The 5 Critical Steps to Protecting Your Computer on the Internet
Spyware, viruses and worms... oh my!
If you are connected to the internet, you need to make sure you get your computer set up properly if you want to avoid problems down the road.
With all the viruses, spyware and other threats on the internet today, no computer should be set up without the proper protection.
And that protection needs to be in place as soon after you hook up your new machine as possible.
The following five steps will make your computer a much harder target for threats. You still won't be completely immune to problems, but 99% of the time the threat will pass you by, looking for the easy mark.
1. Running a Personal Firewall
A personal firewall is software that basically makes your computer invisible to hackers, worms and other threats that can infect your computer over the internet.
Setting up a firewall is the absolute first thing you should do if you're going to connect to the internet. Without a firewall, your computer could get infected in as little as one minute after connecting.
If you have a brand new computer running Windows XP Service Pack 2, there is a firewall built into Windows. It will already have been turned on when you first set up your computer.
If you're running an older version of Windows, even an earlier version of Windows XP, there is no firewall automatically set up for you. In this case there are two possibilities:
If you don't have any personal firewall software installed, you should do so right away. Zone Alarm is a very good firewall program that has a version that you can download and install for free.
You can download the free version of Zone Alarm from http://www.computer-help-squad.com/zonealarm.
2. Turn on Windows Updates
Again, if you're running Windows XP Service Pack 2 this is already set up, but otherwise you should turn on Windows Updates. Microsoft releases updates for security problems and other bugs in Windows on a regular basis.
These updates will keep your computer running better, and they often fix security issues that could compromise your information or privacy.
If you are running Windows XP Service Pack 2, you can double-check that automatic updates are turned on by clicking Start, then click Control Panel, then double-click Security Center. The window that opens will tell you if automatic updates are turned on, and lets you turn them on if they're not.
To turn on automatic updates in earlier versions of Windows XP, click on the Start menu, click Control Panel and then double-click on System. On the "Automatic Updates" tab, click the option to "Automatically download the updates and install them on the schedule I specify."
To turn them on in Windows 2000, click on Start, click Control Panel and then double-click on Automatic Updates. Again, click the option to "automatically download the updates and install them on the schedule I specify."
Now when Microsoft releases updates, they will be downloaded for you automatically and Windows will tell you when they are ready to be installed.
3. Install & Update Antivirus Software
Most new computers come with antivirus software these days. You might have Norton, McAfee, PC-Cillin or another brand. No matter what program you have, you will need to update it when you get connected to the internet.
It doesn't matter how new your computer is - there will be new viruses, and new updates for the antivirus software, since it was loaded.
The exact process is different for each brand of antivirus program, but most of them will have an icon in the bottom right corner of your desktop, beside the time. The icon might be a picture of a shield (McAfee), a stethoscope (Norton) or something else.
In most cases, if you point to the icon for your antivirus and click the right mouse button, a menu will pop up with an update option. It could be simply called update or could be something like Live Update or Download Latest Updates. If you click on the update option (with the left button this time) it will install the newest updates for you.
If you're not sure which icon is for your antivirus software, just point to each one for a few seconds and a little title should pop up telling you what it is.
4. Install Anti-Spyware Software
Spyware - and other things known as adware and malware - is becoming as big a problem as viruses. Spyware programs can cause a lot of problems with your computer, not to mention they can track your personal information and you never know where it's being sent.
Some new computers might includes antispyware software, but most of them don't yet. There are quite a few anti-spyware programs available, some free and some not. The one I recommend is from Microsoft and is one of the free ones.
One of the reasons I like it is because it always runs in the background and will automatically catch a lot of spyware before it gets on your computer.
Many of the other programs don't catch it until you run a scan. Not only does this allow things to get on your computer, it also means you have to actually remember to run a scan.
You can download the free Microsoft Antispyware from http://www.computer-help-squad.com/antispyware.
5. Set up a Free Email Account
This last item is not as critical as the first four, but I would highly recommend you set up an email account with one of the free services like Hotmail or Gmail.
Once you're on the internet, you'll find a lot of useful information that you want that requires you to provide an email address. In some cases, these people will end up sending you a bunch of spam.
If you use a free email account to sign up for anything that you don't know for sure you can trust, it's not going to fill your main email with a bunch of junk.
This goes for anything really, not just online information. If you're entering a contest or signing up for anything offline and you don't know where your information could end up being used, I would suggest using your free email address.
If worse comes to worse, and your free email address gets inundated with spam, you can always just set up a new one and let the old one expire.
Some of the better free email services are www.hotmail.com, www.gmail.com and www.yahoomail.com.
If you've had your computer for a while and never done any of these things, you should still take these steps to get it set up properly. It will definitely save you a lot of time - and possibly money - as you use your system.
John Lenaghan offers easy-to-understand computer help at the Computer Help Squad website. Find out more about these 5 steps - sign up for the Computer Help Squad newsletter and receive your free 5-part guide.
