The security of internet transactions has always been an important issue for the users. As during the short history of the internet, millions of internet malwares, spywares, viruses and worm are created and used to illegally abuse the internet users’ confidential information through the internet.
To provide security we have to first know how and why these systems work and how we can stop their access to our system.
There are several types of these programs introduces by now,
1. Viruses: the main purpose of most of viruses is to copy as much as they can, and distribute rapidly, and try to harm the system, some of them also do other different things too.
2. Trojans: These programs are used to enter the system without permission and send out the confidential information from inside the systems; they also can be used to remotely control the system.
3. Worms: try to get the bandwidth as much as they can, they don’t usually harm systems but they try to harm a network by sending copies to the network nodes and getting the bandwidth.
4. Spywares: The spywares trace the users’ internet usage and secretly send them to their owner, so that they can use this data for their benefit.
Many other types are also available but how can we see what is happening inside the pc and what information is sent to where from which process?
There are many answers for question such as using firewalls and virus scanners, which I am going to name some of them here:
Virus scanners: There are many virus scanners but some of them are more popular for their better performance, price or their being open source. McAfee, Symantec , Panda, AVG, NOD32 and Kaspersky , are mostly known as popular virus scanners but if you like to access to an open source virus scanner ClamWin, OpenAntiVirus and Untangle Gateway Platform Virus Blocker the choices. Also if you are interested in free virus scanners Avast ! Home Edition, Comodo and AOL Active Virus Shield are free.
Firewalls: The main role of the firewalls is to control the source and destination locations and the software using the Internet, and to block the unwanted connections, so that the user will be safe against the spywares and also would not be accessed by the attackers and the IP scanners. There are many famous firewalls, but ZoneAlarm, Symantec, McAfee and FSecure are most commonly used firewalls for personal computers.
Network monitoring : there are many programs designed to monitor the internet connection and the data exchanged between the local and remote IP. The Microsoft Network Monitor is one of the programs that is very easy to use and can practically help you find out what is happening between your pc and the remote host.