Members Login
Username 
 
Password 
    Remember Me  
Post Info TOPIC: Ensure Your Computer Security! Extended Narrative


Senior Member

Status: Offline
Posts: 338
Date:
Ensure Your Computer Security! Extended Narrative
Permalink Closed


BRrNd9.jpg


Greetings, friends, I definitely recommend you to read my article, I think it may be useful because sometimes malicious software enters our computer and can access our personal information, missing even the smallest details, but what can we do against them? How can we be protected, here we go!


Computer security is the field of computer science that deals with controlling the risks that may arise with the use of computers. Putting the security of your computer at risk means putting the security of your information at risk. In order to ensure the security of your computer, it is necessary to know some simple and basic issues and take some security precautions.


1. Why is your computer at risk?

In order to ensure computer security, first of all, it is necessary to be a conscious user. At the same time, security awareness is very important. The risks that may arise from the unconscious use of the computer arise in various ways. Possible vulnerabilities/errors in the programs you use, backdoors that may be placed in them, viruses and similar malicious programs written for the purpose of harm, direct and indirect attacks by malicious people, deception attempts and user errors can be given as examples.


2. How Can We Be Protected?


a. Make Your Updates Regularly Programs
, especially operating systems, may contain vulnerabilities and errors that will harm your computer. When these vulnerabilities are noticed by malicious people, they can cause undesirable consequences such as slowing down your computer, giving an error, stealing your information, and data loss. When software manufacturers notice bugs in their products, they try to fix them. For this reason, new versions of operating systems and other programs with bug fixes are often released. That's why it's important to keep your computer up to date. In order to keep your computer up-to-date, the automatic update features of the programs should be activated, and it should be checked at regular intervals whether the current versions of the programs you use are available.
You can follow Windows operating system updates at http://update.microsoft.com/. If you are using any Linux distribution, you can update all the other programs you use besides the operating system with a single click from the package manager programs.

b. Choose Safe Software

Firefox, Pardus and Thunderbird,
Not every computer program is equally secure. Some programs contain many more bugs/vulnerabilities than others. Some programs are even written with the sole purpose of harming other computers. Therefore, it is important to choose safe software. In general, large open source software projects contain fewer vulnerabilities than can be developed and audited by many people. You can start using secure software with Firefox and Thunderbird. You can use Linux-based operating systems to completely get away from the risks of the Windows operating system. For example, Pardus is easy developed by Tübitak UEKAE It is a Turkish Linux distribution.

c. Use Antivirus Software
Programs such as viruses, worms, and trojans are software that can harm computers***** Your computer can be infected with this type of malware from various sources. This can be with a CD, DVD or USB stick.

However, the Internet is the biggest source of malware dispersal. The risk is greater, especially if you have a constant internet connection via ADSL or CableNet, which is becoming more and more common in our country. You should use antivirus software to prevent viruses and similar software from harming your computer. These software can find and remove malware by scanning your computer completely at any time, or they can instantly control an incoming danger by constantly working in the background. About three new viruses emerge every day, and dangerous viruses spread very quickly within a few hours of their emergence. In order to be protected against new viruses, it is necessary to have up-to-date virus information. For this reason, the companies that produce these programs refresh their databases containing virus information several times a day/week. The most important thing that those who use antivirus software should know is that they need to be updated frequently. You can use paid antivirus programs to protect yourself from viruses and other malware, as well as successful free programs such as Antivir, Avast, AVG, ClamAV.

Gazi University, Department of Information Technologies provides antivirus software services in order to protect the computers of our university staff and students. You can install antivirus software on your computers by clicking the antivirus link at the http://www.antivirus.gazi.edu.tr or Information Technologies Department on your computers within the Gazi University campus. You can update the antivirus software you have installed from any point you connect to the internet. In this area, the support of two different antivirus software is provided. One of these is ESET Nod32, ESET Internet Securty and F-secure antivirus software.
On operating systems other than Windows (MacOS, Linux, Solaris, BSD, etc.), you do not need to use antivirus programs because there are no active viruses that can harm your computer.

I. Best Anti Virus Programs;

8) Avast! AntiVirus: An antivirus software that I do not enjoy using except in difficult situations. He is quite indifferent to USB stick viruses. The scanning speed is not good in my opinion, and sometimes it can behave like bad software, even though it does not contain viruses. In exchange for filling out a form on an annual basis (you may receive advertising e-mails all the time), it can offer the program free of charge.

7) Data AntiVirus: It was distributed free of charge at the IT fair. I also wanted to try it because I was curious. Frankly, the antivirus program interface does not give people confidence. Although it seems to be a very light software, that is, it does not put much load on the system, it did not give me the appearance of a software that does its job well. The interface is overly simple, making important sections stand out.Reasons such as the fact that it was not shown to the user to a large extent caused me to think so.

6) AVG AntiVirus: Another version of Avast. Although its interface is different, it is not very successful in detecting and removing viruses. In fact, the antiviruses I installed later detected dozens of malware that this software could not catch. Therefore, it is a software that cannot be trusted very much.

