469056
29
Zoom out
Zoom in
Previous page
1/54
Next page
Helpdesk - 29
Definitions
What is a Virus?
Malicious software, typically called ‘viruses’, are programs designed to infect and damage computers. Most viruses are
transmitted over the Internet, emails or malicious Web sites. A typical virus will replicate and pass itself undetected to
multiple computers. Other forms of nuisance, such as Trojan horses, worms or spam can infect your computer in various ways,
using up resources or clogging up a network.
Note: Packard Bell guarantees that your computer was 100% virus free at the time of purchase and does not cover
damages due to viruses.
What is Spyware?
Spyware refers to generally unwanted programs that are downloaded onto your computer while connected to the Internet,
often without you knowing it. Once it has infected your computer, it can snoop on your browsing activity, collect personal
information, cause pop-up ads to appear, or even change the configuration of your computer. Spyware consumes resources
on your computer; it can slow down your Internet connection or entire computer system, and even cause crashes.
Spyware is sometimes used by unscrupulous companies to monitor and track the sites you visit on the Internet so as to
determine your web-surfing habits and display targeted pop-up ads on your screen. However, some kinds of spyware go
beyond simple tracking and actually monitor keystrokes and capture passwords and other functions which pose a definite
security risk.
What is Malware?
Malicious software, also known as malware, is software designed to deliberately harm your computer. For example, viruses,
worms, and Trojan horses are malicious software. To help protect your computer against malware, make sure it is using up-
to-date antivirus and anti-malware software.
What is a personal Firewall?
A personal firewall is a software program designed to prevent unauthorized access to or from a private network. It acts as a
shield to protect your Internet connection from unwanted connections, some of which may attempt to take control of your
computer to install or re-distribute viruses or malicious programs. Each connection to your computer is monitored - programs
that attempt to receive information without your permission are detected and the firewall will display an alert. You can then
decide if you will allow the connection, if the connection is to a program you are currently using then normally you would
allow it (i.e. a game connecting to a multi-player server or an encyclopaedia making a content update).
How to protect your computer
Cybercrime prevention can be straight-forward - when armed with a little technical advice and common sense, many attacks
can be avoided. In general, online criminals are trying to make their money as quickly and easily as possible. The more
difficult you make their job, the more likely they are to leave you alone and move on to an easier target. The tips below
provide basic information on how you can prevent online fraud.
Keep your computer current with the latest patches and updates.
One of the best ways to keep attackers away from your computer is to apply patches and other software fixes when they
become available. By regularly updating your computer, you block attackers from being able to take advantage of software
flaws (vulnerabilities) that they could otherwise use to break into your system.
While keeping your computer up-to-date will not protect you from all attacks, it makes it much more difficult for hackers to
gain access to your system, blocks many basic and automated attacks completely, and might be enough to discourage a less-
determined attacker to look for a more vulnerable computer elsewhere.
More recent versions of Microsoft Windows and other popular software can be configured to download and apply updates
automatically so that you do not have to remember to check for the latest software. Taking advantage of "auto-update"
features in your software is a great start toward keeping yourself safe online.
29


Need help? Post your question in this forum.

Forumrules


Report abuse

Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.

Product:

For example, Anti-Semitic content, racist content, or material that could result in a violent physical act.

For example, a credit card number, a personal identification number, or an unlisted home address. Note that email addresses and full names are not considered private information.

Forumrules

To achieve meaningful questions, we apply the following rules:

Register

Register getting emails for Packard Bell iPower at:


You will receive an email to register for one or both of the options.


Get your user manual by e-mail

Enter your email address to receive the manual of Packard Bell iPower in the language / languages: English as an attachment in your email.

The manual is 6,12 mb in size.

 

You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.

Others manual(s) of Packard Bell iPower

Packard Bell iPower Quick start guide - German - 62 pages

Packard Bell iPower Quick start guide - Dutch - 60 pages

Packard Bell iPower Quick start guide - French - 61 pages


The manual is sent by email. Check your email

If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.

The email address you have provided is not correct.

Please check the email address and correct it.

Your question is posted on this page

Would you like to receive an email when new answers and questions are posted? Please enter your email address.



Info