How To Secure Your Computer From Hackers? |
Firstly guys, most of you don’t know common terms which are used by Computer specialist as well as cyber criminals , so ill first tell those terms one by one and that will make things more clear for you.
Malware :- A ‘Malware’ is a specially designed “Malicious Software” , which is programmed by computer criminals with wrong intentions. Main function of malware’s are to penetrate into your computer and record as well as steal all your personal & financial data and automatically send them to the attacker.
Virus & Worms :- Viruses and worms are mainly intended to damage the digital property on a large scale. Hence, they are coded in such a way that once your infected then it will itself replicate and infect other computer or portable devices and the infection rate goes on, until it reaches masses of computers .
Spyware :- Spywares stand for “Spying Software”, this are sophisticated software that will auto run on the victim’s computer and keeps on recording victim’s activities and then send all the bulk information to the attacker .
Brute-Force :- This is another harmful technique used by hackers , in this the attackers use specially designed software’s to crack the computer/websites password and connect it remotely via some network software . This software’s simply keeps on trying passwords with different patterns from a password list which contains default and most frequently used dictionary words as passwords.
Vulnerabilities :- This is the last topic i am going to tell here, vulnerabilities are basically security flaw left in software’s, hacker’s finds this and later exploits (misuses) this to gain un-authorized access on victims computer.
Now i can start with how to secure your computer from hackers and all this above listed techniques.
1) Install a Antivirus.
As i have already said you what actually viruses are , to protect your computer from them you need to install ethically coded software’s called antiviruses. Main function of antivirus is to detect and delete virus from your computer, in my next article ill write about top ten antivirus for windows users, stay turned .
2) Install a Anti-Malware.
Similar to a antivirus, anti-malware’s are used to detect and remove malwares from a computer, although now a days antivirus have a additional inbuilt function to remove malware’s as well, yet ill suggest you to not take a chance and install a anti-malware . Soon ill write about top anti-malware’s as well.
3) Install a Anti-Spyware.
Again similar to Anti-malware, anti-spywares detects and removes spywares, now a days advanced anti-spywares are having special features like keystroke encryption’s, which will encrypt each and every key stroke and prevent your data from being accessed even though if its compromised. My next post will be about best anti spywares , well i understand that same line in each and every phrase would be kind of annoying , so ill declare it here itself that every method stated here will again be demonstrated in upcoming posts for the better understanding for users for what to do and how to do .
4) Make Use of Complex Passwords.
As you may have read one cause of getting hacked is brute-force , done by attackers , to prevent it you can simply make use of complex passwords and yes it should not be guessable and mainly it should not be a dictionary word, also you should prevent keeping dictionary word with a simple number pattern , example :- hello123 , such type of patterns are listed in attacker’s brute-force list , so you should strictly avoid using it . Best pattern for any password is , it should contain one capital letter, one number and one non-dictionary word. That would be something impossible for an attacker to crack .
5) Install a Firewall.
Firewalls are the intrusion prevention programs designed to fail the attacks of a hacker, even though if a hacker bypasses Antivirus,anti-malware,anti-spyware he would for sure get stuck at firewall, because firewall’s monitor’s and filter’s each and every connection and each and every action done by a software or a program . So ill highly recommend you to follow this step
6) Don’t fall for words.
Well this is something different then other type of attacks, in this the attacker himself tries to convince the victim to execute his malicious link or open his malicious file in your computer which auto-install’s spywares on your computer . This type of attacks are known as “Social Engineering”, where the attacker tries to fool his victim through his communication/tackling skills .
7) Download Software’s Only From Trusted Source .
Use trusted sources only like Soureforge,Softonic,CNet etc to download software’s because hackers have highly encrypted malware’s binded into freewares which are shared on forums,Blogs etc to infect mass victims , So note this point seriously that , to use only trusted source to download software’s
8) Upgrade all Software’s.
Well as you know “Nobody is perfect” that’s why developers leave vulnerabilities in the software’s or applications and later this is found by attackers and misused . By keeping this in notice , the popular organisations release updates which contain bug fixes and patches of this vulnerabilities , so whenever you find any upgrade of any installed software on you PC , don’t be lazy and first upgrade it . There is a software for this called “Secunia” which will inform you whenever an update is necessary for some application or software , you can use it as well if you are not very curious to check all the programs on regular basis .
9) Encrypt Your Sensitive Data.
Well in some cases , somehow the attacker may gain your sensitive data which you wanted to keep secure, but there is one way left , to encrypt data and leave it aside so if the attacker gains access to data he would not be able to read it or use it , there are many programs which are used to encrypt data , as said before ill write about them in my up coming posts .
10 ) Run Regular IDS Scans.
IDS stands for intrusion detection system, this software is coded by elite security researchers keeping in mind of the every part of computer security , this will perform overall all job including network scans,scanning of all the running programs, also downloaded files , software’s etc so this will notify you if something needs to be deleted or removed from pc or it will also notify you if some malicious activity is going on, on your computer .
That’s it guys, follow all the given steps seriously, ill keep on updating posts if new techniques of security are released , and also don’t forget to comment below with your suggestion or review or suggestion , that may help other reads to understand things more clearly . Thank you for reading this post .
Visit Our Official Facebook Page For More: Daoud Softwares And Tips and Tricks
0 comments:
Post a Comment