Soumettre la recherche
Mettre en ligne
3 Security Tips for better security for personal computer
•
1 j'aime
•
550 vues
Phannarith Ou, G-CISO
Suivre
This is the student assignment on Security
Lire moins
Lire la suite
Formation
Signaler
Partager
Signaler
Partager
1 sur 10
Télécharger maintenant
Télécharger pour lire hors ligne
Recommandé
Royal of cambodia
Royal of cambodia
khemrint
តិរច្ឆានមិត្ដ (រួមគំនិតបំផ្លាញជាតិខែ្មរ)
តិរច្ឆានមិត្ដ (រួមគំនិតបំផ្លាញជាតិខែ្មរ)
khemrint
Case - How to protect your website
Case - How to protect your website
Phannarith Ou, G-CISO
Understanding NMAP
Understanding NMAP
Phannarith Ou, G-CISO
Reconnaisance
Reconnaisance
Phannarith Ou, G-CISO
Case - How to protect your information
Case - How to protect your information
Phannarith Ou, G-CISO
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
Phannarith Ou, G-CISO
Internet Security Policy - Khmer
Internet Security Policy - Khmer
Phannarith Ou, G-CISO
Recommandé
Royal of cambodia
Royal of cambodia
khemrint
តិរច្ឆានមិត្ដ (រួមគំនិតបំផ្លាញជាតិខែ្មរ)
តិរច្ឆានមិត្ដ (រួមគំនិតបំផ្លាញជាតិខែ្មរ)
khemrint
Case - How to protect your website
Case - How to protect your website
Phannarith Ou, G-CISO
Understanding NMAP
Understanding NMAP
Phannarith Ou, G-CISO
Reconnaisance
Reconnaisance
Phannarith Ou, G-CISO
Case - How to protect your information
Case - How to protect your information
Phannarith Ou, G-CISO
Case Study - Internet Security Policy (Khmer)
Case Study - Internet Security Policy (Khmer)
Phannarith Ou, G-CISO
Internet Security Policy - Khmer
Internet Security Policy - Khmer
Phannarith Ou, G-CISO
How to Protect Computer From Virus
How to Protect Computer From Virus
Phannarith Ou, G-CISO
How to Secure Your WiFi
How to Secure Your WiFi
Phannarith Ou, G-CISO
Facebook Security in 3 Ways
Facebook Security in 3 Ways
Phannarith Ou, G-CISO
Understanding Keylogger
Understanding Keylogger
Phannarith Ou, G-CISO
Exchange Server 2003
Exchange Server 2003
Phannarith Ou, G-CISO
Network Security with ISA Server 2006
Network Security with ISA Server 2006
Phannarith Ou, G-CISO
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
Phannarith Ou, G-CISO
Secure System Development Proposal
Secure System Development Proposal
Phannarith Ou, G-CISO
How to know you was hacked
How to know you was hacked
Phannarith Ou, G-CISO
ូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
Phannarith Ou, G-CISO
Understanding Malware by BBU Student
Understanding Malware by BBU Student
Phannarith Ou, G-CISO
Heartbleed vulnerability
Heartbleed vulnerability
Phannarith Ou, G-CISO
P12 r202t8 05-spam
P12 r202t8 05-spam
Phannarith Ou, G-CISO
P12 r202t8 04-d-dos
P12 r202t8 04-d-dos
Phannarith Ou, G-CISO
Understanding Phishing
Understanding Phishing
Phannarith Ou, G-CISO
Understanding Virus
Understanding Virus
Phannarith Ou, G-CISO
Paliment memberlist full-2013-new
Paliment memberlist full-2013-new
Phannarith Ou, G-CISO
គម្រោងបង្កើតគេហទំព័រអង្គរមាស
គម្រោងបង្កើតគេហទំព័រអង្គរមាស
Phannarith Ou, G-CISO
គោលនយោបាយសន្តិសុខព័ត៌មាននៅអង្គការរ៉ាក់
