home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page791.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  105KB  |  817x1045  |  8-bit (256 colors)
Labels: book | chat room | hakham | monitor | plant
OCR: COMPUTER PROGRAMMING 723 SECTION Secure Programming HACKERS CRACKERS CYBERCRIMINALS or black hats -no matter what you call them, their is to gain unauthorized access to information. The first line of defense in cyber security the pro- grammers who create applications, operating systems, and utilities that you use every day. Section E looks at program-level security vulnerabilities and what programmers can op to shore up security defenses BLACK HAT EXPLOITS What makes my computer vulnerable to attack? Viruses, worms, bots malicious Web scripts, and other exploits plague computer users Many of these black-hat exploits creep into computer systems through security holes. Computer users have vague notion that such holes exist and that antivirus software and firewalls are necessary to plug those ...