Changes for page Bezpečnost

Last modified by Denisa Wernerová on 29.08.2017 12:42

From version 1.2
edited by vyv0010
on 20.04.2015 11:13
Change comment: There is no comment for this version
To version 1.3
edited by vyv0010
on 20.04.2015 11:17
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -2,23 +2,23 @@
2 2  
3 3  Antivirus - antivirus protection
4 4  
5 -**[[Antivirus - antivirus protection>>url:http://idoc.vsb.cz/en/okruhy/cit/pc/bezpecnost/antivir/]]**
5 +**[[Antivirus - antivirus protection>>pc.antiviry]]**
6 6  Antivirus - antivirus protection on University computers. Instalation of antivirus program on the computers owned by VSB-TU Ostrava.
7 7  
8 8  Windows update and Firewall
9 9  
10 -**[[Windows update and Firewall>>url:http://idoc.vsb.cz/en/okruhy/cit/pc/bezpecnost/aktualizace/]]**
10 +**[[Windows update and Firewall>pc.aktualizace]]**
11 11  Updates are repairs of security, the newest files of help, drivers etc. which computer needs. Firewall prevents unauthorized users from gaining access to the computer via Internet or the network.
12 12  
13 13  Malicious software, SPYWARE, ADWARE, PHISHING, how to deal with infected computer, prevention.
14 14  
15 -[[Fraudulent messages PHISHING>>url:http://idoc.vsb.cz/en/okruhy/cit/pc/bezpecnost/phishing/]]
15 +[[Fraudulent messages PHISHING>>pc.phishing]]
16 16  These are fraudulent e-mail attacks with goal to elicit personal information like login information to accounts, card PIN etc. from user.
17 17  
18 -**[[I have infected computer, what should I do?>>url:http://idoc.vsb.cz/en/okruhy/cit/pc/bezpecnost/mam_zavir_pc/]]**
18 +**[[I have infected computer, what should I do?>>pc.zavir-pc]]**
19 19  What should you do when you have infected computer. Who to contact, what to use to clean the computer.
20 20  
21 -**[[Prevention - how to secure the computer>>url:http://idoc.vsb.cz/en/okruhy/cit/pc/bezpecnost/prevence/]]**
21 +**[[Prevention - how to secure the computer>>pc.prevence]]**
22 22   Prevent the intrusion of malicious software into your computer. What is necessary to follow, what is suitable for securing the computer. Or don't you mind leaks of passwords, account numbers, contacts etc.?
23 23  
24 24