Personal Technology Information |
|
Are You Well Protected?
Winter?the official start of the cold and flu season. Though, technically speaking, things got started a little early. Close to a million computers, mostly home PC users, have been infected. For many of us our computers are our business. We keep in contact with customers and clients via email, do extensive internet research, and transmit important files electronically. We know what to do to protect our bodies from viruses. There are some simple strategies, and even free precautions we can take to protect our businesses by keeping our PCs virus free. Adopting the following six checkpoints will help keep your computer healthy and your business uninterrupted. Use a Firewall At its most basic level a firewall is a software security system that acts as a barrier between your computer and the outside world (the internet) by monitoring all incoming network traffic. A more advanced firewall will also monitor outgoing traffic. How you use your computer will determine whether basic or advanced firewall protection is needed. What a firewall does is make your computer invisible while on the Internet. If hackers can't see you, they cannot attack you. Windows XP has this software installed; however, it may need to be enabled. If you have XP and would like to enable the firewall, directions are on the Microsoft website. For non XP users, firewall software can be purchased. McAfee and Zone Alarm are two very popular products. Zone Alarm has a free downloadable firewall, basic version, available on their website, www.zonealarm.com. Before installing a firewall, you may be interested in learning your computer's vulnerability. This is something that can be checked for free and in just a few minutes. Visit the website of Gibson Research Corporation, www.grc.com, and under Hot Spots, click on Shields UP. It takes a little bit of scrolling to get to but is well worth the extra seconds. In minutes your PC is scanned and its vulnerability rated. Antivirus Software Antivirus software is the "shot" after the epidemic. This software protects your computer from known threats. Many PCs come with antivirus software already installed. Some of the more popular versions are Norton, PCCillin and McAfee. If you have it pre installed or have purchased it, great. Please be sure to keep it constantly updated with the latest virus definitions. This is important because these definitions are formed in response to the latest viruses. If you don't have this protection, please consider getting it. Once this software is installed on your computer, you will be automatically notified when new virus definitions are available. Then it is just a matter of a few clicks to download the new definitions. Likewise you will be notified when your antivirus software is about to expire. The software needs to be updated annually. The initial purchase, renewal, updates and installation can all be done online. Spyware Eliminator Why am I getting all of these pop ups? Certain websites that you visit or free software (shareware) that you download, and, in some cases, hardware purchased from major manufacturers will also install tracking devices on your computer (spyware). Spyware is annoying but not illegal. An internet search will reveal the many choices available for spyware elimination software. The important thing is to get one and use it consistently. Spybot and PestPatrol are popular choices. I really like Spybot Search and Destroy. Besides the fact that it is free, once spyware is identified, the software will provide a detailed description of just what it is. This is helpful just in case it identifies something that you don't want to get rid of. Backup, Backup, Backup How often do you backup? What files/programs do you backup? What media do you backup to? We all know the importance of backing up our information yet so many of us don't do it. There may be a ton of reasons why it's not done but the one reason it should be done on a regular basis is that it can be a timesaver, possibly a business saver if your computer system is corrupted for any reason. If you happen to be using Windows XP Professional, the backup procedure is quite simple. For users of XP Home Edition, it is a bit more involved. Complete instructions, however, are on the Microsoft website. Typically, data files are what most people need to back up and having well organized files will certainly simplify the process. Whether you backup to disk, zip disk, DVD, writeable CDs, external file drive or utilize one of the online services, it is important to get into the habit of backing up on a regular basis. Weekly Updates of Windows Windows users are automatically notified of current updates for the Windows operating system when your computer is turned on. With just a few clicks your operating system is updated. However, when certain patches become available for your particular applications software (XP, 2000, NT, etc), as was/is the case with the recent worm viruses, a visit to Microsoft's website is necessary. Once there, Microsoft will scan your computer, tell you what updates are available, and you then have the option of installing them on your system. In some cases, you will need your installation CDs to complete the download. With the recent run of viruses and with more expected, it is imperative to check for these updates weekly on the Microsoft website as well as do the automatic updates. Be Careful of Email Attachments Email is such a widely accepted method of communication, and this has not gone unnoticed by hackers who use email as a means of mass virus spread. For this final checkpoint, your due diligence is the only software required. Always delete any email from unknown senders and be very careful of any attachments you are not expecting from any known senders. As we have seen, hackers can quite easily access Outlook address books to spread viruses. By the way, including a fake email address in your address book will not prevent your PC from spreading viruses. This is an urban legend. If you're interested in the full story, check out this link: www.snopes.com/computer/virus/quickfix.htm When it comes to the health of our computers, an ounce of prevention is worth a pound of cure. Effective prevention software along with plain old common sense, used consistently, can keep you protected. About The Author Roxie Hickman, Virtual Assistant (VA), is the owner of The Virtual Connection. The Virtual Connection (www.thevirtualconnection.net) specializes in working with the 'sucstressed' (successful professionals who are stressed because they've been doing it alone). The Virtual Connection provides offsite executive, administrative, and personal assistance (virtual assistance). roxie@thevirtualconnection.net
MORE RESOURCES: Minnesota tech on display at country’s biggest consumer electronics show, with 3M leading the way Star Tribune Time to Finally Organize Your Digital Photos. First You Have to Find Them. - The Wall Street Journal Time to Finally Organize Your Digital Photos. First You Have to Find Them. The Wall Street Journal TOP 10 personal tech and gadgets of 2024 Designboom How AI Will Change Personal Tech in 2025 - Tech News Briefing - WSJ Podcasts The Wall Street Journal Shop the best Cyber Monday deals on phones, tablets, smartwatches and more Good Morning America Tech That Will Change Your Life in 2025 The Wall Street Journal Things to Try: Our 9 Top Tech Tips for You The Wall Street Journal The 28 Best Tech Gifts of 2024, According to Our Gadget Gurus The Wall Street Journal I’ve Been Driving an EV for a Year. I Have Only One Regret. The Wall Street Journal How Tech Created a ‘Recipe for Loneliness’ The New York Times The Coolest Tech Gadgets We’ve Tested So Far This Year BestProducts.com Opinion | Why Is Technology Mean to Me? The New York Times Can You Turn Off Big Tech’s A.I. Tools? Sometimes, and Here’s How. The New York Times Apple’s A.I. Is Landing Soon on iPhones. Here’s What It’s Like. The New York Times In the City, Personal Safety Starts With Your Smartphone The Wall Street Journal The Great AI Challenge: We Test Five Top Bots on Useful, Everyday Skills The Wall Street Journal The Summer Is So Hot, Workers Are Wearing High-Tech Ice Packs The Wall Street Journal The Data Big Tech Companies Have On You Security.org Apple Watch Is Becoming Doctors’ Favorite Medical Device The Wall Street Journal When Cell Service Is Down, You Can Send iPhone Texts via Satellite The Wall Street Journal Android beefs up Bluetooth tag stalker protections The Register No way? Big Tech's 'lucrative surveillance' of everyone is terrible for privacy, freedom The Register Why Turning It Off and Turning It Back On Is Gadget-Fixing Magic The Wall Street Journal China's homebrew Bluetooth alternative is on the march as Beijing pushes universal remotes The Register Apple Intelligence Isn’t Very Smart Yet—and Apple’s OK With That The Wall Street Journal My Husband Wants a Japanese Toilet. Is He On to Something? The Wall Street Journal What the Arrival of A.I. Phones and Computers Means for Our Data The New York Times How I Got My Attention Span Back The Wall Street Journal Jonathan Haidt Blamed Tech for Teen Anxiety. Managing the Blowback Has Become a Full-Time Job. The Wall Street Journal The Only App That Always Wins the Battle for Your Attention The Wall Street Journal How to Add Extra Security Layers to Your Phone or Tablet The New York Times Exclusive | Wanted: Weekend Warriors in Tech The Wall Street Journal When Did Apple’s Notes App Become an Extension of Our Brains? The