{"id":340,"date":"2012-04-24T02:29:09","date_gmt":"2012-04-23T19:29:09","guid":{"rendered":"https:\/\/dosen.unila.ac.id\/rasp\/?p=340"},"modified":"2012-04-24T02:31:41","modified_gmt":"2012-04-23T19:31:41","slug":"keamanan-komputer-7","status":"publish","type":"post","link":"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/keamanan-komputer-7\/","title":{"rendered":"Keamanan Komputer 7"},"content":{"rendered":"<p>There are many types of viruses.<\/p>\n<div>\u2022Some act quickly by erasing user programs and data bases. Others grow like a cancer, detroying small parts of a data base each day. Some act like a time bomb. They lay dormant for days or months, but eventually are activated and wreak havoc on any software on the system. Many companies warn their micro users to back up all software prior to every Friday the thirteenth.<\/div>\n<div>Some viruses attack the hardware<\/div>\n<div>\n<div>\u2022And have been known to throw the mechanical components of a computer system, such as disk-access arms, into costly spasms.<\/div>\n<div>\u2022The most common source of viral infection is the public electronic bulletin board on which users exchange software. Typically, a user logs onto the bulletin board and downloads what ..<\/div>\n<\/div>\n<div>He or she thinks is a game,<\/div>\n<div>\n<div>\u2022A utility program, or some other enticing piece of freeware, but gets a virus instead. One virus frequently distributed via electronic bulletin boards displayed \u201cGotcha\u201d on the user\u2019s monitor, then erased all programs and data from accesible disk storage.<\/div>\n<div>\u2022Viruses are also spread from one system to an other via common diskettes.<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>There are many types of viruses. \u2022Some act quickly by erasing user programs and data bases. Others grow like a cancer, detroying small parts of a data base each day. Some act like a time bomb. They lay dormant for days or months, but eventually are activated and wreak havoc on any software on the &hellip; <a href=\"https:\/\/dosen.unila.ac.id\/rasp\/2012\/04\/24\/keamanan-komputer-7\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Keamanan Komputer 7&#8221;<\/span><\/a><\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[],"class_list":["post-340","post","type-post","status-publish","format-standard","hentry","category-computer-security"],"_links":{"self":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/340"}],"collection":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/comments?post=340"}],"version-history":[{"count":0,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/posts\/340\/revisions"}],"wp:attachment":[{"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/media?parent=340"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/categories?post=340"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dosen.unila.ac.id\/rasp\/wp-json\/wp\/v2\/tags?post=340"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}