Saturday, August 30, 2008
Securing Your Computer System
1. Always make backups of important information and store in a safe place separate from your computer.
2. Update and patch your operating system, web browser and software frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com to locate possible patches for your Office programs.
3. Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs.
4. Review your browser and email settings for optimum security. Why should you do this? Active-X and JavaScript are often used by hackers to plant malicious programs into your computers. While cookies are relatively harmless in terms of security concerns, they do still track your movements on the Internet to build a profile of you. At a minimum set your security setting for the “internet zone” to High, and your “trusted sites zone” to Medium Low.
5. Install antivirus software and set for automatic updates so that you receive the most current versions.
6. Do not open unknown email attachments. It is simply not enough that you may recognize the address from which it originates because many viruses can spread from a familiar address.
7. Do not run programs from unknown origins. Also, do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They may contain a Trojans horse waiting to infect a computer.
8. Disable hidden filename extensions. By default, the Windows operating system is set to “hide file extensions for known file types”. Disable this option so that file extensions display in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that do not belong.
9. Turn off your computer and disconnect from the network when not using the computer. A hacker can not attack your computer when you are disconnected from the network or the computer is off.
10. Consider making a boot disk on a floppy disk in case your computer is damaged or compromised by a malicious program. Obviously, you need to take this step before you experience a hostile breach of your system.
Tuesday, August 26, 2008
Surfing The Web Anonymously
How do people get this basic information about you?
When you visit another web site, information about you can be retrieved. Basically, information is intercepted and used by others to track your Internet activities.
How do you stop this from happening?
First of all, it is possible to serf the web anonymously and thereby stop leaving a trail for others to find. Note that this is not fool-proof, but it makes it much harder for people to know who you are. There are products called anonymous proxy servers that help protect you. The anonymous proxy server replaces your Internet address for its own. This has the effect of hiding your IP address and making it much harder for people to track you.
How do I get an anonymous proxy server?
There are many vendors who sell anonymous proxy servers. There are also free proxy servers available to you. Two such products are ShadowSurf and Guardster. Guardster (http://www.guardster.com/) offers various services for anonymous and secure access to the web, some paid as well as a free service. ShadowSurf (http://www.shadowsurf.com/) ShadowSurf provides anonymous surfing at their site for free. Go to it and you will find a box to enter a URL that you want no one to track. There are many others, but here are two that are frequently used.
Another interesting product, given the recent news about the Google search engine filtering its findings for the Chinese government, is Anonymizer (http://www.anonymizer.com). This company, among others, recently (Feb 1st, 2006) pressed that it "is developing a new anti-censorship solution that will enable Chinese citizens to safely access the entire Internet filter-free" (http://www.anonymizer.com/consumer/media/press_releases/02012006.html).
Does an anonymous proxy server make you 100% safe?
No. Still, you are much better off if you use such technology.
What other things should I be concerned about when trying to keep my private information private?
Three other items come to mind when trying to keep your information private. First, you can use an encrypted connection to hide your surfing. This article does not go into detail on this, but search the web and you will find a lot of information on this. Secondly, delete cookies after each session. Third, you can configure your browser to remove JavaScript, Java, and active content. This actually leads to limitations, so you need to think about the cost/benefit of this course of action.
Anything else?
Wishing you happy and safe surfing!
Sunday, August 17, 2008
Website Security Rules of the Road
While many e-commerce Websites are reputable and have taken the necessary safety precautions to protect you, it never hurts to always proceed cautiously. If you are making an online purchase consider these easy steps:
1. Use only one credit card, preferably with a low credit limit, when making online purchases. Avoid using an ATM or debit card.
2. Be wary of unsolicited offers by sellers. The Internet National Fraud Information Center Watch reported that email, as a method of contact by Internet scammers was up 22% in 2004.While the offer may be legitimate, spammers like to use this tactic to side-step reputable sites that provide consumer protection for online purchases.
3. Use only reputable e-commerce websites that list a street address and telephone number in case you need to contact them directly.
4. Read the website’s privacy policy. Some websites may reserve the right to sell/give your information to a third party. Check the document to see if they allow an opportunity to “opt-out” of receiving special offers from third-party vendors or for permission to share your personal information.
5. Check for a lock symbol in the status bar at the bottom of your Web browser window. Also, do not provide your personal information if the website address doesn’t start with “https” (a sign that the site is using a secure server).
6. Choose only verified sellers. Check to see if the vendor is a verified member of a reputable third party such as the Better Business Bureau, VeriSign, or Guardian eCommerce. These third-party sites help to ensure online consumers will be protected when shopping or conducting e-commerce transactions.
7. Check that the delivery date posted is reasonable. If you have not dealt with the vendor on a regular basis, be wary of any Website that states the shipment will be delayed 20 or more days. Delivery dates of 7-10 days are more common.
8. Keep a paper trail of all online transactions. Print out a hard copy of the transaction and keep it in a file for future reference.
9. Be wary of website offers that just sound too good to be true. The Internet is littered with get rich quick scams and false advertising claims. Investigate all claims thoroughly before proceeding.
10. If you do not receive what you paid for, and the vendor will not return your emails or calls, contact your state’s Department of Consumer Affairs for further assistance.
Saturday, June 28, 2008
ZoneAlarm Internet Security
When you surf the internet or download files from it, there is a chance that someone may be watching your every move in your computer. Every key you press in your keyboard and every click of the mouse are recorded without you knowing about it. It could be anyone, and it could be someone from halfway around the world who has invaded your computer with a particular software called spyware.
Spywares may look harmless but what if you use your computer for purchasing goods over the internet? You will be typing your credit card information and personal information in order to purchase something over the internet. The thought of someone using your account without you knowing about it can make you cringe.
Today, the use of internet is getting more and more popular. Not only is the internet a great tool for communication, but it is also a tool where you can purchase goods and services right in the comforts of your own home. By just opening an online credit card account, you will be able to purchase anything you want over the internet.
However, there is a kind of software that can invade your computer and record your financial and personal information. This information will be recorded and sent to the spyware developer somewhere in the world and use this information to commit identity theft.
In order to prevent this, you have to purchase a kind of software that will be able to protect your computer against malicious software circulating around the internet today. Viruses, spyware, adware and other malicious software can be very dangerous.
One kind of software that has a good reputation is called the ZoneAlarm Internet Security Suite. ZoneAlarm Internet Security Suite is developed by Zone Labs and is a very effective security system for your PC. It can effectively ward off different malicious softwares existing in the internet today.
Here are some of the features that you can take advantage of with ZoneAlarm Internet Security Suite:
• Firewall – This program intercepts any incoming threats from hackers and viruses.
• Antivirus – This program scans files and email attachments for known computer viruses, Trojan horses, and worms and effectively cleans or deletes the files.
• Identity Theft Protection – This program secures your personal and financial information in your PC. Therefore, preventing your personal information and financial information from getting stolen.
• Anti Spyware – This program will block and remove spyware software in your computer. This is an additional protection against identity thieves.
• Spy Site Blocking – Spyware get into your PC by visiting spyware distribution websites. This feature will prevent you from ever visiting website that distributes spyware through downloadable files.
With the different security that ZoneAlarm can provide, you will definitely get your personal and financial information secured as well as get your PC protected from malicious software circulating the internet today.
This particular internet security software is also very easy to use.
So, if you are considering protecting your computer against malicious software, such as computer viruses, spyware, adware and others, you should consider purchasing ZoneAlarm Internet Security Suite by Zone Labs. This software will effectively protect your PC from the malicious software circulating the internet today.
With ZoneAlarm Internet Security, you will definitely sleep more comfortably with the thought of having security for your personal computer.
