Computer security will become more important than ever in 2009. I’ve decided to devote this edition strictly to understanding security to protect you from phishing attacks, malware, privacy, and other related security issues. What is presented here is not some heavy duty security issues, but rather the very simple things you can do to protect yourself while computing at home or on the road. READ THESE ARTICLES, FOLLOW THE RULES, AND YOU WILL HAVE THE BEST POSSIBLE CHANCE OF STAYING FREE OF BAD THINGS. I have been doing most of them for years and have had very few problems.
Leo’s Six Rules for Safe Computing
Leo LaPorte’s simple and easy rules to follow to effectively stop bad stuff from entering your computer via the Internet. MUST READING. And I agree with Leo, use a router, but don't use a software firewall other than the one that comes with Windows. I’ve tried it and they just cause to many problems and can easily be disabled by invading malware.
Top Ten Rules for Safe Computing
Another set of simple to follow rules for safe computing. Read and use them where applicable.
Stopping Bad Things From Getting Into Your Computer
Looking for a magic bullet against malware? You won't find it in a browser. Roger A. Grimes tested all the major browsers (and some that aren't so major) and found that the browsers are probably safer than your computing practices are.
Hotspot Shield - Free software downloads
I have written about this here before, but since we are talking about safe computing, it bears repeating. Use this program whenever you use a public wi-fi with my laptop. Most public wi-fi hotspots are not secure and make your computer and communications vulnerable to hackers and security breaches. Nasty people using the same wireless network can hijack your personal information. Hotspot Shield gives you a simple solution to maintain your anonymity and protect your privacy when accessing free wi-fi hotspots. Hotspot Shield creates a virtual private network (VPN) between your laptop or iPhone and their Internet gateway. This impenetrable tunnel prevents snoopers and hackers from viewing your email, instant messages, credit card information or anything else you send over the network. This means you’ll remain anonymous and secure while on-line. IMPORTANT THAT YOU USE THIS WHEN USING A PUBLIC WI-FI
Easeus Disk Copy - Free
I wrote about this one in my last blog, but it bears repeating so you understand the difference between backing up your data and making an disk image. This program allows you to make a disk image of your c: drive so that if bad software ever does invade your system, you can delete your entire c: drive and restore your computer exactly as it was. This will save you days of work and have you back up in a very short time...and keep your important programs intact. Don't use this program for backing up your important data...there are better programs for that.
No comments:
Post a Comment