Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Are You Well Protected? > NetSparsh - Viral Content you Love & Share

Are You Well Protected?

Winter?the official start of the cold and flu season. Though, technically speaking, things got started a little early. Close to a million computers, mostly home PC users, have been infected.

For many of us our computers are our business. We keep in contact with customers and clients via email, do extensive internet research, and transmit important files electronically.

We know what to do to protect our bodies from viruses. There are some simple strategies, and even free precautions we can take to protect our businesses by keeping our PCs virus free.

Adopting the following six checkpoints will help keep your computer healthy and your business uninterrupted.

Use a Firewall

At its most basic level a firewall is a software security system that acts as a barrier between your computer and the outside world (the internet) by monitoring all incoming network traffic. A more advanced firewall will also monitor outgoing traffic. How you use your computer will determine whether basic or advanced firewall protection is needed.

What a firewall does is make your computer invisible while on the Internet. If hackers can't see you, they cannot attack you.

Windows XP has this software installed; however, it may need to be enabled. If you have XP and would like to enable the firewall, directions are on the Microsoft website.

For non XP users, firewall software can be purchased. McAfee and Zone Alarm are two very popular products. Zone Alarm has a free downloadable firewall, basic version, available on their website, www.zonealarm.com.

Before installing a firewall, you may be interested in learning your computer's vulnerability. This is something that can be checked for free and in just a few minutes. Visit the website of Gibson Research Corporation, www.grc.com, and under Hot Spots, click on Shields UP. It takes a little bit of scrolling to get to but is well worth the extra seconds. In minutes your PC is scanned and its vulnerability rated.

Antivirus Software

Antivirus software is the "shot" after the epidemic. This software protects your computer from known threats. Many PCs come with antivirus software already installed. Some of the more popular versions are Norton, PCCillin and McAfee.

If you have it pre installed or have purchased it, great. Please be sure to keep it constantly updated with the latest virus definitions. This is important because these definitions are formed in response to the latest viruses. If you don't have this protection, please consider getting it.

Once this software is installed on your computer, you will be automatically notified when new virus definitions are available. Then it is just a matter of a few clicks to download the new definitions.

Likewise you will be notified when your antivirus software is about to expire. The software needs to be updated annually. The initial purchase, renewal, updates and installation can all be done online.

Spyware Eliminator

Why am I getting all of these pop ups? Certain websites that you visit or free software (shareware) that you download, and, in some cases, hardware purchased from major manufacturers will also install tracking devices on your computer (spyware). Spyware is annoying but not illegal.

An internet search will reveal the many choices available for spyware elimination software. The important thing is to get one and use it consistently. Spybot and PestPatrol are popular choices.

I really like Spybot Search and Destroy. Besides the fact that it is free, once spyware is identified, the software will provide a detailed description of just what it is. This is helpful just in case it identifies something that you don't want to get rid of.

Backup, Backup, Backup

How often do you backup? What files/programs do you backup? What media do you backup to?

We all know the importance of backing up our information yet so many of us don't do it. There may be a ton of reasons why it's not done but the one reason it should be done on a regular basis is that it can be a timesaver, possibly a business saver if your computer system is corrupted for any reason.

If you happen to be using Windows XP Professional, the backup procedure is quite simple. For users of XP Home Edition, it is a bit more involved. Complete instructions, however, are on the Microsoft website.

Typically, data files are what most people need to back up and having well organized files will certainly simplify the process.

Whether you backup to disk, zip disk, DVD, writeable CDs, external file drive or utilize one of the online services, it is important to get into the habit of backing up on a regular basis.

Weekly Updates of Windows

Windows users are automatically notified of current updates for the Windows operating system when your computer is turned on. With just a few clicks your operating system is updated.

However, when certain patches become available for your particular applications software (XP, 2000, NT, etc), as was/is the case with the recent worm viruses, a visit to Microsoft's website is necessary.

Once there, Microsoft will scan your computer, tell you what updates are available, and you then have the option of installing them on your system. In some cases, you will need your installation CDs to complete the download.

With the recent run of viruses and with more expected, it is imperative to check for these updates weekly on the Microsoft website as well as do the automatic updates.

Be Careful of Email Attachments

Email is such a widely accepted method of communication, and this has not gone unnoticed by hackers who use email as a means of mass virus spread.

For this final checkpoint, your due diligence is the only software required.

Always delete any email from unknown senders and be very careful of any attachments you are not expecting from any known senders. As we have seen, hackers can quite easily access Outlook address books to spread viruses.

By the way, including a fake email address in your address book will not prevent your PC from spreading viruses. This is an urban legend. If you're interested in the full story, check out this link:

www.snopes.com/computer/virus/quickfix.htm

When it comes to the health of our computers, an ounce of prevention is worth a pound of cure. Effective prevention software along with plain old common sense, used consistently, can keep you protected.

About The Author

Roxie Hickman, Virtual Assistant (VA), is the owner of The Virtual Connection. The Virtual Connection (www.thevirtualconnection.net) specializes in working with the 'sucstressed' (successful professionals who are stressed because they've been doing it alone). The Virtual Connection provides offsite executive, administrative, and personal assistance (virtual assistance).

roxie@thevirtualconnection.net

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

New York Times

When a Tech Reporter Doesn't Use Much Tech
New York Times
How do New York Times journalists use technology in their jobs and in their personal lives? David Streitfeld, a technology reporter in San Francisco, discussed the tech he's using — and not using. For a tech journalist, you don't use a lot of tech ...


