ArtsAutosBooksBusinessEducationEntertainmentFamilyFashionFoodGamesGenderHealthHolidaysHomeHubPagesPersonal FinancePetsPoliticsReligionSportsTechnologyTravel

Simple Tips to protect computer against Hackers

Updated on July 13, 2012

What is Computer Hacking?

Computer hacking is a malicious act, so it is important for your computer and data to protect from Hacking. Computer Hacking refers to the process of making malicious modifications to a software or hardware to accomplish an aim outside the original creator's objective. Hackers are usually expert programmers who usually see hacking as a real life application of their skills.

Hacking has become a nuisance in recent times and the protection from hacking has become more complex. In fact, the hackers have become so good that even the software giants are feeling a headache. Nintendo recently reported a loss of $975 million due to privacy and Microsoft has lost an estimated $900 million in five years.

Well, the Giants are not the only targets of these hackers, even common individuals are not safe. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities. They can get to your secrets and destroy your credit. The dangers are possibly endless.

Save computer from hacking
Save computer from hacking

How to protect from Hacking

Prevention is Better Than Cure. The problem of computer hacking has become really serious. But there are some basic methods which are usually the best to guarantee a Hacker-free system. Here, I am going to introduce some basic tips to save your computer and data from hackers.

Using Antivirus Software

Antivirus software are one of the basic tools for your data and computer to protect from hacking. Antivirus software act as a protecting net that catches any potential threat before it reaches your system. They can prevent unauthorized access to your computer, protects your system from viruses and cloaks your data ports from intruders searching for any opening.

Nowadays anti virus software are completely automated. Go for the best when choosing anti virus software and make sure that you scan your system for viruses at least once a week. Norton antivirus from Symantec is one of the leading products in the industry. Avast is another great antivirus tool to protect from hacking.

Using Firewall

What is a Firewall?

A firewall is a set of programs located at the network gateway server which protects a private network from unauthorized access from other networks. The term firewall is originally referred to a wall intended to confine a fire.

A firewall protects your computer from offensive websites and potential hackers. It keeps your data and information safe from unwanted intruders. Firewalls are designed to prevent unauthorized access to your network, much like a locked door.Thus firewall is a vital tool for your strategy against hackers so don't forget to set up one for your system. Microsoft has a built-in firewall software but you can also try the Symantec firewall.

Using Anti Spyware Software

What is a Spyware?

A spyware is a self installing software which secretly gathers information about a person's computing activities such as surfing habits and viewed sites. Spywares are truly a hacker's tool, not only collecting personal information but also interfering with user control by installing additional software and redirecting web browsers.

Anti spyware software are designed to save your computer from hackers. They not only protect your computer by detection and removal of spywares but also preventing automatic installation of these malicious programs. Spysweeper is a great anti spyware software to guarantee a spyware free computer.

Email Security

Email is one of the leading hacker's tools. Hackers use emails to transmit malicious software to your computer. Emails are usually very cheap which gives the hackers loads of opportunities. One of the basic tips to prevent hacking is to be extra careful with emails. The most important tip is that you should never hand out your real email address to a stranger. Never open an email arriving from an unknown source and never try to open an attachment with an email if you don't know the sender. Avira antivirus is a useful tool to filter your emails for potential threats as well as provide premium protection for your computer.

Software updates

Hackers are always searching for security gaps in your system. Anti virus and anti spyware software usually lose their effectiveness with time as new and more advanced malicious programs are created by hackers.

Its important to go for the latest security software in the market to guarantee maximum security from threats. Make sure you frequently check out for software updates or set your software to update automatically.

Internet Security

Being extra careful while surfing is the best way to protect your computer from hackers. Simple precautions can mean the difference between a secure and vulnerable system. A great way to save yourself from hackers is to avoid visiting hacker controlled sites usually committed to porn, free downloads and online gaming. Also be extra careful while downloading something from an unknown source. Never ignore a security warning about a site. Its better to be safe than sorry.

Educate Yourself

When working for an offensive against hackers, the most important step is to educate yourself. Hacking is a dynamic topic with developments arising every moment. Hackers are intelligent and innovative and you should be prepared for it.

Computers are vulnerable. No matter what you do, its impossible to be 100% save. Important data like personal detail and credit card information should never be saved directly on a computer. A password protector is a great way to protect this data.

Another great way to secure your computer is to use a password on your computer. Well, it can't really save you if your computer gets stolen (in case of a laptop) but can save you from unauthorized people who can reach to your computer.

Windows update

Microsoft Windows is the best OS which comes with almost all the tools to protect you and your computer from hacking. To make the most of this, it is important to keep your windows updated. An easy way to do this is by checking for updates at Microsoft Windows Update. You can also set your windows security software to check for updates automatically so you don't miss anything. ...


What's the thing that frightens you the most about hacking?