Private Security Guards Have Become a Last Resort for Public Safety The New York Times
Ben Gvir again excluded from top-level security meeting The Times of Israel
US National Security Agency unveils artificial intelligence security centre Al Jazeera English
Exclusive: DHS investigating whether floor plans and other security information were exposed in ransomware attack on contractor - CNN
Exclusive: DHS investigating whether floor plans and other security information were exposed in ransomware attack on contractor CNN
House Speaker Kevin McCarthy says his "priority" is border security as clock ticks toward longer-term government funding bill - CBS News
House Speaker Kevin McCarthy says his "priority" is border security as clock ticks toward longer-term government funding bill CBS News
Hagerstown Regional Airport Addresses Security Situation with Law ... - Washington County Government
Hagerstown Regional Airport Addresses Security Situation with Law ... Washington County Government
AI Security Center to Open at National Security Agency Department of Defense
FACT SHEET: Impact of a Government Shutdown on the DHS ... Homeland Security
House Approves H.R. 4367, The Department of Homeland Security ... House Appropriations
Suspicious item shuts down checked baggage screening system at ... - Transportation Security Administration
Suspicious item shuts down checked baggage screening system at ... Transportation Security Administration
The Cártel de Jalisco Nueva Generación: The most significant ... smallwarsjournal
UN Security Council to vote on resolution to authorize one-year deployment of armed force to help Haiti fight gangs - ABC News
UN Security Council to vote on resolution to authorize one-year deployment of armed force to help Haiti fight gangs ABC News
Elevate Security named to top 40 intelligent application list | Security SECURITY SYSTEMS NEWS
Get Up to Date on CISSP Security and Risk Management Entrepreneur
Sartell to get security cameras for roadways Waite Park Newsleader
Designating Actors Undermining the Peace, Security, and Stability of ... Department of State
FBI Academy gives Tuskegee CIO foundation for increased campus ... Tuskegee University
Secretary tours Foreign Affairs Security Training Center State Magazine
Protesters confront security forces as Iran marks anniversary of crackdown Al Jazeera English
Kennedy, Wicker demand Defense Department suspend security ... Kennedy.Senate.gov
EU's Borrell, in Kyiv, Says Bloc Is Preparing Long-Term Security ... U.S. News & World Report
Security guard decks sorority girl as part of hilarious sequence after ... Saturday Down South
Fact Sheet: DHS Western Hemisphere Cyber Conference Homeland Security
Message from Secretary Mayorkas Regarding a Potential Federal ... Homeland Security
Security Council Press Statement on Yemen | UN Press United Nations
Biden-Harris Administration Announces Final National Security ... US Department of Commerce
Wagner Group Is a Serious Menace to Global Security Morocco World News
SEC Power Rankings: Ole Miss moves up two spots, but security ... Tuscaloosa Magazine
Ministerial Conference's Contribution to Nuclear Security; ICONS ... - International Atomic Energy Agency
Ministerial Conference's Contribution to Nuclear Security; ICONS ... International Atomic Energy Agency
Private security company quits DTSM contract Santa Monica Daily Press
TSA tips on traveling with pets through a security checkpoint at ... - Transportation Security Administration
TSA tips on traveling with pets through a security checkpoint at ... Transportation Security Administration
Data-driven cyber: empowering government security with... - NCSC ... - National Cyber Security Centre
Data-driven cyber: empowering government security with... - NCSC ... National Cyber Security Centre
Comprehensive Security Integration and Prosperity Agreement ... Department of State
Remarks at a UN Security Council Meeting on Maintenance of ... - United States Mission to the United Nations
Remarks at a UN Security Council Meeting on Maintenance of ... United States Mission to the United Nations
Department of Homeland Security Announces Distribution of More ... Homeland Security
Safety & Security Newsletters Adams 12 Five Star Schools
Biden Administration Announces Additional Security Assistance for ... Department of Defense
Readout: U.S. - Mexico Meeting on Joint Actions to Further Enhance ... - Customs and Border Protection
Readout: U.S. - Mexico Meeting on Joint Actions to Further Enhance ... Customs and Border Protection
New U.S.-Poland Foreign Military Financing Direct Loan Agreement ... Department of State
Innovative Solutions Discussed at Global Nuclear Safety and ... - International Atomic Energy Agency
Innovative Solutions Discussed at Global Nuclear Safety and ... International Atomic Energy Agency
Palmdale jewelry store thieves pepper spray security guard during smash-and-grab - FOX 11 Los Angeles
BHS Principal, School Board Applaud Security Camera Policy Draft The Bedford Citizen
Female soldiers no longer to guard security prisons amid suspected sex scandal - The Times of Israel
Female soldiers no longer to guard security prisons amid suspected sex scandal The Times of Israel
The US PGA request extra security for Patrick Cantlay on the final day of the Ryder Cup after his caddie Joe L - Daily Mail
The US PGA request extra security for Patrick Cantlay on the final day of the Ryder Cup after his caddie Joe L Daily Mail
Utica security officers recognized for role in stopping fight Utica Observer Dispatch
Opinion: Romney is spending $5,000 daily for security. Why can’t we follow the golden rule? - Yahoo News
Opinion: Romney is spending $5,000 daily for security. Why can’t we follow the golden rule? Yahoo News
AI will become smarter than humans posing ‘major national security threat’ and ‘override human intuition,’... - The US Sun
AI will become smarter than humans posing ‘major national security threat’ and ‘override human intuition,’... The US Sun
Ex-WWE star Matt Riddle made loud scene before airport security incident: 'F--king fly!' - New York Post
Ex-WWE star Matt Riddle made loud scene before airport security incident: 'F--king fly!' New York Post
A Closer Look at the Snatch Data Ransom Group – Krebs on Security Krebs on Security
Secretary Mayorkas Announces Establishment of Homeland ... Homeland Security
The One Critical Piece Of Free Software Thats Been Overlooked
Can You Prevent Spyware, Worms, Trojans, Viruses,..
