Skip to main content

Home/ Abney and Associates Internet and Technology/ Group items tagged Steps

Rss Feed Group items tagged

mardie lavender

Abney and Associates News Review: Secure Your Computer In Seven Steps-Zimbio - 1 views

  •  
    Source: http://www.zimbio.com/Abney+Associates/articles/dYcAZaBvCTo/Secure+Computer+Seven+Steps+Abney+Associates While handheld devices such as smartphones and tablets provide new ways for us to leverage technology, computers are often still the primary tool we use for our professional and personal lives. As a result, your computer, whether at work or at home, still remains a primary target for cyber criminals. By following these simple steps, you can help secure your computer and protect it against most known attacks. 1. STARTING SECURE The first step to a secure computer is starting with a computer you can trust. If you purchased a new computer directly from a well-known vendor, then you should be able trust it and the pre-installed software. If you have purchased a used computer, then do not trust it. The used computer may have been accidentally (or intentionally) infected by the previous owner. Trying to secure a computer that is already infected does no good. The first step you should take after acquiring a used computer is reformat the hard drive and reinstall the operating system (be sure to ask someone you trust for help if you are not sure how to do this). 2. UPDATING The next step is updating your computer. Cyber attackers are always identifying new weaknesses in computers and their applications. When computer and software vendors learn about these new vulnerabilities, they develop and release fixes, called updates or patches, to fix the problem. When you purchase a new computer or reinstall the operating system, your computer is most likely already out of date. As such, the first step you want to take is connect to the Internet and update your computer's operating system. Related Articles: http://atheenalie.deviantart.com/art/Reviews-by-Abney-and-Associates-Code-85258081704-371377544 ht
elmer bosh

Abney Associates - Deviantart - Abney Associates - 1 views

  •  
    Scams are all over Facebook. There are stories telling users that Facebook will end on a certain date, miracle diet pills, celebrity sex tapes, and other shady posts. With a little vigilance, though, users can make sure that they're not continuing the chain. Miranda Perry, staff writer for Scambook, spoke with AllFacebook about ways that people can make sure that they're not giving away information to scammers or spamming their friends' News Feeds with malicious links. Scambook is a complaint-resolution platform where customers can air their grievances and let others know about unscrupulous business practices and identity theft. The company also informs people of scams on social media, using its blog to write about the newest hoaxes that are going viral on Facebook. Perry shared with AllFacebook some ways that users can protect themselves (and their friends) from Facebook scams. Consider The Source One of the most common Facebook scams involves links that either infect computers with malware or automatically share content to users' Timelines. Perry said that by taking a couple of extra seconds to examine not only suspicious links, but the people who shared them, people can protect themselves. For instance, if a fitness buff friend shares a link showing how she's lost 30 pounds by using a weird old trick, or if a pastor shares a link purportedly showing Rihanna's sex tape, odds are extremely high that it's a scam. Perry said red flags should go up whenever someone shares something to Facebook that seems atypical of their nature. If users truly aren't sure, Perry recommends calling or contacting that person offline to see if their account has been compromised: The No. 1 step is just to look at the source and avoid clicking on links or sharing anything on Facebook that seems suspicious. For instance, if you know that your friend is a super-skinny athlete, they are probably not going to be telling you that they've just used weight loss pills. If t
Ramazan Ghanem

Abney and Associates - The Secret War: Infiltration, Sabotage, Devastating Cyber Attacks - 1 views

http://www.globalresearch.ca/the-secret-war-infiltration-sabotage-devastating-cyber-attacks/5338882 Inside Fort Meade, Maryland, a top-secret city bustles. Tens of thousands of people move through...

abney and associates The Secret War: Infiltration Sabotage Devastating Cyber Attacks

started by Ramazan Ghanem on 17 Jun 13 no follow-up yet
1 - 4 of 4
Showing 20 items per page