|
If you download software from the Internet, it is possible that the downloads have been tampered with by someone malicious. Very unlikely, but it is possible. Every once in a while, I hear a news report about some site being hacked, and the software on the site is now suspected of being tampered with.
Well, […]
You probably need an Internet Security Suite. Both Windows and Mac users need it. I don’t know of a good Internet Security Suites for Linux. But, if you’re running Linux, you are probably already fairly computer savvy. An Internet Security Suite usually has a number of components to protect you against different dangers from hackers:
[…]
Part of security maintenance is making sure that your software gets the latest updates. If you have a Windows computer, there is a great software package that will help you do this: Personal Software Inspector (PSI). For Windows users, I recommend that you download and install this program right away.
Secunia PSI inventories the software […]
If a software package is installed on your computer, some hacker out there has probably already figured out a new security vulnerability for that software. If the vulnerability is so new, that there is no patch to fix it, it is called a “zero-day” vulnerability. So, the best way to stay secure is… drum roll […]
The main reason to upgrade is that the newer versions of Windows and Mac OS X implement something called a security sandbox.
Suppose you get hungry, and want a recipe for a sandwich. So, you download some recipe software, install it, download a recipe for a sandwich, and make yourself a sandwich. If you accidentally […]
One way to improve your computer security is to ditch your old computer and buy a new one with new software. Why? Because computer security is like the arms race. Hackers are working to discover new software vulnerabilities all the time. If they find a good one, they may exploit it, or sell it to […]
First of all, you DID turn on encryption for your wireless network, didn’t you? If you wireless network is unencrypted, then anyone driving by can connect to your network, and try to steal information from your computers. (This is called wardriving. And, there is a newer version where the bad guys can do the same […]
Devices that provide hardware firewalls usually need to be configured. It may be that the default factory settings are OK, and you don’t need to do anything extra. But, it would be good to contact your ISP, and ask if they have instructions for configuring your firewall with high security.
For example, I just installed […]
Firewalls are filters that keep the most of the bad Internet traffic out. There are two types of firewalls: hardware firewalls (a separate box you plug in between your computer and the Internet) and software firewalls (software that you install on your computer). You should be using BOTH types, but this post focuses on hardware […]
I don’t know about you, but I don’t have any top-secret documents. But, suppose you use Quicken. Suppose you have a secret plan to become the world’s next billionaire. Suppose you don’t want the NSA prying into the photo collection of your, um, kids. Well, don’t connect your computer to the Internet.
Some people may […]
|
|
Recent Comments