Board logo

subject: Securing Your Computer Program [print this page]


Securing Your Computer Program
Securing Your Computer Program

These days, much more and more folks are using their computers for everything from communication to on the internet banking and investing to shopping. As we do these points over a much more normal basis, we open ourselves up to possible hackers, attackers and crackers. Although some might be searching to phish your private details and identity for resale, others merely just desire to use your computer as a platform from which to attack other unknowing targets. Below are a few simple, cost-effective steps you are able to take to make your pc a lot more secure.

Always make backups of essential info and store in a safe location separate from your pc.

Update and patch your operating system, web browser and software program regularly. If you have a Windows operating program, begin by going to www.windowsupdate.microsoft.com and running the update wizard. This program will aid you locate the latest patches for your Windows personal computer. Also go to www.officeupdate.microsoft.com to locate possible patches for the Office applications.

Set up a firewall. Without having a great firewall, viruses, worms, Trojans, malware and adware can all simply access your pc through the Internet. Consideration must be given towards the advantages and differences in between hardware and software based firewall software programs.

Review your browser and e-mail settings for optimum protection. Why must you do this? Active-X and JavaScript are generally used by hackers to plant malicious applications into your computers. Although cookies are relatively harmless in terms of safety concerns, they do still track your movements on the Web to build a profile of you. At a minimum set your protection setting for the "internet zone" to High, and your "trusted sites zone" to Medium Low.

Set up antivirus software and set for automatic updates so that you simply receive probably the most current versions.

Usually do not open unknown email attachments. It can be merely not enough that you simply may recognize the address from which it originates simply because numerous viruses can spread from a familiar address.

Don't run applications from unknown origins. Also, usually do not send these types of applications to buddies and coworkers simply because they include funny or amusing stories or jokes. They may possibly contain a Trojans horse waiting to infect a pc.

Disable hidden filename extensions. By default, the Windows operating system is set to "hide file extensions for recognized document types". Disable this choice so that file extensions display in Windows. Some file extensions will, by default, continue to remain hidden, but you're much more most likely to see any unusual document extensions that do not belong.

Turn off your pc and disconnect through the network when not making use of the computer. A hacker can not attack your computer when you are disconnected from the network or the pc is off.

Take into account creating a boot disk over a floppy disk in case your computer is damaged or compromised by a malicious program. Obviously, you have to take this step before you encounter a hostile breach of one's program.

I hope my article is useful for you, and I will probably be a lot more than happy in case you go to my website about Screen Protectors




welcome to loan (http://www.yloan.com/) Powered by Discuz! 5.5.0