Please respond to the following:
1. Discuss three (3) methods of safe computing to help in the prevention of Virus and Trojan attacks. Present the basic technical knowledge that a layman would need in order to use the methods you identified.
2.Explain the exact steps you would take when securing log data. Contrast log generation / management in Windows (i.e. XP, Windows7, Server2008) versus Linux (i.e. Redhat, Ubuntu, Fedora).