Safe Computing Advice
- Author Terry Chang
- Published April 30, 2012
- Word count 331
Keep your computer updated at all times and don’t forget third party applications such as Adobe, Flash, and Java. Some of the third party applications don’t get updated automatically.
It’s important to log out of your account when using public computers, by not doing so, you are putting yourself at risk because other people will be able to view and access you account.
Imagine a situation, Jack is a student and a frequent online shopper. He uses his credit card information to purchase something online but he forgets to log out when he leaves. Here comes Steve and Mike. Mike uses the same computer Jack used and sees his credit card information. The both know what they gonna do with it – a brand new home theater system for themselves at Jack’s expense. Jack gets his credit card statement and he is definitely not very happy.
Remember to choose strong passwords instead of weak passwords. Weak passwords are like leaving your keys in your door, allowing anyone to access your personal space or information. Strong passwords greatly reduce that risk because they have a minimum 9 characters, including upper and lower case letters, numbers zero through nine and some unique symbols such as the pound or dollar signs.
One more situation to imagine, Freda is going to use the public computer to check her email. She gets a popup asking her if she would like to save her password. Freda thinks and finally she decides to say No. Good job Freda.
Never open suspicious email attachments. Hackers use email attachments to send viruses to computers. An email virus can destroy files on your hard drive and resend itself to other users. It can also steal your sensitive information and turn your computer into zombie.
You must definitely use antivirus software and update it regularly too. If you still do not have any program, carefully read several Antivirus Software Reviews before installing it and choose something according to your needs.
Hello world! I am just a loving father interested in Internet Security
My site: http://privacy-pc.com/Article source: http://articlebiz.com
There are no posted comments.
- Protect your files with drive image backup software
- How Cloud Management Values Change Your Business
- The U.S. Government and Zero Day Vulnerabilities
- Spyware – Yet Another Cyber Menace
- Reset lost passwords in Windows with Active@ Password Changer
- Antivirus measures you should know when your PC is infected with a virus
- Security Fit For Royalty!
- Global VPN Use Is Booming But So Is Cyber-Censorship
- Things to do to make your business, cyber secure
- The new European data protection system
- Avoiding Disaster: Make Website and Business Asset Backups Mandatory
- 12 Ways to Keep Your Data & Identity Safe Online
- Associate With Avast Support USA To Shield PC Against Viruses And Malware
- Microsoft Office Customer Service for Office Setup
- What is All-czech browser hijacker and how to remove it
- Methods to delete Web-start.org from computer and browser
- What is Odin ransomware, how to decrypt .odin files
- How to remove Loadstart browser hijacker
- How to remove Tech-connect.biz from Google Chrome and all other browsers
- How to remove Alma Locker ransomware virus
- How to remove SOEASYSVC adware from your browser
- How to get rid of SafeSurf virus
- How to remove Cryp1 virus and to restore the encrypted files
- What is Social2Search, and how it differs from other adware
- How to remove Hohosearch adware from computer and browser
- Browser Hijackers, the Methods Of their Action And the Ways to Remove Them
- 5 Website Security Issues You Should Be Aware Of?
- What is a denial of service attack?
- How to Remove VISUAL SHOPPER completely
- Just a few Thinkings In relation to File and Document Management Systems Protection