![]() |
|||
![]()
|
![]() |
![]() Click Here! |
![]() |
Passwords Most modern multiuser systems have a facility for passwords. Passwords are used to provide the computer system with some certainty that the user is who he or she claims to be. Passwords should not be written down or shared. This is a matter of policy. There are many hacking tools used by data bandits that will attempt to break into a computer by guessing passwords. The following are some easy rules that make it difficult for these programs to succeed:
Viruses Viruses are small pieces of computer code (programs) that are hidden in computer programs, on floppy disks, or wherever the computer vandal can sneak them. Like the hackers themselves, some are malicious and will devastate as much as possible and some will only irritate (e.g., play Happy Birthday) on the hackers birthday. Personal computers like MS-DOS-based machines and Macintoshes are more susceptible to viral attacks because of the unprotected nature of the operating system. Protected operating systems like UNIX and Windows NT are better equipped. Like the other security problems, there are a range of solutions, including the following:
EXTERNAL SECURITY Internet Firewalling It has been established that the most secure way to connect to the Internet is to have a minimal machine act as a gateway or firewall between a production network and the outside world. Internet firewalls can be designed with varying levels of security and difficulty. A simple firewall can be implemented without expensive equipment or noticeable interruption. It is important to plan a firewall before connecting to the Internet. Users may get accustomed to certain functional ability, which administrators may be forced to remove after the installation of the firewall.
|
![]() |
|
Use of this site is subject certain Terms & Conditions. Copyright (c) 1996-1999 EarthWeb, Inc.. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of EarthWeb is prohibited. Please read our privacy policy for details. |