	{"id":358,"date":"2013-06-18T22:48:48","date_gmt":"2013-06-18T15:48:48","guid":{"rendered":"http:\/\/science-technology.vn\/?p=358"},"modified":"2013-06-18T22:48:48","modified_gmt":"2013-06-18T15:48:48","slug":"loi-khuyen-ve-an-ninh-may-tinh","status":"publish","type":"post","link":"https:\/\/science-technology.vn\/?p=358","title":{"rendered":"L\u1eddi khuy\u00ean v\u1ec1 an ninh m\u00e1y t\u00ednh"},"content":{"rendered":"<p><span style=\"font-size: 14px;\">Ch\u00fang ta \u0111ang s\u1ed1ng trong &#8220;th\u1ebf gi\u1edbi \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i&#8221; n\u01a1i nhi\u1ec1u th\u1ee9 \u0111\u01b0\u1ee3c ti\u1ebfn h\u00e0nh qua Internet nh\u01b0ng ng\u01b0\u1eddi d\u00f9ng ph\u1ea3i c\u1ea9n th\u1eadn b\u1eb1ng vi\u1ec7c gi\u1eef th\u1eadn tr\u1ecdng tr\u01b0\u1edbc khi h\u1ecd l\u00ean tr\u1ef1c tuy\u1ebfn. C\u00f3 m\u1ecdi ki\u1ec3u ph\u1ea7n m\u1ec1m h\u1ea1i nh\u01b0 virus, s\u00e2u, ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p, botnets (t\u1eadp h\u1ee3p c\u00e1c robot ph\u1ea7n m\u1ec1m) c\u00f3 th\u1ec3 g\u00e2y h\u1ea1i cho b\u1ea1n theo c\u00e1ch b\u1ea1n th\u1eadm ch\u00ed kh\u00f4ng th\u1ec3 t\u01b0\u1edfng t\u01b0\u1ee3ng n\u1ed5i. M\u1ed9t s\u1ed1 m\u00e3 h\u1ea1i c\u00f3 th\u1ec3 d\u1ec5 d\u00e0ng \u0111\u01b0\u1ee3c lo\u1ea1i b\u1ecf d\u00f9ng ph\u1ea7n m\u1ec1m an ninh nh\u01b0ng m\u1ed9t s\u1ed1 l\u00e0 kh\u00f3 t\u1edbi m\u1ee9c c\u00f3 th\u1ec3 c\u1ea7n chuy\u00ean gia an ninh \u0111\u1ec3 lo\u1ea1i b\u1ecf ch\u00fang; \u0111\u1ebfn l\u00fac \u0111\u00f3 h\u01b0 h\u1ecfng c\u00f3 th\u1ec3 \u0111\u00e3 x\u1ea3y ra r\u1ed3i. Sau \u0111\u00e2y l\u00e0 m\u1ed9t s\u1ed1 \u0111i\u1ec1u c\u01a1 b\u1ea3n m\u00e0 b\u1ea1n c\u1ea7n bi\u1ebft v\u1ec1 an ninh m\u00e1y t\u00ednh:<\/span><a name=\"OLE_LINK1\"><\/a><\/p>\n<p>Virus l\u00e0 ch\u01b0\u01a1ng tr\u00ecnh g\u00e2y h\u1ea1i c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c truy\u1ec1n theo m\u1ed9t s\u1ed1 c\u00e1ch. M\u1eb7c d\u1ea7u ch\u00fang kh\u00e1c nhau theo nhi\u1ec1u c\u00e1ch, t\u1ea5t c\u1ea3 \u0111\u1ec1u \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 t\u1ef1 ch\u00fang lan truy\u1ec1n t\u1eeb m\u00e1y t\u00ednh n\u00e0y sang m\u00e1y t\u00ednh kh\u00e1c qua Internet v\u00e0 g\u00e2y ra h\u01b0 h\u1ecfng. Ph\u1ea7n l\u1edbn virus \u0111\u1ec1u \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 cho k\u1ebb t\u1ed9i ph\u1ea1m, ng\u01b0\u1eddi t\u1ea1o ra ch\u00fang, m\u1ed9t lo\u1ea1i truy nh\u1eadp n\u00e0o \u0111\u00f3 v\u00e0o nh\u1eefng m\u00e1y b\u1ecb nhi\u1ec5m \u0111\u00f3.