WHAT IS EMAIL BOMBARDMENT?

Image
An email bombing is an attack on your inbox that involves sending massive amounts of messages to it. Sometimes these messages are incomprehensible. But more often, they will be confirmation emails for newsletters and subscriptions. Thus, in the latter case, the attacker uses a script to search for forums and newsletters on the internet. Then they sign up for an account with your email address. Each will send you a confirmation email, asking you to confirm your address. Also, this process is repeated on as many unprotected sites as the script can find. The term Email Bombing or Email Bombing; it can also refer to flooding an email server with too many emails. In an attempt to overwhelm the server and disable it. But that's not the goal here; it would be a challenge to cut down on the modern email accounts used. Meanwhile, Google or Microsoft email servers, anyway. So instead of a denial of service (DOS) attack; against the email servers you are using. Also, the flood of messages

WHAT IS TROJAN HORSE VIRUS AND ITS PREVENTION

Any user who has used a PC for some time knows that computer viruses are one of the worst things that can happen to them, since the minimum contact with them exposes us to data loss, identity theft and many other problems, which will not only get us to waste our time trying to solve the problems that come with them, but also to lose a good amount of money in the process.

Trojan horse virus prevention
That is why in this post we are going to find a lot of information, and very detailed, about how the main types of viruses act today, and we are also going to learn how to detect and eliminate them in the simplest and fastest way possible, in addition to knowing some safety guidelines to avoid contagion with viruses, which will allow us to carry out our daily tasks without fear and with great safety.

How to Detect and Remove a Trojan Virus

Today, viruses are a true nightmare for any Internet user. Among them, the so-called Trojans are the most frequent. Its name comes from the mythological Trojan horse, which seemed to be a gift to Troy but hid within it a Greek army that attacked the city and dominated it.

In computing, Trojans refer to programs that appear to be useful software, but actually compromise security and can damage your computer. Trojans spread when users open a program that they believe has a legitimate origin but is not.

Some Signs That Our Computer Is Infected By A Trojan:

§  Let the computer restart itself

§  That the system works very slowly

§  That the operating system does not start

§  Some files have disappeared

§  Windows with advertisements or pornography being opened

Some Tips to Keep Viruses Away From Your Computer

§  Do not open the attachments that come with the email, unless you are absolutely sure that they are not infected. Even emails from people you know can contain viruses, so be vigilant.

§  Stay away from dubious content websites.

§  Be careful when you download things using P2P (Peer to Peer) file sharing programs. Always scan downloaded files before opening them.

§  Keeps Microsoft Windows updated through Windows Update.

§  Keep your antivirus updated and do periodic scans.

§  Install a Firewall (or Firewall in Spanish). The Firewall is a security device that works across networks, allowing or denying transmissions from one network to another.

§  Do not install any program unless you know who its manufacturer is. When in doubt, Google the name of the program.

§  Change Internet Explorer for another more secure browser such as Google Chrome or Mozilla Firefox

Comments

Popular posts from this blog

WHAT IS EMAIL BOMBARDMENT?

TESTING THE ANTIVIRUS THAT YOU USE

BOOT SECTOR VIRUS