	{"id":293,"date":"2013-06-18T09:27:13","date_gmt":"2013-06-18T02:27:13","guid":{"rendered":"http:\/\/science-technology.vn\/?p=293"},"modified":"2013-06-18T09:27:13","modified_gmt":"2013-06-18T02:27:13","slug":"phan-mem-an-ninh","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=293","title":{"rendered":"Ph\u1ea7n m\u1ec1m an ninh"},"content":{"rendered":"<p><span style=\"font-size: 14px;\">Ph\u1ea7n m\u1ec1m an ninh l\u00e0 c\u1ed1t y\u1ebfu cho m\u1ecdi ng\u01b0\u1eddi d\u00f9ng m\u00e1y t\u00ednh d\u00f9 \u0111\u00f3 l\u00e0 m\u00e1y t\u00ednh nh\u00e0 c\u1ee7a b\u1ea1n hay m\u00e1y t\u00ednh t\u1ea1i n\u01a1i l\u00e0m vi\u1ec7c. Hi\u1ec7n th\u1eddi, c\u00f3 nhi\u1ec1u cu\u1ed9c t\u1ea5n c\u00f4ng cyber h\u01a1n tr\u01b0\u1edbc kia cho n\u00ean \u0111i\u1ec1u quan tr\u1ecdng l\u00e0 b\u1ea3o v\u1ec7 laptop, m\u00e1y t\u00ednh b\u1ea3ng hay \u0111i\u1ec7n tho\u1ea1i th\u00f4ng minh b\u1eb1ng ph\u1ea7n m\u1ec1m an ninh t\u1ed1t nh\u1ea5t c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c. C\u00f3 nhi\u1ec1u ph\u1ea7n m\u1ec1m an ninh t\u1ed1t tr\u00ean th\u1ecb tr\u01b0\u1eddng, m\u1ed9t s\u1ed1 l\u00e0 t\u1ef1 do v\u00ec b\u1ea1n c\u00f3 th\u1ec3 t\u1ea3i xu\u1ed1ng t\u1eeb internet nh\u01b0ng t\u00f4i mu\u1ed1n th\u1eadn tr\u1ecdng \u1edf \u0111\u00e2y. \u0110i\u1ec1u tuy\u1ec7t \u0111\u1ed1i quan tr\u1ecdng l\u00e0 b\u1ea1n bi\u1ebft v\u1ec1 c\u00f4ng ti \u0111\u1ee9ng \u0111\u1eb1ng sau ph\u1ea7n m\u1ec1m an ninh n\u00e0y v\u00ec ch\u1ea5t l\u01b0\u1ee3ng v\u00e0 danh ti\u1ebfng l\u00e0 c\u1ed1t y\u1ebfu. Nhi\u1ec1u ph\u1ea7n m\u1ec1m t\u1ef1 do &#8220;v\u00f4 danh&#8221; c\u00f3 th\u1ec3 l\u00e0 c\u00f4ng c\u1ee5 m\u00e0 hacker d\u00f9ng \u0111\u1ec3 c\u00e1m d\u1ed7 b\u1ea1n c\u00e0i \u0111\u1eb7t virus hay s\u00e2u c\u1ee7a h\u1ecd v\u00e0o m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n hay c\u00f4ng ti b\u1ea1n. Nhi\u1ec1u \u1ee9ng d\u1ee5ng &#8220;t\u1ef1 do&#8221; l\u00e0m vi\u1ec7c &#8220;m\u1edf c\u1eeda h\u1eadu&#8221; n\u01a1i hacker c\u00f3 th\u1ec3 d\u00f9ng ch\u00fang \u0111\u1ec3 truy nh\u1eadp v\u00e0o m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n khi h\u1ecd mu\u1ed1n. Khi l\u1ea7n \u0111\u1ea7u ti\u00ean b\u1ea1n d\u00f9ng ch\u00fang, ch\u00fang l\u00e0 &#8220;s\u1ea1ch&#8221; nh\u01b0ng v\u1ec1 sau, hacker c\u00f3 th\u1ec3 l\u1ea5y \u0111\u01b0\u1ee3c truy nh\u1eadp \u0111\u1ec3 c\u00e0i virus, s\u00e2u hay m\u00e3 h\u1ea1i, cho n\u00ean b\u1ea1n ph\u1ea3i c\u1ea9n th\u1eadn.<\/span><\/p>\n<p>Sinh vi\u00ean th\u01b0\u1eddng h\u1ecfi t\u00f4i li\u1ec7u h\u1ecd c\u00f3 n\u00ean mua \u1ee9ng d\u1ee5ng ph\u1ea7n m\u1ec1m an ninh hay d\u00f9ng \u1ee9ng d\u1ee5ng t\u1ef1 do nh\u01b0 Essential c\u1ee7a Microsoft. V\u1ea5n \u0111\u1ec1 kh\u00f4ng ph\u1ea3i l\u00e0 m\u1ecdi ph\u1ea7n m\u1ec1m an ninh l\u00e0 nh\u01b0 nhau. M\u1ed9t s\u1ed1 r\u1ea5t t\u1ed1t v\u00e0 m\u1ed9t s\u1ed1 th\u00ec kh\u00f4ng. M\u1ed9t s\u1ed1 th\u01b0\u1eddng xuy\u00ean \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt v\u1edbi vi\u1ec7c ph\u00f2ng ch\u1ed1ng virus m\u1edbi nh\u1ea5t v\u00e0 m\u1ed9t s\u1ed1 th\u00ec kh\u00f4ng v\u1eady cho n\u00ean \u0111\u00f3 l\u00e0 ch\u1ecdn l\u1ef1a c\u1ee7a b\u1ea1n v\u1ec1 ph\u1ea7n m\u1ec1m t\u1ed1t nh\u1ea5t cho m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n. \u0110i\u1ec1u b\u1ea1n c\u1ea7n l\u00e0 danh ti\u1ebfng c\u1ee7a c\u00f4ng ti n\u01a1i c\u00f3 th\u1ec3 h\u1ed7 tr\u1ee3 cho s\u1ea3n ph\u1ea9m c\u1ee7a h\u1ecd trong th\u1eddi gian d\u00e0i. B\u1ea1n ph\u1ea3i l\u1ef1a ch\u1ecdn c\u00f4ng ti c\u00f3 c\u00f4ng ngh\u1ec7 t\u1ed1t nh\u1ea5t v\u00e0 t\u00e0i nguy\u00ean \u0111\u1ec3 li\u00ean t\u1ee5c c\u1eadp nh\u1eadt ph\u1ea7n m\u1ec1m theo nh\u1eefng \u0111e do\u1ea1 m\u1edbi. Ng\u00e0y nay an ninh t\u00ednh to\u00e1n kh\u00f4ng c\u00f2n l\u00e0 v\u1ec1 chi\u1ebfm quy\u1ec1n truy nh\u1eadp v\u00e0o m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n m\u00e0 ch\u00fang c\u00f3 th\u1ec3 d\u00f9ng m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n \u0111\u1ec3 tung ra cu\u1ed9c t\u1ea5n c\u00f4ng v\u00e0o ch\u00ednh ph\u1ee7, c\u00f4ng ti, c\u00f4ng nghi\u1ec7p v.v.