{"id":322,"date":"2022-12-08T22:27:32","date_gmt":"2022-12-08T22:27:32","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jb23435\/?p=322"},"modified":"2022-12-08T22:27:51","modified_gmt":"2022-12-08T22:27:51","slug":"how-you-can-tell-if-your-computer-is-safe","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/jb23435\/2022\/12\/08\/how-you-can-tell-if-your-computer-is-safe\/","title":{"rendered":"How you can tell if your computer is safe"},"content":{"rendered":"\n<p>Most people do not realize is that unless they are consistently running security checks and updating their firewalls and security systems, they are at risk of someone accessing their private information.  Companies regularly hire hackers to test their security for them.\u00a0 There is no way to know if a computer is safe with one look. If you don\u2019t test your security, you might have been at risk of having a wrong setting active or unpatched flaws \/ viruses and you might never know it. It takes several steps or even software to determine if the computer is secure. However, there is a definite way to answer whether the computer is safe or not through a set of questions and software. \u00a0Companies regularly hire hackers to test their security for them. Fortunately, you can do it yourself for free. These are ways hackers go about downloading viruses and scams onto your PC so that anytime they would want to, they can go and access any information you have on your PC, including any saved passwords and websites you might frequently visit. One way you could also figure out if your computer has any viruses or programs that should not be there is to recall any websites you may have gone onto that could have been on the fishier side or got a pop up about your computer being at risk and clicked on it. Software like Norton would notify its user if there were an attack on the user\u2019s computer. They check each file and track incoming and outgoing traffic.  It\u2019s usually the hash and the file\u2019s code to determine if the file is malicious. Known attack hash and signatures are kept in a database and compared to the user\u2019s file hash or code and decide whether it\u2019s harmful. In doing so, the software can prevent attacks on the user\u2019s computer. In doing so, they are checking if a known attack will happen. Most of the attacks have signatures on them. A file containing an exploit would be read but not executed. The firewall keeps your computer from being seen and targeted online, and even if they do find your computer, the firewall helps to repel any attempts they could make to access it.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most people do not realize is that unless they are consistently running security checks and updating their firewalls and security systems, they are at risk of someone accessing their private information. Companies regularly hire hackers to test their security for them.\u00a0 There is no way to know if a computer is safe with one look&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jb23435\/2022\/12\/08\/how-you-can-tell-if-your-computer-is-safe\/\">Read More<\/a><\/div>\n","protected":false},"author":24719,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/posts\/322"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/users\/24719"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/comments?post=322"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/posts\/322\/revisions"}],"predecessor-version":[{"id":323,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/posts\/322\/revisions\/323"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/media?parent=322"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/categories?post=322"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jb23435\/wp-json\/wp\/v2\/tags?post=322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}