Today, more and more people use computers all the information of online banks and investment shop. Why do these things more regularly, we are open to potential hackers, attackers and crackers. While some may want to phishing for personal information and identity for resale, others simply want to use a platform from which to attack other targets ignorant. Here are some easy, affordable steps you can take your computer security.

Always back up important data and store it in a safe place separate from your computer.

Update and patch your operating system, browser and software frequently. If you have a Windows operating system, start by going http://www.windowsupdate.microsoft.com/ and run the update wizard. This program will help you find the latest fixes for Windows-based computers. Even going to identify any corrections http://www.officeupdate.microsoft.com/ Office programs.

Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can easily access your computer from the Internet. Should consider the benefits and differences between programs and software-based firewall hardware.

Review your browser and email settings for optimum security. Why did you do that? Active-X and JavaScript are often used by hackers to plant malicious programs on your computer. While cookies are relatively harmless in terms of security problems, they still track your movements on the Internet to build a profile of you. At a minimum, your security is set to "Internet zone" high, and your "trusted sites zone to medium low.

Installing antivirus software and automatic updates to turn, so you get the latest version.

Do not open unknown email attachments. It is simply not enough that you can identify the address from which it originates because many viruses can spread from a familiar address.

Do not use the software of unknown origin. Do not send this type of software to friends and colleagues because they contain funny or amusing stories or jokes. They may contain a Trojan horse waiting to infect a computer.

Disable hidden file extensions. By default, the Windows operating system is set to "Hide file extensions for known file types." Disable this option so that file extensions display in Windows. Some file extensions by default, will remain hidden, but it is more likely to see the unusual file extensions that do not belong.

Turn the computer off and unplug it when you use the computer. A hacker can attack your computer when you connect to the network or the computer is off.

Consider making a boot disk on a floppy disk in case your computer is damaged or compromised by a malicious program. Obviously, it is necessary to take this step before you experience a hostile violation of your system.

No comments:

Powered by Blogger.