Preview

Checkpoint the Risk of Macros

Satisfactory Essays
Open Document
Open Document
275 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Checkpoint the Risk of Macros
CheckPoint: The Risk of Macros Name
January 20, 2012
Even though Macros do it yourself software is ranked as one of Microsoft’s most useful tools to use. Based on the article by Lenning (2005) the primary security risk for users to know using macros is that many of these sites could have many different types of viruses. It is recommended that one should use caution when opening a new document. You should only open and used a trusted because some files can be corrupted and then they will spread viruses to your computer and most of the time you do not know where they come from. Depending on which version that you are going to use you will get a warning every time for a file that contains a macro. This is done because many times macros can be programmed to act like a virus. Before even considering opening a marcro site one has to remember that it can be dangerous to their computer. Because these viruses that pretend to be a marco they can get into your computer and delete files and cause other damage to your system as viruses are meant to do. It’s a good idea to be careful when you enable macros. There are a couple of ways to help keep your computer safe; I would look at installing the lasts service packs and updates for Microsoft. I would also make sure I had a strong firewall/anti- virus program on my computer. But, the main way to help keep your computer safe I feel is to pay attention to what you are using, what sites, and what you

You May Also Find These Documents Helpful

  • Satisfactory Essays

    When you are in college, get virus protection on your laptop, as this is one of th...…

    • 456 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 1

    • 345 Words
    • 2 Pages

    And once malwares, Trojans, viruses gain entry into the computer system then these software programs destabilize the operating system, cause damage to it. It is recommended to install and use effective PWS: Win32/QQpass.GR removal software like VSKsoft antivirus software to get rid of all malware related issues.…

    • 345 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The level of prevention Tertiary prevention. I feel this way because you cannot prevent what has already happened you just have to rehabilitate this person. And hope they learn to not deal with the abuse the lady used the panic which prevented the man from hurting the lady and he went to jail. I would have done things A little differently I would have told her that she needs to stand up to him and I would be there when she did. Because she has low self esteem I would put her in a program that helps her to gain confidence about herself. I do think they did a good job by calling the police because he needs to know he can’t…

    • 323 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    There are several ways in which to organize a counseling center for victims of domestic abuse. Organization by departmentalization is a model in which the agency is broken into subgroups or departments according to process, market, program, or client and consumer needs. The most effective organization by departmentalization would be to break up the departments according to program. Victims of domestic abuse may need different programs in order to get their lives back on track. Some may be in need of counseling while others need help finding a new place to live or need help with job placement. The downside to organizing a counseling center, by program is that the counseling center may offer only a handful of services and would need to refer clients to outside organizations. If the agency did offer other programs, the victim may feel that they are overwhelmed with their options and may go back to their previous situation.…

    • 472 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Using the software is simple and easy to learn. It can be a little hard if one does not have proper knowledge of the internet. In order to be able to download this program the proper way without any add-ons of viruses, one would have to have the knowledge of the internet and to be able to download programs. The last thing that will help when using out software, is knowing how to use an external hard drive…

    • 691 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    307-Task B

    • 265 Words
    • 2 Pages

    Biv, If your files are stored on computer or other electronic device you should ensure it is password protected and that any removable devices are locked away securely. Usernames and Anti-virus programs also give you better protection. Anti-virus is only effective if you keep it up to…

    • 265 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SEC 280 Week 4 Case Study

    • 425 Words
    • 2 Pages

    Another risk is spoofed attacks. Many people fall victims to banner ads on the internet that trick unknowing users into clicking on them and installing what they think is an essential software update to legitimate software. Often times however it may actually be some type of virus, malware, or root kit. A root kit is the most dangerous of those possibilities. Once installed a root kit can do any manner of things to your system. They can turn off all antivirus software they may be installed, or simply prevent that software from updating itself. They can even go as far as to render your system totally useless. The best way to avoid this is by going directly to the software developer’s website to get…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I would tell the members of the Senate that mental health is just as important as physical health. Health professionals say that there is a solid link between the mental health and physical health. The health and illnesses are not just related to biological issues, but is a combination of biological issues, social conditions, and behavioral factors. If we want our society to deal with all of the health issues that they may face, we need to bring a health care policy that takes into consideration of all these things.…

    • 280 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    3. Identify and document at least three vulnerabilities and the solutions related to the client configurations.…

    • 537 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    Unguarded Analysis

    • 423 Words
    • 2 Pages

    Unguarded is a ESPN documentary about the career of former Denver Nuggets and Boston Celtics basketball player, Chris Herren. Chris Herren is from Fall River, Massachusetts, a city on the southern coast of the state, near Providence Rhode Island. Fall River is a city in which you are constantly surrounded by poverty and struggle. As Chris Herren grew up, he had the talent to be a basketball star, if not a professional. He attended Durfee High School, where he amassed 2,073 points. He went to Boston College, expecting to have an amazing career there. In his first game, he broke his wrist, ruling him out for the rest of the season. During this time, boredom crept in. After returning to his dorm room one night, he was greeted by his roommate and two girls. The three of them were…

    • 423 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    With the security of a computer it can get very complicating. You have to make sure you are aware of what you are using and how it operates in your system. In today’s society there are a million anti-virus software programs. Many of them have free versions and some just have trail versions you can test drive before buying the full version. McAfee and Norton have trail versions you can sample before getting the full version. With Panda, AVG, and other anti-virus programs they have a free version and full upgraded version you can use.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    1. Use the Microsoft help feature to find help on the key words “macro”, click on the hyperlink “macro security levels” and display it, copy the second paragraph “Security Because macros…. publishers”, and paste it on a new blank document. Save the document as a type web page as C:\BICDL…\Macro.doc.…

    • 829 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    - Growth market thanks to the development of cybercrime industry and the fact that more and more people use the Internet…

    • 872 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 7 Ethical Hacking

    • 293 Words
    • 2 Pages

    4. What other viruses, Trojans, worms, or malicious software were identified and quarantined by AVG…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    HIPAA Research Paper

    • 564 Words
    • 3 Pages

    All the systems and networks used in hospitals should be protected against hackers by consistently scanning the network for systems and networks for threats and using appropriate and updated anti-virus and anti-malware applications.…

    • 564 Words
    • 3 Pages
    Satisfactory Essays