5) Secure AntiVirus: The antivirus software I was hesitant to use after F-Prot, one of my oldest friends. Because F-Prot was cleaning some infected files, making them unusable. Anyway, I installed the program with question marks in my mind, but what I was afraid of did not happen to me. The F-Secure program has adapted itself to the present day. It lacks protection against fraudulent websites, but it works without putting too much strain on the system.

4) Norton AntiVirus: He is the father of the antivirus world. But users were moved away due to the fact that the computer in the versions released in previous years turned it into an oxcart. I had a chance to retest 2 months ago. It doesn't exploit the system anymore like it used to, but it feels like the disk scan will take years.

3) Kaspersky AntiVirus: It was my favorite until the last 2-3 years. But he exaggerated a bit about pricing. In other words, it was the software company that demanded the highest fee among antiviruses. Although it is a very successful antivirus, its price has turned users away from it.

2) Eset Smart Security AntiVirus: It is a very light and fast antivirus software that works without tiring the system, and at the same time always on the lookout. Thanks to him, he protected my computer for years. It is one of the most preferred antivirus programs. It's quite successful, but it's a bit behind in virus catching and removal scores compared to the antivirus software you're about to read.

1) Bit Defender AntiVirus: I say that what is said about the Bit defender program is less. Because before I installed it, it was touted as one of the best antiviruses of 2014. For some reason, I have antipathy to the things advertised, but when I tried it, I saw that it really deserved 1st place. One of the best advantages is that the user interface is simple, the fee is reasonable compared to others, and it does not strain the system. However, I couldn't figure out why Bit defender gave me a warning about my site when logging into my website. He has blacklisted me, kill the brave, give him his due.

In short, if you are going to choose an antivirus right now, I recommend Bit Defender in the first place, not Eset Smart Security.

d. Use a Firewall People
who want to attack a computer over the Internet look for an open port on the other computer. If they find such a port, they can get hold of your private information, passwords, credit card number; They can use your computer for illegal activities and damage your system. Web browsers, e-mail programs, instant messengers, multiplayer games, and some services that seem to be a positive feature in operating systems can create a port that can be easily cracked. To prevent outside attacks by closing open ports and to prevent programs that you don't allow on your computer from connecting to the Internet, you can use securitySoftware called firewall can be used.

For example, Windows XP users can get a free firewall by installing the Service Pack 2 update. You can visit the Windows Security Center in Control Panel to make sure your firewall is active.
ESET Internet Security software provided by Gazi University also has a firewall feature. Using this software, you can close your computer's ports (ports).

Beware of Websites You Don't Trust Most
of the threats today originate from the internet. In particular, some websites are the source of malicious software (such as viruses, worms, trojans) unknowingly or unknowingly. When such websites are visited, malware is downloaded to your computer along with the files of the website. Such software that downloads to your computer can affect your personal files and make them unusable.

Users who visit unknown Internet sites can damage their computers by running web applications that contain malicious code or by downloading files that contain viruses to their computers. Especially illegal sites (Hack, Crack, Warez, etc.) are the source of such threats. For this reason, carelessly saying YES to the security warnings of web browsers, clicking on every link unconsciously, trying to download every file to your computer are behaviors that should be avoided.

e. Don't Open Emails and Files You Don't
Know One of the most preferred methods for viruses and other malware to distribute themselves is through e-mails. Emails from people you don't know, with suspicious headers and attachments, are more likely to be viruses. In such cases, the e-mail must be deleted without opening it. If it needs to be opened, it will be more useful to open it by activating the antivirus software on your computer.

Even if it appears to be from someone you know via email or instant messaging programs (MSN Messenger, Google Talk, etc.), a file or link may have been sent by a virus from the person's computer without their knowledge.
An email can appear to come from a different person's email address. So when you receive a file from someone you know that you don't know what it is, it's best to go back to that person and ask if they actually sent it.
E-mails may also be sent to others on your behalf using your e-mail addresses. Your e-mail address and password do not need to be known in order to do this. This method is also a different method of deception.

f. Beware of Scams As
in real life, there are people on the Internet who try to do illegal things by deceiving people or abusing their wishes. This behavior, called social engineering, is often done with the aim of defrauding people or obtaining their private information. In particular, messages saying that you are a system administrator and that a password must be sent to perform a certain operation, or fake messages asking for bank information from a fake web address.E-mail messages forwarded to B sites are common hoax messages. This practice, called phishing, is frequently used to capture bank passwords.

Making an email appear to be from another address is also a scam technique that is technically possible. It is always important to remember that a piece of information may have been changed in some way and may not be sent by the right person.
The most important method to protect your computer from malware is to be a conscious user. In addition, it is necessary to have information security awareness to protect your personal or corporate information.



__________________
Page 1 of 1  sorted by
 
Quick Reply

Please log in to post quick replies.

Tweet this page Post to Digg Post to Del.icio.us


Create your own FREE Forum
Report Abuse
Powered by ActiveBoard