Hacking [Part 2]
~1830, Monday, Somewhere in Malacca.
Salam semua,
Continue pasal yg hari tu okay. Keduanya, they have to fight against security companies. As fraud techniques evolve, so do security systems designed to prevent users from being affected. But until very recently, antivirus protection systems were fighting against a factor that was impossible to control: time.
When a virus took months to spread across a country, reaction time was not a fundamental problem. But the Internet has allowed viruses to spread at incredible speeds, and classic protection systems are no longer viable.
Viruses, spyware, key loggers, phishing… Each of these threats represents a serious danger that has created the need for new protection systems. Obviously the best thing would be to have an expert on hand all the time to differentiate between good and bad code, and so, in this virtual world, we can also virtualizes these experts.
Teknologi securiti hari ini membolehkan kita utk detect when we are suffering the consequences of malicious code. Given that these codes will always carry out a series of typical actions, these actions can be detected with sufficient time to stop the malicious program. This means that even if the program is unknown (ie, a traditional antivirus cannot detect it), it is possible to prevent the consequences of this program.
Bandicruz.
*******
Ardour of Admiration (AoA)
Salam semua,
Continue pasal yg hari tu okay. Keduanya, they have to fight against security companies. As fraud techniques evolve, so do security systems designed to prevent users from being affected. But until very recently, antivirus protection systems were fighting against a factor that was impossible to control: time.
When a virus took months to spread across a country, reaction time was not a fundamental problem. But the Internet has allowed viruses to spread at incredible speeds, and classic protection systems are no longer viable.
Viruses, spyware, key loggers, phishing… Each of these threats represents a serious danger that has created the need for new protection systems. Obviously the best thing would be to have an expert on hand all the time to differentiate between good and bad code, and so, in this virtual world, we can also virtualizes these experts.
Teknologi securiti hari ini membolehkan kita utk detect when we are suffering the consequences of malicious code. Given that these codes will always carry out a series of typical actions, these actions can be detected with sufficient time to stop the malicious program. This means that even if the program is unknown (ie, a traditional antivirus cannot detect it), it is possible to prevent the consequences of this program.
Bandicruz.
*******
Ardour of Admiration (AoA)
0 comments:
Post a Comment