Pharming - the lies behind it
- "Pharming" is a portmanteau of "Phishing" and "Farming".
- The aim of the "Pharmings" is the same as Phishing, to come to strangers to access data.
- The difference, however, lies in particular in the method:
- When you are Phishing Fake emails as "bait" to eject, and then waited for someone "takes the bait", so a Link to a Phishing page follows.
- The "Pharming" victim actively with Malware infected, this is called the "seed plants".
- The seed is planted only once, so Malware on the victim installed, it performs a redirection of the address input to a Phishing page.
- The malware changes after entering the Web address in the Browser, the actual referring IP. This includes, for example, the internal Host can be manipulated in list of the operating system, or a corrupt DNS Server controlled.
- The Trojan is well made, is displayed in the address bar is still the address you entered.
So you protect yourself from Pharming
- The most important are - in addition to vigilance when Surfing - the latest versions of your Firewall, your virus scanner and your browser.
- Valid safety certificates on the authenticity of the visited web page to close. In the pictures gallery , you will learn how you of security certificates to show can.
- Read in this practice tip, as you Trojan detect can.
- Trojans are often infiltrated by means of Fake emails in your own Computer. Review this practice tip on how you Phishing-Mails to detect.
- What are you Phishing pages, you will learn in this practical tip. This is recommended as an additional protection, that you install "Web of Trust" Browser extension.
- Check in release moments of your Host file. This contains Web-Domains associated IPs, and it is located in Windows in the folder "%SystemRoot%\system32\drivers\etc\". In the pictures gallery to learn what they are here should pay attention to.
Latest Videos
Nowadays, almost all websites that contain sensitive data, such as E-Mails or Bank account details, a [[http://praxistipps.chip.de/http-und-https-wo-ist-der-unterschied_11772/https-verbindung]], SSL-encryption and security certificate. The certificate is displayed, if you click in the address bar of the browser, click the lock icon.
Nowadays, almost all websites that contain sensitive data, such as E-Mails or Bank account details, a [[http://praxistipps.chip.de/http-und-https-wo-ist-der-unterschied_11772/https-verbindung]], SSL-encryption and security certificate. The certificate is displayed, if you click in the address bar of the browser, click the lock icon.
Many of the pages by default, not a secure HTTPS connection is established, but an unencrypted HTTP connection. In the case of self - "https://" in the address bar, a secure connection and to view the certificate.
Many of the pages by default, not a secure HTTPS connection is established, but an unencrypted HTTP connection. In the case of self - "https://" in the address bar, a secure connection and to view the certificate.
To check if your host file was changed by Malware, type "%SystemRoot%\system32\drivers\etc\" in the address bar of Windows Explorer. When you open the Host file with Notepad, it should show up here, no Internet address, when you enter sensitive data.
To check if your host file was changed by Malware, type "%SystemRoot%\system32\drivers\etc\" in the address bar of Windows Explorer. When you open the Host file with Notepad, it should show up here, no Internet address, when you enter sensitive data.
