Download Print this page

Acer Swift Go 16 User Manual page 77

Advertisement

Internet and online security - 77
tablet, or IoT device is entirely under the control of the person who
created the botnet. Most people who are infected with botnets aren't
even aware that their computer's security has become compromised!
What to do if you're infected: If you're infected you probably don't
realize it as bots are notoriously quiet. Your Internet Service Provider
might send you a notification alerting you that they found a threat on
your network and that you need to remove the bot. If you have a bot,
use internet security software like Norton Security to scan all of your
devices.
Viruses/Malware
"Virus" is the commonplace word for all malicious software programs
for years now; however, a virus is just one type of malicious threat. A
virus is classified as a self-replicating piece of malicious code that
travels by inserting itself into files or programs.
What to do if you're infected: Take steps to avoid infection by
staying protected with internet security software like Norton Security.
If you subscribed to Norton Security and think you may have a virus,
contact Norton's on-call technicians to help eliminate the virus.
Take special precautions when using public Wi-Fi
Public Wi-Fi is available just about everywhere, from the local coffee
shop to the hotels and airports you visit while traveling. While public
Wi-Fi has made our lives a little easier, it also poses security risks to
the personal information available on our laptops and smartphones. A
virtual private network (VPN) gives you online privacy and anonymity
by creating a private network from a public internet connection. VPNs
mask your internet protocol (IP) address so your online actions are
virtually untraceable as well as secure. One of the biggest security
risks on public Wi-Fi are man-in-the-middle attacks (MITM). These
attacks are akin to eavesdropping. Data is sent from point A
(computer) to point B (server/website), and an attacker can get in-
between these transmissions. They then set up tools programmed to
"listen in" on transmissions, intercept data that is specifically targeted
as valuable, and capture the data, such as your login credentials and
passwords.
Use a virtual private network (VPN) to ensure your privacy and
anonymity are protected when you use public Wi-Fi. VPN services

Advertisement

loading
Need help?

Need help?

Do you have a question about the Swift Go 16 and is the answer not in the manual?

Questions and answers

Sylvia Spindleer
February 15, 2025

I can not access the @ symbol when I press the shift key and no. 2 key

1 comments:
Mr. Anderson
February 15, 2025

The inability to access the @ symbol when pressing Shift + 2 on your Acer Swift Go 16 could be due to the keyboard layout setting. If your keyboard is set to a different layout (e.g., UK instead of US), the @ symbol may be assigned to a different key. To fix this, check and change your keyboard layout in Windows settings:

1. Press Windows key + Space to cycle through installed keyboard layouts.
2. Go to Settings > Time & language > Language & region.
3. Under Preferred languages, select your primary language, then click Keyboard options.
4. Ensure the correct layout (e.g., US QWERTY) is selected.

If the issue persists, try using Alt + 64 on the numeric keypad or check for any software-related conflicts.

This answer is automatically generated

Subscribe to Our Youtube Channel

This manual is also suitable for:

Sfg16-71