SlideShare a Scribd company logo
1 of 4
10 Steps to Protecting Your Computer to the
World of Internet.
Internet is not anymore a thing, it is a place where you do all daily tasks with
its multi web based Tools ,which is more efficiently in many Aspects ,
productive-wise and Creativity , in addition to the Social Media Activities to
publish and share your ideas .we do not stop at this point ,however ,we go
further and became our one-stop shop Market
our data is most valuable asset. However, these days it seems every morning
brings news of another high profile data breach.
Sadly hackers are becoming more sophisticated and more determined than
ever before, but this doesn’t mean Home and businesses can’t take steps to
protect themselves. Just a few considerations regarding security processes
can be enough to ensure would-be hackers move on to an easier target.
When using the internet, it's important to keep your computer secure and
working properly. This will help protect both your computer and your
personal information. Having a secured Internet Connection is a must.
To protect your Computer and ensure the safety on Internet, follow
the below 10 Steps.
1: Create a Clean Installation restore point
After you have installed your security updates for your Windows operating system, make sure
you have created a Restore Point for your installation.
You can create the Restore Point as soon as your Windows installation is ready and name it
clean installation and then you can continue installing drivers and applications.
In case one of the drivers causes issues on the system, you can always go back to the clean
installation restore point.
2: Windows Update:
make sure your Windows Automatic update Are On ,
There have been significant security holes discovered in all versions of Windows so it's important to
update your computer's operating system as soon as possible. Regardless of the version of Windows
you use, visit the Microsoft's Windows Update website and install all "critical patches." You should also
consider installing the recommended and driver patches.
3: Keep your software up-to-date
Microsoft Office: Many computer users use a version of the popular Microsoft Office suite
(Outlook, Word, Excel, PowerPoint, or Publisher). Microsoft has released many patches for the
Microsoft Office suite including some for "critical" security issues as well as "stability and
performance enhancements." Note that you may need your original Microsoft Office installation
CD to complete the updates.
Adobe Reader: Acrobat PDF files are used extensively on the website and throughout the
Internet. Adobe Reader can be used to view/print these files. You should not be using older
versions - a free upgrade is available.
Flash: Adobe Flash Player is used on many website, to provide a more interactive web
experience. Serious security issues have been found in older versions of the Flash viewer.
4: Antivirus: No one should be without antivirus software on their computer. There are many
commercial products that can help protect your computer from various viruses, worms, Trojans and
other hacker tools:
Antivirus: three services: Bitdefender, Avast, and Widows essential Security
5: Firewall simply tries to block hackers from entering or using your computer. If you are using
cable or DSL connections to the Internet, a hacker can attempt to break-in to your computer 24x7! Make
sure you have a router/firewall properly installed and configured. The most common mistake home
users make is buying a router/firewall but never resetting the default password.
You should send or store data only on wireless networks that use encryption, preferably Wi-Fi Protected
Access (WPA), which is stronger than Wired Equivalent Protocol (WEP).
Three services: Zone Alarm, Comodo and TinyWall
6: spyware and viruses often go hand-in-hand but can take many forms. Some 'hijack' your web
browser and redirects you to their website. Others quietly download and install Trojans, key logger
programs, etc. to your computer so hackers can take control of your computer later. Install and run an
anti-spyware program such as: SpyBot Search and Destroy, MalwareBytes
7: Family safety: As a parent, you have plenty to worry about; what your kids are
doing on their computers shouldn’t be one of them.
An open Internet is unsafe for children and parenting in this digital age is difficult. We provide
tools for parents to control unwanted content and provide a safe Internet for your family.
Tools:
Family Safety helps you set limits on your child's PC time, as well as the websites, apps, and
games they can use (and when).
Safe Eyes is Mac and PC compatible software that protects your family from harmful content
and other dangers on the internet.
K9 Web Protection is a free Internet filter and parental control software for your home Windows
or Mac computer. K9 puts YOU in control of the Internet so you can protect your kids.
Anti-Porn is the best internet blocking & filtering software that block more than 99 percent of adult
websites.
8: Internet Browsing Safety using Private Session:
Private Browsing allows you to browse the Internet without saving any information about which sites
and pages you’ve visited.
 Firefox: new Private Window or CTRL+ SHIFT + P
 Chrome: choose from menu: New incognito Window / CTRL+ SHIFT + N
 Internet Explorer: from tools. Click "InPrivate Browsing / CTRL+ SHIFT + P
9: Use complex passwords - whether at work or at home, use complex passwords
(and never write them down!). Using a password longer than 8 characters can greatly reduce the
chance that someone will guess your password.
You should change your password at least every 3 months and never reuse old passwords...be
creative, come up with something new!
Ensure all employees use a unique, complex password for every account.
Reusing passwords (or slightly modified passwords) across different accounts is one of the
biggest concerns in the event of a hacking attack or data breach.
Many times attackers will attempt to access multiple other accounts (banking, PayPal, etc) using
login credentials that they have obtained for a single, original account.
If employees reuse passwords, a simple credential breach of a non-sensitive account can grant
attackers access to an organisations most sensitive online accounts quickly and easily.
Services: 1password, KeePass Password Safe, Last Pass.
10: Backup your important data often- Back up early and often .Diskettes are
no longer practical for backup - a CD recordable (CD-R) drive can help quickly backup your important
data (700 MB per disc or equivalent to 485 diskettes). DVD recordable drives are also available (~7 times
as much as a CD or equivalent to 3200 diskettes!) Other options include external USB hard drives to
store all of your "data", documents, photos, music as well as USB "thumb" drives that you can carry on
your keychain.
The single most important step in protecting your data from loss is to back it up regularly. Online backup
is a real alternative to local backups. Online backup is effective because it does the worrying for you,
your own backup drives. The cloud is protected from fire, flood, theft and you’re Children. You can
access online archives from anywhere, including on your phone
Services: Drop box, One Drive, Google Drive
My message: if you found this Article Useful, Spread the Word, and let your Friends and Family get Safe
Khalil Jubran
Technology Evangelist
SavedbyTehcnology Blog
MindSpring Networks