Tuesday, May 6, 2008
What are Intrusion Detection Systems
Intrusion Detection System (IDS) are a necessary part of any strategy for enterprise security. What are Intrusion Detection systems? CERIAS, The Center for Education and Research in Information Assurance and Security, defines it this way:
"The purpose of an intrusion detection system (or IDS) is to detect unauthorized access or misuse of a computer system. Intrusion detection systems are kind of like burglar alarms for computers. They sound alarms and sometimes even take corrective action when an intruder or abuser is detected. Many different intrusion detection systems have been developed but the detection schemes generally fall into one of two categories, anomaly detection or misuse detection. Anomaly detectors look for behavior that deviates from normal system use. Misuse detectors look for behavior that matches a known attack scenario. A great deal of time and effort has been invested in intrusion detection, and this list provides links to many sites that discuss some of these efforts"(http://www.cerias.purdue.edu/about/history/coast_resources/intrusion_detection/)
There is a sub-category of intrusion detection systems called network intrusion detection systems (NIDS). These systems monitors packets on the network wire and looks for suspicious activity. Network intrusion detection systems can monitor many computers at a time over a network, while other intrusion detection systems may monitor only one.
Who is breaking into your system?
One common misconception of software hackers is that it is usually people outside your network who break into your systems and cause mayhem. The reality, especially for corporate workers, is that insiders can and usually do cause the majority of security breaches. Insiders often impersonate people with more privileges then themselves to gain access to sensitive information.
How do intruders break into your system?
The simplest and easiest way to break in is to let someone have physical access to a system. Despite the best of efforts, it is often impossible to stop someone once they have physical access to a machine. Also, if someone has an account on a system already, at a low permission level, another way to break in is to use tricks of the trade to be granted higher-level privileges through holes in your system. Finally, there are many ways to gain access to systems even if one is working remotely. Remote intrusion techniques have become harder and more complex to fight.
How does one stop intrusions?
There are several Freeware/shareware Intrusion Detection Systems as well as commercial intrusion detection systems.
Open Source Intrusion Detection Systems
Below are a few of the open source intrusion detection systems:
AIDE (http://sourceforge.net/projects/aide) Self-described as "AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire. It does the same things as the semi-free Tripwire and more. There are other free replacements available so why build a new one? All the other replacements do not achieve the level of Tripwire. And I wanted a program that would exceed the limitations of Tripwire."
File System Saint (http://sourceforge.net/projects/fss) - Self-described as, "File System Saint is a lightweight host-based intrusion detection system with primary focus on speed and ease of use."
Snort (www.snort.org) Self-described as "Snort® is an open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods. With millions of downloads to date, Snort is the most widely deployed intrusion detection and prevention technology worldwide and has become the de facto standard for the industry."
Saturday, April 19, 2008
Protection You Can Afford
While a regular backup to floppy, CD, or zip drive will save your files, wouldn’t it be great if you could create an exact copy (a drive image) of your hard disk? That means backups of all your files, programs, and user settings. This would definitely save you time when it came to reloading. Acronis may be able to help.
Acronis True Image is a robust disk-imaging utility software that copies the entire contents of your hard drive including data and operating system files, personalized settings, and more, onto another disk or disk partition. Its layout is easy to use and navigate. It also includes wizards which can walk you through both backing up and restoring your computer. Highlighted features include:
· Secure Zone — allows you to save data to a special hidden partition located on your hard drive which would eliminate the need to purchase an extra hard drive.
· PC Cloning — you can upgrade to a new system disk without needing to reinstall the operating system and applications, or configure user settings.
· Acronis Snap Restore - lightening-speed restore of your PC from an image. You can start working in seconds while your system is still being restored.
Tuesday, August 7, 2007
Make It Safe
Next insert a blank CD or DVD into the appropriate drive and then find and run the software on your system that lets you create a recovery disc, which will let you restore your system to its original state. Don't neglect this step: It's essential if rogue software or an overenthusiastic family member disrupts your system to the point where you need to return it to its out-of-the-box condition.
