{"id":294,"date":"2022-12-10T04:12:38","date_gmt":"2022-12-10T04:12:38","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kael-cepak\/?p=294"},"modified":"2022-12-10T04:12:45","modified_gmt":"2022-12-10T04:12:45","slug":"how-can-you-tell-if-your-computer-is-safe","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/kael-cepak\/2022\/12\/10\/how-can-you-tell-if-your-computer-is-safe\/","title":{"rendered":"\u00a0How can you tell if your computer is safe?"},"content":{"rendered":"\n<ol><li>Test your settings<\/li><\/ol>\n\n\n\n<p>\u201cThe first tool in your arsenal is Microsoft Baseline Security Analyzer. This free tool examines your Windows and Office settings for any potential problems, especially contamination. First, MBSA will test your user account passwords and let you know if any account has a weak or disabled password, which is easy prey for hackers. MBSA will also check many of your account settings. Is your computer set up to get automatic updates? Do you have more than one administrator account on the computer? This software will check all of that information for you.\u201d<\/p>\n\n\n\n<ol start=\"2\"><li>Update your browser plug-ins<\/li><\/ol>\n\n\n\n<p>\u201cOpen up the browsers on your computer, even the ones that you don\u2019t use, and go to Mozilla\u2019s Plugin checker. It will show you every plug-in installed on the browser and whether it\u2019s up to date. Even though it\u2019s the same company that makes Firefox, the Plugin checker works for Internet Explorer, Chrome, and other browsers.\u201d<\/p>\n\n\n\n<ol start=\"3\"><li>Test your firewall<\/li><\/ol>\n\n\n\n<p>One of the most fundamental security setups is a firewall. Windows and Mac have decent firewalls built in, and many third-party security programs include them. A port test service like PortTest scans your firewall to make sure your computer is invisible. If it can see you, so can the hackers.<\/p>\n\n\n\n<ol start=\"4\"><li>Permanently delete files<\/li><\/ol>\n\n\n\n<p>Deleting your files doesn\u2019t actually remove them. They can still hang around your hard drive for days or weeks. Anyone who knows what they\u2019re doing can recover them. That\u2019s why it\u2019s a good idea to permanently delete any sensitive files that you no longer need.<\/p>\n\n\n\n<ol start=\"5\"><li>&nbsp;Check your Facebook settings<\/li><\/ol>\n\n\n\n<p>Consider this the \u201cau naturel\u201d setting of Facebook. You\u2019ll see exactly what your profile looks like to strangers. Click through your Timeline, About, Photos, Friends, and other sections, and see whether vulnerable tidbits have slipped through.<\/p>\n\n\n\n<p>Source:<\/p>\n\n\n\n<p>Komando, Kim. \u201c5 Ways to Test Your Computer&#8217;s Security.\u201d <em>USA Today<\/em>, Gannett Satellite Information Network, 4 June 2017, <a href=\"https:\/\/www.usatoday.com\/story\/tech\/columnist\/komando\/2017\/06\/02\/5-ways-test-your-computers-security\/102354032\/.\">https:\/\/www.usatoday.com\/story\/tech\/columnist\/komando\/2017\/06\/02\/5-ways-test-your-computers-security\/102354032\/.&nbsp;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Test your settings \u201cThe first tool in your arsenal is Microsoft Baseline Security Analyzer. This free tool examines your Windows and Office settings for any potential problems, especially contamination. First, MBSA will test your user account passwords and let you know if any account has a weak or disabled password, which is easy prey for&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kael-cepak\/2022\/12\/10\/how-can-you-tell-if-your-computer-is-safe\/\">Read More<\/a><\/div>\n","protected":false},"author":24734,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/posts\/294"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/users\/24734"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/comments?post=294"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/posts\/294\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/posts\/294\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/media?parent=294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/categories?post=294"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kael-cepak\/wp-json\/wp\/v2\/tags?post=294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}