Acer Predator PT715-51 User Manual W10 - Page 84
Viruses/Malware, Take special precautions when using public Wi-Fi
View all Acer Predator PT715-51 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 84 highlights
84 - Internet and online security botnets aren't even aware that their computer's security has become compromised! What to do if you're infected: If you're infected you probably don't realize it as bots are notoriously quiet. Your Internet Service Provider might send you a notification alerting you that they found a threat on your network and that you need to remove the bot. If you have a bot, use internet security software like Norton Security to scan all of your devices. Viruses/Malware "Virus" is the commonplace word for all malicious software programs for years now; however, a virus is just one type of malicious threat. A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs. What to do if you're infected: Take steps to avoid infection by staying protected with internet security software like Norton Security. If you subscribed to Norton Security and think you may have a virus, contact Norton's on-call technicians to help eliminate the virus. Take special precautions when using public Wi-Fi Public Wi-Fi is available just about everywhere, from the local coffee shop to the hotels and airports you visit while traveling. While public Wi-Fi has made our lives a little easier, it also poses security risks to the personal information available on our laptops and smartphones. A virtual private network (VPN) gives you online privacy and anonymity by creating a private network from a public internet connection. VPNs mask your internet protocol (IP) address so your online actions are virtually untraceable as well as secure. One of the biggest security risks on public Wi-Fi are man-in-the-middle attacks (MITM). These attacks are akin to eavesdropping. Data is sent from point A (computer) to point B (server/website), and an attacker can get in-between these transmissions. They then set up tools programmed to "listen in" on transmissions, intercept data