|
|
Securing Your Computer System
|
| Tuesday, January 6, 2009 |
Today, more and more people use their computers for everything from communication to online banking and investing to shopping. As we have done these things on a more regular basis, we are open to potential hackers, attackers and crackers. While some try to be phishing May your personal information and identity for resale, others simply want to use your computer as a platform to attack other unknowing targets. Here are some easy, cost-effective steps you can take to make your computer more secure.
1. Always make backups of important information and store in a safe place separate from your computer. 2. Updates and patches for your operating system, web browser and software frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and carrying out the update wizard. This program helps you find the latest updates for your Windows computer. Www.officeupdate.microsoft.com will also possible to find patches for your Office programs. 3. Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can easily access your computer from the Internet. It should consider the advantages and differences between hardware and software firewall. 4. Check your browser settings and e-mail for additional security. Why should you do? Active-X and JavaScript are often used by hackers to plant malicious programs on your computer. While cookies are relatively harmless in terms of security, they still track your movements on the Internet to create a profile of you. At a minimum set your security setting for the "Internet zone" high, and your "Trusted sites zone" medium to low. 5. Install antivirus software and automatic updates so that you receive the latest versions. 6. Do not open unknown attachments. It is not enough to recognize that you have in May from the original address, because many viruses can spread from a familiar address. 7. Do not run programs of unknown origin. Also, do not send these types of programs to friends and coworkers, because they contain funny or amusing stories or jokes. They contain a Trojan horse May waiting to infect a computer. 8. Disable file name extensions hidden. By default, the Windows operating system is set to "Hide extensions for files whose type is known." Disable this option so that file extensions display in Windows. Some file extensions by default, remain hidden, but you're more likely to see the unusual file extensions that are not party. 9. Turn off your computer and disconnect from the network when you are not using the computer. A hacker can not attack your computer when you are disconnected from the network or the computer is off. 10. Consider making a boot disk on a floppy disk in case your computer is damaged or compromised by a malicious program. Obviously, you need to take this step before you experience a hostile breach of your system. |
posted by neptunus @ 8:11 PM
 |
|
|
|
|
Post a Comment