Security Information |
Is My PC Vulnerable on the Internet?
No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information. Let's begin with the basics. We all need to protect our PC in the same way we protect our home, car and bank account. We wouldn't give a stranger the keys to our car, home or bank account now would we. If you don't protect your PC it is like giving the keys to a stranger and letting him/her have full access to your PC. Once the stranger has the keys they can snoop around and take whatever they want. I know, your thinking how can they do this, my computer is in my house and my doors are locked. Well, today you can be anywhere in the world and access someone's computer via the internet. Since the introduction of cable modems and DSL everyone's PC is online all the time and accessible. Why do I need to protect my PC, I don't keep any important information on it? Ask yourself a couple of questions. 1. Do I bank online? If you answered yes to any of these questions then your PC is vulnerable. If you bank online then you are sending personal confidential information to your bank via the Internet. For Example: Let's say you are infected with spyware and you are typing in your account number plus password. A spyware installation can record key strokes and then send them off to a site on the internet. Now the person who setup the site has your account number and password to your bank. Here is one more example, if you answered yes to I let other people use my pc, here is what happens. The other person decides that they like this new cool piece of software. They download and double click on the exe, msi or whatever installs the software. The adware, spyware or virus installs. Now the infection is installed and now it can start stealing confidential information or cause havoc on your PC. You get onto the PC as always, since you don't know this has happened and start doing what you always do, type documents, go to chat rooms, do your banking online, reconcile your banking with quicken and all this time your confidential information is stolen and you are completely unaware that this occurred. The million dollar question, what do I do? Well, you can follow this approach. 1. Install a Spyware application and install and configure correctly. If you already have spyware application installed make sure it is up to date and make sure that is configured properly. 2. Install an Adware application and install and configure properly. If you already have adware application installed make sure it is up to date and make sure that is configured properly. 3. Install an AntiVirus application and install and configure properly. If you already have antivirus application installed make sure it is up to date and make sure that is configured properly. 4. Install backup software, why because if something does get through your defenses or delete something by accident you always have a way of retrieving the information. You should try to backup your system at least every other day. 5. Install Encryption software. This software will encrypt files like word docs, spreadsheets, banking file on quicken. This way if someone does steal your information they will not be able to read it. 6. Install a Firewall. The Firewall can either be software or hardware based. I would install both especially if you bring your laptop with you and connect to the internet at different locations. The Firewall will block hackers trying to scan your system while you are on the Internet. Many people have these applications installed but they do not configure them correctly. Just installing the application does not mean that the application is working properly to stop the threat/infection. On some applications you need to configure the setting to make the application work the way it was designed to. Find out how to configure and install the software properly either by reading a how to book or getting someone to help. If you already have the application installed make sure it is up to date and make sure that is configured properly. All of the software needs to be up to date and kept current. As new threats are release on the internet, all applications will need the current updates to fight these threats. If you would like to find out if you're PC is protected you can take the test. This will not harm your PC it just checks for vulnerabilities and lets you know if you passed or failed. The application is a single exe and DOES NOT NEED TO BE INSTALLED. All you need to do is run the test application and follow the instructions. Get Risk Assessment Tool All articles are written by HowtoPCGuru!HowtoPCGuru http://www.howtopcguru.com You may reproduce and use this article just so long as you add a link (http://www.howtopcguru.com) down at the bottom.HowtoPCGuru, All the latest articles, tools, news, file hosting and more!
MORE RESOURCES: Unable to open RSS Feed $XMLfilename with error HTTP ERROR: 404, exiting |
RELATED ARTICLES
The Important Steps To Protect Your Kids on the Internet Internet is the ocean of knowledge. In this ocean youwill find beautiful pearls of knowledge. Social Engineering: You Have Been A Victim Monday morning, 6am; the electric rooster is telling you it's time to start a new work week. A shower, some coffee, and you're in the car and off. Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. Secure Your PC From Hackers, Viruses, and Trojans Viruses, Trojans and Spyware: Protecting yourself.No user on the internet is safe from assault. Spyware Removal Spyware SolutionProbably Today's Biggest Computer Problem.You Suffer Without Knowing Your PC is Infected!"The effects can be devastating. Traditional Antivirus Programs Useless Against New Unidentified Viruses! Every now and then you can read about a new virus and the damage it causes. The millions viruses costs companies each time they strike. Is Spyware Watching You? Imagine my surprise when I received a phone call from afriend who told me he'd been the victim of a "spyware"attack that left him shaking at his loss of privacy.I listened to his horror story with a sympathetic ear, butI felt secure since I carry anti-virus software and afirewall (both by Norton). Identity Theft -- 10 Simple Ways to Protect Your Good Name! Identity Theft is one of the most serious problems facing Internet users. Identity Theft is exactly as the name states -- someone steals your Identity and commits fraud in your name. Computer Viruses and Other Nasties: How to Protect Your Computer from These Invaders Can you protect your computer from all possible viruses and other invasions?The quickest answer to this is "no." It's just flat impossible to protect your computer from all viruses, registry attacks, worms, spyware, malware, popups, and other such nasties. Internet/Network Security AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years [1]. In fact, few steganographers would disagree with the investigation of spreadsheets. Remove Rogue Desktop Icons Created By Spyware If you have used a Windows machine for a while, whether it's Windows XP, Windows 2000, or Windows 98, you're sure to have noticed desktop icons appearing from out of nowhere. How can icons mysteriously emerge on your Windows desktop?1. 3 Things You Must Know About Spyware 1)Spyware is on your system. Like it or not, statistically speaking, you probably have spyware on your machine right now. Anti-Spyware Protection: Behind How-To Tips There is no doubt that "how-to articles" have become a separate genre. One can find such an article about almost anything; there are even some entitled "How to Write a How-To Article". Why Malicious Programs Spread So Quickly? It seems that nowadays cybercriminals prefer cash to fun. That is why malicious programs of various kinds (viruses, worms, Trojan horses, etc. Internet Scams: Dont be a Victim As the number of people using the Internet as an integral part of their daily life grows, it is inevitable that the number of Internet Scams will grow. Unfortunately there are many forms of scams but in this article we will look at three of the most prominent. Crack The Code - Thats A Direct Challenge I Challenge You To Crack The Code-------------------------------------I had quite an interesting experience recently. I was hired by a company to perform a vulnerability assessment and penetration test on their network. What to Look for before You Purchase Spyware Software Huge number of spyware software applications are available in the market, some being offered as shareware while rest as freeware. (Shareware means a software available for download / CD, and can be used for a particular length of time, usually 30 days. Viruses, Trojans, and Spyware - Oh My! Have you ever had to call Symantec or McAfee to ask them how to remove a virus? Or have you spent hours online trying to figure out how to remove spyware, only to find out that you did something wrong and now your computer won't boot? I know your pain and frustration with just trying to use your computer without worry. As a computer technician at ARCH Computing Services, I know how hard it can be to pay someone to remove viruses and spyware. How To Give Away Your Personal Information Identity Theft and Your Personal Information--------------------------------------------Identity theft is apparently the "in thing" these days. By media accounts, hackers and evildoers lurk everywhere trying to steal your personal information. Top Spyware Removers Considerations Only the top spyware removers are successful at detecting and removing spyware and adware from your computer. You should look for complete protection against these threats: spyware, adware, keyloggers browser hijackers and Remote Access Trojans. |
home | site map | contact us |