<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="uk">
		<id>http://istoriya.soippo.edu.ua/index.php?action=history&amp;feed=atom&amp;title=Computer_Security_Honeypot</id>
		<title>Computer Security Honeypot - Історія редагувань</title>
		<link rel="self" type="application/atom+xml" href="http://istoriya.soippo.edu.ua/index.php?action=history&amp;feed=atom&amp;title=Computer_Security_Honeypot"/>
		<link rel="alternate" type="text/html" href="http://istoriya.soippo.edu.ua/index.php?title=Computer_Security_Honeypot&amp;action=history"/>
		<updated>2026-04-20T23:29:44Z</updated>
		<subtitle>Історія редагувань цієї сторінки в вікі</subtitle>
		<generator>MediaWiki 1.24.1</generator>

	<entry>
		<id>http://istoriya.soippo.edu.ua/index.php?title=Computer_Security_Honeypot&amp;diff=251925&amp;oldid=prev</id>
		<title>Join6china: Computer Security Honeypot</title>
		<link rel="alternate" type="text/html" href="http://istoriya.soippo.edu.ua/index.php?title=Computer_Security_Honeypot&amp;diff=251925&amp;oldid=prev"/>
				<updated>2017-11-10T03:01:25Z</updated>
		
		<summary type="html">&lt;p&gt;Computer Security Honeypot&lt;/p&gt;
&lt;table class='diff diff-contentalign-left'&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Попередня версія&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Версія за 03:01, 10 листопада 2017&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Рядок 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Рядок 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;It may seem like a trivial task to many, but your computer &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;[http://computer-cleaner.com/index.asp.html computer cleaner] &lt;/del&gt;security protection is not. You should consider it carefully and take your time to learn the most important steps.9 Steps to take to safeguard your computer security protection&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;It may seem like a trivial task to many, but your computer security protection is not. You should consider it carefully and take your time to learn the most important steps.9 Steps to take to safeguard your computer security protection&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Use an Antivirus program &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;Use an Antivirus program &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; Install an &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;[https://pixabay.com/en/photos/?q=&lt;/del&gt;anti-spyware &lt;del class=&quot;diffchange diffchange-inline&quot;&gt;anti-spyware] &lt;/del&gt;program &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; Install an anti-spyware program &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; Regularly install Windows Updates &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; Regularly install Windows Updates &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; Watch out for e-mail attachments from unknown sources &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; Watch out for e-mail attachments from unknown sources &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Рядок 8:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Рядок 8:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; Implement strong passwords &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; Implement strong passwords &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; Be vary careful of which programs you download and install &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; Be vary careful of which programs you download and install &amp;#160;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; Use File Encryption if privacy is an issueThe way cyber crime works is by exploiting human nature. Human nature is basically built on trust, you trust what you hear or read on the news, radio, television or newspaper. You trust the mails you receive, labels on packages and you more than likely to trust your spouse, partner or children.Abusing that trust is the main tactic cyber-criminals employ to get what they want, which is usually your private information stored on your hard disk or the credentials you supply when logging into your bank online.Take for example a simple e-mail message. A cyber-criminal can easily spoof - or forge - where the message came from, tempting you - the trusting - consumer to click on a link which in turn installs some malware on your computer. The result being that your files might get destroyed or even hijacked by the attacker.Your first line of defense is to install an anti-virus program. Installing an anti-virus program ensures that you are at least protected against viruses and some of the better known spyware programs. To complement that, you should also install a dedicated anti-spyware program.The Windows operating system is known to be less than perfect and new security loopholes are being discovered on a regular basis. Fortunately, security fixes are free for you to download which is why you are advised to turn on automatic updates when using a Windows computer. They are free and can only enhance your computer security protection.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&amp;#160; Use File Encryption if privacy is an issueThe way cyber crime works is by exploiting human nature. Human nature is basically built on trust, you trust what you hear or read on the news, radio, television or newspaper. You trust the mails you receive, &lt;ins class=&quot;diffchange diffchange-inline&quot;&gt;[http://computer-cleaner.com/index.asp.html computer cleaner] &lt;/ins&gt;labels on packages and you more than likely to trust your spouse, partner or children. Abusing that trust is the main tactic cyber-criminals employ to get what they want, which is usually your private information stored on your hard disk or the credentials you supply when logging into your bank online.Take for example a simple e-mail message. A cyber-criminal can easily spoof - or forge - where the message came from, tempting you - the trusting - consumer to click on a link which in turn installs some malware on your computer. The result being that your files might get destroyed or even hijacked by the attacker.Your first line of defense is to install an anti-virus program. Installing an anti-virus program ensures that you are at least protected against viruses and some of the better known spyware programs. To complement that, you should also install a dedicated anti-spyware program.The Windows operating system is known to be less than perfect and new security loopholes are being discovered on a regular basis. Fortunately, security fixes are free for you to download which is why you are advised to turn on automatic updates when using a Windows computer. They are free and can only enhance your computer security protection.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;−&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A firewall is an extra security guard between your PC and the internet. The firewall controls the traffic and applications that are allowed to connect to the internet and vice versa. It checks &lt;del class=&quot;diffchange diffchange-inline&quot;&gt; &lt;/del&gt;incoming as well as outgoing traffic. If you get yourself a simple SOHO router, the firewall is built into the router, hence the name - hardware firewall.These are just some of the basic things you should keep an eye out for when considering your computer's security protection.&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;A firewall is an extra security guard between your PC and the internet. The firewall controls the traffic and applications that are allowed to connect to the internet and vice versa. It checks incoming as well as outgoing traffic. If you get yourself a simple SOHO router, the firewall is built into the router, hence the name - hardware firewall.These are just some of the basic things you should keep an eye out for when considering your computer's security protection.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Join6china</name></author>	</entry>

