home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page797.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  60KB  |  817x1045  |  8-bit (256 colors)
Labels: book | chat room | hakham | laptop | monitor
OCR: COMPUTER PROGRAMMING 729 Realistically, computer users have no control over software at the code level but there are few steps they can take to avoid security problems that stem from software defects: Select applications from software publishers with a poof security track record Watch for patches and apply them Consider using open source software which has been extensively reviewed by the programming community And yes, keep your firewall and antivirus software deploved and up to date Security experts anticipate that buffer overflow and scripting attacks may decline because social engineering exploits like phishing scams require much less technical expertise. Social engineering exploits pit attackers directly against consumers and the techniques for fending off such attacks are typically ou ...