#malwarebytes.com
Explore tagged Tumblr posts
Text
www.malwarebytes.com/mac
www.malwarebytes.com/mac-With the development of the digital world, online protection is crucial. It is extremely important to protect your PCs, Mac, computers as well as mobile devices and tablets with malwarebytes com .
www malwarebytes com mac– It will shield your computer from various threats by detecting and removing viruses in real time. This is done with the use of anti-malware, anti-spyware, and anti-rootkit technology. The software’s auto-scan feature also offers a proactive way to clean up a system.
www malwarebytes com mac –Malwarebytes (formerly known as Malwarebytes Anti-malware) is primarily a scanner that scans and removes malicious software, including rogue security software, adware, and spyware. This includes protection against malware, ransomware, exploit, and malicious websites. Malwarebytes filters in bunch mode, as opposed to examining all documents opened, decreasing impedance if another on-request hostile to malware programming is likewise running on the PC.
www.malwarebytes.com/mac | Work of malwarebytes anti-malware
Many programs scan for malware using a database of known malware definitions (also called signatures). These definitions tell what the malware does and how to recognize it. If the anti-malware program detects a file that matches the definition, it’ll flag it as potential malware. This is a good way to remove known threats, but it does require regular updates to make sure the program doesn’t miss out on newly developed malware.Malicious software, or malware, is the main avenue for almost everything bad that happens on a computing device. Aside from losing a device, user error or negligence, almost all breaches can be traced back to malware.
Complicating matters, we’ve seen rapid innovation on the breadth and sophistication of malware used to launch a multifaceted attack aimed at stealing money and intellectual property. So looking forward, a critical business issue becomes understanding the evolution of malware and how to select security technologies that can adapt to the dynamic nature of malware.
#malwarebytes review#malwarebytes tech support#malwarebytes anti-malware 3.7.1 serial key#www.malwarebytes.com/install#malwarebytes.com
0 notes
Text
www.malwarebytes.com/install
Malware may infect your computer if you click on a suspicious email attachment, although it is not restricted to that. Malware also arises from unreliable sources via software facilities and when you visit infected websites.
Malwarebytes is a premium anti-malware program for cleaning and guarding your PC against threats to the web: viruses, spyware, Trojans, bots, adware, and worms. It uses a prevention engine of three layers: Surf Protection, Real-time File Guard, and Behavior Blocker.
1 note
·
View note
Video
tumblr
www.malwarebytes.com/install : +1-844-916-0430 Tollfree Number
IF YOU HAVE ANY QUERY REGARDING MALWAREBYTES SERVICES SO YOU CAN VISIT OUR WEBSITE https://www.globaltechhninza.com/malwarebytes-com-install/ AND CALL US OUR TOLLFREE NO.: +1-844-916-0430
0 notes
Link
Before Starting with Malwarebytes Anti-malware user’s need to check and identify Malwarebytes Anti-malware key code, Look on the back side of Malwarebytes Anti-malware Retail card you can find Alphanumeric Key code.
0 notes
Link
www.malwarebytes.com/install -With the development of the digital world, online protection is crucial. It is extremely important to protect your PCs, Mac, computers as well as mobile devices and tablets with malwarebytes.com.
It will shield your computer from various threats by detecting and removing viruses in real time. This is done with the use of anti-malware, anti-spyware, and anti-rootkit technology. The software’s auto-scan feature also offers a proactive way to clean up a system.
#www.malwarebytes.com/install#malwarebytes for mac#malwarebytes for windows#reinstall malwarebytes#install malwarebytes with licence key
1 note
·
View note
Text
www.malwarebytes.com/mac-With the development of the digital world, online protection is crucial. It is extremely important to protect your PCs, Mac, computers as well as mobile devices and tablets with malwarebytes.com.
1 note
·
View note
Text
reinstall malwarebytes anti malware premium || Is Malwarebytes easy to install?
Reinstall Malwarebytes Premium : You really want to reinstall malwarebytes premium assuming that you are having one of these issue. Malwarebytes vanished from pc after restart. Malwarebytes isn't working. Can't refresh Malwarebytes. Malwarebytes not opening in windows 10 Strategy 1 Malwarebytes.com : In the event that you have purchased Malwarebytes from Malwarebytes.com, you probably got an email with Permit key and connection to download the program . Check in the event that you can track down the email.
