| IndiaInfoHub The Name Speaks Everything about what this forum is all about .... |
|
| Safety Tips To Keep Your Computer Safe | |
| | Author | Message |
---|
Maisha Administrator
Posts : 64 Reputation : 13 Join date : 2011-07-23 Location : Mumbai
| Subject: Safety Tips To Keep Your Computer Safe Fri Jul 29, 2011 1:23 pm | |
| Your Antivirus software protects you against thousands of threats, but even the best security software in the world can't guarantee that your system will never be infected. There are viruses that are specifically designed to evade detection and even disable anti-virus software.
Here are some suggestions to avoid viruses in near future:
>> BEFORE PROVIDING ANY INFORMATION ON ANY WEBSITES CHECK WHETHER THAT WEBSITES START WITH...HTTPS....THAT MEANS HYPER TEXT TRANSFER PROTOCOL SECURED.
1. Run a liveupdate on daily basis so that virus definitions would get updated and no new viruses can harm your system.. 2. Run a full system scan always after 7 days to diagnose the system with new infections like Spyware and Trojans.. 3. Never open attachments from unknown sources or attachments you are not expecting. Do not open any unknown or spam emails. 4. Always scan diskettes, CD's and any other removable media before using them. 5. Do not click on any unwanted applications or do not download any free softwares, musics and movies. 6. Do not install any unapproved software on your computer. 7. Beware of pop up windows on the internet. Many pop ups are false advertising and a gateway to Spyware, viruses and adware. In order to close these popups you can use/press [ ALT F4 ] to close pop ups or any window which is at the top. >> How to terminate a pop-up in case the [ ALT F4 ] doesn't help: a. Right Click on the Start bar and Click on Task Manager b. Click on Applications Tab in the Task Manager c. You will see list of applications d. Select the suspicious one. (It will get highlighted) e. Terminate it using the End Task Button at the bottom of the Task Manager 8. Do not visit any unsecured websites. 9. Check before you download any videos from youtube.com because they may contain some viruses. 10. Beware of opening any URL or Link on Facebook.com coz they can download the virus in the computer and harm your computer.
11. No matter how nasty a virus maybe, initially it will download the infected file on your computer in the form of a junk file. These junk files are found in the temporary locations. Clearing off these junks helps you keep your computer safe. Files found in these locations are none of your use. Steps to delete some unwanted files: [ To delete the files permanently from system ( i.e. not to send them in recycle bin) press [SHIFT (press & hold) DEL] key from key board ], >> Start-Run-%temp% (For all>>>{Win XP, Vista and Win 7}) >> Start-Run-temp (For all>>>{Win XP, Vista and Win 7}) >> Start-Run-Prefetch (For all>>>{Win XP, Vista and Win 7}) >> Start-Run-Cookies( ONLY for Windows XP)
12. Your computer is good but if you will upgrade the RAM of the computer it will give you fast speed, as RAM is responsible for speed. 13. Add numbers and symbols (Example - @#$*) to passwords. A strong password is a safe password. 14. Do the disc defragmentation once in a month, but don't do it more frequently. PATH: right click on [C: drive], out of all options click on PROPERTIES, click on TOOLS tab, and click on disc defragment. Then click on defragment now.
>> How to prevent Viruses: 1. Beware of pop up windows on the internet. Many pop ups are false advertising and a gateway to Spyware, viruses and adware. 2. Free software does not always mean its good software. Beware what you download and install. Free software has a higher rate of Spyware and adware being attached to it. Not all free software is bad software; just know what you are downloading. 3. Never download an email attachment that comes from someone you do not know.
>>THEN ONCE EVERYTHING IS DONE JUST GO AHEAD AND EMPTY YOUR RECYCLE BIN
Tips to keep Email safe.
1. Do not give your email credentials to anyone that you don’t trust. When you decide to give your email address to a website, first read the privacy or guest email usage to ensure that your email is safe. 2. Don’t reply to spam message. When you reply to a spam message, you are confirming your email address to spammer legitimacy. 3. While using your email id for any online transactions, check if there is an additional/alternate service. 4. Do not post your email in a website, or in any place that can be known by public like in newsgroup, contact list, Chat room etc. By doing so, you are inviting a spammer to send spam to your email. 5. Do not open any spam email. It will alert the spam server that your email is being used . 6. When you are asked to type your email ID in an online form, like comment form etc, use fake email address, if you are not comfortable to give your email address. 7. Understanding the nature of the attachment is the first step towards email safety. Any executable type attachment has the potential to be infected. This covers a wide range of extensions. By default, Windows suppresses file extensions. Hence it is very important to ensure that the file extension viewing is enabled. 8. If you do not need the attachment, don't open it. Delete the email instead. 9. Visit the Windows update site monthly to ensure all necessary patches are installed.
SPAM MAIL issue Identify a SPAM Email: * Messages that do not include your email address in the TO: or CC: fields are common forms of Spam * Some Spam can contain offensive language or links to Web sites with inappropriate content What To Do: * If you suspect an email is Spam, do not respond, just delete it * Consider disabling the email’s preview pane and reading emails in plain text * Reject all Instant Messages from persons who are not on your Buddy list * Do not click on URL links within IM unless from a known source and expected * Keep software and security patches up to date Change your email passwords and security questions immediately with the help of your Internet Service Provider.
Spyware frequently attempts to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user ... Therefore; >>>>Be selective about what you download to your computer >>>>Read licensing agreements >>>>Watch out for anti-spyware scams >>>>Beware of clickable ads >>>>Keep your Internet browser up to date >>>>Scan your computer often >>>>Do not accept or open suspicious error dialogs from within the browser Spyware may come as part of a "free deal" offer - do not accept free deals >>>>Always read carefully the End User License agreement at Install time and cancel if other “programs” are being installed as part of the desired program
Many "free" programs downloaded from the web install software that tracks your behavior and displays unwanted advertisements ... Some web pages will attempt to install spyware when you visit their page ... Do not accept or open suspicious error dialogs from within the browser.
Fraudulent websites are used to steal personal information ... Phishing attacks re-direct victims to a bogus Web site where malicious code is downloaded and used to collect sensitive information ... When visiting a website, type the address directly into the browser rather than following a link ... Only provide personal information on sites that have "https" in the web address or have a lock icon at bottom of the browser ... Do not provide personal information to any unsolicited requests for information.
Malware may spread through common peer-to-peer file sharing applications by placing themselves in shared directories with enticing filenames. Scan all files with an Internet Security solution before transferring them to your system. Only transfer files from a well known source.
Last edited by Maisha on Sat Jul 30, 2011 2:48 pm; edited 1 time in total | |
| | | Maisha Administrator
Posts : 64 Reputation : 13 Join date : 2011-07-23 Location : Mumbai
| Subject: Re: Safety Tips To Keep Your Computer Safe Sat Jul 30, 2011 2:43 pm | |
| Spyware frequently attempts to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user ... Therefore;
>>>>Be selective about what you download to your computer >>>>Read licensing agreements >>>>Watch out for anti-spyware scams >>>>Beware of clickable ads >>>>Keep your Internet browser up to date >>>>Scan your computer often >>>>Do not accept or open suspicious error dialogs from within the browser Spyware may come as part of a "free deal" offer - do not accept free deals >>>>Always read carefully the End User License agreement at Install time and cancel if other "programs" are being installed as part of the desired program >>>>Keep software and security patches up to date Malware may spread through common peer-to-peer file sharing applications by placing themselves in shared directories with enticing filenames. Scan all files with an Internet Security solution before transferring them to your system. Only transfer files from a well known source.
Some adware may be bundled with some "free" versions of popular file-sharing programs ... Always read carefully the End User License agreement at Install time and cancel if other "programs" are being installed as part of the desired program.
