SlideShare a Scribd company logo
1 of 2
Yadav 1




pahdi yadav

professor Milton

English 101

5 May 2008

                                    Antivirus Programs

       Today, people rely on computers to create, store, and manage critical

information, many times via a home computer network information transmitted over

networks has a higher degree of security risk than information kept in a user’s home or

company premises. Thus, it is crucial that they take measures to protect their computers

and data from loss, damage, and misuse resulting from computer security risks.

Antivirus programs are an effective way to protect a computer against viruses.

       An antivirus program protects a computer against viruses by identifying and

removing any computer viruses found in memory, on storage media, or on incoming

files. When you purchase a new computer, it often includes antivirus software. Antivirus

programs work by scanning for programs that attempt to modify the boot program, the

operating system and other program that normally are read from but not modified. In

addition, many antivirus programs automatically scan files downloaded from the Web, e-

mail attachments, opened files, and all types of removable media inserted in the

computer (Karanos 201-205).

       One technique that antivirus programs use to identify a virus is to look for virus

signatures, or virus definitions, which are known specific patters of virus code.

According to Shelly and Cashman (Antivirus Programs) many vendors of antivirus

programs allow registered users to update virus signature files automatically from the
Yadav 1


Web at no cost for a specified time. Updating the antivirusi


i
      Bulowski points out that most antivirus programs against worms and Trojan
horses(55_61).

Programs signature files regularly is important, because it will download any new virus
definitions that have been added since the last update.

        Methods that guarantee a computer or network is safe from comuter viruses
simply do not exist. Installing , updating, and using an antivirus program, though, is an
effective technique to safeguard your computer from loss.

More Related Content

What's hot

What's hot (20)

Antivirus program ----neri
Antivirus program  ----neriAntivirus program  ----neri
Antivirus program ----neri
 
Mjtanasas1
Mjtanasas1Mjtanasas1
Mjtanasas1
 
antivirus
antivirusantivirus
antivirus
 
Chap 2 lab2 (Ej
Chap 2 lab2 (EjChap 2 lab2 (Ej
Chap 2 lab2 (Ej
 
R esearch report with footnote
R esearch report with footnoteR esearch report with footnote
R esearch report with footnote
 
llagas j.
llagas j.llagas j.
llagas j.
 
Maranan chap2 lab2
Maranan chap2 lab2Maranan chap2 lab2
Maranan chap2 lab2
 
Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)Chap 2 lab2 (Ej Guevarra)
Chap 2 lab2 (Ej Guevarra)
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}chap 2 lab 2 {(bryan123)}
chap 2 lab 2 {(bryan123)}
 
Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)Pahdi Yadav 1(bryan salvo)
Pahdi Yadav 1(bryan salvo)
 
(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2(Alexa 09) chap.2 lab 2
(Alexa 09) chap.2 lab 2
 
Taylor 1
Taylor 1Taylor 1
Taylor 1
 
Antivirus ppt
Antivirus pptAntivirus ppt
Antivirus ppt
 
Computer virus-and-antivirus
Computer virus-and-antivirusComputer virus-and-antivirus
Computer virus-and-antivirus
 
Computer viruses and antiviruses PPT
Computer viruses and antiviruses PPTComputer viruses and antiviruses PPT
Computer viruses and antiviruses PPT
 
Antivirus!!
Antivirus!!Antivirus!!
Antivirus!!
 
Virus & Computer security threats
Virus & Computer security threatsVirus & Computer security threats
Virus & Computer security threats
 
Antivirus software
Antivirus softwareAntivirus software
Antivirus software
 
Anti virus
Anti virusAnti virus
Anti virus
 

Viewers also liked

Andalusian cookbook
Andalusian cookbookAndalusian cookbook
Andalusian cookbookAmal Karioun
 
Your company could be losing profits unknowingly
Your company could be losing profits unknowinglyYour company could be losing profits unknowingly
Your company could be losing profits unknowinglyjperry98
 
Flyer Design | Wine & Orchid
Flyer Design | Wine & OrchidFlyer Design | Wine & Orchid
Flyer Design | Wine & OrchidJonathan Aalbers
 
الخطة الدرسية للهندسة المعمارية
الخطة الدرسية للهندسة المعماريةالخطة الدرسية للهندسة المعمارية
الخطة الدرسية للهندسة المعماريةasmaiil
 

Viewers also liked (7)

Breakout session picture 6
Breakout session picture 6Breakout session picture 6
Breakout session picture 6
 
Andalusian cookbook
Andalusian cookbookAndalusian cookbook
Andalusian cookbook
 
Your company could be losing profits unknowingly
Your company could be losing profits unknowinglyYour company could be losing profits unknowingly
Your company could be losing profits unknowingly
 
Flyer Design | Wine & Orchid
Flyer Design | Wine & OrchidFlyer Design | Wine & Orchid
Flyer Design | Wine & Orchid
 
