Acer Predator Helios 500 User Manual page 88

Hide thumbs Also See for Predator Helios 500:
Table of Contents

Advertisement

88 - Internet and online security
device is entirely under the control of the person who
created the botnet. Most people who are infected with
botnets aren't even aware that their computer's security has
become compromised!
What to do if you're infected: If you're infected you
probably don't realize it as bots are notoriously quiet. Your
Internet Service Provider might send you a notification
alerting you that they found a threat on your network and
that you need to remove the bot. If you have a bot, use
internet security software like Norton Security to scan all of
your devices.
Viruses/Malware
"Virus" is the commonplace word for all malicious software
programs for years now; however, a virus is just one type of
malicious threat. A virus is classified as a self-replicating
piece of malicious code that travels by inserting itself into
files or programs.
What to do if you're infected: Take steps to avoid infection
by staying protected with internet security software like
Norton Security. If you subscribed to Norton Security and
think you may have a virus, contact Norton's on-call
technicians to help eliminate the virus.
Take special precautions when using public Wi-Fi
Public Wi-Fi is available just about everywhere, from the
local coffee shop to the hotels and airports you visit while
traveling. While public Wi-Fi has made our lives a little
easier, it also poses security risks to the personal
information available on our laptops and smartphones. A
virtual private network (VPN) gives you online privacy and
anonymity by creating a private network from a public
internet connection. VPNs mask your internet protocol (IP)
address so your online actions are virtually untraceable as
well as secure. One of the biggest security risks on public
Wi-Fi are man-in-the-middle attacks (MITM). These attacks
are akin to eavesdropping. Data is sent from point A
(computer) to point B (server/website), and an attacker can
get in-between these transmissions. They then set up tools

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Ph517-51Ph517-61

Table of Contents