Acer Aspire User Manual page 47

All-in-one computer
Hide thumbs Also See for Aspire:
Table of Contents

Advertisement

Internet and online security - 47
tablet, or IoT device is entirely under the control of the person who
created the botnet. Most people who are infected with botnets aren't
even aware that their computer's security has become compromised!
What to do if you're infected: If you're infected you probably don't
realize it as bots are notoriously quiet. Your Internet Service Provider
might send you a notification alerting you that they found a threat on
your network and that you need to remove the bot. If you have a bot,
use internet security software like Norton Security to scan all of your
devices.
Viruses/Malware
"Virus" is the commonplace word for all malicious software programs
for years now; however, a virus is just one type of malicious threat. A
virus is classified as a self-replicating piece of malicious code that
travels by inserting itself into files or programs.
What to do if you're infected: Take steps to avoid infection by
staying protected with internet security software like Norton Security.
If you subscribed to Norton Security and think you may have a virus,
contact Norton's on-call technicians to help eliminate the virus.
Take special precautions when using public Wi-Fi
Public Wi-Fi is available just about everywhere, from the local coffee
shop to the hotels and airports you visit while traveling. While public
Wi-Fi has made our lives a little easier, it also poses security risks to
the personal information available on our laptops and smartphones. A
virtual private network (VPN) gives you online privacy and anonymity
by creating a private network from a public internet connection. VPNs
mask your internet protocol (IP) address so your online actions are
virtually untraceable as well as secure. One of the biggest security
risks on public Wi-Fi are man-in-the-middle attacks (MITM). These
attacks are akin to eavesdropping. Data is sent from point A
(computer) to point B (server/website), and an attacker can get in-
between these transmissions. They then set up tools programmed to
"listen in" on transmissions, intercept data that is specifically targeted
as valuable, and capture the data, such as your login credentials and
passwords.
Use a virtual private network (VPN) to ensure your privacy and
anonymity are protected when you use public Wi-Fi. VPN services

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents