How to protect computers

Author: Laura McKinney
Date Of Creation: 2 August 2021
Update Date: 1 July 2024
Anonim
Computer Basics: Protecting Your Computer
Video: Computer Basics: Protecting Your Computer

Content

So you just bought a new computer at home (not for business use, or as a server) and want to protect it from viruses and malware. While the privacy aspect (including encryption, passwords, and anonymity) is also part of protection, its scope is broad enough to be addressed separately. Imagine, private accounts for 1/2 of the content in steps protect computer. The problems of data backup, defragmentation and system restore points are only indirectly related. Backups make your data more susceptible to being stolen and stolen.

This article assumes that you are trying to use a network (such as the Internet), share files on a USB stick, or a computer that is shared by many people. If you fall outside the above cases, most of the steps below may become unnecessary because the computer is already protected.

Steps


  1. Choose an operating system based on its security capabilities and vulnerabilities (Linux is famous for its free-running viruses, OpenBSD focuses on security). Find out if the operating system limits the number of user accounts, file permissions, and is regularly updated. Make sure your computer is running the latest operating system and software by keeping it up to date with more secure versions.

  2. Choose a web browser based on security and vulnerability because most malware gets in through a web browser. You also need to disable scripting (NoScript, Privoxy, and Proxomitron software can do this). Independent computer security analysts (such as the US Computer Emergency Readiness Group US-CERT) and crackers (similar to hackers) say that Google Chrome is a safer browser than ever. on the sandbox feature. Therefore, it is difficult for bad guys to penetrate the system and infect your browser with malware if you use Google Chrome.

  3. When setting up, you should use strong passwords for user accounts, router credentials, and so on. Hackers can use dictionary and brute force attacks.
  4. Use reliable sources. When it comes to software (including anti-virus software) you should download it from these reliable source (softpedia, download, snapfiles, tucows, fileplanet, betanews, sourceforge) or repository (for Linux).
  5. Install antivirus software (especially if you're using a peer-to-peer network). Anti-virus software is designed to handle malicious programs including viruses, trojan / rootkit malware, keyloggers (programs that record keyboard and mouse actions) and worms. Find out if your antivirus software offers real-time, on-demand, or access scans. At the same time, research whether the software is based on heuristic techniques. Avast and AVG are very good free versions. You can choose between the two, then download and set up for periodic scans. Note: Antivirus software must be updated regularly.
  6. Download and install anti-spyware software like Spybot Search and Destroy, HijackThis or Ad-aware and scan it regularly. In short, you need to run good anti-spyware and anti-malware programs like Spybot before you even think about surfing the web. Many websites out there exploit the weaknesses and vulnerabilities of Microsoft Explorer to bring malicious code into the computer without the user's knowledge (it is too late to know it!).
  7. Download and install the firewall. You can choose either ZoneAlarm or Comodo Firewall (Kerio, WinRoute and Linux come with iptables). If you use a router this process adds an extra layer of security by acting similar to a hardware firewall.
  8. Close all ports. Hackers often use port scanning. On Ubuntu Linux, all ports are always closed by default.
  9. Penetration Testing (Pentest). Start with the ping command, then run a simple scan with the Nmap tool. The Backtrack Linux distribution is also very helpful.
  10. You might consider running intrusion detection software (HIDS) such as OSSEC, Tripwire, or rkhunter.
  11. Don't forget the physical security aspect! You should consider using a Kensington lock for theft / unauthorized access. Besides, please set BIOS password and prevent access to computer or peripheral device (USB, CD drive, etc.). An external hard drive or USB should not be used to store important data as these are easily compromised or lost / stolen.
    • Encryption can be effective against theft.You should encrypt at least all of your user accounts instead of just a few files. While it can affect performance, it is essential. Truecrypt works on Windows, OS X, and Linux, while FreeOTFE is for Windows and Linux. In the System Preferences Security section above OS X (version 10.3 or later), click on FileVault (this can take anywhere from a few minutes to hours). On Linux Ubuntu (9.04 and later) in step 5 of 6, you need to select "Require my password to login and decrypt my home folder" (Require my password to login and decrypt home directory). This process uses the "ecryptfs" package.
    advertisement

Advice

  • Memorize: you must update your antivirus program regularly.
  • In most cases, the most important factor to the computer is the user. Computers depend on people; if you run infected software or do not install security updates in time, the system will affected.
  • Consider securing through obscurity or design.
  • Some viruses block the operating system's access to the infected file to an anti-virus program. In these cases, the system should be subjected to low level expert inspection and removal.
  • You can refer to English courses on HackerHighSchool.
  • Security Now is an extremely popular podcast.
  • Windows operating systems usually require an update through Windows / Microsoft Update. Microsoft no longer creates updates for Windows XP and earlier, if you use these operating systems, the system will not be able to run some software. At this point the best way is to upgrade, change the operating system or buy a new computer.

Warning

  • If the data has to be destroyed to prevent unauthorized access, it is not wise to have multiple full backups of that type of data.
  • If you are encrypting your data, you need to MAKE SURE you don't forget the encryption key. If you forget this key, you run the risk of losing ALL of your data.
  • Make sure your computer has a built-in firewall.
  • You should only download software from reputable sources.
  • Antivirus software is not always effective. Don't just install the antivirus and forget about protection.