SlideShare ist ein Scribd-Unternehmen logo
1 von 7
General Computer
Protection Strategies
to Employ
COMPUTER SYSTEM PROTECTION
- ADVANCED METHODS
General Computer Protection Tips
In addition to buying software for anti-hacking and anti-virus protection, there are a number of
additional strategies that you can employ on your computer and as you operate your computer to help
protect it against intrusion and to protect your information wherever you may choose to let it reside.
Here’s a list of some tips that will help you.
 Turn off or logout of your computer when not using it – the less time your computer is online, the less
it is being seen by externals that may mean you harm.
 If you have more than one person in your household using your computer, set up separate “firewalled”
accounts for each of them – don’t let people onto your system through your own login and password.
 Keep your anti-virus software as current as you can. Update it regularly so that you are protected
against the newer viruses that have been identified and have been guarded against by your anti-virus
software provider.
 Increase the privacy settings on your computer. In an upcoming lecture, I show you how to update
these settings if you are using Windows 10. Watch that video as well and also be looking to update
your privacy settings on older versions of Windows if that is what you are running on your computer.
General Computer Protection Tips - 2
 Be careful opening PDF files you receive from external sources. Hackers and software virus creators
have in recent times found this to be an effective platform for sending out their damage causing
payloads.
 Regarding e-mails, don’t be curious. If you don’t know where an e-mail came from, don’t open it. If
you do open an e-mail from someone you don’t know and/or that you received in an unsolicited
manner, do not click on any links found within the e-mail. Executable viruses are sometimes attached
to what you think is just a link to another site.
 If you are concerned about the authenticity of an e-mail address when you have received an e-mail,
check it out by looking at the “Details” dropdown you can click next to the e-mail name. I have
sometimes even taken this one step further by checking out their e-mail domain address using a
domain provider to do a “Who Is” search when I am really wondering about where something came
from.
 Be careful of all downloads to your computer. Be sure you know the source is safe and you are on a
real webpage belonging to that source when you download the content. Hackers are now setting up
“Fake” webpages that look like real businesses to lure you in so that they can access you through
downloads from their sites.
General Computer Protection Tips - 3
 Using the “Cloud” for storage is risky – even places like Google Drive, Dropbox, etc. can be hacked.
Cloud storage locations seem to be prime targets for hackers. These are convenient storage and data
backup locations for many so if you want to use them, here are a few tips that could save the privacy of
your content there.
 The simplest protection method is to only send encrypted or Zipped content up there for storage. If you are
using zip files, use the Zip password feature before sending. This helps to protect your content even if that
site gets hacked.
 Encrypt your important files on your computer first before sending them to the cloud. In fact, it is a good idea
to only store your important files on your computer in encrypted formats only even when they reside on your
computer. Encryption products like MEGA and SpiderOak can help you here. If you are really working with
sensitive content regularly, you can also implement products like encFS – it takes a couple of hours to install,
but it can setup folders on your computer that automatically encode all files you move there. This folder and
its subsets look and behave just like normal folders on your PC so once installed, encryption is automatic for
you.
 Use of plugins such as webcams and microphones. Set your privacy settings to disallow applications to
use them on your PC and disconnect external microphones and webcams when not in use. It is not
that difficult for an external to get into most systems and take control of these devices to watch you or
record you as you do things in and around your computer.
General Computer Protection Tips - 4
 If you are on a Microsoft platform, consider installing their free application – “The Enhanced
Mitigation Experience Toolkit.” Microsoft Quote: “The Enhanced Mitigation Experience Toolkit (EMET)
is a utility that helps prevent vulnerabilities in software from being successfully exploited. EMET
achieves this goal by using security mitigation technologies. These technologies function as special
protections and obstacles that an exploit author must defeat to exploit software vulnerabilities. These
security mitigation technologies do not guarantee that vulnerabilities cannot be exploited. However,
they work to make exploitation as difficult as possible to perform. EMET also provides a configurable
SSL/TLS certificate pinning feature that is called Certificate Trust. This feature is intended to detect
(and stop, with EMET 5.0) man-in-the-middle attacks that are leveraging the public key infrastructure
(PKI).”
 When you are out browsing websites that you may be clicking content and links on, be looking for
https sites where you can – but don’t just trust the (s) on the end of the url’s http. Click on the
associated lockbox to check out the legitimacy of the security certificate details for the webpage being
explored.
 Scorpion System Protection is an anti-hacking software product you may consider purchasing. Built to
support Microsoft, the NIST, DoD, and Homeland Security remote access standards, this product will
help increase the security of your computer to Government usage standards.
General Computer Protection Tips - 5
 Sandboxie is a protection application you can purchase for both home and business use. It is a good
place to run new software you have concerns about using plus it has a lot of great other features.
Sandboxie uses isolation technology to separate programs from your underlying operating system
preventing unwanted changes from happening to your personal data, programs and applications that
rest safely on your hard drive.
 When surfing the Internet, never login from your computer while in Administrator mode on your
computer. You do not want this login information to be shared out there in Cyberspace. Only go to the
Internet from user accounts you have set up on your computer.
Thank You for Watching this Lecture
In summary, implementing some or all of
these ideas on your computer
and in your online life will go a long way to
protecting you.
Take My Full Computer System Protection Course
- FREE NOW on Udemy!
- https://www.udemy.com/computer-system-protection-advanced-methods/

Weitere ähnliche Inhalte

Kürzlich hochgeladen

pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
nirzagarg
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Chandigarh Call girls 9053900678 Call girls in Chandigarh
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 

Kürzlich hochgeladen (20)

(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
VIP Model Call Girls NIBM ( Pune ) Call ON 8005736733 Starting From 5K to 25K...
 
Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

General Computer Protection Strategies

  • 1. General Computer Protection Strategies to Employ COMPUTER SYSTEM PROTECTION - ADVANCED METHODS
  • 2. General Computer Protection Tips In addition to buying software for anti-hacking and anti-virus protection, there are a number of additional strategies that you can employ on your computer and as you operate your computer to help protect it against intrusion and to protect your information wherever you may choose to let it reside. Here’s a list of some tips that will help you.  Turn off or logout of your computer when not using it – the less time your computer is online, the less it is being seen by externals that may mean you harm.  If you have more than one person in your household using your computer, set up separate “firewalled” accounts for each of them – don’t let people onto your system through your own login and password.  Keep your anti-virus software as current as you can. Update it regularly so that you are protected against the newer viruses that have been identified and have been guarded against by your anti-virus software provider.  Increase the privacy settings on your computer. In an upcoming lecture, I show you how to update these settings if you are using Windows 10. Watch that video as well and also be looking to update your privacy settings on older versions of Windows if that is what you are running on your computer.
  • 3. General Computer Protection Tips - 2  Be careful opening PDF files you receive from external sources. Hackers and software virus creators have in recent times found this to be an effective platform for sending out their damage causing payloads.  Regarding e-mails, don’t be curious. If you don’t know where an e-mail came from, don’t open it. If you do open an e-mail from someone you don’t know and/or that you received in an unsolicited manner, do not click on any links found within the e-mail. Executable viruses are sometimes attached to what you think is just a link to another site.  If you are concerned about the authenticity of an e-mail address when you have received an e-mail, check it out by looking at the “Details” dropdown you can click next to the e-mail name. I have sometimes even taken this one step further by checking out their e-mail domain address using a domain provider to do a “Who Is” search when I am really wondering about where something came from.  Be careful of all downloads to your computer. Be sure you know the source is safe and you are on a real webpage belonging to that source when you download the content. Hackers are now setting up “Fake” webpages that look like real businesses to lure you in so that they can access you through downloads from their sites.
  • 4. General Computer Protection Tips - 3  Using the “Cloud” for storage is risky – even places like Google Drive, Dropbox, etc. can be hacked. Cloud storage locations seem to be prime targets for hackers. These are convenient storage and data backup locations for many so if you want to use them, here are a few tips that could save the privacy of your content there.  The simplest protection method is to only send encrypted or Zipped content up there for storage. If you are using zip files, use the Zip password feature before sending. This helps to protect your content even if that site gets hacked.  Encrypt your important files on your computer first before sending them to the cloud. In fact, it is a good idea to only store your important files on your computer in encrypted formats only even when they reside on your computer. Encryption products like MEGA and SpiderOak can help you here. If you are really working with sensitive content regularly, you can also implement products like encFS – it takes a couple of hours to install, but it can setup folders on your computer that automatically encode all files you move there. This folder and its subsets look and behave just like normal folders on your PC so once installed, encryption is automatic for you.  Use of plugins such as webcams and microphones. Set your privacy settings to disallow applications to use them on your PC and disconnect external microphones and webcams when not in use. It is not that difficult for an external to get into most systems and take control of these devices to watch you or record you as you do things in and around your computer.
  • 5. General Computer Protection Tips - 4  If you are on a Microsoft platform, consider installing their free application – “The Enhanced Mitigation Experience Toolkit.” Microsoft Quote: “The Enhanced Mitigation Experience Toolkit (EMET) is a utility that helps prevent vulnerabilities in software from being successfully exploited. EMET achieves this goal by using security mitigation technologies. These technologies function as special protections and obstacles that an exploit author must defeat to exploit software vulnerabilities. These security mitigation technologies do not guarantee that vulnerabilities cannot be exploited. However, they work to make exploitation as difficult as possible to perform. EMET also provides a configurable SSL/TLS certificate pinning feature that is called Certificate Trust. This feature is intended to detect (and stop, with EMET 5.0) man-in-the-middle attacks that are leveraging the public key infrastructure (PKI).”  When you are out browsing websites that you may be clicking content and links on, be looking for https sites where you can – but don’t just trust the (s) on the end of the url’s http. Click on the associated lockbox to check out the legitimacy of the security certificate details for the webpage being explored.  Scorpion System Protection is an anti-hacking software product you may consider purchasing. Built to support Microsoft, the NIST, DoD, and Homeland Security remote access standards, this product will help increase the security of your computer to Government usage standards.
  • 6. General Computer Protection Tips - 5  Sandboxie is a protection application you can purchase for both home and business use. It is a good place to run new software you have concerns about using plus it has a lot of great other features. Sandboxie uses isolation technology to separate programs from your underlying operating system preventing unwanted changes from happening to your personal data, programs and applications that rest safely on your hard drive.  When surfing the Internet, never login from your computer while in Administrator mode on your computer. You do not want this login information to be shared out there in Cyberspace. Only go to the Internet from user accounts you have set up on your computer.
  • 7. Thank You for Watching this Lecture In summary, implementing some or all of these ideas on your computer and in your online life will go a long way to protecting you. Take My Full Computer System Protection Course - FREE NOW on Udemy! - https://www.udemy.com/computer-system-protection-advanced-methods/