គោលនយោបាយសន្តិសុខព័ត៌មាននៅអង្គការរ៉ាក់
Phannarith Ou, G-CISO
គោលនយោបាយសន្តិសុខព័ត៌មាន
គោលនយោបាយសន្តិសុខព័ត៌មាន
Phannarith Ou, G-CISO
Contenu connexe
Plus de Phannarith Ou, G-CISO
How to Protect Computer From Virus
How to Protect Computer From Virus
Phannarith Ou, G-CISO
How to Secure Your WiFi
How to Secure Your WiFi
Phannarith Ou, G-CISO
Facebook Security in 3 Ways
Facebook Security in 3 Ways
Phannarith Ou, G-CISO
Understanding Keylogger
Understanding Keylogger
Phannarith Ou, G-CISO
Exchange Server 2003
Exchange Server 2003
Phannarith Ou, G-CISO
Network Security with ISA Server 2006
Network Security with ISA Server 2006
Phannarith Ou, G-CISO
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
Phannarith Ou, G-CISO
Secure System Development Proposal
Secure System Development Proposal
Phannarith Ou, G-CISO
How to know you was hacked
How to know you was hacked
Phannarith Ou, G-CISO
ូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
Phannarith Ou, G-CISO
Understanding Malware by BBU Student
Understanding Malware by BBU Student
Phannarith Ou, G-CISO
Heartbleed vulnerability
Heartbleed vulnerability
Phannarith Ou, G-CISO
P12 r202t8 05-spam
P12 r202t8 05-spam
Phannarith Ou, G-CISO
P12 r202t8 04-d-dos
P12 r202t8 04-d-dos
Phannarith Ou, G-CISO
Understanding Phishing
Understanding Phishing
Phannarith Ou, G-CISO
Understanding Virus
Understanding Virus
Phannarith Ou, G-CISO
Paliment memberlist full-2013-new
Paliment memberlist full-2013-new
Phannarith Ou, G-CISO
គម្រោងបង្កើតគេហទំព័រអង្គរមាស
គម្រោងបង្កើតគេហទំព័រអង្គរមាស
Phannarith Ou, G-CISO
គោលនយោបាយសន្តិសុខព័ត៌មាននៅអង្គការរ៉ាក់
គោលនយោបាយសន្តិសុខព័ត៌មាននៅអង្គការរ៉ាក់
Phannarith Ou, G-CISO
គោលនយោបាយសន្តិសុខព័ត៌មាន
គោលនយោបាយសន្តិសុខព័ត៌មាន
Phannarith Ou, G-CISO
Plus de Phannarith Ou, G-CISO
(20)
How to Protect Computer From Virus
How to Protect Computer From Virus
How to Secure Your WiFi
How to Secure Your WiFi
Facebook Security in 3 Ways
Facebook Security in 3 Ways
Understanding Keylogger
Understanding Keylogger
Exchange Server 2003
Exchange Server 2003
Network Security with ISA Server 2006
Network Security with ISA Server 2006
Network Installation and Management in Windows 2008 Enterprise
Network Installation and Management in Windows 2008 Enterprise
Secure System Development Proposal
Secure System Development Proposal
How to know you was hacked
How to know you was hacked
ូUnderstanding DNS Spoofing
ូUnderstanding DNS Spoofing
Understanding Malware by BBU Student
Understanding Malware by BBU Student
Heartbleed vulnerability
Heartbleed vulnerability
P12 r202t8 05-spam
P12 r202t8 05-spam
P12 r202t8 04-d-dos
P12 r202t8 04-d-dos
Understanding Phishing
Understanding Phishing
Understanding Virus
Understanding Virus
Paliment memberlist full-2013-new
Paliment memberlist full-2013-new
គម្រោងបង្កើតគេហទំព័រអង្គរមាស
គម្រោងបង្កើតគេហទំព័រអង្គរមាស
គោលនយោបាយសន្តិសុខព័ត៌មាននៅអង្គការរ៉ាក់
គោលនយោបាយសន្តិសុខព័ត៌មាននៅអង្គការរ៉ាក់
គោលនយោបាយសន្តិសុខព័ត៌មាន
គោលនយោបាយសន្តិសុខព័ត៌មាន
3 Security Tips for better security for personal computer
1.
