Thursday, February 14, 2019
Protecting Yourself Online :: essays research papers
Protecting Yourself OnlineIn this paper we will dispute some basic steps to better secure your system. We will wrangle the following four (4) argonasvEmailvInternetvChat ProgramsvVirus Protection1.EmailDo non straight-from-the-shoulder any email attachment that you receive from any unity with bulge out checking first - non even from your closest friends. If someone has to send you a doc saddle ask them to convert it into *.rtf or *.txt format and then send. If you must open any doc citation files, you can first use one of those doc file readers available free on the net. Alternatively, you could convert the extension of the file (doc) to text (txt) and then open it with your text editor and visit what the file is all around. If you do decide to open it as a doc file in MS Word ensure that the macro instruction earnest setting is set to HIGHIn your email client turn off the receiving HTML mails option. 2. InternetvSet explorer to show file extensions. For this go to Win dows Explorer/ My Computers Tools Folder Options View (tab) and uncheck the cutis File Extension For Known File Type box. This will athletic supporter you to avoid clicking on hoaxes. vDo not give out your information on the net. While surfing the web you will take care that there are sites that will ask for your ad hominem information. Do not give information about yourself and hide out information about yourself as long as you can. v Disable JAVA and spry X. To do this under MS IE, move your default-browsing zone to High security in Tools-Internet Options. This switches off 90% of MSIE exploits. You dont have to put down the sites that dont let you enter without Java and Active X enabled. Know how to read biscuits and take a close look at them. Use software like cookie crusher and every time you log online crush all your previously current cookies. If you use IE then make sure that you run Windows update at least once a week. vUse personal firewall software. regularize Alarm (ZA) is a good one but others are available and new ones are coming up everyday. Use at least one Intrusion Detection System Visual Zone is a good one that is compatible with ZA.3. Chat ProgramsBeware when victimization chat programs like IRC, ICQ, Yahoo, etc. When using these programs, your IP address is open(a) leaving room for the other person to scan your computer feeling for ways to break in.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment