Personal Technology Information |
|
Are You Well Protected?
Winter?the official start of the cold and flu season. Though, technically speaking, things got started a little early. Close to a million computers, mostly home PC users, have been infected. For many of us our computers are our business. We keep in contact with customers and clients via email, do extensive internet research, and transmit important files electronically. We know what to do to protect our bodies from viruses. There are some simple strategies, and even free precautions we can take to protect our businesses by keeping our PCs virus free. Adopting the following six checkpoints will help keep your computer healthy and your business uninterrupted. Use a Firewall At its most basic level a firewall is a software security system that acts as a barrier between your computer and the outside world (the internet) by monitoring all incoming network traffic. A more advanced firewall will also monitor outgoing traffic. How you use your computer will determine whether basic or advanced firewall protection is needed. What a firewall does is make your computer invisible while on the Internet. If hackers can't see you, they cannot attack you. Windows XP has this software installed; however, it may need to be enabled. If you have XP and would like to enable the firewall, directions are on the Microsoft website. For non XP users, firewall software can be purchased. McAfee and Zone Alarm are two very popular products. Zone Alarm has a free downloadable firewall, basic version, available on their website, www.zonealarm.com. Before installing a firewall, you may be interested in learning your computer's vulnerability. This is something that can be checked for free and in just a few minutes. Visit the website of Gibson Research Corporation, www.grc.com, and under Hot Spots, click on Shields UP. It takes a little bit of scrolling to get to but is well worth the extra seconds. In minutes your PC is scanned and its vulnerability rated. Antivirus Software Antivirus software is the "shot" after the epidemic. This software protects your computer from known threats. Many PCs come with antivirus software already installed. Some of the more popular versions are Norton, PCCillin and McAfee. If you have it pre installed or have purchased it, great. Please be sure to keep it constantly updated with the latest virus definitions. This is important because these definitions are formed in response to the latest viruses. If you don't have this protection, please consider getting it. Once this software is installed on your computer, you will be automatically notified when new virus definitions are available. Then it is just a matter of a few clicks to download the new definitions. Likewise you will be notified when your antivirus software is about to expire. The software needs to be updated annually. The initial purchase, renewal, updates and installation can all be done online. Spyware Eliminator Why am I getting all of these pop ups? Certain websites that you visit or free software (shareware) that you download, and, in some cases, hardware purchased from major manufacturers will also install tracking devices on your computer (spyware). Spyware is annoying but not illegal. An internet search will reveal the many choices available for spyware elimination software. The important thing is to get one and use it consistently. Spybot and PestPatrol are popular choices. I really like Spybot Search and Destroy. Besides the fact that it is free, once spyware is identified, the software will provide a detailed description of just what it is. This is helpful just in case it identifies something that you don't want to get rid of. Backup, Backup, Backup How often do you backup? What files/programs do you backup? What media do you backup to? We all know the importance of backing up our information yet so many of us don't do it. There may be a ton of reasons why it's not done but the one reason it should be done on a regular basis is that it can be a timesaver, possibly a business saver if your computer system is corrupted for any reason. If you happen to be using Windows XP Professional, the backup procedure is quite simple. For users of XP Home Edition, it is a bit more involved. Complete instructions, however, are on the Microsoft website. Typically, data files are what most people need to back up and having well organized files will certainly simplify the process. Whether you backup to disk, zip disk, DVD, writeable CDs, external file drive or utilize one of the online services, it is important to get into the habit of backing up on a regular basis. Weekly Updates of Windows Windows users are automatically notified of current updates for the Windows operating system when your computer is turned on. With just a few clicks your operating system is updated. However, when certain patches become available for your particular applications software (XP, 2000, NT, etc), as was/is the case with the recent worm viruses, a visit to Microsoft's website is necessary. Once there, Microsoft will scan your computer, tell you what updates are available, and you then have the option of installing them on your system. In some cases, you will need your installation CDs to complete the download. With the recent run of viruses and with more expected, it is imperative to check for these updates weekly on the Microsoft website as well as do the automatic updates. Be Careful of Email Attachments Email is such a widely accepted method of communication, and this has not gone unnoticed by hackers who use email as a means of mass virus spread. For this final checkpoint, your due diligence is the only software required. Always delete any email from unknown senders and be very careful of