2021-2022
SECURITY MEASURES
FOR YOUR COMPUTER
Marina Martínez Cocoví
ÍNDEX
01 STRONG PASSWODS.................................................. pg.1
02 ANTIVIRUS .................................................................. pg. 2
03 SPAM OR PHISHING ................................................. pg. 3
03.1 CREATE FILTRES ....................................................... pg. 4
03.2 MARKS SPAM ............................................................ pg. 4
04 COOKIES ....................................................................... pg. 5
05 ANTIMALWARE ....................................................... pg. 6
06 CONCLUSION .............................................................. pg. 7
1.-STRONG PASSWORDS
The strong passwords is an extension or application where you can save the passwords of the different
applications, in a secure way, so that you don't have to remember them. Below I will show you how to
install the True Key by McAfee extensión.
1.- We do a google search and click on the page I show
you in the screenshot below
2.- Once inside, click on download extension and
install.
3.- Now we will proceed to open the application and
register.
4.- After downloading it, I registered and then it gave
me the option to save my passwords for many types
of applications such as Netflix, facebook, google, avast,
etc.
QUESTIONS
I don't think it's necessary, everyone uses their own methods. I think that having the passwords
saved in a program inside the computer is a mistake because they can be broken or viruses or
anything can enter, I'm more old-fashioned and I keep them in a physically well kept place.
In general I use the same user for almost all applications, especially social networks which is
Maartiineez06 (never busy), for other platforms if I don't use that user, I put my full name.
I have established 4 different passwords and in all my accounts I use one of them. But I want to
clarify that for the important things I don't use the same ones but I vary between those 4, in case they
find out one that they can't "take away" all the important things.
1
2.-ANTIVIRUS
The antivirus that I have had for a long time is
AVAST ANTIVIRUS, which is free of charge. The
basic antivirus performs the following functions:
1.-Studies files
2.-Analyses the applications in case of suspicious
behaviour.
3.-Blocks web attacks and dangerous downloads.
4.-Blocks dangerous email attachments.
In addition to Network Inspector (see if my wifi
network is safe and the devices that are around), it
has firewall, ransomware shield and quarantine
which is a window where you can put the pages
that you think are dangerous for your computer.
In addition to Network Inspector (see if my wifi
network is safe and the devices around it), it has
firewall, ransomware shield and quarantine which
is a window where you can put the pages you think
are dangerous for your computer.
The screenshot on the right shows that my
antivirus is programmed to update itself only when
there is an update, although as it has to restart the
device it asks me for permission.
To find out if it was automatic, I went to the
antivirus settings in the general settings section
and the screen shown in the screenshot appears.
This last screenshot shows that I have carried out
the analysis. To do this I went into the application
and as it opens in the same tab there is a button
that says perform analysis, click on it and it does it.
2
3.-SPAM OR PHISHING
I have chosen this email because I have it marked as spam, as it is an email that was sent to me
without having signed up for anything and well I think it is the type of email that makes you think that
you win a phone, tablet, scooter, etc. when they are really scams / phishing.
N.º 01 —
Loing in to your mailbox
N.º 02 —
Go to Spam section
When you go into the mailbox, it comes
straight to the inbox. You will find the Spam
section on the left-hand side. If you do not
see this section, scroll down the bar.
N.º 03 —
Select an email from this
section
3
3.1.-CREATE FILTERS
Filters are used to classify Gmail directly, i.e. if you set a filter that X mail goes directly to trash,
spam, label, etc... it will do it directly.
To create a filter, click on the icon on the right hand
side of the search bar. Then we will write the email
of the person or entity we want to filter in the DE
section, once written we press the button "create
filter" located in the lower right part of the sale.
When you click another window appears to select
where you want the filter to be set (where you want
the email to go directly), it can be directly to the trash,
to the spam folder, any folder created by you, etc.
3.1.-MARK SPAM
Unlike the filter, marking as spam only marks
that email that we have selected.
N º 1 - Select the e-mail we want to mark.
N º 2 - Click on the right button and a tab
opens.
N º 3 - Click on the "move to" option.
N º 4 - Select SPAM
4
4.-COOKIES
Cookies are created to identify you when visiting a new website. The web server sends
a short stream of identifying info to your web browser.
We open a google tab and press the three dots that are
in the top right of the window, when doing so a tab will
be displayed in which we will look for the "settings" part
and we press it.
In the window that opens, on the left-hand side there is
a section called "Privacy and security", click on it and
then go to the section "Cookies and other site data".
Once inside you will be able to view, modify and reset
your cookie settings.
Please note: Third-party cookies make your information available to all servers that use
those cookies, making your information more vulnerable.
5
5.-ANTIMALWARE
Antimalware is a type of software designed to prevent, detect and remediate malicious software
(programs, operating systems, etc.) on computing devices. The terms antivirus and antimalware are
often used synonymously as computer viruses are a specific type of malware.
N.º 01 — Download anti-malware
Open google and search for malwarebyte, go to the official
website and click on download.
N.º 02 — Install anti-malware
Open the application and you will see a window like the one on
the right. Click on install and then it gives you the option to set an
extension (press yes to set it). It will then be installed.
N.º 03 — Conduct an analysis
When the installation is finished, the window will change and you
will see the same symbol as the image on the left. To perform the
analysis, click on the "Analyse" button.
N.º 03 — Complete analysis
Once the scan is complete, to root the infected items, click on the
"Done" button, it will ask you if it can send the files to
"Quarantine", click on "Accept" and the process will be finished.
6
6.-CONCLUSION
I believe that everyone should have an orientation on how to protect their
computing devices because every day we find more and stronger viruses and other
attacks that can damage our computer and, therefore, destroy all the materials we
have stored on it. Depending on the degree of the virus, there is a possibility that the
computer will become unusable and therefore we will have to buy another one, and
we have to admit that they are getting more and more expensive. For this reason, I
believe that these items are very important and interesting, especially because
nowadays technological advances are advancing by leaps and bounds.
Thank you , I hope you find it useful