What av or malware software do you use
Course:- Software Engineering
Reference No.:- EM13860567

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Software Engineering

Because of the recent DDoS attack on Rutgers computers - taking down their internet, I thought it might be a good idea to discuss safety and security online.

What is a DDoS attack?

DDoS is the common abbreviation for a Distributed Denial of Service attack which is what probably happened at Rutgers. Think of it like what happened during SuperStorm Sandy and nobody could get through on their cell phones or for the people that get stuck every day in traffic trying to get through the Lincoln Tunnel. There are too many people trying to access the same thing at the same time.
Here is a short video that explains it further:


What happened at Rutgers?

If you aren't up on the story, here is a good summary:


What should you be aware of?

The US government has a website called "OnGuard Online" with some useful tips and videos for protecting yourself online. Here is the main website page:


Chances are unless you are running a business, you probably won't be a target of a DDoS attack. However, if you don't update your computer, run anti-virus and mal-ware programs, you might become part of the botnet without you knowing it.

What can you do?

Run and update anti-virus programs on your computers, tablets and cell phones. yes, there are FREE ones that are pretty good.

Run a mal-ware detector. Malware Bytes is the FREE one that I use

Never, never share passwords and make sure your password is STRONG.

Update/patch the software on your computer regularly.

This list is not comprehensive, but it's just to get you thinking about it.

Discussion Board Assignment

Please watch the video and review the article.

Please take a look at the OnGuard Online website.

Q1. What AV or Malware software do you use? Please include what type of device or OS (Windows, Mac, Android)

Q2. Share with us three tips you have for protecting yourself online. Use examples to illustrate your tip, if possible.

Please provide a reference/source (formatted in MLA style) that supports at least one of your tips.

No duplicates allowed. For example, I already mentioned Malware Bytes. You can mention that you use it, but that can't be the only one you mention. You can comment/reply to your peers agreeing or disagreeing with their tip, but first one to post, gets the credit for the "original".

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Software Engineering) Materials
Concept of activity diagrams to model an application. Activity diagrams are one of the 14 diagrams used in the Unified Process to create systems and application blueprints.
Develop a one page handout for your team outlining the PMI Code of Ethics and Professional Conduct. You need to include a section on how the PMI Code of Ethics and Professio
The system is expected to provide functionality for maintaining the list of employees and general maintenance of the system database by a manager including creation, modific
Write a function userPlay(marbles) that asks the user for the number of marbles that he or she would like to take and returns that number. The function should keep asking th
In software engineering, one can find various life cycle models. Some examples include the waterfall model, agile processes, and iterative and incremental models. Research a
SOFT20111 - Software Engineering - Your task is to develop alternative programs with different functionality and to modify the makefile to add new targets for these (debug v
What are the connections between Shaw's observations and those that Parnas made? How does Shaw's work build on that of Parnas? How does Shaw's work fill in or correct some o
When the shell is reading the command line what is the difference between text enclosed between double quotes (") and text enclosed between single quotes (')? Consider two c