Security Information |
|
Free Ways to Tackle Threats to Your Computer
Protect Your PC Having problems with your pc?Do your kids, family or friends fill it with all the stuff they find on the internet? Your computer, just like your car, needs to be serviced regularly to keep it running efficiently. You wouldn't fill your car up with petrol from an old rusty can with a layer of dirty water on the bottom, so you shouldn't allow your pc to be treated that way either. Any pc connected to the internet is a target for viruses, spyware, adware and trojan horses. You need to protect and clean your pc of these nasties which slow down your costly computer.We will show you how to do at little or no cost in this free report. Before we start here is our disclaimer:- we take no responsibility for any harm YOU may do to your computer with this information. Use it at your own risk and be sure you are confident of what you are doing before you start. It's a good idea to make a restore point before installing/uninstalling or changing anything (see below for details) Firstly Viruses, these are the most newsworthy of the baddies, and because of this most people have heard of them. They are the pc version of the Flu, or in a worse case scenario, Sars, and can kill your computer. There are new viruses released almost daily, and you need to keep up to date with Antivirus software to stop them. Fortunately there is a free program which can help you protect your pc. This is called AVG and is available at http://www.grisoft.com just follow links through the site to AVG Free Edition. Register your email address, download and install it to your pc. The program is pretty straightforward to use but make sure you keep it updated at least weekly by double clicking the AVG icon (four coloured square) in the taskbar and then clicking on update in the window, tick internet as the source and you are good to go. It will automatically update and restart the main Antivirus program. Remember prevention is better than cure though and don't open attachments in emails or even sent to you over instant messengers unless you are sure of the person sending them, even then if you have AVG installed right click the file and use the "scan with AVG" menu item to double check. Trojan Horses come next on our hitlist, mostly these are small programs which record either keystrokes or other information and try to send it back to someone to steal your details. But they can be used to take over your pc completely or partially to use your resources to send spam emails, or launch attacks on other computers on the internet, often for denail of service (DOS) attacks. Most Trojan Horses are removed by the AVG antivirus software, or if not it will alert you to its presence, and you can google http://www.google.com to find how to remove it. A good prevention measure to stop Trojans accessing the net to send their payload is to use a software firewall, again there is at least one free program you can download, called zonealarm. It will ask you wether to allow programs to access the internet or not, meaning if you get something you know you didn't install accessing the net you can tell zonealarm not to allow it. To download zonealarm, go to http://www.zonelabs.com and follow links to the download section, and then to zonealarm (they are not so prominent as the ones for the Pro version which you pay for). It is a good idea to run a firewall to stop attacks coming in from outside as well your details going out. Windows XP with Service Pack 2 installed has a built in firewall, but zonealarm is much more configurable and does a better job overall. Spyware and Adware can also be responsible for a lot of pc problems. These are often programs piggybacked onto a free download offered to help you with some other task like form filling on websites (Gator is a well known example but they are open about it). Spyware is used by less scrupulous companies and individuals to report back your surfing habits so they can send ads you're more likely to respond to. These slow down your surfing and also run in the background using your pc's power to do their dirty work. Sometimes the information sent back is even more sinister than just your browsing habits, so beware of software you download and check first. Adware is very similar although is usually contained in tracking cookies (small text files downloaded by your browser containing information to track you through a website). Often these 2 terms are used interchangably. Another nasty which falls in with these is Scumware, which is a term used to describe software which hijacks another program (usually your browser or modem dialler) and displays only content which it's maker wants you to see and often prevents you seeing anything else. The diallers reset your modems settings to dial another (usually very expensive) number rather than your ISP's one. Thankfully some thoughtful individuals have kindly donated their time to give us free programs which will release you from the grip of these fiendish programmers. Download firstly Adaware from http://www.lavasoft.de and install and run that (if it finds nothing on your pc I would be extremely surprised) secondly download Spybot Search and Destroy from http://www.safer-networking.org/en/download/index.html and install and run that too, it will pop up a dialog to say it has found adaware also on your machine, but it doesn't really mind so close it and continue. As with virus software you should use these and update them both regularly, as you can be sure the people on the darkside of the internet are updating their stuff to keep you hooked into it. Both programs have a button for downloading and installing updates automatically so there is no excuse not to do it before every scan, which we would recommend doing at least monthly and more frequently if possible. So now you are protected from viruses, trojan horses, and other pc illnesses so that's it right? Not quite, I have to say one of the most important things on your pc is your personal data, you can re-install Windows, Office and all the other programs on your computer from the cd's, but your prized pictures, your kids half written essay for that all important exam or your wifes recipes handed down from generation to generation carefully typed out and saved can't be. Back it