5 basic steps to make your computer more secure
Information, personal data, bank account numbers, credit cards ... are always targets for hackers and hackers. Security vulnerabilities, bugs in software ... are always good prey for viruses, s & acir
Information, personal data, bank account numbers, credit cards . are always targets for hackers and hackers. Security vulnerabilities, bugs in software . are always good prey for viruses, worms, trojans and spyware (spyware) raging.
Therefore, for your computer to be really safer, take the following 5 basic steps on security.
Step 1: Patch security holes
Most software contains bugs, bugs, and security holes.No software is immune to bugs and security holes.So download and install the patches for each software you use as soon as they are released.
When a security vulnerability is published, patches are also often available to download this fix.If users do not quickly update the patch in time, it is likely that their computer will be exploited by this hacker easily.Software vendors often offer tools to automatically update the latest patches for their software.For example, Microsoft releases patches and releases vulnerabilities in Windows atWindowsUpdateand patches and updates for Office are also available atOffice Update.
Step 2: Stop the intrusion
Experienced PC users, they realized that it is necessary to install a firewall to block attacks from external connections.For basic users, Windows XP's built-in basic firewall is also very good.However, for experienced users, the Windows XP firewall is not enough.For added security, use free firewalls likeZoneLabs andSyGate'sZoneAlarmby SyGate Technologies.
If you want to be more secure, use a hardware firewall solution or use the information filtering function of routers, NAT ( Network Address Translation ) or other devices with similar functions.Although these devices have excellent resistance to external intrusion attacks, they seem to be useless against internal attacks.So, incorporate the use of personal firewall software with hardware firewalls to your computer system, your computer network can be safer, against both internal and external attacks. .
Step 3: Stop the infection
Steps 1 and 2 are the basic steps to help secure computers and computer networks.But the ability to infect worms, viruses, trojans, spyware . still works "indifferently" in your system through connections from hidden data sources, installing software, or infection from computers on the same LAN.Therefore, use anti-virus and spyware tools to protect your system.
Although anti-virus programs can protect the system against worms, viruses, trojans . quite effectively.But antivirus tools don't seem to be able to detect and kill spyware either. Free anti-spyware tools likeMicrosoft'sAntispywareandSpywareBlastercan prevent spyware, they can't be installed on your computer. Your calculation from the first time and also help eliminate them when infected.StartUpMonitororWinPatrolare tools that can be managed and prevented from the beginning of the worm, virus, trojan "sneaking" on your computer right on startup.Other highly rated free anti-spyware utilities such asSpybot S&DandAd-Awarecan search a lot of spyware and worms as well as viruses .
Because these "unwanted software" are often very diverse and abundant, often a tool cannot completely destroy them.Combine using 2 or more toolkits so your computer is really safer and the system is always "clean".
Step 4: Keep your computer safe
Leaving bad guys out of your computer, stealing important information.Use strong security measures right from the step of entering the system.Create and use strong passwords against intrusion into your computer by guessing the password.To be able to create strong passwords, you can see the5-step safe password managementlesson.
Next, to protect important data, personal information, Windows XP users can encrypt data using EFS (Encrypting File System).To be able to encrypt data using EFS, you can read the Encryption data again with EFS.
Step 5: Don't trust, check back
When the computer has installed system security tools, it is not enough.You need to check your system because nothing is perfect, make sure everything is still working well.For example, users can check their firewalls with free tools like"Leaktest", or other free tools that can identify, test, and issue warnings about weaknesses. vulnerable to attack on your system.If you don't like the tool settings, users can also usePort Scanfrom BroadbandReport, which helps analyze security capabilities on your computer system online.
Equipping your PC with the best tools to help protect your computer is not enough.The user is one of the "culprits" abetting the vandals, these "uninvited guests".Therefore, users must always keep up with the information on how to use the computer in the safest way, and note that they must always adhere to the rules when using computers, especially when surfing the Web.
Minh Phuc
You should read it
- Remote computer security with Sophos Home
- 9 best antivirus software for Mac
- 7 layers of security every computer should have
- Top 10 Internet security software
- Some popular fake security software - Part 3
- Install 'sirens' for Windows with Predator
- How to Save on Security Software Without Compromising Quality
- 14 Windows applications and software needed on new machine
- Safeguard against Shellshock security vulnerabilities
- CMC's security software kills more than 1 million viruses
- 10 computer and LAN security rules
- 5 best free security tools you may not know yet