Documente Academic
Documente Profesional
Documente Cultură
Step-5:After that Microsoft send a mail password on your E-mail id and then you can set your
password that you want to set.
• Firewall configuration: -
The steps for setting password is given below:
Step-1:Go to the system settings, and select NETWORK&INTERNET..
• What is ANTIVIRUS: -
Anti-virus software is a software utility that detects, prevents, and
removes viruses, worms, and other malware from a computer. Most anti-virus programs include
an auto-update feature that permits the program to download profiles f new viruses, enabling
the system to check for new threats. Antivirus programs are essential utilities for any computer
but the choice of which one is very important. One AV program might find a certain virus or
worm while another cannot, or vice-versa.
Anti-virus software searches the hard drive and external media attached to a
computer for any potential viruses or worms. Broadly speaking, the two main approaches to virus
detection are:
• Dictionary Approach: The anti-virus software checks a file and automatically refers to a dictionary
of known viruses. If there is a match, the file is deleted, quarantined or repaired.
• Suspicious Behaviour Approach: The anti-virus software monitors the behaviour of all programs
and flags any suspicious behaviour. For example, a program might be flagged if it tries to change
settings to the operating system or write to a certain directory.
• Windows antivirus software:-Most antivirus software vendors offer several levels of Windows
products at different price points, starting with free versions offering only basic protection.
Users must start scans and updates manually and typically free versions of antivirus software
won't protect against links to malicious websites or malicious attachments in emails. Premium
versions of antivirus software often include suites of endpoint security tools that may provide
secure online storage, ad blockers and file encryption.
• macOS antivirus software:- Although macOS viruses exist, they're less common than Windows
viruses, so antivirus products for macOS are less standardized than those for Windows. There
are a number of free and paid products available, providing on-demand tools to protect against
potential malware threats through full-system malware scans and the ability to sift through
specific email threads, attachments and various web activities.
• Android antivirus software :- Android is the world's most popular mobile operating system and
is installed on more mobile devices than any other OS. Because most mobile malware targets
Android, experts recommend all Android device users install antivirus software on their
devices. Vendors offer a variety of basic free and paid premium versions of their Android
antivirus software including anti-theft and remote-locating features.
Step-1 :- If you purchased the antivirus program from a retail store, insert the CD or DVD into the
computer's disc drive. The installation process should start automatically, with a window opening to
help guide you through the install process.
--Run the Avast Setup File (Installer) and Select Installation Type
Step-2:-Actual Avast Installation Process:
During the second step, you actually do not have to do anything. You can just sit and watch the progress
bar show Avast being downloaded, creating a system restore point, and the Avast files being copied
onto your computer. The installation process will take around 2-3 minutes, depending on your Internet
connection, but you can use your computer and do any other activity.
What is VPN: -
a VPN (virtual private network) is a security solution that grants users secure
and private access to the internet. It accomplishes this by redirecting data through an
anonymous server designed to hide the sensitive user information.
How Does a VPN Work?
To understand how VPNs work, it would be best to first take a good look at what happens during a
standard connection to the internet and its inherent flaws:
While the above graphic might seem to be an oversimplification, the idea that you are basically leaving
sensitive data “out in the open” is fairly accurate. There are no safeguards for whatever information you
are sending online. This means that anyone who knows what they are doing can simply swoop in and
grab your sensitive information: personal data, passwords, credit card numbers; you get the picture.
The internet is home to millions of servers, with each one responsible for hosting one or several websites
(shared servers). These servers transmit data to users that need access to them as well as talk and share
information with other servers. This arrangement works well for accessing and sharing information over
the internet quickly and efficiently but not so much when it comes to privacy.
Now, if you are simply surfing the web as a leisure activity and not doing anything particularly
important, then there is no reason to worry. However, if you are dealing with data that is potentially
valuable (online banking information, business emails, online transactions, and the like), then you will
want to consider using an added layer of protection, which is precisely what a VPN offers.
Simply put, the destination server will see only the VPN server as the source of the data request,
which, in turn, hides the real IP address of the VPN user. The process is designed in such a way that it
is extremely difficult (if not impossible) for outsiders to pinpoint specific users as the source of any
online activity. Any data intercepted between the user and the VPN server is heavily encrypted and
practically useless to third parties.
Step 3: Open Windows Defender’s settings, and then click on the "Virus & Threat Protection settings"
link.
Step 4: Click the Real-Time Protection, Cloud-Delivered Protection and Automatic Sample
Submission switches to turn Windows Defender off.
• Access Control:
What is access control:
Access control is a way of limiting access to a system or to physical or virtual resources. In
computing, access control is a process by which users are granted access and certain privileges
to systems, resources or information.
In access control systems, users must present credentials before they can be granted access. In
physical systems, these credentials may come in many forms, but credentials that can't be
transferred provide the most security.
• To turn UAC off, drag the slider down to Never notify and click OK.
• To turn UAC on, drag the slider up to the desired level of security and click OK.
Step 4: You may be prompted to confirm your selection or enter an administrator password.
Step 5: Reboot your computer for the change to take effect.