Technique 2 Malwarebytes Permit Key : Malwarebytes can be downloaded from Malwarebytes.com . You really want to look through Malwarebytes Official Site to download the Malwrebytes free rendition. Whenever it is introduced you will be provoked to embed the lisence key. Activate the program utilizing the Permit key.
Technique 3 Reestablish Malwarebytes by reestablishing windows: This technique is utilized for the clients who don't have the malwarebytes Premium permit key with them.You need to reestablish the PC to the past date . Subsequent to reestablishing you will find malwarebytes in your PC. Remember to restart your PC in the wake of refreshing malwarebytes.
You can likewise Email us or contact a client care delegate on the off chance that you have any criticism or question.
Reinstall Malwarebytes Premium FAQ How would I reestablish Malwarebytes? Reinstall Malwarebytes with key in windows 10 is Simple. On the off chance that you have the lecense key you can download malwarebytes free variant and utilizing the permit key you can activate Malwarebytes premium rendition by going into record of your product interface.
I can't uninstall malwarebytes hostile to malware. You can totally eliminate Malwarebytes from windows 10. Go to Control Board of your PC and uninstall malwarebytes from the rundown of projects. You can likewise utilize MBAM expulsion instrument to uninstall Malwarebytes.
what is malwarebytes support instrument? It is an instrument given by the Malwarebytes itself to fix , investigate and determine the issues with Malwarebytes for Windows.
Will I uninstall and reinstall Malwarebytes? Indeed. Before you uninstall Malwarebytes ensure you have the Malwarebytes permit key saved with you. Subsequent to reinstalling the Malwarebytes activate it by the key and it ought to work once more.
How would I reload Malwarebytes premium? Uninstall and reinstal the Malwareytes with a similar Permit key.
What occurs if I uninstall Malwarebytes? You should have another dynamic security on the off chance that you are anticipating to uninstall Malwarebytes for eternity. In the event that you will reinstall it same time, it is fine.
How would I realize Malwarebytes is functioning? All the insurance ought to be on. Assuming they are on that implies the security is working.
How would I eliminate Malwarebytes from Windows 11? Use malwarebytes instrument to eliminate it from windows 11.
Is Malwarebytes viable with Windows 11? Indeed, Malwarebytes is completely viable with Windows 11.
How might I contact Malwarebytes? You can call or talk with the help group.
1 note
·
View note
Text
Globaltechninza.Com
Globaltechninza.Com is the website from where you can get a lot of information about all the Antiviruses available in the market. Although there is a variety of Antiviruses in the market available for you. But here we will provide the wide description about the best ones. Antiviruses help you to keep your devices safe from the attack of viruses and unexpected errors. Some of the best Antiviruses brands are Norton, Avast, AVG and Bitdefender. We have not just given the information about Antiviruses, but If you want to know which one of the Email service is the best so you can take the help of our recommendations. Some of the Best Email services are AOL Email, Gmail, ATT Email, Hotmail. If you want to know how you can Activate McAfee Account, Norton installation process, Webroot SecureInstall Guide, Eset Security and Kaspersky Activation code then visit the page Globaltechninza Antiviruses.
Malwarebytes.Com/Install
As we know Technology is spreading across the world. In this Modern time where everyone is using different sites and different devices to keep secure this network there is Malwarebytes Setup Wizard which gives you the protection for your devices. It is available for Android and iOs users, For Window Users and for Mac Users. We have given the guide about VIPRE Security Download and Tools also along with the Threat Analyser.
