Oracle Consulting Oracle Training Oracle Support Development
Home
Catalog
Oracle Books
SQL Server Books
IT Books
Job Interview Books
eBooks
Rampant Horse Books
911 Series
Pedagogue Books

Oracle Software
image
Write for Rampant
Publish with Rampant
Rampant News
Rampant Authors
Rampant Staff
 Phone
 800-766-1884
Oracle News
Oracle Forum
Oracle Tips
Articles by our Authors
Press Releases
SQL Server Books
image
image

Oracle 11g Books

Oracle tuning

Oracle training

Oracle support

Remote Oracle

STATSPACK Viewer

Privacy Policy

 

   
 

ss

Oracle Tips by Burleson 

Web Stalkers
Chapter 12 - Virus Attacks

Conclusion

Unfortunately, the problems associated with virus attacks are an ongoing challenge.  Computers must be secured today, but they will also need to be secured again tomorrow.  In fact, they will need to be secured every day if the goal is to stay in front the evolving threat.

The growing presence of viruses and increasing hacker activity make it unlikely that any computer will ever completely escape an attempted attack by a virus or hacker.  However, thanks to the variety of protective measures available today, many computer users will never even know the attempt was made.  The defensive actions taken by the vigilant user will repel attacks and the virus will move on seeking a softer target.

Computer users who fail to keep their systems in a solid defensive posture, however, will inevitably find themselves dealing with the inconveniences associated with a successful virus strike.

In this chapter, the threats posed by computer viruses and other destructive programs were detailed.  The keys to successfully protecting your system were covered.  The key steps include:

  • Install a trusted antivirus program from a reputable vendor.
     

  • Ensure regular updates of antivirus software to protect against constantly evolving viruses.
     

  • Make sure operating system and browsers are up to date, with the latest revisions and patches installed.
     

  • Use common sense.  Be aware of the danger.
     

  • Know what is normal for each computer and be sensitive to changes in its operation.

While viruses, worms and hackers are a threat, unfortunately they are not the only threat.  In the next chapter, the world of spam will be explored and tips on understanding how it is used to intrude on safety and privacy are included.


The above text is an excerpt from:

Web Stalkers
Protect yourself from Internet Criminals & Psychopaths
ISBN 0-97-45993-9-5

by Donald K. Burleson, Stephen Andert
 

http://www.rampant-books.com/book_2004_2_stalkers.htm


Download your Oracle scripts now:

www.oracle-script.com

The definitive Oracle Script collection for every Oracle professional DBA

Linux Oracle commands syntax poster

ION Oracle tuning software

Oracle data dictionary reference poster



Oracle Forum

BC Oracle consulting support training

BC remote Oracle DBA   

 

   

 Copyright © 1996 -2016 by Burleson. All rights reserved.


Oracle® is the registered trademark of Oracle Corporation. SQL Server® is the registered trademark of Microsoft Corporation. 
Many of the designations used by computer vendors to distinguish their products are claimed as Trademarks