Free, online classes, available 24/7: www!pcom/"o/learnin"center
!ttp://!#$%&7www#!pcom/articles/view'rticle/p/course()/4$*$+web,a"e()-%$$$$$. /, online class (n to)ay0s internet a"e, t!e c!ances o1 your computer an) your )ata bein" compromise) are 1airly !i"! 2uckily, t!ere are ways you can secure your computer an) protect your )ata (n t!is brie1, you0ll learn six simple steps t!at will !elp you protect an) secure everyt!in" you0ve worke) so !ar) to store on your computer 3!e six steps are as 1ollows: 4se an internet 1irewall 4p)ate your computer0s operatin" system 5ake t!e most o1 your antivirus so1tware ,revent spyware, a)ware, an) spam 6!oose a reputable pop7up blocker ,!ysically sa1e"uar) your computer (n t!is quick lesson, you0ll learn !ow to protect your notebook an) )esktop computers 1rom !ackers, crackers, viruses, spam an) ot!er t!reats 8ou0ll also 1in) out !ow to p!ysically protect your computer 1rom t!e1t an) ot!er potential )an"ers 's t!is is an on7)eman) class, all lessons are available w!en t!e class enrolls 4se an internet 1irewall ,a"e 2 o1 7
'n internet 1irewall can !elp prevent outsi)ers, suc! as !ackers, 1rom accessin" your computer via t!e internet (1 intru)ers are allowe) insi)e your system (unknowin"ly, o1 course9), t!ey can be quite )i11icult to stop an) can c!an"e or )elete 1iles, use your computer to sen) unwante) emails to ot!ers, launc! attacks on ot!ers, an) "enerally cause )ama"in" e11ects Firewalls come in two 1orms: !ar)ware an) so1tware ' !ar)ware7base) 1irewall is usually a router, or a personal computer t!at0s been tweake) to act as a 1irewall to t!e rest o1 your !ome network 3o)ay, !owever, many internet 1irewalls use) in t!e !ome or small o11ice settin" are so1tware7base) 3!ese 1irewalls can be acquire) 1rom a t!ir) party, suc! as :one 2abs0 :one'larm ;r, t!ey mi"!t alrea)y be built into your operatin" system, suc! as (6F ((nternet 6onnection Firewall) or <in)ows Firewall in 5icroso1t <in)ows =,, )epen)in" on w!ic! service pack you !ave installe) (1 you )on0t use a 1irewall, attackers can 1in) an) attack your computer wit!in %> minutes o1 connectin" to t!e internet (1 you use an ?always7on? 1orm o1 internet access, suc! as cable mo)em or x@S2 ()i"ital subscriber line), it0s especially important t!at you install a 1irewall an) keep it up to )ate /ar)ware 1irewalls /ar)ware 1irewalls sit between your computer an) your connection to t!e internet Aouters are currently t!e most popular 1orm o1 !ar)ware 1irewall ' router is a small )evice wit! usually 1our or more ports on t!e back into w!ic! you plu" in Bt!ernet cables (1 purc!asin" a router, you s!oul) select one t!at !as more t!an enou"! ports to accommo)ate t!e number o1 computers on your !ome network Some cable an) x@S2 mo)ems !ave built7in 1irewalls, as )o many <',s (wireless access points) Aea) t!e manual t!at came wit! your equipment or call t!e manu1acturer0s tec!nical support )epartment to 1in) out (nstallin" a !ar)ware 1irewall can be )one quickly an) easily For example, assume you !ave a cable or x@S2 mo)em t!at you use to access t!e internet, an) your mo)em )oes not !ave a built7 in 1irewall 3o install a !ar)ware 1irewall, suc! as a router, )o t!e 1ollowin": ,lu" an Bt!ernet cable, suc! as t!e commonly use) 6ate"ory >, into t!e C(6 (network inter1ace car)) on your computer ,lu" t!e ot!er en) o1 t!e cable into an Bt!ernet port on t!e back o1 t!e router ,lu" a secon) Bt!ernet cable into a secon) port on t!e router an) t!e ot!er en) into t!e back o1 t!e cable or x@S2 mo)em Doila9 (mme)iately a1ter you set up your router/1irewall, c!an"e t!e )e1ault user name an) passwor)E t!e )e1aults are well7known (1 you use a wireless router, enable t!e %2&7bit <B, (<ire) Bquivalent ,rivacy) encryption key 1or more protection <it!out it, your nei"!bors coul) connect to your wireless !ome network wit!out your knowle)"e <!en consi)erin" a !ar)ware 1irewall, note t!at many o1 t!e popular makes an) mo)els, suc! as t!e 2inksys FBFSA4% 4 ,ort 6able Aouter, s!oul) run un)er G*$ 6ompare t!at to t!e cost o1 replacin" t!e )ata on your computer an) t!e value o1 your time spent cleanin" up a1ter your computer0s been !acke) 77 you may 1in) t!at G*$ is well wort! it