More Related Content

What's hot

10 Things to help you be less dump at computers
10 Things to help you be less dump at computers10 Things to help you be less dump at computers
10 Things to help you be less dump at computersEric Fickes
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Appsprimomh
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antivirusesSarhad Baez
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207Todd Deshane
 
Computer security and awareness
Computer security and awarenessComputer security and awareness
Computer security and awarenessRichard Bartlett
 
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityIntroduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityRobert Hurlbut
 
Windows 7 For Students_MVP Jabez Gan
Windows 7 For Students_MVP Jabez GanWindows 7 For Students_MVP Jabez Gan
Windows 7 For Students_MVP Jabez GanQuek Lilian
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from virusesar-rifke.com
 
Syafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah Akemi
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentationamy.covington215944
 
Os x security basics for keeping your mac safe final
Os x security basics for keeping your mac safe   finalOs x security basics for keeping your mac safe   final
Os x security basics for keeping your mac safe finalKhürt Williams
 
Google chrome operating system
Google chrome operating systemGoogle chrome operating system
Google chrome operating systemkondalarao7
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the webJoel May
 
It planet gigabyte gr 7 textbook
It planet gigabyte gr 7 textbookIt planet gigabyte gr 7 textbook
It planet gigabyte gr 7 textbookNityant Singhal
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Akhil Sharma
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.commariagoel7
 

What's hot (20)

10 Things to help you be less dump at computers
10 Things to help you be less dump at computers10 Things to help you be less dump at computers
10 Things to help you be less dump at computers
 
Spyware
SpywareSpyware
Spyware
 
Secure Your Mobile Apps
Secure Your Mobile AppsSecure Your Mobile Apps
Secure Your Mobile Apps
 
Viruses and antiviruses
Viruses and antivirusesViruses and antiviruses
Viruses and antiviruses
 
Cs seminar 20071207
Cs seminar 20071207Cs seminar 20071207
Cs seminar 20071207
 
Computer security and awareness
Computer security and awarenessComputer security and awareness
Computer security and awareness
 
Introduction to Personal Privacy and Security
Introduction to Personal Privacy and SecurityIntroduction to Personal Privacy and Security
Introduction to Personal Privacy and Security
 
Windows 7 For Students_MVP Jabez Gan
Windows 7 For Students_MVP Jabez GanWindows 7 For Students_MVP Jabez Gan
Windows 7 For Students_MVP Jabez Gan
 
14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses14 household ways to protect your computer from viruses
14 household ways to protect your computer from viruses
 
Computer
ComputerComputer
Computer
 
Syafiqah slideshare of security measures
Syafiqah slideshare of security measuresSyafiqah slideshare of security measures
Syafiqah slideshare of security measures
 
Spyware And Anti Virus Software Presentation
Spyware And Anti Virus Software PresentationSpyware And Anti Virus Software Presentation
Spyware And Anti Virus Software Presentation
 
Os x security basics for keeping your mac safe final
Os x security basics for keeping your mac safe   finalOs x security basics for keeping your mac safe   final
Os x security basics for keeping your mac safe final
 
Google chrome operating system
Google chrome operating systemGoogle chrome operating system
Google chrome operating system
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Computer security
Computer securityComputer security
Computer security
 
The most dangerous places on the web
The most dangerous places on the webThe most dangerous places on the web
The most dangerous places on the web
 
It planet gigabyte gr 7 textbook
It planet gigabyte gr 7 textbookIt planet gigabyte gr 7 textbook
It planet gigabyte gr 7 textbook
 
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
Spyware and Trojan Horses (Computer Security Seminar by Akhil Sharma)
 
How to Delete plus network.com
How to Delete plus network.comHow to Delete plus network.com
How to Delete plus network.com
 

Similar to 10 steps to protecting your computer to the world of internet.

The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityTechvera
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Onlinepcsafe
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safetyDooremoore
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)Cyber Security Infotech
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitionersDanny Doobay
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt csVinay Soni
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4leahg118
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PCthatfunguygeek
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basicsjeeva9948
 
Essential Technologies for Psychologists
Essential Technologies for PsychologistsEssential Technologies for Psychologists
Essential Technologies for PsychologistsBradnor444
 

Similar to 10 steps to protecting your computer to the world of internet. (20)

The 10 Commandments of Computer Security
The 10 Commandments of Computer SecurityThe 10 Commandments of Computer Security
The 10 Commandments of Computer Security
 
The Safest Way To Interact Online
The Safest Way To Interact OnlineThe Safest Way To Interact Online
The Safest Way To Interact Online
 
Internet security
Internet securityInternet security
Internet security
 
Cyber security and safety
Cyber security and safetyCyber security and safety
Cyber security and safety
 
Cyber security for journalists
Cyber security for journalistsCyber security for journalists
Cyber security for journalists
 
Cyber security
Cyber securityCyber security
Cyber security
 
An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)An introduction to cyber security by cyber security infotech pvt ltd(csi)
An introduction to cyber security by cyber security infotech pvt ltd(csi)
 
Information security for health practitioners
Information security for health practitionersInformation security for health practitioners
Information security for health practitioners
 
Cybersafety basics.ppt cs
Cybersafety basics.ppt csCybersafety basics.ppt cs
Cybersafety basics.ppt cs
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2NWSLTR_Volume8_Issue2
NWSLTR_Volume8_Issue2
 
Giarritano concept paper 4
Giarritano concept paper 4Giarritano concept paper 4
Giarritano concept paper 4
 
WISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurityWISE KIDS Leaflet: eSecurity
WISE KIDS Leaflet: eSecurity
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety Cyber-savvy Cyber-safety
Cyber-savvy Cyber-safety
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Cybersafety basics
Cybersafety basicsCybersafety basics
Cybersafety basics
 
Essential Technologies for Psychologists
Essential Technologies for PsychologistsEssential Technologies for Psychologists
Essential Technologies for Psychologists
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

Recently uploaded

Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Roomdivyansh0kumar0
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 

Recently uploaded (20)

Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With RoomVIP Kolkata Call Girl Dum Dum 👉 8250192130  Available With Room
VIP Kolkata Call Girl Dum Dum 👉 8250192130 Available With Room
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 

10 steps to protecting your computer to the world of internet.

