Safe Site Access & Programming Fundamentals
Recommendations for Accessing Secure Sites
Maintaining Updated Software
Keep your operating system and browser updated. Install and update antivirus, firewall, and antispam software.
Using Strong Passwords
Avoid simple usernames and passwords. Utilize strong passwords and enable browser security options. Disable browser autocompletion of usernames and passwords on forms.
Secure Log Out
Always log out completely, rather than just closing the window.
Check for HTTPS
Verify that the website uses the secure HTTPS protocol. A web server’s HTTPS certificate ensures that you’re submitting data to the correct server.
Requirements for Secure Network Access
- Ensure that security information is sent to the correct server and that the SSL protocol is secure.
- This system uses random 128-bit keys in each session to prevent unauthorized third parties from intercepting messages.
- Check transferred data to ensure its integrity and prevent alteration.
Malicious Software
Malicious software includes any program, document, or message that can harm your computer, leading to data loss, reduced performance, or illegal use.
Types of Malicious Software
- Viruses: Programs that enter computers through CDs, the internet, email, or SMS. They reproduce by infecting other files, causing harmful or annoying actions.
- Backdoors: Programs that allow control of your computer from within, potentially deleting hard drive contents or stealing confidential information.
- Trojans: Programs installed without your knowledge, often alongside other programs, enabling data capture and attacks.
- Keyloggers: Capture keystrokes.
- Worms: Similar to viruses, they spread through email and congested networks.
- Spyware: Programs that collect data on user preferences, tastes, and habits.
- Adware: Programs that display advertisements for various products.
- Dialers: Programs that use your phone line to make calls to premium-rate numbers, increasing your phone bill.
- Phishing: Messages that attempt to trick you into providing private passwords for online services, email, or websites, often by impersonating legitimate companies.
- Spam: Unsolicited bulk email.
Damage from Malicious Software
- Identity theft
- Loss of privacy
- Password theft for online banking, leading to financial loss
- System slowdown
Recommendations to Avoid Risks
- Keep your operating system and software updated.
- Stay informed about malicious software news.
- Use common sense.
Common Social Engineering Techniques (Deception)
- Fake online stores: Websites offering products that, once paid for, never arrive. Verify the legitimacy of businesses and their legal information.
- Fake lotteries: Notifications of false prizes, requesting bank account details or upfront payments to claim winnings.
- Pharming: Manipulating DNS connections to redirect users to fake websites that resemble legitimate ones.
- Phishing: Stealing information by impersonating valid businesses, often banks, using seemingly correct web addresses.
- Scams: Recruiting individuals through various media (email, chat) for well-paid work-from-home opportunities that involve money laundering.
- Fake websites: Websites designed to collect personal information.
Programming Languages
Programming languages are sets of symbols and rules used to create programs.
Basic Elements of Programming Languages
- Lexicon: The set of symbols and keywords specific to each language.
- Syntax: Rules for constructing meaningful sentences using the language’s vocabulary.
- Semantics: The meaning of sentences created using the vocabulary and syntax.
By organizing commands and data using a programming language, we can perform operations and make decisions based on values or conditions.
Classification of Programming Languages
Programming languages can be classified by their proximity to natural language, programming paradigm, or other characteristics.
Structured Programming
: It involves the modularization of the problem, this is split in others more so k pekeños improved the error handling and efficiency of the problem when jobs are within reicteran basic el.Las caracterustucas are 3.1.Secuencia : The processes are triggered in an orderly and programs we write descendente.Generalmente composing one or more structures in each line executes each statement after the previous one and so a line after otra.3.2.Seleccion: The instructions are executed on a series of k conditions direct the course of the program x one way or another causing some instructions are skipped k ok the program visit some modules or routines to analyze a task concreta.3.3.Repeticion: Through specific structures a series of instructions are repeated till k conditions given below.
4-Copil interpretes: After writing that program there are 2 ways to execute it, interpreting or copilandolo.4.1.Interpretes: These are applications to language traduec k makina k as k are we leidas.la interazturar advantage is the altered code and seeing the Moreover inmediato.Por results can only run the interpreter in question x is installed on Nuesto pc.4.2.Copiladores: Son application instructions to translate k makina language strife engulfing a file cualkier k pc can run on.
5-Methodology and structure of the programming: 5.1.Proceso of solving problems through programming languages: To start the task of solving problems by using elnguaje of programas.5.1.1.El and natural language express the problem without using language cientificos.5.1.2.Redacion technical or scientific language of the statement: Many an analysis of the problem and gives the solution k buscabamos.5.1.3.Programa algorithmic: Following the scientific statements use the formulas and methods k lead to the solution of the problem datos.5.1.4.Programacion producing outputs in the chosen language or encoding: AdaptamPseudocode you choice of programming language using its lexicon and sintasis.5.2.Variables: These names represent k uocones and occupy a specific position in the RAM of pc.5.2.1.Nombre of variables: We can use alphanumeric character set cualkier blanco.5.2.2.Declaracion less space and types of variables: Consists ingicar the guy owns the data to k k representan.5.2.3.Asignacion of variables: To assign a value to the variable enough to express an equality .5.3. Terms and logical operators: They are related to logical expressions used in the instructions to Programs to be evaluated solve one of the two inputs logicas.5.3.1.AND.5.3.2OR.5.3.3.NON.
Recommendations of the ebay auction site: “No send transfers through companies such as gram webster junior and coins, ebay does not recommend the payment x fishy with unknown persons.” C ontact with the salespeople or buyer after confirmation of transactions. —U SING payment methods offer greater guarantees k aunk have greater cost .- U k sar ensure payment services once the mercancion REVIBE.