This site uses cookies.
Some of these cookies are essential to the operation of the site,
while others help to improve your experience by providing insights into how the site is being used.
For more information, please see the ProZ.com privacy policy.
Freelance translator and/or interpreter, Verified site user
Data security
This person has a SecurePRO™ card. Because this person is not a ProZ.com Plus subscriber, to view his or her SecurePRO™ card you must be a ProZ.com Business member or Plus subscriber.
Affiliations
This person is not affiliated with any business or Blue Board record at ProZ.com.
Translation Volume: 1374 words Duration: Apr 2018 Languages:
“iRejuvenation” medical App translation
calendar, localization, notification, questions translation of “iRejuvenation” medical App.
Medical (general)
No comment.
Translation Volume: 366 words Duration: May 2018 Languages:
“Viola.AI” introduction translation
“Viola.AI” introduction translation.
Computers (general)
No comment.
Translation Volume: 5519 days Duration: Jun 2018 Languages:
“Decoin” White Paper, Website Content translation
“Decoin” White Paper, Website Content translation
Computers (general)
No comment.
Translation Volume: 1125 days Duration: Jun 2018 Languages:
“Tyffyn” Website FAQ translation
“Tyffyn” Website FAQ translation.
General / Conversation / Greetings / Letters
No comment.
More
Less
Blue Board entries made by this user
6 entries
Access to Blue Board comments is restricted for non-members. Click the outsourcer name to view the Blue Board record and see options for gaining access to this information.
English to Korean: Best computer security tips(TECH ADVISOR, By Martyn Casserly, 20 Jun 2018) General field: Tech/Engineering Detailed field: IT (Information Technology)
Source text - English Best computer security tips
Your devices are constantly under assault from hackers and malicious software. We show you some straightforward ways to bolster security and keep your stuff safe.
Computers are such an integral part of life now, that it can be easy to take them for granted. But, with so much of our personal, financial, and legal information accessible through your PC, laptop and phone, it’s essential that we keep them and Windows 10 secure.
To help with this, we’ve put together a guide to the best ways of protecting your digital life from those that would seek to do you harm.
Install updates
Microsoft releases updates to Windows, as Apple does for macOS, on a regular basis. While these sometimes include new features, the main reason for applying them is the security patches they include.
As new threats or vulnerabilities become known, hackers and developers race to either exploit or fix them, that’s why installing the updates is a crucial part of defending your PC.
Windows 10 has a setting which will implement the updates as soon as they are available, and here's 'how to use Automatic Updates in Windows 10'.
Translation - Korean 컴퓨터를 보호하는 가장 좋은 방법
당신의 기기는 끊임없이 해커와 악성 소프트웨어의 공격을 받습니다. 보안을 강화하고 자료를 안전하게 보관할 수 있는 간단한 방법을 알려드리겠습니다.
이제 컴퓨터는 삶에서 필수적인 요소로, 당연하게 받아들여지고 있습니다. 그러나 PC와 노트북, 핸드폰으로 접근이 가능한 개인적이고 재정적이며 법적인 정보는 너무나 많기 때문에 정보 보호와 윈도우 10의 보안 유지가 매우 중요합니다.
이를 위해, 해를 끼치는 행위로부터 디지털 라이프를 보호할 수 있는 가장 좋은 방법들을 준비했습니다.
업데이트 설치
마이크로소프트는 애플이 정기적으로 맥OS 업데이트를 제공하는 것처럼 윈도우 업데이트를 제공하고 있습니다. 가끔은 새로운 기능을 추가하는데, 이를 적용하는 주된 이유는 보안 패치 때문입니다.
새로운 위협과 취약점이 알려지면 해커와 개발자는 그것을 이용하거나 고치기 위해 경쟁하는데, 이것이 PC를 보호하는 데 업데이트 설치가 중요한 이유입니다.
윈도우 10은 업데이트가 제공되는 즉시 적용하는 설정이 있으며 '윈도우 10에서 자동 업데이트를 사용하는 방법' 항목을 참조하세요.
More
Less
Experience
Years of experience: 7. Registered at ProZ.com: Nov 2017.
- Andrew Dent’s “To eliminate waste, we need to rediscover thrift" Lecture and Introduction at TED
- ISO/IEC 27017, Information technology, Security techniques, Code of practice for information security controls based on ISO/IEC 27002 for cloud services
- ISO/IEC 27002:2013 Information technology, Security techniques, Code of practice for information security controls
- 3D Touch Print Optical Fingerprint Recognition EMBEDDED Module GT-511C3 Data Sheet
- Under My Thumbs, Revisiting Windows thumbnail databases and some new revelations about the forensic implications
- Windows Explorer Thumbnail Cache database format specification (Analysis of the thumbcache.db format)