Skip to main content

Home/ Literacy with ICT/ Group items tagged malware

Rss Feed Group items tagged

tech vedic

How to know that my computer is virus or malware infected? - 0 views

  •  
    Malware, as you know is a class of malicious software such as spyware, adware, or viruses that compromise with the system's performance and security. And in majority of cases they infiltrate through general Internet activities --- browsing, surfing, and downloading, or executing programs or files. Hence, most of the virus or malware defense methods are based on encouraging secure Internet access. Though, virus or malware authors are using astute development techniques, keeping a keen eye on the behavior of your machine, can be helpful in winning the battle of computer security. Following are a few notable symptoms, which can be perceived as an indication of virus or malware attack:
tech vedic

Mobile malware - 0 views

  •  
    Mobile malware
Phil Taylor

DOWNLOAD Operation Cleanup: Complete Malware Removal Guide - 3 views

  •  
    I find most of this organizations manuals very good quality.
John Evans

Free Technology Ebooks - MAKEUSEOF - 0 views

  •  
    "android*anti-malware*blogging*build website*computer automation*computer hardware*computer security*ebook*feedreader*gmail*hardware*html*hulu*ifttt*iOS*ipad*ipad mini*iphone*job search tips*linux*linux distro*mac os x*media center*microsoft windows*movies*netflix*online video*password manager*photoshop tips*productivity tips*programming*record video*root device*rss*rss aggregator*social media*tablet computer*television*television show*ubuntu*web browser*web development*windows phone 7*wordpress*writing tips"
tech vedic

How to check USB drives from spreading viruses? - 0 views

  •  
    Sometimes being unaware of the USB virus-or malware-infection, you may put your computer security at stake. The AutoPlay feature of the Windows, executes the file or program stored on your device, without asking for permission, and that may bring havoc on the operating system as well as the confidential data stored on the machine. Thus, you need to disable the AutoPlay feature to deter such security breaching.
tech vedic

How to create a Restore Point in Windows? - 0 views

  •  
    Microsoft has added a wonderful Windows repair tool to find a quick way out of Windows problems. This is actually a reverse gear, which you can use to alter any changes that might have incurred to the operating system due to faulty software or driver update, virus or malware attack, incompatible driver, or more. So don't forget to create Restore Point within a reasonable timeframe-say, the last couple of months to stay safe.
tech vedic

HOW TO PROTECT AGAINST SPYWARE? - 0 views

  •  
    Viruses, spyware and malware are some of the serious issues related to computer. Without your permission, if your Internet program is tracking and sending information back to a third party then your computer must be spyware infected. Let's uncover some essential tips to protect against spyware.
tech vedic

How to clear off viruses and malware from an infected PC? - 0 views

  •  
    Despite updated operating system, browser, browser add-ons, installed firewall, and acute computer security settings, clever viruses, spyware or Trojans may find loop-holes to slip into your system. Not only in terms of performance, but in terms of stability and security too, these malicious software push you on back-foot. What to do next?
tech vedic

How to know that my computer is virus or malware infected? - 0 views

  •  
    Advantages: Keeps system running smooth Protection against Internet frauds
tech vedic

How to fix your biggest Internet security risk? - 0 views

  •  
    Threats related to Java programming language are increasing day by day. It also reminds about the old whack-a-mole arcade game. With the vulnerable version of Java, your computer becomes prone to malware or other threats.
John Evans

Phishing Scams: Don't Take the Bait | Tech & Learning - 1 views

  •  
    "Just glance at your inbox and odds are you'll find at least one variety of phishing scam or email hack. Whether it's spear phishing, spoofing, account takeovers through embedded malware, or that time-honored plea from a Nigerian prince, there's no doubt that our schools' email systems are under near-constant attack. One careless click of a link can turn a teacher's account into a spam factory, landing your email system on a blacklist and cutting off communication with the rest of the world. Providing employee tax information to a phisher posing as your superintendent, for example, can result in the identity theft of hundreds of employees. The sad truth is that phishing and spamming scams are now part of life in this digital age. But through more engaging education, more authentic practice, and more creative protection practices, schools have a much better chance of mitigating the impact."
John Evans

Why pay for Office and Photoshop when you can get these alternatives for free? | Popula... - 1 views

  •  
    "We rely on expensive computer programs to edit photos and video, deal with office work, and protect our computers from malware. But they're not our only options. Often, commercial studios will offer the most basic versions of their products free of charge. In other cases, volunteers who believe that software should be free will develop open-source alternatives. Between them, you can find free programs to cover just about any computing task. However, not all free apps are created equal. We've narrowed down the plethora of options to highlight 10 of the finest free alternatives to pricey computer programs."
John Evans

Around the Corner-MGuhlin.org: Download a la Mode: Netbooks Go Viral - 0 views

  • The best option, of course, is professional development on the use of a netbook for staff and students (these are so inexpensive that I have no doubt that Parent-Teacher Organizations will want to buy them for students to use in and out of school; I've already had one request for this!). Some quick ideas:Pass out USB Flash drives with anti-malware/anti-viral free tools that can be installed. Passing out USB Flash drives with the school logo and contact information, maybe a web site address to find more tools and tips online, can be a positive way to interact with your audience. Some districts are getting custom USB drives from providers like PexagonTech.com (http://pexagontech.com) or Ram-It.com (http://tinyurl.com/cmkzum).Or, if you rather not use USB solutions, start setting your students up with digital lockers using solutions like Xythos.com, Gaggle.net, or Acma.com.Schedule a "Bring Your Netbook to School" Night and encourage safe computing.
tech vedic

Ransomware-now-targeting-mac-users - 0 views

  •  
    Now, Mac is the next target of hackers. Till now, Mac operating system was untouched by hackers and Mac users were accessing web freely.
1 - 20 of 23 Next ›
Showing 20 items per page