What av or malware software do you use

Assignment Help Software Engineering
Reference no: EM13860567

Because of the recent DDoS attack on Rutgers computers - taking down their internet, I thought it might be a good idea to discuss safety and security online.

What is a DDoS attack?

DDoS is the common abbreviation for a Distributed Denial of Service attack which is what probably happened at Rutgers. Think of it like what happened during SuperStorm Sandy and nobody could get through on their cell phones or for the people that get stuck every day in traffic trying to get through the Lincoln Tunnel. There are too many people trying to access the same thing at the same time.
Here is a short video that explains it further:

https://youtu.be/OhA9PAfkJ10

What happened at Rutgers?

If you aren't up on the story, here is a good summary:

https://www.northjersey.com/news/colleges-in-a-cyber-war-with-hackers-open-networks-vulnerable-to-attacks-1.1321617

What should you be aware of?

The US government has a website called "OnGuard Online" with some useful tips and videos for protecting yourself online. Here is the main website page:

https://www.onguardonline.gov/

Chances are unless you are running a business, you probably won't be a target of a DDoS attack. However, if you don't update your computer, run anti-virus and mal-ware programs, you might become part of the botnet without you knowing it.

What can you do?

Run and update anti-virus programs on your computers, tablets and cell phones. yes, there are FREE ones that are pretty good.

Run a mal-ware detector. Malware Bytes is the FREE one that I use

Never, never share passwords and make sure your password is STRONG.

Update/patch the software on your computer regularly.

This list is not comprehensive, but it's just to get you thinking about it.

Discussion Board Assignment

Please watch the video and review the article.

Please take a look at the OnGuard Online website.

Q1. What AV or Malware software do you use? Please include what type of device or OS (Windows, Mac, Android)

Q2. Share with us three tips you have for protecting yourself online. Use examples to illustrate your tip, if possible.

Please provide a reference/source (formatted in MLA style) that supports at least one of your tips.

No duplicates allowed. For example, I already mentioned Malware Bytes. You can mention that you use it, but that can't be the only one you mention. You can comment/reply to your peers agreeing or disagreeing with their tip, but first one to post, gets the credit for the "original".

Reference no: EM13860567

Questions Cloud

Use technology and information resources to research issues : Use technology and information resources to research issues in American History to 1865
Drawing the logic diagram : sing two 2-bit comparator modules and some extra gates, design a 5-bit comparator comparing X = (X4X3X2X1X0) and Y = (y4y3y2y1y0). Show your design by drawing the logic diagram containing all three outputs, f(X>Y), f(X = Y), and f(X
Design the digital filter using the bilinear transformation : Design the digital filter using the bilinear transformation and show that the transfer function of the resulting filter may be approximately expressed as:
Where was the massive slaughterhouse known as union stock : Where was the massive slaughterhouse known as Union Stock Yards located?
What av or malware software do you use : What AV or Malware software do you use? Please include what type of device or OS (Windows, Mac, Android). Share with us three tips you have for protecting yourself online. Use examples to illustrate your tip, if possible.
How did states emerge in the nineteenth century? : How did states emerge in the nineteenth century?
American colonists concerning the standing presence : The proper response by American colonists concerning the standing presence of British officials and soldiers
What is effect of singlebit transmission error in ciphertext : What is the effect of a single-bit (transmission) error in the ciphertext when using the ECB and CBC modes of operation?
The desired customer outcomes : Question- Assume you have captured the Desired Customer Outcomes (DCO's) in a formal House of Quality structure.Outline how you would convert these DCO's into formal requirements. (You can use software requirements here if you wish!) How would you us..

Reviews

Write a Review

Software Engineering Questions & Answers

  Analyze the use of an enterprise software systems

Analyze the use of an Enterprise Software Systems (ESS) in a health care organization with regard to its effects on operational outcomes

  Develop a system architecture model

A customer can cancel the course by cancel method. Once customer purchase the course then account class maintain the customer no, course no, name of the course and customer.

  Explain the function of input controls

Explain the advantages and disadvantages of restricting user interfaces. (User interfaces can often be restricted, limiting the user's ability to navigate to other areas of the system, or out of the system.)

  Draw a use-case diagram and a set of activity diagrams

Draw a use-case diagram and a set of activity diagrams for the process of buying glasses from the viewpoint of the patient. The first step is to see an eye doctor who will give you a prescription. Once you have a prescription, you go to a optical dis..

  The top 3 user interface techniques you recommend by using

after delivering the concepts behind the application system and user interface requirement process the government

  Assignment on verification and validation

Planning and executing verification and validation (Focused Discussion) : Question: V and V processes are critical to any kind of IT project. Validation has links with international standards too. Please summarise any of your experience here.

  Business requirements

Describe the scope and analyze how to control the scope. Speculate and give justifications for how to control scope. Identify possible risks, constraints, and assumptions.

  Question about test driven development

Suppose you are the project manager for the development of an eCommerce application for a large furniture store. You decide to use TDD in your development procedure.

  1 what is the role of the project manager why is

1. what is the role of the project manager? why is leadership so important for project managers?2. discuss the

  1 what are the predominant beliefs and values in the united

1. what are the predominant beliefs and values in the united states that have driven the development of health care

  Development of a small software system

Analysis, design and development of a small software system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd