What av or malware software do you use
Course:- Software Engineering
Reference No.:- EM13860567

Assignment Help
Expertsmind Rated 4.9 / 5 based on 47215 reviews.
Review Site
Assignment Help >> Software Engineering

Because of the recent DDoS attack on Rutgers computers - taking down their internet, I thought it might be a good idea to discuss safety and security online.

What is a DDoS attack?

DDoS is the common abbreviation for a Distributed Denial of Service attack which is what probably happened at Rutgers. Think of it like what happened during SuperStorm Sandy and nobody could get through on their cell phones or for the people that get stuck every day in traffic trying to get through the Lincoln Tunnel. There are too many people trying to access the same thing at the same time.
Here is a short video that explains it further:


What happened at Rutgers?

If you aren't up on the story, here is a good summary:


What should you be aware of?

The US government has a website called "OnGuard Online" with some useful tips and videos for protecting yourself online. Here is the main website page:


Chances are unless you are running a business, you probably won't be a target of a DDoS attack. However, if you don't update your computer, run anti-virus and mal-ware programs, you might become part of the botnet without you knowing it.

What can you do?

Run and update anti-virus programs on your computers, tablets and cell phones. yes, there are FREE ones that are pretty good.

Run a mal-ware detector. Malware Bytes is the FREE one that I use

Never, never share passwords and make sure your password is STRONG.

Update/patch the software on your computer regularly.

This list is not comprehensive, but it's just to get you thinking about it.

Discussion Board Assignment

Please watch the video and review the article.

Please take a look at the OnGuard Online website.

Q1. What AV or Malware software do you use? Please include what type of device or OS (Windows, Mac, Android)

Q2. Share with us three tips you have for protecting yourself online. Use examples to illustrate your tip, if possible.

Please provide a reference/source (formatted in MLA style) that supports at least one of your tips.

No duplicates allowed. For example, I already mentioned Malware Bytes. You can mention that you use it, but that can't be the only one you mention. You can comment/reply to your peers agreeing or disagreeing with their tip, but first one to post, gets the credit for the "original".

Put your comment

Ask Question & Get Answers from Experts
Browse some more (Software Engineering) Materials
Document about weaknesses of  Putnam's Software Life-cycle Model (SLIM). Need citations for every paragraph. Need citations from Peer reviewed articles , preferably from googl
Rewrite each of the given expressions for concurrent processing and then code each one. Use terms COBEGIN and COEND to delimit the sections of concurrent code.
What is regression testing? Explain various types of regression testing. What are the various steps by which regression testing is carried out?
Explain the processes that take place in each phase of the life cycle and determine what will be accomplished in each. Determine the requirements for the development of the on
Validate your solution to 2.14.1. Submit your source code as an attachment and output from the program showing the result. Answer once and for all, does the andi instruction i
Describe the difference between locally hosted infrastructure (ie. in an enterprise data centre) and infrastructure provided using an IaaS provider. What are the critical po
Explain how Software Architecture Department can support production, inventory, sales, and marketing to assure Zilack can meet its business objectives.
Why is software quality assurance important in system development? What are some of the software quality assurance methods that you would embrace for ensuring quality in the