answersLogoWhite

0

By using Antivirus

User Avatar

Wiki User

13y ago

What else can I help you with?

Related Questions

How do you secure a network from external threats?

Build a moat


How can one secure a host name for a computer?

In order to secure a host name for your computer, it is important to have internet hooked into the computer. Then a host name will be assigned to the computer


What is the function of avp exe?

avp.exe is a process belonging to Kaspersky Internet Security Suite which helps to protect your computer against Internet-bound threats such as spyware and trojans which can be distributed through e-mail or attack directly to the computer allowing unauthorized access to your computer. Hence, this program is important for the stable and secure running of your computer and should not be removed from your computer as you like.


What is the difference between Intentional Man made Threats to your computer and Unintentional Man made Threats?

intent


What are the typical threats a computer user can encounter when using the computer?

Common threats to computers nowadays include: * Malware (Viruses, Worms, Trojan Horses) * Hackers * Spam * Phishing


How did the US secure Alaska?

The US bought Alaska from Russia in 1865. There were not any threats against it.


What to do when physical threats occur at computers?

your computer breaks down


What are threats to computer users?

knifes gunas and jimmy saville


How do you protect computers from common threats to computer?

Install an antivirus


Is the sky home page on a secure connection?

The sky home page connection is as secure at the connection you have on your computer. The Sky homepage suggests you use virus protection programs to protect your computer. It's as secure as other connections on your computer.


Why do you create the user account in computer?

So that the information on your computer is secure.


What does ssh in Linux stsnds for?

SSH stands for Secure Shell. (Often shown as Secure SHell.) It is a secure method for a host computer to connect to a remote computer on the network or over the internet.