<\/p>\n<p>Ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p l\u00e0 c\u00e1c ch\u01b0\u01a1ng tr\u00ecnh c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c t\u1ef1 ch\u00fang t\u1ea3i xu\u1ed1ng m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n m\u00e0 kh\u00f4ng c\u00f3 ph\u00e9p c\u1ee7a b\u1ea1n khi b\u1ea1n t\u1edbi th\u0103m m\u1ed9t website kh\u00f4ng an to\u00e0n hay qua t\u1ec7p \u0111\u00ednh k\u00e8m. Ch\u00fang c\u00f3 th\u1ec3 l\u00e0m cho m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n l\u00e0m nh\u1eefng \u0111i\u1ec1u b\u1ea1n kh\u00f4ng mu\u1ed1n n\u00f3 l\u00e0m. M\u1ed9t s\u1ed1 c\u00f3 th\u1ec3 l\u00e0 qu\u1ea3ng c\u00e1o m\u00e0 b\u1ea1n kh\u00f4ng quan t\u00e2m (trong tr\u01b0\u1eddng h\u1ee3p n\u00e0y n\u00f3 \u0111\u01b0\u1ee3c g\u1ecdi l\u00e0 ph\u1ea7n m\u1ec1m qu\u1ea3ng c\u00e1o). Trong c\u00e1c tr\u01b0\u1eddng h\u1ee3p kh\u00e1c, ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p n\u00e0o \u0111\u00f3 c\u00f3 th\u1ec3 theo d\u00f5i c\u00e1c di chuy\u1ec3n tr\u1ef1c tuy\u1ebfn c\u1ee7a b\u1ea1n, \u0111\u00e1nh c\u1eafp m\u1eadt kh\u1ea9u c\u1ee7a b\u1ea1n, l\u00e0m h\u1ea1i t\u00e0i kho\u1ea3n c\u1ee7a b\u1ea1n hay thu th\u1eadp m\u1ecdi th\u00f4ng tin c\u00f3 trong m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n v\u00e0 g\u1eedi cho t\u1ed9i ph\u1ea1m.<\/p>\n<p>Botnets l\u00e0 m\u1ea1ng c\u00e1c m\u00e1y t\u00ednh b\u1ecb l\u00e2y nhi\u1ec5m b\u1edfi ch\u01b0\u01a1ng tr\u00ecnh h\u1ea1i, b\u1ecb k\u1ebb t\u1ed9i ph\u1ea1m n\u1eafm quy\u1ec1n ki\u1ec3m so\u00e1t t\u1eeb xa v\u00e0 d\u00f9ng m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n \u0111\u1ec3 tung ra c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng v\u00e0o website hay m\u1ea1ng kh\u00e1c. N\u1ebfu m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n b\u1ecb nhi\u1ec5m botnets, n\u00f3 trao \u0111\u1ed5i v\u00e0 nh\u1eadn c\u00e1c ch\u1ec9 th\u1ecb t\u1eeb m\u00e1y t\u00ednh &#8220;ch\u1ec9 huy v\u00e0 ki\u1ec3m so\u00e1t&#8221; \u0111\u01b0\u1ee3c \u0111\u1eb7t \u0111\u00e2u \u0111\u00f3 tr\u00ean to\u00e0n c\u1ea7u \u0111\u1ec3 l\u00e0m nhi\u1ec1u \u0111i\u1ec1u t\u01b0\u01a1ng \u1ee9ng theo ch\u1ec9 d\u1eabn x\u00e1c \u0111\u1ecbnh. \u0110i\u1ec1u m\u00e1y t\u00ednh b\u1ea1n l\u00e0m ph\u1ee5 thu\u1ed9c v\u00e0o \u0111i\u1ec1u nh\u1eefng k\u1ebb t\u1ed9i ph\u1ea1m xi be \u0111ang c\u1ed1 g\u1eafng th\u1ef1c hi\u1ec7n. Nhi\u1ec1u botnets \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 thu th\u1eadp d\u1eef li\u1ec7u nh\u01b0 m\u1eadt kh\u1ea9u, s\u1ed1 t\u00e0i kho\u1ea3n ng\u00e2n h\u00e0ng, s\u1ed1 th\u1ebb t\u00edn d\u1ee5ng, \u0111\u1ecba ch\u1ec9, s\u1ed1 \u0111i\u1ec7n tho\u1ea1i, v\u00e0 th\u00f4ng tin c\u00e1 nh\u00e2n kh\u00e1c. D\u1eef li\u1ec7u n\u00e0y \u0111\u01b0\u1ee3c d\u00f9ng cho ch\u1ee7 \u0111\u1ecbnh nh\u01b0 \u0103n c\u1eafp c\u0103n c\u01b0\u1edbc, gi\u1ea3 m\u1ea1o th\u1ebb t\u00edn d\u1ee5ng, g\u00e2y spam (g\u1eedi th\u01b0 r\u00e1c), t\u1ea5n c\u00f4ng website, v\u00e0 ph\u00e2n ph\u1ed1i ph\u1ea7n m\u1ec1m h\u1ea1i. M\u1ed9t s\u1ed1 botnets \u0111\u01b0\u1ee3c thi\u1ebft k\u1ebf \u0111\u1ec3 d\u00f9ng m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n \u0111\u1ec3 truy nh\u1eadp v\u00e0o website nh\u1ea1y c\u1ea3m, t\u00e0i kho\u1ea3n nh\u01b0 ng\u00e2n h\u00e0ng, v\u0103n ph\u00f2ng ch\u00ednh ph\u1ee7, hay \u0111\u1ec3 tung ra c\u00e1c cu\u1ed9c t\u1ea5n c\u00f4ng xi be.