פינוקיו שמי
New member
חיבור באנגלית - Internet Security
לצרכי הרצאה באנגלית ישבתי על התחת וכתבתי מספר פסקאות אודות האקרים ואבטחת מידע באינטרנט. האם יש מצב שמישהו יקרא את החיבור ויתקן במקרה הצורך מילים דפוקות / ניסוח על הפנים?
לצרכי הרצאה באנגלית ישבתי על התחת וכתבתי מספר פסקאות אודות האקרים ואבטחת מידע באינטרנט. האם יש מצב שמישהו יקרא את החיבור ויתקן במקרה הצורך מילים דפוקות / ניסוח על הפנים?
Hackers are considered as problems in every computer that connected to the Internet. The hackers have many different aims when they try to get into a computer: it starts with their wish to learn more about hacking, continues with the wish to show how smart are they and ends with their wish to steal from you information or money. Viruses, worms and Trojan horses are making every system administrator panic. It's enough if I'll bring you the example of Half Life 2, a computer game which his source-code was stolen by hackers before it was even released, to show you the fear of every person who uses the Internet and have in his computer some information stored. Where is this fear coming from? When you connect to the Internet, your ISP (Internet Service Provider) provides you a private identity which called IP. This IP is assembled from many numbers, divided by dots. This identity can be used for looking for your computer on the net, or to hack into it. Every computer has also many virtual ports, which are used for applications that communicate with other applications on the Internet. Therefore, if a program wants to send your computer a message, it must have your IP and an open port in your computer, which enables it the ability to communicate with your computer. It's either the way legal, or wanted programs communicate with your computer or the way illegal applications sends messages to your computer. By default, every port in your computer is open. This is, of course, a very dangerous problem because it makes possible the hacking into this computer. Almost every hacker scans many computers until he finds an unprotected computer which he can hack into easily. So, logically, the first steps you want to make about it are to hide your IP and close your unnecessary ports. Those two steps are made by program which called a Firewall. A firewall actually closes your ports until a program wants to use it, and then he alerts you on this attempt, and asks you either you want to block this unwanted connection or permit it to communicate with your computer. This is, of course, not the most protected method in the world, but it will deter hackers from break into your computer.
בתודה מראש, פינוקיו שמי.