Your Library for the latest IT Security News, Alerts, Threats and Tips and Android Games
Recent Articles
Home » Posts filed under tips
Showing posts with label tips. Show all posts
Showing posts with label tips. Show all posts
Thursday, 1 January 2015
Thursday, 1 January 2015
- 0 Comments
This post is to say thank you to all the fans of Daily Blogg Tips with a recap of some of the most important dos and don’ts of Internet Security. Read on.
The first official post on our blog was live on October 19th, 2006. And since then, we have been diligently striving to keep you updated with the latest happenings in the computer security world. As we are just a couple of days away from welcoming yet another new year, we would like to thank all our fans, readers, and followers for their readership and contribution to this blog. And as a thank you note, we are recapping one of our most commented and read posts – The Dos and Don’ts of Internet Security. We hope that the following tips help enhance your digital experience for the coming year.
Dos and Don’ts of Internet Security
#1. While giving away personal or financial information on any website, check if its URL begins with ‘https’. Also look for the lock icon, which indicates that the connection is secure.
#2. Never shop online, make financial transactions or login into accounts over free, unsecured WiFi networks.
#3. Create long, unique, and hard to guess passwords. Never keep the same password for different online accounts.
#4. Enable Secure Browsing for your Facebook account.
#5. Keep your computer’s Firewall ON
#6. Avoid making your personal information public on social media sites and Internet in general.
#7. Avoid checking ‘Keep me logged in’ or ‘Remember me’ options on websites, especially on public computers.
#8. Use your primary email address to stay in touch with people you know or are acquainted with.
#9. Never use your official email address for social media sites.
#10. For social media sites, use an email address that you do not use for important communications.
#11. Tighten your privacy settings on Facebook so that only your friends are notified about your activity.
#12. Never use any of your personal information such as name, date of birth, address, etc., as your password.
#13. While you are online in a public setting such as a coffee shop, mall, airport, etc., watch your back to make sure no one’s snooping on you.
#14. Never trust emails asking for your personal or banking information. Be extra cautions against links or attachments in unknown or unwanted emails. Verify any such communication with the sender first.
#15. Do away with old accounts that you do not use anymore.
#16. Do not make your photos or videos public on social media sites. Keep them visible to friends you know, and your family.
#17. Never respond to pop up ads that may come up on your screen. Close such pop ups from the the task manager; press Alt+Ctrl+Delete.
#18. Before downloading any free software, research on the software and the website hosting it.
#19. Avoid visiting inappropriate websites or websites that you are not fully aware of.
#20. Beware of files with multiple extensions.
#21. Always log out of online accounts when you are done. This is especially important when you are using a public computer.
#22. Do not click or share posts on Facebook that claim to show any unusual content such as shocking videos or magical illusions. Verify such news from other sources.
#23. Access your bank’s website by manually typing its URL in the address bar.
#24. Do not click any links in emails to access your bank’s website.
#25. Keep your software and operating system up-to-date.
#26. Do not install software that comes as an attachment in emails.
#27. Always shop from reputed and know online stores.
#28. Update the Internet browsers and software on your computer.
#29. Use up-to-date security software that offers multilayered protection.
#30. Increase your awareness of cyber security and share the same with friends and family.
#31. Avoid online shopping on public computers or networks.
#32. If you are buying from an online website for the first time, do a little research about the site and go through its privacy policies.
#33. Change your Internet banking passwords at periodical intervals and never share them with anyone.
#34. Avoid saving your credit/debit card information on websites and web browsers.
#35. Never share your financial details on phone or email, even if the caller/sender seems genuine. Remember, people in cyberspace are not always what they seem to be.
#36. Avoid downloading software from unverified publishers.
#37. Always lock your computer when not in use. Do not leave it unattended, especially in public places.
#38. Keep passwords that have a mix of uppercase and lowercase letters, numbers, special characters, and are at least 8 characters long.
#39. Avoid public networks for accessing websites that require you to sign in to access any information.
#40. If you store any critical information such as social security number, credit card number, bank account details, passwords, etc., in external storage devices, ensure that the data is encrypted.
#41. Accept friend requests only from people you know and have met with in person.
#42. Treat an online stranger in the same way as you would treat a stranger in the real world.
