.

Monday, March 25, 2019

Protecting Yourself Online :: essays research papers

Protecting Yourself OnlineIn this paper we will discuss m all basic steps to better secure your system. We will discuss the pursuance four (4) areasvEmailvInternetv haggle ProgramsvVirus Protection1.EmailDo not rough any email attachment that you receive from anyone without checking first - not notwithstanding from your cosyst friends. If someone has to send you a medical student bill rehearse up them to convert it into *.rtf or *.txt format and then send. If you must open any medico extension charge ups, you can first use one of those doc file readers acquirable free on the net. Alternatively, you could convert the extension of the file (doc) to text (txt) and then open it with your text editor and see what the file is all about. If you do decide to open it as a doc file in MS Word ensure that the macro trade protection setting is set to HIGHIn your email client turn back off the receiving HTML mails option. 2. InternetvSet Explorer to exhibit file extensions. For t his go to Windows Explorer/ My Computers Tools Folder Options View (tab) and uncheck the Hide wedge Extension For Known File Type box. This will help you to block clicking on hoaxes. vDo not halt out your development on the net. While surfing the web you will see that on that point are sites that will ask for your personal information. Do not give information about yourself and hide out information about yourself as long as you can. v Disable JAVA and Active X. To do this under MS IE, move your default-browsing zone to High security in Tools-Internet Options. This switches off 90% of MSIE exploits. You dont have to enter the sites that dont let you enter without umber and Active X enabled. Know how to read cookies and take a close look at them. Use software like cookie crusher and each time you log online crush all your previously received cookies. If you use IE then make sure that you run Windows Update at least once a week. vUse personal firewall software. regulate Ala rm (ZA) is a good one but others are available and new ones are coming up everyday. Use at least one Intrusion Detection System Visual Zone is a good one that is compatible with ZA.3. Chat ProgramsBeware when using chew programs like IRC, ICQ, Yahoo, etc. When using these programs, your IP address is exposed loss room for the other person to scan your computer looking for slipway to break in.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.