosting-, but also for the users.

You already know some advice, now only lacking who you take them to the practice.


About Author