Good Security Habits

Thursday, November 4, 2010

There are some simple habits you can adopt that, if performed consistently, may dramatically reduce the chances that the information on your computer will be lost or corrupted.
How can you minimize the access other people have to your information?
You may be able to easily identify people who could, legitimately or not, gain physical access to your computer—family members, roommates, co-workers, members of a cleaning crew, and maybe others. Identifying the people who could gain remote access to your computer becomes much more difficult. As long as you have a computer and connect it to a network, you are vulnerable to someone or something else accessing or corrupting your information; however, you can develop habits that make it more difficult.
  • Lock your computer when you are away from it. Even if you only step away from your computer for a few minutes, it's enough time for someone else to destroy or corrupt your information. Locking your computer prevents another person from being able to simply sit down at your computer and access all of your information.
  • Disconnect your computer from the Internet when you aren't using it. The development of technologies such as DSL and cable modems have made it possible for users to be online all the time, but this convenience comes with risks. The likelihood that attackers or viruses scanning the network for available computers will target your computer becomes much higher if your computer is always connected. Depending on what method you use to connect to the Internet, disconnecting may mean disabling a wireless connection, turning off your computer or modem, or disconnecting cables. When you are connected, make sure that you have a firewall enabled.
  • Evaluate your security settings. Most software, including browsers and email programs, offers a variety of features that you can tailor to meet your needs and requirements. Enabling certain features to increase convenience or functionality may leave you more vulnerable to being attacked. It is important to examine the settings, particularly the security settings, and select options that meet your needs without putting you at increased risk. If you install a patch or a new version of the software, or if you hear of something that might affect your settings, reevaluate your settings to make sure they are still appropriate.

What other steps can you take?

Sometimes the threats to your information aren't from other people but from natural or technological causes. Although there is no way to control or prevent these problems, you can prepare for them and try to minimize the damage.
  • Protect your computer against power surges and brief outages. Aside from providing outlets to plug in your computer and all of its peripherals, some power strips protect your computer against power surges. Many power strips now advertise compensation if they do not effectively protect your computer. Power strips alone will not protect you from power outages, but there are products that do offer an uninterruptible power supply when there are power surges or outages. During a lightning storm or construction work that increases the odds of power surges, consider shutting your computer down and unplugging it from all power sources.
  • Back up all of your data. Whether or not you take steps to protect yourself, there will always be a possibility that something will happen to destroy your data. You have probably already experienced this at least once— losing one or more files due to an accident, a virus or worm, a natural event, or a problem with your equipment. Regularly backing up your data on a CD or network reduces the stress and other negative consequences that result from losing important information . Determining how often to back up your data is a personal decision. If you are constantly adding or changing data, you may find weekly backups to be the best alternative; if your content rarely changes, you may decide that your backups do not need to be as frequent. You don't need to back up software that you own on CD-ROM or DVD-ROM—you can reinstall the software from the original media if necessary.


Both the National Cyber Security Alliance and US-CERT have identified this topic as one of the top tips for home users.

Authors: Mindi McDowell, Allen Householder
Produced By:US-Cert

Debunking Some Common Myths

Monday, November 1, 2010

Produced By:US_Cert
There are some common myths that may influence your online security practices. Knowing the truth will allow you to make better decisions about how to protect yourself.

How are these myths established?

There is no one cause for these myths. They may have been formed because of a lack of information, an assumption, knowledge of a specific case that was then generalized, or some other source. As with any myth, they are passed from one individual to another, usually because they seem legitimate enough to be true.

Why is it important to know the truth?

While believing these myths may not present a direct threat, they may cause you to be more lax about your security habits. If you are not diligent about protecting yourself, you may be more likely to become a victim of an attack.

What are some common myths, and what is the truth behind them?

•Myth: Anti-virus software and firewalls are 100% effective.

Truth: Anti-virus software and firewalls are important elements to protecting your information (see Understanding Anti-Virus Software and Understanding Firewalls for more information). However, neither of these elements are guaranteed to protect you from an attack. Combining these technologies with good security habits is the best way to reduce your risk.

•Myth: Once software is installed on your computer, you do not have to worry about it anymore.

Truth: Vendors may release patches or updated versions of software to address problems or fix vulnerabilities (see Understanding Patches for more information). You should install the patches as soon as possible; some software even offers the option to obtain updates automatically. Making sure that you have the latest virus definitions for your anti-virus software is especially important.

