Safe Computing Practices


Information Communication Technologies
Safe Computing Practices

1.) Watch what you download and what is sent in e-Mails! (you are responsible!)
* Many "freeware" programs come with an enormous amount of bundled spyware that will slow down your system, spawn pop-up advertisements, or just plain crash your browser or even Windows itself. This goes for the famous Google Toolbar, Google Earth and any other search plugin for your browser.
* Peer-to-peer (P2P) programs like Kazaa, BearShare, Grokster, Imesh, and others are amongst the most notorious. DO NOT USE THESE PROGRAMS!!!.
* Note also that even if the P2P software you are using is "clean", a large percentage of the files served on the P2P network are likely to be infected. Do not open any files without being certain of what they are!

2.) Avoid questionable web sites!
* Many disreputable sites will attempt to install malware on your system through "drive-by" exploits just by visiting the site in your browser. Lyrics sites, free software sites (especially ones that target young children), cracked software sites, and pornography sites are some of the worst offenders.
* Most of these drive-by attempts will be thwarted if you keep your Windows updated and your internet browser secured (see below). Nevertheless, it is very important only to visit web sites that are trustworthy and reputable.
* In addition, never give out personal information of any sort online. And never click "OK" to a pop-up unless it is signed by a reputable company and you know what it is! Always click the Red "X" in the top right corner of the pop up window to close it safely.
* For more general information google the first section, "Educate yourself and be smart about where you visit and what you click on", tutorial by Grinler of BleepingComputer. Must-Have Software
*NOTE*: Only one anti-virus program on your system. Running more than one of these at a time can cause system crashes and/or conflicts with each other. The rest of the following programs can be run simultaneously and will work together in layers to protect your computer.

3.) Antivirus
* An Anti-Virus product is a necessity. Some very good and easy-to-use free antivirus programs are AVG, Avast, and AntiVir. Only one antivirus resident at a time!
* Your IT professional will determine if your Software needs upgrading or simply installation of newer and updated software to combat the Internet as it is today.

4.) Internet Browser
* Many malware infections install themselves by exploiting security holes in Microsoft Internet Explorer. It is suggested that using an alternate browser.
* Both Mozilla Firefox and Opera are next-generation browsers that are more secure and faster than Internet Explorer, immune to most known browser hijackers, and outfitted with built-in pop-up blockers and other useful accessories.
* IE-SPYAD puts over 5000 malicious sites in your restricted zone, so you'll be protected when you visit innocent-looking sites that aren't actually innocent at all. It would be best to just use FireFox for your browsing requirements.

5.) Lock down ActiveX in Internet Explorer
* Even if you plan to use an alternate browser, you will have to use Internet Explorer for tasks like visiting any other site that requires ActiveX. Also, since Internet Explorer is integrated into the Windows core, keeping it locked down is very important. Open IE and go to Internet Options > Security > Internet, then press "Default Level", then OK.
* Now press "Custom Level." In the ActiveX section, set the first two options ("Download signed and unsigned ActiveX controls) to "Prompt", and ("Initialize and Script ActiveX controls not marked as safe") to "Disable".
* Now you will be asked whether you want ActiveX objects to be executed and whether you want software to be installed. Sites that you know for sure are above suspicion can be moved to the Trusted Zone in Internet Option > Security.
* So why is ActiveX so dangerous that you have to increase the security for it? When your browser runs an ActiveX control, it is running an executable program, no different from double-clicking an exe file on your hard drive. Would you run just any file downloaded off a web site without knowing what it is and what it does?

Happy safe computing!
  • 102 Users Found This Useful
Was this answer helpful?

Related Articles

Remove Unwanted Browser Ads

Are you tired of seeing unwanted banner Ads showing up while reading editorials or while shopping...

Windows 10 Creators Update Privacy

Windows 10 violates your privacy by default, here's how you can protect yourself Microsoft...

How to Prevent Phishing Attacks

A typical way of getting hacked is falling for a phishing attack. In fact, most of the large...

Create & Maintain Strong, Complex Password

Creating strong, complex passwords that are difficult to decrypt by hackers is one outstanding...