www.1001TopWords.com |
The 5 Critical Steps to Protecting Your Computer on the Internet
Spyware, viruses and worms... oh my! If you are connected to the internet, you need to make sure you get your computer set up properly if you want to avoid problems down the road. With all the viruses, spyware and other threats on the internet today, no computer should be set up without the proper protection. And that protection needs to be in place as soon after you hook up your new machine as possible. The following five steps will make your computer a much harder target for threats. You still won't be completely immune to problems, but 99% of the time the threat will pass you by, looking for the easy mark. 1. Running a Personal Firewall A personal firewall is software that basically makes your computer invisible to hackers, worms and other threats that can infect your computer over the internet. Setting up a firewall is the absolute first thing you should do if you're going to connect to the internet. Without a firewall, your computer could get infected in as little as one minute after connecting. If you have a brand new computer running Windows XP Service Pack 2, there is a firewall built into Windows. It will already have been turned on when you first set up your computer. If you're running an older version of Windows, even an earlier version of Windows XP, there is no firewall automatically set up for you. In this case there are two possibilities:
If you don't have any personal firewall software installed, you should do so right away. Zone Alarm is a very good firewall program that has a version that you can download and install for free. You can download the free version of Zone Alarm from http://www.computer-help-squad.com/zonealarm. 2. Turn on Windows Updates Again, if you're running Windows XP Service Pack 2 this is already set up, but otherwise you should turn on Windows Updates. Microsoft releases updates for security problems and other bugs in Windows on a regular basis. These updates will keep your computer running better, and they often fix security issues that could compromise your information or privacy. If you are running Windows XP Service Pack 2, you can double-check that automatic updates are turned on by clicking Start, then click Control Panel, then double-click Security Center. The window that opens will tell you if automatic updates are turned on, and lets you turn them on if they're not. To turn on automatic updates in earlier versions of Windows XP, click on the Start menu, click Control Panel and then double-click on System. On the "Automatic Updates" tab, click the option to "Automatically download the updates and install them on the schedule I specify." To turn them on in Windows 2000, click on Start, click Control Panel and then double-click on Automatic Updates. Again, click the option to "automatically download the updates and install them on the schedule I specify." Now when Microsoft releases updates, they will be downloaded for you automatically and Windows will tell you when they are ready to be installed. 3. Install & Update Antivirus Software Most new computers come with antivirus software these days. You might have Norton, McAfee, PC-Cillin or another brand. No matter what program you have, you will need to update it when you get connected to the internet. It doesn't matter how new your computer is - there will be new viruses, and new updates for the antivirus software, since it was loaded. The exact process is different for each brand of antivirus program, but most of them will have an icon in the bottom right corner of your desktop, beside the time. The icon might be a picture of a shield (McAfee), a stethoscope (Norton) or something else. In most cases, if you point to the icon for your antivirus and click the right mouse button, a menu will pop up with an update option. It could be simply called update or could be something like Live Update or Download Latest Updates. If you click on the update option (with the left button this time) it will install the newest updates for you. If you're not sure which icon is for your antivirus software, just point to each one for a few seconds and a little title should pop up telling you what it is. 4. Install Anti-Spyware Software Spyware - and other things known as adware and malware - is becoming as big a problem as viruses. Spyware programs can cause a lot of problems with your computer, not to mention they can track your personal information and you never know where it's being sent. Some new computers might includes antispyware software, but most of them don't yet. There are quite a few anti-spyware programs available, some free and some not. The one I recommend is from Microsoft and is one of the free ones. One of the reasons I like it is because it always runs in the background and will automatically catch a lot of spyware before it gets on your computer. Many of the other programs don't catch it until you run a scan. Not only does this allow things to get on your computer, it also means you have to actually remember to run a scan. You can download the free Microsoft Antispyware from http://www.computer-help-squad.com/antispyware. 5. Set up a Free Email Account This last item is not as critical as the first four, but I would highly recommend you set up an email account with one of the free services like Hotmail or Gmail. Once you're on the internet, you'll find a lot of useful information that you want that requires you to provide an email address. In some cases, these people will end up sending you a bunch of spam. If you use a free email account to sign up for anything that you don't know for sure you can trust, it's not going to fill your main email with a bunch of junk. This goes for anything really, not just online information. If you're entering a contest or signing up for anything offline and you don't know where your information could end up being used, I would suggest using your free email address. If worse comes to worse, and your free email address gets inundated with spam, you can always just set up a new one and let the old one expire. Some of the better free email services are www.hotmail.com, www.gmail.com and www.yahoomail.com. If you've had your computer for a while and never done any of these things, you should still take these steps to get it set up properly. It will definitely save you a lot of time - and possibly money - as you use your system. John Lenaghan offers easy-to-understand computer help at the Computer Help Squad website. Find out more about these 5 steps - sign up for the Computer Help Squad newsletter and receive your free 5-part guide.
