Methods to Attack your Computer Information
Phishing Session hijacking Password cracking Sniffing Direct physical access to an uncontrolled machine Exploiting default accounts Social engineering Social Networking
Phishing Session hijacking Password cracking Sniffing Direct physical access to an uncontrolled machine Exploiting default accounts Social engineering Social Networking
¨Network is group of computers that are linked in order to share files and resources (such as printers and CDs), exchange files, or allow electronic communications.
POS (point of sale), at which a customer makes a payment to the merchant in exchange for goods or services A point-of-sale (POS) system, combination of POS software and hardware, it is a computer replacement for a traditional cash register. Capabilities of a POS system includes customer management, order management, inventory management, report generation, credit…
Quick tips for Password Security Use a non-dictionary password with minimum 8 characters with combination of upper & lowercase letters, numbers and alpha numeric characters. Do not reveal passwords by email or verbal & written or others Change passwords frequently at least once in 2 months Do not use the “remember password” in web browsers,…
1-2-3-4 Steps to protect your business from Email Scam Keep your laptop/PC with updated antivirus & anti-spam software Beware of password theft and frequently change your passwords Use correct web links to login to check your emails Switch to your own company emails instead of free web mails Follow us on upcoming lessons to know…