Last modified by Denisa Wernerová on 23.08.2024 13:14

From version 7.2
edited by Denisa Wernerová
on 11.06.2024 10:56
Change comment: There is no comment for this version
To version 7.3
edited by Denisa Wernerová
on 23.08.2024 13:14
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -11,7 +11,7 @@
11 11  1. Use safe communication protocols SSH, HTTPS (they don't transfer password in open form). For other protocols, e.g. POP3 and IMAP for email, use SSL (Secure Socket Layer).
12 12  1. Higher attention to visited websites, opened links and email messages etc.
13 13  1. Caution when downloading software, application plugins etc..
14 -1. Many attack are directed to users of MS Internet Exploreru, try to use e.g. browsers (free download) [[Mozilla Firefox>>url:http://www.czilla.cz]], [[Google Chrome>>url:http://www.google.com/chrome]] or [[Opera>>url:http://www.opera.com]].
14 +1. Many attack are directed to users of MS Internet Exploreru, try to use e.g. browsers (free download) [[Mozilla Firefox>>https://www.firefox.cz/]], [[Google Chrome>>url:http://www.google.com/chrome]] or [[Opera>>url:http://www.opera.com]].
15 15  1. Consider change of rights of your account from administrator to user in the group USERS, it will limit application installations but also undesirable software. You can do the change via// //**Start → Settings → Control Panels → User accounts → Your account → Change type of account →** choice **With limited access**.
16 16  1. Regularly do backups of your data for case of reinstalation of the computer. Do the backup preferably to another physicall disk or other media (USB disk, CD/DVD). In case of infection of data and their healing by deleting you will have them in backup.
17 17  1. Educate yourself on computer security, viruses and attack are becoming increasingly sophisticated.