Prevent your laptop/computer from being stolen:
- Lojack- for laptops, little piece of software that runs in the back of the web browser, scenario- some one steals the computer…lojack gets the IP #/address from the computer and sends it to the internet company
- Tag your name on your laptop (ie. On the battery- sauder your name or write it with a sharpie)
- Change your password
- 2 accounts on your computer your account or guest account
Avoiding Viruses:
- Malware/viruses- steals data or destroys files, can create traffic jams on your computer, you may not know it is there
- Install virus fighting software, make sure it runs at all times when the computer runs, check it every week to make sure it runs good
- Anti-virus software should scan files, emails, etc.
- Auto protect- runs in the back of the screen
- Viruses slow computer down, spam can also hurt you
- Today most viruses come in e-mails or websites
- Senders have found ways to use others’ email addresses to get the malware onto your computer
- Pirated videos have started to get viruses, so when you download the video you will get viruses on your computer
Prevent INtrusions:
- Whackers- wireless hackers
- Firewall software-software designed to analyze and control incoming and outgoing packets on a network, used to enhance security by filtering out potential intrusion attempts
Hackers can get information from your computer if you stay on the internet for a long period of time - To block hackers you should have an active firewall
- How to check your firewall: click the Start buttonà then click control panelà click network connectionsà click the connection you use for internet accessà under network tasks, click change settings for this connectionà click the advanced tab and look for a check mark in front of the box labeled protect my computer and network
- Ping of death- virus that gave computers’ viruses, it pings Microsoft continuously, when someone pings Microsoft more than about 50 times, Microsoft will shut down their computer
- “In computer terminology, a honeypot is a trap set to detect, deflect or in some manner counteract attempts at unauthorized use of information systems. Generally it consists of a computer, data or a network site that appears to be part of a network but which is actually isolated and protected, and which seems to contain information or a resource that would be of value to attackers. A honeypot that masquerades as an open proxy is known as a sugarcane.” (wikipedia)
No comments:
Post a Comment