Recent Posts

Monday, January 4, 2010

Computer Security Made Easy

As more people begin to use the Internet, whether for communication, online banking, investment or shopping, the potential danger of hackers and malicious attackers increase. While some may simply be after information for phishing or identity resale purposes, others are more dangerous to use in the search for computers to launch attacks such as the infamous Denial of Service or other viruses or trojans to other unknowing targets. The following list contains some simple, cheapMethods to secure your computer. While there are other ways to be do this, after the ten following steps will help you begin to protect your computer and your personal information.

1. Back up your files and stores them in a safe place separate from your computer

2. Often, patch and update the operating system, anti-virus, web browsers and Internet protection to prevent hackers from taking advantage of loopholes in the software. You can run your Windows operating systemat [http://www.windowsupdate.microsoft.com] by using the Update Wizard. Microsoft Office updates can also be found at http://www.officeupdate.microsoft.com be

3. Install a proper firewall. With the two proper hardware and software firewall, most viruses, worms, trojans, adware and malware programs are removed prior to any major problems or damage. It is important that your firewall and regularly update.

4. Configure your browser and e-mail settings for optimum security. Programssuch as ActiveX and Java are most commonly used by hackers to plant malicious programs into your system. Cookies can also be used to track your Internet browsing to build an online profile of you. A good way to overcome these problems is to configure your Internet browser to "high" security settings. At the minimum, set your security settings to "high" for the internet and "medium" for trusted sites.

5. Automatically update your antivirus software and internet securitySoftware. To be able to prevent the current versions on your computer, get the security is compromised.

6. Just run by e-mail attachments from people you have known. And even then only if you know what you are openning. Often a hacker can use the compromised e-mail address to spam viruses or worms to infect other people. It is not enough to know the e-mail address, but you need to recognize the plant.

7. Do not run unknown. EXE files. This is thedangerous thing to do, because they often contain Trojan horse scripts waiting to infect other computers.

8. Disable hidden filename extensions. This allows you to identify, and all unknown files or programs that are running on your computer locally. The default Windows hides file extensions option, so you have to disable this option.

9. Disconnect your computer from the Internet and turn it off when not in use. This prevents a hacker from attacking your computer, because it does notconnected to a network.

10. Make a boot disk on a CD before your computer a hostile breach of security experience. To recover the data and system operations after a successful attack on your computer.

tax attorney news debt loan

0 comments:

Post a Comment