Thursday, July 30, 2009

Six Step Computer Security

Six Step Computer Security

If you are concerned about security of your data and your computer, here are six easy steps that can help protect and preserve all that you've worked with great difficulty to your computer.

1. Use a firewall internet
If you do not use a firewall, the attacker can find and
attack your computer within 15 minutes after you connect to the Internet. If you access the Internet using the "always connected", such as cable modem or DSL, you must install a firewall and always update it.
There are 2 types of firewalls: hardware and software. Hardware-based firewall is usually a router or a personal computer that has been set to act sabagai firewall for all network in your home. Currently, however, many Internet firewall used in the home and small perangakat based software. Firewalls of this kind can be obtained from third parties, such as Zone Labs' ZoneAlarm. Or maybe the device was directly inserted in your operating system, such as ICF (Internet Connection Firewall) or Windows Firewall in Microsoft Windows XP, depending on the service pack that you have pairs.

2. Update your computer operating system
Once your firewall is installed, in order to keep the software your computer's most fundamental - the operating system - with continuously updated using software update Peng-you. Failure to do this will result in your computer in a very vulnerable situation because of negligence on the operating system and is usually known to be the target of the hacker and cracker. If you use the latest operating system, such as Windows XP, you can use Windows Update to manually download and install updates from Microsoft Windows Update site. To automatically download the updates at this time and will come, enable Automatic Updates feature by clicking Start
> Control Panel> Security Center.

3. Take advantage of your antivirus software as well as possible
Programs antivirus software to help protect your computer against most viruses, worms, Trojan horses, and other dangerous code. Many new computers have been equipped with antivirus software. However, antivirus software must be updated regularly, which usually require you to subscribe to the software the author. If you do not subscribe to update your antivirus software, then your computer will be vulnerable to new threats. Therefore, you should install anti-virus tool, use, and the guard to stay updated. Updates are usually available at least once a week.
After you install antivirus software, Arrange to undertake review of all existing data, data-entry of data and to download, email messages, and attachments. Enable schedule "check for updates" to check daily.

4. Prevent spyware, adware, and spam
Many sites and software for free that tout the username and
to report their activities to third parties who then use the information to send more spam. If you surf the internet, your computer will be entered spyware and adware. If you share data or send a short message, you will get spyware and adware than anymore. Best protection against spyware and adware is to not download it
from the start. To protect your computer not to download programs that harm:
  Download programs only from sites you trust
  Read all security warnings, license agreements, and privacy statements of each program that is downloaded.
  Do not have to click Agree or OK to close a window.
Instead, click the red X in the top right corner of the window or press Alt + F4
on your keyboard to close a window.
  Be careful in using the program to share music files and film "Cuma-cuma", and make sure that you fully understand all of the software into one package on these programs.
To minimize spam, consider the following options:
  Ask your Internet service provider to ensure that they run a type of spam filter and antivirus.
  Set up email filters in your email client (like Outlook Express, Eudora,
and others). Some spam filters mark the email is spam
with a marked *** SPAM *** subyeknya on the line. The other
X_SPAM put a sign or a title similar to the format of the message area.
You can set filters to find messages and
move in a separate place so that you can remove them when
only.
  Use a third-party products, such as Cloudmark Safety Bar, SpamAssassin and Bayesian Mail Filter, which automatically move spam that are recognized and put them in a separate place for you.

5. Select pop-up blocker trusted
You should install a pop-up blocker, such as Google toolbar or StopZilla, in your browser or use an alternative browser (Mozilla, Firefox, or Opera) that has a pop-up blocker inside. You should avoid a free program from the vendor that is not clear. Many free programs contain spyware in it. They advertise that they can do anything you want, but behind that, they contain a program that can harm your computer.
Tip: If you are running Windows XP with Service Pack 2, enable the Pop-up Blocker in Internet Explorer. You can do this by clicking Tools> Pop-up Blocker> Turn on Pop-up Blocker. The best way to stop the pop-up is to never allow them to install themselves on your computer since the beginning. You can do
avoid this with a site that does not clear, and never download and install programs from sources that are not trusted.

6. Protect your computer and your data is physically
The last thing is not less important, make sure that the computer and the data that is physically safe inside. Create a backup copy: To make backups easier and faster to perform, document and manage all of your data in the correct folder. Then you can easily copy all of the Zip drive, CD, or DVD, or use a backup program or service.
Keep your backup security: Keep your backup media outside the computer: for example with the menitipkannya friend or family, in a safety deposit box, or online using a trusted backup service.

