Free PC Security

This blog has moved to http://freepcsecurity.co.uk

  • Archives


  • Our Reviews
    "I can't find a the perfect word to attach to this website's image because it is out of this world. No matter what type of Computer Security System you are interested in, you'll find help and quality content here. The content is awsome, well displayed and well arranged. The menu and speed is excellent. Navigation, Response and Relevance are also the best of the best. I don't even have to mention the Links because i must admit that i have never seen any better. I will let other people say more or invent other words because it really does suit it! Keep doing what you are doing now because you are exactly on the right path! Thanks for sharing! BOOKMARKED!"

    Ove
    squidoo.com/hardware-core
    Get your own reviews, free traffic at

    Our Reviews
    "Great initiative. Will be very usefull to many PC users at home and in business."

    M.
    tnsbelgium.com
    Get your own reviews, free traffic at

    Page copy protected against web site content infringement by Copyscape
    Photo Sharing and Video Hosting at Photobucket
    Blogging Den 2

Securing Your Computer System

Posted by cotojo on April 23, 2007


Today, more and more people are using their computers for
everything from communication to online banking and
investing to shopping.  As we do these things on a more
regular basis, we open ourselves up to potential hackers,
attackers and crackers.  While some may be looking to phish
your personal information and identity for resale, others
simply just want to use your computer as a platform from
which to attack other unknowing targets.  Below are a few
easy, cost-effective steps you can take to make your
computer more secure.

1. Always make backups of important information and store
in a safe place separate from your computer.

2. Update and patch your operating system, web browser and
software frequently.  If you have a Windows operating
system, start by going to www.windowsupdate.microsoft.com
and running the update wizard.  This program will help you
find the latest patches for your Windows computer.  Also go
to www.officeupdate.microsoft.com to locate possible
patches for your Office programs.

3. Install a firewall.  Without a good firewall, viruses,
worms, Trojans, malware and adware can all easily access
your computer from the Internet.  Consideration should be
given to the benefits and differences between hardware and
software based firewall programs.

4. Review your browser and email settings for optimum
security.  Why should you do this?  Active-X and JavaScript
are often used by hackers to plant malicious programs into
your computers.  While cookies are relatively harmless in
terms of security concerns, they do still track your
movements on the Internet to build a profile of you.  At a
minimum set your security setting for the “internet zone”
to High, and your “trusted sites zone” to Medium Low.

5. Install antivirus software and set for automatic
updates so that you receive the most current versions.

6. Do not open unknown email attachments.  It is simply
not enough that you may recognize the address from which it
originates because many viruses can spread from a familiar
address. 

7. Do not run programs from unknown origins.  Also, do not
send these types of programs to friends and coworkers
because they contain funny or amusing stories or jokes.
They may contain a Trojans horse waiting to infect a
computer.

8. Disable hidden filename extensions.  By default, the
Windows operating system is set to “hide file extensions
for known file types”.  Disable this option so that file
extensions display in Windows.  Some file extensions will,
by default, continue to remain hidden, but you are more
likely to see any unusual file extensions that do not
belong.

9. Turn off your computer and disconnect from the network
when not using the computer.  A hacker can not attack your
computer when you are disconnected from the network or the
computer is off.

10. Consider making a boot disk on a floppy disk in case
your computer is damaged or compromised by a malicious
program.  Obviously, you need to take this step before you
experience a hostile breach of your system. 

To your safety and security online

cotojo

Add to Technorati Favorites

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

 
%d bloggers like this: