|
|
A Simple Guide to Web Hosting
Personal Computers, Servers Or ISP? You need a server to host your site so that it can be viewed over the internet. This server can either be an Internet Service Provider or of your own. Most websites are hosted by an Internet Service Provider...
Alternatives to Tape Backup
You may ask, isn't tape an anachronism in the age of optical disks, removable hard drives and a plethora of whiz-bang, random-access storage media? In many ways it is, but because of the nature of backup it doesn't really matter that tape is slow...
Getting Patched with Windows Service Pack
Are you one of those people that keeps track of recalls, just in case one of your most recent purchases gets recalled? Well, some of us do, but many of us don�t. For those of us who don�t keep up with recalls in general, it�s just as easy to be...
Refurbished Computers on the Internet
What is a Refurbished Computer?
Refurbished Computers. Remanufactured Computers. Reconditioned Computers. Essentially, all of these terms refer to the same thing. But what does refurbished really mean? A refurbished computer is one that is...
Worms, Horses, Bugs and Thugs
Worms, Horses, Bugs and Thugs by John Geiger
"A determined hacker is hard to stop. But those malevolent crackers would rather walk through an open door than pick a lock" writes Michael Fitzgerald of Extreme Tech.
With all of the viruses, worms,...
|
|
|
|
|
|
|
|
Is My PC Vulnerable on the Internet?
Think about this: Is a simple antivirus application enough to protect your PC against all threats?
No longer are viruses the only threat on the internet. In recent years other threats have evolved which include spyware, adware, hacking, identity theft, information theft, pop-ups and the loss of information.
Let�s begin with the basics. We all need to protect our PC in the same way we protect our home, car and bank account. We wouldn�t give a stranger the keys to our car, home or bank account now would we. If you don�t protect your PC it is like giving the keys to a stranger and letting him/her have full access to your PC. Once the stranger has the keys they can snoop around and take whatever they want. I know, your thinking how can they do this, my computer is in my house and my doors are locked. Well, today you can be anywhere in the world and access someone�s computer via the internet. Since the introduction of cable modems and DSL everyone�s PC is online all the time and accessible.
Why do I need to protect my PC, I don�t keep any important information on it? Ask yourself a couple of questions.
1.Do I bank online? 2.Do I shop online? 3.Do I create documents, spreadsheets? 4.Do I let other people use my PC? 5.Do I download music, files onto my PC?
If you answered yes to any of these questions then your PC is vulnerable. If you bank online then you are sending personal confidential information to your bank via the Internet. For Example: Let�s say you are infected with spyware and you are typing in your account number plus password. A spyware installation can record key strokes and then send them off to a site on the internet. Now the person who setup the site has your account number and password to your bank. Here is one more example, if you answered yes to I let other people use my pc, here is what happens. The other person decides that they like this new cool piece of software. They download and double click on the exe, msi or whatever installs the software. The adware, spyware or virus installs. Now the infection is installed and now it can start stealing confidential information or cause havoc on your PC. You get onto the PC as always, since you don�t know this has happened and start doing what you always do, type documents, go to chat rooms, do your banking online, reconcile your banking with quicken and all this time your confidential information is stolen and you are completely unaware that this occurred.
The million dollar question, what do I do? Well, you can follow this approach. 1.Install a Spyware application and install and configure correctly. If you already have spyware application installed make sure it is up to date and make
sure that is configured properly. 2.Install an Adware application and install and configure properly. If you already have adware application installed make sure it is up to date and make sure that is configured properly. 3.Install an AntiVirus application and install and configure properly. If you already have antivirus application installed make sure it is up to date and make sure that is configured properly. 4.Install backup software, why because if something does get through your defenses or delete something by accident you always have a way of retrieving the information. You should try to backup your system at least every other day. 5.Install Encryption software. This software will encrypt files like word docs, spreadsheets, banking file on quicken. This way if someone does steal your information they will not be able to read it. 6.Install a Firewall. The Firewall can either be software or hardware based. I would install both especially if you bring your laptop with you and connect to the internet at different locations. The Firewall will block hackers trying to scan your system while you are on the Internet.
Many people have these applications installed but they do not configure them correctly. Just installing the application does not mean that the application is working properly to stop the threat/infection. On some applications you need to configure the setting to make the application work the way it was designed to. Find out how to configure and install the software properly either by reading a how to book or getting someone to help. If you already have the application installed make sure it is up to date and make sure that is configured properly. All of the software needs to be up to date and kept current. As new threats are release on the internet, all applications will need the current updates to fight these threats.