See results


Hacking is a developing topic but basics are always the most effective to protect you and your precious resources from hacking. But what should you do if you're hacked. This hub explains in detail the steps to take if you're victimized by hackers. Computer Hacked: What to do

Anas Shad


    0 of 8192 characters used
    Post Comment
    • profile image


      5 years ago

      This article is fundamental for basic security. It never hurts. Props for that.

      What it might "hurt" is the overuse of synonymy between "hacking" and "malicious". Somebody might want to read this really interesting article published at Motherboard about the history and "whereabouts" of the word hacker:

      "Hacking" for a computer aficionado, an engineer or security specialist, etc, it is the word that stands for playing, imagining and reinventing. A challenge to their skills. Think of it as the skill of a superb car mechanic that could dismantle a car into its tiniest pieces, then put it back together and, sometimes, even with better performance. That's the "hack" and, in principle, there's nothing "malicious" about it.

      That's why in the "hackers" jargon they classify themselves among others as black-hat hackers (malicious ones) and white-hat hackers (benevolent ones). Check out «The Jargon File» a cult reference to anyone curious about hacking and computer security.

      Again, this article is great for its own merits, basic security is a must in today's world.

      Stay wise, have a nice life.

    • profile image


      6 years ago from pakistan

      good work......

    • profile image


      7 years ago

      nice explain.....

    • davidwhoward profile image


      8 years ago from Indiana

      Good article, thanks for posting!

    • iguidenetwork profile image


      8 years ago from Austin, TX

      Thanks for explaining this very clearly, including on some technical jargon in layman terms. Voted up and useful. :)

    • profile image


      8 years ago

      could you tell me about ubuntu as i dont know much about it also if i download this application will it prevent hackers as im 100 percent sure that they are looking at my online activvity thers some people that have a bad habit call interfering in things that have nothing to do with them its called asaha malware

    • profile image


      8 years ago

      Hey thank you so much

    • profile image


      9 years ago

      window firewall or antivirus firewall,which is better one?what is the difference between them?

    • profile image


      9 years ago

      window firewall and antivirus firewall both are turn on my computer,window noticed that this may lead to slow down your system,so which firewall will be i turn off?

    • anasshad profile imageAUTHOR

      Anas Shad 

      9 years ago from Pakistan

      Thanks for your acknowledgement pinappu.

    • anasshad profile imageAUTHOR

      Anas Shad 

      9 years ago from Pakistan

      Thanks Bizwin

    • profile image


      9 years ago

      nice but i was looking for some tyep Dose Commands which help to secure and check if there something like open extra port or extra sharing i dnt now a days so many anti-virus have their own spyware and malicious file attached i mean virus in a anti-virus so i want to knw something like mirror or transparent security tools or bunch of command and really help full things u mention :)

    • pinappu profile image


      9 years ago from India

      Agree with cesarmartins .....All the systems can be secured with proper knowledge and attention.

      Very well written hub @anasshad.

    • bizwin profile image

      Christabel Evans 

      9 years ago from England, UK

      Great info.

    • anasshad profile imageAUTHOR

      Anas Shad 

      9 years ago from Pakistan

      Thanks for stopping by Fitness Zone.

    • fitnesszone profile image


      9 years ago from New York

      Beautifully presented. Useful for both newbies and experienced.

    • anasshad profile imageAUTHOR

      Anas Shad 

      9 years ago from Pakistan

      Thanks SM for stopping by. Hope to see more of your visits.

    • smcopywrite profile image


      9 years ago from all over the web

      this is wonderful information. even if some of these we are familiar with we need reminders. i recently got a new computer and needed to go through your checklist for my new one. thanks anasshad

    • anasshad profile imageAUTHOR

      Anas Shad 

      9 years ago from Pakistan

      Thanks for liking Red Elf.

    • RedElf profile image


      9 years ago from Canada

      Some great tips - easy to understand for beginners, too.

    • anasshad profile imageAUTHOR

      Anas Shad 

      9 years ago from Pakistan

      No its not about insult Caesar. Hubpages is all about expressing your views. Yes everything has its strengths and weaknesses and you raised a good point that it is mostly because of human carelessness.

      Thanks for liking my hubs.

      Anas Shad.

    • anasshad profile imageAUTHOR

      Anas Shad 

      9 years ago from Pakistan

      Thanks K9 for liking the info. Yes prevention is always better than cure. Hope to see more of your visits.

      Anas Shad

    • cesarmartins profile image

      C├ęsar Martins 

      9 years ago

      Sorry mate, but Windows is not the best operating system, mainly in security. It's actually the most vulnerable and unstable one, and its built-in tools are also useless.

      The most reliable servers and network devices run OpenBSD, and other Unix-like operating systems, like Linux, since Unix is the safest platform ever.

      I also disagree that computers are always vulnerable no matter what we do. Systems are vulnerable, since there's a mistake committed previously, most of vulnerabilities are due to human stupidity, I could list ten big websites with high-risk vulnerabilities that are not fixed for laziness, and absence of knowledge. The security holes are over there, waiting for someone bold and hopeless enough to abuse them. Evil-minded hackers can do nothing if there's no vulnerabilities. No vulnerabilities, no attacks. Systems are not always vulnerable, but people are most likely to be.

