Computer Security


Today, with our computer connected to the internet, emails, shopping online and file-sharing programs, run quite a few risks of being attacked and infected,
causing sometimes irreparable damage on your computer . To protect us from these attacks, we must follow basic computer security measures that we will explain here. We also use our Smartphone to surf the internet, so it is important the safety standards at public Wi-Fi connections below you will see. And if despite everything we have a virus on your computer? Well don't worry, we also give rules to be able to disinfect your computer of virus.

The first thing we have to say is that always we must keep in our computer installed an antivirus, firewall and antispyware program or anti-spam filters. There are such free programs if we do not want to spend money, but what better outcome usually gives also "common sense".

At the end we bring you some links to download these free protection programs as well as know if your PC has been attacked. Now we see the 10 rules or forced measures we have to take into account with our computer to be uninfected.

BASIC COMPUTER SECURITY

When we sign-up on any website using an username and password to our email. Data calling for us are to enter this web site, not from our email. If we are asked our email at some point, for example to send us an e-mail verification, we will put the real, but never our password. The user and password for registration is for access to the website that we are registering and should not be equal to our Royal Mail.

Beware of all emails with offers incredible and impossible, asking you to click a link in order to get discounts or awards. Many are true offerings of shops famous and known, but the actual messages are mixed with fake emails that appear to be authentic and that take the user to a clone of the site. This
technique of known as Phishing. It is important to verify that the destination web address matches the business that says send the offer. Beware of emails from banks asking you from the email that pinches on the link to take you to their page and update data or anything else. Pages that take you are exact copies of the originals, but they are not the true. If you complete any form they will do with your data.

Example: If the email says come from Ebay, then the website should be ebay.com, not eebaay.com or also does not have nothing to do with what tells us and lead us to otrawebfalsa.com. The most normal thing is that they usually put similar addresses and completely clone the template of the site to make it look real site.

Never open attachments that we sent with the following extensions. If you don't know how to see the extensions of the files on your computer, at the end of  this point explain it you.

File extensions that you must never open, unless you know with certainty that they are harmless:

.exe = run and install a program on your computer.

.com = executable file with MS‑DOS program

.PIF = to store information related to the execution of MS-DOS programs. Eye can include code in format exe, com or bat in its interior, which can be executed by the own PIF.

.bat = file batch. A batch file is a text file that contains one or more commands, and whose file name extension is .bat plain or. cmd. Type the file name at the command prompt, cmd.exe runs the commands sequentially as they appear in the file.

.cmd = sequence of commands in Windows NT (windows operating system).

.scr = file to modify the screen saver.

.info. = installation information.

There are files more secure download files program or macros, such as text (.txt) or image (.jpg, .gif, .png) files. However, you must be alert to any file  of unknown origin, since it is known that some of these files are in formats specially designed to take advantage of the vulnerabilities of systems equipment.

Eye! Some viruses use files with two extensions, one of them false, so that dangerous files appear to be safe files. For example, Documento.txt.exe or Foto. jpg.exe. The actual extension is always the latest. For example, in the second case, photo.jpg is the name of the file and .exe is an extension that tells us the type of file that is. The intention is to try to make us believe that it is a photo. It is very rare that a legitimate file includes two extensions, so you should avoid download or open this kind of file.

Caution when opening email attachments, whether they are images (jpeg, png, gif, bmp, tif), presentations (ppt, pptx), documents (doc, docx, odf, pdf), etc. even if they say come from friends since they may contain viruses or malware. Only to open them if you know the origin and which are harmless.

See file extensions

To display the extensions of the files on my computer:

Click on the Start button > > > go to control Panel, appearance and personalization, and then click folder options, click on the view tab, and then click  Advanced settings.

You will now see a window with many options in advanced settings. To show file name extensions, disable the checkbox "Hide extensions for known file types",
and then click OK.

Now you can already see the extensions of the files you have on your computer.

Networks for exchanging files over the Internet (films, music, books) not only have multiplied, but they have become usual source of virus. While whenever a  file we downloaded our antivirus examines it carefully, it is recommended not to open files with the extensions listed above.

It should keep the antivirus updated and open all these attachments using the "Sandbox" option. This isolates the operation to make the rest of the computer  so it never affect you to your PC

If you use your credit card to make purchases over the Internet to verify that the web address of the site (URL) begins with "https" and make sure that the  the lock icon in your browser (commonly located beside the address) that web page has a certificate valid and supported by a certification authority that  will ensure that the website is indeed who claims to be. Usually the first part of the web address turns green.

Stay tuned to calls to "verify data" or "prizes" that ask for credit card number by phone, or by any other means. Although it sounds obvious there are very naive people in our country, especially seniors and adolescents with additional cards.


OTHER THINGS TO CONSIDER FOR SECURITY


-It must be kept updated programs.

-In public networks always sail with encryption, a proxy or use TOR to surf safe.

-Create users with different passwords.

-Change your passwords frequently and do not use the same on all sites, use one for Gmail, another for Instagram, another on FacebooK, etc.

-Protects your WiFi network password and encryption against intruders.

-Control the privacy of your networks.

-Security patches. Many of the threats that arrive by the network take advantage of vulnerabilities or failures of the programs. When the manufacturer detect these security holes, they publish patches that users can download for free and fix the flaws.

Comments

Popular posts from this blog

Why Amazon spent more than $ 1 billion on a smart ring startup

Supports 4G: Orange has put the package in February

China Mobile expands in France