Six step of computer security

If You feel concerned about the security of Your data and computer, following [is] six easy step which can assist to protect and pacify all that you Have do crucially into Your computer

1. Use the firewall internet
IF You do not use the firewall, all attacker can find and groan Your computer during 15 minute after You incircuit to internet. If You use to access the Internet which " always incircuit", like cable modem or DSL, You have to install the firewall and always renew it

There are 2 kinds of firewall: hardware and software. Firewall base on hardware usually represent a[n router or a[n person computer which have been arranged to act the sabagai firewall for all network at home You. In this time, any way, a lot of firewall internet used at home and small company base on the soft perangakat. Firewall of a kind of this can be got from third party, like Zone Labs' Zonealarm. Or possible this peripheral have direct attached in Your operating system, like ICF ( Internet Connection Firewall) or Windows Firewall at Microsoft Windows XP, depended from service pack which you Have install
2. change the operating system on your computers
So Your firewall is attached, take care of the software most elementary Your computer-- that is its operating system -- is non-stoped to by renew by using Your newest software to update. Negligence in [doing/conducting] this matter will result Your computer in a state of very risk because negligence at operating system is usually known and become the goals of all hacker and cracker

If You use the newest operating system, like Windows XP, You can use the fitur Windows Update to in manual men-download and install to update from situs Microsoft Windows Update. To automatically download updates in this time and will come, activating fitur Automatic Updates with clicking Start > Control Panel > Security Center
3. Exploiting Your software antivirus as well as possible
Program the software antivirus assist to protect Your computer to most virus, worms, Trojan Horse, and other dangerous code. A lot of new computer have been provided with the software antivirus. But, software antivirus have to renew periodically, what usually oblige the You to subscribe to its maker software. If You do not subscribe to to renew the Your software antivirus, hence computer You'D rentan to new threat. On that account, You better install the peripheral antivirus, use, and take care of remain to renew. Update is usually made available to minimize one week once

Your Setalah install the software antivirus, arrange to check to all existing data, incoming data and di-download, order the enamel, and its enclosure. Activating schedule " check for updates" for the checking of daily
4. Preventing spyware, adware, and spam
A lot of free situs software and spying all consumer and report their activity to later third party use the the information to deliver a lot of enamel spam. If You explore the internet, computer You'D be entered by the spyware and adware. If You shar the data or deliver the brief message, You'D get the quicker spyware and adware again

Best protection to fight spyware and adware is with do not men-download-nya from early. To protect Your computer in order not to download program endangering
- Download program only from situs which You trust
- Read all security commemoration, license agreement, and statement privasi from each;every program to download - Don'T clicking have Agree or O.K. to close a window. On the contrary, click the red sign X a right angle;corner for window or depress the Alt+F4 at Your keyboard to close a[n window
- Take a care in using program shar the file of music and film " free", and ensure that the full You understand all software becoming one packet at the programs
- For the meminimalisasi of spam, considering choice following
- Asking atYour serviceprovider Internet to ensure that they run a type of buffer of spam and antivirus
- Arrange the enamel buffer in Your enamel client ( like Outlook Express, Eudora, and others). Some buffer spam mark the enamel representing spam by giving sign *** SPAM*** at line subyeknya. Other place the sign of similar X_Spam title or [at] the message area format. You can arrange the buffer to find this messages and remove it at separate place [so that/ to be You can vanish it any time
- Use the third party product, like Cloudmark Safety Bar, Spamassassin, and Bayesian Mail Filter, what automatically remove the spam recognized and place it in separate place to You
5. Select;Choose the trustworthy pop-up blocker
You better install a pop-up blocker, like Google toolbar or Stopzilla, at Your browser or use the browser alternative ( Mozilla, Firefox, or Opera) owning pop-up blocker in it. You Better avoid the free program from ill defined vendor. A lot of pregnant free program of spyware in it. They advertise that they can [do/conduct] Your something that wish, but on the otherhand, they contain the program which can endanger Your computer

Tip: If You run the Windows XP by Service is Pack 2, activating Pop-Up Blocker at Internet Explorer. You can [do/conduct] it with clicking Tools > Pop-Up Blocker > Turn On Pop-Up Blocker
Way of best to discontinue the pop-up [is] with have never permitted they install their self at Your computer since early. You can [do/conduct] this matter by avoiding ill defined situs, and don't have men-download and install the program from source which is not trustworthy

6. Protect the Your data and computer in physical
Last matter which do not less important, ensuring that peaceful existing data and computer in it in physical
Make to back up the copy: So to be backing up easy to and quickly to be [done/conducted], arrange all Your data and document at real correct folder. Later;Then You earn easily copy altogether at Zip drive, CD, or DVD, or use the program or service back up

Take care of the security back up the You: Keep the media back up the You of outside computer: for example by entrusting it at friend or family, in box of safety deposit, or by online by using service back up trustworthy
Digg Google Bookmarks reddit Mixx StumbleUpon Technorati Yahoo! Buzz DesignFloat Delicious BlinkList Furl

0 Comment: on "Six step of computer security"

Post a Comment