SlideShare a Scribd company logo
1 of 2
Download to read offline
Title:
5 Steps to Securing Your Windows XP Home Computer


Word Count:
612


Summary:
Learn the simple steps you need to take to protect your computer from common internet and other security
risks. It is easy and will not cost you a lot of money.



Keywords:
Computer Security, Anti Virus, Spyware, Firewall



Article Body:
Most people are aware that there are continuous security issues with Microsoft’s Windows operating system
and other programs. However, what most people do not realize is how easy it is to significantly improve
your computer’s security and reduce the likelihood of becoming a victim to ever increasingly sophisticated
threats that lurk on the internet. These steps should take less than a couple of hours to complete and should
not clean out your wallet.


1) Windows Update – the first crucial step you need to take to make sure that all your Microsoft applications
have all the latest product updates installed. These updates or “patches” address security vulnerabilities and
other issues. Microsoft usually issues these updates on a monthly cycle. Visit the Microsoft website or
switch on automatic updates from the Windows Control panel. Even if your “new” computer is second hand
this is still a critical first step. If you buy a used computer with Windows XP make sure Service Pack 2 or
SP2 is installed.


2) Strong Passwords - people often overlook this but having well thought through passwords is an important
element of your computer security. A strong password should include at least 8 characters with a mixture of
text, symbols and numbers. As a minimum you need to make sure the services most at risk have a strong
log-in password. These services include your bank, credit card, other financial services like PayPal, your
email address and any other services like Ebay which hackers can use to generate profit.


3) Anti Virus Protection – while it is fair to say the threat of the computer virus has receded during the last
couple of years they can still inflict serious damage on your computer. Part of the reason why the threat has
reduced is because PC manufactures are now more frequently bundling anti virus packages with their new
computers. For example last year my new Dell shipped with a 90-day trial of McAfee's Internet Security
Suite. The best bet here is to purchase a security package which includes firewall and anti virus software as
a minimum. Top brands include McAfee and Symantec Norton products. However, Microsoft has recently
entered the market with their "OneCare" offering which is very aggressively priced.


4) Firewall - if you are using a broadband connection then a firewall is definite requirement to manage the
traffic flowing between your computer and the internet. A firewall monitors the inbound internet traffic
passing through the ports of your computer. Better products also monitor outbound traffic from your
computer to the internet. As per above the best bet here is buy a firewall application as part of a security
package which most vendors offer as standard. If a hardware firewall is included as part of your router
package then you do not need anything else. A company called Zone Labs offer a great free firewall product
called Zone Alarm which should be used as a minimum. Windows XP does now ship with a free firewall but
the product does not monitor outbound communication and therefore I believe does not offer adequate
protection.


5) Anti Spyware Tool - this software is the last piece in your basic internet security set up. This tool helps
combat spyware and adware. There is a good mixture of free and paid versions on offer. Good free software
include Microsoft's Windows Defender, Spybot S&D or Ewido Anti-Malware. Ewido Anti-Malware is
frequently recommended in computer help forums. Be careful if you decide to purchase a solution. There are
a number of rogue vendors out there which aggressively push products which offer you little value. Stick to
trusted names like Webroot's Spy Sweeper or PC Tool's Spyware Doctor. These products always come out
well on independent tests.




Online project management

More Related Content

Viewers also liked (6)

Sesion cuento guise
Sesion cuento guiseSesion cuento guise
Sesion cuento guise
 
Apresentação1
Apresentação1Apresentação1
Apresentação1
 
Escolas dia da floresta
Escolas   dia da florestaEscolas   dia da floresta
Escolas dia da floresta
 
Academic , Technical and Legal Writing
Academic , Technical and Legal Writing Academic , Technical and Legal Writing
Academic , Technical and Legal Writing
 
Carta de Diego Arria
Carta de Diego ArriaCarta de Diego Arria
Carta de Diego Arria
 
Segunda_Chance-2
Segunda_Chance-2Segunda_Chance-2
Segunda_Chance-2
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

5 steps to_securing_your_windows_xp_home_computer

  • 1. Title: 5 Steps to Securing Your Windows XP Home Computer Word Count: 612 Summary: Learn the simple steps you need to take to protect your computer from common internet and other security risks. It is easy and will not cost you a lot of money. Keywords: Computer Security, Anti Virus, Spyware, Firewall Article Body: Most people are aware that there are continuous security issues with Microsoft’s Windows operating system and other programs. However, what most people do not realize is how easy it is to significantly improve your computer’s security and reduce the likelihood of becoming a victim to ever increasingly sophisticated threats that lurk on the internet. These steps should take less than a couple of hours to complete and should not clean out your wallet. 1) Windows Update – the first crucial step you need to take to make sure that all your Microsoft applications have all the latest product updates installed. These updates or “patches” address security vulnerabilities and other issues. Microsoft usually issues these updates on a monthly cycle. Visit the Microsoft website or switch on automatic updates from the Windows Control panel. Even if your “new” computer is second hand this is still a critical first step. If you buy a used computer with Windows XP make sure Service Pack 2 or SP2 is installed. 2) Strong Passwords - people often overlook this but having well thought through passwords is an important element of your computer security. A strong password should include at least 8 characters with a mixture of text, symbols and numbers. As a minimum you need to make sure the services most at risk have a strong log-in password. These services include your bank, credit card, other financial services like PayPal, your email address and any other services like Ebay which hackers can use to generate profit. 3) Anti Virus Protection – while it is fair to say the threat of the computer virus has receded during the last couple of years they can still inflict serious damage on your computer. Part of the reason why the threat has reduced is because PC manufactures are now more frequently bundling anti virus packages with their new computers. For example last year my new Dell shipped with a 90-day trial of McAfee's Internet Security Suite. The best bet here is to purchase a security package which includes firewall and anti virus software as a minimum. Top brands include McAfee and Symantec Norton products. However, Microsoft has recently
  • 2. entered the market with their "OneCare" offering which is very aggressively priced. 4) Firewall - if you are using a broadband connection then a firewall is definite requirement to manage the traffic flowing between your computer and the internet. A firewall monitors the inbound internet traffic passing through the ports of your computer. Better products also monitor outbound traffic from your computer to the internet. As per above the best bet here is buy a firewall application as part of a security package which most vendors offer as standard. If a hardware firewall is included as part of your router package then you do not need anything else. A company called Zone Labs offer a great free firewall product called Zone Alarm which should be used as a minimum. Windows XP does now ship with a free firewall but the product does not monitor outbound communication and therefore I believe does not offer adequate protection. 5) Anti Spyware Tool - this software is the last piece in your basic internet security set up. This tool helps combat spyware and adware. There is a good mixture of free and paid versions on offer. Good free software include Microsoft's Windows Defender, Spybot S&D or Ewido Anti-Malware. Ewido Anti-Malware is frequently recommended in computer help forums. Be careful if you decide to purchase a solution. There are a number of rogue vendors out there which aggressively push products which offer you little value. Stick to trusted names like Webroot's Spy Sweeper or PC Tool's Spyware Doctor. These products always come out well on independent tests. Online project management