New York Times

The Benefits (and Limits) of Using Tech to Plan a Wedding
New York Times
Because of the deeply personal nature of a wedding, you can't just plan everything with a few taps on a smartphone or by sitting in front of a computer. Eventually you will have to talk to lots of people the old school way: on the phone or in person.


New York Times

How to Convert Photo Files in Bulk
New York Times
Q. I have hundreds of TIFF-formatted photos. Is there an efficient way to convert these photos to JPG all at once? A. Just as you can rename multiple photos at once through “batch processing,” you can convert a large collection of images from one file ...


88.9 KETR

Businesses Need To 'Mind The Gap' Between Office Tech And Personal Tech
88.9 KETR
Our personal technology commentator, Jeremy Gamez, comments on a recent article emphasizing that businesses wanting to attract the brightest young employees need to be sure that their office technology is as good as Millennials' personal technology.


New York Times

Add Pictures to Android Contacts
New York Times
Q. How do I add an Android contact photo for someone who doesn't already have one so I can see something besides initials in a circle? A. Start by opening the Contacts app on your Android device and selecting the contact you'd like to dress up with a ...


New York Times

How the 52 Places Traveler Stays Charged While Chronicling the World
New York Times
How do New York Times journalists use technology in their jobs and in their personal lives? Jada Yuan, who is crisscrossing the globe as The Times's 52 Places Traveler, discussed the tech she's using. You are endlessly traveling, and you must have to ...


New York Times

How to Go Back to the Old Gmail
New York Times
Q. I tried to get used to the new Gmail web design, but I just don't like it. Can I go back to the old one? A. For the time being, Google is keeping around the previous version of Gmail on the web, and you can revert to the old look from the inbox ...


New York Times

What Europe's Google Fine Means for Android Users
New York Times
American government officials have expressed interest in taking a tougher stance on regulating tech companies, but Europe has largely acted by itself in its regulatory actions against Silicon Valley titans. So other than Google's having to pay a big ...
Google quietly working on a replacement for Android, called Fuchsia, that's causing some fierce internal squabblingFinancial Post

all 511 news articles »

New York Times

Emergency Charging Options on the Road
New York Times
Likewise, the Federal Trade Commission has previously warned travelers about directly connecting phones to the USB jacks for the infotainment systems in rental cars because the phone could share personal data with the car's system, but a dedicated ...

and more »

New York Times

I Used Apple's New Controls to Limit a Teenager's iPhone Time (and ...
New York Times
Apple's new parental controls cut a teenager's iPhone use in half. It wasn't as effective on our personal tech columnist.

and more »
Google News

Basic Computer Thermodynamics

That desk in front of you and everything else around... Read More

Cisco CCNA / CCNP Certification: OSPF ASBRs Explained And Illustrated

When I first started studying for my CCNP, some of... Read More

Troubleshooting Computer Freeze (Lockup) Problems

How familiar does the following sound? Your computer was working... Read More

How to Buy a Plasma Television Set

Most people think that all you have to do to... Read More

Linux Power Tools - Great Tools to Make System Administration Easy

World War II - Germany decided to attack Poland. Poland... Read More

How I Started Working With 3D Modeling Programs

So I'll start from the very beginning.One day I was... Read More

Cut Through the Hype and Make the Right Digital Camera Comparisons

There are soooo many choices. With all the styles and... Read More

How to Place Home Theater Speakers

You have your television and home theater receiver; you just... Read More

Your Computer Cant Keep Time

A computer needs a certain amount of information to operate;... Read More

Buying a Personal Computer (PC)

For many people the computer industry is a seeming unsolvable... Read More

SmartCar Memory Stick for LapTop Transfer Data

With the new technology used to transfer information to from... Read More

Cisco CCNA Certification: Five Things To Do DURING The Exam

There are plenty of articles out there about how to... Read More

5 Simple Ways To Increase Your Computer Speed & Help Your Computer Run More Efficiently!

If you're a computer expert, you'll probably already know about... Read More

Registry Tools Demystified

Not sure what Windows registry is or how it works?... Read More

Why Build Your Own Computer System

Have you ever thought about building your own computer system?... Read More

Bluetooth Headphones For Your PDA

Nothing is worse than having to negotiate all kinds of... Read More

Top 9 Ways To Speed Up Your Surfing & Computing

It seems like fast never quite rates fast enough.No matter... Read More

Anti-Skip Protection on Mp3 Players

There have been some questions on anti-skip protection on mp3... Read More

Healthy Webmasters Choose Ergonomic Computer Products

Webmasters usually sit at their computers much longer in a... Read More

How To Speed Up Your Aging PC And Make It Healthier Too

With a little tweaking and with proper tools, you can... Read More

Compile .BAT Files into Native Windows Applications (.EXE)

Since the DOS days, batch files have been one of... Read More

Spyware Remover

Your first step in removing dangerous infections from your computer... Read More

Windows PDA Medical Software Benefits

PDA Medical BenefitsIf you are concerned about your medical history,... Read More

Five Simple Steps to Speed up Your Computer

Most people download and save so much information on their... Read More

Put Order and Information into File Names

Unless you place your faith in internal search engine software... Read More