កិច្ករ'((វ*((វ+ + !ៀប!ៀង%យៈ( រ*ុង ថរត្័( 01នំ%យ ( ស51្ាចរ19ជំនួយ
អ៊ូ ផន់ណរCទ្( កិច្ករ'((វ*((វ +(សីហ ឆ0(ំ២០១៥6 សកលវិទ(/ល័យ2ៀល4((យ+ BUILD BRIGTH UNIVERSITY (BBU)+ ៣ ចំនុច9(មូលដ=(ន>(ឹះក្Bងករករពរសុវត្ិភពJKើ កុំព(MNទ័រផP(ល់ខ្Tន
2.
សព្9្(;(ះមន មនុស(AជC(ើនលននក់H(លមនកុំព(JKទ័រN(ើO((ស់ ផQ(ល់ខ្Tន UើយភគC(ើនY(ពួក[(កំពុង](^(ឈមមុខ
នឹងបbc(សុវត្ិភពfgើកំុព(JKទ័រ H(លពួក[(កំពុង](N(ើhះឯង ដូចជករលួចយកទិន្័យសំខន់H(លអ្កមិនចង់ oយអ្កដp(បនrើញ, ករលួចN(ើO((ស់កំុព(JKទ័រ រtគណនីរបស់vើងwើម(xី yលបំណងអ{(ក់ណមួយ ។ល។6 U(ចក្ីX្ើម+ wើម(xី~ៀសoយផុតពីហនិភ័យទំង;(ះបន ខងƒ((ម;(ះជមូលដ…(ន†(ឹះ ទំង៧ ចំនុច wើម(xីករពរសុវត្ិភពកុំព(JKទ័ររបស់‰កអ្ក6
3.
៣ ចំនុចY(មូលដ…(ន†(ឹះក្‹ងករករពរ សុវត្ិភពfgើកុំព(JKទ័រផQ(ល់ខ្Tន6 1.
តŒ្ើងកម្វŽធីកំចត់Œ(‘គ (Antivirus)6 2. ~ៀសវងករN(ើO((ស់កម្វŽធី“យគ•(នអជ–(ប័ណ្ (Pirated Program)6 3. ˜្ើបច្‹ប(xន្ភព ^(ព័ន្^(តិបត្ិករ និងកម្វŽធីfgើកុំព(JKទ័រ6 6
4.
១. តŒ្ើងកម្វŽធីកំចត់Œ(‘គ (Antivirus
Software)6 កម្វ›ធីកំចត់Œ(‘គជកម្វ›ធីដ៏សំខន់មួយ H(លមិនអចខ្ៈបនfgើកុំព(JKទ័ររបស់vើង វ បនជួយករពរvើង^(យុទ្^(ឆំងនឹងŒ(‘គ ករលួចយកទិន្័យ ផ្ល់oយvើងនូវ Firewall ដ៏^(Ÿើរមួយ ផ្ល់នូវសុវត្ិភពដល់ គណនីននដូចជ Facebook, Gmail, Twitter Amazon, Ebay, ...6 ះជយ¢(ងណក៍នូវមន កម្វ›ធីកំចត់Œ(‘គ¤្(ងក¥(យមួយចំនួនកំពុង](សម្ំលក់ខ្Tនចំ បំផ¥(ញកុំព(JKទ័ររបស់vើង។ ដូច;(ះខ្‹ំសូមgើកយកកម្វ›ធីកំចត់Œ(‘គមួយចំនួនH(លអ្ក អចទុកចិត្បនមកបងc(ញ wើម(xីជជំនួយក្‹ងករសំ¨(ចចិត្©(ើសយកកម្វŽធីH(លសមª(ប6 6
5.
១. តŒ្ើងកម្វŽធីកំចត់Œ(‘គ (Antivirus)6 1.1
កម្វ›ធីកំចត់Œ(‘គល្បំផុត^(ចំឆ0(ំ ២០១៥6 6 6 6 6 6 ¬6
6.
