Security Information |
Protection for Your PC - Painless and Free!
Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet is a veritable minefield of things that can invade your PC and affect it's Security and Performance. You can do something about it and you can do it FREE, using some or all of the following programs and tips. Anti-Virus protection. One of the best Free programs for this is AntiVir Personal Edition Anti-Virus software. Download it from:http://www.free-av.com Install on your PC and leave it running to block any incoming bugs or viruses! It can also be used to scan your system for any previous invasions, but be patient, this takes about 15 minutes to complete. Worth running periodically, to check all is ok. FireWalls and Broadband. If you are on Broadband, consider using Firewall software. Most good ISP's now supply free. (eg AOL). If yours doesn't, you can get a reasonably good Free personal firewall system from 'ZoneAlarm' at http://www.zonelabs.com .Tip - DON'T leave your PC connected to the Internet when you are not using it! Reduce the chance of something loading while you are not monitoring things ! SpyBot finders and Ad blockers. Various programs available on the web, both 'Paid' and 'Free'. You can get good results from using 2 Free packages that are available. These are 'SpyBot Search & Destroy' and 'Ad-Aware'. Downloads available athttp://www.lavasoft.de for AD-Awarehttp://www.safer-networking.org for SpyBotUsing both of these packages ensures that, you get with one, any 'bots' that the other one misses. Suspect you have a virus? If you think you already have a virus, a good Free tool for checking and killing them is McAfee Stinger. Free download at:http://us.mcafee.com/virusInfo/default.asp?id=stinger Some General Tips Get in the habit of, every time you disconnect from the web, deleting ALL files from the following folders: C:/WINDOWS/Cookies Beware 'Boys Toys' and 'Freebies'! Think, if someone wants to spread a bug, get tracking software onto your PC etc, the best place for them to do it is places where you go to get 'freebies' to download! The above sites are normally 'ad free', but be aware that if you download porn, free music, free games, free software, there is often a 'price' to pay. Always use the above programs after visiting ANY of these sorts of sites! John Roberts is a Freelance Training Consultant and Director of JayrConsulting Ltd. (http://www.jayrconsulting.co.uk) John is also an active member of TrainerBase (http://www.trainerbase.co.uk) and is always open to discussion on any training topics.
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
Message Board Security Problems Security leaks can be a big problem for any site using a message board. Hackers can actually use your message board to go in and change things on your site. Free Spyware Removal - Its Not As Easy As It Sounds Nobody wants to pay to remove spyware. At the very least, I don't. Reducing Fraudulent Transations - 5 Simple Ways To Protect Yourself The money being spent online is steadily growing. With billions of dollars being spent each year online, the opportunity to make money on the internet has never been bigger. Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders Can you protect your computer from all possible viruses and other invasions?The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties. The Risk Of Electronic Fraud & Identity Theft Electronic Fraud and Identity Theft-----------------------------------Human beings are pretty sensible when presented with an imminent threat or risk. That is, if it's staring us directly in the face. All About Computer Viruses Your computer is as slow as molasses. Your mouse freezes every 15 minutes, and that Microsoft Word program just won't seem to open. Social Engineering: You Have Been A Victim Monday morning, 6am; the electric rooster is telling you it's time to start a new work week. A shower, some coffee, and you're in the car and off. Anti-Spyware Protection: Behind How-To Tips There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. Click Here To Defeat Evil Microsoft routinely releases new security updates, many of which are given it's highest severity rating "critical". Here's a typical announcement:"A security issue has been identified that could allow an attacker tocompromise a computer running Internet Explorer and gain control over it. An Open Letter From a So-called Stupid Someone recently told me, "You would have to be a stupid to lose your personal information." While I respectfully responded to this person in the moment, the comment has stuck with me. Computer Security What is computer security?Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as "intruders") from accessing any part of your computer system. What is Hacking? Are You a Hacker? WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose. Are You Surfing Safe? Ok, you've got a computer, and you get online. You surf your favorite sites, Sports, Shopping, Cowchip Tossing Blogs, and so on. What Every Internet Marketer Should Know About Spyware If you run any type of Internet business, Adware and Spyware can be a very serious issue. These programs hide themselves on your computer and do all sorts of annoying and potentially dangerous things. Technology and Techniques Used in Industrial Espionage Industrial Espionage. These methodologies are being used on a daily basis by competitors maybe even against you. Identity Theft - Dont Blame The Internet Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries. Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER From: "Paypal Security"Subject: New Security RequirementsDate: Tue, 26 Jul 2005 19:20:51 -0800Dear valued PayPalŪ member,Due to recent fraudulent transactions, we have issued the following security requirements.It has come to our (attion)**Spelling Mistake**, that 98% of all fraudulent transactions are caused by members using stolen credit cards to purchase or sell non existant items. Mall Protection The Loss Prevention Manager should be receptive to the needs and objectives of upper management and work to prevent and reduce loss from crime, fire accidents etc.With the continuing threats brought to us by our AL Quaeda and Taliban enemies and the outbreak of new TV shows that reinforce the danger we all face on a daily basis, one must look within as to how we can protect ourselves from threats both real and imagined. Information Security for E-businessmen: Just a Couple of Ideas If you constantly deal with bank or electronic accounts, it must beyour worst nightmare--to wake up and learn that you are a bankrupt.Some crook stole your personal data and all the money you have beensweating blood for years has flown to somebody else's account. |
home | site map | contact us |