Information systems

  • Beranda
  • Blogging
    • Template
    • Blogging
  • Downloads
    • Software
    • Game
  • Blogging
  • Template
  • SSH Gratis
Home → Semua Post

my computer is attack

Add Comment
09.49

What To Do If Your Computer Is Attacked




Prevention is always better than a pound of cure. 

Believe it or not, it is now utterly impossible to survive without a computer. Almost anything and everything could be done on-line nowadays. 

From purchasing to selling to paying bills, one really need not go out as any transaction could actually be made thru the computer thanks to the internet. Unless of course fresh air is also available online. 

However, the computer’s flexibility has also allowed it to be vulnerable to attack from one of the most potentially harmful entities around: the computer virus.

The instance you detect that the computer you own is infected with a virus, the following are helpful tasks that you could do to protect it further and to also avoid other personal computers to be affected as well.

Use disks from trusted sources 

You do not allow your shoes to tread on any mud puddle or any dirty floor, or your shirts to be easily vulnerable to stains or dirt. Therefore, it is always best to treat your computer the same way.

As much as possible, always be careful with what kind of disks as well as files enter your computer. Either the files were downloaded from the internet or the disks borrowed from friends, it is always best to make sure where they come from or to scan them in order to avoid any potentially harmful viruses.

It is also not a good idea to download any files from internet sites that are unsafe or insecure. Also, do not immediately open attachments received via e-mail. 

Take a good look on the subject of the email as well as where the email came from. Be wary even if the email was from your contacts. 

Fortunately, there are now facilities in email services that immediately scan attachments prior to opening them. Email subjects that are vague and from senders that have gibberish email addresses must arouse your suspicion. 

Included in this group are those emails that aggressively claim that you should “Check out this message!” or that you should “See the following pics!”

Acquire a program that fights viruses

Fortunately, there are a lot of anti-virus software programs that scan and eliminate viruses once they are detected. This allows anyone to safely and confidently share data and disks, the freedom to download any files from the internet as well as open any attachments received via e-mail.

When the virus hits 

Fear not. As much as possible, relax. There is a way out of this predicament. All you have to do is to visit the web site of the manufacturer of your anti-virus software. They may have the latest software which, if it will not delete the harmful virus, could identify and detect it.

Search for a vaccine

The world wide web is available at your beck and call so you could search for any information you may need with regards to the particular virus that you want deleted. 

By entering the virus name on the search engine, all information as well as vaccine may present itself. 

Download, download, download

Be free to install as well as download any patches of software or programs that could help in eliminating the computer virus. 

You could also try to religiously follow any of the instructions that you will find in order to manually delete the virus.

Do not rest on your laurels

Do not be easily convinced that once the computer virus has been deleted, the virus is now totally eliminated. 

The best way to determine if the virus is completely destroyed is via running a virus scan. If the scan reports that no virus components have been detected, you can now relax.

Un-attach yourself from attachments

Caution must always be practiced once attachments have been received. The file extensions that one should be careful in opening are those that end in *.exe, *.doc, *.ppt or *.xls. 

However, those that end in the following extensions such as: *.js, *.vbs should – as much as possible – never be opened. 

All in all, every computer is vulnerable to be attacked. What one needs to protect your own PC is caution and preparedness to look towards the future and anticipate any potential attack prior to it happening. This ensures your computer to run as smoothly as it possibly could.
Add Comment
09.44

What To Do If Your Computer Is Attacked

keep children safe online

Add Comment
09.43
Keeping Your Children Safe Online




Children, like adults, are just as susceptible from computer and internet security risks. Thus, it is important to keep children safe and have your data protected. 

The following are simple yet effective steps so that security threats could be reduced dramatically. 


Implement parental pc control


It is always best to implement a kind of parental control when kids are using the computer. Fortunately, there are ISPs available that could be purchased as software that is separate. 

However, keep in mind that a software program is really a poor substitute for authentic supervision provided by a parent. 

Through using the Internet Explorer, it allows anyone to conveniently restrict or simply do not allow particular web sites to be seen. Settings for these could be set through passwords. 

In order to see these options, click on Tools on the menu bar, then choose Internet Options, select the tab named Content, click the button named Enable under the Content Advisor.

