2023/10/18

SECCURITY ISSUES 2

   PROBLEMA :

5. my mobile phone is asking me to install my operating system update but I do not feel like to do so… Do you think it is really important to update it, why?


FAKE SOFTWARE UPDATE

A fake software update is a notification that tells users they need to urgently update software on their device. When they click on the update link on a landing page, they unwittingly introduce malware into their device


https://www.nbcnews.com/tech/tech-news/fake-software-update-turns-computers-cryptocurrency-miners-n919691

https://forums.malwarebytes.com/topic/169086-android-fake-software-update-cannot-remove-it-for-some-reason/

https://www.geoedge.com/university/fake-software-update/

5 SECURITY TIPS

1. Install anti-virus and anti-spyware software.

Anti-virus and anti-spyware programs scan computer files to identify and remove malware. Be sure to:

-Keep your security tools updated.

-Immediately remove detected malware.

-Audit your files for missing data, errors, and unauthorized additions.

2. Use secure authentication methods.

The following best practices help keep accounts safe:

-Require strong passwords with at least eight characters, including an uppercase letter, a lowercase letter, a number and a symbol in each password.

-Enable multi-factor authentication, such as a PIN or security questions in addition to a password.

-Use biometric tools like fingerprints, voiceprints, facial recognition and iris scans.

-Never save passwords on a computer or network. Use a secure password manager if needed

3. Use administrator accounts only when absolutely necessary.

Malware often has the same privileges as the active user. Non-administrator accounts are usually blocked from accessing the most sensitive parts of a computer or network system. Therefore

.-Avoid using administrative privileges to browse the web or check email.

-Log in as an administrator only to perform administrative tasks, such as to make configuration changes.

-Install software using administrator credentials only after you have validated that the software is legitimate and secure.

4. Keep software updated.

-Regularly update your operating systems, software tools, browsers and plug-ins.

-Implement routine maintenance to ensure all software is current and check for signs of malware in log reports

5. Control access to systems

-Install or implement a firewall, intrusion detection system (IDS) and intrusion prevention system (IPS).

-Never use unfamiliar remote drives or media that was used on a publicly accessible device.

-Close unused ports and disable unused protocols.

-Remove inactive user accounts

-Carefully read all licensing agreements before installing software

QUESTIONARIE OF YOUR FAVOURITE TIP 


👉👈

2023/10/17

SECURITY ISSUES 1


THE PROBLEM IS : 

3- I have opened an email sent by a friend and clicked on a link that looked legitimate and harmless. Onci opened the attachment, it automatically downloads software to my computer. I do not know what has happened and how to fix it


MALICIOUS LINKS

Malicious links are Phishing attacks often involve creating fake links that appear to be from a legitimate organization. These links may use misspelled URLs or subdomains to deceive the user

https://experteq.com/what-is-a-malicious-url-and-how-do-we-protect-against-them/

https://www.clearnetwork.com/malicious-urls/

https://cheapsslsecurity.com/blog/what-is-a-malicious-url/

5 TIPS TO PREVENUE A MALICIOUS LINK


1. Check Who Sent the Email And To Whom

Malicious links are often found in messages sent from questionable accounts and to a large number of people. This means that you need to check who sent the message and to whom. If the addresses and list of recipients look suspicious or unfamiliar, it probably is and you shouldn’t click on anything in it.

 

2. Be Wary Of The Subject Line

If an email subject line looks sketchy and doesn’t match up with the content in the email, it is probably best to delete it. Therefore, make sure to double-check the source and subject line of the email to make sure it isn’t a phishing attempt

 

3. Check The Content

As we mentioned above, it’s important to check the content of any email you receive that seems even slightly suspicious. Often, in the case of phishing, the email will be attempting to mimic another company that you regularly interact with, so check for any misspellings, especially in the sender’s email address

Other things to look out for include bad grammar and language that doesn’t make sense. This could mean the content was automatically generated for a large-scale phishing scam

 

4. Scrutinize Hyperlinks And Attachments

As a general rule, don’t click any links or open any attachments unless you are absolutely sure who you are receiving the email from.

Many people have been lured into thinking that they are interacting with their bank, when in fact the hyperlinks and/or attachments have contained malware or are attempts to steal their personal information.

However, this can also happen with senders that you know. If you weren’t expecting an attachment or the sender doesn’t usually attach files, it’s best not to click on them ,especially PDF and ZIP files

One easy way to check for dubious hyperlinks is to hover your mouse over the link. If there are misspelled words, a lot of text and numbers, and the link doesn’t quite match up to the hyperlink content, it’s probably a phishing scam

 

5. Be Aware Of The Date And Time

Since many phishing attempts are carried out at scale, it means they will often be sent at odd hours., it’s a good idea to check the date and time of the message


QUSTIONNAIRE OF THE BEST TIPS


RESULTS

👉👈

2023/10/10

PC COMPONENTS

 


Hello, I'm Jose and i have 15 years. I'm going to describe and name all the components that need to do a PC.
What is a PC?