So1tware 1irewalls (1 you !ave )ial7up access to t!e internet, you )on0t nee) a !ar)ware 1irewall /owever, you )o nee) a so1tware7base) 1irewall So1tware 1irewalls are popular wit! t!e !ome user community an) available 1rom a wi)e variety o1 ven)ors 5any ven)ors o11er 1ree so1tware to !ome an) e)ucational users, or at least 1ree trial versions 3!ese ven)ors inclu)e, but are not limite) to, t!e 1ollowin": Flack(6B ,6 ,rotection: (nternet Security Systems Herio ,ersonal Firewall: Herio 3ec!nolo"ies Corton ,ersonal Firewall 2$$4: Symantec 6orporation ;utpost Firewall ,A;: '"nitum 3iny ,ersonal Firewall: 3iny So1tware, (nc :one'larm ,ro: :one 2abs 3o set up a so1tware 1irewall, )o t!e 1ollowin": @isconnect your computer 1rom t!e internet (t0s best i1 you can complete 1irewall installation be1ore you0ve ever connecte) to t!e internet, but t!at0s not always possible Bnable your operatin" system0s 1irewall or acquire a t!ir)7party so1tware 1irewall an) install it: (1 it0s built into your operatin" system: For example, to enable <in)ows Firewall in <in)ows =, wit! Service ,ack 2 installe), click Start I 6ontrol ,anel I I <in)ows Firewall (n t!e <in)ows Firewall )ialo" box, click t!e ;n (recommen)e)) option, an) t!en click ;H (1 it0s t!ir)7party so1tware: (nstall t!e so1tware accor)in" to t!e manu1acturer0s )irections 4sually, it0s as simple as clickin" an (nstall button in t!e so1tware inter1ace or locatin" an) )ouble7clickin" t!e Setupexe 1ile '1ter installin" a 1irewall, you nee) to c!eck t!e settin"s to make sure you0re in)ee) as protecte) as possible 3!is can be tricky sometimes, so i1 you nee) !elp, )on0t !esitate to ask a knowle)"eable 1rien) or t!e manu1acturer0s tec!nical support sta11 Sometimes i1 you set t!e 1irewall 1ilters too !i"!, you spen) more time allowin" tra11ic in an) out t!an workin" 8ou may !ave to re7a)Just t!e settin"s as you "et use) to t!e 1irewall settin"s <it! a 1irewall in place between your computer an) t!e internet, you0re well on your way to muc! improve) computer security /owever, )on0t rely only on your 1irewall 1or protection ' 1irewall can be breac!e), an) once t!at !appens, you0ll nee) to 1all back on ot!er computer security measures to )e1en) your computer0s resources a"ainst intru)ers Secure passwor)s (t0s important t!at you use secure passwor)s on t!ese )evices ' secure passwor) is one t!at is !ar) to "uess 8ou create a secure passwor) by usin" a combination o1 uppercase an) lowercase letters, numbers, an) symbols ' "oo) met!o) to use is to t!ink o1 a sentence or a son" title t!at you likeE 1or example, Kot 3o Ket 8ou (nto 5y 2i1e 8ou coul) use K2"yi2m2 (t0s easy to remember 1or you an) !ar) 1or ot!er people to "uess 4p)ate your computer0s operatin" system ,a"e # o1 7
