Monday, June 30, 2014

8 taboo things up when using the computer!

Today owning a computer is simple and fast because the price of 1 more cheap computers. Whereas the use of the computer how to properly make your computer have always been reliable and stable operation, it is one thing completely different. 


Here are 8 things "dark taboo" that everyone may know is inevitable but we should limit as much as possible.

1. The Internet access without using a firewall (firewall): 



Have you ever wondered where our site is safe to visit or not? You will be lucky if one person is not "bad evil ghost that" lead you to dangerous sites. When using internet concept virus has become too familiar and one thorn in our eyes. But if your computer is equipped with one engine dedicated firewall up when we surf no longer in a state of anxiety for those stubborn viruses and dangerous on the internet. The use of firewalls has become one of today's routine every person, one seemingly simple job but it contains many important.
There are plenty of gadgets to help us avoid potential risks when using the internet as: Comodo Firewall, ESET Smart Security, ZoneAlarm, Outpost Firewall Pro, F-Secure Internet Security .... And there are a lot of work other stuff waiting for you to discover ....

2. Equip computer No 1 dedicated antivirus software: 
      Today the site is one antivirus software on your computer is extremely important, and it went deep into the subconscious every person. But there is still a lot of parts 1 person habitually anti-virus software installed on your computer. 1 of sounding incredibly confusing, but extremely easy to understand with us. There are many reasons that many people have yet to be installed first dedicated anti-virus software on your computer. It can be caused by antivirus software as the computer becomes sluggish, or cause us discomfort with signs viruses, or is more directly influenced our work .... Even anti-virus software can directly or indirectly to our work but not so light that we see no antivirus software installed on your computer. Let's minimize the unwanted antivirus software gives us.

When equipped with anti-virus software on your computer, it will help us avoid computer from virus attack risk, avoid stealing personal information and to make your computer work easier, faster and lighter softer.
There are several software that will help you do this. For those who have good computer configuration or normal, then you should use the products of Kaspersky. Typical of them you should use Kaspersky PURE, 1 powerful tool to help us protect your computer 360.
If those who do not have the economic conditions to the machine shop for his first good, then you can still use the anti-virus software is equally strong, typical of these AVIRA, 1 tool too familiar to people all over the world and many people voted "free antivirus software is the most used in 2011".

3. Habits bluff double click to open files and attachments without scanning for viruses before: 



1 job sounds very normal for those who regularly work on the computer but it contains many hidden dangers if we do not guard it carefully.
Computer users today often have a habit of double click to open any one file and it is also the fastest way to open one folder. At times like this, we usually "ì" under the crackles of mice that did not really pay attention to a directory is opened. If accidentally open the file containing the virus must then double-click the file that you have inadvertently abetted and natural virus risk losing my data is very high. Moreover, when installing certain software in one computer, we often have a habit of constantly pressing the button next to no attention in the next step that we require software install anything. 1 can install tools on the browser but the tools that directly harm us. Uncheck to not install additional applications on the web browser when you first install any software.
Also when receiving email attachments 1, because of the curiosity that we have downloaded the file and not always one little iota of thought. This indeed is "at the absolute taboo" because you have not identified the mail is sent and by whom has not verified that the file is safe? Please mail is determined by one and then the virus scan before we open it up to the absolute protection of personal information in the machine to avoid the "go on the road suddenly have 1 coconut falls on head" .

4. Set the password so simple and easy to predict: 



When using the Internet, the word password too familiar to us. Password can help us secure and personal information is the key to using one particular account. Password one can do everything with your account. But if your password "out of the door," What are you going to think? At that time, your mood will be very nervous and did not understand why the lost password and account data have been doing okay or not?
The first thing that you think your computer has "mump" keylogger software - one kind of specialized tools to steal user information. Next, if after 1 check in no keylogger software on the machine, you immediately think about is your password easy to guess not? If so, then you've encountered the first "disaster". The easily guessed password like "123456" or "qwerty" would not that be the infamous hacker also just smell that people know how to use computers can also ushered in the "test".
Here are 25 passwords for the most silly: 

1. Passwords 
2. 123456 
3. 12345678 
4. Qwerty 
5. Abc123 
6. Monkey 
7. 1234567 
8. Letmein 
9. Trustno1 
10. The dragon 
11. Baseball 
12. 111111 
13. Iloveyou 
14. The master 
15. Sunshine 
16. Ashley 
17. Bailey 
18. Passw0rd 
19. Shadow 
20. 123123 
21. 654321 
22. Superman 
23. Qazwsx 
24. Michael 
25. Football 

Despite knowing that if the hacker did want to get someone's password first, then even if we have 1 billion character password matter is still easy to get to. However, for this to work is the high hand and the hacker had too much experience but the number of hackers are so small. According to one recent study, the scientists of the password is 8 characters hacker took only 2 years to detect. Moreover, if only 4 characters, the increase would take a hacker to 17,134 years to detect. So know that even though only one character alone is more hacker also had a hard time then.
So you take your first choice for special passwords with both numbers and letters for security to protect your account information.

5. Your hard drive is too full and not be fragmented: 



Your hard drive is too full, but you must also imagine the harm that is like. When the hard drive is too full, the computer becomes sluggish and the yield of 1 was markedly reduced. The copying, moving, deleting data continuously makes my drive to lose strength over time. So at this point you go shopping immediately for 1 computer defrag software to help computer hard drive was airy, clean junk file deletion, hard disk error checking is better. There are many possibilities for this software, typically as Defraggler, Auslogics Disk Defrag ....

6. Click "rake" on the website: 

The site currently contains a virus in one network has become something "indispensable" for Internet users. This may be the shortest way to help the attacker can easily steal the personal information of users. There are many possible ways for hackers to lure victims into the trap. Hackers can steal yahoo account and send the link to the list of the victims, or also by other methods like click on the link to register for the prize or the multitude of other tricks.
Currently there are many links on the Internet that contain viruses, especially viruses or virus Foto "here you have". You will get very attractive introduction as click here to upload photos or to download the movie "..." With his curiosity is certainly upon hearing such a reflex is under 1 However users will click right on the link and from a victim's computer, the virus will spread out more and more wide. Notice carefully the link that we sent, especially the link with the. Exe or. Jpg at the end of the link. Once we have identified the link is safe or not and then you open up. There are many tools to help us do this work, which is typical in tool "web of trust" - 1 tool works on FireFox will help us to uncover link contains a virus or not?

7. Was not used to backup and restore data: 

Nothing is "absolute" and the use of computers is not one exception. On one fine day, even with the use of computer professionals has many years of experience they can not get the computer to avoid damage or further virus and hacker attacks. And to remedy this situation, a simple and effective way that most of us take regular backups of the data in the computer to facilitate data recovery process later.
There are plenty of software to help us do this but the easiest is the ghost file you just created for your self then take it to go ghost file or upload to Mediafire such!

8. 1 Data Share bluff: 


The sharing of data from the computer when "traveling" on the Internet can be one sharp knife for you. When surfing the web, network configuration information will be stored and from there the hacker can easily access your computer.
Especially you "forced" to stop sharing data in a public place while carrying his 1 laptop because this is where the hacker visit most often because of "moment" of people using computers in places like this. Be the first person knowledgeable and quick to respond to this.

Khuyenmaicoupon.biz

No comments:

Post a Comment