Digital Cop: A Digital Cop's Guide to Cyber Security
()
About this ebook
*Did you know that there are actually applications to enable us to send a ‘self-destruct’ message?
*Did you know that you can convert your free time into a lucrative career by getting genuine work online?
*Why and how is your computer susceptible to a virus, and how can you prevent people from hacking into your email account?
*How do you track someone’s location using their phone GPS, and how do you use your smart phone to check for hidden cameras?
These are only some of the questions to which you will finally have the answers! From the ordinary and practical to the amusing, they give you solutions that range from the mundane to the ingenious! And in a language that’s simple, and easy to follow …
Read on. ‘Digital Cop’ promises to serve and cyber secure everyone!
Related to Digital Cop
Related ebooks
#HACKED: 10 Practical Cybersecurity Tips to Help Protect Personal or Business Inform Rating: 0 out of 5 stars0 ratingsMy Data My Privacy My Choice: A Step-by-step Guide to Secure your Personal Data and Reclaim your Online Privacy! Rating: 0 out of 5 stars0 ratingsEasy Private Browsing: How to Send Anonymous Email, Hide Your IP address, Delete Browsing History and Become Invisible on the Web Rating: 0 out of 5 stars0 ratingsYour Personal Information Is At Risk: A Guide For Protecting Yourself Rating: 0 out of 5 stars0 ratingsBotnets: The Killer Web Applications Rating: 5 out of 5 stars5/5Cracking the Fortress: Bypassing Modern Authentication Mechanism Rating: 0 out of 5 stars0 ratingsThe Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy Rating: 5 out of 5 stars5/57 Rules to Influence Behaviour and Win at Cyber Security Awareness Rating: 5 out of 5 stars5/5Darknet Rating: 4 out of 5 stars4/5The Secure CEO: How to Protect Your Computer Systems, Your Company, and Your Job Rating: 0 out of 5 stars0 ratingsHacking into Hackers’ Head: A step towards creating CyberSecurity awareness Rating: 5 out of 5 stars5/5Software Security For You Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for Corporate Directors and Board Members Rating: 1 out of 5 stars1/5Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques Rating: 0 out of 5 stars0 ratingsDigital Privacy: Internet Security to Stop Big Companies From Tracking and Selling Your Data Rating: 0 out of 5 stars0 ratingsSeven Deadliest Network Attacks Rating: 3 out of 5 stars3/5Deep Web Secrecy and Security: an inter-active guide to the Deep Web and beyond Rating: 4 out of 5 stars4/5Compsec: For the Home User Rating: 0 out of 5 stars0 ratingsHack Proofing Your Network Rating: 0 out of 5 stars0 ratingsSecurity in the Digital World Rating: 0 out of 5 stars0 ratingsComputer Hacking: The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners Rating: 0 out of 5 stars0 ratingsCyber Security Awareness for CEOs and Management Rating: 2 out of 5 stars2/5Cyber Protect Your Business Rating: 0 out of 5 stars0 ratingsThe Core of Hacking Rating: 0 out of 5 stars0 ratingsBlind Spot: Smartphone and Computer Personal Security Guide Rating: 3 out of 5 stars3/5Hacking: 10 Easy Beginners Tutorials on How to Hack Plus Basic Security Tips Rating: 0 out of 5 stars0 ratingsMaking Passwords Secure Rating: 0 out of 5 stars0 ratings
Study Aids & Test Prep For You
The 48 Laws of Power: by Robert Greene | Conversation Starters Rating: 4 out of 5 stars4/512 Rules For Life: by Jordan Peterson | Conversation Starters Rating: 4 out of 5 stars4/5Man's Search for Meaning: by Viktor E. Frankl | Conversation Starters Rating: 3 out of 5 stars3/5Dare to Lead: Brave Work. Tough Conversations. Whole Hearts.by Brené Brown | Conversation Starters Rating: 5 out of 5 stars5/5Verity: by Colleen Hoover | Conversation Starters Rating: 4 out of 5 stars4/5The Art of Seduction: by Robert Greene | Conversation Starters Rating: 3 out of 5 stars3/5Killers of the Flower Moon: by David Grann | Conversation Starters Rating: 3 out of 5 stars3/5Circe: by Madeline Miller | Conversation Starters Rating: 4 out of 5 stars4/5Fluent in 3 Months: How Anyone at Any Age Can Learn to Speak Any Language from Anywhere in the World Rating: 3 out of 5 stars3/5The Only Writing Series You'll Ever Need - Grant Writing: A Complete Resource for Proposal Writers Rating: 5 out of 5 stars5/5The Great Alone: by Kristin Hannah | Conversation Starters Rating: 5 out of 5 stars5/5The Untethered Soul: The Journey