If you would like to find out if you�re PC is protected you can take the test. This will not harm your PC it just checks for vulnerabilities and lets you know if you passed or failed. The application is a single exe and DOES NOT NEED TO BE INSTALLED. All you need to do is run the test application and follow the instructions. http://www.mweffa.com/urltrak/control/redirect.php?id=273
All articles are written by HowtoPCGuru! HowtoPCGuru http://www.howtopcguru.com.com/ You may reproduce and use this article just so long as you add a link (http://www.howtopcguru.com) down at the bottom. HowtoPCGuru, All the latest articles, tools, news, file hosting and more!
About the Author
David Fishman has worked with computer, software for 15 years with major corporations. He has helped people with their home PC to secure, maintain, update.
|
|
|
|
|
Tom's Hardware |
: Tom's Hardware Guide is the Internet's premiere resource for hardware news and reviews. |
www.tomshardware.com |
|
HardwareCentral - Your source for in-depth computer hardware info. |
HardwareCentral is the #1 Hardware Information Resource on the 'Net. Featuring over 600 pages of Hardware information, including advice on System ... |
www.hardwarecentral.com |
|
Apple - Hardware |
Find your favorite Mac, iPod and other Apple accessories. |
www.apple.com |
|
Ace Hardware |
Nationwide (United States) hardware and home improvement retailer. Includes products, dealer locator and corporate information. |
www.acehardware.com |
|
Computer hardware - Wikipedia, the free encyclopedia |
The hardware of a computer is infrequently changed, in comparison with software and ... Personal computers, the computer hardware familiar to most people, ... |
en.wikipedia.org |
|
Hardware - Wikipedia, the free encyclopedia |
Hardware is the general term that is used to describe physical artifacts of a technology. ... In a looser sense, hardware can be major military equipment, ... |
en.wikipedia.org |
|
Open Directory - Computers: Hardware |
Hardware Central - Computing-centric community providing vital information, support, tools and interaction facilities for power computer users and ... |
dmoz.org |
|
Microsoft Hardware � Home Page |
Learn about Microsoft mice, keyboards, desktop sets, webcams, media center peripherals, gaming products, fingerprint readers and presentation tools. |
www.microsoft.com |
|
AnandTech: your source for hardware analysis and news |
Independent hands-on reviews of computer hardware such as motherboards, graphic cards, and CPUs. |
www.anandtech.com |
|
hardware.com - Routers, switches, firewalls, servers, memory ... |
Supplier of new and refurbished networking hardware and approved and compatible network accessories. Located in the United Kingdom. |
www.hardware.com |
|
Slashdot: News for nerds, stuff that matters |
From the article: "Although the news caused barely a ripple of reaction in the audience of software and hardware engineers, there are industry analysts who ... |
hardware.slashdot.org |
|
InformationWeek HardwareTech Center |
Our hardware coverage ranges from mobile computers and PDAs to servers and supercomputers, and the infrastructure issues enterprises deal with every day. ... |
www.informationweek.com |
|
What is hardware? - A Word Definition From the Webopedia Computer ... |
This page describes the term hardware and lists other pages on the Web where you can find additional information. |
www.webopedia.com |
|
Google Directory - Computers > Hardware |
Hardware Central - http://www.hardwarecentral.com/ Computing-centric community providing vital information, support, tools and interaction facilities for ... |
www.google.com |
|
Gifts: Unique Gifts & Gift Ideas at Restoration Hardware |
At Restoration Hardware, you'll explore an exceptional world of high quality unique gifts. Browse our products to find gift ideas & more at Restoration ... |
www.restorationhardware.com |
|
HwB: The Hardware Book |
HwB provides you with circuits, pinouts, cable/adapter descriptions and other technical information. |
www.hardwarebook.net |
|
Reg Hardware: Product News and Gadget Reviews from The Register |
More Gadgets Stuff. 5th December 2006 12:09 GMT. Author: Reg Hardware ... 27th November 2006 15:31 GMT. Author: The Hardware Widow ... |
www.reghardware.co.uk |
|
red hat hardware compatibility lists |
hardware.redhat.com/ - Similar pages |
|
|
TrueValue.com |
Here's our tip to hang strands of lights with ease. Jeanenne & Jim Tucker Plantation True Value Hardware Richmond, TX ... |
www.truevalue.com |
|
A complete illustrated Guide to the PC Hardware |
A complete illustrated Guide to the PC Hardware, Logic and Architecture. 500 easy-read articles about the modern PC. Understand the basic architecture of ... |
www.karbosguide.com |
|
|