McAfee Antivirus
McAfee is one of the best Antivirus which is easy to Activate. It has a variety of Contents and its Activation process is not tricky. We provided all the instruction and guidance about McAfee. In the McAfee activation process it will ask to input about 25 digit McAfee activation code. Norton is also one of the famous Antivirus which is enjoying the name of trusted brand for over 25 years. The brand has a lot of multifunctional and efficient to manage your devices such as Laptop, PC and SmartMobile also. In the process of activation you need to input a product key for Activation. In the website you will get all the steps and instructions needed to Activate Norton. And for the Activation of Webroot Cybersecurity visit the link Webroot.Com/SecureInstall. For the Activation of Trend Micro and for getting the user's guide visit the link WWW.Trendmicro.Com/Getmax in guide you will get all the steps to install the Trendmicro. If you have purchased the Eset Antivirus then for the Activation guide visit the link Download Eset Endpoint Security and Setup guide. Kaspersky Activation code is also available on our webpage Kaspersky Activation Code and Install Guide.
Best Email Services
Email is the normal service used by all the users. But there is a variety of Email Facilities such as AOL Mail, Comcast Email, Juno Email and Verizon Email, RoadRunner Email and Sbcglobal Email. If you are using the Roadrunner Email and have any kind of question or problem then you can take help from our webpage Roadrunner Email Login Setup. Verizon is the antivirus which is in the range of best Emails for any detail or information visit the page Verizon Email Login AOL. Juno is the Email with a lot of advanced features to get more information about Juno Email Login. AOL Mail for Verizon to login to that use our instruction in case of any query visit the link AOL mail Login Verizon. Comcast Email is an advanced and multifunctional Email platform where you find all the settings and control dashboard. If you have any issue in the Settings or Setup then visit the Webpage Comcast Email Setup. Sbcglobal Email is the Email Service that is faster and Smarter. It has a complex setting to Setup to take any kind of help visit the webpage Sbcglobal Email Account.
0 notes
Text
Online Safety, Security, Ethics, and Etiquettes.
Browser Hijacking - occurs when unwanted software on an internet browser alters the activity of the browser. Internet browsers serve as the "window" to the internet, and people use them to search for information and either view it or interact with it. (us.norton.com)
Identity Theft - are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. (justice.gov)
Malware - are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. (csoonline.com)
Pharming - a portmanteau of the words "phishing" and "farming", is a type of cybercrime very similar to phishing, where a website's traffic is manipulated and confidential information is stolen. (kaspersky.com)
Phishing - is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this venerable, but increasingly sophisticated, form of cyber attack. (csoonline.com)
Spam - is any kind of unwanted, unsolicited digital communication, often an email, that gets sent out in bulk. Spam is a huge waste of time and resources. (malwarebytes.com)
Spyware - can capture information like Web browsing habits, e-mail messages, usernames and passwords, and credit card information. If left unchecked, the software can transmit this data to another person's computer over the Internet. (techterms.com)
Trojan - is a type of malware that is often disguised as legitimate software. Trojans can be employed by cyber-thieves and hackers trying to gain access to users' systems. (kaspersky.com)
INSIGHTS: Many bad things can happen once we enter the world of the web. We do access a lot of sites as well as services and we’re unaware that we’re giving our confidential information to other people. Just like the ones mentioned above, those are the things that can happen to us when we’re not careful about accessing online services. We must examine what is and what should not be done online to prevent such incidents and protect our identity. Always remember not to just trust other people or technologies online especially if we don’t have enough knowledge and information about what services or applications we will use. Learn to look at preferred and reliable online sites and services.
0 notes
Link

2 notes
·
View notes
Photo

how to reinstall malwarebytes premium - how to reinstall malwarebytes premium (on Wattpad) https://my.w.tt/dUkgspXAMW how to reinstall malwarebytes premium-With the development of the digital world, online protection is crucial. It is extremely important to protect your PCs, Mac, computers as well as mobile devices and tablets with malwarebytes.com . how to reinstall malwarebytes premium- It will shield your computer from various threats by detecting and removing viruses in real time. This is done with the use of anti-malware, anti-spyware, and anti-rootkit technology. The software's auto-scan feature also offers a proactive way to clean up a system.
0 notes
Link
Before Starting with Malwarebytes Anti-malware user’s need to check and identify Malwarebytes Anti-malware key code, Look on the back side of Malwarebytes Anti-malware Retail card you can find Alphanumeric Key code.
0 notes
Link
0 notes
Text
Software Updates, Anti-Virus, and CryptoLocker … Oh My

If you are a Windows user, and you haven’t been hiding with your head in the sand, or under a rock (or a sandy beach some where … oh to dream…) you are probably aware of the newest CryptoLocker ransomeware threat called WannaCry. WannaCry is a CryptoLocker that encrypts all of the files on your computer, then threatens to delete your files in 7 days if you do not pay $300.00 ransom in BitCoin (because it is a crypto-currency that is virtually untraceable) to the creator(s). Nobody knows who the developer is. Nor do they know where the money is going. The computers that are vulnerable seem to be corporate, hospital, and private computers that do not receive frequent updates, and do not have updated anti-virus and firewall. So this is the topic for the day.
You Need To Update Your Computer
If you are running Windows 7, 8, 8.1, and 10, and have not updated your computer lately you really need to update the OS. That is the first step in protecting your computer from WannaCry. If you do not know how to update your computer follow the steps below for your OS:
Windows 7:
Select the Start button > All programs > Windows Update.
In the left pane, select Check for updates.
If any important updates are found, select the link to view available updates. ...
Select Install updates.
Windows 8 / 8.1:
Make sure your PC is plugged in and connected to the Internet using a non-metered connection. Don’t disconnect, unplug, or turn off your PC while the update is being installed.
Swipe in from the right edge of the screen, tap Settings, and then tap Change PC settings. (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, click Settings, and then click Change PC settings.)
Tap or click Update and recovery, and then tap or click Windows Update.
Tap or click Check now.
If updates are found, tap or click View details.
In the list of updates, select the updates you want, and then tap or click Install.
If you're prompted for an administrator password or confirmation, enter the password or provide confirmation.
After the installation is complete, restart your PC and sign in.
Windows 10
Open the Settings menu and go to Update & security > Windows Update.
Click Check for updates to prompt your PC to scan for the latest updates.
The update will be downloaded and installed automatically.
Click Restart Now to restart your PC and complete the installation process.
You Need To Scan For Malware
If you don’t already have Malwarebytes installed on your PC you will want to download install and run it. You can download it by going to malwarebytes.com. To install it please follow the instructions available at: https://www.malwarebytes.com/support/guides/mb/Installation.html. The software will install with a 15 day trial of premium, then it will revert to the free version after 15 days. The scan will detect all of the pieces of malware on your computer and remove them.
You need Anti-Virus
If you haven’t updated your anti-virus, or do not have one installed now is the time to do so. If you have antivirus you need to run it, and make sure its up to date. If you need anti-virus, there are several free anti-virus programs available that will do a great job protecting your computer. I suggest Avast Anti-virus (www.avast.com) which is a stable and efficient anti-virus that has web traffic, and a built in mail scanner which will protect your system from malicious web pages and e-mail messages. Many have also touted AVG Anti-virus (www.avg.com) which has many of the same features as Avast. Although I am really a fan of Avast’s free anti-virus some may feel that they need to pay for anti-virus software, developers like Mcafee, Norton, Avast, and AVG have professional software packages available to protect your computer.
There Should Be Only One
I know that you usually can’t have too much of a good thing. The reality is that you really should only have one anti-virus on your computer at a time. The same is also true of on-line virus scanners like Mcafee Virus Scan. If you have multiple anti-virus apps installed your computer will run slower, and you have a greater chance of infection from a virus, you really need to choose one program and then eliminate the others. Please note that Malwarebytes is not considered to be an antivirus program.
Finally, You Should Back Up Your Files
If you don’t want to lose your files you really should keep a disconnected backup of your files. External hard drives provide plenty of storage for a reasonable price. A 4 TeraByte drive costs about $150.00, and it can easily store all of your media files and data. When the backup is complete just disconnect it from the computer.
If you keep your software updated, anti-virus updated, and run Malwarebytes once every couple of weeks you should be able to keep the WannaCry malware off of your computer, and all of your files safe.
1 note
·
View note
Text
www.malwarebytes.com/install
UsabilityWith the improvement of the computerized world, online assurance is critical. It is critical to ensure your PCs, Mac, PCs just as cell phones and tablets with malwarebytes.com/install. It will shield your PC from different dangers by distinguishing and expelling infections continuously. This is finished with the utilization of hostile to malware, against spyware, and against rootkit innovation. The product's auto-filter highlight likewise offers a proactive method to tidy up a framework.

You can safely cross the antivirus software off your list if it doesn’t meet the following criteria.
Privacy - Check the protection practices of the AV sellers. Some are widely gathering information about your PC use to improve their items. While basic item utilization telemetry is normally anonymized, a few items may likewise transfer suspicious documents from your PC to the merchant's checking cloud. You should have the option to completely believe that the seller will deal with your records mindfully, morally and safely. All things considered, a private archive could be a piece of such a transfer, as well. This is especially significant for organizations that manage basically private customer information, (for example, that oversaw by medical clinics and specialists), just as organizations that dread any kind of modern secret activities.
False positives - Numerous antivirus suppliers get around this by changing the discovery limit, however, this can have the contrary impact and result in a decreased location rate. In a perfect world, you need to discover antivirus programming that strikes the sweet spot between a decent identification rate and a low number of bogus positives.
Usability - The best antivirus programming offsets structure with work. Search for an item that includes an easy to use interface that is intelligent to explore and incorporates settings that can be effectively changed to address your issues. On the off chance that your forthcoming antivirus programming incorporates miles of unintuitive menus and alternatives that can't be deciphered without various excursions to Wikipedia, it may be a great opportunity to check it off the rundown.
Through a procedure of end, ideally, you've had the option to chop down your rundown of forthcoming antivirus programming to a couple of solid competitors. In case you're in the market for a lightweight antivirus programming that offers outstanding security, superb client care and incredible ease of use for clients of every single specialized level, make certain to download your Malwarebytes from www.malwarebytes.com/install.
#www.malwarebytes.com/install#malwarebyte download and install#malwarebytes premium key#malwarebyte#malwarebyte customer care
0 notes
Text
My Answers for HW5proj
Question:
If it is a paper, write 349 words or more of it to your blog. MS Word tells you how many words are in a document you are editing in a little status bar in the lower left corner of its window. OpenOffice Writer has a tool that you can click to find out the # of words. Let me know if you can’t find it. Do not include material submitted for a previous HW, obviously.
If your project is not a paper, do the equivalent amount of work, and provide a brief (but with specific details) description, and evidence as appropriate, in your blog. If you’re not sure what to do, I can try to suggest something.
ETHICSPROJECT.HTML
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<title> Spyware: Ethical or Non-ethical?</title>
<link rel="icon" href="favicon.ico">
<link rel = "stylesheet" href = "Project.css">
</head>
<body>
<header>
<img src="spyware.png"
alt="Spyware Clipart"
style="width:75px;height:75px;">
<h1>Spyware: Ethical or Non-ethical?</h1>
</header>
<main>
<h1>What is Spyware?</h1>
<p> Spyware is unwanted software that steals your information.
Spyware can be on many types of platforms. Spyware can come from
phising or can even be sold with softwares we pay. Some companies
will pay software companies top dollar to include their spyware.
