Isnin, 16 Julai 2018

P-4

1) A password is a string of characters used to verify the identity of a user during the authentication process. Passwords are ordinarily utilized as a part of conjuncture with a username; they are intended to be known just to the client and enable that client to access a gadget, application or site.  Passwords can vary in length and can contain letters, numbers and special characters. Different terms that can be utilized conversely are passphrase for when the secret word utilizes in excess of single word, and pass-code and passkey for when the watchword utilizes just numbers rather than a blend of characters, such as a personal identification number.

Setting up a password

1) Choose a password that no one will easily guess or hack. 

Don't use a word or phrase of special importance to you—like a birthday or family member. That's the kind of information that can be discovered by someone doing a little digging.

2) Do not share passwords.
This is an open invitation to your online accounts, and it's often exploited to accomplish online identity theft.

3) Make sure your password is longIt should be at least eight-to-10 characters long, and longer passwords are even more secure. A few locales or applications may confine the watchword length, be that as it may.


Fig-1


4) Use at least one capital letter and one lowercase letter in your password. 
The capital and lowercase letters should not be grouped together blending them up makes the secret key harder to foresee. This sort of methodology may prompt "JeCaMiJe_" in the main case or "HouseOnSpooner#1500" in the second case.











Fig-2



5) Use spaces in your password

Many password systems don't allow actual spaces, in any case, it can be helpful to embed one into the center of a secret key with frameworks that do. Then again, an underscore "_" or two can serve a comparative capacity.

6) Generate similar but distinct passwords for separate accounts.













Fig-3

You can use similar base words to help you remember your passwords easily without making them too easy to crack. So "JeCaMiJe_" may be altered as "my children JeCaMiJe," "HouseOnSpooner#1500" may progress toward becoming "1500*my first House on Snooper."


7) Make sure your password is written down and kept in a safe place.
 Choose a location away from your computer (and from prying eyes), but make sure you can easily access it. if you forget your password, you can retrieve it without much trouble.













Fig-4


When recording your watchword, consider coding it with a counterbalance example to make your secret key more troublesome for others to unravel. Accordingly ri7%Gi6_ll may be composed as 2tk9&Ik8_nn. This would mean that each subsequent coded character is two alphabetical letters or numbers greater than the actual password character.


3) data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss. Data loss can be caused by many things ranging from computer viruses to hardware failures to file corruption to fire, flood, or theft etc.



1) Connect an external hard drive to your Windows computer

• Your external hard drive must be formatted for use with a PC for this to work
•You can also use a high-capacity flash drive for this step.


2) Open Start 

Image titled Windowsstart.png

• Click the Windows logo in the bottom-left corner of the screen.


3) Open Settings 

Image titled Windowssettings.png

• Click the gear-shaped icon in the lower-left side of the Start.


4) Click 

Image titled Windows10 Update.png

 • Update & Security. You'll find this option in the Settings window.








Fig-1



5) Click the Backup tab.


• It's in the upper-left side of the Update & Security page.











Fig-2


6) Click Add a drive.

• This is at the top of the page. A drop-down menu will appear.


7) Select your external drive.

• Click your external drive's name in the drop-down menu. This will set it as your PC's backup drive.

8) Click More options. 

• It's a link below the "On" switch near the top of the page.











Fig-3


9) lick Back up now. 

• This option is in the upper-left side of the page. Doing as such will provoke Windows to gather the backup and start stacking it onto your external drive.

• You may need to click Back up now several times previously your drive will begin backing up.


10) Wait for your backup to complete. 

• You'll see a "Backup completed" notification in the bottom-right corner of your screen once the backup finishes,and soon thereafter you can launch and evacuate the outer hard drive.








Fig-4



2)  Downloading materials from email

E-mail security is about a lot more than just using a good password on your POP or IMAP server. Perhaps the most important part of e-mail security is ensuring you don't shoot yourself in the foot. There's a lot of information out there about securing your e-mail. Much of it is advanced and doesn't apply to the typical end user. Configuring spam filters such as spam assassin, setting up encrypted authentication on mail servers, and e-mail gateway virus scanner management are not basic end-user tasks.

 If you have a mail client such as Microsoft Outlook or Mozilla Thunderbird that can render HTML e-mails, you should configure it to render only simplified HTML rather than rich HTML - or "Original HTML," as some clients label the option. Even better is to configure it to render only plain text. When rendering HTML, you run the risk of identifying yourself as a valid recipient of spam or getting successfully phished by some malicious security cracker or identity thief

You do not want some malicious security cracker listening in on your authentication session with the mail server. Somebody who does this would then be able to send messages as you, get your email, and by and large reason a wide range of issues for you (including spammers). Check with your ISP's approaches to decide if authentication is scrambled and even how it is encrypted.

Know about both your virtual and physical surroundings when conveying by means of email. Be cautious. Trust nobody that you don't completely need to trust, and perceive the perils and potential outcomes of that trust. Even if the e-mail account itself is not compromised, your computer may be if you do not take reasonable care with how you deal with e-mails - and that, in turn, can lead to affecting both you and others adversely as well.



3)Why we need to backup data?


Hardware Failure 
Inevitably, your hard drive will die, and even an external hard drive isn’t safe from viruses or external destruction like water or drop damage. the average lifespan of a decent bad hard drive is 5-6 years, which is scarcely enough time to fill it with information.






Fig-1



Virus/Hackers

Software issues are another reason why computer back up is necessary. virus can be downloaded unintentionally without anyone else's input, relatives or perniciously sent to users in your office. When they grab hold, it can be hard to have them evacuated without harming your current databases.












Fig-2


Hackers also implant viruses in order to gather important information, usually credit card numbers, passwords, or other classified information that can be used against you or your business.While there are moves you can make if your PC is hacked, going down your PC will secure your private data and furthermore give you an additional level of barrier against programmers hoping to take your data or personality.

Theft

• While hackers steal digital information, thieves will have no problem stealing actual computers, smart phones, hard drives, or even servers from homes, businesses, or storage facilities.










Fig-3


• Indeed, even with encryption codes and passwords, the most skilled thieves will just dismantle your PC or telephone and offer the parts. Once stolen, it is unlikely you’ll ever see it again. If you back up your data to an external space such as the Cloud, despite everything you'll have the capacity to get to it regardless of whether your PC is stolen, and you'll have the capacity to re-download the data to your new programming and hard drives.











Tiada ulasan:

Catat Ulasan

M-1 Non delivery of message

M-1 1) Non delivery of message video of non delivery of message from the email and the solution also been shown in the above video...