1) A password is a string of characters used to
verify the identity of a user during the authentication process. Passwords are ordinarily
utilized as a part of conjuncture with a username; they are intended to be known just to the client and enable that
client to access a gadget, application or site. Passwords can vary in
length and can contain letters, numbers and special characters. Different terms that can be utilized conversely
are passphrase for when the secret word utilizes in excess of single word, and
pass-code and passkey for when the watchword utilizes just numbers rather than
a blend of characters, such as a personal identification number.
Setting up a password
1) Choose a password that no one will easily guess or hack.
Don't
use a word or phrase of special importance to you—like a birthday or family
member. That's the kind of information that can be discovered by someone doing
a little digging.
2) Do not share passwords.
This is an open invitation to your online accounts, and it's
often exploited to accomplish online identity theft.
3) Make sure your
password is long. It should be at least
eight-to-10 characters long, and longer passwords are even more secure. A
few locales or applications may confine the watchword length, be that as it may.
![]() |
Fig-1
4) Use at least one
capital letter and one lowercase letter in your password.
The capital and lowercase letters should not be grouped
together blending them up makes the secret key harder to foresee. This
sort of methodology may prompt "JeCaMiJe_" in the main case or
"HouseOnSpooner#1500" in the second case.
Fig-2
5) Use spaces in your password.
Many password systems don't allow actual spaces, in any case, it
can be helpful to embed one into the center of a secret key with frameworks
that do. Then again, an underscore "_" or two can serve a comparative
capacity.
Fig-3
You can use similar base words to help you remember your
passwords easily without making them too easy to crack. So
"JeCaMiJe_" may be altered as "my children JeCaMiJe,"
"HouseOnSpooner#1500" may progress toward becoming "1500*my
first House on Snooper."
7) Make sure your
password is written down and kept in a safe place.
Choose a location away from your computer (and from
prying eyes), but make sure you can easily access it. if you forget your
password, you can retrieve it without much trouble.
Fig-4
When
recording your watchword, consider coding it with a counterbalance example to
make your secret key more troublesome for others to unravel. Accordingly
ri7%Gi6_ll may be composed as 2tk9&Ik8_nn. This
would mean that each subsequent coded character is two alphabetical letters or
numbers greater than the actual password character.
3) A data backup is the result of copying or archiving files and folders for the purpose of being able to restore them in case of data loss. Data loss can be caused by many things ranging from computer viruses to hardware failures to file corruption to fire, flood, or theft etc. 1) Connect an external hard drive to your Windows computer• Your external hard drive must be formatted for use with a PC for this to work•You can also use a high-capacity flash drive for this step. 2) Open Start• Click the Windows logo in the bottom-left corner of the screen. 3) Open Settings• Click the gear-shaped icon in the lower-left side of the Start. 4) ClickFig-1 5) Click the Backup tab.• It's in the upper-left side of the Update & Security page. Fig-2 6) Click Add a drive.• This is at the top of the page. A drop-down menu will appear.7) Select your external drive.• Click your external drive's name in the drop-down menu. This will set it as your PC's backup drive.8) Click More options.• It's a link below the "On" switch near the top of the page.Fig-3 9) lick Back up now.
• This option is in the upper-left side of the page. Doing as such will provoke Windows to gather the backup and start stacking it onto your external drive.
• You may need to click Back up now several times previously your drive will begin backing up. 10) Wait for your backup to complete.• You'll see a "Backup completed" notification in the bottom-right corner of your screen once the backup finishes,and soon thereafter you can launch and evacuate the outer hard drive.Fig-4 2) Downloading materials from email
E-mail
security is about a lot more than just using a good password on your POP or
IMAP server. Perhaps the most important part of e-mail security is ensuring you
don't shoot yourself in the foot. There's a lot of information out there
about securing your e-mail. Much of it is advanced and doesn't apply to the
typical end user. Configuring spam filters such as spam assassin, setting
up encrypted authentication on mail servers, and e-mail gateway virus scanner
management are not basic end-user tasks.
If you have a mail client such as Microsoft Outlook or Mozilla Thunderbird that can render HTML e-mails, you should configure it to render only simplified HTML rather than rich HTML - or "Original HTML," as some clients label the option. Even better is to configure it to render only plain text. When rendering HTML, you run the risk of identifying yourself as a valid recipient of spam or getting successfully phished by some malicious security cracker or identity thief.You do not want some malicious security cracker listening in on your authentication session with the mail server. Somebody who does this would then be able to send messages as you, get your email, and by and large reason a wide range of issues for you (including spammers). Check with your ISP's approaches to decide if authentication is scrambled and even how it is encrypted.Know about both your virtual and physical surroundings when conveying by means of email. Be cautious. Trust nobody that you don't completely need to trust, and perceive the perils and potential outcomes of that trust. Even if the e-mail account itself is not compromised, your computer may be if you do not take reasonable care with how you deal with e-mails - and that, in turn, can lead to affecting both you and others adversely as well.3)Why we need to backup data?Hardware Failure Inevitably, your hard drive will die, and even an external hard drive isn’t safe from viruses or external destruction like water or drop damage. the average lifespan of a decent bad hard drive is 5-6 years, which is scarcely enough time to fill it with information. •
Fig-1
Virus/HackersSoftware issues are another reason why computer back up is necessary. virus can be downloaded unintentionally without anyone else's input, relatives or perniciously sent to users in your office. When they grab hold, it can be hard to have them evacuated without harming your current databases.
Fig-2
Hackers also implant viruses in order to gather important information, usually credit card numbers, passwords, or other classified information that can be used against you or your business.While there are moves you can make if your PC is hacked, going down your PC will secure your private data and furthermore give you an additional level of barrier against programmers hoping to take your data or personality.
Theft
• While hackers steal digital information, thieves will have no problem stealing actual computers, smart phones, hard drives, or even servers from homes, businesses, or storage facilities.
Fig-3
• Indeed, even with encryption codes and passwords, the most skilled thieves will just dismantle your PC or telephone and offer the parts. Once stolen, it is unlikely you’ll ever see it again. If you back up your data to an external space such as the Cloud, despite everything you'll have the capacity to get to it regardless of whether your PC is stolen, and you'll have the capacity to re-download the data to your new programming and hard drives.
|