Charm City

Sailing in the Inner Harbor. Artscape festival in Mt. Royal. A quirky coffee shop. Old Bay. Vaccaro's delicious cannoli's in Little Italy. Cobble stone streets. Movies at the Senator. Hollins Market. Charles Village colorful homes. Penn Station. Books from the Pratt Library. The American Visionary Art Museum. Patterson Park. Baseball at Camden Yards. Crab cakes at Lexington Market. Natty Beer.

For these reasons and so much more, I love Baltimore. I have fallen in love with Charm City and my feelings are simply unexplainable. It's something between me and the city- 'My City'. I love how it maintains keeping it's past identity but also strives to create something new. But most of all I love the feeling I get when I drive into Baltimore City and how it welcomes me back. This city is my new home- my home away from home. All my memories from it are now a part of it's history forever. So, to Baltimore, 'My Lady B!'

And now I share my love for Baltimore with you...

Sunday, March 18, 2012

Are Baltimoreans Computers' Secure?

Computer Security

Computer security, also known as information security, is a branch of computer technology that applies to computers and networks. The objective of computer security is to protect information and property from theft, corruption, or natural disaster, while still allowing the information and property to remain accessible to the user. Computer system security is the processes and mechanisms which protects sensitive plus valuable information and services from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events. Computer security strategies differ from most other computer technologies because the objectives are polar opposite. The purpose of computer security is to prevent unwanted computer behavior instead of enabling wanted computer behavior like general computer technology aims to do.

Computers are very important devices which most of us cannot live without. Subsequently, our PC computer security is just as important or maybe more. There are numerous examples of individuals who have reported being affected by computer security such as: emails, websites or other online accounts being hacked, and other ways their computers have been invaded. While making use of a computer, it is vital to ensure maximum computer security. It is good to always remember that as long as there can be a security breach, there can be security. Therefore, all computer users should follow a couple key steps in order to protect themselves from hackers.

Step 1) Update Your Computer
The first step to ensure computer, and Internet security is to regularly update your computer. It is critical that a computer be in no way outdated and that users apply the appropriate and correct hardware and software. Usually hackers attempt to breach computer security by targeting weak spots and this is often accomplished by exploiting outdated computer components. However, by keeping your computer updated, it will be really difficult for a hacker to get results.

Step 2) Use an Antivirus
Many individuals believe that antiviruses actually cause problems for their computers instead of protection. However, with the right antivirus and the right measures there is no way a user should experience problems because what an antivirus does is make computer security tight, not vulnerable. After installing a good antivirus it is also very important to keep on updating it everyday. An antivirus is just another piece of software if it is not updated, but it can also be a powerful weapon against hackers and computer threats if it is regularly updated.

Step 3) Only Use Trusted Software
If users download trusted software, then there will be no reason for computers to be hacked. Nevertheless, a lot of computers get hacked because the users downloaded the wrong application. That is why users should only install trusted software applications on their computers and not because they just think they should or because others recommend it.

References:

Mutula, S. M., & Wamukoya, M. J. (2007). Web Information Management. Oxford: Chandos Publishing.

http://www.techtipsdigital.com/pc-computer-security/1924/

No comments:

Post a Comment