១. តŒ្ើងកម្វŽធីកំចត់Œ(‘គ (Antivirus)6 1.2
កម្វ›ធីកំចត់Œ(‘គឥតគិត9្( ល្បំផុត^(ចំឆ0(ំ ២០១៥6 6
7.
២. ~ៀសវងករN(ើO((ស់កម្វŽធីមិនមនអជ–(ប័ណ្ (Pirated
Program)6 6 ករN(ើO((ស់កម្វŽធីH(លមិនមនអជ–(ប័ណ្®(ឹម®(¯វ (Pirated Software) ^(ឈមមុខខ្ស់±នឹងករវយ^(ហរ ពី Malware ²(A(ងៗជពិŸ(សគឺ Malware H(លបµ្ើត·ើង“យអ្កH(លបµ្ើត Crack កម្វŽធីhះឯង។6 vើងអចN(ើO((ស់កម្វŽធីឥតគិត9្(មួយចំនួន ¸ើសិនជvើងអច។ ខងƒ((ម;(ះជកម្វŽធីឥតគិត9្(ចំនួន 5 H(លអ្កvើងអចN(ើបស់បនស¹((ប់ករងរ^(ចំ9្(៖6 1. RainMeter : Widget ª(ស់ស¼(តH(ល Theme រប់មិនអស់6 2. WizMouse : ជកម្វŽធីជំនួយមួយអចជួយoយ Mouse Pointer Focus បនល្ជងមុន6 3. IrfanView : ជកម្វŽធីកត់តរូបភពមួយH(លអចជំនួសមុខងរមូលដ¾(នរបស់ AdobePhotoshop បន6 4. Recuva : ជកម្វŽធីមួយH(លអចoយអ្ក Recover ឯងសរH(លអ្កបន˜្ើបត់យ¢(ងងយ6 5. Flux : ជកម្វŽធីមួយH(លផ¥(ស់ផ្Kរ Color Tones fgើ¿({(ង់កុំព(JKទ័ររបស់អ្កoយសំនឹងស¾(នភពពន្ឺ6
8.
៣. ˜្ើបច្‹ប(xន្ភព ^(ព័ន្^(តិបត្ិករ
និងកម្វŽធីfgើកុំព(JKទ័រ6 6 6 ជ¨ឿយៗចh¥(ះ^(Áងមួយចំនួន fក្‹ងកម្វŽធីfgើកំព(JKទ័រ និងក្‹ង^(ព័ន្^(តិបត្ិករ ជ ទÂ(រមួយH(ល¸ើកoយអ្កវយ^(ហរ ˜្ើករវយ^(ហរvើងបន ។ អ្កគួរ](ឧស(Äហ៍ Æ(កŒើល ˜្ើបច្‹ប(xន្ភព ^(ព័ន្^(តិបត្ិករ និងកម្វŽធីនីមួយៗ oយបនញឹកញប់ ¸ើសិនជgើកអ្កខ្ិល រtមិនមនÉ(លC(ើនÊ( ‰កអ្កអចដក់ដំËើរករ មុខងរ˜្ើ បច្‹ប(xន្ភព “យស្័យ^(វត្ិ និងN(ើO((ស់កម្វŽធី។6 កម្វŽធី Secunia Personal Software Inspector អច˜្ើបច្‹ប(xន្ភពកម្វŽធីfgើកុំព(JKទ័រ របស់អ្ក“យស្័យ^(វត្ិ ។ 6 6 6
9.
Ÿ(ចក្ីសន្ិដ…(ន6 សូមអរគុណH(លបនអនពីwើមមកដល់ចប់ សង(Ìឹមថអត្បទ;(ះអចជួយ ‰កអ្ក oយបនយល់ពីករករពរ
សុវត្ិភពfgើកុំព(JKទ័រផQ(ល់ខ្Tន6
10.
ឯកសរÎង6 • PCMAG.com [Access
on 11-‐08-‐2015] • PCWORLD.com [Access on 12-‐08-‐2015] • Secudemy.com [Access on 10-‐08-‐2015]
Télécharger maintenant