Cow t!at you !ave t!e 1irewall in place, you s!oul) keep your computer0s most 1un)amental so1tware 77 its operatin" system 77 current by applyin" t!e most current so1tware up)ates Failure to )o so leaves your computer extremely vulnerable because 1laws in operatin" systems are usually well7known an) tar"ete) by !ackers an) crackers Aunnin" an up)ate involves applyin" service packs an) critical security up)ates to your operatin" system Fecause service packs are normally very lar"e 1iles, your best bet is to install t!em 1rom a 6@ t!at contains t!e necessary 1iles 8ou can also connect to your operatin" system ven)or0s website to )etermine w!ic! critical up)ates or patc!es are require) 'lways apply one maJor service pack or up)ate at a time, an) make sure everyt!in" works correctly be1ore installin" t!e next one 3!at way, i1 t!ere0s a problem, you know w!ic! installation cause) it '1ter you run t!rou"! t!e up)ate process, you mi"!t 1in) t!at you !ave to repeat t!e process several times to "et all o1 t!e up)ates 3!is can occur i1 some o1 t!e latest up)ates require an earlier up)ate be applie) 1irst 8ou may !ave to restart your computer a1ter eac! up)ate is applie) <in)ows 4p)ate (1 you use a current <in)ows operatin" system, suc! as <in)ows =,, you can use t!e <in)ows 4p)ate 1eature in to manually )ownloa) an) install up)ates 1rom t!e 5icroso1t <in)ows 4p)ate website 6lickin" t!is link starts an automatic searc! o1 your system to )etermine w!ic! up)ates are available to you 3o automatically )ownloa) up)ates now an) in t!e 1uture, enable t!e 'utomatic 4p)ates 1eature in (click Start I 6ontrol ,anel I Security 6enter on your computer) 5ake t!e most o1 your antivirus so1tware ,a"e 4 o1 7
'n antivirus so1tware pro"ram !elps protect your computer a"ainst most viruses, worms, 3roJan !orses, an) ot!er malicious co)e 5any new computers come wit! antivirus so1tware alrea)y installe) /owever, antivirus so1tware must be up)ate) re"ularly, w!ic! usually requires a subscription 1rom t!e so1tware manu1acturer (1 you )on0t !ave a current subscription 1or your antivirus so1tware, your computer is vulnerable to new t!reats 3!ere1ore, you s!oul) install antivirus so1tware, use it, an) keep it current 4p)ates are usually available at least once a week, alt!ou"! t!ey can come more o1ten )urin" perio)s o1 !eavy virus activity on t!e internet Some popular antivirus so1tware packa"es are available as 1ollows: Corton 'ntivirus: Symantec DirusScan: 5c'1ee Security F7,rot 'ntivirus: FA(SH So1tware (nternational ,67cillin (nternet Security: 3ren) 5icro '1ter you0ve installe) your antivirus so1tware, you s!oul) con1i"ure it to c!eck all 1iles, incomin" an) )ownloa)e) 1iles, as well as email messa"es an) attac!ments (n ot!er wor)s, con1i"ure it to c!eck all new 1iles an) perio)ically scan ol) ones Set t!e ?c!eck 1or up)ates? sc!e)ule 1or a )aily c!eck Bmail attac!ments @on0t open or launc! any email attac!ments t!at you0re not expectin" (especially i1 t!ey !ave t!e extensions bat, com, exe, lnk, or pi1) Dirus writers intentionally make email messa"es an) attac!ments appear as t!ou"! t!e 1iles are comin" 1rom a 1rien) or co7worker by usin" someone0s a))ress book to pass t!e virus on <!en you receive an unexpecte) attac!ment, c!eck wit! t!e person w!o sent it to you be1ore openin" it, or )elete t!e messa"e an) t!e attac!e) 1ile wit!out openin" or launc!in" it at all S!are) !ar) )rives Diruses an) network attacks can sprea) t!rou"! a network by 1in)in" s!are) !ar) )rives (1 you nee) to s!are access to 1iles, limit t!at access to a speci1ic 1ile or 1ol)er 5ake sure t!at your s!arin" options are 1or a speci1ic person wit! rea)7only access, an) use a secure passwor) Cever s!are your operatin" system 1ol)er or any 1ol)er t!at contains pro"rams ,rotect yoursel1 <it! a t!in client, all applications run on a server, w!ic! makes it easier to protect your business 1rom spam an) spyware ,revent spyware, a)ware, an) spam ,a"e > o1 7
