Author Archives: admin

How to avoid cyber attacks without antivirus

Cyber attacks are becoming very active in today’s world. Top IT companies are buying expensive products to protect their private document. Such expensive softwares are beyond common man’s budget. Below are some tips that will help to protect comman man from individuals.

1) Clear your browsing history: Regardless what browser you use, every browser has capability to store or automatically clear internet history. So you can do so by going to brower option and then navigating to privacy option. Just simply click on clear browsing history to clear your surfing history. There is an option to clear browsing history as soon as user close the browser. So you can choose any suitable option to clear your internet history.

2) Do not install freeware: Freeware are mean for adversiting and collect information. Some free software also has ability to collect information from computer and send it over the internet at regular intervals. To avoid this, do not install any freeware or any lurking softwares.

3) Close your internet: You should close your internet as soon as you have completed browsing work. It is like switching lights off when you do not need it. Keeping internet open will let other intruders/hackers to steal personal information from computer without evening noticing you.

4) Backup your data with password: It might happens a service repair team that visit your house to repair laptop/computer could steal your private data without your notice. There are some USB sticks that copies data automatically as soon as they are plugged in. So make sure to make your all backup data password protected.

How easy it is to protect your computer from malware

One of the easy techniques to protect computers and their network from malware is to do monthly virus scan run for all computer files. By doing so allows the software to scan all computer local files e.g., archived files, installation packages like executables, files in normal formats and file extensions as well as computer processes running in the background. Anti-virus software has real-time scanning (computer files are scanned when accessed for use), potentially harmful malware may still sit undetected and in waiting. Therefore running a full and complete scan every month is your best bet for protecting your computer.

Sometimes Cybercriminals use email addresses disguised as genuine offers or correspondence from a real Business to entice web surfers to click on links, open attachments or provide personal information. In order to protect you from such cyber threats below are some techniques,

Links in personal Internet email accounts (e.g., Gmail, Hotmail, Yahoo) are more likely to connect to malicious viruses than your business emails.
Opening any malicious link while you are connected to the corporate network can infect the network.
Hackers have broken into Internet email systems and servers in the past, stealing email addresses, passwords, contact information and more.
Be extra vigilante when accessing personal email while using corporate networks and devices.
Use Corporate Outlook for Business work on your mobile device – don’t use other external internet email services such as Gmail or Yahoo Mail.

What are some phishing email indicators?

The email requests personal information.
The email requests you contact the Business by clicking a link or calling a number in the email.
There are spelling or grammatical errors.
The subject line and/or sender look abnormal.
Links are not what they appear to be or they are usually masked with some famous websites links.

What Actions you should take to avoid?

Do not reply to the email.
Do not click on any links or open any attachments.
Do not call any number(s) listed in the email.

Naive Bayes Algorithm

Abstract:
The Naive Bayes algorithm is a prediction and classification algorithm. It uses Bayes’ Theorem, a formula that calculates a probability by counting the frequency of values and combinations of values in the historical data. Naïve bayes algorithm is used in data mining process. Data mining is a process of analyzing patterns from historical information and transform it into an understandable structure for future use. Typical use of data mining process is in Science fields where analysts indentifies the patterns based on historical data available and use those patterns to predict future activities. It is also used in medical fields, like whether a patient has heart disease or not from his historical data like patient’s age, blood sugar level and other symptoms.
Description:
Naïve bayes algorithm is based on three concepts,
Prior : Past experience
Likelihood: chance of event could happen.
Posterior: predicting the event will occur

Prob(B given A) = Prior * Prob(A and B)/Prob(A)
Example: Support you would like to determine the possibility that people over 60 ages are more prone to heart disease. In this case, prior condition (A) would be over 60 and dependent condition (B) would be having heart disease.
If there are 100 persons randomly tested for heart disease and before testing it is already known that out of them 25 are having heart disease,
Probability of A and B, (means people are tested and have heart disease previously) = 25%
If 75 of the 100 patients are over 60, then
Probability of (A)= 75%
Then in this case, Bayes Theorem would predict that that 33% of the patients over 60 are likely prone to heart disease (25/75).

For more information, contact: +91-8879902048