</p>
<h3> According to malwarebytes.com, </h3>
<blockquote>“Spyware is actually a type of malware that infects your PC or
mobile device and gathers information about you, including the sites you visit,
the things you download, your usernames and passwords, payment information,
and the emails you send and receive.”</blockquote>
<h2><a href = "cases.html">Spyware Cases</a></h3>
<h2><a href = "ethics.html">Ethical Approach</a></h3>
<h2><a href = "top10.html">Spyware Attacks</a></h3>
</ul>
</main>
<footer>
<p> Works cited: </p>
<pre> NortonOnline. “What Is Spyware? And How to Remove It.” Official Site,
us.norton.com/internetsecurity-how-to-catch-spyware-before-it-snags-you.html
Gassée, Jean-Louis. “Beyond Fabricated Spyware Tales.” Medium, Monday Note,
22 Oct. 2018, mondaynote.com/beyond-fabricated-spyware-tales-bb297bcb5694
“Spyware - What Is It & How To Remove It?” Malwarebytes, www.malwarebytes.com/spyware/
Calvello, Mara. “What Is Spyware? (+5 Ways Hackers Try to Steal Your Info).” G2, G2
Learning Hub, 6 July 2019, learn.g2.com/spyware.</pre>
</footer>
</body>
</html>
CASES.HTML
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<title> Top Spyware Cases</title>
<link rel="icon" href="favicon.ico">
<link rel = "stylesheet" href = "subProject.css">
</head>
<body>
<header>
<a href = "EthicsProject.html">
<img src="spyware.png"
alt="Spyware Clipart"
style="width:75px;height:75px;">
</a>
<h1>Spyware Cases</h1>
</header>
<main>
<h1>Spyware Legal Cases</h1>
<h2>This page is under construction</h2>
</main>
</body>
<footer>
<nav>
<ul id="pagesMenu">
<li><a href="EthicsProject.html">←Home</a></li>
<li><a href="ethics.html">Next: An Ethical Approach→</a></li>
</ul>
</nav>
</footer>
</html>
ETHICS.HTML
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<title> Ethics on Spyware</title>
<link rel="icon" href="favicon.ico">
<link rel = "stylesheet" href = "subProject.css">
</head>
<body>
<header>
<a href = "EthicsProject.html">
<img src="spyware.png"
alt="Spyware Clipart"
style="width:75px;height:75px;">
</a>
<h1>Ethics vs. Spyware</h1>
</header>
<main>
<h1>An Ethical Approach to Spyware</h1>
<h2>What if you apply deontological ethics (rule-based) to this case?</h2>
<h2>What if you apply utilitarian ethics (similar to consequentialist ethics) to this case?</h2>
<h2>What if you apply virtue ethics (character-based) to this case?</h2>
</main>
</body>
<footer>
<nav>
<ul id="pagesMenu">
<li><a href="cases.html">←Previous:Spyware Cases</a></li>
<li><a href="top10.html">Next: Spyware Attacks→</a></li>
</ul>
</nav>
</footer>
</html>
TOP10.HTML
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8">
<title> Top 10 Spyware Attacks</title>
<link rel="icon" href="favicon.ico">
<link rel = "stylesheet" href = "subProject.css">
</head>
<body>
<header>
<a href = "EthicsProject.html">
<img src="spyware.png"
alt="Spyware Clipart"
style="width:75px;height:75px;">
</a>
<h1>Spyware Attacks</h1>
</header>
<main>
<h3>Spyware is a lot like phising. At my IT internship, they will send out random phishing emails,
to see how the employees are protecting themselves. These are the top 10 attacks, in no particular order.
</h3>
<ol type="1">
<li> Email: Emails can come to your inbox, or even another folder, showing from someone you trust.
With bad, virus-filled links.</li>
<li> Software</li>
<li> Adware: Adware tracks your browsing data to find what you are interested in. Then it can
decide what ads will most likely cause you to click on a link, spreading the virus.</li>
<li> Surveys: Promises to put you in a drawing through a survey gives the spyware professionals
your information so that they can attack you in more discrete ways.</li>
</ol>
</main>
</body>
<footer>
<nav>
<ul id="pagesMenu">
<li><a href="ethics.html">←Previous: An Ethical Approach</a></li>
<li><a href="EthicsProject.html">Next: Home→</a></li>
</ul>
</nav>
</footer>
</html>
PROJECT.CSS
* {
margin: 0;
padding: 0;
}
html {
background-color: white;
}
/* the styles for the elements */
body {
font-family: Arial, Helvetica, sans-serif;
font-size: 100%;
width: 650px;
margin-top: 0;
margin-bottom: 0;
margin-left: auto;
margin-right: auto;