Now—and only now—plug in your network cable or connect to a wireless network. You don't need to turn off your machine before plugging in the cable. Windows should detect your network automatically. When you're connected, Windows' automatic updates service should start running automatically; notice the shield-like icon on the taskbar. If it doesn't start in a few minutes, run Windows Update from the Start menu. Also run any software-updating service that may be installed with your machine. On some systems, the updater will run automatically; others require you to launch a Software Installer or similarly named program. Either way, it's almost always wise to install any updates proposed by the updater.
Source by www.wugnet.com
Wednesday, August 1, 2007
Tools to Protect your Internet Privacy
Using internet eraser software will make sure that no one can get into your system to steal your passwords, user names, account details, and credit card numbers. Internet eraser software has advanced features that erase your internet browser history, your address bar history, your internet browser cache, your cookies and junk files and your internet search history. You can delete your cookies one by one, so that you can choose which ones are important and necessary to keep.
The internet eraser software ensures that every part of your computer is safe from unwanted visitors. It is possible for people to secretly place unwanted items like banners and pictures on to your computer when you have been downloading something like music or video or any other program from some websites. To delete such unwanted files from your computer, the internet eraser software also includes a Media Player history eraser, a real Player history eraser, and porn tracks eraser and it deletes the unwanted files permanently.
The internet eraser software also has Google search history, Yahoo search history, and MSN search history eraser, and supports almost all major web browsers such as Internet Explorer, Opera, Netscape, and Firefox. If you do most of your work and financial transactions online, it is a good idea to take all precautions and purchase internet eraser software. Your computer can also be safer from viruses that are frequently downloaded from unsafe sites you might have visited. Now you can delete all of this information permanently from your PC.
Internet eraser software is cost effective and will ensure that your office or home office is safe from hackers, viruses and other invasions. This is also great for offices, as you can not be sure what your employees get up to all the time. They could download something potentially dangerous and even though they have deleted the original files, the hidden files downloaded in the computer can infect your PC. We all need to face facts, that today’s world is not safe and there are vicious people out there just waiting to take advantage of someone else’s lifestyle, so get your internet eraser software now to protect your family and your future.
Source By: IC
Computer Science Information
With the advent of computers to our homes the science behind it too changed. Computers were no longer huge cupboard sized gizmos which only engineers could operate they had to be pleasing and user friendly. They also had to be in shape which was more pleasing than our earlier friend the television. So there was a huge spurge of designs and methods of making a computer cute. We now have study of ergonomics which goes into creation of computer accessories like keyboards, mice etc.
This was the hardware part, the software also had to be user friendly, for you to read this article on internet there are at any given point of time four remote servers and millions of pixels on your monitor are working in harmony. This is the coordination and the high end software part. What about the display? Your browser? How should it take up all the complicated work and simplify the process to the end user. Well this is where the software came into picture, software which integrates, calculates and provides simple front end.
Computer science also gave in to related developments like internet, World Wide Web and extended networks. This made the entire world a tiny place. Now you have information at your fingertips and few clicks away. At the same time the cyber world has given rise to many cyber crimes too. Cyber crime is no longer a soft offence in many countries it's turned criminal and now a day's security has become big issue over the internet.
Security also has become big business, security not just to your hardware but also to your software. There are stray viruses over the internet waiting to get into your machine and disturb the way you work on your system. There are anti virus software's available to protect your computer from getting troubled.
Concluding this piece computer science is very similar to apples on a tree. As we all know when we discover the apple is a tasty fruit apples do appear to have discovered a way to lure us. So all Adams and Eves should watch out for the apples which they eat. Too much is definitely too bad in the cyber world.
Source By: Alexander Hjalmarsson
Wednesday, July 25, 2007
10 Ways To Protect Your Laptop Against Theft & Loss
And they should know, the U.S. Department of Justice stated in a recent report that the FBI lost 160 laptops in a 44 month period ending in September of 2005. If FBI agents have trouble keeping track of their laptops, imagine what the ordinary person is facing.
The statistics are pretty grim. A laptop is stolen every 53 seconds. Ouch!
With stats like those you have to do everything in your power to avoid becoming a victim of laptop theft. If you keep valuable personal or business information on your laptop the consequences can be even more gruesome and devastating. For laptop hardware can be easily replaced, but your valuable information may be lost forever.