IM attachments, just like email attachments, can carry destructive viruses, Trojan horses, and worms ... Some new worms use IM software to send themselves to every member of your buddy list ... Don't open attachments or click on Web links sent by someone you don't know ... Don't send files over IM ... If a person on your Buddy list is sending strange messages, files, or web site links, terminate your IM session.
Fraudulent websites are used to steal personal information ... Phishing attacks re-direct victims to a bogus Web site where malicious code is downloaded and used to collect sensitive information ... When visiting a website, type the address directly into the browser rather than following a link ... Only provide personal information on sites that have "https" in the web address or have a lock icon at bottom of the browser ... Do not provide personal information to any unsolicited requests for information.
Many "free" programs downloaded from the web install software that tracks your behavior and displays unwanted advertisements ... Some web pages will attempt to install spyware when you visit their page ... Do not accept or open suspicious error dialogs from within the browser ... Spyware may come as part of a "free deal" offer - Do not accept free deals.
****************************************************** Your Antivirus software protects you against thousands of threats, but even the best security software in the world can't guarantee that your system will never be infected. There are viruses that are specifically designed to evade detection and even disable anti-virus software. ****************************************************** What To Do If You're a Victim of CYBERCRIME
Disconnect immediately. Unplug the network cable, phone, or cable line from your machine. This can prevent data from being leaked back to the attacker. Disconnecting your network connection is a sure-fire way to put a stop to the immediate damage. If you are uncomfortable doing this, you may find it easier to simply disable the network connection.
Sensitive data may be leaked by crimeware and it also may be inadvertently destroyed or lost during the clean-up effort. If you have back-up software installed, make a copy of your valuable files such as your photos, videos and other personal or work files to a back-up hard drive or removable media, such as a CD or DVD. This will ensure your information's availability after the computer is free of crimeware.
What To Do If You're a Victim of Online Fraud
Close affected accounts immediately. In the best-case scenario, you will be able to shut-down or change any credit card, bank or other online service accounts before they can be leveraged by the thief. Err on the side of safety: a little more trouble taken up front to freeze or change accounts can save much more effort later disputing fraudulent purchases by a cybercriminal. While you have your financial institution on the phone or access to them in-person, use this time to discuss any impact this might have on your account and the steps you would need to take if the account was compromised during the attack (i.e. How can you dispute the charges? Can you recover the stolen funds?).
Set up a fraud alert with the 3 national consumer reporting agencies (Equifax, Experian, TransUnion). Contacting just one of the 3 companies will set up the alert for all of them. The fraud alert will tell creditors to contact you directly before making any changes to existing accounts to trying to open up new ones. This is an essential step to control the amount of damage an identity thief can do with your stolen information. This step also allows you to order your credit reports from each of the agencies for free.
File a police report
Contact government agencies. If your driver's license or social security number have been stolen, you will need to contact the Department of Motor Vehicles and the Social Security Association respectively. Additionally, you should report your identity theft to the Federal Trade Commission whom maintains an identity theft database used by law enforcement agencies for investigations.
Watch your credit reports closely. Keeping a sharp eye on your accounts from all three credit reporting agencies is essential as information may not be the same across all three. Some of the credit reporting agencies offer all-in-one reports or just-in-time alerting services for a fee. Depending on the level of potential impact and your concern, it may be worth the quick turn-around time and easy viewing to pay for these additional services. Remember that it may take some time before all of the fraudulent activity to appear on your credit reports.
Look for signs of identity theft. It's natural to have your guard up after having your identity stolen. During this time, be on the look out for odd things in the mail, including credit cards you did not request and bills that you normally receive which have gone missing. Being contacted by vendors regarding accounts you are unaware of, or even worse, by debt collectors for purchases someone else made, are clear signs of lingering identity theft problems. | |
| | | | Safety Tips To Keep Your Computer Safe | |
|
Similar topics | |
|
| Permissions in this forum: | You cannot reply to topics in this forum
| |
| |
| |
|