border: 3px solid black;
background-color: #EEFBFB;
}
header{
vertical-align: center;
border-bottom: 3px solid black;
padding-top: 1.5em;
padding-bottom: 3em;
background-image: -webkit-linear-gradient(30deg, black 0%, black 30%, white 50%, black 80%, black 100%);
}
header h1{
font-family: Bookman;
font-size: 225%;
text-shadow: 1px 1px black;
color: #72DDDD;
font-style: bold;
}
header img {
vertical-align: center;
float: left;
padding-left: 30px;
padding-right: 30px;
}
/* the styles for the section */
main {
clear: left;
padding-left: 30px;
padding-right: 30px;
}
main h1 {
color: #72DDDD;
font-size: 150%;
padding-top: .3em;
padding-bottom: .3em;
}
main h2 {
font-size: 130%;
color: black;
padding-top: .5em;
padding-bottom: .25em;
}
main h3 {
font-size: 105%;
padding-bottom: .25em;
}
main p{
padding-bottom: .5em;
}
main blockquote{
padding-right: 2em;
padding-left: 2em;
font-style: italic;
}
main ul{
padding-bottom: .25em;
padding-left: 1.25em;
}
main ol{
padding-bottom: .25em;
padding-left: 1.25em;
}
main li{
padding-bottom: .35em;
}
main a:hover{
font-style:italic;
}
/* the styles for the footer */
footer {
background-color: #EEFBFB;
border-top: 3px solid black;
}
footer p {
padding-top: 1em;
padding-bottom: 1em;
color: #72DDDD;
text-align: center;
}
SUBPROJECT.CSS
* {
margin: 0;
padding: 0;
}
html {
background-color: white;
}
/* the styles for the elements */
body {
font-family: Arial, Helvetica, sans-serif;
font-size: 100%;
width: 650px;
margin-top: 0;
margin-bottom: 0;
margin-left: auto;
margin-right: auto;
border: 3px solid black;
background-color: #EEFBFB;
}
header{
vertical-align: center;
border-bottom: 3px solid black;
padding-top: 1.5em;
padding-bottom: 3em;
background-image: -webkit-linear-gradient(30deg, black 0%, black 30%, white 50%, black 80%, black 100%);
}
header h1{
font-family: Bookman;
font-size: 225%;
text-shadow: 1px 1px black;
color: #72DDDD;
font-style: bold;
}
header img {
vertical-align: center;
float: left;
padding-left: 30px;
padding-right: 30px;
}
/* the styles for the section */
main {
clear: left;
padding-left: 30px;
padding-right: 30px;
}
main h1 {
color: #72DDDD;
font-size: 150%;
padding-top: .3em;
padding-bottom: .3em;
}
main h2 {
font-size: 130%;
color: black;
padding-top: .5em;
padding-bottom: .25em;
}
main h3 {
font-size: 105%;
padding-bottom: .25em;
}
main p{
padding-bottom: .5em;
}
main blockquote{
padding-right: 2em;
padding-left: 2em;
font-style: italic;
}
main ul{
padding-bottom: .25em;
padding-left: 1.25em;
}
main ol{
padding-bottom: .25em;
padding-left: 1.25em;
}
main li{
padding-bottom: .35em;
}
main a:hover{
font-style:italic;
}
/* the styles for the footer */
footer {
background-color: #EEFBFB;
width: 650px;
height: 50px;
padding-bottom:0em;
}
#pagesMenu {
margin:10px;
width:650px;
font-family: sans-serif;
}
#pagesMenu li {
display:block;
width:315px;
float:left;
margin-left:2px;
}
#pagesMenu a {
display:block;
padding:3px;
text-decoration:none;
background-color:#EEFBFB;
color:#72DDDD;
}
#pagesMenu a:hover {
background-color:#72DDDD;
color:#EEFBFB;
}
#pagesMenu li:last-child{
text-align: right;
}
------What I have done is added another stylesheet, linked the stylesheet to all of the subpages. The reason for the new stylesheet is because I needed to specify certain rules for the footer, to apply a navigation list to go to next and previous pages. It also includes the rules in Project.css for the rest of the page elements. I did research for my attacks page and I added more to the ethics page, the 3 questions. I also fixed the headers of all pages (cases.html, ethics.html, and top10.html)
Q2. Explain what needs to be done next on the project. Put this in your blog, labeling it consistently per the example template.
I need to finish my research for my attacks page, adding an explanation for all attacks, and attacks 5-10. I need to develop an ethical approach to all of the questions answered, and find more information on ethics. I also need to find ethical cases regarding spyware. This project is really coming along. I think all of my styles have been implemented and I just need to do research from this point forward.
0 notes