It is also best if you purchase software that enables you to watch and monitor any and all sites your kids go to.


Partition it now, partition it good


It is advisable to partition your personal computer into accounts that are separate. Many operating systems (these include the Mac, Windows XP, Linux) provide users the option to create different and various user accounts. 

This works well especially if you have that fear of your kid accessing, modifying or deleting your own files. Giving your child an account that is separate decreases the access amount and the privileges your child has.


Use anti-virus, anti-spyware, firewall


Software that provides anti-virus activities protects computers from any viruses that could destroy data, help prevent slow performance of your computer, helps prevent crashes and does not allow any spammers to infiltrate your e-mail. 

Basically, this works through scanning the computer and any e-mails that are incoming. If there are any that contains viruses, these are automatically deleted.

An effective anti-virus program should have constant and routine updates as well as antidotes for any latest bugs that are currently in the internet.

Meanwhile, firewalls have the ability to keep any hackers away from your own computer thereby preventing them from accessing any of your personal info without your express permission. 

Basically, a firewall is a guard that watches any attempts from the outside to access your personal computer system. It also blocks communications to and from sources that does not have your permission. As much as possible, always turn on your firewall and regularly update it. 

Anti-spyware programs meanwhile protect your personal computers from any malicious forms of spyware. What spyware does is monitor all activities you do online. It also collects your personal info while you innocently do your surfing on the web.

Through anti-spyware, it scans in a periodic manner your computer to check if it has any spyware software and programs available. After which, it offers you the opportunity to immediately remove harmful software.


Password protect your pc


Using passwords that are strong or utilizing authentication technology that is strong helps you protect your personal info.

As much as possible, keep all your passwords in a secure and safe place. Do not share your passwords over the internet, phone or e-mail. 
Remember that your ISP should not ask your password.

Hackers have the ability to acquire your password, unless of course you make it difficult for them to guess it through the following efforts: use passwords that contain eight characters including with it symbols and numerals; avoiding words that are common; avoiding using personal info; changing regularly your passwords (at least every three months). 

A good way of creating a password is to come up with a phrase that is memorable and using first letters of every word as the password of your choice. Convert these letters into particular numbers that look like letters.


Do not forget to back up files that are important

The fact of the matter is that there is no such system that is one hundred percent secure. If there are any files that are important and is currently stored in your own computer, always copy them in discs that are removable. 


After which, store them in a place that is secure. 


You could also consider software encryption. It is also best if the start-up disks in the original software you bought is readily available just in case your computer system crashes.

All in all, helping your children safe from online security threats is an effort that is well worth it.

how to avoid by adware and spaware

Add Comment
09.38
How To Avoid Being Invaded By Adware And Spyware


We've all heard of computer viruses. Even people who are neophytes to computers have heard tales of computer viruses spreading like wildfire through a network and wreaking havoc. Unfortunately those tales, while mildly exxagerated, are fairly accurate portrayals of how potentially damaging viruses can be.

Aside from regular computer viruses, however, another irritating and potentially destructive type of computer program that can infect your pc through the internet is spyware, and its little cousin, adware.

Adware by itself is generally harmless, albeit irritating. It is a program that basically inserts itself into your system and spams you with tons of unasked for and unsolicited advertising.

Spyware is a much more threatening program. Some types of spyware seem like simple adware on the surface, but aside from flooding you with ads, spyware, as its name suggests, also allows its controller to monitor and access information you have on your computer. Other types of spyware also change your pc's system configuration, leaving you open to further intrusions.

There are several methods available that can help you avoid the hazards of getting invaded by spyware. Among the most effective of these are:

Adjust your computer's security settings - the procedure for adjusting your security settings differs depending on your operating system. By and large, it can be found by looking for the option for controlling system settings or internet options. Look for the heading that refers to system security, and adjust it according to your personal tastes. For home users, setting security levels to Medium is recommended, as High security settings will actually block out some sites you may want to access.

Firewalls - these are security programs that automatically block unidentified programs that try to remotely access your terminal. You can set the parameters of the firewall so that only certain types of programs get filtered, or even limit your accessability so that only specified sources can send you data. The only disadvantage to a firewall is that sometimes it will tend to block information you try to recieve from even harmless sources if they are not specified on your firewall settings.

