computer security
الأحد، 25 نوفمبر 2012
Steps to Protecting Your Computer
Everyone must read this! Don't skip it...don't tell yourself that you are safe...Your inaction could cause great harm...
10 Steps you can take to protect yourself:
- Update your computer - Stop using computers with insecure operating systems such as Microsoft Windows 95, Windows 98, and Windows ME. These versions of Microsoft Windows are now so old and outdated, they cannot be considered secure. Every day you use your computer may put you at risk.
2. Use antivirus software - No one should be without antivirus software on their computer. There are many commercial products that can help protect your computer from various viruses, worms, trojans and other hacker tools. But antivirus software works based on known viruses...the software must be configured to update its database of what to look for...be sure to configure your anti-virus software to update itself at least daily. And plan to run a complete system check of your computer's hard disks at least once per month to make sure nothing slipped in between antivirus software updates.
- 3. Block Spyware - spyware and viruses often go hand-in-hand but can take many forms. Some 'hijack' your web browser and redirects you to their website. Others quietly download and install trojans, keylogger programs, etc. to your computer so hackers can take control of your computer later. Install and run an anti-spyware program .
- 4. Keep your software up-to-date Microsoft Office: Many computer users use a version of the popular Microsoft Office suite (Outlook, Word, Excel, Powerpoint, or Publisher). Microsoft has released many patches for the Microsoft Office suite including some for "critical" security issues as well as "stability and performance enhancements.
5. Use a firewall - A firewall simply tries to block hackers from entering or using your computer. If you are using cable or DSL connections to the Internet, a hacker can attempt to break-in to your computer 24x7! Make sure you have a router/firewall properly installed and configured. The most common mistake home users make is buying a router/firewall but never resetting the default password...it's like leaving the keys in the door! You can also use a software-based firewall to protect your computer from hackers. Microsoft's scheduled release of its Service Pack #2 for Windows XP in August will include a simple software-based firewall designed to better protect your computer. Some software-based firewalls include:
Related topics:
My opinion about email
It is important thing in our life because every things go fast. For that it is useful for us to use email rather than mail. we can send our assignments , ask teacher about lectures and more things. The important thing to put in your mind the internet not secure and anyone can attack your email . A lot of hackers use other's emails in bad way. you should be careful and protect password to avoid hacking. For more information...http://en.wikipedia.org/wiki/Email_privacy
الخميس، 22 نوفمبر 2012
Best Tips to Defend Against Viruses and Worms

Best Tips to Defend Against Viruses and Worms
You must safeguard your PC. Following these basic rules will help you protect you and your family whenever you go online.
1. Protect your computer with strong security software and keep it updated. McAfee Total Protection for Small Business provides proven PC protection from Trojans, hackers, and spyware. Its integrated anti-virus, anti-spyware, firewall, anti-spam, anti-phishing, and backup technologies work together to combat today's advanced multi-faceted attacks. It scans disks, email attachments, files downloaded from the Web, and documents generated by word processing and spreadsheet programs.
2.Use a security-conscious Internet service provider (ISP) that implements strong anti-spam and anti-phishing procedures.
3.Use caution when opening attachments. Configure your anti-virus software to automatically scan all email and instant message attachments. Make sure your email program doesn't automatically open attachments or automatically render graphics, and ensure that the preview pane is turned off. Never open unsolicited emails, or attachments that you're not expecting—even from people you know.
4.Configure your instant messaging application correctly. Make sure it does not open automatically when you fire up your computer.
5.Beware of spam-based phishing schemes. Don't click on links in emails or IM.
6.Back up your files regularly and store the backups somewhere besides your PC. If you fall victim to a virus attack, you can recover photos, music, movies, and personal information like tax returns and bank statements.
7.Stay aware of current virus news by checking sites like McAfee® Avert® Threat Center.
Top 4 information security threats
Top 4 information security threats

1. Malware
Malware, short for malicious (or malevolent) software, is software used or created to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. Malware includes computer viruses, worms, trojan horses, spyware, adware, and other malicious programs.
2. Malicious insiders
An insider is anyone who has approved access, privilege, or knowledge of information systems, information services and missions. A malicious insider is one motivated to adversely impact an organization's mission by taking action that compromises information confidentiality, integrity, and/or availability. Analysis of the demographics and behaviors of malicious insiders conducted by I3P researchers at the MITRE Corporation reveals that they are driven by diverse motivations (e.g., financial enrichment, emotional thrill, desire for revenge, ideological beliefs). This analysis has also allowed us to create an outline of strategies and fundamental measures an organization can take to reduce the risk posed by malicious insiders and to decrease the time from defection to detection.
3. Exploited vulnerabilities
An exploit is a piece of software, a chunk of data, or sequence of commands that takes advantage of a bug, glitch or vulnerability in order to cause unintended or unanticipated behaviour to occur on computer software, hardware, or something electronic (usually computerised). Such behavior frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial-of-service attack.
4.Cyber espionage
Cyber spying or Cyber espionage is the act or practice of obtaining secrets without the permission of the holder of the information (personal, sensitive, proprietary or of classified nature), from individuals, competitors, rivals, groups, governments and enemies for personal, economic, political or military advantage using methods on the Internet, networks or individual computers through the use of cracking techniques and malicious software including Trojan horses and spyware. It may wholly be perpetrated online from computer desks of professionals on bases in far away countries or may involve infiltration at home by computer trained conventional spies and moles or in other cases may be the criminal handiwork of amateur malicious hackers and software programmers.
الاشتراك في:
الرسائل (Atom)