الخطة الدرسية للهندسة المعمارية
الخطة الدرسية للهندسة المعماريةالخطة الدرسية للهندسة المعمارية
الخطة الدرسية للهندسة المعمارية
 
Initial test eso
Initial test esoInitial test eso
Initial test eso
 
Ad for BAKDesigns
Ad for BAKDesignsAd for BAKDesigns
Ad for BAKDesigns
 

Similar to Lab 2

Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)kent neri
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesVikas Chandwani
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesAlireza Ghahrood
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfBlogger
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruseSWAMY NAYAK
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...UltraUploader
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basicsjeeva9948
 
An introduction to computer viruses
An introduction to computer virusesAn introduction to computer viruses
An introduction to computer virusesUltraUploader
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwaresanthnyq
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfBlogger
 

Similar to Lab 2 (18)

Pahdi yadav antivirus
Pahdi  yadav antivirusPahdi  yadav antivirus
Pahdi yadav antivirus
 
Kent philip neri (lab 2)
Kent philip neri (lab 2)Kent philip neri (lab 2)
Kent philip neri (lab 2)
 
Mjtanasas
MjtanasasMjtanasas
Mjtanasas
 
Firewall , Viruses and Antiviruses
Firewall , Viruses and AntivirusesFirewall , Viruses and Antiviruses
Firewall , Viruses and Antiviruses
 
Cscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antivirusesCscu module 03 protecting systems using antiviruses
Cscu module 03 protecting systems using antiviruses
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
Policy report barrat & associates ltd
Policy report  barrat & associates ltdPolicy report  barrat & associates ltd
Policy report barrat & associates ltd
 
Anti virus software
Anti virus softwareAnti virus software
Anti virus software
 
How Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdfHow Antivirus Programming Can Shield Your Advanced World.pdf
How Antivirus Programming Can Shield Your Advanced World.pdf
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...An analysis of how antivirus methodologies are utilized in protecting compute...
An analysis of how antivirus methodologies are utilized in protecting compute...
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
An introduction to computer viruses
An introduction to computer virusesAn introduction to computer viruses
An introduction to computer viruses
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Tips to remove malwares
Tips to remove malwaresTips to remove malwares
Tips to remove malwares
 
How do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdfHow do Antivirus Programs work step-by-step.pdf
How do Antivirus Programs work step-by-step.pdf
 

More from novelinbabate2 (20)

Cover letter
Cover letterCover letter
Cover letter
 
Novelin campilan babate
Novelin campilan babateNovelin campilan babate
Novelin campilan babate
 
Lab 3
Lab 3Lab 3
Lab 3
 
Apply3 1
Apply3 1Apply3 1
Apply3 1
 
Rent a cabin
Rent a cabinRent a cabin
Rent a cabin
 
Blooming deals
Blooming dealsBlooming deals
Blooming deals
 
Airplane rides
Airplane ridesAirplane rides
Airplane rides
 
Research paper 2 (1)
Research paper 2 (1)Research paper 2 (1)
Research paper 2 (1)
 
Lab 1
Lab 1Lab 1
Lab 1
 
Midterm
MidtermMidterm
Midterm
 
Ice cream 3
Ice cream 3Ice cream 3
Ice cream 3
 
Ice cream 3
Ice cream 3Ice cream 3
Ice cream 3
 
Ice cream 2
Ice cream 2Ice cream 2
Ice cream 2
 
Ice cream 2
Ice cream 2Ice cream 2
Ice cream 2
 
The tailoring
The tailoringThe tailoring
The tailoring
 
Ice cream
Ice creamIce cream
Ice cream
 
Ice cream
Ice creamIce cream
Ice cream
 
Lakefront lot
Lakefront lotLakefront lot
Lakefront lot
 
Craft barn
Craft barnCraft barn
Craft barn
 
Rent a cabin
Rent a cabinRent a cabin
Rent a cabin
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 

Lab 2

  • 1. Yadav 1 pahdi yadav professor Milton English 101 5 May 2008 Antivirus Programs Today, people rely on computers to create, store, and manage critical information, many times via a home computer network information transmitted over networks has a higher degree of security risk than information kept in a user’s home or company premises. Thus, it is crucial that they take measures to protect their computers and data from loss, damage, and misuse resulting from computer security risks. Antivirus programs are an effective way to protect a computer against viruses. An antivirus program protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system and other program that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e- mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205). One technique that antivirus programs use to identify a virus is to look for virus signatures, or virus definitions, which are known specific patters of virus code. According to Shelly and Cashman (Antivirus Programs) many vendors of antivirus programs allow registered users to update virus signature files automatically from the
  • 2. Yadav 1 Web at no cost for a specified time. Updating the antivirusi i Bulowski points out that most antivirus programs against worms and Trojan horses(55_61). Programs signature files regularly is important, because it will download any new virus definitions that have been added since the last update. Methods that guarantee a computer or network is safe from comuter viruses simply do not exist. Installing , updating, and using an antivirus program, though, is an effective technique to safeguard your computer from loss.