IMPORTANCE OF COMPUTER SECURITY | NORTON.COM/SETUP

COMPUTER SECURITY

Cybersecurity, computer security or IT security is the protection of computer systems from the theft and damage to their hardware, software or information, as well as from disruption or misdirection of the services they provide. Computer security can be defined as controls that are put in place to provide confidentiality, integrity, and availability for all components of computer systems. These components include data, software, hardware, and firmware.

 

The threat to Computer Security

A threat, in the context of computer security, refers to anything that has the potential to cause serious harm to a computer system. A threat is something that may or may not happen, but has the potential to cause serious damage. Threats can lead to attacks on computer systems, networks and more.

Types of threats

There are several types of computer security threats such as Trojans, Virus, Adware, Malware, Rootkit, hackers and much more. Check some of the most harmful types of computer Security Threats.

1. Distributed denial-of-service (DDoS) attack

A distributed denial-of-service (DDoS) attack — or DDoS attack — is when a malicious user gets a network of zombie computers to sabotage a specific website or server. The attack happens when the malicious user tells all the zombie computers to contact a specific website or server over and over again.

2. COMPUTER VIRUS

A Computer Virus is a malicious program, which replicates itself and infects the files and programs of your PC and can make them non-functional.

3. COMPUTER WORMS

A self-replicating computer program that spreads malicious codes, computer worms make use of the network to send copies of the original codes to other PCS. It can also go to the extent of sending transferring documents utilizing the email of the user.

4. SCAREWARE

Scareware is a malware that tricks victims to buy software by displaying fake virus alerts. A scareware infected PC may get pop-ups of fake malware threats and to get rid of those, users are prompted to purchase a fake anti-malware software.

5. KEYLOGGER

Also known as a keystroke logger, Keyloggers can track the real-time activity of a user on his computer. Keylogger runs in the background and records all keystrokes made by a user and passes the information to the hacker with the motive to steal password and banking details.

6. ROOTKIT

A rootkit is considered extremely dangerous as they appear to be legitimate files and deceives the computer user. Rootkit masks viruses and worms and makes them appear as necessary files. These are very difficult to remove and only an antivirus with the anti-rootkit feature can remove a rootkit.

Security Defenses

Because of a large number of threats, a lot of defensive strategies and tools have been developed. Bill may have to contend with some of these as he attacks his organization’s computer network, but as an insider, he will likely have the knowledge needed to bypass them. This is why insiders can be so dangerous to computer security.

Bill’s boss, John, takes security seriously. He relies upon encryption for any data he sends to others. Encryption is a method for securing data by using special mathematical algorithms to convert the data into scrambled code before transmission. The data are decoded when an authorized user accesses it. There are a number of software encryption standards, but the two main ones are RSA by RSA Data Security and PGP, or Pretty Good Privacy, available on the Internet.

There are a few ideas to help your kids stay safe and healthy while growing up in the Digital Age.

1. Increase awareness:

Help ensure younger children know the basics of staying safe online by using techniques like online games and videos that will define computer terms (e.g., cyberbullying, netiquette, virus protection) to establish basic understanding.

2. Protect your kid’s identity:

Remind your kids never to give out personal information, such as name, home address, or telephone number, to anyone they don’t know through email, Twitter, Facebook, or in online chat rooms or bulletin boards. Talk with your children about the online risks of interacting with strangers through the computer and sending notes and pictures into cyberspace. Online games may help kids understand how to protect their personal information and the ramifications of stolen identity.

3. Protect your computer:

Regularly updating security software can protect your family against scammers, hackers, and other online threats that can compromise your computer system and, consequently, your family’s financial security and other private information. Using software security that automatically updates keeps your technology current and decreases the likelihood of picking up bad programs or malware.

4. Create unique passwords:

For online safety, tell your kids to use different passwords for every online account they have to help prevent others from accessing their personal information. Make sure that you monitor each account and make sure your children know that strong passwords should include elements like symbols, numbers, uppercase and lowercase letters, and no names or words that others could easily guess.

5. Monitor online activity:

Monitoring your kids’ online activity can help keep them safe. Explore various parental controls and consider what options may work best for you and your family.

6. Prevent cyberbullying:

Cyberbullying — bullying using electronic technology — can happen anytime and anywhere. Teach your children to think through what they post on the Net about other people and the consequences those posts could have if they are unkind or mean. Also, keep communication with your child open and speak up if you suspect someone is bullying him or her.

7. Promote appropriate online interactions:

Use some online games to help show kids how to make responsible decisions about online communication and learn about key issues of digital citizenship. Online activities can include exploration of methods of communication in chat rooms and emails.

www.norton.com/setup is a computer security software program for Microsoft Windows users that combine software as a service cloud protection with traditional Antivirus and anti-spyware desktop technologies. Built into the suite is a two-way firewall, a registry cleaner, Email anti-spam, secure browsing, anti-phishing and a password management service. The suite was initially released on July 26, 2010, as the 2011 version of the product.

How to Become Popular by Getting More Instagram Followers

Everyone talks about getting popular on Instagram by accepting or sending more requests to your friends or friendly, by posting many photos or videos on Instagram, by linking your account with other social networking sites like Facebook or Twitter etc.

Follow the accounts you are interested in like of sports, cooking, travelling and many more, commenting or liking regularly on posts of your favourite celebrities, making your username unique, posting regularly not only your pictures but also what you do in your daily life.

Here, you can learn many other tips and techniques for gaining more followers and getting more likes.