5any websites an) 1reeware so1tware tools spy on users an) report activities to t!ir) parties w!o, in turn, use t!at in1ormation to sen) you spam emails by t!e !un)re)s (1 you sur1 t!e internet, your computer will "et spyware an) a)ware (1 you (or members o1 your 1amily) s!are 1iles or )o instant messa"in", you0ll "et spyware an) a)ware even 1aster 3!e best )e1ense a"ainst spyware an) a)ware is not to )ownloa) it in t!e 1irst place /ere are 1ew !elp1ul tips t!at can !elp protect your computer 1rom )ownloa)in" potentially )an"erous pro"rams: @ownloa) pro"rams only 1rom websites you trust Aea) all security warnin"s, license a"reements, an) privacy statements associate) wit! any )ownloa)s Cever click '"ree or ;H to close a win)ow (nstea), click t!e re) = in t!e upper7ri"!t corner o1 t!e win)ow or press 'ltLF4 on your keyboar) to close a win)ow Fe cautious about usin" ?1ree? music an) movie 1ile7s!arin" pro"rams, an) be sure you clearly un)erstan) all o1 t!e so1tware packa"e) wit! t!ose pro"rams /owever, no matter !ow care1ul you are, you will pick up some o1 t!ese unsavory pro"rams an) will nee) a way to "et ri) o1 t!em 8ou s!oul) )ownloa) an) install a spyware/a)ware c!ecker, an) run it re"ularly as part o1 your secure computin" routine Some popular c!eckers are: ')7'ware: 2avaso1t 6<S!re))er: (nter5ute Spybot 7 Searc! M @estroy: ,atrick 5 Holla 7 Sa1er Cetworkin" 2imite) Spy Sweeper: <ebroot So1tware Spam Disit your (S, (internet service provi)er) website or call t!eir tec! support line to veri1y t!at t!ey0re runnin" some type o1 spam an) antivirus scanner (n some cases, t!ey nee) to enable t!e spam 1ilter 1or you or con1i"ure it to start catc!in" viruses be1ore t!ey "et to your computer (n ot!er cases, you may nee) to "o to a website to con1i"ure t!e so1tware Bit!er way, you want a system t!at )eletes virus attac!ments, scans all incomin" email, an) 1la"s messa"es t!at appear to be spam 8ou can also set up email 1ilters wit!in your email client (suc! as ;utlook Bxpress, Bu)ora, an) ot!ers) Some spam 1ilters mark email t!at appears to be spam by placin" NNNS,'5NNN in t!e subJect line ;t!ers put t!e term =OS,'5 or a similar !ea)er in t!e mail 1ormat area 8ou can set up 1ilters to 1in) t!ese messa"es an) move t!em to a separate inbox 1or you to )elete at your leisure 3!ere are ot!er t!ir)7party pro)ucts, suc! as 6lou)mark Sa1ety Far, Spam'ssassin, an) Fayesian 5ail Filter, t!at automatically remove known spam an) place t!e messa"es in a separate inbox 1or you 3!is proce)ure keeps you 1rom !avin" to )eal wit! %$s to %$$s o1 spam messa"es )aily to 1in) t!e 1ew messa"es you really nee) Spyware an) a)ware Spyware pro"rams can monitor system activity an) recor) personal )ata, suc! as passwor)s, account names, cre)it car) numbers, an) ot!er sensitive )ata ')ware on t!e ot!er !an) is so1tware t!at 1acilitates )elivery o1 unwante) a)vertisements, web pa"es, or ot!er content to a )esktop, usually t!rou"! a web browser Heep spyware out wit! security t!at0s built in 6ontrollin" spam on your own server may be more e11ective t!an 1armin" it out to an (S, /,0s ,ro2iant servers are t!e secure an) a11or)able option, w!et!er you0re buyin" your 1irst or expan)in" your existin" server line 6!oose a reputable pop7up blocker ,a"e * o1 7
8ou s!oul) install a pop7up blocker, suc! as t!e Koo"le toolbar or S3;,Pilla, on your browser or use an alternate browser t!at !as a pop7up blocker built in, suc! as 5oPilla Fire1ox an) ;pera /owever, you !ave to be very care1ul !ere 8ou s!oul) avoi) 1reeware tools 1rom non7reputable ven)ors 5any 1reeware tools !ave spyware in t!em 3!ey a)vertise t!at t!ey )o one t!in" t!at you nee), but be!in) t!e scenes, t!ey contain pro"rams t!at can !arm your computer S3;,Pilla is an all7in7one pop7up blocker, spyware an) a)ware killer, an) more 3!e best way to stop pop7ups is to never allow t!em to install t!emselves on your computer in t!e 1irst place 8ou can )o t!is by stayin" away 1rom questionable websites, an) never )ownloa)in" an) installin" 1iles 1rom non7reputable sources (1 you0re alrea)y wran"lin" wit! pop7ups, never