Anti Spyware Programs - online programs can be downloaded that are actually geared towards spyware security. When looking for such a program, find one that not only detects and intercepts spyware attempts on your system, but one that also has options to actively scan your system periodically for existing spyware that may have already gotten in. Find a provider for your anti spyware program that keeps itself updated with the latest spyware technology so that you can download patches for the program that can deal with the latest types of spyware that hackers are using.

how to protect your computer

Add Comment
09.33
How To Protect Your Computer From A Virus



This article will give you the information on how to protect your computer from a virus. A computer virus is a program that is able to make copies of itself over and over to spread throughout the files on your computer and to the files of other computers, whenever information is exchanged. These viruses can do a lot of damage to your computer in a short amount of time. It can destroy all of your files and make your computer virtually useless. The most important thing that you can learn about your computer is how to protect if from a virus. 

The first thing that you should do to protect your computer against viruses is to get a high quality anti virus software installed on your computer. Make sure you update it regularly by visiting the manufacturer's website. Use this software to scan all files, diskettes, programs and software before you use them on your computer.

Always make back up copies of important files or documents and store them on a separate CD or diskette. This will help protect your important information from accidental deletion or other damage. Always scan your disks and files after using them on another computer.

Make sure that the security features on your computer is turned on. If you are using Microsoft Windows it comes with it's own security features. Enable the following, Internet firewall, Antispyware software and Anti virus software. This trio will do the most to protect you from getting a computer virus.

Download information from only sites that you are familiar with and that you trust. Never open email attachments from someone that you don't know. Install software only from authentic CDs. If you are not sure of the source, don't install it.

Know how to recognize the signs of a computer virus and take action right away to fix it. If your computer starts acting strangely, is running slower than normal or starts shutting down by itself frequently, then you may have a virus. Other symptoms may include, strange sounds or music coming from your speakers unexpectedly. Multiple pop up messages or boxes may start appearing on the screen or you may start receiving out of memory messages even though your computer has plenty of memory left. 

If any of these things happen, first visit the website for your anti virus software and download any updates. Then run a complete virus scan on your computer. When the scan is complete, you should be given recommendations on how to remove the virus from your computer. If you are a complete novice to computers and don't feel comfortable with this step, enlist the help of a more knowledgeable person. 

A computer is a big investment and in some cases it is the lifeline of your business. Protecting it from viruses should be your number one priority.

be fair

Add Comment
09.02
you may have experienced confusion to choose between friend or girlfriend. Confused, a good word to describe your condition.On one side of a friend who had a very long and very close friends with you, invite you to hang out. But on the other side at the same time, his sweetheart, the one you love is also asking for your time with him. When the interests of friends and lovers collide like this, about which one would you choose? The best thing you can do include: 1. Be fair. Lover or friend, must have had different interests. Because you are the person closest to both parties, it is important that you should not forget is to be fair. Do not let any of them who feel secondary. Although it already has a lover, friend or friend does not mean to be forgotten. Vice versa, even though you and they have since long friendship, it does not mean sanga interests come second or even a forgotten boyfriend. The solution, for your time as possible. Try to keep the affair a girlfriend and a friend are not one-sided so as to make them cranky or angry with you. Anyone who does not want to be considered as the number two, you are too right. 2. Create a priority. The only way to overcome the confusion that often can make your head became dizzy this is to set priorities. Jelly in the catch, where the interest is more urgent and can not be postponed again. For example, if a friend asks you to meet because of a broken heart, while her boyfriend wanted to see just sekdar hang out, eat, eat, you can decide which one is preferred. Tell your lover, your friend is currently in need of your presence. As a lover of good, he will certainly understand. Vice versa, if you ask your lover to have besides for things that are urgent, while your friends ask you to come just to hang out. So, you must place the person you love it.Tell your friend, there will still be another day for you and your friends hang out to air-ria. 3.memberikan sense honestly. All of the above did not work if you are not honest and forthright to all parties. No need much reason or excuse especially mapuh use words such as "my good guns at .." solely for refusing an invitation one of them. Either lover or friend can certainly accept your condition. So, better be honest than you are confused later. Give also to their understanding that you are not do not want to meet his invitation, but only postpone wrote. 4. Gathered together. Let me set the time you are not confused for the road with friends and girlfriend, occasionally take them gathered together. There is no harm to know each other. Cried too right. You can introduce your friend to lover and vice versa. In addition, gathering together like this could be an alternative to understand the character of each.So if one day there was confusion vote, the reason you will make more sense for them. Because they also know who the friend or your lover

