Nowadays the Internet is famous for great pace of development. He has penetrated into all spheres of life: education, work, business, and so on. For some people the Internet has become the work, which earn. There are many online scams that by any means trying to take away your money and precious time. I will teach you how to protect your computer from hackers who are hackers? Hacker (from the English.

Hack – hack) – highly skilled IT professional, a man who understands the very basics of computer systems. This word is also often used to refer to a computer hacker. But not all hackers can be called 'friendly'. Many hackers write malicious programs to infect your computer. Recently from an acquaintance, I heard that he drove the virus. After restarting the computer in his window pops up: "To remove the banner, send SMS to XXXXX 'sending sms, with you will remove a lot of money.

If you climbed into your computer like viruses (sending SMS), then use the service to disable Kaspersky extortionists-blockers. Click on the link and proceed as instructed. Types of hacker attacks 1. Worms A worm is a virus that spreads via the Internet, affecting the entire system rather than separate programs. This is the most dangerous type of virus, as targets of attack in this case are information systems national scale. With the advent of global Internet this kind of security breach poses the greatest threat, since it at any time may be subject to any of the 40 million computers connected to that network. 2. Trojan viruses, Trojan horse – a program that contains a certain destructive function that is activated upon the occurrence of certain conditions of operation. Typically, such programs are disguised as some useful utilities. Trojan horses are programs that implement addition to the features described in the documentation and other functions related to security breaches, and destructive actions. Marked If you create such programs in order to facilitate the spread of viruses. Lists of such programs are widely published in the foreign press. Usually they are disguised as games or entertainment programs and harm under the beautiful pictures or music. Software tab also contains a function that afflicts the Sun, but this function is, by contrast, tries to be as unobtrusively as possible, because The longer the program will not arouse suspicion, the Bookmark longer able to work. 3. Computer viruses Virus – a program that has the ability to reproduce. Malicious programs and their classification. Description of the major viruses. Chronology of their occurrence. Description of the most popular antivirus programs. Comparison of antivirus software. How to protect yourself from hackers 1. Do not trust spam! Most viruses spread via email, icq, chat, etc. 2. Download from verified sites. Since most sites, themed 'Breaking' free from viruses. 3. Update software. Hackers often use your hole in the browser .. 4. You must have a reliable anti-virus Antivirus Lists: Kaspersky, Avast, Nod32 Frequently updated anti-virus software and do a full system scan. 5. Do not visit questionable sites.