|Personal Technology Information|
Are You Well Protected?
Winter?the official start of the cold and flu season. Though, technically speaking, things got started a little early. Close to a million computers, mostly home PC users, have been infected.
For many of us our computers are our business. We keep in contact with customers and clients via email, do extensive internet research, and transmit important files electronically.
We know what to do to protect our bodies from viruses. There are some simple strategies, and even free precautions we can take to protect our businesses by keeping our PCs virus free.
Adopting the following six checkpoints will help keep your computer healthy and your business uninterrupted.
Use a Firewall
At its most basic level a firewall is a software security system that acts as a barrier between your computer and the outside world (the internet) by monitoring all incoming network traffic. A more advanced firewall will also monitor outgoing traffic. How you use your computer will determine whether basic or advanced firewall protection is needed.
What a firewall does is make your computer invisible while on the Internet. If hackers can't see you, they cannot attack you.
Windows XP has this software installed; however, it may need to be enabled. If you have XP and would like to enable the firewall, directions are on the Microsoft website.
For non XP users, firewall software can be purchased. McAfee and Zone Alarm are two very popular products. Zone Alarm has a free downloadable firewall, basic version, available on their website, www.zonealarm.com.
Before installing a firewall, you may be interested in learning your computer's vulnerability. This is something that can be checked for free and in just a few minutes. Visit the website of Gibson Research Corporation, www.grc.com, and under Hot Spots, click on Shields UP. It takes a little bit of scrolling to get to but is well worth the extra seconds. In minutes your PC is scanned and its vulnerability rated.
Antivirus software is the "shot" after the epidemic. This software protects your computer from known threats. Many PCs come with antivirus software already installed. Some of the more popular versions are Norton, PCCillin and McAfee.
If you have it pre installed or have purchased it, great. Please be sure to keep it constantly updated with the latest virus definitions. This is important because these definitions are formed in response to the latest viruses. If you don't have this protection, please consider getting it.
Once this software is installed on your computer, you will be automatically notified when new virus definitions are available. Then it is just a matter of a few clicks to download the new definitions.
Likewise you will be notified when your antivirus software is about to expire. The software needs to be updated annually. The initial purchase, renewal, updates and installation can all be done online.
Why am I getting all of these pop ups? Certain websites that you visit or free software (shareware) that you download, and, in some cases, hardware purchased from major manufacturers will also install tracking devices on your computer (spyware). Spyware is annoying but not illegal.
An internet search will reveal the many choices available for spyware elimination software. The important thing is to get one and use it consistently. Spybot and PestPatrol are popular choices.
I really like Spybot Search and Destroy. Besides the fact that it is free, once spyware is identified, the software will provide a detailed description of just what it is. This is helpful just in case it identifies something that you don't want to get rid of.
Backup, Backup, Backup
How often do you backup? What files/programs do you backup? What media do you backup to?
We all know the importance of backing up our information yet so many of us don't do it. There may be a ton of reasons why it's not done but the one reason it should be done on a regular basis is that it can be a timesaver, possibly a business saver if your computer system is corrupted for any reason.
If you happen to be using Windows XP Professional, the backup procedure is quite simple. For users of XP Home Edition, it is a bit more involved. Complete instructions, however, are on the Microsoft website.
Typically, data files are what most people need to back up and having well organized files will certainly simplify the process.
Whether you backup to disk, zip disk, DVD, writeable CDs, external file drive or utilize one of the online services, it is important to get into the habit of backing up on a regular basis.
Weekly Updates of Windows
Windows users are automatically notified of current updates for the Windows operating system when your computer is turned on. With just a few clicks your operating system is updated.
However, when certain patches become available for your particular applications software (XP, 2000, NT, etc), as was/is the case with the recent worm viruses, a visit to Microsoft's website is necessary.
Once there, Microsoft will scan your computer, tell you what updates are available, and you then have the option of installing them on your system. In some cases, you will need your installation CDs to complete the download.
With the recent run of viruses and with more expected, it is imperative to check for these updates weekly on the Microsoft website as well as do the automatic updates.
Be Careful of Email Attachments
Email is such a widely accepted method of communication, and this has not gone unnoticed by hackers who use email as a means of mass virus spread.
For this final checkpoint, your due diligence is the only software required.
Always delete any email from unknown senders and be very careful of any attachments you are not expecting from any known senders. As we have seen, hackers can quite easily access Outlook address books to spread viruses.
By the way, including a fake email address in your address book will not prevent your PC from spreading viruses. This is an urban legend. If you're interested in the full story, check out this link:
When it comes to the health of our computers, an ounce of prevention is worth a pound of cure. Effective prevention software along with plain old common sense, used consistently, can keep you protected.
About The Author
Roxie Hickman, Virtual Assistant (VA), is the owner of The Virtual Connection. The Virtual Connection (www.thevirtualconnection.net) specializes in working with the 'sucstressed' (successful professionals who are stressed because they've been doing it alone). The Virtual Connection provides offsite executive, administrative, and personal assistance (virtual assistance).
