Journal #8

When you connect to the internet, your computer begins playing Russian Roulette. Hackers and cyber-criminals are drawn to your data stored on the hard drive and will go to any length to gain access to your system. The following is how I would ensure my computer’s safety: Check your settings. Microsoft Baseline Security Analyzer is the first tool in your arsenal. This free program scans your Windows and Office settings for potential issues, including infection. First, MBSA will evaluate your user account passwords and notify you if any of them are weak or deactivated, making them easy prey for hackers. Many of your account settings will also be checked by MBSA. Is your computer configured to receive automatic updates? Do you have several administrator accounts on your computer? This program will validate all of that data for you. Following that, Please update your browser plugins. You should also ensure that your browser plugins are up to current. An obsolete plugin, like an outdated browser, exposes your browser and machine. Next, Check your firewall. A firewall is one of the basic security settings. Firewalls are incorporated into Windows and Mac, and many third-party security solutions contain them. When hackers are looking for victims, a firewall prevents them from seeing your computer online. The firewall prevents them from accessing your computer even if they know where your computer is. However, they are not without flaws. A faulty port setup might cause a flare, exposing your machine or allowing hackers to sneak in. If you have a virus, it may have altered your settings without your knowledge. A port testing service, such as PortTest, examines your firewall to ensure that your machine is invisible. The hackers can see you if they can see you. Lastly, Delete files indefinitely. Your files are not truly deleted when you delete them. They might remain on your hard disk for days or weeks. They can be recovered by anyone who knows what they’re doing. That is why removing any sensitive data you no longer require is a good idea.

Leave a Reply

Your email address will not be published. Required fields are marked *