Protect Computers From Hackers
A firewall is designed to block unauthorized and unwanted traffic from getting into a computer system, and it is first line of defense against unauthorized intrusions. Almost all computer operating systems include a firewall, but at times the firewall may be turned off. Leaving the firewall off is like leaving the front door of home open at night.
Malicious software, including viruses, are being developed nonstop by people with all sorts of reasons. Malware is designed to do all sorts of damage to a computer, including disabling firewall. They can be a first wave of attack before a hacker actually steps in to ransack computer of vital information. Keep the anti-virus updated to allow it to recognize the latest versions of viruses.
Find a reliable anti-spyware program and install it on computer. Spyware are programs placed in computer system to collect small pieces of information without knowledge. Spyware are typically used by marketing firms to monitor buying habits of consumers to strategically direct their ads. Information collected by spyware, even if done for marketing purposes, is still done without knowledge and consent. Installing a reliable anti-spyware program can keep snooping sellers off computer.
A password policy is a set of rules that user can establish to promote computer security. Create strong passwords by using a combination of upper- and lowercase letters, numerical digits and special characters. Avoid using words found in a dictionary and personal information numbers. Never use the same password for different accounts, and change password every 90 days. Maintaining a good password policy may not be easy, but is something that user need to do to keep computer secure.
Use the automatic update feature of computer operating system. Computer operating systems are designed with utmost efficiency, but as the operating systems are being used, security loopholes and issues can come up. Developers of operating systems regularly issue updates to all registered users to patch security loopholes and to correct security issues. Hackers are adept at recognizing security loopholes of operating systems, and turning off the automatic updating feature of computer leaves the loopholes open.
Hackers are known to use emails as a form of transmitting malicious codes to an intended victim. Hackers can use carefully worded emails to entice user into opening a malicious email, and they are relying on curiosity to do the trick. Never open an email attachment from someone user don’t know, even if user are eagerly curious to do so.
Most people opt to leave their computer on because they find it convenient to log onto their account without having to wait for the computer to boot. It is convenient to do so, but leaving computer turned on, even while user are away, poses some security risks. A hacker, human or robot, can have more time to test and determine vulnerable spots in computer’s security. Turning off computer not only saves user energy, it decreases the wear and tear of computer parts and prevents hackers from transmitting signals to computer.
How to Protect Email from Computer Hackers/Terrorists
The moment user receive a confirmation letter from a website where user have signed up, print out the information or write it down on a notepad and delete the email immediately. This would ensure that no personal information would be derived directly from email whether by a hacker or a close friend.
Do not use actual information. Instead, provide information that user would be able to remember yet something that is unrelated to user since the first few tries of a hacker will be to use accurate and actual information regarding user to retrieve password.
ü Internet safety tips for parents :-
Ø Updated antivirus and security software is a necessity.