<\/p>\n<p>V\u1ec1 c\u0103n b\u1ea3n b\u1ea1n c\u00f3 \u0111\u01b0\u1ee3c c\u00e1i b\u1ea1n s\u1eb5n l\u00f2ng tr\u1ea3 ti\u1ec1n cho. Th\u1ec9nh tho\u1ea3ng, nhu c\u1ea7u an ninh l\u00e0 \u0111\u1ee7 quan tr\u1ecdng \u0111\u1ec3 bi\u1ec7n h\u1ed9 cho chi ph\u00ed. Ph\u1ea3i r\u1ea5t c\u1ea9n th\u1eadn khi b\u1ea1n chia s\u1ebb ph\u1ea7n m\u1ec1m v\u00e0 c\u00f4ng c\u1ee5 v\u1edbi ng\u01b0\u1eddi kh\u00e1c, m\u1ed9t s\u1ed1 c\u00f3 th\u1ec3 l\u00e0 kh\u00f4ng an ninh nh\u01b0 b\u1ea1n t\u01b0\u1edfng.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;-English version&#8212;-<\/p>\n<p>&nbsp;<\/p>\n<p>Security Software<\/p>\n<p>Security software is critical to all computer users whether it is your own home computer or your computer at work. Currently, there are more sophisticated cyber attacks than ever before so it is important to protect your laptops, tablets, or smartphones with the best security software possible. There are many good security software in the market, some are free as you can download from the internet but I would be caution here. It is absolute important that you know about the company behind these security software as the quality and reputation are critical. Many \u201cunknown\u201d free download software could be tools where hackers used to lure you in installing their virus or worms on your computer to infect your friends or your company. Many \u201cfree\u201d applications and tools do have \u201cbackdoors\u201d where hackers can use them to access to your computer when they want. When you first use them, they are \u201cClean\u201d but later, hackers can get access to install virus, worms or malicious code, so you have to be careful.<\/p>\n<p>Students often ask me whether they should buy security software application or using the free application such as Microsoft\u2019s Essential. The issue is not all security software are the same. Some are very good and some are not. Some are constantly updated with the latest virus prevention and some are not so it is your choice to select the best for your computer. What you need is the reputation of the company who can support their products for a long time. You must select company that has the best technology and resources to continue to update their software against new threats. Today computing security is no longer about hackers to gain access into your computer but they can use your computer to launch an attack on governments, companies, industries etc.<\/p>\n<p>Basically you get what you are willing to pay for. Sometime, the security need is important enough to warrant the cost. Be very careful when you share software and tools with others, some may not be as secured as you think.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ph\u1ea7n m\u1ec1m an ninh l\u00e0 c\u1ed1t y\u1ebfu cho m\u1ecdi ng\u01b0\u1eddi d\u00f9ng m\u00e1y t\u00ednh d\u00f9 \u0111\u00f3 l\u00e0 m\u00e1y t\u00ednh nh\u00e0 c\u1ee7a b\u1ea1n hay m\u00e1y t\u00ednh t\u1ea1i &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-293","post","type-post","status-publish","format-standard","hentry","category-cong-nghe-thong-tin"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/293","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=293"}],"version-history":[{"count":2,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/293\/revisions"}],"predecessor-version":[{"id":295,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/293\/revisions\/295"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=293"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=293"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=293"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}