How to improve computer security How to improve computer security

Rabu, 08 Juni 2011

How to improve computer security

Here are sharing about the various ways to increase computer security, the latest computer security, computer security, 2011, computer security tips, tricks computer security, how to keep the computer, how to increase computer security, how secure a computer, computer security, how to increase your latest computer security, computer menjada way of crackers, improve computer security, computer security added, maximization of computer security, computer security max. increase of computer security, computer security updates, tipss secure the computer, tips on increasing your computer, how to make your computer safe, how to make your computer secure, how to make computers make it more secure, safe way to make computers,, how to secure computers, 2011, Indonesia computer security.
Main Step Securing Computers

For both computer users who connect to the internet or not, it's time to find out that the danger of computer crime continues to lurk either consciously or unconsciously, just waiting for the right time to destroy the contents of your computer.

Related to the news in online media, about the spread of viruses melesatnya locally made no less merepotkannya with the virus overseas, then I am reminded to friends reader should always be alert. And be aware that I have outlined to 9 the first step in securing your computer. Remember, this is 9 a first step, awareness and update your knowledge about new ways used by criminals still always required.

Today, computer users in Indonesia are mostly using Microsoft Windows as the operating system, and this step is intended for the operating system.

1. Operating System Upgrade

Operating system upgrade to a newer, at least stay abreast of the latest programs available.

* Microsoft Windows XP users upgrade to Microsoft Windows XP Service Pack (SP) 2.
* For users of Microsoft Windows 95/98/ME/NT, are advised to upgrade to a higher level.
* Closing security holes in operating systems by installing the latest security patches.

2. Use a Firewall

A firewall helps protect computers from malicious hackers, worms, and some spyware.

* Use the Windows Firewall (available in Windows XP SP2) or other firewall products either have to purchase or for free. Some commercial firewall program is ZoneAlarm, Agnitum Outpost Personal Firewall, Checkpoint Firewall, etc.. While the games like Comodo Personal Firewall, Sunbelt Personal Firewall,
* For broadband Internet users, make sure the router has a firewall.

3. Install Antivirus

Antivirus protects us from access to computer viruses and other malicious attacks such as trojans and worms. Antivirus can look for viruses, trojans, and worms that dwell in the computer and scanner on incoming email and outgoing email. Most important are:

* Make sure your Antivirus is always set to update his knowledge of the latest viruses.
* Make sure your antivirus program is the latest version.
* Do not open email attachments from people you do not know.
* Perform the scanner (scanning) to removable devices such as external hard disk, USB disk, or CD / DVD which sometimes activate the auto-run.

4. Always Update

Just like the operating system, software that continues to be updated will be free from the problem of security weaknesses. Also, use the latest programs to keep abreast of security developments of the program.

5. Prevent Spyware

Spyware is a small program that landed on our computers to record and transmit all the data and activities that occur on your computer, of course, only the pembuatlah desired activity is recorded, such as keyboard activity by a keylogger.

Prevent spyware can be done by:

* Beware of files that you open or download via the Internet or email.
* Do not install programs that do not clear the manufacturer.
* Do not indiscriminate surfing to sites that have a high risk level. For example: many porn sites that contain spyware.

Eliminate spyware can use programs like Windows Defender AntiSpyware, Ad-Aware, Spybot Search & Destroy, etc then do the scanner in the entire computer. Make sure the program always do automatic updates and scan your computer every day before you start work.

6. Secure Wireless Connection (Wireless)

If you have a wireless network, always follow the installation and documentation:

* Use MAC filtering to restrict the use of a trusted computer only.
* Use WPA or WPA2 encryption is more secure to reduce the risk of interception.

7. Limiting the Risk of Email Spam

There are several things you can do to reduce the risk of spam:

* Do not click on any of the emails that have been identified as spam.
* Split between personal email / office with emails that are used specifically to register online.
* Use an email client that has been integrated with the spam filter or install spam filtering program.

8. Backup

Always back up important files and store in a safe place, make sure the files terbackup well and do not contain malware.

9. Physical Security

* Create a "security" on your computer and other items that you think is important, so always remember that these items need security.
* Make sure not to leave small notes everywhere.
* Record all serial numbers and do not let others know.
* Make sure doors, windows, garage locked properly. Motion detectors and alarms improve your home security.
* Do not let the computer visible from outside the house, it will invite thieves.
* Use an additional lock for the laptop, eg fingerprint, usb dongle, etc..
* Use a bag that has extra security for laptops.
* Be careful when your vehicle to crash the street, for example: a flat tire, which is often used by criminals to steal your laptop.

