Nowadays the Internet is famous for great pace of development. He has penetrated into all spheres of life: education, work, business, and so on. For some people the Internet has become the work, which earn. There are many online scams that by any means trying to take away your money and precious time. I will teach you how to protect your computer from hackers who are hackers? Hacker (from the English.

Hack – hack) – highly skilled IT professional, a man who understands the very basics of computer systems. This word is also often used to refer to a computer hacker. But not all hackers can be called 'friendly'. Many hackers write malicious programs to infect your computer. Recently from an acquaintance, I heard that he drove the virus. After restarting the computer in his window pops up: "To remove the banner, send SMS to XXXXX 'sending sms, with you will remove a lot of money.

If you climbed into your computer like viruses (sending SMS), then use the service to disable Kaspersky extortionists-blockers. Click on the link and proceed as instructed. Types of hacker attacks 1. Worms A worm is a virus that spreads via the Internet, affecting the entire system rather than separate programs. This is the most dangerous type of virus, as targets of attack in this case are information systems national scale. With the advent of global Internet this kind of security breach poses the greatest threat, since it at any time may be subject to any of the 40 million computers connected to that network. 2. Trojan viruses, Trojan horse – a program that contains a certain destructive function that is activated upon the occurrence of certain conditions of operation. Typically, such programs are disguised as some useful utilities. Trojan horses are programs that implement addition to the features described in the documentation and other functions related to security breaches, and destructive actions. Marked If you create such programs in order to facilitate the spread of viruses. Lists of such programs are widely published in the foreign press. Usually they are disguised as games or entertainment programs and harm under the beautiful pictures or music. Software tab also contains a function that afflicts the Sun, but this function is, by contrast, tries to be as unobtrusively as possible, because The longer the program will not arouse suspicion, the Bookmark longer able to work. 3. Computer viruses Virus – a program that has the ability to reproduce. Malicious programs and their classification. Description of the major viruses. Chronology of their occurrence. Description of the most popular antivirus programs. Comparison of antivirus software. How to protect yourself from hackers 1. Do not trust spam! Most viruses spread via email, icq, chat, etc. 2. Download from verified sites. Since most sites, themed 'Breaking' free from viruses. 3. Update software. Hackers often use your hole in the browser .. 4. You must have a reliable anti-virus Antivirus Lists: Kaspersky, Avast, Nod32 Frequently updated anti-virus software and do a full system scan. 5. Do not visit questionable sites.

Globalisation Black

By the mountain ranges nor the seas. Rain quality of the two coasts. Ports abiertos to the hopes. II WELL. There where they destroy stones of the house of my parents. There where they destroy bitts of our birds the small ones and the real birds.

There where now they open the bottles of the black smoke. There where the black smoke now dyes of black color indigo the garden. There just this the dry well and laughed there dry. Where the white dust of the path covers the eyes to us. Dry leaves of trees droughts already are. There there the paradise of my childhood.

Now it is hell of black gold. Where the seas cruzados crujen pain in the heat of. There there now only a single station the summer of Globalisation the contamination and the extermination. Dry networks and thorns of fish that lie in the already dead sea. The sands grow and the water is run out. Or the torrential water floods to us with or without reason. Our homes. Who mistress now the two coasts mirrors of the ephemeral death Where the air strikes like crazy person next to a great ball fire air skittle. They devastate the crystal runners mirrors of the evil that we suffer. Melted crystals of the poles and the ice. Everything runs without brake with I release the brakes. We go towards the black night. We are draining septic tanks. We go towards the wind that will cross the blindness, The empty pupils watching the died fruits of the mother earth already died. III IT HAPPENED. We do not wake up behind schedule. We do not wait for tearful lloros. Of I milk ardent of the breathlessness. And the death of our Mother Earth And I while I cry asolas. And I buccaneer of the Dead Sea. And I rider by a white path. And I while I only cry and I cry Poetry of the revolution surrealistic neon.