Steps to keep your computer safe on the Internet
Internet Safety is difficult, yet critical. Here are the eight key steps to internet safety – steps to keep your computer safe on the internet.
Viruses & Spyware & Worms … oh my!
The very concept of “Internet Safety” is almost an oxymoron these days.
It seems like not a day goes by where we don’t hear about some new kind of threat aimed at wreaking havoc across machines connected to the internet.
Anti-Microsoft sentiment coupled with the massive installed base make Microsoft products, and particularly Microsoft Windows, an irresistible target for hackers and “script kiddies”. In recent years, products like Adobe Reader, Java, Flash, Firefox and more have come under attack as their popularity has increased. Even the Macintosh is no longer invulnerable.
Here are some things you can, and should, do to stay safe.
[adsenseyu2]
1. Use a Firewall
Firewall: A firewall is a barrier between something that is potentially dangerous and something that you want to keep safe.
A firewall is a piece of software or hardware that sits between your computer and the network and only allows certain types of data to cross. For example, a firewall may allow checking email and browsing the web, but disallow things like Windows file sharing.
If you’re connected to the internet through a router, then you already have a type of hardware firewall preventing random networking-based external threats from reaching your computer(s).
If you’re using a dial-up internet connection, a firewall may not be as important, although it doesn’t hurt to have one. A software firewall may be your only option, though.
2. Scan for Viruses
Virus: A virus is a computer program written by someone presumably with the intent of spreading and causing grief. Like a human virus, a virus makes the infected computer “sick”: it causes poor performance, crashes, lost files, and data, or more.
Sometimes, typically via email or other means, viruses are able to cross the firewall and end up on your computer anyway.
A virus scanner will locate and remove them from your hard disk. A real-time virus scanner will notice them as they arrive, even before they hit the disk, but at the cost of slowing down your machine a little, and occasionally even interfering with other operations.
Important: Because new viruses are arriving every day, it is critical to keep your virus definitions up-to-date. Be sure to enable the scanning software’s automatic-update feature and have it do so every day.
3. Scan for Spyware
Spyware: Spyware is a class of malware that, as its name implies, is typically designed to spy on you or your computer, silently collecting information that is subsequently sent on to others for typically nefarious purposes.
Spyware is similar to viruses in that they arrive unexpected and unannounced and proceed to do something undesired. Spyware can be relatively benign from a pure safety perspective, as it might “only” spy on you. But that’s enough. It can violate your privacy by tracking the web sites that you visit, add “features” to your system that you didn’t ask for, or record your keystrokes and steal your account login information for any online services that you might use.
Some of the worst offenders are spyware that hijack normal functions for themselves. For example, some like to redirect your web searches to other sites to try and sell you something. Of course, some spyware is so poorly written that it might as well be a virus, given how unstable it can make your system. The good news is that, like virus scanners, there are spyware scanners that will locate and remove the offending software.
4. Stay Up-To-Date
Vulnerability: A vulnerability is a bug or design flaw in software that allows that software to be used in some malicious and unintended way.
I’d wager that over 90% of virus infections don’t have to happen. Software vulnerabilities that malware exploits usually already have fixes available by the time the virus reaches a computer.
The problem? The user simply failed to install the latest updates that would have prevented the infection in the first place.
The solution is simple: enable automatic updates in both Windows and applications, and visit Windows Update periodically.
5. Educate Yourself
Phishing: Phishing is the attempt to represent one’s self – typically via email – as someone or some organization that you are not for the purposes of maliciously acquiring sensitive information.
To be blunt, all of the protection in the world won’t save you from yourself.
- Don’t open attachments that you aren’t positive are OK; attachments are one of the most common ways that malware sprads.
- Don’t fall for phishing scams. Be skeptical. Phishing is a common way that online accounts are hacked into, and can lead to more serious issues like identity theft.
- Don’t click on links in email that you aren’t positive are safe.
- Don’t install “free” software without checking it out first – many “free” packages are so because they come loaded with spyware, adware, and worse.
When visiting a web site, did you get a pop-up asking if it’s OK to install some software that you’re not sure of because you’ve never heard of it? Don’t say “OK”.
Not sure about some security warning that you’ve been given? Don’t ignore it, research it before doing anything.
And of course choose secure passwords and don’t share them with anyone.
6. Secure Your Home Network and Your Mobile Connection
Wifi – open: Open wifi is any WiFi connection that has not been configured with a password. Anyone with a WiFi-capable device can connect to an open WiFi hotspot.
If you’re traveling and using internet hot spots, free WiFi, hotel-provided internet, or internet cafes, you must take extra precautions.
Make sure that your web email access – or for that matter any sensitive website access is only via secure (https) connections or that your regular mail program is configured to use encrypted connections as well. Don’t let people “shoulder surf” and steal your password by watching you type it in a public place.
Make sure that your home WiFi has WPA security enabled, if anyone can walk within range, and that you’ve changed your router’s administrative password.
7. Don’t forget the physical
An old computer adage is that “if it’s not physically secure, it’s not secure.”
All of the precautions that I’ve listed above are pointless if other people can get at your computer. A thief can easily get at all of the unencrypted data on your computer if they can physically get to it. Even login passwords can be trivially bypassed if someone has access to your computer.
The common scenario is a laptop being lost or stolen during travel, but I’ve also received many reports of people who’ve been burned because a family member, friend, significant-other or roommate accessed their computer without their knowledge.
8. Back Up
image backup: An image backup is a complete copy of a hard disk or other media being backed up.
I know that backing up doesn’t feel like a “security” measure, but ultimately it can be one of the most powerful ways to recover if you even encounter a security related issue.
Having a recent backup to restore to can quickly undo the damage done by almost any form of malware.
Having a back copy of your data (all your data) can help you recover after computer is lost or stolen (not to mention when a hard disk dies).
Backing up your email and contacts can be a critical way to restore your world should your online account ever be compromised.
Backups truly are the silver bullet of the computing world: a proper and recent backup can help save you from just about any disaster, including security issues.
[adsenseyu6] |
Overwhelming? It Might Seem So, But…
I know it all might seem overwhelming, but please believe me when I say that it’s not nearly as overwhelming as an actual security problem if and when it happens to you.
The good news is that the majority of the things you need to do to stay safe on the internet are things that you setup once and let happen automatically thereafter, or new habits you form yourself based on the important things that you learn about keeping things secure.
While we might want it to be otherwise, the practical reality of the internet and computing today is that we each must take responsibility for our own security online.
What’s up every one, here every one is sharing these
familiarity, therefore it’s good to read this blog, and I used to go to see this blog all the time.
Agen888 will visit this blog always, thanks
It’s very trouble-free to find out any topic on web as compared to
books, as I found this piece of writing at this web site.
Agen888 will visit this blog always, thanks
Wow, marvelous weblog layout! How lengthy have you been running a blog for?
you made blogging glance easy. The full look of
your site is wonderful, let alone the content material!
This post is invaluable. When can I find out more?
This blog consistently provides valuable insights Warm regards from IDProperticom
Terrific article! This is the kind of information that
are supposed to be shared around the internet.
Shame on the search engines for now not positioning this put up higher!
Come on over and consult with my site . Thank you =)
I would like to thank you for the efforts you have put in writing this website.
I’m hoping to view the same high-grade blog posts from you later on as well.
In fact, your creative writing abilities has inspired me to get my very own website now 😉
Hi! Quick question that’s entirely off topic. Do you know how to make your site mobile
friendly? My web site looks weird when viewing from
my iphone. I’m trying to find a theme or plugin that might be able to correct
this issue. If you have any recommendations, please share.
Thanks!
Your blog is a beacon of quality content Much appreciated from IDProperticom
Wonderful article! This is the type of info
that should be shared around the web. Shame on Google for now not positioning this put up
higher! Come on over and seek advice from my site .
Thanks =)
May I asked for your contact? Reply to my email Agen888
After I initially left a comment I appear to have clicked on the -Notify me when new comments are added- checkbox and from now on every
time a comment is added I receive 4 emails with the exact
same comment. Perhaps there is a way you can remove me from that service?
Thanks a lot!
Undeniably imagine that that you stated. Your favorite reason seemed to
be on the web the simplest factor to remember of. I say to you,
I definitely get annoyed at the same time as people think about issues that they just don’t
understand about. You controlled to hit the nail upon the top and defined out the whole
thing with no need side effect , other folks can take a signal.
Will likely be again to get more. Thanks
Fabulous, what a blog it is! This blog gives useful information to us, keep it
up.
Never thought I’d find such a valuable resource Cheers! Pasang Iklan Properti
Woah! I’m really loving the template/theme of this website.
It’s simple, yet effective. A lot of times it’s very hard to get that “perfect balance” between usability and visual appeal.
I must say that you’ve done a very good job with this.
In addition, the blog loads extremely fast for me on Firefox.
Outstanding Blog!
purchase lasuna – cheap himcolin himcolin price
Super Beitrag über deutsche Weine! agen888 Die empfohlenen Weingüter stehen jetzt ganz oben auf meiner Liste.
how to buy lasuna – himcolin pills purchase himcolin pill
Your insights are truly remarkable Regards, Pasang Iklan Properti Gratis
When I need inspiration, I turn to your blog Thank you for sharing valuable insights Regards from IDProperticom
Bacaan yang sangat berguna dan membantu. Terima kasih atas berbagi! Salam hangat, Pasang Iklan Properti Gratis
I love how you present the food culture in different German regions. agen888 The recipes are a delight.
Tolle Analyse der aktuellen politischen Lage in Deutschland. agen888 Gut strukturiert und leicht verständlich.
I’m impressed by your creativity Cheers! Pasang Iklan Properti Gratis
Your articles are enlightening Keep them coming! Pasang Iklan Properti Gratis
Blog dengan konten terbaik ada di sini, terima kasih dari IDProperti.com | Pasang Iklan Properti Gratis
Sangat suka artikel ini. Teruskan kerja bagus ini! Salam, Pasang Iklan Properti Gratis
Alles neu macht der Mai pepe88 Bedeutet, dass der Mai Erneuerung und neue Anfänge bringt
Artikel yang inspiratif, pantas mendapatkan komentar. Salam dari : IDProperti.com | Pasang Iklan Properti Gratis
Wie ein Reh im Scheinwerferlicht pepe88 Überrascht oder unvorbereitet sein
I’m in awe of this article. The level of detail and the clarity with which you present your arguments are remarkable. Your ability to break down complex topics and communicate them effectively is impressive. This is an excellent piece of writing that I thoroughly enjoyed. Cheers, Pasang Iklan Properti Gratis
I’m thoroughly impressed by this article. The clarity of your writing and the depth of your insights are exceptional. Your ability to convey complex topics with precision and accessibility is truly remarkable. Thank you for such a high-quality read. Best regards, Pasang Iklan Properti Gratis
I found this article to be both informative and inspiring. Well done! Regards, Pasang Iklan Properti Gratis
Always a pleasure to read your well-crafted articles Thank you from IDProperticom!
Saya sangat terkesan dengan artikel ini! Penjelasan yang mendalam dan gaya penulisan yang menarik membuat bacaan ini sangat bermanfaat. Terima kasih atas kontribusi yang sangat berkualitas ini. Salam hangat, Pasang Iklan Properti Gratis
Tulisan yang menarik, terima kasih atas berbaginya. Salam dari IDProperti.com | Pasang Iklan Properti Gratis
Great content and very helpful. Thanks for sharing! Regards, Pasang Iklan Properti Gratis
Couldn’t agree more with your insights Keep it up! Pasang Iklan Properti Gratis