Wisdom of Life

Protect Yourself

images2

  Protect Computers From Hackers

  • Ø Hackers are people who access computers or computer networks without authorization from the network administrator or computer owner. Most hackers are motivated by the :-
    • Challenge or false sense of power,
    • While others are motivated by money.

 

  • Ø Whatever the motive may be, hacking is an illegal activity, and hackers are real people who can break into   computer just like thieves can break into   home. Know how to stop hackers and protect   computer from burglars who can steal computer privacy, identity and money.

 

  • Ø Keep Firewall Turned On and Updated—

  A firewall is designed to block unauthorized and unwanted traffic from getting into a computer system, and it is   first line of defense against unauthorized intrusions. Almost all computer operating systems include a firewall, but at times the firewall may be turned off. Leaving the firewall off is like leaving the front door of   home open at night.

 

  • Ø Install an Anti-virus and Keep It Updated—

 Malicious software, including viruses, are being developed nonstop by people with all sorts of reasons. Malware is designed to do all sorts of damage to a computer, including disabling   firewall. They can be a first wave of attack before a hacker actually steps in to ransack   computer of vital information. Keep the anti-virus updated to allow it to recognize the latest versions of viruses.

 

  • Ø Install Anti-spyware Technology

Find a reliable anti-spyware program and install it on computer. Spyware are programs placed in   computer system to collect small pieces of information without   knowledge. Spyware are typically used by marketing firms to monitor buying habits of consumers to strategically direct their ads. Information collected by spyware, even if done for marketing purposes, is still done without   knowledge and consent. Installing a reliable anti-spyware program can keep snooping sellers off   computer.

 

  • Ø Keep a Good Password Policy

   A password policy is a set of rules that user can establish to promote computer security. Create strong passwords by using a combination of upper- and lowercase letters, numerical digits and special characters. Avoid using words found in a dictionary and personal information numbers. Never use the same password for different accounts, and change   password every 90 days. Maintaining a good password policy may not be easy, but is something that user need to do to keep   computer secure.

 

  • Ø Keep an Operating System Up to Date

Use the automatic update feature of   computer operating system. Computer operating systems are designed with utmost efficiency, but as the operating systems are being used, security loopholes and issues can come up. Developers of operating systems regularly issue updates to all registered users to patch security loopholes and to correct security issues. Hackers are adept at recognizing security loopholes of operating systems, and turning off the automatic updating feature of   computer leaves the loopholes open.

  • Ø Avoid Opening Emails from Strangers

Hackers are known to use emails as a form of transmitting malicious codes to an intended victim. Hackers can use carefully worded emails to entice user into opening a malicious email, and they are relying on   curiosity to do the trick. Never open an email attachment from someone user don’t know, even if user are eagerly curious to do so.

 

  • Ø Turn off Computer

Most people opt to leave their computer on because they find it convenient to log onto their account without having to wait for the computer to boot. It is convenient to do so, but leaving   computer turned on, even while user are away, poses some security risks. A hacker, human or robot, can have more time to test and determine vulnerable spots in   computer’s security. Turning off   computer not only saves user energy, it decreases the wear and tear of computer parts and prevents hackers from transmitting signals to   computer.

 How to Protect Email from Computer Hackers/Terrorists

 

  • Ø First, choose an email program that offers security measures and offers SPAM protection is   best choice. Make sure user fully research any email offers before user sign up.
  • Ø Next, once user designs a password make sure user keep it to self. Never give out   password to anyone even   best friend. In addition, when accessing email from a public or work computer makes sure to clear all cookies and erase   passwords when user are away from   desk.
  • Ø It may be a good idea to change   password every couple of months. In addition, make sure user pick an unusual password combination, something that is hard to guess so no one can figure it out.
  • Ø Finally, install security software on   home computer. Installing software protects user from hackers and on line predators. User can research the Internet to find the best and up to date security software for   computer. In many cases, user can purchase the software on line and install itself.
  • Ø Do not leave important emails in mailbox—

The moment user receive a confirmation letter from a website where user have signed up, print out the information or write it down on a notepad and delete the email immediately. This would ensure that no personal information would be derived directly from   email whether by a hacker or a close friend.

 

  • Ø Password retrieval questions—

 Do not use actual information. Instead, provide information that user would be able to remember yet something that is unrelated to user since the first few tries of a hacker will be to use accurate and actual information regarding user to retrieve   password.

 

 

ü Internet safety tips for parents :-

 

 Ø Updated antivirus and security software is a necessity.

 

  • Ø First educate self, then child.

 

  • Ø Educate children about the internet, both the positives and the potential dangers.

 

  • Ø Teach children to retain from chat rooms.

 

  • Ø Don’t install peer to per applications. A high percentage of what occurs with children and peer to peer applications is related to either illegal or immoral activities.

 

  • Ø Parents should knows their children’s friends.

 

  • Ø Teach children to never open email from someone they don’t know.

 

  • Ø Teach children the obvious Identity rules.