LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Publisher: National Aviation University
Languages: Ukrainian
Types: Unknown
Subjects: operating systems; protected operation mode of operating systems; recommendations to protection of the operating systems; virtual machines, віртуальні машини; захищений режим роботи операційних систем; операційні системи; рекомендації до захисту операційних систем
Розроблено рекомендації для організації безпечного середовища роботи в операційнихсистемах та захисту операційних систем за допомогою антивірусних програм ібрандмауерів.Ключові слова: віртуальні машини, захищений режим роботи операційних систем,операційні системи, рекомендації до захисту операційних систем. Efficiency of usage of programs which return OS to an initial state after reboot and select thevirtual environment for software start, it has been proved by their usage in Internet cafe and ineducational institutions. The organization of protection of OS from hacker attacks and the harmfulsoftware difficult enough task. It is connected by it is necessary what to resist to experts who havehigh qualification and intelligence. Program writers of protection not in a state completely to trace appearance of the new harmful software and hacker attacks. The unique method to resist to all typesof threats which influence OS closed source is a tracing and timely setting of appropriate updatesfor OS, and also timely update of anti-virus bases. If to adhere to all recommendations which arestated in this article it is possible to lower considerably probability of loss of the information frominfluence of various threats on OS Розроблено рекомендації для організації безпечного середовища роботи в операційнихсистемах та захисту операційних систем за допомогою антивірусних програм ібрандмауерів
  • No references.
  • No related research data.
  • No similar publications.