click buttons or links in t!e pop7up a) itsel1 Some pop7up a)s track personal in1ormation on your computer wit!out you even knowin" it (1 you0re runnin" <in)ows =, wit! Service ,ack 2, enable ,op7up Flocker in (nternet Bxplorer 8ou can )o t!is by clickin" 3ools I ,op7up Flocker I 3urn on ,op7up Flocker 'not!er approac! is to replace your browser 1rom time to time wit! anot!er browser t!at0s less vulnerable to t!e ways t!at spyware attempts to install itsel1 in your computer 8ou can learn about t!e browsers an) tools by rea)in" news"roups or )oin" searc!es o1 t!e ven)or websites liste) in 3able % ,!ysically sa1e"uar) your computer ,a"e 7 o1 7
2ast but not least is t!e p!ysical sa1e"uar)in" o1 your computer (n ot!er wor)s, make sure t!at your computer an) t!e )ata t!at it contains is in a p!ysically secure location 5ake backup copies (1 your 1iles are important to you, back t!em up9 /ar) )rives can 1ail an) viruses or ot!er attacks can )elete 1iles 1rom your !ar) )rive 3o make your backups easy an) quick to per1orm, or"aniPe all o1 your )ocuments an) )ata 1iles in lo"ically name) 1ol)ers 8ou can t!en quickly copy everyt!in" to :ip )rives, 6@s, or @D@s 3!ere are also backup pro"rams an) backup services available Searc! your 1avorite searc! en"ine 1or t!ose terms, respectively, an) you0ll receive more results t!an you can ima"e Fe sure to )o your researc! t!ou"! an) make sure t!e company is reputable Fack up your 1iles on a sc!e)ule t!at you can maintain 77 )aily, weekly, or mont!ly 77 but not less 1requently 8ou )on0t nee) to back up your pro"rams or t!e operatin" system (1 you !ave !ar)ware problems or your operatin" system (or pro"ram) )e"ra)es to a point t!at requires you to restore it, it0s sa1est to install t!e operatin" system an)/or pro"rams 1res! an) restore only t!e )ata 1iles 1rom a backup ;peratin" system or pro"ram )e"ra)ation )oesn0t !appen overni"!t, but usually accumulates over a perio) o1 time Heep your backup copies secure 5aximum sa1ety requires a secure, separate location Aemember t!at i1 )ata on your computer is sensitive, so are t!e backup copies o1 it 'ppropriately protect w!atever you create 8ou can store your backup me)ia wit! 1rien)s or 1amily, or "o as 1ar as "ettin" a sa1ety )eposit box ()epen)in" on t!e importance o1 your )ata to you) (1 you keep your backups next to your computer an) your !ouse burns )own, you !aven0t protecte) your )ata at all Fe cautious about len)in" an) borrowin" 'llowin" ot!ers to use your computer can be risky i1 you !aven0t appropriately protecte) your )ata Forrowin" ot!ers0 systems also !as risks 8ou can leave sensitive in1ormation be!in) mistakenly (1 t!e borrowe) computer is in1ecte) wit! spyware, you can ina)vertently leave a lot o1 in1ormation be!in) Aemember t!e value o1 secure )isposal Finally, w!en your computer is rea)y 1or retirement, be sure to erase any sensitive )ata 1rom its !ar) )rive an) 1rom a))itional stora"e me)ia 3!ere are utilities available to !elp you sa1ely erase )ata 1rom your !ar) )rive ;nce suc! utility is @arik0s Foot an) Cuke Aea) t!e in1ormation about t!is utility care1ully an) be sure you really want to )elete all t!e in1ormation on your !ar) )rive be1ore runnin" it @epen)in" on t!e me)ia, secure )isposal can be easy or )i11icult to )o correctly (but it0s almost never su11icient to rely on a simple @elete comman)) (1 you0re not sure about t!e steps, ask someone w!o is (nsecure )isposal o1 computer me)ia is one way in w!ic! i)entity t!ieves !ave become so "oo) at w!at t!ey )o 3!ere0s muc! more in1ormation available on t!e /, website re"ar)in" most o1 t!ese issues Feel 1ree to enroll in some o1 t!e more )etaile) online courses to learn even more about protectin" your )ata an) securin" your computer