- Internet & the Web
"Steps to Securing Your Computer System"
Securing Your Computer System
In our world today, the use of the computer system can come in various forms, ranging from shopping to investing and online banking to communication. Due to these use of the computer system on a daily basis, we are prone to virus, crackers, hackers and attackers. Because some persons will be looking towards phishing your content from your system for use or sale depending on their wish. There are several ways to protect your system from all this and still go on with whatever and whichever way you choose to use your system and they are:
1). Backups: please never fail to do these on regular bases if you don’t want to be in the category of “if I had known”. This is important so as to store all your data and information on a safer place aside from your system just in case a virus come calling or there is a hard disk crashing.
2). Updating your operating systems: this is necessary so as to install into your system the recent system file needed for the better performance and protection of your systems, and it process of updating differs according to your operating system provider. Most are done automatically and some people are fond of disabling that, it’s not a healthy approach to the health of your system.
3). Fire wall install: as the name entails blockage of something harmful, it’s a form of policing your systems against Trojan , worms, viruses, malware and adware, which accesses your system easily from the internet.
4). for optimum security, review your browser and email settings:
Hackers are going to catch up with you if you don’t do this, because they make use of Active-x and Java Scripts to plant their malicious tools or software so as to hit their jackpot which turns out to be your system. Cookie are harmless in terms of security threats to your system just that they build up data’s about your activities on the internet ,it’s just like telling the world here is my profile including my password. So it is advisable from time to time clear your cookie. At most set your security setting for the “internet zone” to High, and your “trusted sites zone” to Medium Low.
5). Antivirus: install an antivirus to safe guard your systems, also make sure you update them so as to update to the current version. There are several anti-viruses you could choose from depending on which one works better for you.
6). Avoid opening of an unknown email attachments:
Because knowing the address it is coming from is simply not an enough reason to open an unknown email because a familiar address could spread many viruses.
7). any program from an unknown origin do not lunch or run:
Also do not send to friends so as not to be a Co-distributor of viruses like Trojan horse, waiting to cause its damage when executed.
8). Turning off your systems or disconnecting from a network when not in use.:
This is useful because if this is done the hackers cannot access the system.
9). Run system backups: this is good so that if eventually your system get attacked by any of this intruders, and begins to misbehaves, then you have an option of running a system restore, which will in turn return the state of the system to the previous backed up state before that incident. The only disadvantage is that every program installed after the last backups will the uninstalled. But I believe it’s worth it. Well it’s a choice, its left for you to choose between losing some information and losing all information.