Src: http://think [.] Securityfirst [.] Web [.] Id
Securing Your Computer From Viruses

Is your computer affected by virus? Did you find a strange message on your screen that previously did not appear? Do you feel your computer is more and more slowly? Okay, this is a common problem found by computer owners all over the world. There are many viruses and worms out there that can infect your computer.

Some effects of the virus is very diverse. There is at normal level category, meaning that only affect the performance of the system on your computer. At a higher level of virus also can menghapud your important data. Very fatal once, even a virus can also damage your computer system. For computers that connect networks, could be a virus can turn your computer as a zombie computer (a computer-controlled by someone else).

How, terrible rather than the effects of a virus attack on your computer. Tips below may need to know to overcome or at least prevent a virus attack from outside.

1. E-mail is one way of spreading the virus of the easiest and most dangerous. Make sure you open the e-mail from sources that you make sure they were correct. If the e-mail that you get comes from sources that you do not know or do not come from the contacts list you have, immediately delete the e-mail. Make sure the incoming SPAM list soon emptied. Never once to open it.

2. USB Flash Disk is the method most widely spread of the virus second only to e-mail. So make sure your anti virus updated well before the USB Flash Disk incoming connect on your computer. Scan first before opening. How open is also not in the double click, but with right-click and select Open. This method is safer to avoid the viruses that enter via autoruns which is included in USB Flash Disk.

3. Be careful to use e-mail client program such as Microsoft Outlook. Make sure the program is updated properly. If the operating system you are using is pirated, I suggest you use e-mail clients that are free and can be updated automatically, such as Mozilla Thunderbird or Pegasus.

4. Everyone must know the internet is a source of spread of the virus in the world. Nearly 80% of viruses spread through this route. The following safety tips when you do the surfing world in the realm of the internet: - Do not click on pop-up window that appears. For example, notice that you are the winner of a lottery or click a few times then you'll win a lottery. Actually it is a malicious program that automatically will send a trojan or spyware to your computer. - You can use the feature or program atomatis block on pop-ups that will be displayed. This feature is usually already included in the web browser you use.

5. Search engines such as Google sometimes can not filter out sites that are regarded as dangerous. For that you can install a program that can automatically detect sites that are not worth a visit or dangerous. Free programs you can use is AVG Link Scanner. AVG Free program is able to detect artificial sites google search results. If the site contains a malicious virus, it will display a warning or will be automatically blocked sites can not be opened.

6. Install anti-virus you can trust. It does not have a paid anti-virus, for home users / personal you can use anti-virus free is no less popular with the anti-viral paid, such as Avira, AVG, Clamav, and others. Make sure you do the updates regularly to ensure that you install anti-virus capable of holding the virus that are increasingly developing its ability.

7. Install anti-Spyware is also to prevent the introduction of malware and spyware. Both these malicious programs in addition to making the computer is running slow, also can mengahantarkan your computer as a zombie computer that can control the people out there. Some anti-spyware program free is quite famous is Spyware Doctor, Spyware Terminator, etc.

8. Never open attachments that are included in the e-mail from an unknown source properly. Although attachment of the included file is a file format that is rarely carry viruses such as. Txt,. Jpeg,. Gif,. Bmp,. Tif,. Mp3,. Htm,. Html, and. Avi, but make sure you do a scan beforehand.

9. Use a disk (CD / DVD) to mengimpan / backing up important data that are not easily infected with the virus. CD / DVD is only read only (only readable), but make sure before they are placed into the disk, the data have been liberated from the virus. Karen if data bervirus, then it's useless to be stored on the disk.

10. Set the operating system you use to always do the updates regularly. This can reduce the risk of virus attacks from outside because the gap of viral entry have been closed by the updates that you do. But the update can only be successful if the operating system you are using is genuine. If not I suggest you use a free operating system such as Linux.

11. When you download programs from warez sites, make sure your anti-virus installed and updated properly. Files that are derived from these sites sometimes deliberately infiltrated by a dangerous virus.

12. Finally I suggest, do not visit sites that contain malicious viruses and malicious programs that can harm your computer itself, such as warez sites, crack, serial, porn, and others.

Similarly, 12 tips you can do to secure your computer from virus attacks. One thing you need to understand "keep / care is better than cure".