Steps of getting popular on Instagram are:

  1. Bring your profile to public. Before people wish to follow you, they want to see what kind of photos you upload on your account. So, it is not that much easy if you have to agree with every single person who follows your Instagram account. Instead of putting your account as a private you need to convert it to public account to get more followers.
  • Another social networking site like Facebook or Twitter, link your Instagram profile with it.  You can gain more followers from your Facebook friends list.
  • If you don’t want to make your account as a private because of your privacy, then stop posting your pictures.
  1. Follow many people. It is the simplest way to gain followers by following more and more accounts. You have to contact with the Instagram community. Follow many accounts whether you have a plan to unfollow them later.
  • Follow your relatives or friends. On other social networking websites like Facebook or Twitter link your profile and request your friends or relatives to like your page.
  • Send request to that account you are interested in following them
  • Become followers of your celebrities and comment regularly on their posts.
  1. Become followers of other popular accounts. Choose some celebrities to follow and engage, regularly comment on their photos or videos.
  2. Go through some get- follower applications or websites. There are many applications and websites from which you can get help to increase your followers. They will also allow you to build money by doing other activities or liking pictures, which further help you to gain followers.

Carl Smith is a self-professed security expert; he has been making the people aware of the security threats. His passion is to write about Cyber security, cryptography, malware, social engineering, internet and new media. He writes for Norton security products at norton.com/setup

How to Fix Bluetooth Can’t Disable on Windows 10?

Some Windows 10 users are facing Bluetooth issues such as enabling or disabling Bluetooth option is missing from Windows 10, Bluetooth won’t turn on Windows 10 etc. But sometimes, they can’t disable the Bluetooth in Windows 10. However, this is a unique problem facing by the users.

If you want to confirm this issue then you have to this; go the Settings tab, then Devices, after that Bluetooth and other devices and then under the Bluetooth tab you will see a toggle, you just have to click on that toggle to disable the Bluetooth easily. Once you click on the toggle it will automatically revert to the enable position.

So, below we provide you complete stepwise guide to fix Bluetooth easily Can’t Disable on Windows 10. The steps are discussed below:

Steps to Fix Bluetooth Can’t Disable on Windows 10

If in case, something goes wrong, so before starting the process make sure to create a restore point and take backup of your all data. And we advise you to avoid troubles and errors arise between the processes you have to follow the steps in a proper sequence. Here how to fix it:

Disable Bluetooth Device on Windows 10

  1. Click the Windows + R keys together on the keyboard to open Run command box.
  2. Type “devmgmt.msc” in the command box.
  3. Then, press the Enter key.
  4. Expand the Bluetooth.
  5. After it, right-click on your Bluetooth device and choose Disable option.
  6. Next, click on the View tab if it does not show the name of your Bluetooth Device.
  7. And then, choose Show hidden devices.
  8. Now, right-click on each one of the Bluetooth devices and then choose the Disable option.
  9. Lastly, restart your system to save all the changes.

Aida Martin is a self-professed security expert; she has been making the people aware of the security threats. Her passion is to write about Cybersecurity, cryptography, malware, social engineering, internet and new media. She writes for Norton security products at norton.com/setup

Norton Setup | How to Print Double-Sided Documents on Mac?

Macs with now give access to a printer capable of printing double-sided can print any document as a two-sided print, which means that each side of the file will go direct on the front and back of the peice of paper, kind of any book. It is one of the famous printing methods for various situations, such as manuscripts, manuals, documentation, books and many other things and especially for those people who really want to save paper.

However, you can easily print duplex printing on a Mac by using the Microsoft Word, Pages, Office, PDF files from Safari and preview, and some other apps, and the features are working on all the versions of the MacOS and Mac OS X.

Below we provide a few simple steps which help you in printing the double-sided documents on Mac.

Steps to Print Double-Sided Documents on Mac

Before starting to print duplex printing, ensure that you meet with these few requirements which are necessary for using the two-sided printing. Firstly, you have to make sure that your printer itself must be compatible with the two-sided printing which is usually a laser printer or similar hardware. And the foremost requirement is that the document is being printed must be at a minimum at least of two pages long. Thus, the first page will always go on one side of the printed page, and the second page will go onto the reverse side of the printed page.

At times, when you have typed up a Word doc on your Mac and want to print double-sided, and then follow the steps in ascending order to avoid trouble, and it will take less time. Here how to do it:

  1. Initially, by scrolling to the top of the screen bring up the “Menu bar”.
  2. Then, click on the “File” option.
  3. Scroll the menu to the bottom and then click on the “Print” option.
  4. Next, click on the “Copies and Pages” option.
  5. Again, scroll the menu to the bottom and click on the “Layout” option.
  6. Now, click on the “Two-Sided” menu tab.
  7. Subsequently, click on “Long-Edge binding” option.
  8. Lastly, click on the “Print” tab.

Alternatively, with some applications, the process for double-sided printing will be easier and also involve few steps, since you will be presented with a “Two-Sided” option by the initial print window. Here assuming that you are using a Mac app such as Notes:

  1. Primarily, scroll to the top of the screen and bring up “Menu bar”.
  2. After that, click on the “File” option.
  3. Now, scroll the menu to the bottom and click on the “Print” tab.
  4. Next, click on the “Two-Sided” check-box which appears next to the copies box.
  5. Finally, click on the “Print” option.

Mia Watson is a self-professed security expert; he has been making the people aware of the security threats. Her passion is to write about Cybersecurity, cryptography, malware, social engineering, internet and new media. She writes for Norton security products at norton.com/setup.