חיבור באנגלית - Internet Security

חיבור באנגלית - Internet Security

לצרכי הרצאה באנגלית ישבתי על התחת וכתבתי מספר פסקאות אודות האקרים ואבטחת מידע באינטרנט. האם יש מצב שמישהו יקרא את החיבור ויתקן במקרה הצורך מילים דפוקות / ניסוח על הפנים?
Hackers are considered as problems in every computer that connected to the Internet. The hackers have many different aims when they try to get into a computer: it starts with their wish to learn more about hacking, continues with the wish to show how smart are they and ends with their wish to steal from you information or money. Viruses, worms and Trojan horses are making every system administrator panic. It's enough if I'll bring you the example of Half Life 2, a computer game which his source-code was stolen by hackers before it was even released, to show you the fear of every person who uses the Internet and have in his computer some information stored. Where is this fear coming from? When you connect to the Internet, your ISP (Internet Service Provider) provides you a private identity which called IP. This IP is assembled from many numbers, divided by dots. This identity can be used for looking for your computer on the net, or to hack into it. Every computer has also many virtual ports, which are used for applications that communicate with other applications on the Internet. Therefore, if a program wants to send your computer a message, it must have your IP and an open port in your computer, which enables it the ability to communicate with your computer. It's either the way legal, or wanted programs communicate with your computer or the way illegal applications sends messages to your computer. By default, every port in your computer is open. This is, of course, a very dangerous problem because it makes possible the hacking into this computer. Almost every hacker scans many computers until he finds an unprotected computer which he can hack into easily. So, logically, the first steps you want to make about it are to hide your IP and close your unnecessary ports. Those two steps are made by program which called a Firewall. A firewall actually closes your ports until a program wants to use it, and then he alerts you on this attempt, and asks you either you want to block this unwanted connection or permit it to communicate with your computer. This is, of course, not the most protected method in the world, but it will deter hackers from break into your computer.​
בתודה מראש, פינוקיו שמי.
 

edlessme

New member
רק תנסה לקבל עוד ביקורת ממישהוא נוס

hackers are considered as a problem for every computer that is cennected to the internet. hackers have many aims when they attempt to hack a computer. a hacker is "created" when a person wishes to learn about hacking, the process continues through the vain wish to show how smart he is and ends by their wishing to obtain certain information or money. viruses, worms and troja horses are makeing every sistem administrator panic. a great example for this is the case of half life 2, to which the source code was stolen before the game was even released. and so every person with any kind of information on his internet surfing capable computer should be on guard... how is hacking possible? when you go online your internet service provider provides you with an ip which is like your coputers address (the ip is comprised of many numbers partitioned by dots). this ip can be used to look somones computer up on the net and hack into his computer. Every computer has also many virtual ports, which are used for applications that communicate with other applications on the Internet. Therefore, if a program wants to send your computer a message, it must have your IP and an open port in your computer, which gives it the ability to communicate with your computer. and this is an opening for hacking applications to enter your computer. By default, every port in your computer is open. This is, of course, a very dangerous problem because it makes it possible to hack into the computer. Almost every hacker scans many computers until he finds an unprotected computer which he can hack into easily. So, logically, the first steps you want to make are to hide your IP and close your unnecessary ports. These two steps are made by a program which called a Firewall. A firewall actually closes your ports until a program wants to use it, and then it alerts you on this attempt, and asks you wether you want to block this connection or permit it to communicate with your computer. This is, of course, not the most sophisticated method in the world, but it will deter hackers from breaking into your computer.
 
למעלה