www.1001TopWords.com |
Free Ways to Tackle Threats to Your Computer
Protect Your PC Having problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet? Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Any pc connected to the internet is a target for viruses, spyware, adware and trojan horses. You need to protect and clean your pc of these nasties which slow down your costly computer.We will show you how to do at little or no cost in this free report. Before we start here is our disclaimer:- we take no responsibility for any harm YOU may do to your computer with this information. Use it at your own risk and be sure you are confident of what you are doing before you start. It's a good idea to make a restore point before installing/uninstalling or changing anything (see below for details) Firstly Viruses, these are the most newsworthy of the baddies, and because of this most people have heard of them. They are the pc version of the Flu, or in a worse case scenario, Sars, and can kill your computer. There are new viruses released almost daily, and you need to keep up to date with Antivirus software to stop them. Fortunately there is a free program which can help you protect your pc. This is called AVG and is available at http://www.grisoft.com just follow links through the site to AVG Free Edition. Register your email address, download and install it to your pc. The program is pretty straightforward to use but make sure you keep it updated at least weekly by double clicking the AVG icon (four coloured square) in the taskbar and then clicking on update in the window, tick internet as the source and you are good to go. It will automatically update and restart the main Antivirus program. Remember prevention is better than cure though and don't open attachments in emails or even sent to you over instant messengers unless you are sure of the person sending them, even then if you have AVG installed right click the file and use the "scan with AVG" menu item to double check. Trojan Horses come next on our hitlist, mostly these are small programs which record either keystrokes or other information and try to send it back to someone to steal your details. But they can be used to take over your pc completely or partially to use your resources to send spam emails, or launch attacks on other computers on the internet, often for denail of service (DOS) attacks. Most Trojan Horses are removed by the AVG antivirus software, or if not it will alert you to its presence, and you can google http://www.google.com to find how to remove it. A good prevention measure to stop Trojans accessing the net to send their payload is to use a software firewall, again there is at least one free program you can download, called zonealarm. It will ask you wether to allow programs to access the internet or not, meaning if you get something you know you didn't install accessing the net you can tell zonealarm not to allow it. To download zonealarm, go to http://www.zonelabs.com and follow links to the download section, and then to zonealarm (they are not so prominent as the ones for the Pro version which you pay for). It is a good idea to run a firewall to stop attacks coming in from outside as well your details going out. Windows XP with Service Pack 2 installed has a built in firewall, but zonealarm is much more configurable and does a better job overall. Spyware and Adware can also be responsible for a lot of pc problems. These are often programs piggybacked onto a free download offered to help you with some other task like form filling on websites (Gator is a well known example but they are open about it). Spyware is used by less scrupulous companies and individuals to report back your surfing habits so they can send ads you're more likely to respond to. These slow down your surfing and also run in the background using your pc's power to do their dirty work. Sometimes the information sent back is even more sinister than just your browsing habits, so beware of software you download and check first. Adware is very similar although is usually contained in tracking cookies (small text files downloaded by your browser containing information to track you through a website). Often these 2 terms are used interchangably. Another nasty which falls in with these is Scumware, which is a term used to describe software which hijacks another program (usually your browser or modem dialler) and displays only content which it's maker wants you to see and often prevents you seeing anything else. The diallers reset your modems settings to dial another (usually very expensive) number rather than your ISP's one. Thankfully some thoughtful individuals have kindly donated their time to give us free programs which will release you from the grip of these fiendish programmers. Download firstly Adaware from http://www.lavasoft.de and install and run that (if it finds nothing on your pc I would be extremely surprised) secondly download Spybot Search and Destroy from http://www.safer-networking.org/en/download/index.html and install and run that too, it will pop up a dialog to say it has found adaware also on your machine, but it doesn't really mind so close it and continue. As with virus software you should use these and update them both regularly, as you can be sure the people on the darkside of the internet are updating their stuff to keep you hooked into it. Both programs have a button for downloading and installing updates automatically so there is no excuse not to do it before every scan, which we would recommend doing at least monthly and more frequently if possible. So now you are protected from viruses, trojan horses, and other pc illnesses so that's it right? Not quite, I have to say one of the most important things on your pc is your personal data, you can re-install Windows, Office and all the other programs on your computer from the cd's, but your prized pictures, your kids half written essay for that all important exam or your wifes recipes handed down from generation to generation carefully typed out and saved can't be. Back it up. NOW. Onto cd's if you have a cd writer or if not get one installed or use floppy discs. But for the sake of your sanity BACK IT UP. And finally some tips to keep your pc running at its optimum. Before making any changes to your pc or programs, it's a good idea to make a restore point by going to Start, then accessories on the start menu, then clicking System tools and finally the system restore icon. Follow the prompts and create a restore point to return to if it all goes wrong. Sometimes a slow pc is just the result of too many programs running, close down those you're not using, obvious but often overlooked. If you're anything like most pc users you have a bundle of programs start when your computer does, and sitting in the