•Myth: There is nothing important on your machine, so you do not need to protect it.

Truth: Your opinion about what is important may differ from an attacker's opinion. If you have personal or financial data on your computer, attackers may be able to collect it and use it for their own financial gain. Even if you do not store that kind of information on your computer, an attacker who can gain control of your computer may be able to use it in attacks against other people (see Understanding Denial-of-Service Attacks and Understanding Hidden Threats: Rootkits and Botnets for more information).

•Myth: Attackers only target people with money.

Truth: Anyone can become a victim of identity theft. Attackers look for the biggest reward for the least amount of effort, so they typically target databases that store information about many people. If your information happens to be in the database, it could be collected and used for malicious purposes. It is important to pay attention to your credit information so that you can minimize any potential damage (see Preventing and Responding to Identity Theft for more information).

•Myth: When computers slow down, it means that they are old and should be replaced.

Truth: It is possible that running newer or larger software programs on an older computer could lead to slow performance, but you may just need to replace or upgrade a particular component (memory, operating system, CD or DVD drive, etc.). Another possibility is that there are other processes or programs running in the background. If your computer has suddenly become slower, you may be experiencing a denial-of-service attack or have spyware on your machine (see Understanding Denial-of-Service Attacks and Recognizing and Avoiding Spyware for more information).

-------------------------------------------------------------------------------
Author: Mindi McDowell

-------------------------------------------------------------------------------

Understanding Anti-Virus Software

Saturday, October 30, 2010

Produced by:US-Cert
Anti-virus software can identify and block many viruses before they can infect your computer. Once you install anti-virus software, it is important to keep it up to date.

What does anti-virus software do?

Although details may vary between packages, anti-virus software scans files or your computer's memory for certain patterns that may indicate an infection. The patterns it looks for are based on the signatures, or definitions, of known viruses. Virus authors are continually releasing new and updated viruses, so it is important that you have the latest definitions installed on your computer.

Once you have installed an anti-virus package, you should scan your entire computer periodically.
•Automatic scans - Depending what software you choose, you may be able to configure it to automatically scan specific files or directories and prompt you at set intervals to perform complete scans.

•Manual scans - It is also a good idea to manually scan files you receive from an outside source before opening them. This includes

◦saving and scanning email attachments or web downloads rather than selecting the option to open them directly from the source
◦scanning media, including CDs and DVDs, for viruses before opening any of the files

What happens if the software finds a virus?

Each package has its own method of response when it locates a virus, and the response may differ according to whether the software locates the virus during an automatic or a manual scan. Sometimes the software will produce a dialog box alerting you that it has found a virus and asking whether you want it to "clean" the file (to remove the virus). In other cases, the software may attempt to remove the virus without asking you first. When you select an anti-virus package, familiarize yourself with its features so you know what to expect.

Which software should you use?

There are many vendors who produce anti-virus software, and deciding which one to choose can be confusing. All anti-virus software performs the same function, so your decision may be driven by recommendations, particular features, availability, or price.

Installing any anti-virus software, regardless of which package you choose, increases your level of protection. Be careful, though, of email messages claiming to include anti-virus software. These messages, supposedly from your ISP's technical support department, contain an attachment that claims to be anti-virus software. However, the attachment itself is in fact a virus, so you could become infected by opening it (see Using Caution with Email Attachments for more information).

How do you get the current virus information?

This process may differ depending what product you choose, so find out what your anti-virus software requires. Many anti-virus packages include an option to automatically receive updated virus definitions. Because new information is added frequently, it is a good idea to take advantage of this option. Resist believing email chain letters that claim that a well-known anti-virus vendor has recently detected the "worst virus in history" that will destroy your computer's hard drive. These emails are usually hoaxes (see Identifying Hoaxes and Urban Legends for more information). You can confirm virus information through your anti-virus vendor or through resources offered by other anti-virus vendors.

While installing anti-virus software is one of the easiest and most effective ways to protect your computer, it has its limitations. Because it relies on signatures, anti-virus software can only detect viruses that have signatures installed on your computer, so it is important to keep these signatures up to date. You will still be susceptible to viruses that circulate before the anti-virus vendors add their signatures, so continue to take other safety precautions as well.