any attachments you are not expecting from any known senders. As we have seen, hackers can quite easily access Outlook address books to spread viruses. By the way, including a fake email address in your address book will not prevent your PC from spreading viruses. This is an urban legend. If you're interested in the full story, check out this link: www.snopes.com/computer/virus/quickfix.htm When it comes to the health of our computers, an ounce of prevention is worth a pound of cure. Effective prevention software along with plain old common sense, used consistently, can keep you protected. About The Author Roxie Hickman, Virtual Assistant (VA), is the owner of The Virtual Connection. The Virtual Connection (www.thevirtualconnection.net) specializes in working with the 'sucstressed' (successful professionals who are stressed because they've been doing it alone). The Virtual Connection provides offsite executive, administrative, and personal assistance (virtual assistance). roxie@thevirtualconnection.net
MORE RESOURCES: To Power Huge Data Centers, Utilities Are Turning to Fossil Fuels - Tech News Briefing - WSJ Podcasts The Wall Street Journal 100 Cool Tech Gadgets in 2024 BestProducts.com Why Turning It Off and Turning It Back On Is Gadget-Fixing Magic The Wall Street Journal Want to Get More Done? That Podcast in the Background Is Holding You Back The Wall Street Journal Tech That Will Change Your Life in 2024, From AI to EV - WSJ The Wall Street Journal A Potential TikTok Ban Is Looming. 5 Things to Know and How to Prepare - WSJ The Wall Street Journal After a Sugar High of Free Money, These Billion-Dollar Technologies Need a Nap The Wall Street Journal The Tech to Help You Beat Your Tech Addictions The Wall Street Journal We Aren't Posting on Social Media as Much Anymore. Will We Ever? The Wall Street Journal Tech Hubs Are Losing the Talent War to Everywhere Else The Wall Street Journal Best Tech Gifts of 2023 to Buy This Holiday Season, an Updated List - WSJ The Wall Street Journal OpenAI Made AI Videos for Us. These Clips Are Good Enough to Freak Us Out. - WSJ The Wall Street Journal The Invisible $1.52 Trillion Problem: Clunky Old Software The Wall Street Journal I Bought the World's Hottest High-Tech E-Bike. Then Its Maker Went Bankrupt. The Wall Street Journal iPhone Fixes to Make if You're the Family IT Department This Year The Wall Street Journal Don't rent out that container ship yet: CIOs and biz buyers view AI PCs with some caution The Register Vision Pro Review: Apple's First Headset Lacks Polish and Purpose The New York Times Boys Are Struggling. It Can Take Coaches, Tutors and Thousands a Month to Fix That. The Wall Street Journal Yun-Hee Kim promoted to Tech Editor, Corporate and Personal Technology The Washington Post 'Hands were shaking': Google engineer details personal experience after tech gaint lays off employees, di The Times of India Apple's New Face Computer Is for Work The Wall Street Journal Tesla decimates staff amid ongoing performance woe The Register The eight-bit Z80 is dead. Long live the 16-bit Z80! The Register He Stole Hundreds of iPhones and Looted People's Life Savings. He Told Us How. The Wall Street Journal The Four Steps to Better Password Security - WSJ The Wall Street Journal Everything You Need to Know About Smartphone Backups The New York Times The most personal technology | Jul 22nd 2023 The Economist Is the $139 Amazon Prime Subscription Still Worth It? The Wall Street Journal Turn On Your iPhone's Stolen Device Protection Now to Secure Your Money and Photos in iOS 17.3 Update - WSJ The Wall Street Journal Testing Apple’s Vision Pro The New York Times A Pain-Free Way to Secure All Your Online Accounts The Wall Street Journal The Apple Video Feature Awkwardly Crashing Your Meetings - WSJ The Wall Street Journal Yes, It's Rude to Use Your Laptop During Meetings—and More Tech Etiquette Rules You Might Be Breaking The Wall Street Journal What if You Never Had to Charge Your Gadgets Again? The Wall Street Journal The Youths Have Spoken: Wallets Are Uncool. Go Digital. The New York Times Novelty flip phone strips out almost every feature possible to be as boring as possible The Register The Most Important Tech Company You've Never Heard of Is a Major Reason Computers Keep Getting Faster The Wall Street Journal Sluggish Wi-Fi? Weird Party Smells? 8 High-Tech Helpers for Harried Holiday Hosts The Wall Street Journal Apple's iOS 17.3 Stolen Device Protection Update Aims to Stop iPhone Thieves - WSJ The Wall Street Journal The Accounting Technology Lab Podcast: Personal Tech at CES 2024 CPAPracticeAdvisor.com Meta Welcomes Headset War With Apple - WSJ The Wall Street Journal Quick Tips to Save Time on the Telephone The New York Times Faster, Beefier, Cheaper: The Next-Generation Electric Skateboards Have Arrived The Wall Street Journal Things to Do: Our 12 Top Tech Tips of 2023 The Wall Street Journal Want to Invest in SpaceX or Stripe? There's a Fund for That. The New York Times You Spend Hours a Day in Your Browser. Now Make It Better. The Wall Street Journal Why Tech Companies Are Not Your Friends: Lessons From Roku The New York Times Is This the End of 'Intel Inside'? The Wall Street Journal How to Make Your Phone Last Forever: 6 Simple Tips The Wall Street Journal One Month With Apple Vision Pro: In the Air, on a Train and…in a Drawer The Wall Street Journal How to Cut Down Your Screen Time but Still Get Stuff Done The New York Times Why You Keep Getting Useless Alerts on Your Phone The Wall Street Journal Why Some 20-Somethings Are Saying No to TikTok The Wall Street Journal Distracted, Forgetful and Hooked on Smartphones: Why More Women Are Being Diagnosed With ADHD The Wall Street Journal Thank the bots, your blue check is back on X The Register The Data Big Tech Companies Have On You Security.org Top tech trends in 2024 to watch The Washington Post Keeping Teens Safe Online Has to Go Beyond Parental Controls. Here's What to Do. The Wall Street Journal |