task tray at the right of the start menu. You can close these down manually but if you don't use them at all then why not remove them? If you may want them but not everytime you start up you can go to start, then click RUN and in the text box type "msconfig" without the quotes. Don't worry now this looks daunting but all you need to do is click the tab at the right marked "Startup" and there is a list of all those programs which run as soon windows starts, now apply a little caution and lookup (http://www.google.com again comes to your aid) any you don't recognise. Now those you're sure you don't need running at startup untick the box. Next time you start windows will put up a box to tell you you've disabled some things, as long as your pc works ok now, tick the box to not show it again. If you took of something you need or want back run msconfig again, and retick the box in the startup tab again, next time you restart it will return. My last tip is to run defrag monthly, go to start, accessories, system tools and run defrag, this can often speed up a slowing pc as it makes all the files on your hard drive quicker to access. Douglas Titchmarsh runs several websites, and blogs including http://www.cashinonline.info
|
RELATED ARTICLES
Keeping Worms Out of Your Network... No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. Be Alert! Others Can Catch Your Money Easily! So called phishers try to catch the information about the account numbers and passwords of internet users. They deceive people with faked emails and websites that resembles exactly the originals of well known banks or electronic payment systems. They make people surrender their passwords and account numbers ? and afterwards they clear their accounts. Preventing Online Identity Theft Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. They may take out credit cards in your name, mortgages, or even worse. The internet has opened up a whole world of possibilities for these criminals, and the threat is very real. There are things that you can do to help prevent such a crime. It costs very little to protect your information, and it is money well spent. Secrets On Security: A Gentle Introduction To Cryptography Let us take the example of scrambling an egg. First, crack the shell, pour the contents into a bowl and beat the contents vigorously until you achieved the needed result - well, a scrambled egg. This action of mixing the molecules of the egg is encryption. Since the molecules are mixed-up, we say the egg has achieved a higher state of entropy (state of randomness). To return the scrambled egg to its original form (including uncracking the shell) is decryption. Impossible? 3 Pervasive Phishing Scams Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. These scam artists -- phishers -- attempt to hook visitors in by having them divulge certain critical and personal bits of information. Once the information has been divulged the phishers start their dirty work and you have been conned. Several phishing scams continue to persist, the following are three of the most pervasive ones. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that's how I started in the computer business. I didn't want to pay someone to fix the problems that I usually caused. A little voice in my head told me "I can build a computer, it doesn't look that hard!" Dont Allow Hackers to Take Out Money from Your Bank Account If you know what is the 'Fishing' then it's very easyto understand the definition of 'Phishing'. Justreplace letter 'F' from the word Fishing with 'Ph'.Yes I am not joking. I mean it! Phishing is higher level of spam. Phishing is nothing but fishing in the sea of Internet. The victimized Net users are the fishes hooked by the hackers. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror." With that attitude, I praise their skills only for the mere sake of not wanting them to defile mine, or my business. Spyware Attacks! Windows Safe Mode is No Longer Safe Many of us have run into an annoying and time-consuming error. With your machine running goofey you decide to run a scan for trojans and spyware. Following the scan, which usually takes fourty minutes or longer if you scan the entire system, you are hit with the "access denied" error. Frustrating, for sure, but being the savvy computer user that you are you decide to boot to safe mode to take care of the issue. No spyware can load when booted to safe mode, right? How to Protect Your Child from the Internet When the Internet first came about, it was realized it could be quite the multi-tasking machine. These days people use it for just about everything, from downloading music to checking e-mail, and virtually making the rest of the globe closer all the time. Types Of Computer Infections Computer infections can be broken up into 4 main categories which are explained in detail below: How to Prevent Online Identity Theft Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud. Message Board Security Problems Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site. This has happened to me at least four times. Once an iframe was added to every single page of one of my very large sites. Thankfully, I had it completely backed up, so all I had to do was send the pages back up to the server. Twice, the front page of one of my sites was hijacked. The entire content of the front page was replaced by some note from a hacker stating he had been there. The Never Ending Spyware Story It's been with us since 1993, it's gotten more intrusive, more complicated. Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement: Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. Lottery Scam, What It is and how to Avoid It? Internet scams and frauds are on the rise! The quantity of scam emails with various fraud schemes any email account receives today is simply overwhelming! There is this infamous Nigerian 419 scam, which is by far the most widely circulated one. I wrote about it in one of our ezine articles not long ago. You can read about it here! And there are many other scams like Lottery, Letter of Credit, money transfer, black money conversion, real estate, fraudulent order and the list goes on and on. 5 Tips For An Unbreakable Password Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible. This can be a catastrophic mistake. 3 Simple Steps to Stay Safe from Spyware There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D. Using these two programs in conjunction will eliminate a vast majority of spyware problems from your computer. For the purposes of this article, "spyware" refers also to adware, malware, and other not-so-nice "features" of today's computing reality. The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. Well, to state the obvious, that's just not true. |
© Athifea Distribution LLC - 2013 |