<\/p>\n<p>\u0110\u1ec3 ng\u0103n c\u1ea3n nh\u1eefng \u0111i\u1ec1u n\u00e0y kh\u1ecfi x\u1ea3y ra cho b\u1ea1n, \u0111i\u1ec1u quan tr\u1ecdng l\u00e0 gi\u1eef t\u01b0\u1eddng l\u1eeda c\u1ee7a b\u1ea1n b\u1eadt m\u1ecdi l\u00fac. Ph\u1ea7n m\u1ec1m t\u01b0\u1eddng l\u1eeda cho m\u1ed9t m\u00e1y t\u00ednh th\u01b0\u1eddng t\u1edbi c\u00f9ng v\u1edbi h\u1ec7 \u0111i\u1ec1u h\u00e0nh hay n\u00f3 c\u00f3 th\u1ec3 \u0111\u01b0\u1ee3c mua r\u1eddi. Ph\u1ea3i ch\u1eafc r\u1eb1ng b\u1ea1n c\u0169ng c\u00e0i \u0111\u1eb7t ph\u1ea7n m\u1ec1m ch\u1ed1ng virus v\u00e0 c\u1eadp nh\u1eadt ch\u00fang tr\u00ean c\u01a1 s\u1edf th\u01b0\u1eddng xuy\u00ean \u0111\u1ec3 ng\u0103n ng\u1eeba ph\u1ea7n m\u1ec1m h\u1ea1i \u0111i v\u00e0o m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n. B\u1ea1n c\u1ea7n d\u00f9ng ph\u1ea7n m\u1ec1m ch\u1ed1ng virus t\u1ed1t t\u1eeb c\u00e1c c\u00f4ng ti n\u1ed5i ti\u1ebfng nh\u01b0 Microsoft, McAfee, hay Kaspersky. Nhi\u1ec1u ph\u1ea7n m\u1ec1m kh\u00f4ng bi\u1ebft hay \u0111\u01b0\u1ee3c cho kh\u00f4ng tr\u00ean Internet cho b\u1ea1n t\u1ea3i xu\u1ed1ng c\u00f3 th\u1ec3 kh\u00f4ng \u0111\u1ee7 t\u1ed1t v\u00ec m\u1ed9t s\u1ed1 trong ch\u00fang c\u00f3 th\u1ec3 l\u00e0 ph\u1ea7n m\u1ec1m gi\u1ea3 c\u00f3 ch\u1ee9a ph\u1ea7n m\u1ec1m gi\u00e1n \u0111i\u1ec7p hay m\u00e3 h\u1ea1i kh\u00e1c.<\/p>\n<p>B\u1ea1n c\u0169ng c\u1ea7n gi\u1eef cho h\u1ec7 \u0111i\u1ec1u h\u00e0nh c\u1ee7a b\u1ea1n \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt v\u00ec ch\u00fang th\u01b0\u1eddng \u0111\u01b0\u1ee3c c\u1eadp nh\u1eadt \u0111\u1ec3 s\u1eeda c\u00e1c l\u1ed7 h\u1ed5ng an ninh. Kh\u00f4ng m\u1edf email t\u1eeb ai \u0111\u00f3 m\u00e0 b\u1ea1n kh\u00f4ng bi\u1ebft. Nhi\u1ec1u \u0111\u01b0\u1eddng links trong email, tin nh\u1eafn tweeter, b\u00e0i \u0111\u0103ng, v\u00e0 qu\u1ea3ng c\u00e1o tr\u1ef1c tuy\u1ebfn th\u01b0\u1eddng l\u00e0 c\u00e1ch k\u1ebb t\u1ed9i ph\u1ea1m xi be d\u00f9ng \u0111\u1ec3 truy nh\u1eadp v\u00e0o m\u00e1y t\u00ednh c\u1ee7a b\u1ea1n. C\u00e1ch t\u1ed1t nh\u1ea5t l\u00e0 xo\u00e1 ch\u00fang \u0111i. B\u1ea1n ph\u1ea3i r\u1ea5t c\u1ea9n th\u1eadn khi t\u1ea3i xu\u1ed1ng c\u00e1c \u0111\u00ednh k\u00e8m email t\u1eeb ai \u0111\u00f3 b\u1ea1n bi\u1ebft, h\u1ecd c\u0169ng c\u00f3 th\u1ec3 l\u00e0 n\u1ea1n nh\u00e2n c\u1ee7a k\u1ebb t\u1ed9i ph\u1ea1m xi be nh\u1eefng ng\u01b0\u1eddi d\u00f9ng