Author Archives: admin

How easy it is to protect your computer from malware

One of the easy techniques to protect computers and their network from malware is to do monthly virus scan run for all computer files. By doing so allows the software to scan all computer local files e.g., archived files, installation packages like executables, files in normal formats and file extensions as well as computer processes running in the background. Anti-virus software has real-time scanning (computer files are scanned when accessed for use), potentially harmful malware may still sit undetected and in waiting. Therefore running a full and complete scan every month is your best bet for protecting your computer.

Sometimes Cybercriminals use email addresses disguised as genuine offers or correspondence from a real Business to entice web surfers to click on links, open attachments or provide personal information. In order to protect you from such cyber threats below are some techniques,

Links in personal Internet email accounts (e.g., Gmail, Hotmail, Yahoo) are more likely to connect to malicious viruses than your business emails.
Opening any malicious link while you are connected to the corporate network can infect the network.
Hackers have broken into Internet email systems and servers in the past, stealing email addresses, passwords, contact information and more.
Be extra vigilante when accessing personal email while using corporate networks and devices.
Use Corporate Outlook for Business work on your mobile device – don’t use other external internet email services such as Gmail or Yahoo Mail.

What are some phishing email indicators?

The email requests personal information.
The email requests you contact the Business by clicking a link or calling a number in the email.
There are spelling or grammatical errors.
The subject line and/or sender look abnormal.
Links are not what they appear to be or they are usually masked with some famous websites links.

What Actions you should take to avoid?

Do not reply to the email.
Do not click on any links or open any attachments.
Do not call any number(s) listed in the email.

Naive Bayes Algorithm

Abstract:
The Naive Bayes algorithm is a prediction and classification algorithm. It uses Bayes’ Theorem, a formula that calculates a probability by counting the frequency of values and combinations of values in the historical data. Naïve bayes algorithm is used in data mining process. Data mining is a process of analyzing patterns from historical information and transform it into an understandable structure for future use. Typical use of data mining process is in Science fields where analysts indentifies the patterns based on historical data available and use those patterns to predict future activities. It is also used in medical fields, like whether a patient has heart disease or not from his historical data like patient’s age, blood sugar level and other symptoms.
Description:
Naïve bayes algorithm is based on three concepts,
Prior : Past experience
Likelihood: chance of event could happen.
Posterior: predicting the event will occur

Prob(B given A) = Prior * Prob(A and B)/Prob(A)
Example: Support you would like to determine the possibility that people over 60 ages are more prone to heart disease. In this case, prior condition (A) would be over 60 and dependent condition (B) would be having heart disease.
If there are 100 persons randomly tested for heart disease and before testing it is already known that out of them 25 are having heart disease,
Probability of A and B, (means people are tested and have heart disease previously) = 25%
If 75 of the 100 patients are over 60, then
Probability of (A)= 75%
Then in this case, Bayes Theorem would predict that that 33% of the patients over 60 are likely prone to heart disease (25/75).

For more information, contact: +91-8879902048