Beyond Yourself by Michael A. Singer | Conversation Starters Rating: 3 out of 5 stars3/5Do the Work: The Official Unrepentant, Ass-Kicking, No-Kidding, Change-Your-Life Sidekick to Unfu*k Yourself Rating: 4 out of 5 stars4/5The Secret History: by Donna Tartt | Conversation Starters Rating: 0 out of 5 stars0 ratingsThe Power of Habit: by Charles Duhigg | Conversation Starters Rating: 3 out of 5 stars3/5One Hundred Years of Solitude: A Novel by Gabriel Garcia Márquez | Conversation Starters Rating: 4 out of 5 stars4/5Finish What You Start: The Art of Following Through, Taking Action, Executing, & Self-Discipline Rating: 4 out of 5 stars4/5Quiet: The Power of Introverts in a World That Can't Stop Talking by Susan Cain | Conversation Starters Rating: 2 out of 5 stars2/5Eleanor Oliphant Is Completely Fine: by Gail Honeyman | Conversation Starters Rating: 3 out of 5 stars3/5
Reviews for Digital Cop
0 ratings0 reviews
Book preview
Digital Cop - Sahil Baghla and Arun Soni
authors
1
The Benefits of Purchasing an Antivirus Software
Scenario 1
It becomes a HUGE problem when your computer gets infected with a virus. You can’t access your Internet. You’re afraid that the confidential data stored on your computer may be compromised. A myriad devastating probabilities run through your mind… But the only matter of concern to you at that time should be – Which is the best and most affordable antivirus package that I can purchase?
A Brief Introduction:
An Antivirus is the first level protection against viruses that affect and afflict our computers through infected programs. The source of the computer virus could be anything from a pen drive to a CD or DVD with an infected program. Another very common and probable source is the Internet.
It is human nature that many of us have the habit of downloading free ‘Antivirus programs’ from random Internet sites to protect our computer. It is believed that free Antivirus programs provide some basic level of protection. But in reality it does not provide the functionality and protection, as purchased reliable Antivirus or trial versions of this authentic software.
For example, some paid Antivirus programs will scan Internet traffic to catch web-borne malware (software which is expressly intended to mutilate your computer) before it affects your hard drive, but the other company’s free version does not provide such functions.
The trial version of antivirus software provides protection only during the temporary trial period. So you have to purchase an original Antivirus program for complete protection for a longer duration.
How to choose the best Antivirus?
Every year new Antivirus programs are being launched by new companies and existing Antivirus programs are being updated with new features. These Antivirus programs are constantly reviewed by reviewing agencies and computer magazines. You can always find such reviews to decide on the Antivirus you should buy.
For example you can search for Top ten Antivirus programs in the world
on the Google and then compare results for buying Antivirus.
Our Antivirus Recommendation:
All trademarks, service marks, trade names, product names and logos appearing on the image are the property of their respective owner.
We have been using Kaspersky Internet Security and the Kaspersky Antivirus for many years now. No virus has infected our PCs/Laptops since the Kaspersky antivirus was installed.
Both of these are designed to protect PCs/Laptops. The ‘Kaspersky Antivirus’ is best known for protecting PC from viruses, while ‘Kaspersky Internet Security’ also protects PC/Laptop from viruses but also has many other advanced features. Try using any product from Kaspersky by installing the trial version first to get familiar with its features. If you find it satisfactory, you can purchase it for longer protection.
Note: Links mentioned below are case-sensitive. Please do take care of capital and small letters while typing the links.
Link to download Kaspersky trial:
http://www.kaspersky.com/antivirus-free-trial or
http://goo.gl/7agi8I
Link to download Kaspersky Internet Security trial: http://www.kaspersky.com/free-trials/internet-security or http://goo.gl/srmjqy
Don’t forget to purchase any one of the products (Kaspersky Antivirus or Kaspersky Internet Security) from a local vendor. You can also order it by comparing prices at top e-commerce websites like Flipkart, Snapdeal, Ebay and Amazon.
