Thursday, April 18, 2019
Have to choose a good topic from the area of ICT or computing Essay
Have to choose a good topic from the area of ICT or computing - demonstrate Exampleor your browser automatically installs program without seeking your permission and ends up installing a spyware or you click on a pop up and that triggers a program to install a spyware onto your machine.Apart from hackers, spywares are mainly created by the advertisement companies in order to track the online behavior of users. along with spywares, the advertisement companies can also infect your system with tracking cookies which can track every site that you have browsed and can fetch the vital personal information. Generally the spywares created by these companies are not as lethal as the ones created by the hackers, in cuticle the companies do not use the information for anything else aside from marketing but these spywares also turn your machine into a data transmitter for these advertisement agencies, mischievously affecting the performance of your home based system.Imagine the previous time s full of inconvenience and hassles when we had to brook in what appeared to be never ending queues, to execute any transaction at the bank be it some money transfer or even a minor enquiry. We had to spend hours for booking the railroad track tickets and for paying our utility bills. Then we jumped onto the era of internet where most of the needs of the day are settle using internet itself. Few individuals now can be seen doing the transactions standing at the bank. But, as the wise people say There are no free lunches, there is a damage associated with this convenience as well.The sole identity that a person has during any online transfer is his password. In case the password to your bank account has been hacked by a smart hacker, after tracking the data from your calculator system, he can transfer millions from your account into his account in just a few seconds. To your nightmare, it does not end here. He can sell the vital information, related to your companys strategy and stored in your system, to the competitor and since the information has been leaked from
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.