up. NOW. Onto cd's if you have a cd writer or if not get one installed or use floppy discs. But for the sake of your sanity BACK IT UP. And finally some tips to keep your pc running at its optimum. Before making any changes to your pc or programs, it's a good idea to make a restore point by going to Start, then accessories on the start menu, then clicking System tools and finally the system restore icon. Follow the prompts and create a restore point to return to if it all goes wrong. Sometimes a slow pc is just the result of too many programs running, close down those you're not using, obvious but often overlooked. If you're anything like most pc users you have a bundle of programs start when your computer does, and sitting in the task tray at the right of the start menu. You can close these down manually but if you don't use them at all then why not remove them? If you may want them but not everytime you start up you can go to start, then click RUN and in the text box type "msconfig" without the quotes. Don't worry now this looks daunting but all you need to do is click the tab at the right marked "Startup" and there is a list of all those programs which run as soon windows starts, now apply a little caution and lookup (http://www.google.com again comes to your aid) any you don't recognise. Now those you're sure you don't need running at startup untick the box. Next time you start windows will put up a box to tell you you've disabled some things, as long as your pc works ok now, tick the box to not show it again. If you took of something you need or want back run msconfig again, and retick the box in the startup tab again, next time you restart it will return. My last tip is to run defrag monthly, go to start, accessories, system tools and run defrag, this can often speed up a slowing pc as it makes all the files on your hard drive quicker to access. Douglas Titchmarsh runs several websites, and blogs including http://www.cashinonline.info
MORE RESOURCES:
'Blow the whistle': Indiana's top election official spends $35k on security guide mailings • Indiana Capital Chronicle Indiana Capital Chronicle Canada security intelligence chief warns China can use TikTok to spy on users, CBC reports Reuters Canada House Passes Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations Violence in New Caledonia subsides slightly as France sends reinforcements for security The Associated Press Israel Resists Grand Bargain as U.S. and Saudis Work on Security Pact The New York Times International Community Meets to Discuss the Future of Nuclear Security International Atomic Energy Agency U.S.-Ukraine Security Entanglement Risks Forever War The American Conservative Security Alert: Worldwide Caution - U.S. Embassy & Consulates in Indonesia US Embassy and Consulates in Indonesia Sean 'Diddy' Combs Allegedly Paid $50K to Obtain Hotel Security Footage of Cassie Assault: Lawsuit PEOPLE Palo Alto Networks and IBM to Jointly Provide AI-powered Security Offerings; IBM to Deliver Security Consulting ... IBM Newsroom Now armed with AI, America's adversaries will try to influence election, security officials warn The Associated Press Women are worried about their financial security. That may affect the 2024 presidential election CNBC Nuclear security through the eyes of the Co-Presidents of ICONS 2024 International Atomic Energy Agency Security video appears to show Sean 'Diddy' Combs beating singer Cassie in hotel hallway in 2016 Washington Times Appropriators Lead Israel Security Assistance Support Act | House Committee on Appropriations - Republicans House Appropriations IBM Selling Cloud Security Software to Palo Alto Networks in Broader Cyber Strategy Shift The Wall Street Journal Security Council Secretary: ‘Not an Inch of Armenian Land Ceded to Azerbaijan’ Armenian News by MassisPost Security footage calls into question Anchorage police account of fatal shooting Alaska Public Media News TikTok is a threat to Canadians' data security, CSIS chief warns Bennington Banner Canada Releases Defense Policy Update to Boost Security Department of Defense NATO and Economic Security: A Political Oxymoron or Inevitability? CSIS | Center for Strategic and International Studies Identity Management and Information Security News for the Week of May 17; Exabeam, Saviynt, VAST Data, and More Solutions Review Amazon security guard tries to kill unsuspecting boss before he's shot dead in gunfight with police: 'He almost executed me' New York Post EXCLUSIVE: Two students uncover security bug that could let millions do their laundry for free TechCrunch New Survey Finds a Paradox of Confidence in Software Supply Chain Security Security Boulevard Putin has ditched his paranoid security chief. Here are 5 of the wackiest things Nikolai Patrushev has said. POLITICO Europe Fox News Poll: Abortion, economy, and border security are top deal-breakers in 2024 elections Fox News Endpoint Security and Network Monitoring News for the Week of May 17; Alkira, Preamble, c/side, and More Solutions Review Diddy Seen Physically Assaulting Cassie in Never-Before-Seen 2016 Hotel Security Footage Entertainment Tonight See cops working security at Tacoma grocery stores? Here’s why and what policies allow Tacoma News Tribune OWASP dep-scan: Open-source security and risk audit tool Help Net Security Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. - The Washington Post Opinion | Is TikTok Chinese ownership a U.S. national security issue? Come on. The Washington Post RSA Conference 2024: AI and the Future Of Security Security Boulevard UN sexual violence envoy pulls out of Security Council briefing on Hamas hostages The Times of Israel FCC proposes BGP security measures Network World The New U.S. Strategy on Global Health Security Think Global Health 7 months since Oct 7, UN Security Council holds first meeting entirely dedicated to Israeli hostages in Gaza All Israel News Multnomah County Signs $40 Million Contract for Armed and Unarmed Security at County Facilities, Including Public ... Willamette Week An inspector general warned the Justice Department of gaps in its security clearance appeals process Government Executive PKI-Based Passkeys Lead The Way For A Passwordless Future Security Boulevard Fintech giant Flutterwave loses ₦11 billion to security breach Business Insider Africa May 17: IDF fighter