#43. If you suspect that a message from a friend is fraudulent or strange, call or meet the friend to discuss it.
#44. Protect your device with a screen lock. Turn the automatic screen lock function ON.
#45. Don’t root or jailbreak your device. It will make your device vulnerable to attackers.
#46. Install apps only from trusted and official sources.
#47. Turn OFF Wi-Fi, Location Services and Bluetooth when not in use.
#48. Avoid sending or saving personal & overly sensitive information on your mobile device.
#49. Avoid mobile apps that ask for unnecessary permissions.
#50. Install a mobile security app with features such as Anti-malware, Anti-theft, Call & SMS filter, Privacy Protection and Remote Device Management.
And that would be all for the top 50 dos and don’ts of Internet security that will protect you from online threats and hackers this year and the years to come. Have A Happy and Splendid New Year 2015!
Sunday, 21 December 2014
Sunday, 21 December 2014
- 0 Comments
A tired, old PC really can make your blood boil. But sometimes even new PCs can clog up and run slowly. The Independent came up with 10 great quick fixes anyone can perform.
When you buy a new PC the chances are there are a load of programs pre-installed onto it. Old PCs can simply accumulate these over time. Most of these you'll never use and some of them can often run in the background without you knowing, slowing your computer down in the process.
To remove these click "Start" then go to "Control Panel" then click "Programs and Features" and scroll through the list, uninstalling the ones you never use.
If you're unsure what should stay or go, use PC Decrapifier - a free piece of software that recommends what is worthwhile or not.
2. Delete Temporary Files
Whenever you use internet Explorer all your browsing history remains in the depths of your PC. The same thing happens when you install something. It's like never throwing away the packaging when you buy a new TV and by doing so it'll free-up space on your system. To get rid of all this clutter open "My Computer", select your main drive, click the "Windows" folder then open the folder inside that called "Temp".
Goto: Run and Type Temp and Enter you will see a window. Delete all the things you seeing inside this folder. Otherwise use your mouse to right-click on the folder, and in the "View" options, choose "Details". Once this is done, select all the files that are older than the current date and press the delete key. Then go to the Recycle Bin on your desktop and empty it.
Or Also
If your PC takes an age or long time to turn on and be ready for action your hard drive might be the fault. Typically they have loads of moving components and can take a long time to fire up. A solid state drive uses flash memory (like a massive USB stick) and can read data a lot quicker therefore speeding up your start-up.
4. Get More Hard Drive Storage
No matter if you keep your computer tidy, if your hard drive becomes too full, it will affect the speed of your PC. If you use your system for processor-heavy tasks, such as recording video and media the likelihood will be that your drive will get chokka before you know it. Nowadays you can get mega storage drives over 1TB which is good for thousands of HD movies.
Whenever you switch on your PC some programs will automatically start to run in the background. Things like Skype and Spotify are guilty of this. All the applications running will use your computer's memory so ditch the ones you don't need running.
To do this click Start and type "Run". In the box that appears type "msconfig" and a box will appear, at the top click the "Startup" tab listing all the applications that run when your computer starts up. Either manually untick the ones that are unnecessary or click "disable all", but be sure to keep vital things like antivirus going.
Don't be scared by the description, it's essentially a way to optimise your hard drive's efficiency.
To do this go to "My Computer", right-click on the hard drive and select "Properties". Under the "Tools" tab there should be an option to "Defragment Now".
8. Run a disk clean-up
To perform this click "Start" then go to All Programs > Accessories > System Tools > Disk Cleanup
9. Vacuum out the dust From Motherboard
If you open up your PC and you won't believe how much dust gets sucked into it through the cooling fan. Dust can clog airflow, which is vital to keeping your system temperature down and if it overheats, its performance will slow.
Use a vacuum on a low setting to clean out the insides, but ensure the PC has been off for at least 30-minutes and it's disconnected from the mains. Also, go easy when you're poking around in there as you could dislodge some important cables.
Simple advice, but most effective if you've got a PC that should be cashing-in its pension. With the rise of tablet PCs and the low cost of components, prices of new laptops and desktop computers are so much more affordable than years ago. Save yourself a heap of trouble and think about it.