      Apart from these details, I liked your article, and voted it up.

      Please, don't take my comment as an insult, or a personal attack, I just disagree with the mentioned details above. You are an excellent writer, and your hubs are very informative.

      Best wishes.


    • K9keystrokes profile image

      India Arnold 

      9 years ago from Northern, California

      Nicely put together information. This hub has a ton of great tips for protecting your computer from hackers. I really like your moto:

      "Prevention is better than cure!"



    • anasshad profile imageAUTHOR

      Anas Shad 

      9 years ago from Pakistan

      Thanks Simone. Glad you liked my effort. Hoping to see more of your visits.

    • Simone Smith profile image

      Simone Haruko Smith 

      9 years ago from San Francisco

      What a lovely, organized overview! I'm glad you put this together.


    This website uses cookies

    As a user in the EEA, your approval is needed on a few things. To provide a better website experience, uses cookies (and other similar technologies) and may collect, process, and share personal data. Please choose which areas of our service you consent to our doing so.

    For more information on managing or withdrawing consents and how we handle data, visit our Privacy Policy at:

    Show Details
    HubPages Device IDThis is used to identify particular browsers or devices when the access the service, and is used for security reasons.
    LoginThis is necessary to sign in to the HubPages Service.
    Google RecaptchaThis is used to prevent bots and spam. (Privacy Policy)
    AkismetThis is used to detect comment spam. (Privacy Policy)
    HubPages Google AnalyticsThis is used to provide data on traffic to our website, all personally identifyable data is anonymized. (Privacy Policy)
    HubPages Traffic PixelThis is used to collect data on traffic to articles and other pages on our site. Unless you are signed in to a HubPages account, all personally identifiable information is anonymized.
    Amazon Web ServicesThis is a cloud services platform that we used to host our service. (Privacy Policy)
    CloudflareThis is a cloud CDN service that we use to efficiently deliver files required for our service to operate such as javascript, cascading style sheets, images, and videos. (Privacy Policy)
    Google Hosted LibrariesJavascript software libraries such as jQuery are loaded at endpoints on the or domains, for performance and efficiency reasons. (Privacy Policy)
    Google Custom SearchThis is feature allows you to search the site. (Privacy Policy)
    Google MapsSome articles have Google Maps embedded in them. (Privacy Policy)
    Google ChartsThis is used to display charts and graphs on articles and the author center. (Privacy Policy)
    Google AdSense Host APIThis service allows you to sign up for or associate a Google AdSense account with HubPages, so that you can earn money from ads on your articles. No data is shared unless you engage with this feature. (Privacy Policy)
    Google YouTubeSome articles have YouTube videos embedded in them. (Privacy Policy)
    VimeoSome articles have Vimeo videos embedded in them. (Privacy Policy)
    PaypalThis is used for a registered author who enrolls in the HubPages Earnings program and requests to be paid via PayPal. No data is shared with Paypal unless you engage with this feature. (Privacy Policy)
    Facebook LoginYou can use this to streamline signing up for, or signing in to your Hubpages account. No data is shared with Facebook unless you engage with this feature. (Privacy Policy)
    MavenThis supports the Maven widget and search functionality. (Privacy Policy)
    Google AdSenseThis is an ad network. (Privacy Policy)
    Google DoubleClickGoogle provides ad serving technology and runs an ad network. (Privacy Policy)
    Index ExchangeThis is an ad network. (Privacy Policy)
    SovrnThis is an ad network. (Privacy Policy)
    Facebook AdsThis is an ad network. (Privacy Policy)
    Amazon Unified Ad MarketplaceThis is an ad network. (Privacy Policy)
    AppNexusThis is an ad network. (Privacy Policy)
    OpenxThis is an ad network. (Privacy Policy)
    Rubicon ProjectThis is an ad network. (Privacy Policy)
    TripleLiftThis is an ad network. (Privacy Policy)
    Say MediaWe partner with Say Media to deliver ad campaigns on our sites. (Privacy Policy)
    Remarketing PixelsWe may use remarketing pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to advertise the HubPages Service to people that have visited our sites.
    Conversion Tracking PixelsWe may use conversion tracking pixels from advertising networks such as Google AdWords, Bing Ads, and Facebook in order to identify when an advertisement has successfully resulted in the desired action, such as signing up for the HubPages Service or publishing an article on the HubPages Service.
    Author Google AnalyticsThis is used to provide traffic data and reports to the authors of articles on the HubPages Service. (Privacy Policy)
    ComscoreComScore is a media measurement and analytics company providing marketing data and analytics to enterprises, media and advertising agencies, and publishers. Non-consent will result in ComScore only processing obfuscated personal data. (Privacy Policy)
    Amazon Tracking PixelSome articles display amazon products as part of the Amazon Affiliate program, this pixel provides traffic statistics for those products (Privacy Policy)
    ClickscoThis is a data management platform studying reader behavior (Privacy Policy)