Jump to content
xisto Community
Sign in to follow this  
tendigitz

To Secure Your Computer...

Recommended Posts

1. Always use a Security package2. Always make sure to keep your system updated3. Avoid entering websites, you don't know.4. If you get some interesting "popup" please avoid clicking on it!5. Do not receive files from someone you don't know6. Do not chat with total strangers, there's a lot of liers out there.7. Keep your Security package updated8. Put your Internet Browser security settings on high security9. Do not give out your picture to strangers.

Share this post


Link to post
Share on other sites

hmm... I get them all the way to 9, but I don't undrestand number 10, how does you giving your picture to strangers secure your computer?I also have my doupts about not chatting with total strangers... I mean what's insecure in that? if you don't trust them totally anyway? Do you mean if someone says "go download this thing somewhere" and then it would be virus or something? I would like to know, thanks.

Share this post


Link to post
Share on other sites

The Best way is to NOT use internet explorer. Have..um..*cough*..knowledge, in exploiting. 90% of exploits are written for windows, and 30% are just for IE! However, out of ALL the programs I...know about... NO exploits for Firefox, or Chrome, Or any others. The most th firefox user have to fear for security is like, phishing pages. and with those...dont be stupid! Watch what you're doing. And like tendigitz said: "Don't give your picture to strangers" [sarcasm] Cause if they get your picture, they can scan it and theres a special code linked in it, that allows them access to your computer! :D :D :P Be safe kids.-Cem Rec

Share this post


Link to post
Share on other sites

You'll find below global steps to take to secure your computer:Operating system and software patches and updates----------------------------------------------------There is no such thing as perfect software, often a software program may have several issues and could potentially have security vulnerabilities that can leave your computer open to attacks that compromise your computer and your data.Software patches, updates, and drivers are made available, often for free, to consumers to help keep a software program and operating systems running properly and secure. If the program you're using does not have any type of method of checking for updates on its own it is up to you to verify the program is up-to-date. Often this can be done by visiting the web site of the developer who created the program. A listing of third-party companies and links to each of their pages can be found on our third-party support page.Passwords-----------Make sure a password has been set on computer. Default passwords such as password, root, admin or no password will allow easy access to your computer or your Internet account.?Change passwords often. It is recommended at least once every few months.Create a BIOS password.When creating a password, add numbers or other characters to the password to make it more difficult to guess; for example: 1mypassword23.Get a hardware or software firewall----------------------------------It's highly recommend all users have some type of firewall solution. There are two types of firewall's your computer and/or network can have.Trojans, viruses, spyware, and other malware--------------------------------------------Software trojans, viruses, spyware, and other malware can not only damage or destroy your computer data but is also capable of monitoring your computer to learn more about your viewing habits on the Internet or even log all your keystrokes to capture sensitive data such as passwords and credit card information.To help protect your computer from these threats we suggest installing a virus protection program as well as a spyware protection program.Know how to handle e-mails---------------------------Today, e-mail is one of the most popular features on the Internet. Being able to identify threats sent through e-mail can help keep your computer and your personal information safe. Below are some of the most common threats you may encounter while using e-mail.Attachments - Never open or run e-mail attachments. Viruses, spyware, and other malware are commonly distributed through e-mails that have attachments. For example, an e-mail may want you to open an attachment of a funny video, when it's actually a virus.Phishing - Phishing or an e-mail phish is an e-mail that appears to be from an official company (such as your bank) indicating you need to log onto the site to check your account settings. However, the e-mails are actually sites setup to steal confidential information such as your passwords, credit card information, social security information, etc. See our phishing dictionary definition for additional information about this term as well as examples of these type of e-mails.Alternative browser-------------------Before the release of Microsoft Windows XP SP2 and Internet Explorer 6.0, Microsoft Internet Explorer was notorious for security and spyware related issues. Although it has improved since then we still highly recommend considering an alternative browser such as Mozilla Firefox.However, these as some of basic steps to take ...You'll find below global steps to take to secure your computer:Operating system and software patches and updates----------------------------------------------------There is no such thing as perfect software, often a software program may have several issues and could potentially have security vulnerabilities that can leave your computer open to attacks that compromise your computer and your data.Software patches, updates, and drivers are made available, often for free, to consumers to help keep a software program and operating systems running properly and secure. If the program you're using does not have any type of method of checking for updates on its own it is up to you to verify the program is up-to-date. Often this can be done by visiting the web site of the developer who created the program. A listing of third-party companies and links to each of their pages can be found on our third-party support page.Passwords-----------Make sure a password has been set on computer. Default passwords such as password, root, admin or no password will allow easy access to your computer or your Internet account.?Change passwords often. It is recommended at least once every few months.Create a BIOS password.When creating a password, add numbers or other characters to the password to make it more difficult to guess; for example: 1mypassword23.Get a hardware or software firewall----------------------------------It's highly recommend all users have some type of firewall solution. There are two types of firewall's your computer and/or network can have.Trojans, viruses, spyware, and other malware--------------------------------------------Software trojans, viruses, spyware, and other malware can not only damage or destroy your computer data but is also capable of monitoring your computer to learn more about your viewing habits on the Internet or even log all your keystrokes to capture sensitive data such as passwords and credit card information.To help protect your computer from these threats we suggest installing a virus protection program as well as a spyware protection program.Know how to handle e-mails---------------------------Today, e-mail is one of the most popular features on the Internet. Being able to identify threats sent through e-mail can help keep your computer and your personal information safe. Below are some of the most common threats you may encounter while using e-mail.Attachments - Never open or run e-mail attachments. Viruses, spyware, and other malware are commonly distributed through e-mails that have attachments. For example, an e-mail may want you to open an attachment of a funny video, when it's actually a virus.Phishing - Phishing or an e-mail phish is an e-mail that appears to be from an official company (such as your bank) indicating you need to log onto the site to check your account settings. However, the e-mails are actually sites setup to steal confidential information such as your passwords, credit card information, social security information, etc. See our phishing dictionary definition for additional information about this term as well as examples of these type of e-mails.Alternative browser-------------------Before the release of Microsoft Windows XP SP2 and Internet Explorer 6.0, Microsoft Internet Explorer was notorious for security and spyware related issues. Although it has improved since then we still highly recommend considering an alternative browser such as Mozilla Firefox.However, these as some of basic steps to take ...

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
Sign in to follow this  

×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.