

YOUTUBE BAHASA OTOMATA SOFTWARE
Like virus checkers, spyware detection software is used for protection on an individual computer, or host.įirewalls are used to control the flow of traffic in a network, or to/from a particular host. Many of the indications reported by spyware detection software may not really be a problem and the user needs to have a pretty good idea of what is "normal" for the particular computer system in order to determine whether a particular report requires corrective action. Spyware Detection Software is used to scan files and configuration settings on a computer system to look for situations that may indicate the presence of spyware. Virus checkers are used to protect against malicious software on an individual computer, or host. Once a file or process has been identified as containing a known signature, the virus checker software can attempt to remove the file or to move it to an identified location (quarantine) so that the user or system administrator can take further action, if necessary.

Virus Checkers are software (programs) used to scan files and processes on a computer for signatures, or patterns, associated with known malware such as viruses, trojan horses, or worms.

Encryption can be used to protect the privacy of data that is stored on a particular computer, or data that is being transferred through a communication channel - but cannot be used to prevent or detect attacks against networks or computers. Encryption can also be used to protect the files stored on an individual computer. Virtual Private Networks (VPNs) use encryption to provide privacy for communication tunnels created through a public network, such as the Internet. PGP encryption is an example of encryption used to provide privacy for email communication. When a file is encrypted, it becomes unreadable to those who do not have the key for decrypting it. Some of the different technologies used to secure networks and computer systems, and their functions, include:Įncryption is used to ensure the privacy of data and communications. There is no one technology that will completely secure any network or computer system. Securing networks and computer systems is a complex problem. Overview of Securing Networks and Systems
