Browse > Home / / 10 Simple Rules for Safely Browsing


10 Simple Rules for Safely Browsing

2 comments
Saturday, October 24, 2009 Posted by One-4-All

10 Simple Rules for Safely Browsing

I think almost people in the world will have PC (personal computer). And almost of them use it for browsing into or world wide web. But now, internet can be a dangerous place for your PC. There are malware, hackers, virus, and more else. And then what we must do? or we must leave internet? i don't think so. Internet is the most useful tool to get information and knowledge in our life. Almost thing can search in , , , , , and many else. So i think the best answer to get safely browsing is 10 Simple Rules for Safely Browsing.

  • Click wisley

  • When you surf the web you probably come across different ads and messages prompting you to click on them and approve downloading. A lot of these are innocent, but some can hide executable files that can infect your PC. Files that end with .exe, .com, .bat, and .scr, as well as, scriptable document files including .doc and .xls may be dangerous and turn out to be malware. You have to think carefully before downloading a file to your PC. Download files only from websites you know and trust.

  • Protect your passwords

  • Tailor your PC and Internet passwords so they won't be detected by hackers. Hackers have methods and programs to find passwords. Use strong passwords and change them frequently. A strong password is a combination of at least seven characters with a mix of lower and uppercase letters and digits. It is important to use a variety of passwords. If you use the same password for all of your accounts and PCs it may result in total exposure if the password reaches the wrong hands. Make up new words for your passwords; hackers can easily guess passwords that are made up of common words.

    It is important that all the users that are defined on your PC have unique passwords. It is also recommended to change the default administrator user (="Administrator"). The administrator user, in most operating systems, has full control of all users and files. Usually, the first step that hackers take, when they penetrate your PC, is taking control over this user. Changing the defult name will make it harder for them.

  • Use a firewall

  • An active firewall is a necessity these days if you spend time on the Internet. If you are using windows XP OS(=Operating System), you already have a firewall installed. You just need to make sure that it is activated. To enable the firewall, follow these instruction:
    1. Click Start > Setting > Control Panel , and then click Network Connections.
    2. Double-click on your active Internet connection, click Properties, and then select the Advanced tab.
    3. In the Advanced tab, in the Windows Firewall group box click Settings, and then select On.

  • Use anti-virus software

  • A good firewall will prevent most attacks of malware on your computer. But what happens when it doesn't? Computer viruses, worms, trojan horses etc. can penetrate your computer (by email attachment, by file sharing) without being detected by the firewall. It is important to have software that can handle such penetration. An anti-virus software works from inside the computer detecting malware and deleting it. A good anti-virus will also scan email attachments and downloads before they can harm your PC. It is very important to update the anti-virus software all the time in order for it to stay relevant and handle new threats.

  • Use anti-spyware software

  • Anti-spyware software can increase your PC security a great deal. Nowadays many malware attacks originate in spyware. In addition to a firewall and an anti-virus you should install and run anti-spyware software. For example, you can use Lavasoft's Ad-Aware.

  • Secure your Internet browser

  • The first step in securing your Internet browser is choosing the most secure one.
    Currently, IE (=Internet Explorer) is the most popular Internet browser. As such, malicious hackers made it their number one target and set out to exploit its flaws. It also has a the disadvantage of relying on ActiveX technology, which allows web sites to run executable programs on your PC via your browser. Although there is an improvement in security in IE 7 compared to older versions, this technology is still vulnerable.
    Mozilla's Firefox is the most popular IE alternative. Like IE, it is also a target for hackers. In order to minimize the risk it may be safer to use a less popular browser such as, Opera browser or Google Chrome browser.
    No matter which browser you choose, remember to keep it updated in order to deal with new Internet threats.

  • Always upgrade to the latest OS (=Operating System) service pack

  • There are types of malware that exploit weaknesses in operating systems. Due to its popularity the most attacked OS is Microsoft Windows operating system (in all versions). The best way to protect your computer is to install a different operating system such as Ubuntu Linux . Linux operating system is usually less attacked by malware. No matter what OS you choose, upgrade regularly to the latest service pack in order to be protected from new threats.

  • Secure your wireless network

  • Be careful when using unsecured connections of neighbors or free public connections. Sometimes there are just Wi-Fi networks of people who didn't bother to take protection measures, but they may also be traps set up by hackers in order to get your personal information. If you must use a public connection make sure you encrypt your outgoing data and don't sign on to financial accounts.

  • Secure your email

  • It is important to take measures in order to make your email more secure.

    As a first step always use a trusted email client. Many email clients can deliver your emails but it doesn’t mean that they protect your PC and personal information in the process. It is important that the email client you are using has basic features, which protect your PC, such as, filtering unwanted messages from your inbox and scanning email attachments for computer viruses. Use a first-rate email client, such as, Google Mail.

    It is also recommended to carefully monitor emails with attachments. When you download an email attachment to your PC it is not checked by your firewall. Many hackers use spam emails in order to spread malware. Don't open or download attachments from an unknown sender. Opening attachments that were send from friends may also be a risk if their PC was infected by malware. Make sure that the email makes sense to you before you open its attachments.

    Be careful with emails that have links. Hackers and spammers sometimes use links in order to seduce you to enter malicious websites and get your personal information. These emails can seem like authentic emails from your bank or from some service provider. If you get such an email it is better to open a new browser page and enter the URL of the legitimate business manually to check if the email is legit, or contact the service provider and check it out.

    Another protection measure you can take is to set up customized filtering options on your emails. Most ISPs provide spam filtering, but you can make it more effective by customizing it yourself. For example, Google mail allows you to create aliases for your email and you will get all of the emails to the same inbox. When subscribing to a new service or newsletter you can create a new alias and if you find that this alias is being used for spam or malicious intentions you can just delete it.

  • Disable file sharing on your PC

  • Sometimes you allow file sharing on your PC so people who have legitimate access to it can easily reach these files. This can be dangerous if you are using Wi-Fi network that is very public like in universities or airports. You are exposing your PC to strangers that are on the same network. If you didn't disabled file sharing these people can get access to your files. It is important to disable file sharing access from foreign computers.



Best Regard

2 comments:

Branded USB Sticks on October 26, 2009 at 5:41 PM said...

You are right let us not miss out this useful global world having the real information regarding anything. Thanks for giving us the useful tips.

Shiranui on January 8, 2010 at 10:03 PM said...

Nice information and useful tips.
Today . Privacy is information that we need to protect on ours own.
No one can help us now.

I want to add something that relate to this topic.
http://gamerenoh.blogpsot.com/

Post a Comment