The anti-drilling system.I know he knows we are the words that are still used when there is a war or battle. To prevent attacks, in various formats, it is necessary to know the enemy, whether they are one and the purpose or motivation to do anything like it. So the first thing to know is to know the nature of the enemy, or who might attack destroyed the system administrator when you know your enemy, you will be able to determine the protective measures have been.The younger tries to attack a computer system or data that can be arranged into multiple categories depending on the incentives that made it. Each type of attack, the younger uses a variety of instruments ranging from basic tool is a complex tool and has the power to destroy. Best we can divide the types of system attacks are as follows: The attacker's dexterityHackers (Hacker) medium-high.Cat cracker (Cracker) medium-high.Soklip kiddy (Script-kiddy) low.Spy (Spy) high.Employee (Employee) ofTerrorists (Terrorist), fish, birds, lang – high.3.1 hackers (Hacker)The term hackers (Hacker) it means 2 the most when talking about a hacker would trigger (c) understand that represent people attempting to hacked without permission, or may be called another name, one that an attacker in another one, which is the original meaning of the term "hackers who represent people who use knowledge about computers, but do not have. The aim is to destroy or, in negative, so in this second meaning would be those who use knowledge. In addition, such as an exploration of the network to find a strange forgery, etc. However, ayang
การแปล กรุณารอสักครู่..