|
RELATED ARTICLES
Free Spyware Removal - Its Not As Easy As It Sounds Nobody wants to pay to remove spyware. At the very least, I don't. The blasted stuff shouldn't be on my computer anyway, so what ever would make me want to shell out cash to get rid of something that I shouldn't have in the first place? Phishing - Identity Theft & Credit Card Fraud What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. This is done by a form of social engineering, by posing as a different person or organization that you already trust. I Spy...Something Terribly Wrong (In Your Computer) This really chapped my lips... Just Whos Computer is this Anyway? Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is. Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement: Identity Theft - Dont Blame The Internet Identity theft ? also known as ID theft, identity fraud and ID fraud ? describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. Spy Scanners ? Don?t Compromise your Privacy Spies, spyware, internet parasites are among what they are usually called. These are scouts that monitor your web activities. The work undercover to check on your surfing patterns, spending habits, items bought, they extract email addresses, hijack browsers, steal credit card information. These are just some of the things a spyware is capable of. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. In fact that's how I started in the computer business. I didn't want to pay someone to fix the problems that I usually caused. A little voice in my head told me "I can build a computer, it doesn't look that hard!" The Importance of Protecting Your PC from Viruses and Spam Today the internet is a mine field of malicious code looking to harm your computer. Hackers want to have access to your PC for both fun and profit. You must be diligent in your ability to detect and then protect your important computer data. Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do. Can I Guess Your Password? We all know that it's dangerous to use the same password for more than one program. If you sign up for a program run by someone of low moral fibre, what is to stop them running through various programs with your username and password to see what they can access? Wireless Network Security Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want. SCAMS ? Be Aware ? And Report When Necessary The Internet is a vast International Network of people and businesses ? and a place where people can make a fairly decent living. However, it is also a place where certain unsavory characters can freely roam ? to take your dollars and run. Scams ? the human mind can be either pure or devious ? and it is the devious mind that you have to look out for and be aware of at all time. Spyware, This Time Its Personal! First the basic definition of Spyware: It is a type of software which is installed onto your computer without your permission... It can log your keystrokes, which websites you visit, read you email, and even prowl your hard drives. At some point in time, it transmits its harvested information to the owner. Transmitting this data can slow your computers resources which can result in programs taking longer to load, make for longer waits for WebPages to load, and even complete system failures can occur. Burning Bridges is Bad, But Firewalls are Good When you signed up for that ultra-fast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a high-speed connection, you have tremendously increased your chances of being victimized by a computer hacker. Computer Viruses - How to Remove a Computer Virus from Your Computer Computer viruses infect millions of computers every day. Viruses can destroy data, steal important information, and even make a computer completely unusable. When a computer is infected by a virus it is imperative that the virus be removed as quickly as possible. Identity Theft -- 10 Simple Ways to Protect Your Good Name! Identity Theft is one of the most serious problems facing Internet users. Identity Theft is exactly as the name states -- someone steals your Identity and commits fraud in your name. It can result in untold financial and legal problems that may literally ruin your peace of mind and/or your life. Someone gaining control of your most personal details can reck havoc and result in dire consequences for you and your family. 3 Pervasive Phishing Scams Scams involving email continue to plague consumers across America, indeed the world. These so called "phishing" scams involve "spoofed" emails meant to draw the unwary to bogus internet sites masquerading as legitimate sites. These scam artists -- phishers -- attempt to hook visitors in by having them divulge certain critical and personal bits of information. Once the information has been divulged the phishers start their dirty work and you have been conned. Several phishing scams continue to persist, the following are three of the most pervasive ones. What to Look for before You Purchase Spyware Software Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days. Some are disabled as well). Before making a decision to purchase any such software we should check the reliability and should consider various attributes possessed by them and then select the best and the most appropriate one. The various attributes that one should consider to be the most important when purchasing spyware detection and removal software are - Reducing Fraudulent Transations ? 5 Simple Ways To Protect Yourself The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Unfortunately, with that opportunity come people who want to make money in less than honest ways. We're going to look at some concrete ways you can identify fraudulent transactions and save yourself a lot of chargeback fees, money and grief. |
© Athifea Distribution LLC - 2013 |