วันเสาร์ที่ 23 มกราคม พ.ศ. 2553

Computer Security Made Easy

As more people begin to use the Internet, both for communication, online banking, investment or shopping, the potential danger of hackers and malicious attackers increase. While some may simply be after information for phishing or identity for resale, others are more dangerous to use in seeking to launch computer attacks such as the infamous Denial of Service or other viruses or trojans to other unsuspecting targets. The following list contains some simple methods and inexpensiveTo protect your computer. While there are other ways to do this, after the ten steps below will help you start protecting your computer and your personal information.

1. Backing up files and stores them in a safe place, away from your computer

2. Often, patches and update your operating system, antivirus, web browser and Internet security to prevent hackers from exploiting weaknesses in software. You can run the Windows operating system quickly [http://www.windowsupdate.microsoft.com] using the update wizard. Updates to Microsoft Office can also be found at http://www.officeupdate.microsoft.com be

3. Install a good firewall. With two hardware and good software firewall, most viruses, worms, trojans, adware and malware programs are removed prior to any problems or damage. It is important that the firewall and regularly updated.

4. Configure your browser and email settings for the best> Security. Programs like ActiveX and Java are commonly used by hackers to plant malicious programs on your system. Cookies can also be used to monitor Internet browsing to build an online profile of you. A good way to overcome these problems is to configure your Internet browser to "high" security settings. At a minimum, configure the security settings to "high" for the Internet and "sites" medium confidence.

5. Automatically update your antivirus --Software and Internet Security Software. To be able to avoid the current versions on your computer, get the security is compromised.

6. Just run from e-mails from people they knew. And even then only if you know what you are openning. Often a hacker can use the compromised e-mail spam or worm to infect other people. Not enough to know the e-mail, but you need to recognize the plant.

7.Do not run unknown. EXE file. This is the most dangerous, to do something to contain the infection, they often wait for a script of Trojan horse to other computers.

8. Disable file extensions hidden. This allows you to identify, and all unknown files or programs that are running on your local computer. By default, Windows hides file extensions option, so you have to disable this option.

9. Disconnect the computer from the Internet and disable it ifuse. This prevents hackers from attacking your computer is not connected to a network.

10. Making a boot disk to a CD before the computer a hostile breach of security experience. To recover data and system operations after a successful attack on your computer.

ไม่มีความคิดเห็น:

แสดงความคิดเห็น