So here are...
10 Practical Ways to Protect Your Laptop Against Theft, Loss or Misplacement.
1. Keep Your Eyes On Your Laptop
Be aware of your laptop at all times especially when traveling. You wouldn't leave a Thousand Dollar Bill lying around unattended would you? So watch your laptop closely.
2. Don't Use An Obvious Laptop Bag
Carry your laptop in regular luggage that doesn't look like it has a laptop. Don't advertise your laptop to any would-be thieves.
3. Use Visual Locks And Restraints
Use visual locks and restraints to secure your laptop and to act as a deterrent. It won't fool hardened thieves but most will opt for a less secure laptop. For example, you can use a product like STOP, this system works by attaching a specially-made security plate to your laptop. This plate is barcoded and registered. It also carries a warning label letting would-be cyber thieves know that the ownership of your laptop is permanently monitored.
4. Use Passwords And Encryption
Use passwords and encryption to protect any sensitive information on your laptop. Again, unless you use very sophisticated encryption it won't fool the experienced hacker or hard-core digital thief but it will slow down and hinder the common criminal.
Set a BIOS Password for your laptop. You have to take advantage of any security option that's on your laptop's OS or operating system. For those using Mac OS X you can encrypt your entire hard drive and set-up a master password in order to view it.
Windows XP & Vista lets you encrypt files and folders. Just right click your data, select properties, open general tab and then advanced to check "Encrypt contents to secure data box".
5. Use Encryption Programs Like Steganos Safe 2007
You can also try something like Steganos Safe 2007. Vital files can be encrypted and it can even turn your USB thumb drive or iPod into a key for unlocking your hard drive.
6. Use Anti-Theft Software Like LoJack
Use anti-theft software that can track and locate your laptop or computer through the IP address once the stolen laptop is used to access the Internet. Use systems like "LoJack For Laptops". It costs Costs around 50 bucks a year but it may be worth that price for your peace of mind alone.
According to the info on their site they recover 3 out of 4 stolen laptops equipped with the LoJack system. It basically places hidden and silent software that reports back the IP address and location of the laptop once it is stolen and the thief connects to the Internet.
7. Use Invisible Ultraviolet Markings
Use invisible ultraviolet markings so that any recovered stolen laptops will be clearly marked as yours to the police. Keeping track of your laptop's serial number is also a good idea and have this number stored in a different place other than on your laptop.
8. Try Remote Data Deletion
If you place important information on your laptop have a remotely controlled self-destruct solution in place. Then your highly sensitive information can be deleted remotely after your laptop is stolen.
9. Be Prepared
Create company policies for management of your company's laptops. Have set procedures in place for tracking and reporting of any laptops stolen or misplaced. Be prepared for the inevitable.
10. Backup Backup Backup
Regularly backup any vital information you have on your laptop. Most information will be useless to potential thieves but may be extremely important to you personally or for the running of your business.
No matter if it is through theft or simple misplacement, losing a laptop is a painful experience, one you should avoid at all costs. However, if it does happen to you, be assured you can minimize the pain by having a complete backup of your laptop's contents. In most cases, this information will be much more valuable than the laptop itself.
For hardware can be easily replaced, your personal data and months/years of work may take forever to recover or redo. Sometimes it is lost forever, so BACKUP your information regularly. Keep your laptop and its contents safe and out of harm's way. Simply protect yourself and your laptop by using the tips you have just read.
Article Source: http://www.superfeature.com
By: Titus Hoskins
Tuesday, July 24, 2007
What Is Adware and What Can You Do to Prevent It from Affecting Your System?
Of course, that is an example of your consent to having adware installed on your system. Another possibility is that you install software and don't fully read the part of the user agreement that suggested that third-party software was included to see how the software was used on your computer.
This third-party software is typically adware. With it, the person who wrote the software can collect money from advertisers who will be able to know which users might be interested in their products.
