Tùy Chọn Dịch Vụ
Bị virust phá hoại hoặc deleted nhầm
- Sau khi diệt virus hay vì một lý do nào đó, các files, folders ở đó mất biến tăm, không hiện ra nữa, mà dùng Properties xem thì thấy dung lượng vẫn còn bị chiếm giữ. Nếu ai không biết cách xử lý mà đem Format đi thế là mất hết, muốn cứu lại càng khó hơn.
- Các chương trình diệt virus từ KIS, KAV, BIT, McAfee, ... tới Bkav đều đã được mình sử dụng nhưng không thành công. chỉ còn lại các folder đã chứa dữ liệu trước đó, nhưng toàn bộ những gì chứa bên trong đều mất sạch, không phải đã bị delete. Các phần mềm dùng để cứu dữ liệu cũng không ăn thua.
Can I lose data due to a virus or other Internet security threat?
Viruses and other malicious software (known as "malware") can cause data loss: malware can cause a wide array of problems for your data, ranging from individual deleted files to drive partitions becoming damaged, even entire disk drives getting erased.
In addition to viruses affecting your local computer, the Internet also poses other risks that could allow malicious individuals to access your bank account, credit reporting information, or even completely steal your identity. Threats such as keyloggers and phishing scams can put our personal information at risk, if we are not careful to protect ourselves from these online threats.
What are some of the common electronic security threats that could cause me to lose data?
Probably the most commonly recognized threat to your data, a virus is typically a small, malicious piece of software that operates on your computer, in many cases, without you knowing it exists. A virus is designed to run automatically (often taking over part of another program, even in some cases taking over part of the startup process of your computer) and is also designed to automatically replicate (or reproduce) itself to multiple files on your computer or even on other computers attached to a network.
Some viruses are simply designed to be a nuisance (displaying annoying messages or offensive graphics, then replicating themselves), but others can be very dangerous and can delete files, damage programs, or even prevent access to entire disk drives.
Viruses are commonly spread through e-mail attachments, instant messenger file transfers, or files downloaded from dangerous websites or file-sharing services.
Also known as "keystroke logging," a keylogger is a software program that typically operates quietly on your computer (or may even run on a remote computer) and does one simple task: keep a log of the keys you type on your keyboard, and transmit that information to a hacker. Using this technique, malicious individuals can obtain usernames, passwords, account numbers, and other sensitive personal information about you, simply by watching what you type. With this information, hackers may later try to access your computer or other accounts they recorded information for.
Like viruses, keyloggers are commonly spread through downloaded files or by visiting malicious websites.
Computer worms are designed to spread rapidly through even large computer systems – even around the Internet – without any human interaction at all, and can cause computers (and even entire computer networks) to bog down & become very slow or even unusable. While not usually malicious themselves, worms can cause computers & networks to run slowly enough that they are a severe nuisance, and they may also be used to deploy more-malicious software (such as a virus) later.
A Trojan, sometimes called a "Trojan horse" application, is also a malicious program designed to cause adverse effects, including data loss or even making your computer vulnerable to theft of data or hacking. However, Trojan horses disguise themselves as being safe, and often come in the form of a game, a joke, or even a tool that offers to rid your computer of viruses. Trojan horses will typically not replicate themselves, but can be very dangerous.
Phishing (pronounced "fishing," like the hobby) is a technique becoming more & more common on the Internet, where malicious individuals masquerade as a legitimate account or service that you use, in an attempt to trick users into giving out their secure personal information. Phishing attempts usually come in the form of an e-mail or a link, and often look very authentic & reliable. Often, they may threaten to take action on your account if you do not reply in a certain time, or may even claim that they are asking for this information to protect your security.
For example, you may receive an e-mail which appears to be from your bank asking you to log into an online banking application to confirm your account details, but the links in e-mail may point to a malicious site. The e-mail may even prompt you to call a phone number & confirm your information directly over the phone.
Bài viết này của Cty cứu dữ liệuDR Care Recovery Việt Nam. Mọi sự sao chép phải được ghi rõ nguồn)