How to secure your data when using the Internet?



How to secure your data when using the Internet? In today's world, many use the computer, but how many people care about his defense? In fact, not very many.

In an interview with the man on the incorrect view this site sorted out a long time than it looks it. Found: [i] to launch a blue tab e 1,111,113. . What, then, is to talk about all the other knowledge?

So: you have a computer, an Internet connection.
Protection itself is divided into two global clusters: software, standing guard over your computer, and safe surfing on the net.

The first block:

1. Install firewall (aka firewall). Main function: blocking your computer from intruders. However, if you're using XP, it is desirable to disable the built-in firewall. It gives the functionality to others and creates a false illusion of security.
2. Install antivirus. In today's world, they are well developed from a technical point of view and offer a wide range of protection. The main thing - keep in mind: Under no circumstances did not put two anti-virus. They will conflict, and so much that any virus stuck in his belt.
3. Check the file hosts. It allows attackers to add a few lines, and when coming to your favorite resource you will get on a fake site. It is in this file indicated that 121.0.0.1 is a local resource.
4. There is such a thing in the computer as a registry and a program that allows to work with him - regedit.exe. For the stronger security is better to have a backup of this file, as well as other programs. As the size discrepancy was subsequently possible to determine whether their damage.
5. Also, I recommend using a built-in utility: netstat. It runs from the command line, which is called with the following command cmd. The utility allows you to browse the Internet connection.
6. You can also monitor the network load. If you see an increasing impact/adoption and know that while you do nothing, then by unauthorized access or impact information.
7. Good time to put the patch and update those applications that use. They are aimed at closing the various vulnerabilities.

As for the surfing in network:

1. To view the sites is desirable to use not very common browsers. They are rarely used, so they are looking a little vulnerability.
2. Disable Java (although unlikely to agree - most of today's Web pages will look shabby, and navigate complicated) and the use of unsigned ActiveX-elements. Also disable cookies reception with all the resources (and then manually prescribe how a site is allowed).
3. Carefully look at the name of the domain name as possible phishing (phishing sites).
4. Do not open unknown attachments in e-mail messages, and even better - do not open emails from unknown senders. There are viruses, resembling the structure of html-pages.
5. If you are using messengers ICQ, Qip, Miranda and others, do not go to the links from an unknown companion and do not take away files.
6. Do not neglect using a secure connection https.

Information security - a broad topic of conversation.
In this review article discusses only the basic security issues, but, nevertheless, perhaps, some problems were unknown to you.

 
  • How to install and configure Panda Antivirus?
  • How to choose a means of protecting your computer from viruses?
  • Why a firewall?
  • How to decrypt files encrypted virus Trojan.Encoder?
  • Battle antivirus, or what program to choose?