m\u00e1y t\u00ednh c\u1ee7a h\u1ecd \u0111\u1ec3 g\u1eedi m\u00e3 h\u1ea1i cho b\u1ea1n. Ph\u1ea3i ch\u1eafc t\u1eaft m\u00e1y t\u00ednh khi kh\u00f4ng d\u00f9ng. M\u1ed9t s\u1ed1 ng\u01b0\u1eddi th\u01b0\u1eddng \u0111\u1ec3 m\u00e1y t\u00ednh c\u1ee7a h\u1ecd ngay c\u1ea3 khi kh\u00f4ng d\u00f9ng v\u00e0 l\u00e0m cho m\u00e1y t\u00ednh c\u1ee7a h\u1ecd th\u00e0nh mong manh h\u01a1n cho b\u1ecb t\u1ea5n c\u00f4ng hay b\u1ecb k\u1ebb t\u1ed9i ph\u1ea1m xi be d\u00f9ng m\u00e1y t\u00ednh c\u1ee7a h\u1ecd \u0111\u1ec3 c\u00e0i botnets l\u00ean m\u00e1y ng\u01b0\u1eddi kh\u00e1c.<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;-English version&#8212;-<\/p>\n<p>&nbsp;<\/p>\n<p>Computer security advices<\/p>\n<p>We are living in a \u201cconnected world\u201d where many things are conducted via the Internet but users must be careful by taking some precautions before they go online. There are all types of malicious software such as virus, worm, spyware, botnets that can harm you in a way you do not even imagine. Some malicious codes can easily be removed using security softwares but some are more difficult that may need security experts to remove them; by that time damages may already happen. Following are some basic things that you need to know about computer security:<\/p>\n<p>Viruses are harmful programs that can be transmitted in a number of ways. Although they differ in many ways, all are designed to spread themselves from one computer to another through the Internet and cause damage. Most viruses are designed to give the criminals who create them some sort of access to those infected computers.<\/p>\n<p>Spyware are programs that can download themselves onto your computer without your permission when you visit an unsafe website or via an attachment. They can make your computer do things you do not want it to do. Some may be an advertisement that you do not care (In this case it is called adware). In other cases, some spyware can track your online movements, steal your passwords, compromise your accounts or collect all information in your computer and send to the criminals.<\/p>\n<p>Botnets are networks of computers infected by malicious programs that controlled remotely by criminals and use your computer to launch attacks on website or other networks. If your computer is infected with botnets, it communicates and receives instructions from \u201ccommand and control\u201d computers located anywhere around the globe to do a lot of things according to the specific instructions. What your computer does depends on what the cybercriminals are trying to accomplish. Many botnets are designed to collect data such as passwords, bank account numbers, credit card numbers, addresses, telephone numbers, and other personal information. The data is then used for purposes such as identity theft, credit card fraud, spamming (sending junk email), website attacks, and malware distribution. Some botnets are designed to use your computer to access into sensitive websites, accounts such as Banks, government offices, or to launch cyber attacks.