Computer Virus 10 Most frightening

VBScript type of virus attacks are still very high, this is evident from the many reports about the subject of this script type of virus. One virus that melesat high to first order is Discusx.vbs. If you still remember with this virus, in the Virus Top-10 March 2008 edition of the past, virus Discusx.vbs is in the order of 5, but this time he melesat up to first order. Read the list below:

1. Discusx.vbs
Virus VBScript this one, have a size around 4800 bytes. He will try in some menginfeksi drive in your computer, including flash disk drive, if that will make the infected autorun.inf file and System32.sys.vbs on the root drive is. In addition, it will change the caption of Internet Explorer to ".:: Discus-X SAY MET Lebaran! [HAPPY Lebaran ?!]::.".

2. Reva.vbs
Again, the type of virus VBScript the rather more dikeluhkan by some readers. He will try to spread itself to every drive on your computer, including flash disk drive. On the drive there are infected files akan reva.vbs, autorun.inf, and shaheedan.jpg. In addition, it will change the default page of Internet Explorer that leads to the site http://www.arrahmah.com.

3. XFly
PC Media Antivirus identify two variants of this virus, namely XFly.A and XFly.B. Just like most other local virus, it was created using Visual Basic. Has a body size of 143,360 bytes in no-compress. And it can masquerade as folders, files, MP3 WinAmp or the other way change the icon resource directly in the body. This will make it more user lay in it. At the infected computer, when running Internet Explorer, its caption changes to "..:: x-fly ::..", and start when Windows will appear the message from the creator of the virus in the default browser. Or at any time shows 12:30,
16:00, or 20:00, this virus will display a black screen also contains a message from the creator of the virus.

4. Explorea
Virus-in that uses Visual Basic compile this with the present size of approximately
167,936 bytes, with no in-compress. Using the icon looks like a standard Windows folder to trick victims. This virus will attack you with the Windows Registry to change the default open such as the extension of some. LNK,. PIF,. BAT, and. COM. At the infected computer, the time-specific error messages sometimes appear, for example, at the time to open the System Properties.

5. Gen.FFE
Gen.FFE or the author named Firus Fast Engine is one of the program Virus Generator locals. With only using this program, does not take long to be able to create a virus / new variants. Virus of the output of this program using the icon-like image standard default Windows folder. He also will block access to Task Manager, Command Prompt, and eliminate some of the menu in the Start Menu. He will also read the caption of the program is active, if there is a string associated with the antivirus program will soon be closed down by it.

6. Empty
Virus that is also created using Visual Basic and pro-a-folder icon has a body size of about 110,592 bytes, with no in-compress. Many of the changes he made on the Windows, such as the Registry, File System, and others, which can even cause Windows can not be used as appropriate. On the computer that is infected by the virus, starting when Windows will display a message from the creator of the virus.

7. Raider.vbs
This VBScript virus type size around 10,000 bytes, if the virus file was opened with Notepad, for example, the string is not much that can be read in the encrypted condition. In the Registry, it also provides the user with the create new key in HKLM \ Software with the same name as the name on the computer name, with its contents as a string value such as virus name, Raider, and the date the first time the computer is infected.

8. ForrisWaitme
Virus made with Visual Basic is similar to using the default folder icon
Windows penyamarannya to do. Some ulahnya switching function is the left mouse button with the right, remove the Folder Options menu, create the message file "read saya.txt" on the infected drive, and still have the other.

9. Pray
The virus is made using local Visual Basic. We found 2 variants of this virus, for variants Pray.A not have icon, while the variants Pray.B use Windows Explorer-like icon. If your computer is infected by this virus, at a time at the computer show at 05:15, 13:00, 16:00, 18:30, and 19:45, the virus displays a message reminding the user to perform prayers.

10. Rian.vbs
VBScript virus has the size of 3788 bytes. Menginfeksi time, it will create new files autorun.inf and RiaN.dll.vbs on each root drive installed in the computer of the victim, including the Flash Disk. Computers infected by the virus, the caption of Internet Explorer will change to "Rian P2 Highlights Cantiq hehehe ....... ^_^".

Tips Reduce Effect Radiasi Computers

Tips Reduce Effect Radiasi Computers

Here are some tips to reduce the effect of radiation machines.
1. Keep the distance with your eyes, at least 50 cm.
2. Set the monitor's position, so that the top of the monitor with your eyes.
3. Adjust lighting so that there is no reflection of light that blind.
4. berkediplah more often to keep the eyes in order not to dry (at least 5 minutes once).
5. Use a good filter monitor to reduce the radiation.
6. But menolehlah to the view that far to loosen tension on the eye.
7. Every 2 - 3 hours, Take about 5 minutes to prevent eye fatigue and also the radiation from the body (for example, a facial, go to the bathroom).