5 basic steps to make your computer more secure

5 basic steps to make your computer more secure Picture 1 Information, personal data, bank account numbers, credit cards . are always targets for hackers and hackers. Security vulnerabilities, bugs in software . are always good prey for viruses, worms, trojans and spyware (spyware) raging.

Therefore, for your computer to be really safer, take the following 5 basic steps on security.

Step 1: Patch security holes

Most software contains bugs, bugs, and security holes.No software is immune to bugs and security holes.So download and install the patches for each software you use as soon as they are released.

When a security vulnerability is published, patches are also often available to download this fix.If users do not quickly update the patch in time, it is likely that their computer will be exploited by this hacker easily.Software vendors often offer tools to automatically update the latest patches for their software.For example, Microsoft releases patches and releases vulnerabilities in Windows atWindowsUpdateand patches and updates for Office are also available atOffice Update.

Step 2: Stop the intrusion

Experienced PC users, they realized that it is necessary to install a firewall to block attacks from external connections.For basic users, Windows XP's built-in basic firewall is also very good.However, for experienced users, the Windows XP firewall is not enough.For added security, use free firewalls likeZoneLabs andSyGate'sZoneAlarmby SyGate Technologies.

If you want to be more secure, use a hardware firewall solution or use the information filtering function of routers, NAT ( Network Address Translation ) or other devices with similar functions.Although these devices have excellent resistance to external intrusion attacks, they seem to be useless against internal attacks.So, incorporate the use of personal firewall software with hardware firewalls to your computer system, your computer network can be safer, against both internal and external attacks. .

Step 3: Stop the infection

Steps 1 and 2 are the basic steps to help secure computers and computer networks.But the ability to infect worms, viruses, trojans, spyware . still works "indifferently" in your system through connections from hidden data sources, installing software, or infection from computers on the same LAN.Therefore, use anti-virus and spyware tools to protect your system.

Although anti-virus programs can protect the system against worms, viruses, trojans . quite effectively.But antivirus tools don't seem to be able to detect and kill spyware either. Free anti-spyware tools likeMicrosoft'sAntispywareandSpywareBlastercan prevent spyware, they can't be installed on your computer. Your calculation from the first time and also help eliminate them when infected.StartUpMonitororWinPatrolare tools that can be managed and prevented from the beginning of the worm, virus, trojan "sneaking" on your computer right on startup.Other highly rated free anti-spyware utilities such asSpybot S&DandAd-Awarecan search a lot of spyware and worms as well as viruses .

Because these "unwanted software" are often very diverse and abundant, often a tool cannot completely destroy them.Combine using 2 or more toolkits so your computer is really safer and the system is always "clean".

Step 4: Keep your computer safe

Leaving bad guys out of your computer, stealing important information.Use strong security measures right from the step of entering the system.Create and use strong passwords against intrusion into your computer by guessing the password.To be able to create strong passwords, you can see the5-step safe password managementlesson.

Next, to protect important data, personal information, Windows XP users can encrypt data using EFS (Encrypting File System).To be able to encrypt data using EFS, you can read the Encryption data again with EFS.

Step 5: Don't trust, check back

When the computer has installed system security tools, it is not enough.You need to check your system because nothing is perfect, make sure everything is still working well.For example, users can check their firewalls with free tools like"Leaktest", or other free tools that can identify, test, and issue warnings about weaknesses. vulnerable to attack on your system.If you don't like the tool settings, users can also usePort Scanfrom BroadbandReport, which helps analyze security capabilities on your computer system online.

Equipping your PC with the best tools to help protect your computer is not enough.The user is one of the "culprits" abetting the vandals, these "uninvited guests".Therefore, users must always keep up with the information on how to use the computer in the safest way, and note that they must always adhere to the rules when using computers, especially when surfing the Web.

Minh Phuc

4.5 ★ | 2 Vote

May be interested

  • How to make your Google account safer?How to make your Google account safer?
    for many account users as well as google's support services, the login password is the information that needs to be most secure. we can consider it a unique key to google docs, adwords, google calendars ... and more. in the following article, we will introduce you some basic operations to increase
  • How to set a computer password on Windows 10,8,7How to set a computer password on Windows 10,8,7
    if you don't know how to set a computer password, you can immediately refer to this tipsmake article. with detailed steps to help you set a secure computer password
  • 4 basic steps to use the printer for new users4 basic steps to use the printer for new users
    the printer is a familiar office device in modern life. however, when first used for the first time, some of the function buttons may make it difficult for you. the article below, quantrimang will summarize 4 very simple steps to help you easily use this product.
  • How to Use Avast PremierHow to Use Avast Premier
    avast premier 2016 has come up with the latest features that will make pc or laptop secure. follow the steps below to learn how to use it. recognize the several type of scans avast provides. open the the avast premier program and click on...
  • 10 steps of 'defense' for Windows10 steps of 'defense' for Windows
    every virus, spyware, and spam that flares up can cause your computer to be paralyzed. to keep your computer intimidated, we make security recommendations into 10 steps
  • Instructions for making simple creams do not require an ice cream machineInstructions for making simple creams do not require an ice cream machine
    make sure after watching the steps below, surely everyone will make a delicious ice cream for the whole family!
  • Control the remote computer via iPhone or iPod TouchControl the remote computer via iPhone or iPod Touch
    in the previous tutorial, we presented the basic steps for setting up a remote computer control system with iphone with remote desktop and rdp lite support software on itunes. and this time, we will continue to introduce you to another application, that is splashtop remote touchpad ...
  • Learn to use lesson 18 computer - Basic troubleshooting techniquesLearn to use lesson 18 computer - Basic troubleshooting techniques
    in the process of using computers, each of us is more or less many have experienced problems with their devices, from basic to complex.
  • Instructions to fix yellow exclamation computer network with only 3 stepsInstructions to fix yellow exclamation computer network with only 3 steps
    computer error cannot reach the network, the internet icon appears with an exclamation mark ... which is an expression of the computer that cannot connect to the internet. here, tipsmake.com will guide you some basic steps to fix the error of computer network wire yellow exclamation error.
  • Basic computer test - Part 5Basic computer test - Part 5
    following the series of basic questions about basic informatics, the following article will continue to be multiple choice questions so you can try your own knowledge about this topic.