iklan

add

Your Ad Here

Hello Friends ..

I'am Newbie.... But I Will Work Hard.

Saturday, August 25, 2007

Setting Up A Safe Home Network

Setting Up A Safe Home Network
Securing the computer in your home is a task that requires your full and serious attention.
They take a lot of your time and there are steps that need to be done. The following are some of the tips and advice you could do to be able to secure your very own personal computer.
Anti-virus programs is a must
Imagine it this way, would you allow someone to knock at your door and enter your own living space in order to make you buy something or use your own telephone?
If they were neat and presentable enough you could probably let them inside your own home, but just like anyone else, you definitely would be watching their every move.
Observe just what it is you have done. You have already profiled that person and based on the profile you have come up with, have also decided what you will do.
This is because you are very much cautious and concerned on just who enters your own space.
Basically, this is how anti-virus programs work.
These programs scan all contents of every file, looking for patterns that are specific and one that would match a particular profile. This is basically termed as virus signature – or something that is notoriously harmful to your computer.
Every file that has a signature match, the program provides options on just how it is it should respond. One such response is by removing the patterns that are offensive or one that destroys the file.
A virus basically works this way. They are like salesmen who knock in your own living space and they would get you to buy or listen to their sales pitch. However, they could try to pilfer your money or valuables.
One way to know if a particular scammer is prowling in your neighborhood is probably by reading about them in the news or seeing them in a tv news report. These reports could give you an idea of what these scammers look like or what are the things to be wary and watch out for.
Anti-virus software programs basically work similarly. When the vendors know of a new potentially threatening virus, they have a set of updated signature viruses that could include the new virus threat.
Scan and check, check and scan
Other ways and means for viruses to enter your personal computer is via floppy disks, web sites, email, CD-ROM as well as downloaded files.
As much as possible, all these avenues must be checked if they contain viruses or not.
For instance, prior to using a particular floppy disk, it must first be checked for any viruses.
Also, when downloading a specific file from the net, these must be checked for any viruses. Your own anti-virus software program usually allows you to specify and check these places for any viruses. They may also do this scan automatically.
Patch it now, patch it good
The instance your computer’s system breaks down, do you have an idea on how you should restore its functions?
Many vendors have patches whose purpose is to fix any types of bugs. Usually, vendors offer patches that are free in their own web sites. When purchasing programs, it is a great idea if you ask the vendor how they supply patches.
Software vendor programs also have a service that allows you to a recall. Notices for patches could be received via e-mail through mailing list subscription. Through this service, one can easily learn computer problems even if you have yet to discover them and before any intruders could have the opportunity to exploit your computer’s system.
Be cautious when reading attachments via e-mailAlways be careful when opening received e-mails that carry attachments. Sometimes, the potentially threatening messages could come from unsolicited e-mails.
To be able to determine if an email is safe or not, it would be best to conduct the following test and ask these questions: Was the email sent by someone you know? Did you receive this e-mail before? Is the subject of the email described in a clear manner?
A suspicious e-mail usually read as BradPitt.jpg.vbs. Worms could travel this way and reading / opening it could bring damage to your computer system.
All in all, caution and care is needed to be able to protect your computer from unnecessary attacks by malicious viruses and worms.

No comments: