article for geek wannabe news
I need some assistance with these assignment. article for geek wannabe news Thank you in advance for the help! A firewall is a protective shield or wall that prevents attacks from happening on a computer or computer network. it may recognize millions of data stream it receives and automatically blocks any access to the personal computer. This is done to prevent spyware, viruses and hackers. . This restricts access to some internet sites which may install viruses on the computer. The firewall only restricts sites that do not contain any information of much importance to the person.
. . . . . . . . . . . It helps prevent the crushing of the person or organization computers after the virus’s entry created by the information criminals who intend to destroy the computer system in the network. The antivirus protects the computer by combining it with the detected virus in the network.
. . . . . . . . . . . The computer is protected in that before it switches off, it warns the user before it goes off. The disk activity light the moment the computer is switched on, these services as a security on the computer’s working.
. . . . . . . . . . . Modern technology has enabled tracking the crime suspects. these may be done in a common message control center where the messages and emails are screened and any mail containing any message of criminal attempts is thoroughly dealt with. These activity helps to control any crime occurrence. The criminals are then caught and confined in a court of law.
. . . . . . . . . . . Crime is any act that violates certain set law. computer crimes are crimes that do not mostly violate any formal rules but are against the traditional ethics or are against set rules like the Electronic Communication Privacy Act (ECPA).Criminals use the advantage of computer technology and involve in activities like pornography, theft of services, unauthorized access to other peoples sites, viruses, computer fraud, extortion, denial of services, forgery of documents, property theft like computer hardware and chips, sabotage (data manipulation or even destruction), embezzlement, espionage and terrorism. This activity helps the criminals to survive in their areas of operation.