Securing your system


Today, more and more people from their computer to start communication for online banking and investment in stores. As we have things on a regular basis, we are open to hackers, crackers and attackers. While some Phish, you can use your personal data and identity for resale, others simply want the computer as a platform for other attacks ignore targets. Here are some simple and inexpensive steps you can do to your computer.

Always backup and storage of information in a safe place separate from your computer.
Updates and patches for your operating system, web browser and software frequently. If you have a Windows operating system, start by using the www. Windowsupdate.microsoft.com and run the Update Wizard. This program, you will find the latest patches for Windows.www.officeupdate.microsoft.com also possible, a patch for Office programs.

Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can easily access your computer from the Internet. It should assess the advantages and differences between hardware and software firewall based programs.

Check your browser and e-mail for maximum security. Why did you do? Active-X and JavaScript are often pirates Appendix malware on your computer. Cookies are relatively harmless in regard to security, nor the movements of the Internet to your profile. Minimum security settings on "Internet zone" to "High" and "zone" Trusted Sites "low to moderate.
Install antivirus software and make sure automatic, so that the current version.
Do not e-mail not attached. Not enough, perhaps you will recognize, address the issue, because many viruses can pass an address of confidence.

Not the execution of programs by unknown senders. So, send not the nature of the program to your friends and colleagues as a story or Amusing or funny jokes. You can expect from Trojan horse to infect your computer.

Disable filename extensions hidden. By default, the Windows operating system, on "Hide file extensions for known file types". Disable this option for the file extension for Windows. Some are file extensions by default, always hidden, but you'll probably see more to the extension files, which are not always in possession.

Turn off the computer and disconnect from the network, if not with the computer. A hacker can not attack on your computer, if you are not with the network or the computer is off.
Watch a boot floppy in the floppy drive if your computer is damaged, or malware. Of course, this step, before the breach of an enemy of your system.

Post a Comment

Previous Post Next Post