Thursday, September 6, 2012

Computer Security Attacks - How to Defend Yourself Against ComputerSecurity Attacks

I acclaim the afterward basal aegis 'best practices'...
If you absorb any time online, you charge a aegis toolkit consisting of:
  • anti-virus software
  • anti-spyware AND anti-key-logging software
  • spam acquaintance
  • anti-phishing accoutrement
  • two-way firewall (preferably a aggregate of both software and accouterments firewall if you're on a accelerated connection.)
Note: some internet aegis software bales cover virus protection, anti-spyware, two-way firewall and spam clarify in the one program.
Whichever articles you use, accumulate them up to date - not monthly, but at atomic weekly, and finer daily.
Use Windows Amend to accumulate your operating arrangement and Internet Explorer patched. On average, six updates to application aegis bugs are appear for Windows every month.
Keep abreast of Aegis issues - befitting abreast badly reduces your acknowledgment to risks.
If you accept an email allurement you to verify annual details, don't use the hotlink in the email. Visit the website by accounting its abode in your browser, again analysis for a hotlink to amend your details. If in doubt, acquaintance the website anon by phone.
Avoid alarming spots: babble rooms, peer-to-peer networks, crackz and warez, porn sites, hacker sites, annihilation illegal.
Stay alert. Analysis your browser's cachet bar; don't bang on a pop-up window or chat box after aboriginal account it; watch for abnormal browser behaviour, such as a window that bound opens and closes, or an aberant acknowledgment if you blazon a seek cord in the abode box.
Don't accessible email from alien sources. Accumulate examination panes switched off in your email client. Never bang a hotlink in a spam email.
Configure your email server to block or abolish email that contains book accessories that are frequently acclimated to advance viruses, such as .vbs, .bat, .exe, .pif and .scr files.
Train advisers not to accessible accessories unless they are assured them.
Keep your browser's aegis settings set to high.
Enforce a countersign policy. Complex passwords accomplish it difficult to able countersign files on compromised computers. Choose an alphanumeric countersign that is at atomic seven characters continued and uses a mix of uppercase and lowercase letters, numbers, and non-alphanumeric symbols such as (@#$%^&). This will advice anticipate crooked admission to your computer.
Encryption should be acclimated to assure acute advice from "unauthorised eyes".
Only conduct Internet affairs that accept anchored processing.
Turn off and abolish added services. By default, abounding operating systems install abetting casework that are not critical, such as an FTP server, telnet, and a Web server. These casework can become avenues of attack. If they are removed, attenuated threats accept beneath avenues of advance and you accept beneath casework to advance through application updates.
Do not assassinate software that is downloaded from the Internet unless it has been scanned for viruses. Simply visiting a compromised Website can could cause infection if assertive browser vulnerabilities are not patched.
If a attenuated blackmail exploits one or added arrangement services, disable, or block admission to, those casework until a application is applied. Accept your computer arrangement apart reviewed, acclamation any aegis risks.