Saturday, June 1, 2019

Protecting Yourself Online :: essays research papers

Protecting Yourself OnlineIn this paper we will discuss some basic steps to better stiff your system. We will discuss the following four (4) areasvEmailvInternetv gibber ProgramsvVirus Protection1.EmailDo not open any email attachment that you receive from anyone without checking first - not even from your closest friends. If someone has to send you a commercialism appoint ask them to convert it into *.rtf or *.txt format and then send. If you must open any doc extension files, you can first use one of those doc file readers available free on the net. Alternatively, you could convert the extension of the file (doc) to text (txt) and then open it with your text editor and see what the file is totally about. If you do decide to open it as a doc file in MS Word ensure that the macro security clanting is set to HIGHIn your email client turn off the receiving HTML mails option. 2. InternetvSet explorer to show file extensions. For this go to Windows Explorer/ My Computers Tools Folder Options View (tab) and uncheck the Hide File Extension For Known File Type box. This will help you to avoid clicking on hoaxes. vDo not give out your information on the net. While surfing the web you will see that there are sites that will ask for your personal information. Do not give information about yourself and hide out information about yourself as long as you can. v Disable JAVA and nimble X. To do this under MS IE, move your default-browsing zone to High security in Tools-Internet Options. This switches off 90% of MSIE exploits. You dont have to enter the sites that dont let you enter without umber and Active X enabled. Know how to read cookies and take a close look at them. Use software like cookie crusher and every sentence you log online crush all your previously received cookies. If you use IE then make sure that you run Windows Update at least one time a week. vUse personal firewall software. Zone Alarm (ZA) is a good one but others are available and new on es are orgasm up everyday. Use at least one Intrusion Detection System Visual Zone is a good one that is compatible with ZA.3. Chat ProgramsBeware when using chat programs like IRC, ICQ, Yahoo, etc. When using these programs, your IP address is exposed leaving room for the other person to scan your computer looking for ways to break in.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.