Sunday, 14 December 2014
Sunday, 14 December 2014
- 0 Comments
DBT |
The smartphone has a lot to do and the problem of why we ended up in front of the battery leads. If you think that your smartphone battery fast Tan is speaking, you can try these methods:
1. Keep it Turn Off
- Bluetooth, Wi-Fi
Turn on Wi-Fi only smartphone, when you want to use. Wi-Fi is also on going out of range, the phone looks for Wi-Fi signal and battery costs will be. Very rarely do people use GPS. Keep it to one of these. Keep it on all the time is also spent batteries. Wi-Fi is a way off: Settings-Wireless Settings-WiFi-off
- Animation
If the battery is the most important thing for you, then turn off the animation in all applications. Style will be reduced, but will increase battery life. Follow this method to: Settings-Developer Options-Drawing let go of all the animation either to reduce or Animation Scale.
- Mobile Data
Take the battery to be completely closed because the phone is not possible to charge, so be sure to Mobile Data Off. The phone will go on, the Internet will not work-related services.
- Location Services
The (Settings-Locations Services) to go into the box to remove the tick mark. Services will be on location, trying to track the location of the phone will spend the battery. When needed, you can location on the service for a while.
2. The lower the as you can These All
- Screen Brightness
Most battery eats screen. Screen, the bigger, the higher will be the bright and high resolution, the more power it needs. If your phone is the screen brightness to the auto mode, then use it, do not keep the brightness around 50 per cent. The battery will cost less. It is an advantage and that it will have less emphasis on your eyes. Especially in times of need such strong sunlight can increase the brightness when viewing photos or videos.
- Screen timeout
Screen timeout means- nothing of the screen will automatically light how long. The lower the screen timeout on your phone, the battery will last much longer. To reduce it to the phone, go to: Settings-Sound & Display-Screen timeout
- The use of cameras and video
When the phone's battery is low, then the deliberate use of camera and video. These two things will require power. When the phone began to feel more warm, to understand that the battery is being spent rapidly and now needs to rest.
3. Things to avoid
- Vibration
Ringtones to phone vibrates more than the voice has to be strong, so if you do not have to keep the phone on vibration mode. Disable it and hold. Follow this method to: Settings-Sound and Display-PhoneVibrate
- Live Wallpaper
Fish floating on the screen of the phone or any other live wallpaper to-use, then you should assume that the battery would cost too much. Instead of a dark color would be nice to wallpaper photos.
- Widgets
Widgets icon they are larger than normal size, which take up more room on the screen of your phone - like the weather or the Facebook and Twitter Widgets tell. Widgets automatically updated every battery feed themselves. Of application icons on the home screen of the phone Do not crowd. Sometimes use the app, do not keep them on the home screen, but went in the Open menu.
- Two Antivirus
Do not use the phone two Antivirus. Some people think that the two Antivirus will make their phone more secure, but it is not. It will make your phone battery will continue to be sluggish.
4. Check Always these things
- How much battery Use
Go to Phones Settings (Settings-Battery Use) to see which applications are spending so much battery. If the application without eating much battery, remove it from the phone.
- 2G or 3G and 4G mode
So much so that you do not have plans 3G mobile company and your phone is running on 3G mode. Which mode is running on the phone, to the Check (Settings-More Settings-Mobile Networks-Network Mode / Preferred network type) visit and are not using the 3G or 4G, 2G mode Bring it. 3G or 4G are used if, but to a place where 3G or 4G service may not go so similar 2G mode, the battery cost will not find the phone 3G signal.
5. focus on application
- Avoid unnecessary apps
These days is full of apps and even free, but that does not mean that you are downloading app poke. Download apps only work if you use some app is closed so you remove them from the phone. Downloading is easy to uninstall unnecessary applications, but what about those useless apps, which were already in the phone, but you do not ever use.
Android app version 4.0 and above has facilities Disable to: Settings-Application Manager-All tab. You do not use the app, press the Open button to Disable. If you do not see the option to Disable, then uninstall it before all the updates. Disable then try again. If you can not understand the service, they do not Disable, or the call may be wrong.
- Properly Close
Application by pressing the Home button will not stop, they just go in Background spend and keep the battery. By then hit the back button to close the app continue until the app to get out of. Or use the Exit button.
- Auto-update
Android phones are updated all day came App. Such updates to both the battery and data overshadowed. Auto Update to Off (Menu-Play Store-Settings-Auto Update apps) Go and Do not auto update set.
- Use bookmarks
Ever noticed how your phone services are continually go on and do the sink? Facebook, Twitter, Gmail, Office Mail, Google Plus ... they spend all battery and data. If possible, download the app for Facebook and all these things rather than making use browser bookmarks.
(We also have to change the settings in the way, he has to call Android. Android phone may therefore also have different versions that your smartphone is a little different in the way of the process.)
Wednesday, 10 December 2014
Wednesday, 10 December 2014
- 0 Comments
After a user restarts his computer, the name reverted back to original which is obvious as each time Windows boots, it checks the connected hardware and updates the registry value automatically. So, changing the processor name using the earlier article did not have permanent results.
Thus, the alien processor name you had earlier again reverted back to the boring old one.
Problem: To, make the name change permanent, it was required to update the Processor Name String registry key every time Windows starts.
Solution: It is very easy to change your processor name permanently by creating a registry key and placing a shortcut to it in the Windows start up folder. To do so, just follow the steps given below:-
Steps :-
1. Open Notepad.
2. Copy and paste the exact code given below:-
Windows Registry Editor Version 5.00To change the processor name, edit the part of the code given in blue. Also understand that \0 in the above code should only be present if Windows store your processor name at that location. Open the Registry Editor and navigate to the above mentioned keys to check whether or not to include the \0.
[HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0]
"ProcessorNameString"="My Processor name 50000MHz"
3. Click on File Menu, click on Save As and select "All Types" in the Save as Type option. Save the file as Processor Name Change.reg or *.reg.
4. Create a new shortcut on your desktop. Enter regedit / S "Location of the .reg file" as the location of the item. For example, enter regedit /S "C:\Processor Name.reg" if your registry file is located in the root of C:\ drive.
5. Copy the created Shortcut file.
6. Navigate to C:\Documents and Settings\All Users\Start Menu\Programs\Startup (in Windows XP) or to C:\Users\ User-Name\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (in Windows 8, Windows 7 and Windows Vista. Also remember that AppData is a hidden folder.) if C: is your System drive.
7. Paste the copied file.
This registry file would now execute each time when Windows starts and the Processor Name String would be modified each time. This means that even upon restarting your computer, you will see that the changed processor name is permanent.
Windows Task Manager is used to view details about processes running on your computer. Since it can be used to terminate programs that are misbehaving or are viruses disguised in the form of harmless programs, most spyware and viruses disable it to prevent themselves from being closed through it. Some administrators also disable Task Manager to prevent users from closing important security programs like antiviruses and anti-malwares.
In such situations, running the Task Manager will give the "Task Manager has been disabled by Administrator" error. However, there are some techniques you can use to re-enable task manager and close those harmful programs manually. This article contains few such simple techniques you can use to regain access to Task Managing privileges.
Enable Task Manager from Registry in Windows 8, 7, XP or Vista
Registry Editor is an inbuilt Windows tool that is used to modify registry keys which tell Windows how it should work. A simple registry modification can be used to bypass the Task Manager block. To do so, just follow the steps:-
- Click on Start. Go to Run. If you use Windows 8, Windows 7 or Windows Vista, go to Search.
- Type regedit and press Enter. Registry Editor will start. If Registry Editor is also disabled, you will first need to enable registry editing.
- Through the left hand navigation pane, navigate to HKEY_CURRENT_USER\Software\Microsoft\ Windows\ Current Version\Policies\System. If the System key is not there, you will need to create it.
- In the work area, locate "DisableTaskMgr". If this value is not there, you will need to create a new DWORD value called DisableTaskMgr. Double click on it. A window will pop up.
- Enter its value data as 0 and press OK.
- Close Registry Editor. If Task Manager is still disabled, restart your computer.
Enable Task Manager from the Group Policy Editor (Gpedit.msc)
Group Policy Editor is a feature in Windows which is used to edit local policy settings. It can also be used to enable Task Manager. To do so, just follow the steps given below:-
- Open Start Menu. Windows XP users click on Run. Windows 8.1, Windows 8, Windows 7 and Vista users, go to Search.
- Type gpedit.msc and press Enter. Group Policy Editor Window will show up.
- From the navigational pane at the left hand side, go to: User Configuration>Administrative Templates>System>Ctrl+Alt+Del Options.
- In the work area, double click on "Remove Task Manager" and set its value to Disabled or Not Configured.
- Restart your Computer or Log Off and Log back On to apply the changes.
- Group Policy Editor is not available on home editions of Windows.
Enable Task Manager by Running a CMD Command
Command Prompt can also be used to directly enable Task Manager.
- Open Notepad.
- Copy the code given below and paste it.
REG add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d /0 /f
3. Save the File as TaskManager.bat.
4. Run TaskManager.bat as Administrator if you use Windows 8, Windows 7 or Windows Vista.In Windows XP, simply open the file. A command prompt window will flash for a second and then disappear indicating successful execution. After running the batch file, you will be able to again use Task Manager. If Task Manager is still not available, restart your computer.
Create a Registry(.reg) file for enabling Task Manager
If you are unfamiliar with manually editing the Registry, you can create a Registry file which will automatically modify the Registry Key to re-enable Task Managing. To create one such file:-
- Open Notepad or any other text editor.
- Copy the code given below and paste it as it is in it.
Windows Registry Editor Version 5.00
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System] “DisableTaskMgr” =dword:00000000
3. Save the file as Enable Task Manager.reg or *.reg.
4. Open the file by double clicking on it.5. Registry Editor will ask you for confirmation. In the confirmation Window, click Yes.
6. Task Manager would immediately be accessible. If it is not, restart your computer.
Wednesday, 19 November 2014
Wednesday, 19 November 2014
- 0 Comments
Password leaks and targeted attacks are nothing new and the latest security bug related to a massive loss of passwords across the world is ‘Heartbleed’. This bug has received a lot of media coverage over the last few days, so there is a lot of confusion about what it is and what one needs to do to fix the issue.
This blog post aims to help you better understand what Heartbleed really is and what you need to do in order to secure your presence online. Heartbleed has affected about 17% (close to 500,000) of the web servers across the world, so there is a high chance that you are affected by this too. With that in mind, here’s what you need to know now.
Heartbleed is a security bug that affects servers that use OpenSSL (Secure Sockets Layer) technology. When you log in to your email account, or make a financial transaction online, the server that hosts this activity is protected by the SSL technology, which is denoted by the symbol of the padlock near the address bar and the unmistakable presence of “HTTPS” as a prefix of the URL itself.
Heartbleed is a bug that afflicts this very protective measure and exposes information that SSL attempts to protect. What this means then, is that sensitive information like passwords, credit/debit card details and more are susceptible to this bug and can be stolen.
What this means is that there is nothing wrong with your PC or your antivirus software. This is an issue that needs to be dealt with by the people who run the websites that make use of SSL. Moreover, if you are surfing the Internet you will not be able to tell if a service you are using is affected by Hearbleed or not.
While most of the sites that have been affected have taken corrective steps already, there are bound to be many more which are still working on it. If you use some of the following services then there is a high chance that your password and details may have been leaked.
As you can see, the list is huge. There are several more services that have been affected, so the potential damage here is substantial.
This online tool can also help you ascertain whether a particular URL is afflicted or not. If you carry out online banking transactions, then we highly recommend that you change your account passwords. Also, check this tool to see if your bank’s online portal is affected by Heartbleed or not.
While there is nothing specific that you can do to combat Heartbleed, one major precaution you should take is change ALL your online passwords right away. This will ensure that if any of the services you use have been afflicted by Heartbleed, then at least your passwords will be safe. Apart from this, stay alert about any unusual activity on your accounts. If you feel something is out of the ordinary, take the necessary corrective steps as soon as possible. Moreover, spread the word about Heartbleed and inform your friends and family members as well.
WARNING: Be on the lookout for fake password reset emails
With such widespread activity occurring simultaneously with regards to password changes all over the world, this is bound to lead to several phishing emails about password resets. Be on the lookout for such emails and stay away from fake emails that ask you to change your passwords. Read here for some tips on how to recognize fake phishing emails.
Quick Heal will keep you updated about any further developments and news regarding Heartbleed, so keep checking back for more information.
This blog post aims to help you better understand what Heartbleed really is and what you need to do in order to secure your presence online. Heartbleed has affected about 17% (close to 500,000) of the web servers across the world, so there is a high chance that you are affected by this too. With that in mind, here’s what you need to know now.
Fact # 1: What exactly is Heartbleed?
Heartbleed is a security bug that affects servers that use OpenSSL (Secure Sockets Layer) technology. When you log in to your email account, or make a financial transaction online, the server that hosts this activity is protected by the SSL technology, which is denoted by the symbol of the padlock near the address bar and the unmistakable presence of “HTTPS” as a prefix of the URL itself.
Heartbleed is a bug that afflicts this very protective measure and exposes information that SSL attempts to protect. What this means then, is that sensitive information like passwords, credit/debit card details and more are susceptible to this bug and can be stolen.
What this means is that there is nothing wrong with your PC or your antivirus software. This is an issue that needs to be dealt with by the people who run the websites that make use of SSL. Moreover, if you are surfing the Internet you will not be able to tell if a service you are using is affected by Hearbleed or not.
Fact # 2: Which websites and online services are affected?
While most of the sites that have been affected have taken corrective steps already, there are bound to be many more which are still working on it. If you use some of the following services then there is a high chance that your password and details may have been leaked.
Facebook
|
Gmail
|
Amazon
|
SoundCloud
|
Instagram
|
Yahoo Mail
|
Flickr
|
YouTube
|
Pinterest
|
Google
|
Minecraft
|
Wikipedia
|
Tumblr
|
GoDaddy
|
Netflix
|
Dropbox
|
As you can see, the list is huge. There are several more services that have been affected, so the potential damage here is substantial.
This online tool can also help you ascertain whether a particular URL is afflicted or not. If you carry out online banking transactions, then we highly recommend that you change your account passwords. Also, check this tool to see if your bank’s online portal is affected by Heartbleed or not.
Fact # 3: What do you need to do?
While there is nothing specific that you can do to combat Heartbleed, one major precaution you should take is change ALL your online passwords right away. This will ensure that if any of the services you use have been afflicted by Heartbleed, then at least your passwords will be safe. Apart from this, stay alert about any unusual activity on your accounts. If you feel something is out of the ordinary, take the necessary corrective steps as soon as possible. Moreover, spread the word about Heartbleed and inform your friends and family members as well.
WARNING: Be on the lookout for fake password reset emails
With such widespread activity occurring simultaneously with regards to password changes all over the world, this is bound to lead to several phishing emails about password resets. Be on the lookout for such emails and stay away from fake emails that ask you to change your passwords. Read here for some tips on how to recognize fake phishing emails.
Quick Heal will keep you updated about any further developments and news regarding Heartbleed, so keep checking back for more information.
From creating strong and unique passwords to avoiding phishing attacks, we have listed out some of the most essential dos and don’ts of Internet safety. Scroll down to see which ones you follow and which ones you don’t.
#1. While giving away personal or financial information on any website, check if its URL begins with ‘https’. Also look for the lock icon, which indicates that the connection is secure.
#2. Never shop online, make financial transactions or login into accounts over free, unsecured WiFi networks.
#3. Create long, unique, and hard to guess passwords. Never keep the same password for different online accounts.
#4. Enable Secure Browsing for your Facebook account.
#5. Keep your computer’s Firewall ON
#6. Avoid making your personal information public on social media sites and Internet in general.
#7. Avoid checking ‘Keep me logged in’ or ‘Remember me’ options on websites, especially on public computers.
#8. Use your primary email address to stay in touch with people you know or are acquainted with.
#9. Never use your official email address for social media sites.
#10. For social media sites, use an email address that you do not use for important communications.
#11. Tighten your privacy settings on Facebook so that only your friends are notified about your activity.
#12. Never use any of your personal information such as name, date of birth, address, etc., as your password.
#13. While you are online in a public setting such as a coffee shop, mall, airport, etc., watch your back to make sure no one’s snooping on you.