Spy Scanners - Don't Compromise your Privacy
Spies, spyware, internet parasites are among what they are usually called. These are scouts that monitor your web activities.
Adware and Spyware: The Problems and Their Solutions
The Threat10 years ago you could probably have run no Internet security applications and still have come out after a browse of the Internet with a virus and malware free computer, but this situation is no longer apparent. Several years ago, before I knew of the dangers of the Internet, I had absolutely no spyware or adware protection.
Just Whos Computer is this Anyway?
Well, this is an article I never thought I would have to write. Computer ownership was just not something I thought people would get confused over but, after overhearing a number of conversations last week from my co-workers, I realized that quite a few people just don't know how cut and dry this topic is.
Internet Small Business and Fraud
Be careful of sites that promise to send you "instant pins". These companies usually have lax credit card security and can afford customer charge backs from fraudulent transactions.
New Mass Mailing Spamming Internet Trojan for the Windows Platform
May. 16th 2005 - MicroWorld has reported the discovery of Troj/Sober-Q, which is a mass mailing spamming internet Trojan for the Windows platform.
Identity Theft Article - A Phisher Is Trying To Steal Your Identity!
Sooner or later everyone with an email account will receive a phishing attempt from some internet scammer. What is phishing? How can you protect yourself? These are some of the questions this identity theft article will provide, along with some free resources and practical advice on how to protect your online identity.
3 Simple Steps to Stay Safe from Spyware
There are several basic concepts to keep in mind when deciding to stay spyware free for good. This article will outline a spyware checklist for you to keep in mind when getting tough on spyware and taking back control of your computer using two popular free applications, Ad-Aware,and Spybot - S&D.
5 Tips For An Unbreakable Password
Despite the current wave of identity theft and corporate security breaches it's amazing how very few people treat their passwords with any level of seriousness. Most computers users, both at home and in the office, see passwords as a nuisance and therefore make them as easy to remember as possible.
Its Time to Sing the Encryption Song - Again!
Yes, I'm wearing my encryption hat again. Why you may ask? Well I just finished reading about the newest security hole in Microsoft's latest server product.
What is Hacking? Are You a Hacker?
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only recently been taken very seriously. The activities undertaken by the real hackers have been criminalized and they are now being legally persecuted on a scale disproportional to the actual threat they pose.
Identity Theft - Dont Blame The Internet
Identity theft - also known as ID theft, identity fraud and ID fraud - describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries.
Spyware, This Time Its Personal!
First the basic definition of Spyware: It is a type of software which is installed onto your computer without your permission..
IPv6 - Next Step In IP Security
IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete.
Delete Cookies: New-Age Diet or Common Sense Internet Security?
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It's about cookies on your computer - what they are, why they are there, and what to do about them.
Viruses and Worms, Protection from Disaster
Virus damage estimated at $55 billion in 2003. "SINGAPORE - Trend Micro Inc, the world's third-largest anti-virus software maker, said Friday that computer virus attacks cost global businesses an estimated $55 billion in damages in 2003, a sum that would rise this year.
Pharming - Another New Scam
Pharming is one of the latest online scams and rapidly growing threat that has been showing up on the Internet. It's a new way for criminals to try to get into your computer so they can steal your personal data.
How Can Someone Get Private Information From My Computer?
From the "Ask Booster" column in the June 17, 2005 issue of Booster's Auction News, a free ezine for online auction sellers and enthusiasts.Dear Booster,How can someone get private information from my computer?Thank you,Evan S.
If You Sell Anything Online Your ePockets Are Being Picked
You and I are a lot alike. We are both software publishers and eBook authors getting hosed on a regular basis.
Behavior to Stay Safer Online
1. Importance of a Virus Scanner: A Antivirus program can help to prevent you from becoming infected with a Virus or Trojan.
|home | site map|