For many people. However, adware quickly becomes an annoyance. In addition to feeling uncomfortable that they are being watched – associating the feeling with being spied on and the adware with spyware – they just want to be able to go about using a program or surfing the internet without a steady stream of advertising or even advertising pop-up windows slowing them down.
As a result, they start looking for ways of removing adware from their computer.
Removing adware from your computer can be done by installing ad-blocking software. Removing adware, in many cases, can also be done with the installation of anti-spyware programs.
But why settle for removing adware when you can make efforts to keep it from getting on your computer to begin with? Rather than dealing with adware and having to find ways of removing adware from your system, consider doing the following:
· Read the licensing agreements that come with software programs that you are thinking about installing. If a mention is made of third-party software that will track the way you use the program or the software is listed as ad-supported, do not agree to the terms of service and choose an alternate program. In many cases, the user agreement or licensing agreement are available to you before you download and install the software;
· Choose the free but feature limited software or pay for the program rather than using the advertising supported version to avoid installing adware on your system;
· If you think that you are getting adware or spyware on your system and you have been using Internet Explorer as your web browser, consider making the switch to another browser that contains ad-blocks;
· Make sure that the security patches for your computer's operating system as well as your anti-spyware and firewalls are up to date.
In easer words, the best means of removing adware from your computer is to not install it in the first place. Taking control of your computer is not only the best way of preventing adware but also some of the more dangerous security threats including spyware, trojans, worms and viruses. Once you have the right software installed you can now Surf the net with more confidence, privacy and therefore with more security.
Article Source: http://www.superfeature.com
By: kirby
Saturday, July 14, 2007
Things to do for a healthy and secure PC
---------------------
Many who read this article may find these recommendations to be old news. However, think about the number family, friends, and associates that ask you for help fixing their PC and I believe you will understand why I chose to write this article..
This list of recommendations for a healthy & secure PC is by no means a complete list of everything you can and should do. It is however a great start if you want to keep your computer running properly for an acceptable period of time. It will also help prevent some of the most common issues related to PC security.
1. Hard Drive Fragmentation
---------------------
Believe it or not, many people have never even heard of hard drive fragmentation, or the process of Defragmentation. In a nutshell, when you install software or create files and data, the Operating System stores this data on your hard disk drive. The most efficient way of storing this data would be in one continuous disk file. However, files are not always stored this way, or are initially stored this way and later become split up, or fragmented. Because of this, when the data or file is retrieved, the hard drive must be searched in multiple places just to combine data that makes up one file. This slows things down tremendously. If you are running Windows 2000 or Windows XP, you should perform a disk defrag at least once every two weeks, more if possible. All of my systems run this process automatically once every week in the evening hours.
2. Installing Games & Disk Intensive Software
---------------------
If you're a gamer, or regularly use disk intensive software, the above Defragmentation process will help. However, you can also take another step to make things move a little faster. If you have two physically separate disk drives in your system, I suggest that you use one primarily for the Operating System and related software, and devote the other physical disk for installing games and other disk intensive applications. This cuts down on the competition for disk resources between your Operating System and other applications. There are other things you could do as well, such as configuring the appropriate type of RAID where multiple disks appear to the operating system as one big logical disk drive. This takes a little more planning to get the most out of your drives so I'll cover that in a future article.
3. Virus & Spyware Protection
---------------------
The bottom line here is; make sure you have installed some sort of anti-virus and spyware protection. Furthermore, don't just assume that the default configuration of the program is best suited for your environment. For instance, I can't tell you how many people I know whose computer has contracted a serious virus because of just one minor but very important task. When the anti-virus software pops up a message and tells you that your subscription is about to expire, don't just hit the ignore button. Take a five minute break from what you are doing and renew your virus signature subscription. Not only will this keep you up to date on newer viruses, it will allow your software package to update to newer versions. The same thing goes for spyware protection. There are plenty of free spyware protection solutions out there, none are perfect, but most do the job. I suggest using Microsoft's AntiSpyware Beta package at the least.
