While some of them will be hoping for phishing your personal information and the others intend to use your computer as the platform through which they can easily attack other unsuspecting targets. Here are some of the few easy steps and also the cost effective steps you can take for making your computer more secured.
- It’s important that you have to make frequent backup of the essential and important information and store it is a secure place away from your computer system.
- It’s important that you have to update and patch your operating system, web browsers and the softwares you use frequently. If your system has windows operating system then you can easily update your system by going to windowsupdate.microsoft.com and easily start update wizard.
- Its important you have to install a firewall on your computer. Because without the good firewall the viruses, Trojans, worms, malware and adware can easily access your computer system from the internet without any trouble. Here consideration should have to be given to the advantages as well as the differences between the hardware and the software based firewall programs.
- You have to install the antivirus and set for the automatic updates so that you can get the very most recent versions.
- You have to check the browsers and the e-mail settings for the maximum security. Because the Active-X and the JavaScript are often used by the hackers to plant the malevolent programs in the computer systems. Here the cookies are harmless in the terms of the security matters. Take precaution and set the security settings of the internet zone to High and the trusted sites zone to Medium Low.
- You should not open the unidentified e-mail attachment which comes from unknown addresses. Because many of the viruses can be spread from a familiar address.
- You should not run the programs from the unknown sources. And you should also not send these kinds of the programs to your friends and the colleagues because they contain funny jokes or stories and they may contain Trojan horse which will be waiting to infect your computer.
- You have creatw a boot disk on the floppy or the CD incase if your computer gets damaged or infected by the malevolent program. So you have to take this precaution before you experience the hostile breach of the system security.
Related Posts
Tambahkan Komentar Sembunyikan