A PC is a computer or computer. , which is connected to the electrical current and is always kept in the same place. A PC is made up of several components that make the PC work. Some of its basic components are the processor, the motherboard, the power supply; RAM, hard drive and add-on cards.
LIST OF ALL THE COMPONENTS FOR A PC












Icono de Validado por la comunidad





POWER SUPPLY

 Power supply

A power supply is an electrical device that offers electric power to an electrical load such as laptop computer, server, or other electronic devices. The main function of a power supply is to convert electric current from a source to the correct voltage, current, and frequency to power the load.Power supplies generally refer to generators, power plants, batteries, and solar cells (photovoltaic cells). This section describes the basic knowledge of power supply units (power supply circuits) that convert power into suitable power used for electrical appliances


👉👈








HARD DRIVE






                                                                         HDD


A hard disk drive (HDD) is an internal or external computer component that stores data, such as the operating system, applications, and user files.HDDs are “non-volatile” storage devices, meaning they retain stored data even when power isn't being supplied. The platter and the actuator arm are delicate physical mechanisms, so a solid case covers them to prevent damage under normal use. The hard drive cover will look like a metal box, and it will be clearly labeled as a hard disk drive or HDD. Here's what an internal HDD looks like beneath its metal casing. You can see the spinning platter and the actuator arm, and how they work together to read and write the data upon request.

👉👈


CLICK HERE TO PURCHASE A HARD DRIVE








RAM

                                                                 RAM

RAM (Random Access Memory) is the hsrdwere in a computing device where the operating system (OS), application programs and data in current use are kept so they can be quickly reached by the device's processor. RAM is the main memory in a computer. It is much faster to read from and write to than other kinds of storage, such as a hard disk drive (HDD), solid-state drive (SSD) or optical drive

Because of its volatility, RAM can't store permanent data. RAM can be compared to a person's short-term memory, and a hard disk drive to a person's long-term memory. Short-term memory is focused on immediate work, but it can only keep a limited number of facts in view at any one time. When a person's short-term memory fills up, it can be refreshed with facts stored in the brain's long-term memory. A computer also works this way. If RAM fills up, the computer's processor must repeatedly go to the hard disk to overlay the old data in RAM with new data. This process slows the computer's operation


👉👈



CLICK HERE TO PURCHASE A RAM


GRAPHIC CARD


                                                          Graphic card :


Graphics card
 is a hardware which is used to increase the video memory of a computer, and make its display quality more high-definition. It makes the computer more powerful and gives it the capacity to do more high-level works. The quality of the image depends on the quality of the graphics card. It is very much important for gaming and video editing on a PC. Every game needs a graphics memory to start and it depends on the type of the game, and the requirements are mentioned on the game box

👉👈


MOTHERBOARD

 

                                                          MOTHERBOARD                                                           

: computer’s motherboard is typically the largest printed circuit board in a machine’s chassis. It distributes electricity and facilitates communication between and to the central processing unit (CPU), random access memory (RAM), and any other component of the computer’s hardware. There is a broad range of motherboards, each of which is intended to be compatible with a specific model and size of the computer.

Since different kinds of processors and memories are intended to function best with certain types of motherboards, it is difficult to find a motherboard that is compatible with every type of CPU and memory. Hard drives, on the other hand, are generally compatible with a wide variety of motherboards and may be used with most brands and types



👉👈

PROCESSOR

                                                                Processor 

A processor, also known as a central processing unit (CPU), is a small but mighty electronic chip that serves as the brain of a computer. The processor receives instructions from various apps, interprets them, performs calculations and manages data flow. Your processor is pulling the strings and making everything happen.

A processor's primary function is executing instructions (often in binary code) sent to it from software programs. These instructions include all kinds of of tasks, from basic arithmetic to complicated data manipulation. To put it another way, it makes everything work the way it should. The processor fetches an instruction,memory decodes it to understand the task, performs calculations, and then puts the result back in memory. This lightning-fast process occurs billions of times per second, allowing your computer to perform tasks with incredible speed

👈



https://www.pccomponentes.com/intel-core-i7-13700kf-34-ghz-box?campaigntype=eshopping&campaignchannel=shopping&gclid=Cj0KCQjwj5mpBhDJARIsAOVjBdqlx853PXQKMwuGhwLZFNnZB791sqNA5a7BdrZCT0zPjNcpTLK1n2kaAkcvEALw_wcB