Putting You First For All Your Techical Needs
This Blog will contain topics related to computer technology and to help better inform the public. Feel free to contact me with any topics you would like me to cover.
|Posted Blogs Below||Dates & Titles|
Being secure and safe on the Internet
There are many ways that the average user can protect themselves. Then there are some more advanced options for those individuals that truly want to be safe.
One of the best options or first steps is never use an Email program. Instead, it is better to use Internet browsers, such as: Firefox, Chrome, Safari, Opera and many others. Many browsers allow you to use add-ons or extensions that can increase your security. They also stop popup and bad 4th party ads. Please refer to my earlier post about Helpful Browser Add-ons, for more details about this.
Did you notice that I did not include Microsoft browsers?
As a simplified rule, I avoid them and Windows Live, as it is an Email program that imports your emails into your computer and is also like a browser in its appearance. Windows Live replaced the old Outlook and Outlook Express programs, which imported your Emails to your computer.
Importing or Downloading Emails
The issue with importing your Emails is, that once you open it to look at the content, you are informing the computer that you accept its content. Therefore, if there is a hidden virus or other bad code, your anti-virus program may not catch the infection fast enough.
Everyone loves to have easy logins, to have the computer save the information and/or use the same password for everything. The sad truth is, that, that is the worst thing to do!
Never use your Email and its password to log into your computer! Windows 10 wants to make people think that they need to do this. You DO NOT need to. This will create more problems for you in the end.
Routers Security VS Modem/Routers Security
Internet Provider's modem today, come with built-in routers and wireless services. They will always say that their default settings are safe. However, they do not take into account many other forms of security issues that do not affect themselves. This is why; it is best to have a secondary router used for security.
Free anti-virus programs do a great job, as long as you remember that is all you get. Even though many of them can be set for automated updates, it is still wise to check all updates for the anti-virus checks and the program itself. It is also wise to make sure it does not go beyond the expiry date.
UPDATED Oct., 2018
Within recent time of this update, it had become evident that Mac Operating Systems now need anti-virus programs and many companies have been stepping up to give consumers more options to protect them from bad software.
In earlier posts, I have talked about this as well. There is an assortment of programs for this and they do have function in keeping your computer safe and secure.
Links To Consider:
Advanced Features and Options
There are a variety of these services available. From software, to plug-in/add-ons, to websites, all of them have their uses and all change from time to time.
The main goal here with VPN (Virtual Private Network) is to keep your communication between locations safe and secure.
Proxy services can do the same thing, but their main goal is to keep you hidden from your final Internet destination.
With this option, it is clearly a more advanced choice and it is a common practice with many services today. As a common every day user, you will never know if that location you have reached on the Internet is using the following features or similar steps.
Firewall / IP Tables
Most people have heard of Firewall and to make sure it is active. In short simple language, it contains a complex set of IP Tables. This set of code is customizable to a coder to help stop bad software, hackers, etc from doing damage to your location.
Fan2Ban & Other Software
These kinds of software keeps an automatic check on the history of the Internet traffic based on the perimeters set out by the administer. It reduces the workload of tracking and blocking bad users.
Virtual Hosting Decoys
When a black hat hacker succeeds in getting into a web server, this option can be used as a deterrent from damaging the true machine. Once that bad user gets past the modem/router and into the web server, they will see what they think this is the final destination, therefore protecting you from any further damages.