Sunday, April 26, 2020

Best internet security?

Bryant Pillitteri: comodo internet security is the best one

Arlen Hamper: he can hack many governments or corporations very easily like the hackers on the movie hackers(1995) do?

Florencia Manolakis: As in, when you put more than one app in a group (such as notes, calendar etc) is there any way i can password protect just this with a numerical or non-numerical password?

Jefferson Sarson: a great program for you is Norton 360 v. 6,one of the best tested by Malware Research Group in tests on line banking 2011.

Clement Viscarro: I would suggest you to go for Comodo Internet Security ,which was the ONLY product rated Excellent, and the ONLY product recommended to consumers. For the third time in three years, Matousec's Proactive Security Challenge hails a Comodo Internet Security Product as No. 1.

Vince Delarge: 2

Loriann Carrigan: Unfortunately, viruses and other attacks on the internet are increasing day today, These collectively known ! as malware , Which is the basic cause of internet fraud or scams today. Before going in details it is important to know that how internet fraud happens and what we lose in this fraud or scam. When our computer is connected to internet, then there is a hidden war this is being executed , we do not know what is going on behind the scene and the prize is our Bank Account. Do not start that way. Many computer viruses first was little more than jokes. One of the first viruses, called whimsically Elk Cloner, just to give you a poem written by the author.Vice president of marketing for Kindsight, an Ottawa based security Firm, said that . What’s changed is that the whole computer threat market has really become big business for the hackers.”There is another quote about the internet and computer security, by Ryan Naraine, journalist specializing in Internet and computer security issue. He said “People don’t realize what actually happens when their computer is infected or w! hen they click on a malicious link. They don’t always realiz! e the threats: their identity, banking credentials, social media accounts can all be compromised, all by clicking one link.From above overview we can imagine how internet security is most important thing. Security must be on top priority to be protected from internet frauds and scams. It is very good idea to have some basic knowledge and concept about different internet threats and problem which we face on the internet, sometimes we are unaware of the back-end. What is being happening, we do not concentrate on different things while using internet.Here it is important to give you some basic idea about different terminologies and their effects we must know before using internet to make our security more tight. The first term which we often see or use is Virus.What is Virus and Why it is so bad:The term “virus” is often used as a catch-all, but Symantec says that a true virus infects applications or documents. When sharing files virus infected, virus is along for the rid! e. When the file is opened, the virus infects other files on the server. If a file is infected by the virus, it may become useless and you can loose the information. If a single file of virus is present in your computer, it will never feel well, and do not perform any operation well. Viruses may also infect system files or install malicious applications. The next term is Worm. Lets have a look in detail.Worms and their infections:What It Is: As the name implies, a Trojan poses as an app or website you want, hiding its true intentions.What It Does: When you run the program, the Trojan begins carrying out its secret plan to infect your computer or steal data.Trojans harbor virtually every type of malware imaginable, from keyloggers to botnet infections. An infamous Trojan known as Zeus has delivered multiple payloads, including botnets and software that steal banking information.Botnets:Botnet is remote controlled computer network. Infection of Botnet turns your computer int! o a zombie, which allows a hacker to control your computer without your! knowledge. A botnet creates a virtual army of zombies capable of wreaking serious havoc.”Every computer is not sending a lot of emails, but if there are millions of computers botnet, which is a very spam.RootkitsWhat it is: A rootkit named because it gives a hacker “access root” to computer â€" in other words , the absolute control.What it does: While a botnet infection gives a hacker some control on your computer, a rootkit allows full control , like computer hackers belonging .Why is it bad : Difficult to detect or remove a rootkit gives a thief open access to install other malicious software or recover important files . Most people first learned about when including Sony rootkit hidden in a music CD that is installed copy protection software on the computer.Adware and SpywareAdware and Spyware are two different things. Adware displays Ads/Advertisements in application or browser and Spyware tracks your behavior. Spyware usually tracks your browsing behavior but it! can track your personal information which is dangerous.Sometimes the threat of harm to your computer is what it takes for an unscrupulous character to make a buck, and that’s exactly what these programs are about .Scareware and RansomwareScareware displays a pop-up message warning of a harmful virus running rampant in your system, then offers to save the day â€" if you buy this antivirus application right now. Ransomware is darker â€" it may encrypt your files or block access to your system, demanding payment in return for granting you full use of your own computer.Protect Yourself:Your cell phones, Computers or Laptops, Even anything which is connected to internet is at risk. Security measures are essential to take which are only possible with your knowledge. And take a layered approach to protection that includes awareness, running security software, and following best practices to avoid malware....Show more