Action Time:
Start using the Kaspersky Antivirus or the Kaspersky Internet Security by installing it on your PC/Laptop. It is our experience that you will never face any virus related problem once you have done this.
Note: Remember that the Kaspersky Antivirus and the Kaspersky Internet Security require some time for downloading updates for the very first time; the time taken with regular updates will be less. And, your Antivirus will perform better after every successful update.
Links to other Antivirus programs’ official websites:-
http://www.bitdefender.com
http://www.symantec.com
http://www.mcafee.com/us/
2
Scanning a File with Multiple Genuine Antivirus Software Free of Cost
Scenario 2
You have downloaded a file and the file seems to be malicious. So you run it through your trusty antivirus program that surprisingly tells you that the file is not malicious. Nevertheless, you are unwilling to compromise your computer’s efficacy so to be on the safe side, you want to scan it with another antivirus software. But it is a fact that more than one authentic antivirus software can’t be installed on a single computer. What can you do now?
So at this instance we provide you with a solution to scan your file with free online service. We recommend Jotti’s Malware Scan. This unique website enables you to scan suspicious files with not just one, but several antivirus programs.
Scanners used are Linux versions; detection differences with Windows versions of the same scanners may occur due to implementation differences. There is a 25 MB limit per file. Keep in mind that no security solution offers 100% protection, not even when it uses several anti-virus engines (for example, this scan service)
, written at Jotti’s malware scan website.
The information on the Jotti’s Malware Scan website warns users that no scan can offer 100% protection. However, there are several anti-virus engines used on the website which also uses scanners of Linux versions. Due to this, there may be detection differences with Windows versions of the same scanners. There is a 25 MB limit per file.
All trademarks, service marks, trade names, product names and logos appearing on the image are the property of their respective owner.
Action Time:
Be ready to follow our instructions to scan suspicious files with multiple antivirus programs.
Here’s how.
1. Access http://virusscan.jotti.org/en webpage in your browser.
2. Click on the Choose File button to select the file which you want to scan from your computer.
3. Click on the Submit File button to submit the file for scanning.
4. The anti-virus program on the webpage will scan the file and show the individual result for it from every program.
Our Recommendation:
We recommend that you do not download any suspicious files. In case you suspect that a file you have downloaded is malicious, please scan it at a website like Jotti’s malware scan.
Links to other similar websites:-
https://www.metascan-online.com/en
https://www.virustotal.com/
http://www.virscan.org/
3
Find Out What Other People are Doing On Your Computer in Your Absence
Scenario 3
Often you may have to leave your computer in the custody of somebody. That person could be your employee, relative or even a friend. Although you may trust this individual to respect your privacy and not to misuse your computer, for security reasons it becomes important for you to monitor his/her activities. There are times when they may inadvertently download malware or spyware (software that enables a user to obtain information about another’s computer activities by transmitting data secretly from their computer). Therefore we know your need is to find an effective monitoring method. So we recommend this monitoring method for the same.
All trademarks, service marks, trade names, product names and logos appearing on the image are the property of their respective owner.
This method consists of installing software such as ActivTrak Agent on your computer. It is a great employee monitoring and surveillance service which will help you to prevent the misuse of your computer.
After installing ActivTrak Agent on your computer, your computer will be able to capture screenshots of whatever work is being done on it, at regular intervals and upload the images secretly at the ActivTrak website which can be viewed later on from any location.
Action Time:
Be ready to follow our instructions to install this surveillance tool and be assured that your computer will be monitored in your absence.
1.Open thehttp://activtrak.com/webpage in your browser.
2.Enter your email address to ‘Signup’ on the homepage of the website, and then follow instructions to create a new account administrator.
3.After a successful Signup, your ActivTrak account will be successfully created on their website (don’t forget to check your email for any confirmation mail from their side).
4. After a successful Signup, you will be automatically redirected to your ActivTrak account dashboard or login again to your ActivTrak account for your ActivTrak dashboard.
5. Download ActivTrak Agent (software) from