--------------------------------------------------------------------------------
Both the National Cyber Security Alliance and US-CERT have identified this topic as one of the top tips for home users.
--------------------------------------------------------------------------------
Authors: Mindi McDowell, Allen Householder
--------------------------------------------------------------------------------

Choosing and Protecting Passwords

Thursday, October 28, 2010

Produced by:US-Cert
Passwords are a common form of authentication and are often the only barrier between a user and your personal information. There are several programs attackers can use to help guess or "crack" passwords, but by choosing good passwords and keeping them confidential, you can make it more difficult for an unauthorized person to access your information.
Read More>

Cyber Security Tip

Wednesday, October 27, 2010

Produced by:US-Cert
Why is Cyber Security a Problem?

You've heard the news stories about credit card numbers being stolen and email viruses spreading. Maybe you've even been a victim yourself. One of the best defenses is understanding the risks, what some of the basic terms mean, and what you can do to protect yourself against them.
Read More>

Blogger’s block

Monday, October 25, 2010

Comprehensive Reviews in Food Science and Food...Image via Wikipedia
Blogger’s block. Some of you may already know that kind of feeling. These are times when you feel that you cannot seem to start blogging anything. That everything is so clustered and you cannot begin to write one single word.
How could this happen when you were so good at blogging before? Why is it that you cannot get one word written? And the more you think about blogging, the more you are not able to blog.
What is the best thing to do when you find yourself situations like this?
Below are ideas that you might find helpful during your “cannot seem to blog” days.

Blogging Made Easy

Sunday, October 24, 2010

Most of the time bloggers find some qoutes to place or replace them in HTML codding,and the most difficult part is looking all the codding up and down just to replace it.

The easy way is just press CTRL+F,there will be a bar appear named;Find.

Just write down whatever you are looking for and you will have it in front of you.

Enjoy the tip.

How to make a New folder Invisible

Saturday, October 23, 2010

If you wanna make invisible folder and play trick with your friends and family or even you can use this for secruity purpose,if you wanna do so just simply do the following steps:

  1. Make a new folder on desktop.
  2. Right click on it.
  3. Hit RENAME.
  4. Now,Press ALT+0160 and then,let the ALT go.
  5. Congrats!The name is removed.
  6. Now,go into its PROPERTIES>CUSTOMIZE.
  7. Select Change Icon. 
  8. In icons there is a icon that is invisible.
  9. Select it.
Enjoy the trick.Keep checking for more Tips and Tricks.

Something Special

Wednesday, September 22, 2010

Image representing Internet.com as depicted in...
Now today there is something special for you

Some unanswerable Question are on your door

Monday, September 20, 2010

The Top 10 Unanswerable Questions




1. What is the meaning of life?
2. Is there a God?
3. Do blonds have more fun?
4. What is the best way to lose weight?
5. Is there anybody out there?
6. Who is the most famous person in the world?
7. What is love?
8. What is the secret to happiness?
9. Did Tony Soprano die?
10. How long will I live?

Give the answers of these question to prove yourself to be a genius.

Windows 7 Paint Tool

Sunday, September 19, 2010

Hey friends!Did you checked out the paint tool of Windows 7?If not,then go and check it out.
Read More>>

Internet Error Code and Meaning

Saturday, September 18, 2010

Sometime you are browsing the internet and trying to open any website, your e-mail and any FTP sites , but you see different error codes there. You should be familiar with these error codes. You can solve these problems if you are well-known with the meaning of error codes.
Read More>>

Windows 7 New Tool

Friday, September 17, 2010

Windows Journal
Windows Journal:
Read More>>

Tip of the Day # 13

Wednesday, September 15, 2010

How to disable delete confirmation dialog box in Windows 7 ?

Its a very nice and easy tip to follow and also very useful.So,what are you waiting for just check it out!
Read more>>

Tip of the Day# 12

Tuesday, September 14, 2010

Online Calculator:
If you are a mathematician or an accountant,you might need a calculator and some other stuffs;Like graph,bakers thermometer,factoring calculator.

Poodwaddle.com


You can use Poodwaddle.com to do these mathematical calculation,probably not in the Windows version.
Enhanced by Zemanta

Tip of the day# 11

Friday, July 30, 2010

Hay Friends!Today I'm going to share some of the websites that I personally like,and I'm definitialy sure it will increase your knowledge,these websites are really great and I highly prefer you to check them out!

