Here are some basic tips to computer security for your system, your sensitive information and your data will remain free of infection . From the obvious to the most complex, recommendations on how to protect ourselves, more so belligerent half as the Internet, are very useful. If you practice, the chances of infection will drop considerably.
While these basic safety tips are aimed at computing an audience less experienced Windows user , for being the most widely used system for new computer users and for being the most affected by viruses and threats, ' the rules may come to rest operating systems and each computer operation we want to pursue without jeopardizing our data and system. That said, let's see what they're doing it wrong for your safety and how you can fix it.
1 - Beware of attachments in your email
If you do not know, do not open. With that line of logic, you should stay safe for long e-mails from strange directions or have attachments like. Pps,. Zip,. Exe, etc. As much as you're not having a good time, and the invitation to take miracle pills free look tempting ... Is it worth the risk? Even when an email with attachment that sends you did not expect a well-known, best by any means is to ask if he sent it to be a little safer. Level software, you can do is email scan through your favorite antivirus or antimalware application. Distrust, without paranoia, is a good tool to avoid falling under the yoke of the threats.
2 - Upgrade the software on your system periodically
Newer, more resilient. This should be a perogullo truth, it is as simple as thinking "if I use an application that is out of date three months ago, took three months of unresolved vulnerabilities over", which will make your system more prone to get malware. The reluctance to upgrade software (including operating system) is due to costs, laziness and also, crucially, to oblivion. So it is good to have some applications that check for updates to the software that we installed and we recommend downloading. Upgrading software does not mean that the new version can not come other holes, but is less usual in the previous case. And in the case of operating systems for Windows XP and 7 is illustrative of others.
3 - Create better passwords and change them every six months
More difficult, less predictable. And forced a first place is in your text: "enter a new password." It must appeal to the same password for years for all services to which you subscribe is really risky, if you find one, they discover it. So it's best to create passwords for service or service by gender, in addition to a password manager, forget about "remember password" in public places and use application to create encryption keys that the most nerd at MIT could guess without take him all his life.
4 - Use antivirus and anti-malware applications
We do not want heroes: Use Antivirus. The virus could cost you money or not, but we agree that uses system resources that you might give some headache. But, weighing the risks, an active antivirus is always more effective and safer than a computer without it. For the second case the system is highly dependent on your care, and if we ever fail, you forget or someone uses your system goodbye. There are antivirus everywhere and offer different performances according to cost and use as RAM. Choose the one that suits you. Same with anti-malware applications, Spybot Search and Destroy and MalwareBytes are the dynamic duo comes to the rescue with the signal in the sky it's been three days since the last scan.
5 - It tends to close the session at the end
A login window is also an output window. Humans are curious by nature, and he sees something that is not made available to him, most likely, at least out of curiosity, make use of this gift of becoming. This usually happens at Internet cafes, offices and work in all places where computers are shared. If you open Facebook, Gmail or any other service, get used to close the session before getting out of the chair to leave. This avoids entering into the huge rate of users who lose data leave open their sessions there. A good exercise to build the habit is to do it at home too, every time you wake up the computer, log off.
6 - Avoid private operations in open, public networks
Sharing the connection, but not the data. One of the most complicated for many tourists is on vacation and having to perform banking transactions from the open network of your hotel or from some place open networks. This means comfort, but also possibilities for the shape and copper sniffing assail us bank accounts, social, mail, etc.. in a blink of an eye. To avoid this connection should be avoided, and that's like saying you cut the light in your home so you never get electrocuted. Therefore, it is best to use alternative means such as VPN servers, or more accessible, extensions such as Blacksheep, access only to sites with HTTPS protocol and have the firewall to the best of care.
7 - Enable the firewall on your system
The Great Wall of China was not built for decoration. This sentence should be an invitation to take care of us without putting so many fads over when to be a little curtailed in our comfort. A firewall can be configured completely to the annoyance of his presence will be comforting protection level, because you can change the priority system, add exceptions and if you're on Windows, use alternative applications that give you more possibilities.
8 - Avoid software with recurrent disease associations
CanciónMuyLinda.exe not an MP3: Due to the amount of scams that exist in relation to Web services, applications and what they wish, have a clear idea of what programs do not contribute to your computer a virus and shelter malware, it is somewhat complex. We therefore propose a return to the classics and their alternatives. But as you can not ignore innovation, it is good that you reference a website that you clean the doubts about the legitimacy of software, for while many programs promise to remove malware, it is they themselves who are reported as infections, and poison your system to sell the solution.
9 - disconnect from the Internet when not needed
Minor exposure, lower rate of infection: There are exceptions in droves, but most infections occur when the computers are connected to the network, as spyware and malware perform their actions by communicating with servers or sending information through open ports your connection. So if you want to lose the chance of infection rate and long time use a computer without a network connection (games, design, writing, etc.) or if you're going to sleep or go directly to be absent disconnecting internet you avoid something happening on your system without shutting down the computer. Simple, but 100% effective.
10 - Backs
Better safe than sorry: For given a situation where you lose data due to lack of security policies on your computer, not doing something of everything we've counted up, the most common situation is despair. But if it will be important backups or backups, that when all would be flooded in tears, who did the work and supported the data will take it as one more experience. No VPN, antivirus, win a paranoia that the security provided by the existence of the data to another disk or cloud services. As for software, we made a recommendation to 6 applications to back up your data, choose the one you like and feel calm doing a backup every certain period of time. You can also back up your mail or other social services.
