Entradas

Mostrando entradas de octubre, 2018
Imagen
VOCABULARY...... Shutdown 1. Option that most electronic devices have to finish using it and so that it does not consume more energy. The action of turning off a device can be manual, automatic or forced due to lack of power. 2. (Turn Off Computer). Windows function that allows to choose different options related to the energy of a computer. 3.The "Turn off computer" function can be found on the Start button in the Windows Taskbar. Congestion  Network congestion is the phenomenon that occurs when the network, or part of it, is offered more traffic than it can handle. Crosover cable A crossover cable connects two devices of the same type, for example DTE-DTE or DCE DCE, usually asymmetrically related (DTE-DCE), by a modified cable called reticular Theat In operating systems, a thread (of the English thread), thread (of the English fiber), light process or subprocess is a sequence of tasks chained very small that can be execute...

TEAMWORK

Imagen
TEAMWORK Network security. The network is an important area of ​​exposure to risks.                In general, it defines the actual perimeter of security itself. As a result, attackers often target the network as a starting point for accessing other IT assets. Network security consists of defending the network and related resources a gainst threats. Network security employs physical and software countermeasures to protect the network infrastructure against unauthorized access, improper use, modification and destruction. Tips for end users. 1.For any email received that contains a strange email address or the content is an advertisement or seems peculiar, do not respond and delete it immediately and inform the team of the same. 2.Avoid watching and downloading music movies series of pages on the internet avoid clicking advertising ads 3.Do not connect any non-external equipment that is needed to work in the compa...

positive characteristic

Imagen
CRACKER One of the positive features is that if you are able to find faults in the network and traverse the network in a simple way you can get work in any information system in the world is that you are one of the best when it comes to vulnerabilities another feature is that You will be very wanted by organizations that seek to do more and terrorism groups so that you cope with them obiamente the money will not be lacking CYBER TERRORISM The cyber terrorist has a positive side since it can be used to manipulate the population that are people who have the power to move data such as bank accounts and use the people to mobilize traffic of influences On many occasions, governments ask for help from these terrorists because the people who make up these groups are the most intelligent and expert in the field of information and networks. These knowledge are not easily acquired and are only inherited. Hacker Has the ability to find vulnerabilities but not exploit ...

HACKING

Imagen
What do you think it is ? Piracy is a branch of the computer; not a few people are aware of its use, so it takes years of study and experience to be able to practice an attack and obtain satisfactory results. Most people who are hackers tend to categorize 3 types. White hat, gray and black hacking has many uses depending on the techniques of the person and what you need to obtain. The greater the skill, the more damage the hacker will do to the company that attacks in the world of hackers is not to be feared but if it is to respect because they are people who can seek good or most evil or acquire information that is of very important for its sale to enemy companies most of the hackers are hired by the deep network where they can contract services of damages to companies security tests and collection of information of great importance clearly this has an elevated cost Do you use any techno logical device why/why not? If I use them as all the people in the world...

Steps

Imagen
Installation of avast 1.Log on to Windows as a user with administrator permissions and make sure there are no other applications or antivirus software running on the PC. 2. Click the following button to download the Avast Free Antivirus installation file and save it to a known location on your PC (by default, all files are saved in the Downloads folder). 3. Right-click on the downloaded avast_free_antivirus_setup_offline.exe installation file and select Run as administrator from the context menu. 4. If you are prompted for permissions in the User Account Control dialog box, click Yes (or Continue in previous versions of Windows). 5. To change the default installation language, click on the current language in the upper right corner of the screen. Click Install to proceed with the default installation. 6. Wait while the wizard installs Avast Free Antivirus on your PC. 7. Click Continue on the screen under the message You are protected. 8. Review the ...