Strand And STORIES FOR A WORD MEANING And BENEFITS

Add Comment
09.00
BRIEF REFLECTION FOR JOINT us consider assalamu'alaikumFRIENDS ALL my brothers and sisters, many of us, Or EVENOUR Among All the Way We OWN SHORTCUT, TheCONSIDERED THE MOST EASY WAY TO LIFE is taking. THINK... IF NO CHARGES HAVE, CAN LIVE With GLAD WHENREALLY HAPPY And ... From ANY EXPENSES Or GOD GIVENTO THE PROBLEM What We, AT LEAST THERE ARE SOME THINGS What were trying to convey 'HIM, Who Among them are the following SPIRITUAL POWER TRAIN CHARACTER AndWe're A phrase saying that a sailor was never produced reliablewithout ever sailed the Ocean full of challenges. A person would not have a strong character and spirituality have neverexperienced a problem when REALIZE THAT GOD We NEEDPOWER OF LIFE The weaker We In the eyes of the World, whenwe rely on power of Allah Subhanahu wa ta'ala, then with power'HIS Such Good Life will run DO And hurry REFUSE CHARGESPROBLEM Rather Be grateful ..! Because it Insha Alla We willmake a Strong Person and Know that increases the Almighty.Hands 'NYA all that we naturally make We find meaning andsignificance "THE MORE SERIOUS CHARGES ... THESTRENGTH OF A GIVEN' IF HIS LIFE BUTTON WHITE PIANOAre Like It Is HAPPINESS And It's EASY LOAD BUTTON BLACKPIANO MATTERS ... And can be played with WHETHERTHROUGH THE SECOND bUTTON ... And the good thing isWHITE bUTTON bUTTON MORE From THIS MEAN A bLACK ..."THERE ARE MANY DIFFICULTIES IN REAL EASY ...WASSALAMU'ALAIKUM
Postingan Lebih Baru
Postingan Lama
Beranda
Langganan: Komentar (Atom)
  • Beranda
  • Sitemap
  • cara aktivasi windows vista

Translate

gampang banget cari duit disini Buruan... Daftar!!!

Entri Populer

  • free download update pes 2013
  • pes 2013 tricks

Label

  • android (2)
  • Bengkel Windows (24)
  • Cari dolar tanpa modal (1)
  • Cari duit di blog (17)
  • Free Seo (20)
  • GPS (17)
  • Information (18)
  • Lowongan Kerja (11)
  • obat (2)
  • Smartfren Tips Trik (12)
  • Software (52)
  • Tips And Trick (43)

Arsip Blog

  • ▼  2014 (1)
    • ▼  Oktober (1)
      • cara mendapatkan pulsa gratis
  • ►  2013 (13)
    • ►  Mei (1)
    • ►  April (1)
    • ►  Maret (5)
    • ►  Februari (6)
  • ►  2012 (66)
    • ►  November (1)
    • ►  Juli (2)
    • ►  Juni (27)
    • ►  Mei (15)
    • ►  April (6)
    • ►  Maret (7)
    • ►  Februari (3)
    • ►  Januari (5)
  • ►  2011 (215)
    • ►  Desember (47)
    • ►  November (23)
    • ►  Oktober (2)
    • ►  September (2)
    • ►  Agustus (28)
    • ►  Juli (55)
    • ►  Juni (13)
    • ►  Mei (16)
    • ►  April (2)
    • ►  Maret (2)
    • ►  Februari (18)
    • ►  Januari (7)
  • ►  2010 (54)
    • ►  Desember (19)
    • ►  November (15)
    • ►  Juni (8)
    • ►  April (2)
    • ►  Februari (5)
    • ►  Januari (5)
  • ►  2009 (10)
    • ►  November (10)

Tags

Copyright 2014 Information systems
Template By Ridwan Hex And Game Gratis