#14. Never trust emails asking for your personal or banking information. Be extra cautions against links or attachments in unknown or unwanted emails. Verify any such communication with the sender first.
#15. Do away with old accounts that you do not use anymore.
#16. Do not make your photos or videos public on social media sites. Keep them visible to friends you know, and your family.
#17. Never respond to pop up ads that may come up on your screen. Close such pop ups from the the task manager; press Alt+Ctrl+Delete.
#18. Before downloading any free software, research on the software and the website hosting it.
#19. Avoid visiting inappropriate websites or websites that you are not fully aware of.
#20. Beware of files with multiple extensions.
#21. Always log out of online accounts when you are done. This is especially important when you are using a public computer.
#22. Do not click or share posts on Facebook that claim to show any unusual content such as shocking videos or magical illusions. Verify such news from other sources.
#23. Access your bank’s website by manually typing its URL in the address bar.
#24. Do not click any links in emails to access your bank’s website.
#25. Change your banking and other Internet account passwords at periodic intervals.
#26. Do not install software that comes as an attachment in emails.
#27. Always shop from reputed and know online stores.
#28. Update the Internet browsers and software on your computer.
#29. Use up-to-date security software that offers multilayered protection.
#30. Increase your awareness of cyber security and share the same with friends and family.
And that would be all for some of the important dos and don’ts that each one of us must follow to keep our online world safe, sound, and healthy.
a) You follow all of these dos and don’ts
b) You follow some of them
c) You follow none of them
d) You will start following them now
Dos and Don’ts of Internet Safety
#1. While giving away personal or financial information on any website, check if its URL begins with ‘https’. Also look for the lock icon, which indicates that the connection is secure.
#2. Never shop online, make financial transactions or login into accounts over free, unsecured WiFi networks.
#3. Create long, unique, and hard to guess passwords. Never keep the same password for different online accounts.
#4. Enable Secure Browsing for your Facebook account.
#5. Keep your computer’s Firewall ON
#6. Avoid making your personal information public on social media sites and Internet in general.
#7. Avoid checking ‘Keep me logged in’ or ‘Remember me’ options on websites, especially on public computers.
#8. Use your primary email address to stay in touch with people you know or are acquainted with.
#9. Never use your official email address for social media sites.
#10. For social media sites, use an email address that you do not use for important communications.
#11. Tighten your privacy settings on Facebook so that only your friends are notified about your activity.
#12. Never use any of your personal information such as name, date of birth, address, etc., as your password.
#13. While you are online in a public setting such as a coffee shop, mall, airport, etc., watch your back to make sure no one’s snooping on you.
#14. Never trust emails asking for your personal or banking information. Be extra cautions against links or attachments in unknown or unwanted emails. Verify any such communication with the sender first.
#15. Do away with old accounts that you do not use anymore.
#16. Do not make your photos or videos public on social media sites. Keep them visible to friends you know, and your family.
#17. Never respond to pop up ads that may come up on your screen. Close such pop ups from the the task manager; press Alt+Ctrl+Delete.
#18. Before downloading any free software, research on the software and the website hosting it.
#19. Avoid visiting inappropriate websites or websites that you are not fully aware of.
#20. Beware of files with multiple extensions.
#21. Always log out of online accounts when you are done. This is especially important when you are using a public computer.
#22. Do not click or share posts on Facebook that claim to show any unusual content such as shocking videos or magical illusions. Verify such news from other sources.
#23. Access your bank’s website by manually typing its URL in the address bar.
#24. Do not click any links in emails to access your bank’s website.
#25. Change your banking and other Internet account passwords at periodic intervals.
#26. Do not install software that comes as an attachment in emails.
#27. Always shop from reputed and know online stores.
#28. Update the Internet browsers and software on your computer.
#29. Use up-to-date security software that offers multilayered protection.
#30. Increase your awareness of cyber security and share the same with friends and family.
And that would be all for some of the important dos and don’ts that each one of us must follow to keep our online world safe, sound, and healthy.
Use the comment space below to leave us your choice for the following options:
a) You follow all of these dos and don’ts
b) You follow some of them
c) You follow none of them
d) You will start following them now
Subscribe to:
Posts (Atom)