	<entry>
		<id>http://istoriya.soippo.edu.ua/index.php?title=Computer_Security_Honeypot&amp;diff=207923&amp;oldid=prev</id>
		<title>Join6china: Створена сторінка: It may seem like a trivial task to many, but your computer [http://computer-cleaner.com/index.asp.html computer cleaner] security protection is not. You should...</title>
		<link rel="alternate" type="text/html" href="http://istoriya.soippo.edu.ua/index.php?title=Computer_Security_Honeypot&amp;diff=207923&amp;oldid=prev"/>
				<updated>2017-07-27T00:24:08Z</updated>
		
		<summary type="html">&lt;p&gt;Створена сторінка: It may seem like a trivial task to many, but your computer [http://computer-cleaner.com/index.asp.html computer cleaner] security protection is not. You should...&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Нова сторінка&lt;/b&gt;&lt;/p&gt;&lt;div&gt;It may seem like a trivial task to many, but your computer [http://computer-cleaner.com/index.asp.html computer cleaner] security protection is not. You should consider it carefully and take your time to learn the most important steps.9 Steps to take to safeguard your computer security protection&lt;br /&gt;
Use an Antivirus program &lt;br /&gt;
 Install an [https://pixabay.com/en/photos/?q=anti-spyware anti-spyware] program &lt;br /&gt;
 Regularly install Windows Updates &lt;br /&gt;
 Watch out for e-mail attachments from unknown sources &lt;br /&gt;
 Use a -preferably hardware- firewall &lt;br /&gt;
 Backup your system on a regular basis &lt;br /&gt;
 Implement strong passwords &lt;br /&gt;
 Be vary careful of which programs you download and install &lt;br /&gt;
 Use File Encryption if privacy is an issueThe way cyber crime works is by exploiting human nature. Human nature is basically built on trust, you trust what you hear or read on the news, radio, television or newspaper. You trust the mails you receive, labels on packages and you more than likely to trust your spouse, partner or children.Abusing that trust is the main tactic cyber-criminals employ to get what they want, which is usually your private information stored on your hard disk or the credentials you supply when logging into your bank online.Take for example a simple e-mail message. A cyber-criminal can easily spoof - or forge - where the message came from, tempting you - the trusting - consumer to click on a link which in turn installs some malware on your computer. The result being that your files might get destroyed or even hijacked by the attacker.Your first line of defense is to install an anti-virus program. Installing an anti-virus program ensures that you are at least protected against viruses and some of the better known spyware programs. To complement that, you should also install a dedicated anti-spyware program.The Windows operating system is known to be less than perfect and new security loopholes are being discovered on a regular basis. Fortunately, security fixes are free for you to download which is why you are advised to turn on automatic updates when using a Windows computer. They are free and can only enhance your computer security protection.&lt;br /&gt;
&lt;br /&gt;
A firewall is an extra security guard between your PC and the internet. The firewall controls the traffic and applications that are allowed to connect to the internet and vice versa. It checks  incoming as well as outgoing traffic. If you get yourself a simple SOHO router, the firewall is built into the router, hence the name - hardware firewall.These are just some of the basic things you should keep an eye out for when considering your computer's security protection.&lt;/div&gt;</summary>
		<author><name>Join6china</name></author>	</entry>

	</feed>