Today, more and more people are using their computers for everything from communication to online banking and investing to shopping.
As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some may be looking to p his h your personal information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets.
Below are a few easy, cost-effective steps you can take to make your computer more secure to begin with:
1.
Always make backups of important information and store in a safe place separate from your computer.
2.
Update and patch your operating system, web browser and software frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com and locate possible patches for your Office programs.
3.
Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs.
4.
Review your browser and email settings for optimum security. Why should you do this? Active-X and JavaScript are often used by hackers to plant malicious programs into your computers. While cookies are relatively harmless in terms of security concerns, they do still track your movements on the Internet to build a profile of you. At a minimum set your security setting for the ?Internet zone? to High, and your ?trusted sites zone? to Medium Low.
5. Install anti-virus software and set for automatic updates so that you receive the most current versions.
6. Do not open unknown email attachments. It is simply not enough that you may recognize the address from which it originates because many viruses can spread from a familiar address.
7. Do not run programs from unknown origins. Also, do not send these types of programs to friends and co-workers because they contain funny or amusing stories or jokes. They may contain a Trojans horse waiting to infect a computer.
8. Disable hidden filename extensions. By default, the Windows operating system is set to ?hide file extensions for known file types?. Disable this option so that file extensions display in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that do not belong.
9. Turn off your computer and disconnect from the network when not using the computer. A hacker cannot attack your computer when you are disconnected from the network or the computer is off.
10. Consider making a boot disk on a floppy disk in case your computer is damaged or compromised by a malicious program. Obviously, you need to take this step before you experience a hostile breach of your system.
When it comes to jailbreaking the iPhone, multiple opinions exist but one thing is sure, there are quite a few amount of people who agree that jailbreaking an iPhone or Apple device is a great thing and the news of jailbreak for any latest Apple firmware...
If you have been thinking of a way to install drivers that do not have the executable file, well you are not alone in this. Not so many people are knowledgeable about things like that. With executable file (.exe) the installation proceeds when you...
There are no limit to the possibilities one can achieve on a rooted Android device compared to one that isn't rooted. As you know, Rooting is to Androin as Jailbreak is to iOS. For those that don't know what rooting means, a little definition...
I t can be very devastating when one of core documents or file saved on a disk or flash drive just suddenly disappear when you need to view it the most.You knew you put it there and you didn't delete it, yet you can find it. Sometimes when you use...
When Windows 8 preview was released, I immediately tried my hands on few things that I use regularly. Although i was somewhat disappointed that some features that were easy to locate in Windows 7 are now harder to locate. Example is the Safe Mode &...