answersLogoWhite

0

If you have no computer security, people can find out everything you have done on that computer. If you ordered something online then they could find your credit card number. They could get all of your passwords and email accounts. Basically your computer is at the mercy of the outside world.

User Avatar

Wiki User

16y ago

What else can I help you with?

Related Questions

Is a security software program that protects a computer from access by unauthorized users.?

That's called a firewall.


Security Focus is a website that deals with what kind of information?

This website is an informational site which seeks to educate Internet users about computer security, whether it is from computer viruses, scam artists, or more.


What could be done to help resolve problem when users in the field are infected with computer viruses with the least amount of cost?

Configure the users with a higher security macro setting.


What features does McAfee Virus Protection offer for home users?

Features that McAfree Virus Protection offers home users include virus protection, email security, encryption, and Internet security. It also does frequent scans on your computer to check for malware.


What are people who use computers called?

People who use the computer are often simply known as "users".


What is a back door?

A program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network


What are two important outcomes of good computer and network security?

-Keep equipment functioning -Provide access only to authorized users


What is back dooring?

A program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network


What is the weakest link in setting up security in a computer environment?

The people in the chairs using the computers. If the end users are not trained properly they can often be tricked into circumventing the best security measures!


A technician wishes to secure the network authentication for all remote users Which security technology uses radio communication with a computer before accepting a username and password?

A technician wishes to secure the network authentication for all remote users. Key fobs is a security technology that uses radio communication with a computer before accepting a username and password.


In applications that allow users to write the security level should be set so the application warns users that a document they are attempting to open contains a macro?

javascript


To prevent malicious users from breaking into your computer system by repeatedly trying to guess a password what built-in security tool can you use?

Account Lockout