Today, people communicate from their computers shopping online to banking and investing. As we do these things more regularly, we open ourselves to potential hackers, attackers and crackers. Some may be looking to fish your personal information or identity for resale, but others simply recommend the workshop efficiently to the other, just the bottom We have secured a computer until the end.
1. Always back up important information and keep it in a safe place away from your computer.
2. Update and Patchational Database web browser software. If you have a Windows operating system, run the www.windowsupdate.microsoft.com Update Wizard, which will perform the following steps: This program is an office program for Windows Computer www.officeupdate.microsoft.com searchable patches.
3. No firewalls, viruses, worms, Trojans, malware and even easy access to your computer on the Internet. The difference is that hardware and software based firewall programs should be considered.
4. To ensure maximum security of your review browser and email settings. Why do you need to do this? Active-X is a computer that malicious programs that plant to JavaScript and hackers. While cookies are relatively harmless due to security concerns, there is still a movement in the profile of building the Internet. At a minimum, set the "Internet Zone" security settings to "High" and "Trusted Sites Zone" to "Medium".
5. Install anti-virus software
6. It can be reproduced as an unknown email that does not open. This is a familiar address because it can penetrate and propagate many viruses that occur when there is no address.
7. Do not run the program from an unknown source. Also, please don't send me these kinds of programs to make funny stories or jokes with your friends. The ones that may contain things are for computers to infect Trojans waiting for horses.
8. Disable hidden file name extension. By default, the Windows operating system disables the display of file extensions. Some file extensions will keep hidden by default, but you should see any unusual file extensions that you do not belong to
9. Disconnect the computer from the computer if you are not using the network. In the case of an attack that can not be upgraded, your computer is disconnected from the network or the computer is turned off.
10. Think of startup disks, in the case of floppy disks as malicious programs due to computer damage or loss. Obviously, you need to do this before you experience hostile violations of your system. .
0 comments:
Post a Comment