Remember Tom and Jerry game and their relationship referred
to in the discussion of Hackers and anti-virus software. Companies create
software, hackers find weaknesses of that software to take advantage, software
companies fix the weaknesses, hackers find other weaknesses or new weaknesses.
Like that the game continues….
Use Anti-Virus: Anti-Virus software is used to prevent, detect,
and remove Computer Virus (Such as worm, Trojan horses, spyware and adware).
Although Antivirus software can impair a computer's performance, it’s always
good to use antivirus to prevent any such malicious actions.
Do keep your Internet browser and operating system
up-to-date with the latest security patches and updates.
Most Recommended
Anti-Virus list:
AVG Anti-Virus: The
most trusted free antivirus and anti-spyware security software.
Avast Anti-Virus: The
world's most popular antivirus software and its completely free.
Kaspersky Anti-Virus: It is the backbone of your PC’s
security system, delivering real-time protection from the latest malware and
viruses. But it’s not free.
Turn On or Install a Firewall: Always keep inbuilt firewalls
switched on.
Download and Install only Trusted Software: Always remember
to download and install software that you trust, which is from a reliable
source, and keep it up to date. No software is perfect. To address these issues computer companies
release patches to their software to address these problems or to improve their
product.
Be cautious with File Sharing Software: Peer to Peer (P2P)
software that connects individual users to each other directly without need for
a central point of management. Some file-sharing programs may install malware
that monitors a user’s computer use and then sends that data to third parties. Make sure your security software and firewall
are running whenever your computer is connected to the Internet. And before you
open or play any downloaded files, scan them with your security software to
become aware of malware or viruses.
Delete Unknown Emails: Many viruses arrive as executable
files that are harmless until you start running them. If you have any doubts
after reading the senders name and the subject of the email from unknown
sources, never download or open attachments unless you are sure it’s from
someone you know.
Always scan your removable storage devices before accessing
it: Run a virus scan on your removable storage devices like USB/Flash drive,
External Hard Drives etc. After scanning, if you want to copy the data to your
PC, don't copy whole directories. The virus could potentially be one of these
hidden files. Copy files manually, one by one. Always format your removable
devices instead of just manually deleting all.
Secure Your Wireless Network: Secure your wireless router or
access point administration interface. Don't broadcast your SSID. Enable WPA
encryption instead of WEP. Unless you absolutely need remote administration,
it's always best to keep it turned off.
Use a Complex Password for Login: Use a strong password,
such as a combination of letters and numbers of 10 characters or more. Never
send bank passwords, credit card numbers, confidential e-mail, or other
sensitive data unless you are sure that you are on a secure site( URLmust
begins with https).
Create separate user accounts. If more than one person uses
your computer, consider setting up separate user accounts, in addition to the
administrator’s account, and give those user accounts only limited rights. Also
use a password to protect your firewall and security software so no one else can
disable them or grant themselves rights that you don’t want them to have on
your machine.
Back up sensitive documents.
Back up files that you would want to keep if your computer crashes. Store them
on DVDs, or removable drives that you keep in a safe place.