Rabu, 29 Juli 2009

Six Step Computer Security

Six Step Computer Security

If you are concerned about security of your data and your computer, here are six easy steps that can help protect and preserve all that you've worked with great difficulty to your computer.

1. Use a firewall internet
If you do not use a firewall, the attacker can find and
attack your computer within 15 minutes after you connect to the Internet. If you access the Internet using the "always connected", such as cable modem or DSL, you must install a firewall and always update it.
There are 2 types of firewalls: hardware and software. Hardware-based firewall is usually a router or a personal computer that has been set to act sabagai firewall for all network in your home. Currently, however, many Internet firewall used in the home and small perangakat based software. Firewalls of this kind can be obtained from third parties, such as Zone Labs' ZoneAlarm. Or maybe the device was directly inserted in your operating system, such as ICF (Internet Connection Firewall) or Windows Firewall in Microsoft Windows XP, depending on the service pack that you have pairs.

2. Update your computer operating system
Once your firewall is installed, in order to keep the software your computer's most fundamental - the operating system - with continuously updated using software update Peng-you. Failure to do this will result in your computer in a very vulnerable situation because of negligence on the operating system and is usually known to be the target of the hacker and cracker. If you use the latest operating system, such as Windows XP, you can use Windows Update to manually download and install updates from Microsoft Windows Update site. To automatically download the updates at this time and will come, enable Automatic Updates feature by clicking Start
> Control Panel> Security Center.

3. Take advantage of your antivirus software as well as possible
Programs antivirus software to help protect your computer against most viruses, worms, Trojan horses, and other dangerous code. Many new computers have been equipped with antivirus software. However, antivirus software must be updated regularly, which usually require you to subscribe to the software the author. If you do not subscribe to update your antivirus software, then your computer will be vulnerable to new threats. Therefore, you should install anti-virus tool, use, and the guard to stay updated. Updates are usually available at least once a week.
After you install antivirus software, Arrange to undertake review of all existing data, data-entry of data and to download, email messages, and attachments. Enable schedule "check for updates" to check daily.

4. Prevent spyware, adware, and spam
Many sites and software for free that tout the username and
to report their activities to third parties who then use the information to send more spam. If you surf the internet, your computer will be entered spyware and adware. If you share data or send a short message, you will get spyware and adware than anymore. Best protection against spyware and adware is to not download it
from the start. To protect your computer not to download programs that harm:
  Download programs only from sites you trust
  Read all security warnings, license agreements, and privacy statements of each program that is downloaded.
  Do not have to click Agree or OK to close a window.
Instead, click the red X in the top right corner of the window or press Alt + F4
on your keyboard to close a window.
  Be careful in using the program to share music files and film "Cuma-cuma", and make sure that you fully understand all of the software into one package on these programs.
To minimize spam, consider the following options:
  Ask your Internet service provider to ensure that they run a type of spam filter and antivirus.
  Set up email filters in your email client (like Outlook Express, Eudora,
and others). Some spam filters mark the email is spam
with a marked *** SPAM *** subyeknya on the line. The other
X_SPAM put a sign or a title similar to the format of the message area.
You can set filters to find messages and
move in a separate place so that you can remove them when
only.
  Use a third-party products, such as Cloudmark Safety Bar, SpamAssassin and Bayesian Mail Filter, which automatically move spam that are recognized and put them in a separate place for you.

5. Select pop-up blocker trusted
You should install a pop-up blocker, such as Google toolbar or StopZilla, in your browser or use an alternative browser (Mozilla, Firefox, or Opera) that has a pop-up blocker inside. You should avoid a free program from the vendor that is not clear. Many free programs contain spyware in it. They advertise that they can do anything you want, but behind that, they contain a program that can harm your computer.
Tip: If you are running Windows XP with Service Pack 2, enable the Pop-up Blocker in Internet Explorer. You can do this by clicking Tools> Pop-up Blocker> Turn on Pop-up Blocker. The best way to stop the pop-up is to never allow them to install themselves on your computer since the beginning. You can do
avoid this with a site that does not clear, and never download and install programs from sources that are not trusted.

6. Protect your computer and your data is physically
The last thing is not less important, make sure that the computer and the data that is physically safe inside. Create a backup copy: To make backups easier and faster to perform, document and manage all of your data in the correct folder. Then you can easily copy all of the Zip drive, CD, or DVD, or use a backup program or service.
Keep your backup security: Keep your backup media outside the computer: for example with the menitipkannya friend or family, in a safety deposit box, or online using a trusted backup service.

Tidak ada komentar:

Posting Komentar