Step 4: Use Web and Mail with Confidence ( Applies to Windows 7, Vista, XP, 2003, 2000, NT )
Whenever you access the web, you always risk accidentally "sticking" to malicious software that you really don't want or don't know about it. Choosing a secure web browser can prevent you from becoming a victim of computer, malware or other attacks of malicious software. In the past, Microsoft's Internet Explorer has been affected by a lot of security-targeted attacks, but we can see very few actions taken to fix security holes. Currently, to avoid this problem, we would like to introduce some popular Web browsers and email accounts with greater security.
• Recommended web browser should use:
o Mozilla Firefox
o Opera
Choose which web browser does not matter, it is important to keep up to date!
Step 5: Turn on Windows Firewall ( Applies to Windows 7, Vista, XP )
With Windows 7, you can get everything you need. Built-in firewall of this operating system is a shield that helps protect against Internet attacks. This utility blocks all internal requests and searches for a target that could easily harm a computer or hijack. These goals could be very vulnerable to exploits by malicious software. Make sure your firewall is turned on. There is no need to run any other firewall software. Because they cannot upgrade the security of your system like Windows 7's built-in firewall. Your remaining task is simple, install this built-in firewall accordingly.
How to check firewall settings: Start -> Control Panel -> System and Security -> Sidebar: Turn Windows Firewall on / off (turn on / off Windows Firewall).
• Settings for home or office network (personal):
o Select " Turn on Windows Firewall"
o Remove traces of all other options
• Settings for public networks:
o Select " Turn on Windows Firewall "
o Remove traces of all other options.
Step 6: Check Network Locations ( Applied in Windows 7 and Vista )
Choosing the right location settings for your network connection may help somewhat in upgrading computer security. For example, Windows allows some ports to connect if you notice that you are using the Home Network. When connecting to a public network (library, Internet café or airport), make sure you select Public Network and allow Windows to hide all external ports by filtering them out.
To check your location settings: Start -> Control Panel -> Network and Internet -> Network and Sharing Center
Basically, Windows 7 knows three different types of locations:
• Home Network : If all computers use the same home network, and you know all these computers and this is called a reliable network.
• Work Network : For individual users, this setting is less common. It is similar to the Home Network but there are some additional services that the corporate network requires.
• Public Network : If you don't know much about your computer, you are using an unreliable public network and in this case use Public Network and choose one of the following locations. :
o In the restaurant
o In the café
o At the airport
o Using the telephone network
Just follow these basic, simple steps and experience surfing the web much faster.
Step 7: Backup data ( Applies to Windows 7, Vista, XP, 2003, 2000, NT )
Desktop and laptop computers are vulnerable to attack, system files face damage, data loss or hard drive failure - these can happen anytime and anywhere. wherever we don't, we don't want to. Today, people use smartphones more, and the same things can happen with your data. Creating a backup (your data, photos, music files .) at least once a month can significantly reduce the risk of data loss. Along with the right strategy, failure or financial loss is no longer a problem for you.
• Applications that help create backups:
o Backup and Restore : Windows 7 provides tools for creating backups of files and folders, as well as creating backups for the entire system.
How to do it: Start -> Control Panel -> System and Security -> Backup and Restore
o Acronis True Image (paid app): A reliable solution that helps you create a backup copy of your entire hard drive and back up a lot of files and folders. In the event of losing all the data, you can use the application's bootable DVD to recover all lost data.
• Create data backup strategy:
o Backup what ? You can save single data (file system level) or create a backup of the entire hard drive system (partition level).
o Where to backup ? One place has enough space to store backups of your data such as: hard drive (the fastest and easy to use), online hard drive (difficult to use in emergencies), DVD-RAM ( Very reliable but expensive in reducing capacity).
o When to backup ? Save your system at real time whenever: daily, once a week or at least once a month.
o Full, incremental or differential ? Full backup - full backup - will save all your data but will take up a lot of disk space. Incremental backup - backs up only the changed data from the last backup - saves any new files or new files that have been changed from the last backup. Differential backup - partial backup - helps you save new files or be changed since the last complete backup.
o How long should a backup be kept ? There is no general answer to this question. However, we recommend that you keep at least 3 backups or create a new backup at least once a month.
Also, remember to check the backups after creation and later.
The reason why you don't need to use a personal Firewall
1. First, a firewall is known as part of a security concept, applied to computers and networks. This is not a software for you to install, feel secure.
To protect your computer within a network, the first thing you need is a concept that can answer questions like:
o What to protect?
o Which "invaders" need to be on guard?
o What service / user is allowed to connect to the outside?
o How much will these safeguards cost - and is it worth it?
Those are the basics of firewalls. No matter what anyone tells you, just remember: a firewall is a concept, not a software.
2. A firewall running on an operating system needs to be protected, this is not meaningful in most cases.
This is a firewall's task to keep harmful data packets out of the server. Other vulnerable vulnerabilities, which require extra protection, are still surpassed before the firewall can do anything against it. At the same time installing the extra software code (such as a Desktop Firewall) on the server, you should increase their complexity along with increasing vulnerability to vulnerabilities and vulnerabilities.
3. Any additional software can evaluate the vulnerability of a system along with the vulnerability of this system.
No software has no errors and these errors exist with existing software. This means that the total number of errors of a system is a big security issue. With an extra software installed, the complexity of the system is enhanced and since then, security issues will be less worrisome.
4. Desktop Firewalls make the users feel secure that they are now safe. This fake type of security makes users tend to be less vigilant about the security of the computer they are using. This is known as 'risk compensation'.
Everyone knows that many people often click on attachments without thinking or suspicious. When asked if these software can contain malicious code with computer viruses hidden inside, they often answer: Why bother with that? I have installed Desktop Firewall and antivirus software. They will protect my computer! ' Really, this is not true at least from now on you should be wary of this.
5. The Firewalls desktop can be bypassed or turned off very easily, but users are not aware of this.
Security software often asks users what to do:
o First, many users will respond with Yes or Allow, with the aim of continuing to surf the web or not wanting to be bothered while playing something - no matter what they have done. This is really dangerous!
o Second, these interactive conversation windows appear from Desktop Firewall not only users click on. Malware software can do these things for you when changing rules according to them. This happens so quickly that you cannot notice what is happening. They can do this because most of the time, Desktop Firewall has the same rights as users.
o Finally, Desktop Firewall often comes with bad software. Whenever the Desktop Firewall interacts with the user, there will be a link between high and low levels of privilege and malicious software will take advantage of this to harm the system.