US Toll Free: 888-702-3410
THE FAS SOLUTIONS – Quality Software Development | High Quality Software Solutions
  • Home
  • About
  • Clients
  • Portfolio
  • Services
  • Technology
  • Blog
  • Contact
  • Home
  • About
  • Clients
  • Portfolio
  • Services
  • Technology
  • Blog
  • Contact

Useful Tips To Defend Against Computer Attacks

Home » Security » Useful Tips To Defend Against Computer Attacks
  • Fakhar
  • June, 2011
  • Security, Tips
  • 2 Comments
  • Share It

Connecting to the Internet is a two-way street. Not only can your PC access other computers online, but other computers can also access your PC to access your private data or damage your system hardware and software.  As the Internet becomes more and more integrated into everyday lives, we must learn how to defend ourselves against new types of online attacks.

A computer virus is a malicious software program designed to do damage to computer system by deleting files or even taking over your PC to launch attacks on other systems. A virus attacks your computer when you launch an infected software program.  It opens up backdoors on infected systems, giving hackers direct access to the hijacked PC. In this case, a hacker can use the infected PC to upload personal information to a remote system, or to turn the PC into a remotely controlled robot used in criminal activity.

While viruses remain a threat, today’s hackers commonly use vicious multi-layered attacks, such as a worm in a chat message that displays a link to a Web page infected with a Trojan horse. “Worms” have been found that tunnel though programs, uncovering new vulnerabilities and reporting them back to hackers. The hackers then quickly assemble malware (malicious software) from pre-made components, exploiting the vulnerability before the majority of people can download a fix. Protect your computer with strong security software and keep it updated. You should check for new definition updates daily. Most antivirus software can be configured to do this automatically. Also install security patches of windows and applications. Vulnerabilities in software are constantly being discovered and they don’t discriminate by vendor or platform.

It’s not simply a matter of updating windows; at least monthly, check for and apply updates for all software you use.  Most of the exploits that are out there today would be obsolete if people followed a strict update policy. Use a security-conscious Internet service provider (ISP) that implements strong anti-spam and anti-phishing procedures. But don’t fall victim to virus hoaxes. Dire-sounding email spreading fear, uncertainty and doubt about non-existent threats serve only to spread needless alarm and may even cause you to delete perfectly legitimate files in response.

No Internet connection is safe without one. Firewalls are necessary even if you have a dial-up Internet connection — it takes only minutes for a non-firewalled computer to be infected.  Windows come with firewall software built into it. Spend some time configuring it and making sure that it’s set up properly. Use caution when opening attachments. Configure your anti-virus software to automatically scan all email and instant message attachments. Configure your instant messaging application correctly. Make sure it does not open automatically when you fire up your computer. Make sure your email program doesn’t automatically open attachments or automatically render graphics, and ensure that the preview pane is turned off. Never open unsolicited emails, or attachments that you’re not expecting. If you’re using Linux, there are plenty of scripts out there to help with iptables, though if you’re running Linux, you really should know how to use iptables via the command line.

Most people are under the dangerous misconception that only Internet Explorer is a problem. It’s not the browser you need to be concerned about. Nor is it a matter of simply avoiding certain ‘types’ of sites. Known, legitimate websites are frequently being compromised and implanted with malicious JavaScript that foists malware onto visitors’ computers. To ensure optimum browsing safety, the best tip is to disable JavaScript for all but the most essential of sites — such as your banking or regular ecommerce sites. Not only will you enjoy safer browsing, you’ll be able to eliminate unwanted pop-ups as well.

Back up your files regularly and store the backups somewhere besides your PC. If you fall victim to a virus attack, you can recover photos, music, movies, and personal information like tax returns and bank statements. Stay informed of current threats news by checking websites like this.

  • Computer Attacks
  • Computers
  • Defend
  • How to
  • Safe Online Experience
  • Tips
Previous Next

Related Posts

Important Web Designing Tips

Important Web Designing Tips

Benefits of Encryption

Benefits of Encryption

How to save Time and Money

How to save Time and Money

Why & how to secure your network

Why & how to secure your network

15 Tips for being safe while Online

15 Tips for being safe while Online

Best Quality Assurance Practices

Best Quality Assurance Practices

Security, Privacy and Computers

Security, Privacy and Computers

ERP – Advantages VS Disadvantages

ERP – Advantages VS Disadvantages

Importance of SDLC

Importance of SDLC

Importance of Website in Every Profession

Importance of Website in Every Profession

Typical Internet Marketing Myths

Typical Internet Marketing Myths

Superb Marketing Strategies

Superb Marketing Strategies

How to create a productive environment

How to create a productive environment

Importance of Privacy

Importance of Privacy

Importance of Visual Consistency

Importance of Visual Consistency

Time to Revamp Your Website

Time to Revamp Your Website

7 Motivations For Workflow Management

7 Motivations For Workflow Management

Key Components of Compelling Website

Key Components of Compelling Website

Cloud Computing is the Future

Cloud Computing is the Future

Taking care of your PC

Taking care of your PC

Why Software Testing Is Important

Why Software Testing Is Important

3 Secrets to have Success in Internet Marketing

3 Secrets to have Success in Internet Marketing

Software Definition Enhancement

Software Definition Enhancement

What Is Cloud Computing and Why Use It

What Is Cloud Computing and Why Use It

2 Comments

  1. 1

    Tearsebleal

    December 24, 2011 at 9:52 pm

    My dad has been composing a study manual precisely on point with this blog, I have emailed the internet page over to him so he could pick up a couple pointers. Great post

  2. 2

    gregjohns

    December 25, 2011 at 7:37 pm

    Thanks for the material. I agree with everything you declare. My own bro is actually writing a term paper on the exact same subject and I will send out him the site to get a few tips from your writing. Appreciation for the post once again!

Comments are closed.

Open-Source Technologies
  • LAMP (Linux/Apache/MySQL/PHP)
  • Joomla Solution Development
  • Drupal Web Development
  • WordPress Integration and Customization
  • Magento E-Commerce Solutions
  • DotNetNuke Solution Development
  • Ruby on Rails Solution Development
  • Zend Framework
  • Rich Internet Applications Development
Proprietary Techonlogies
  • Microsoft.Net
  • ASP.Net Application Development
  • AJAX Development
  • Microsoft Silverlight Development
  • Microsoft Sharepoint
  • Microsoft Dynamics
  • Java Development
Software Development Services
  • Retail Software Development
  • Desktop Application Development
  • Content and Document Management
  • Secure Intranets / Extranets
  • Customer Relationship Management
  • Supply Chain Management
  • Workflow Management
  • Interactive Learning
Web Development Services
  • Web Application Development
  • Web and Enterprise Portal Development
  • Website Design and Development
  • E-Commerce Solutions
  • Web-based Database Programming
  • Social Engine Development
  • Open Source Solutions
Search Engine Optimization
  • Search Engine Optimization (SEO)
  • SEO Copywriting
  • Pay Per Click (PPC)
  • Search Engine Marketing (SEM)
  • Social Media Marketing (SMM)
  • Google Analytics Service
Quality Assurance
  • Quality Assurance
  • Automated Software Testing Services
  • Information Security and Code Review

Terms  | Privacy Statement  | Disclaimer  | Careers 

 


Copyright © THE FAS SOLUTIONS 2018 All Rights Reserved.