  • 1. 10 Steps to Protecting Your Computer to the World of Internet. Internet is not anymore a thing, it is a place where you do all daily tasks with its multi web based Tools ,which is more efficiently in many Aspects , productive-wise and Creativity , in addition to the Social Media Activities to publish and share your ideas .we do not stop at this point ,however ,we go further and became our one-stop shop Market our data is most valuable asset. However, these days it seems every morning brings news of another high profile data breach. Sadly hackers are becoming more sophisticated and more determined than ever before, but this doesn’t mean Home and businesses can’t take steps to protect themselves. Just a few considerations regarding security processes can be enough to ensure would-be hackers move on to an easier target. When using the internet, it's important to keep your computer secure and working properly. This will help protect both your computer and your personal information. Having a secured Internet Connection is a must. To protect your Computer and ensure the safety on Internet, follow the below 10 Steps. 1: Create a Clean Installation restore point After you have installed your security updates for your Windows operating system, make sure you have created a Restore Point for your installation. You can create the Restore Point as soon as your Windows installation is ready and name it clean installation and then you can continue installing drivers and applications. In case one of the drivers causes issues on the system, you can always go back to the clean installation restore point.
  • 2. 2: Windows Update: make sure your Windows Automatic update Are On , There have been significant security holes discovered in all versions of Windows so it's important to update your computer's operating system as soon as possible. Regardless of the version of Windows you use, visit the Microsoft's Windows Update website and install all "critical patches." You should also consider installing the recommended and driver patches. 3: Keep your software up-to-date Microsoft Office: Many computer users use a version of the popular Microsoft Office suite (Outlook, Word, Excel, PowerPoint, or Publisher). Microsoft has released many patches for the Microsoft Office suite including some for "critical" security issues as well as "stability and performance enhancements." Note that you may need your original Microsoft Office installation CD to complete the updates. Adobe Reader: Acrobat PDF files are used extensively on the website and throughout the Internet. Adobe Reader can be used to view/print these files. You should not be using older versions - a free upgrade is available. Flash: Adobe Flash Player is used on many website, to provide a more interactive web experience. Serious security issues have been found in older versions of the Flash viewer. 4: Antivirus: No one should be without antivirus software on their computer. There are many commercial products that can help protect your computer from various viruses, worms, Trojans and other hacker tools: Antivirus: three services: Bitdefender, Avast, and Widows essential Security 5: Firewall simply tries to block hackers from entering or using your computer. If you are using cable or DSL connections to the Internet, a hacker can attempt to break-in to your computer 24x7! Make sure you have a router/firewall properly installed and configured. The most common mistake home users make is buying a router/firewall but never resetting the default password. You should send or store data only on wireless networks that use encryption, preferably Wi-Fi Protected Access (WPA), which is stronger than Wired Equivalent Protocol (WEP). Three services: Zone Alarm, Comodo and TinyWall 6: spyware and viruses often go hand-in-hand but can take many forms. Some 'hijack' your web browser and redirects you to their website. Others quietly download and install Trojans, key logger programs, etc. to your computer so hackers can take control of your computer later. Install and run an anti-spyware program such as: SpyBot Search and Destroy, MalwareBytes
  • 3. 7: Family safety: As a parent, you have plenty to worry about; what your kids are doing on their computers shouldn’t be one of them. An open Internet is unsafe for children and parenting in this digital age is difficult. We provide tools for parents to control unwanted content and provide a safe Internet for your family. Tools: Family Safety helps you set limits on your child's PC time, as well as the websites, apps, and games they can use (and when). Safe Eyes is Mac and PC compatible software that protects your family from harmful content and other dangers on the internet. K9 Web Protection is a free Internet filter and parental control software for your home Windows or Mac computer. K9 puts YOU in control of the Internet so you can protect your kids. Anti-Porn is the best internet blocking & filtering software that block more than 99 percent of adult websites. 8: Internet Browsing Safety using Private Session: Private Browsing allows you to browse the Internet without saving any information about which sites and pages you’ve visited.  Firefox: new Private Window or CTRL+ SHIFT + P  Chrome: choose from menu: New incognito Window / CTRL+ SHIFT + N  Internet Explorer: from tools. Click "InPrivate Browsing / CTRL+ SHIFT + P 9: Use complex passwords - whether at work or at home, use complex passwords (and never write them down!). Using a password longer than 8 characters can greatly reduce the chance that someone will guess your password. You should change your password at least every 3 months and never reuse old passwords...be creative, come up with something new! Ensure all employees use a unique, complex password for every account. Reusing passwords (or slightly modified passwords) across different accounts is one of the biggest concerns in the event of a hacking attack or data breach. Many times attackers will attempt to access multiple other accounts (banking, PayPal, etc) using login credentials that they have obtained for a single, original account. If employees reuse passwords, a simple credential breach of a non-sensitive account can grant attackers access to an organisations most sensitive online accounts quickly and easily. Services: 1password, KeePass Password Safe, Last Pass.
  • 4. 10: Backup your important data often- Back up early and often .Diskettes are no longer practical for backup - a CD recordable (CD-R) drive can help quickly backup your important data (700 MB per disc or equivalent to 485 diskettes). DVD recordable drives are also available (~7 times as much as a CD or equivalent to 3200 diskettes!) Other options include external USB hard drives to store all of your "data", documents, photos, music as well as USB "thumb" drives that you can carry on your keychain. The single most important step in protecting your data from loss is to back it up regularly. Online backup is a real alternative to local backups. Online backup is effective because it does the worrying for you, your own backup drives. The cloud is protected from fire, flood, theft and you’re Children. You can access online archives from anywhere, including on your phone Services: Drop box, One Drive, Google Drive My message: if you found this Article Useful, Spread the Word, and let your Friends and Family get Safe Khalil Jubran Technology Evangelist SavedbyTehcnology Blog MindSpring Networks