Translate

Saturday, October 31, 2015

Hmong: Ua zoo dev tom ntawm cov tag nrho-dhau-ntau computer teeb meem txhaum cai!

Cov feem ntau ntau daim ntawv ntawm tub sab tseem computer teeb meem txhaum cai, tshwj xeeb tshaj yog cov neeg uas tso cai rau hackers mus ntes tus kheej cov ntaub ntawv thiab siv ib tug neeg raug tsim txom credit cards fraudulently. Thiab tsis tau muaj ntau tus neeg tsis to taub lub qhov tob thiab kev txaus ntshai ntawm lub computer ua txhaum - es, lawv xav seb nws raws li ib tug 'lesser' kev ua txhaum thaum muab piv rau lub ntsej muag-rau-lub ntsej muag ua txhaum cai.

Obviously, tab sis yog, perpetrators ua tub sab nyob rau hauv daim card - thiab hais tias ua rau computer teeb meem txhaum cai lub zoo meej mus kom ze. Ntawm no yog cov peb feem ntau yog leejtwg tub sab tub nyiag computer teeb meem txhaum cai li cas thiab koj yuav ua li cas kom tsis txhob muaj lawv.

1. Phishing
Los ntawm tam sim no feem ntau cov neeg paub zoo tshaj kom xa nyiaj mus African princesses, tab sis muaj yog phav phav phishing emails tawm muaj, thiab ib co yog cov zoo nkauj insidious. Qhov zoo tshaj plaws hackers teeb raws li ib tug tsim lub tuam txhab, mus kom deb li deb li mus tsim ib tug plausible email chaw nyob thiab txheeb xyuas lub tuam txhab official kev sib txuas lus rau suab qhabnias. Feem ntau cov phishing emails muaj ib tug kev hem thawj yog li ntawd koj yuav ua sai sai, tsis muaj kev xav ntau heev. Yuav tsum ceev faj ntawm nyiaj txiag kev hem thawj los ntawm email. Yog hais tias koj muaj tej suspicions ntawm tag nrho cov, tam sim ntawd hu rau lub tsev thiab thov kom lawv paub meej tias cov ntaub ntawv. Obviously, koj yuav tsum tsis txhob ua li no los ntawm replying rau tus neeg phem ntawd email los yog siv ib yam xov tooj nws muab - saib lub tuam txhab hu info ncaj qha.

2. keystroke spyware
Spyware yog lwm tus uas cov neeg insidious computer teeb meem txhaum cai. Nws preys rau lub unsuspecting, attaching nws tus kheej rau tsim nyog websites, uas qhia nyob rau hauv random mus, los yog tshwm nyob rau hauv kev ua si thiab lwm cov kev pab koj tau. Keystroke spyware yog tshwj xeeb yog insidious. Lub hacker installs ib tug keystroke kev pab cuam nyob rau hauv koj lub computer - uas yog hais tias, ib tug pab cuam uas captures txhua lub koj ntaus thiab xa nws rov qab mus rau lub hacker rau kev tsom xam. Los yeej muaj, nws yog ib qho yooj yim kuj ceeb tias mus glean li koj passwords, credit card hauv xov tooj, thiab lwm yam uas koj ntaus rau hauv koj lub computer. Cov tsuas tiv thaiv tawm tsam spyware? Ib tug zoo tiv thaiv kab mob kev pab cuam uas tseem nyob ua si rau computer teeb meem txhaum cai. Nruab ib tug ntawm cov no thiab cia nws mus rau hnub tim. Txwv tsis pub, koj yeej tsis paub dab tsi koj yuav poob mus daus.

3. Hacker spyware
Hacker spyware yog tib yam li keystroke spyware, tab sis ua hauj lwm pab ib tug txawv muaj nuj nqi. Es tsis txhob capturing keystrokes, nws yuav qhib ib lub qhov rais mus rau hauv koj lub cev, uas tus hacker rau nkag mus rau koj lub computer thiab taug kev ua si los ntawm koj nyuaj tsav, sib sau ua ke tej ntaub ntawv uas koj yuav cia.

Obviously, koj yuav tsum ua cov computer teeb meem txhaum cai tib yam li tus qub: nruab ib tug zoo anti-virus tiv thaiv uas tseem nyob ua si rau spyware. Nws yog tseeb hais tias computer teeb meem txhaum cai nyob rau hauv lub sawv, tab sis koj tsis muaj yuav tsum tau paub pab - tsis yog hais tias koj ua raws li cov yooj yim lub tswv yim.

Raws li ib txwm, muaj kev nyob xeeb!

- Noog

***
Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)