- symptoms of a virus
- OS running slow, stops intermitermittently or does not start
- less memory available
- corrupt files and programs
- programs do not operate properly
- unknown programs are activated
- mapping
- email attachments macros must be disabled
- clicking on websites
- flash drives
- cable router
- wireless router
- linxus
- netgear
- tp link
- d link
- wireless access point
- is a switch
- is a firewall
- dstcp server
- software firewall - windows firewall
- antivirus
- malware protection
- security settings
- windows update
- security setting in internet explorer
- good practice
- email script and attachments
- document macros
- UAC is activated
- digital signature
- digital certificate
- no more service packs its automatically done with windows updates
- Back - up
- forget password - boot disk using a usb drive
- image of your hard disk
- hardware firewalls
- used for blocking access to ports on computers behind a firewall
- hides the IP address behind a private IP address
- hardware firewall brands
- wireless routers from the following brands have built-in firewalls
- software firewall
- blocks access to ports on individual computers
- examples
- windows firewall
- access point
- two sides
- public side
- private side
- public IP - people can identify the IP
- forced execution
- some website would force the execution of scripts
- cookies
- cookies are stored on computers by websites
- Information stored in cookies are accessed by the website each time the site is visited
- cookies can be and possibly should be removed as soon as possible, if not, periodically
- types of cookies
- authentication cookies
- cookies store by websites
- third party tracking cookies
- Firefox examples
- Types of attacks
- botnets
- denial of service
- back doors
- spoofing - impersonating a website
- spamming
- firewalls
- hardwar firewalls
- Linksys firewall
- dlink wbr 1310
- spftware firewalls
- windows firewall example
- Authorizing Access
- password
- access auditing
- possessed object
- PINs
- biometric devices
- authentication
- one factor
- two factor
- three factor
- four factor
- IOT - Internet of things
- A digital signature is an encrypted code that a person, website, or organization attaches an electronic verification
- Bit Locker - encryption of your hard drive
- you can also encrypt data on your flash drive - trucrypt
- If C drive is too full the system will slow down
- Veracrypt can be used to encrypt part of a drive
- when encrypted you will have 2 drives
- an e drive
- and an f drive
Monday, September 12, 2016
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment