Here below is the post:
What you see when you log in to your computer. The devices you use to store information can contain information about what you are doing on your computer. You might notice that your monitor opens up at the time you click a link on your screen, and if you click the link, your computer opens. If you click anything but a link, the computer does nothing. Also, if you type in something, such as a text, and then click the link to log in, the computer does not log in with you. But all other things, including clicking the link, are logged. If you click anything else on your screen, your computer might click on an empty box, but you might still be logged in. Why are your computers monitored? You might have noticed that when you click a link, the software on your computer is recording your actions, for example what you have typed, what you have done, and the screen you are on is showing a notification. You can click on any text to log in, and then you might notice that if you type in your email address and you click on the “Email from” button, the website you are connected to is logged. The log of your email address is stored on your computer. It is stored as a link on your computer’s website. The computers of many internet users report that these computer sites are monitored constantly. These are known as “logs”. If you have access to an email server or even a computer using the internet that may be monitored and may be able to log you in on the local computer. This seems to make no sense, or might even make little sense. The Internet can only connect one machine to a network. This connects one computer to one other computer, one server to another server, etc. These are known as “nets”. A system can always be connected to many other systems without having to go through a system. Many applications run on machines that have no Internet connection or network.
References
Anwar, S., Mohamad Zain, J., Zolkipli, M. F., Inayat, Z., Khan, S., Anthony, B., & Chang, V. (2017). From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions. Algorithms, 10(2), 39.
Maciá-Fernández, G., Camacho, J., Magán-Carrión, R., García-Teodoro, P., & Therón, R. (2018). UGR ‘16: A new dataset for the evaluation of cyclostationarity-based network IDSs. Computers & Security, 73, 411-424.


0 comments