4. Software & Hardware Firewall Protection
---------------------
If you are not using a firewall, then you are just asking for trouble. Actually, there is a significant chance that your system is already compromised if you have no firewall protection at all. Many cable/DSL router combo devices have built in firewall protection, and this is at least a good start. However, if you have Windows XP SP2, go ahead and enable the built in firewall as it will provide you another level of protection. Oh, yes, and when the system pops up a message about whether or not to allow a certain application or communication to take place, don't just hit the ok button, read it thoroughly then make a decision.
5. Installing & Uninstalling Applications
---------------------
Just about every time you install a new application or piece of software you increase the time it takes to boot your PC and in some cases decrease its performance. On thing that drives me crazy is printing software. For the life of me I cannot understand how or why printer support software could total 400MB in size, but they sometimes do. Not only that, they tend to load all kinds of unnecessary real-time running applets. HP printers are notorious for this. Be very aware of what it is you are loading and only load those components that you need. Even some off-the-shelf software packages load adware and other not so helpful applets. Also, when you uninstall software, not all the software gets uninstalled in many cases. One thing I suggest is to purchase a registry cleaner. This can dramatically decrease boot times and in many cases increase the overall performance of your PC.
6. Purchasing & Downloading Items On The Internet
---------------------
When you download or purchase any software from the Internet, make sure you pay close attention to everything you are agreeing to or checking off on the various pages that lead up to the final purchase or download. As with everything else, make sure you read the fine print. You may be agreeing to download and install something you don't need or may impact the security and performance of you PC. Also, how many more mailing lists do you really need to be on? How many Internet Explorer tool bars do you need? Most of these tool bars should be renamed to "adware / spyware bars"
7. Installing Operating System & Application Patches
---------------------
In a nutshell, if you are using Windows XP, make sure that automatic updates are turned on. This is very important. Microsoft releases security and bug fixes routinely and some of them are critical in nature. Something people tend to overlook is updating and patching their applications. For instance, Microsoft Office has critical security patches and performance enhancements available in the form of patches and service packs. It's not just Operating System bugs that can put you at risk, applications can too.
8. Updating Drivers
---------------------
Similar to the above, hardware manufacturers routinely update their drivers. This includes video cards, sounds cards, capture cards, system boards, you name it. Some manufacturers have started to release automatic updates for their hardware, but many have not. Make sure you check these sites regularly and when a driver update is available, install it.
9. What Do Your Children Download
---------------------
This is a really big one. I can' tell you how may times I have been told by people that they have no idea how something got installed on their computer. Usually their second sentence contains "one of my children must have downloaded it". The first thing that comes to mind is "why do parents let kids download what ever they like in the first place". Not only can this severely impact the security and performance of your computer, who knows what your kids are getting their hands on. Do you know what one of the most frequently installed application installs I see on a teenagers machine is? Kazaa, BearShare, eDonkey, all P2P file sharing programs. I don't care what anyone says regarding how convenient and safe these applications are now, they are wrong. Monitor what your children are doing / downloading on the Internet. Install a parental control software package if need be.
10. Rebuilding Your Operating System
---------------------
If you are not familiar with system imaging software, I suggest you read up on them. One of the most popular packages is "ghost" and it's been around for quite some time. I rebuild my systems pretty much on an annual basis. When I first configured them, I used an imaging package to create a complete image of the basic OS and application install. This allows you to not only re-install the base operating system and applications by hitting just one button, but can save you big time in the event of a system disaster.
Conclusion
---------------------
Many of my peers and other technical people will read this and say it's all common sense and very basic. Well, if this is what you do for a living then yes, it is. But many people don't know these things or did know about them and have forgotten. So many PC are in such bad shape and it's beyond me how the average person even deals with it. It has to be frustrating not knowing where to turn or what to do, especially if you don't have a tech friend or family member to call on. I hate to sound pessimistic, but things are not getting better for the average home or small business person. Technology should not be this difficult to maintain. The average person just wants something that will work, and stay working.
Source:
http://www.defendingthenet.com/newsletters/TenThingsToDoForAHealthyAndSecurePc.htm