No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information.
Let's begin with the basics. We all need to protect our PC in the same way we protect our home, car and bank account. We wouldn't give a stranger the keys to our car, home or bank account now would we. If you don't protect your PC it is like giving the keys to a stranger and letting him/her have full access to your PC. Once the stranger has the keys they can snoop around and take whatever they want. I know, your thinking how can they do this, my computer is in my house and my doors are locked. Well, today you can be anywhere in the world and access someone's computer via the internet. Since the introduction of cable modems and DSL everyone's PC is online all the time and accessible.
Why do I need to protect my PC, I don't keep any important information on it? Ask yourself a couple of questions.
1. Do I bank online?
2. Do I shop online?
3. Do I create documents, spreadsheets?
4. Do I let other people use my PC?
5. Do I download music, files onto my PC?
If you answered yes to any of these questions then your PC is vulnerable. If you bank online then you are sending personal confidential information to your bank via the Internet. For Example: Let's say you are infected with spyware and you are typing in your account number plus password. A spyware installation can record key strokes and then send them off to a site on the internet. Now the person who setup the site has your account number and password to your bank. Here is one more example, if you answered yes to I let other people use my pc, here is what happens. The other person decides that they like this new cool piece of software. They download and double click on the exe, msi or whatever installs the software. The adware, spyware or virus installs. Now the infection is installed and now it can start stealing confidential information or cause havoc on your PC. You get onto the PC as always, since you don't know this has happened and start doing what you always do, type documents, go to chat rooms, do your banking online, reconcile your banking with quicken and all this time your confidential information is stolen and you are completely unaware that this occurred.
The million dollar question, what do I do? Well, you can follow this approach.
1. Install a Spyware application and install and configure correctly. If you already have spyware application installed make sure it is up to date and make sure that is configured properly.
2. Install an Adware application and install and configure properly. If you already have adware application installed make sure it is up to date and make sure that is configured properly.
3. Install an AntiVirus application and install and configure properly. If you already have antivirus application installed make sure it is up to date and make sure that is configured properly.
4. Install backup software, why because if something does get through your defenses or delete something by accident you always have a way of retrieving the information. You should try to backup your system at least every other day.
5. Install Encryption software. This software will encrypt files like word docs, spreadsheets, banking file on quicken. This way if someone does steal your information they will not be able to read it.
6. Install a Firewall. The Firewall can either be software or hardware based. I would install both especially if you bring your laptop with you and connect to the internet at different locations. The Firewall will block hackers trying to scan your system while you are on the Internet.
Many people have these applications installed but they do not configure them correctly. Just installing the application does not mean that the application is working properly to stop the threat/infection. On some applications you need to configure the setting to make the application work the way it was designed to. Find out how to configure and install the software properly either by reading a how to book or getting someone to help. If you already have the application installed make sure it is up to date and make sure that is configured properly. All of the software needs to be up to date and kept current. As new threats are release on the internet, all applications will need the current updates to fight these threats.
If you would like to find out if you're PC is protected you can take the test. This will not harm your PC it just checks for vulnerabilities and lets you know if you passed or failed. The application is a single exe and DOES NOT NEED TO BE INSTALLED. All you need to do is run the test application and follow the instructions. Get Risk Assessment Tool
All articles are written by HowtoPCGuru! HowtoPCGuru http://www.howtopcguru.com You may reproduce and use this article just so long as you add a link (http://www.howtopcguru.com) down at the bottom. HowtoPCGuru, All the latest articles, tools, news, file hosting and more!
![]() |
|
![]() |
|
![]() |
|
![]() |
It's been with us since 1993, it's gotten more intrusive,... Read More
Have you ever bought a product or service from the... Read More
File sharing on p2p is soaring despite the music and... Read More
Everyone should eliminate spyware and adware from your hard drive... Read More
Pharming is one of the latest online scams and rapidly... Read More
The Threat10 years ago you could probably have run no... Read More
If you run any type of Internet business, Adware and... Read More
There are ways to insure security though. You can get... Read More
Identity theft is one of the most common criminal acts... Read More
It's late. You've been scouring the web for that perfect... Read More
Do you really have to know how feeds work? Not... Read More
Paypal is a great site and is used by many... Read More
So called phishers try to catch the information about the... Read More
During the release of a new software product specialized to... Read More
Phishing is a relatively new form of online fraud that... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
You and I are a lot alike. We are both... Read More
Shopping for horse gifts or other gift items on the... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
Recently, my site and other internet accounts ( http://www.nabaza.com/sites.htm )... Read More
The movie Little Black Book features a young woman, Stacy,... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
Let us take the example of scrambling an egg. First,... Read More
In the past I've never really paid much attention to... Read More
Remember the television show about the nosy neighbor Mrs. Kravitz... Read More
Microsoft routinely releases new security updates, many of which are... Read More
Fishing on the Internet has come a long way. However,... Read More
The money being spent online is steadily growing. With billions... Read More
To blog or not to blog? Well, why not? Lots... Read More
If you have used a Windows machine for a while,... Read More
Some months ago, before there was much publicity regarding phishing... Read More
Only the top spyware removers are successful at detecting and... Read More
A few nights ago I received an email from "2CO"... Read More
Huge number of spyware software applications are available in the... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
So called phishers try to catch the information about the... Read More
As the number of people using the Internet as an... Read More
Every single time you access a website, you leave tracks.... Read More
The money being spent online is steadily growing. With billions... Read More
Long gone are the days that we could feel secure... Read More
No, this article isn't about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet.... Read More
They're out there. Individuals trying to make a quick buck... Read More
"Phishing," the latest craze among online evil-doers, has nothing to... Read More
Credit card fraud is a growing problem for online businesses... Read More
Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More
Did you know...? 1 in 5 children who use computer... Read More
Do you really have to know how feeds work? Not... Read More
Spyware and adware are becoming major problems for online surfers... Read More
Pharming is one of the latest online scams and rapidly... Read More
Recently I have received email from my bank/credit Card Company,... Read More
First, let's do a little recap'. As I stated in... Read More
WHAT IS HACKING?Hacking, sometimes known as "computer crime" has only... Read More
File sharing on p2p is soaring despite the music and... Read More
Watching how the traditional media covers the latest virus or... Read More
The 1998 Data Protection Act was not an extension to,... Read More
In 1997, I decided after 15 years as a practicing... Read More
Computer security for most can be described in 2 words,... Read More
Phishing is the act of some individual sending an email... Read More
No longer are viruses the only threat on the internet.... Read More
The internet is undoubtedly a fantastic resource for families and... Read More
In a word, no - an email message has always... Read More
Identity theft rates one of the fastest growing crimes in... Read More
You and I are a lot alike. We are both... Read More
No auntie Sookie, not earth worms, computer virus worms that... Read More
Internet Security |