RELATED ARTICLES
Getting Started with HTML The basic language of the internet is html. If you can do crossword puzzles, if you can write a report for your teacher or boss, you can be creating web pages in a matter of minutes. Anti-Skip Protection on Mp3 Players There have been some questions on anti-skip protection on mp3 players due to the fact that some of them publish on the box in its feature list.You got to see what the storage of each player is to determine if it needs it or not:- Flash mp3 players have no moving parts at all, does not need nor have anti-skip protection. FTP - File Transfer Protocol Explained File Transfer Protocol (FTP) is a protocol that is part of the TCP/IP suite. It is the standard for transferring large amounts of data from server to server and from servers to clients. HTML Explained: Part 2 Get started creating web pages using text files and HTML code! This article is a continuation of HTML Explained: Part 1, which gives a general overview of HTML. Here, we're going to get into the nitty gritty of the code itself. Simple Overview Of Computer Computer is an electronic machine work on the instructions of human being. In other words you have to input data to get your required output. USB Drives - What to Look For in a USB Device Those small USB drives have so many names, pocket drives, thumb drives, USB Pen, Jump drives, and several other names, but when it comes down to it, we are all talking about a small portable, reusable storage media that fits in the palm of your hand!There are a couple major factors you should consider when you select a USB drive. The size of the storage media you require, and the size and shape of the device itself. Help, I Need a New HDTV! (Part 1 of 5) Feeling overwhelmed in selecting a new TV? With all the choices these days, you may feel like, "Where do I start?!"In part 1 of our 5 part article, we discuss the importance (and a quick rule of thumb!) of selecting a screen size appropriate for your space.---Selecting the correct size TV is an important part of your purchase decision. Mail-merging: The Principles About mail-mergingMail-merging is the process of merging variable data and fixedtext.Using mail-merging, you can create individualised letters,envelopes, labels and other documents without having tolaboriously create each individual one. Customize Your Portable Player with an MP3 Player Accessory Everywhere you look today people are listening to personal audio players. And many look for ways to personalize and/or enhance their experience. How Do MP3 Players Work? Digital Audio Technology Revolutionizes Music Enjoyment Millions have enjoyed recorded music since 1877 when Thomas Edison invented the phonograph. Then came radio, records, tapes and CD's. Tips for Buying a PC Buying Your PCBuying a PC that's right for you and your family is not all that simple task. More so if you're going to buy an unbranded or an assembled one. Compile .BAT Files into Native Windows Applications (.EXE) Since the DOS days, batch files have been one of the most convenient and immediate ways to accomplish certain tasks. Even today it's possible to find some remarkably sophisticated utilities written as command-line batch files. Microsoft Great Plains Dexterity Customizations Microsoft Business Solutions is on the way to popularize it's ERP systems implementation. Right now such products as Microsoft CRM and Small Business Manager (cheap version of Microsoft Great Plains, based on the same Great Plains Dexterity runtime and DYNAMICS. A Tale of Two Regeds Tech support tells me to type 'regedt32' as opposed to 'regedit' to access the registry from the command line (Start > Run). I question the use of 'regedt32,' but he says to do it anyway. How To Become A True CCNA I've worked my way from the CCNA to the CCIE, and along the way I've conducted job interviews and casual conversations with dozens of CCNAs and CCNA candidates. Believe me, people who "sneak by" the CCNA exam by braindumps, memorization, and never touching a router or switch are QUICKLY found out in job interviews and on the job. Cisco Certification: A Survival Guide To The Cisco Cable Jungle One of the most confusing parts of beginning your Cisco studies is keeping all the cable types separate in your mind, and then remembering what they're used for. This often occurs when a CCNA or CCNP candidate starts putting together their own home practice lab, and they suddenly realize that they have the equipment to run labs, but not the cables. Buying a Personal Computer (PC) For many people the computer industry is a seeming unsolvable jungle filled with mysterious words. Here is a guide to help you understand the personal computer and to give you the information needed to make a shopping decision you can live with so you can enjoy your PC for years to come. Selecting a Personal Digital Assistant A Computer in Your HandCarrying around an address book and planner is becoming a thing of the past. With new PDA developments, you can manage your contacts and schedule, use e-mail, and even listen to music. Can Movie Theatres Compete with Home HD TV in the Future? The battle is heating up for market share, home movie theatre, X-Box, Playstations and virtual reality take on the big screen and theme parks. You might be surprised to learn that the war is just beginning. Keeping Passwords Secure As the web has evolved, so have the methods of collecting personal information. A large number of websites require visitors to register to gain access or participate. |
home | site map |
© 2006 |