Bonus: Educate those who share your computer with you
The more you know, unless they are wrong: This item is intended to make clear that while there may be a paranoid computer security when you have this in their hands an inexperienced, few of your resources and fulfill its role computer have a good chance of becoming infected. To avoid this, especially for those with a family computer or share in their work, it's best to educate those who have contact with computers in general. Both those who share yours as your environment. Teaching this article, telling your own experience, recommending security software and instructing in the art of being aware of the danger that exists whenever the network cable connected to the computer.
Caring for our systems is a requirement that users have to assume when the creators of the software or operating system have made mistakes, so that security ultimately depends on us.
Subscribe to:
Post Comments (Atom)
Blog Archive
-
▼
2011
(360)
-
▼
November
(222)
- Youtube features a tool to edit videos on the web
- Born an iceberg the size of New York in Antarctica
- A programmer calls to his girlfriend via Google Maps
- Home for iPad
- Tim O'Reilly: "Web 2.0 concept is obsolete"
- The Internet of Things
- Need for Speed: The Run
- Barnes & Noble displays its first tablet
- Is Nokia's last chance?
- Microsoft is working on a PC Kinect
- Newspaper readership is the most widespread intern...
- The network that mocks the police threw the angry ...
- Spotify wins and loses users of electronic music
- Electronic tablet cheapest in the world
- Turkey block access to Facebook
- Robots as employees in Foxconn
- NASA launches a mission to Mars
- SmartWatch 'clocks'
- The worst (and most popular) passwords, 2011
- Possibilities to work on Internet connection
- Virtual Reality through bionic contact lenses
- Cyborg insects venture into the unknown
- Five things you should know about the Galileo navi...
- Why the "dummies" of the crash test cars have that...
- Lens iPhone Dial, three lenses that rotate on the ...
- Displa, holograms touch
- Warning of possible scams in the most important da...
- Halo Aniversary: a lesson for another ten years
- The origins of Lara Croft
- Hundreds of Xbox Live accounts suffer an attack of...
- The e-book with the best screen in the world
- Thirty giant iPhones to pay tribute to Steve Jobs
- One hundred emails from Steve Jobs come to light
- The best day to buy an iPhone
- 37,000 euros for a puzzle
- There are over paid apps in Android Apple
- Santillana launches children's applications for iP...
- Google closes more services
- Nokia Siemens to lay off 17,000 people by 2014
- The TouchPad record-breaking sales in the U.S.
- South Korea bans video games to minors at night
- Simulates a virus come from the National Police
- Apple removes a subscription-based gaming application
- Europe bans Internet filter operators to prevent i...
- New campaigns phishing messages pretend to Faceboo...
- A robot control the movements of a human arm
- The consumer technology for low-income
- Now You Can See the Source of Einstein’s Genius
- Samsung Galaxy Ace, Special Edition Hugo Boss
- How the tablets affect the way of watching TV?
- Japanese researchers create a robot to get dressed...
- 3 Uncharted: Drake's deception, better than a movi...
- The Gmail password? Better not to reuse it elsewhere
- This factory produces 2.0
- What is your 'last will online'?
- Socle, Microsoft's secret project
- The new Motorola rugged smartphone
- 40,000 applications for Windows Phone
- Intel launches 50-core superchip
- A 'hacker' denounces the fragility of the systems ...
- Skype application for Facebook
- The parodies of the PP and PSOE won the rallies on...
- They claim that the iPhone does not recognize 4S s...
- The entrepreneurs and the power user will star in ...
- Microsoft is preparing a system for companies to c...
- Google + incorporates its own 'Trending Topics' an...
- Screen TV to Facebook
- Individual glasses 3D display in November
- Charge your phone walking
- Watson, IBM's artificial intelligence for the future
- This Christmas will be sold 1,440 million euros fo...
- The end of the heating of the computers
- Google challenges you to shape your city with Goog...
- They create the lightest solid material in the world
- Ten basic safety tips computer
- Apple and Amazon want to put 'airbags' in your mobile
- A website recommended to drink as you hear the music
- Launch a 'telephoto' ultralight for iPhone 4
- Max Payne returns to the fray
- Twitter accounts for over 90% of online opinions o...
- They discover a mysterious lines in the Gobi deser...
- Nokia will release a tablet with Windows 8 in 2012...
- Google, Facebook, eBay and Twitter, among others, ...
- A porn producer, ready to sue HTC for the name of ...
- A new world for the 'e-book'
- Samsung redesigned its Galaxy Tab 10.1 to avoid th...
- Amazon will launch a 'smartphone' low cost in 2012
- Cassini documents the development of a giant storm...
- The TC includes data stored on a computer in the p...
- Kodak is selling its photo sharing service on the ...
- Facebook and Twitter: Rubalcaba and Rajoy just bee...
- Waterproof Headphones
- Create a flexible OLED
- The SIM card world's smallest
- Launched two new touchscreen BlackBerry, Bold 9790...
- Ilya dies at 22 Zhitomirskiy, cofounder of the Dia...
- The next Bioshock
- An electric car made by a single molecule
- A decade of Xbox
- Fujitsu launches first dual screen 2D and 3D
-
▼
November
(222)
0 comments:
Post a Comment