Src: http://idecapung [.] Blogspot [.] Com /


Securing Your Computer From Cracker

1. Blocking Remote Access. To prevent your PC taken over by hackers,
disable Remote Access. Dlm Start menu, right click on "My Computer" & select "Properties".
Then there is the "System Properties", then select the tab "Remote",
dismiss / remove the sign (V) which are in front of all the options that exist to disable it. Then click "OK".

2. Removing unused User Accounts => On the "Windows XP Professional" there are several user accounts
which can be accessed through the trojan and utilized to perform the attack.
To get rid select the Start menu, select "Control Panel", select "Performance and Maintenance".
Then select "Administrative Tools", click 2 times "Computer Management". Select "Local Users and Groups",
on the right side 2 times pd click the "Users". You can delete the old accounts that you use non-
(Image users who have an X). Then close the tampilan2 earlier.

3. Closing the gap NetBIOS => file2 your documents can be accessed via the Internet then nonaktifkanlah NetBIOS.
Dlm Start menu, right click on "My Network Place" & select "Properties". Then there is the "Network Connections".
Then right-click the Internet connection icon you are available, choose "Properties". If no display, select the tab "Networking". Tick ​​(V) which are in front of "Internet Protocol (TCP / IP), then click the tab" Properties "which is underneath. Then there is the "Internet Protocol (TCP / IP) Properties", select "Advanced" tab. Display no more "Advaced TCP / IP Settings", select the tab "Wins", and select "Disable NetBIOS over TCP / IP. Click 'OK'.

4. Response to BO2K on Windows 9x. BO2K can be tracked with port scanning.
Usually pd Windows 9x an open port that is only one port 139 (NetBIOS).
Therefore need to be suspected if we know there is another port other than an open port 139.
Circulating anti-virus program is currently able to detect the existence of this program.
Make sure you have to download the latest version of anti-virus program. Rajin2 is to open the Windows registry. Usually pd Windows 9x, because BO2K embed themselves in

"HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ RunServices"

or on

"HKEY_LOCAL_MACHINE \ Software \ Microsoft \ Windows \ CurrentVersion \ Run".

5. Security BIOS on the Server => BIOS is the low level software which is useful for configuring
or manipulation of the hardware on x86-based PC. MS Windows and Lilo from Linux to use it for
determine the procedure for booting on your PC. You need to protect your BIOS with a password given to him.
This method is also useful for preventing the use of booting up via floppy disk. This way ill give the maximum protection of your PC, but it can complicate other org mengacak2 for your PC. Keep in mind that the current BIOS flashroom method, which allows us to change configuration or even remove them altogether.

6. CGI Abuse Shell on Unix / Linux => There are some pretty powerful way of reply to address them:

a. You plug-chrooted Apache Jail on you so that the command which can be run to your limit.

b. Minor Tweaks CGI Source Code of the facility who would you give such as Perl,
then you turn off the facility system () function ... Smile

c. Minimize the occurrence of local exploits on your system often tinkering with & follow the news
about security.

7. Removing non-COM components are needed pd Windows 2000/XP/Etc => Some non-COM components required by
almost all applications must be removed. Consider first before deleting it because every component of each other
associated with a file system & dictionary objects. In the Start menu select Internet Explorer,
on "Tools" menu select "Internet Options". If no display, select the tab "Connections".
In the "Dial-up and Virtual Private Network Settings" delete COM Unresponsive needed with clicking on it and select
"Remove". Then click 'OK'.

8. Enable Firewall => For Hackers & attacker did not get to your PC, it takes a Firewall.

9. Installing Anti-Virus => antivirus software does not just get rid of viruses, worms, or other destructive files
but also protects your PC from the threat of attack script on the website.

10. Do you do a chat on MIRC before the above tips into practice,
kalo lo ngak company would be attacked by hackers because IP temen "can diliat via MIRC.

Src: http://www [.] Okeaja [.] Co [.] Cc

Good luck how to improve computer security, how to keep the computer, how to increase computer security, how secure a computer, computer security, how to increase your latest computer security, computer menjada way of crackers, improve computer security, added computer security, computer security maximization, maximum computer security . increase of computer security, computer security updates, tipss secure the computer, tips on increasing your computer, how to make your computer safe, how to make your computer secure, how to make computers more secure so, how to secure computers.

May be useful:)

0 komentar:

Posting Komentar