jet carries out rare strike on target in West Bank city of Jenin The Times of Israel Enabling Continuous Zero Trust in Multi-Cloud Environments with Netography Fusion Security Boulevard A Free, Prosperous, and Secure Future for Ukraine - United States Department of State Department of State Votiro Keeps Up the Momentum in 2024 Security Boulevard The situation concerning Iraq - Security Council, 9628th meeting Welcome to the United Nations 'Abnormal' security video, Google Drive led to Stephan Sterns' arrest in Madeline Soto case, documents show WKMG News 6 & ClickOrlando Brothers Indicted for Stealing $25 Million of Ethereum in 12 Seconds Security Boulevard Cybersecurity Insights with Contrast CISO David Lindner | 5/17/24 Security Boulevard The Dell API Breach: It could have been prevented Security Boulevard JLOTS, an obscure Army-Navy capability, arrives in Gaza NavyTimes.com Making Safety and Security Intrinsic to School Design Campus Security Today Yemeni security forces deploy in Aden as anger simmers over lengthy power outages The Associated Press Response to CISA Advisory (AA24-131A): #StopRansomware: Black Basta Security Boulevard U.S. Security Cooperation with Ukraine - United States Department of State Department of State America's Envoy to the United Nations Gets 'Honest' With Security Council About the Fate of Hamas's Hostages The New York Sun USENIX Security ’23 – AEX-Notify: Thwarting Precise Single-Stepping Attacks Through Interrupt Aware... Security Boulevard |
RELATED ARTICLES
Free Spyware Removal - Its Not As Easy As It Sounds Nobody wants to pay to remove spyware. At the very least, I don't. How Can Someone Get Private Information From My Computer? From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S. Spyware is Not Like a Nosy Neighbor Remember the television show about the nosy neighbor Mrs. Kravitzalways peeking out her window or over the fence, sometimes evenknocking on the door just to find out what was going on in herneighborhood? If you don't wait a month or so and the DVD orthe movie will be out. Internet/Network Security AbstractHomogeneous symmetries and congestion control have garnered limited interest from both cryptographers and computational biologists in the last several years [1]. In fact, few steganographers would disagree with the investigation of spreadsheets. Are They Watching You Online? When surfing the Internet you probably take your anonymityfor granted, most of us do.Tapping phones, listening to confidential conversations,reading others' e-mail messages seems like something thatonly happens in spy movies to "other" people. Corporate Security for Your Home Business The words Corporate Security may conjure up images of a group of techies working in a wire-filled basement room of Microsoft or HP, combating hackers and terrorists online using words like algorithm and encryption. If you own your own business, do not allow yourself to think that security is only for big corporations. Phishing - Identity Theft & Credit Card Fraud What is Phishing?Phishing is a relatively newly coined term for a kind of method for harvesting information for identity theft. Phishing is quite simply providing a person with false information or credentials to trick them in to giving you their personal information. How To Cover Your Tracks On The Internet Every single time you access a website, you leave tracks. Tracks that others can access. How to Protect Yourself from Viruses, Spyware, Adware, and Other Nuisances Spyware/adware is a new major concern for PC users everywhere. Infecting your computer silently (usually installed with programs that seem harmless), spyware and adware can collect personal information about you, as well as cause pop up ads to come up all of the time, changing your browsers home page, sometimes even completely disabling your computer's usability. Spyware, This Time Its Personal! First the basic definition of Spyware: It is a type of software which is installed onto your computer without your permission.. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating. Personal Firewalls - Secure Your Computer There has not been a time in the history of the personal computer that firewalls and anti-virus programs have been more necessary and in-demand. Today, personal computer security is not only threatened by viruses and worms, but also by spyware - those severely annoying programs that are illegally loaded onto your computer from the internet. Securing Your Accounts With Well-Crafted Passwords In the past I've never really paid much attention to security issues when it comes to user names and passwords. Frankly I figured it was all a lot of overblown hype. A Personal Experience with Identity Theft Some months ago, before there was much publicity regarding phishing and identity theft, I became a victim.My first inkling that I'd been scammed came from a telephone call from my bank asking if I had been to Italy or Roumania. What is Spyware? The most frustrating part of having Spyware on your computer is the sheer feeling of helplessness that is invoked. Your computer slows down, it no longer does what you instructed it to, it seems to have a mind of its own. Phishing-Based Scams: A Couple of New Ones Phishing in its "classic" variant is relatively well-known. Actually, 43. Spy Scanners - Don't Compromise your Privacy Spies, spyware, internet parasites are among what they are usually called. These are scouts that monitor your web activities. The Truth About Hiding Your Tracks on the Internet Ok, ok, I know you've seen them. All those pop up windows claiming that "You're being watched!" or banner ads saying "Your computer is under surveillance!" And all you need to do is buy their product and your computer's visbility will disappear from the Internet. How to Manage Your Username and Password The Easy and Secure Way Have been an Internet user for more than 9 years, I have 100's of logins and passwords to keep. I'm paranoid. Dont Miss Information Because of Misinformation It has been said that with the wealth of information, freely available, the Internet has the ability to make you smarter, faster, than any other medium on the planet. Of course with an equal amount of mis-information, it also has the ability to make you dumber, faster, than any other medium on the planet. |
home | site map |
© 2006 |