This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news
This Page Cannot Be Displayed - What to Do When Your Internet Breaks
The DNS (Domain Name System) servers are what your computer uses to figure out where to go on the internet. www.
Selecting a Personal Digital Assistant
A Computer in Your HandCarrying around an address book and planner is becoming a thing of the past. With new PDA developments, you can manage your contacts and schedule, use e-mail, and even listen to music.
Microsoft Great Plains Dexterity Customizations
Microsoft Business Solutions is on the way to popularize it's ERP systems implementation. Right now such products as Microsoft CRM and Small Business Manager (cheap version of Microsoft Great Plains, based on the same Great Plains Dexterity runtime and DYNAMICS.
The Importance Of Email Backup
Viruses, software failures, power failures, human errors, hard drive failures are only a few examples of what could destroy the data on a hard drive, including all documents, pictures, emails and other files!Most home computer users don't need an expensive backup solution; as they only need to burn the folders with important documents and pictures to a CD-RW from time to time; this ensuring that in case of a disaster they can easily get them back.Togeder with documents and pictures, it's a critical operation to save the emails, attachments, address book and other important data from within the email client; otherwise in case of a computer problem the user will find himself in the impossibility to get them back, and this can be a really unwanted situation especially for webmasters or people who rely on their emails.
Why Using an Ad Blocker Can be a Bad Idea
Ad Blocking is getting to be a common sport on the internet. Now there are some legitimate uses for an ad blocker.
Buying a Home Theater Receiver
Buying a receiver is one of the most important decisions you're going to have to make when building your home theater. The receiver has a number of functions including; connecting and switching audio sources; connecting and switching video sources; decoding surround sound formats; amplifying an audio signal and sending it to your speakers; tuning in to radio stations; and acting as the interface between you and your home theater.
Cisco Certification: A Survival Guide To The Cisco Cable Jungle
One of the most confusing parts of beginning your Cisco studies is keeping all the cable types separate in your mind, and then remembering what they're used for. This often occurs when a CCNA or CCNP candidate starts putting together their own home practice lab, and they suddenly realize that they have the equipment to run labs, but not the cables.
What Exactly are Screensavers? - part I
After reading this good article you will know some important information about screensavers and their history. You will find out how screensavers are different from other applications and what advantages you'll have if you use them.
Dynamite Comes in Small Packages - Tiny Personal Audio MP3 Players Pack Powerful Music Enjoyment
MP3 players are Hot! Playing music has come a long way since the transistor radio, portable tape and CD player days. Most players are no larger than a deck of cards.
COOKIES - What Are They!!
Cookies, not the kind that Mom makes, but the computer type, what are they and where do they come from. Well let's give you a quick and easy explanation of what they are, where they came from and how to get rid of them.
Buying A PC Flat Screen Monitor
For six years, my Samsung PC 13.8 inch SyncMaster conventional monitor has served me well.
How To Safeguard Your Computer?
The following practice, if done regularly, may help you to safeguard your computer to some extent.1.
Is DVD Storage An Attractive Alternative For Your Computer Backup?
If you have a computer for home use or for your business and don't take comprehensive backup for full protection then you are in the danger-zone. Maybe you do not take any backup at all.
Choosing a Portable MP3 Player: Part 1
MP3 players are everywhere! It seems that the number of makes and models in this market is growing daily, with features and capabilities intended to appeal to just about anyone shopping for one of these devices.MP3 players have been around much longer than the Apple iPod , but there is no arguing that this one device opened the market to a much larger customer base.
How to Use SQLXML to Retrieve Data from SQL Server Database?
Using SQL Server 2000 and above versions you can retrieve data from SQL Server in XML format directly from the database. Many XML related features were incorporated in the SQL Server database.
The Ipod Mini: Why Its Not that Hot
I got my eyes set on a iPod mini, as it looked good for quite some reasons: it's small enough to put inside a pant's pocket, it has a lot of accessories to choose from and it obviously has enough hype you begin to wonder what all the fuss is about.But you really have to see the cons of it and cut all the hype.
Temporary Fixes to Spyware, Ad-ware, and Virus Infections
So you've got some spyware, ad-ware, or viruses on your system. For whatever reason, you are unable to get ahold of a virus detection & removal program, or a good ad-ware scanner.
More Cool Web Tricks
If you ask most people what frustrates them most about the Internet, many of them will tell you "It's the little things!"It seems like all the great tricks and tips that make people exclaim "STOP! How did you do that?" never make it into any manual (at least where I can find them).My father (and co-author of "Turn Words Into Traffic") calls it the "reverse oral tradition" of computing, where children teach parents the survival skills of PC life.
Why There Are Color Differences in Printing from Your PC
This article describes the basic properties of color, what the relationships are between them and the differences between what you see and what you actually get using your inkjet cartridges.PropertiesMost of you will have come across these three; Hue, Saturation and Brightness; if you have ever messed around with color settings of your images.
Setting File Permissions On A Unix Server
File permissions are one of the strengths that the Unix world has had over it's Windows contemporaries. Permissions are a means to control access to information on a computer, on a file by file basis.
|home | site map|