Read More>>

Tip of the day# 10

Thursday, July 29, 2010

How to select the whole word?


A friend of mine asked me about saving time while typing,at that time I did not know much about computers but I know one tip that really helped him.And today I'm sharing that tip with you,let's check it out;
Read More>>

Tip of the day# 9

Saturday, July 24, 2010

Q:What to do on Computer when get bored?
A:Well,I don't think that someone can get bored on the internet,internet is a whole world out there you can do alot of stuff on it, here's a little list of some things,but they are not all.
Read More>>

Tip of the Day# 8

Friday, July 23, 2010

Microsoft Office Excel 2007Image via Wikipedia
EXCEL KEYBOARD SHORTCUTS


Here are several keyboard shortcuts for you Excel power users.

These keystrokes change a cell’s format on the fly:
Read More>>

Tip of the day# 7

Thursday, July 22, 2010

Hay guys! How you doing? Today we are going to talk about setting the multiple home pages in Internet Explorer.Let's check out how to do that.
Read More>>

Tip of the Day# 6

Wednesday, July 21, 2010

Top 10 keyboard shortcut key everyone should know:
Using keyboard shortcuts can often cut the time it takes to do something on a computer in half. Below are our top 10 keyboard shortcuts we recommend everyone memorize and use.
Read More>>

Tip of the Day# 5

Tuesday, July 20, 2010



websiteImage via Wikipedia
How to Access the blocked website?

Today we are going to know about this "HOW TO ACCESS THE BLOCKED WEBSITE?".Have you ever tried to access the blocked website?If not try it today because now you will know the way to do that.

Actually there's alot of websites who offers this some of them I have listed below check them out.


90 Proxy Websites To Access Blocked Websites


Its a whole library of proxy websites.

Tip of the Day#4 (Internet Tips)

Sunday, July 18, 2010

Google Search Engine:
Today's tip is about Google Search Engine that "how you can have the better search result?" of what you were having till now,actually google is a very sensitive searcher and it count every word that you write,here are some tips that can give you much better results:

Image representing Google Search as depicted i...Image via CrunchBase
Read More>>

Tip of the Day# 3

Windows 7 Calculator:

Have you checked out the calculator of Windows 7?If not just go and check it out it contain alot of new features,now it have the Programmer's calculation,Statistics and unit converter and Data calculator,Workshteet Plan.You can have much better calculation with Windows 7 then the past versions of Windows.
So,what are you waiting for now you have a new and nice calculator Just enjoy it.
Have A Nice Day!!!                                                                                                      
  

Tip of the Day #2

Friday, July 16, 2010

Expand the 'Send To' Menu:
When you use the option 'Send To',we have options like;Desktop,Document and CD-ROM etc.But it can be expanded through a very simple and easy way,Just before right-clicking press the Shift Key.

Tip of the Day #1

Flip Your Screen!
Hay!Have you ever thought what will happen If your computer screen get flipped?Its a really good trick that you can apply on your friends and family...Lets see How its get done.

Read More>>

Apple:The MacBook

Wednesday, July 14, 2010

AApple has launched a new MacBook with better performence,let's check it out.

2.4GHz : 250GB

    MacBook ProImage by nobihaya via Flickr
  • 2.4GHz Intel Core 2 Duo
  • 2GB DDR3 memory
  • 250GB hard drive1
  • 8x double-layer SuperDrive
  • NVIDIA GeForce 320M graphics
  • Built-in 10-hour battery2
  • Polycarbonate unibody enclosure
  •  And now the price:$999.00


Enhanced by Zemanta

Great News IT Updates

Hay Friend!There's a great news,that I've now lauched the IT Updates section where you will get all the Technology updates,So what are you waiting for just stay tunned to get all the updates.
From,
Administration.
STalib.

Computer Tips and Tricks

Wednesday, June 30, 2010


Computer Tips and Tricks
Computer training is possible through formal education like online Computer tips, Networking Tips , Hardware Tips , Registry Tricks and other computer science programs also.

It is no great mystery that major shifts in cultural and societal processes are marked with new advances in technology. This is also true of information technology. The printing press, the camera, the telephone, the computer, the Internet and the cell phone, are all inextricably linked to major changes in human culture. The printing press is linked to the rise of social movements.

Read More>>