<\/p>\n<p>To prevent these things from happening to you, it is important to keep your firewall on at all time. Software firewall for single computer usually comes with the operating system or it can be purchased separately. Make sure that you also install anti-virus software and update them on a frequent basis to prevent malicious software from enter your computer. You need to use good anti-virus software from well known companies such as Microsoft, McAfee, or Kaspersky. Many of the unknown or free software advertised on the Internet for you to download may not be good enough as some of them may be fake software that contain spyware or other malicious code.<\/p>\n<p>You also need to keep your operating system up to date as they are updated frequently to fix security holes. Do not open email from someone that you do not know. Many links in email, tweets, posts, and online advertising are often the way that cybercriminals use to access your computer. The best way is to delete them. You must be very careful when download email attachments forwarded from someone you know, they may be also victim of cybercriminals who use their computers to send malicious codes to you. Make sure you turn-off computer when not use. Some people often leave their computer on even when not in use and make their computer more susceptible for attack or cybercriminals to use their computers for install botnets to others.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ch\u00fang ta \u0111ang s\u1ed1ng trong &#8220;th\u1ebf gi\u1edbi \u0111\u01b0\u1ee3c k\u1ebft n\u1ed1i&#8221; n\u01a1i nhi\u1ec1u th\u1ee9 \u0111\u01b0\u1ee3c ti\u1ebfn h\u00e0nh qua Internet nh\u01b0ng ng\u01b0\u1eddi d\u00f9ng ph\u1ea3i c\u1ea9n th\u1eadn b\u1eb1ng &hellip; <\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-358","post","type-post","status-publish","format-standard","hentry","category-cong-nghe-thong-tin"],"_links":{"self":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=358"}],"version-history":[{"count":2,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/358\/revisions"}],"predecessor-version":[{"id":360,"href":"https:\/\/science-technology.vn\/index.php?rest_route=\/wp\/v2\/posts\/358\/revisions\/360"}],"wp:attachment":[{"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=358"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=358"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/science-technology.vn\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}