This presentation discusses a number of general strategies you should consider employing to protect your computer against both the threats of hacking and importation of viruses.
It is part of my FREE "Computer System Protection - Advanced Methods" training course now available on Udemy.com. Watch video to get the links.
FIND ME ONLINE
https://youtube.com/DanGrijzenhout123 : View my created videos posted on YouTube and SUBSCRIBE!
http://howtoguru.org: My primary business site. This site contains my content, discounted Udemy course coupons, access to my books and: Software, electronics and other products that I have experience with and recommend as being good quality.
https://www.udemy.com/u/dan-grijzenhout/ My profile page on the Udemy.com training site. Shows all of my currently available training courses.
http://www.amazon.com/?tag=onltrabydangr-20 Support my content creation efforts and channel by shopping on Amazon using this link to get there. Thank you for your support.
http://howto-guru.com: My blog and “lead capture” site. I use this to communicate interactively with my subscribers and to promote products I recommend. (Helps me keep the lights on here!)
https://itunes.apple.com/ca/podcast/online-business-training-by/id1041824459/ : To find my ITunes podcast series
https://www.pinterest.com/dgrijzenhout/: My stuff and my researched items are pinned here – check them out – plus some fun stuff I like.
https://plus.google.com/u/0/+DanGrijz... View my content contributions on Google Plus
https://www.facebook.com/Howtoguru.org : View my “Howtoguru.org” business page on Facebook.
https://twitter.com/DGrijzenhout : Find me on Twitter
2. General Computer Protection Tips
In addition to buying software for anti-hacking and anti-virus protection, there are a number of
additional strategies that you can employ on your computer and as you operate your computer to help
protect it against intrusion and to protect your information wherever you may choose to let it reside.
Here’s a list of some tips that will help you.
Turn off or logout of your computer when not using it – the less time your computer is online, the less
it is being seen by externals that may mean you harm.
If you have more than one person in your household using your computer, set up separate “firewalled”
accounts for each of them – don’t let people onto your system through your own login and password.
Keep your anti-virus software as current as you can. Update it regularly so that you are protected
against the newer viruses that have been identified and have been guarded against by your anti-virus
software provider.
Increase the privacy settings on your computer. In an upcoming lecture, I show you how to update
these settings if you are using Windows 10. Watch that video as well and also be looking to update
your privacy settings on older versions of Windows if that is what you are running on your computer.
3. General Computer Protection Tips - 2
Be careful opening PDF files you receive from external sources. Hackers and software virus creators
have in recent times found this to be an effective platform for sending out their damage causing
payloads.
Regarding e-mails, don’t be curious. If you don’t know where an e-mail came from, don’t open it. If
you do open an e-mail from someone you don’t know and/or that you received in an unsolicited
manner, do not click on any links found within the e-mail. Executable viruses are sometimes attached
to what you think is just a link to another site.
If you are concerned about the authenticity of an e-mail address when you have received an e-mail,
check it out by looking at the “Details” dropdown you can click next to the e-mail name. I have
sometimes even taken this one step further by checking out their e-mail domain address using a
domain provider to do a “Who Is” search when I am really wondering about where something came
from.
Be careful of all downloads to your computer. Be sure you know the source is safe and you are on a
real webpage belonging to that source when you download the content. Hackers are now setting up
“Fake” webpages that look like real businesses to lure you in so that they can access you through
downloads from their sites.
4. General Computer Protection Tips - 3
Using the “Cloud” for storage is risky – even places like Google Drive, Dropbox, etc. can be hacked.
Cloud storage locations seem to be prime targets for hackers. These are convenient storage and data
backup locations for many so if you want to use them, here are a few tips that could save the privacy of
your content there.
The simplest protection method is to only send encrypted or Zipped content up there for storage. If you are
using zip files, use the Zip password feature before sending. This helps to protect your content even if that
site gets hacked.
Encrypt your important files on your computer first before sending them to the cloud. In fact, it is a good idea
to only store your important files on your computer in encrypted formats only even when they reside on your
computer. Encryption products like MEGA and SpiderOak can help you here. If you are really working with
sensitive content regularly, you can also implement products like encFS – it takes a couple of hours to install,
but it can setup folders on your computer that automatically encode all files you move there. This folder and
its subsets look and behave just like normal folders on your PC so once installed, encryption is automatic for
you.
Use of plugins such as webcams and microphones. Set your privacy settings to disallow applications to
use them on your PC and disconnect external microphones and webcams when not in use. It is not
that difficult for an external to get into most systems and take control of these devices to watch you or
record you as you do things in and around your computer.
5. General Computer Protection Tips - 4
If you are on a Microsoft platform, consider installing their free application – “The Enhanced
Mitigation Experience Toolkit.” Microsoft Quote: “The Enhanced Mitigation Experience Toolkit (EMET)
is a utility that helps prevent vulnerabilities in software from being successfully exploited. EMET
achieves this goal by using security mitigation technologies. These technologies function as special
protections and obstacles that an exploit author must defeat to exploit software vulnerabilities. These
security mitigation technologies do not guarantee that vulnerabilities cannot be exploited. However,
they work to make exploitation as difficult as possible to perform. EMET also provides a configurable
SSL/TLS certificate pinning feature that is called Certificate Trust. This feature is intended to detect
(and stop, with EMET 5.0) man-in-the-middle attacks that are leveraging the public key infrastructure
(PKI).”
When you are out browsing websites that you may be clicking content and links on, be looking for
https sites where you can – but don’t just trust the (s) on the end of the url’s http. Click on the
associated lockbox to check out the legitimacy of the security certificate details for the webpage being
explored.
Scorpion System Protection is an anti-hacking software product you may consider purchasing. Built to
support Microsoft, the NIST, DoD, and Homeland Security remote access standards, this product will
help increase the security of your computer to Government usage standards.
6. General Computer Protection Tips - 5
Sandboxie is a protection application you can purchase for both home and business use. It is a good
place to run new software you have concerns about using plus it has a lot of great other features.
Sandboxie uses isolation technology to separate programs from your underlying operating system
preventing unwanted changes from happening to your personal data, programs and applications that
rest safely on your hard drive.
When surfing the Internet, never login from your computer while in Administrator mode on your
computer. You do not want this login information to be shared out there in Cyberspace. Only go to the
Internet from user accounts you have set up on your computer.
7. Thank You for Watching this Lecture
In summary, implementing some or all of
these ideas on your computer
and in your online life will go a long way to
protecting you.
Take My Full Computer System Protection Course
- FREE NOW on Udemy!
- https://www.udemy.com/computer-system-protection-advanced-methods/