It could be that our identity on the server has been stolen and used for defamation. Through this article, here are the applications used to retrieve someone's information and how to deal with them.
Lately, with an increasingly developed era, everything we want has become easier and easier to learn and search for. Even now many schools, companies, and communities are making -based applications on line. Unfortunately, there are many people who want to annoy others through computer media called Crackers (Bad hackers).
For this reason, we must be vigilant when using computers for daily purposes. It could be that our identity on the server has been stolen and used for defamation. Through this article, here are the applications used to retrieve someone's information and how to deal with them.
- MUST KNOW! These are 5 ways hackers can steal data from Facebook users
- These are the 10 Most Dangerous Hackers in the World (Psst.. There are Indonesian Hackers)
- Wow, this antivirus actually makes your password easy for hackers to break!
5 Applications Commonly Used by Hackers
1. Attacking IP
Attacking IP is a very frequently used application for tracing IP addresses. This application can also be used to break into other people's computer systems via email network ports weak to attack. This DDOS Attacking IP application can be overcome by only usingupdates all drivers software on your computer. So updates- is the driver on the laptop especially Network drivers and Anti Virus regularly so as not to be easily attacked.2. Remote Desktop Connection
Remote Desktop/Mstsc This is a Windows Utility application, so you can disable the feature if you don't need it. This Remote Desktop application is usually used in offices to connect 1 PC to another PC. This application is used after successfully entering into someone else's computer system. This application is considered not so dangerous, because today's Antivirus already has protection against various threats that lead to the computer system. The point is, you have toupdates Antivirus so that it is not easy to installhack.3. Malware from Gmail Messages
Be careful with email messages from people you don't know, because there's a chance that person has malicious plans for you. Lots crackers who uses an email containing the code malware as a means of transmitting the virus, malware, or spyware then used to steal your personal data or monitor your computer remotely.4. Crack Programs
Crack Program is a program that can be termed as Cheat Programs. So this program can make a paid application become free. Many people download programs with free, then make crack for the program to become Pro program or Full Version. In this day and age many people use it to spread viruses and seek personal information. If your Antivirus detects this program contains a virus, it's better to delete this application then turn off the internet connection and clean the computer with the CCleaner application. Apps Cleaning & Tweaking Piriform DOWNLOAD Apps Cleaning & Tweaking Piriform DOWNLOAD5. Key Logging
This program is rarely found but you can see it on some internet cafe computers. This program is used to monitor the activity of your keyboard keys. So the operator will see what keys you type on the computer. TAKE NOTE! Your password can be found out while entering the ID and Password of an account that belongs to you. The fix is to first check what applications are installed in the cafe. If there is something suspicious, first ask the cafe operator and then delete it.
Apps Networking Nir Sofer DOWNLOAD