Nelly Kikuchi: Th best free security application is off! ered by Comodo security. They offer both free and paid options but the ! free one should work fine.Free firewalls and anti virus applicationshttp://www.comodo.com/home/internet-security/free-...What's important is that you only access sensitive websites like online banking on a cable based network and never via wi-fi. You also want to make sure you type in the URL address and you see an https:// and not just an http:// in the URL bar when you access your online accounts.https:// is secured and encryptedhttp:// is notNever click a link in any emails you receive re directing you to a sensitive account because email sender address can be spoofed to trick you.Bye :)...Show more

Soraya Coodey: Yes and no. With processor power being what it is, they'd be able to do a lot of number-crunching better - so a modern system doing a brute-force password crack would go faster. And depending on what tools the hacker had prior to making the trip, they'd be able to hit a number of unpatched issues (say, in vanilla Windows 95). Basically, they'd have! prior knowledge of the "big hacks" of the day, and be able to make them work.However, most of the stuff they'd be attacking would be ancient by modern comparisons, which would make things harder. Modern, common attacks (such as XSS or SQL injection) wouldn't really be terribly useful, because the targets simply wouldn't be there. And any modern references (wiki sites, Google hacking, etc) wouldn't be available, so they'd be limited mostly to what they'd brought with them....Show more

Sheree Hipwell: Highly logical, today's computers have securities adopted to stop hackers - not 100% successful as there are always 'backdoors'. Computers in the 1995 are probably less secure as hackers are hardcore computer 'nerds'. today you can become a hacker by reading books, many softwares, tutorials etc.

Geraldo Mccalla: If your iPod Touch is jailbroken , there are apps in cydia to password protect your appsHere is one:http://www.iphonestuffs4u.com/locktopus-cydia-app-...

Riley Migl: Nortin or CIS pro (Comodo internet security pro)

Rubi Romo: After many years of using free A/V and anti malware I installed a Norton trial Internet security 2012 on my daughters and granddaughters computers.I always felt Norton was a huge resource hog but the latest version was vastly improved. So much so that after three months I have installed it on my computer which seems considerably more responsive. My choice now until something better comes along.

Sabra Roers: I use a bench computer for malware removal. Part of that entails removing entries from the software portions of the registry. I would love to be able to modify the registry of the D: drive. Is that possible?

Travis Sherrock: for what its worth i use kaspersky always have done

Brock Hladik: Never dug into Your problem - I only looked/know how to revive PCs from bootable CDs. My ideas where You can look for tools and ideas.Erd commander 2007 ( that is my first idea for something from another drive) 1.). BTW. There is a trial version since M! icrosoft took over Sysinternals but I cannot find/remember the link. And it is not very suitable for Vista.Bart's PE also has repair tools that run from CD drive. 2.)You can most likely integrate tools and ideas from that to above or Your environment.Vista PE is available free from Microsoft. 3.). It can be also used for troobleshooting. PPL integrate their own tools and You could be probably use their ideas on Your job also....Show more

Freeman Rutkin: i am running Norton internet security from 5 months on windows 7i haven't encountered any problem as i have good ram and processor (memory and speed) i would suggest you to use it if u have sufficient amount of RAMother wise go for light internet security like Avast FOR BANKING AND SHOPPING USE NORTON INTERNET SECURITY IT PROVIDES U THE BEST SECURITY FOR THOSE THINGS...Show more

Porfirio Gartland: AVG which is Free, Good for long thorough scans and detection of malware to shut webpages down(when they are d! angerous).Avast which is also Free, Great all round virus protectionIt'! s good to have more than one, there's always new viruses so you need to increase your variants...Show more

No comments:

Post a Comment