Wall Street Journal Foldables Are Becoming Good Enough to Be Your Next Smartphone The New York Times How to Reduce Your Risk When Using Personal-Finance Apps The Wall Street Journal This Ring on Your Finger Tracks Your Sleep. Is It Worth the Splurge? The New York Times How to Turn Your Old iPhone Into an A.I. Phone (and Skip the Upgrade) The New York Times Report: Tech misconceptions plague the IT world The Register A Case for Backing Up Your Precious Photos and Files at Home The Wall Street Journal Tech Made Easy AARP The Battle to Ban Screens From School Now Includes Chromebooks and Tablets - The Wall Street Journal The Battle to Ban Screens From School Now Includes Chromebooks and Tablets The Wall Street Journal The Hearing Aid Revolution That Wasn’t The Wall Street Journal How to Make Typing Easier on the Phone and Leave the Laptop at Home The New York Times China wants mobile devices to limit usage time for minors, ensure they only see nice content The Register Young Women With Eating Disorders Feel the Pull of Energy Drinks The Wall Street Journal How TikTok Is Wiring Gen Z’s Money Brain The Wall Street Journal PC shipments stuck in neutral despite AI buzz The Register Welcome to the Era of the A.I. Smartphone The New York Times WSJ News Exclusive | OpenAI Made AI Videos for Us. These Clips Are Good Enough to Freak Us Out. The Wall Street Journal 56 best tech gifts for gadget lovers, gamers, more Digital Trends Don’t Let Your Smartphone Keep You Up at Night The New York Times Slack, Microsoft Teams, Google Chat: Is There Any Safe Place to Complain About Work Online? The Wall Street Journal |
RELATED ARTICLES
Getting Started with HTML The basic language of the internet is html. If you can do crossword puzzles, if you can write a report for your teacher or boss, you can be creating web pages in a matter of minutes. Anti-Skip Protection on Mp3 Players There have been some questions on anti-skip protection on mp3 players due to the fact that some of them publish on the box in its feature list.You got to see what the storage of each player is to determine if it needs it or not:- Flash mp3 players have no moving parts at all, does not need nor have anti-skip protection. FTP - File Transfer Protocol Explained File Transfer Protocol (FTP) is a protocol that is part of the TCP/IP suite. It is the standard for transferring large amounts of data from server to server and from servers to clients. HTML Explained: Part 2 Get started creating web pages using text files and HTML code! This article is a continuation of HTML Explained: Part 1, which gives a general overview of HTML. Here, we're going to get into the nitty gritty of the code itself. Simple Overview Of Computer Computer is an electronic machine work on the instructions of human being. In other words you have to input data to get your required output. USB Drives - What to Look For in a USB Device Those small USB drives have so many names, pocket drives, thumb drives, USB Pen, Jump drives, and several other names, but when it comes down to it, we are all talking about a small portable, reusable storage media that fits in the palm of your hand!There are a couple major factors you should consider when you select a USB drive. The size of the storage media you require, and the size and shape of the device itself. Help, I Need a New HDTV! (Part 1 of 5) Feeling overwhelmed in selecting a new TV? With all the choices these days, you may feel like, "Where do I start?!"In part 1 of our 5 part article, we discuss the importance (and a quick rule of thumb!) of selecting a screen size appropriate for your space.---Selecting the correct size TV is an important part of your purchase decision. Mail-merging: The Principles About mail-mergingMail-merging is the process of merging variable data and fixedtext.Using mail-merging, you can create individualised letters,envelopes, labels and other documents without having tolaboriously create each individual one. Customize Your Portable Player with an MP3 Player Accessory Everywhere you look today people are listening to personal audio players. And many look for ways to personalize and/or enhance their experience. How Do MP3 Players Work? Digital Audio Technology Revolutionizes Music Enjoyment Millions have enjoyed recorded music since 1877 when Thomas Edison invented the phonograph. Then came radio, records, tapes and CD's. Tips for Buying a PC Buying Your PCBuying a PC that's right for you and your family is not all that simple task. More so if you're going to buy an unbranded or an assembled one. Compile .BAT Files into Native Windows Applications (.EXE) Since the DOS days, batch files have been one of the most convenient and immediate ways to accomplish certain tasks. Even today it's possible to find some remarkably sophisticated utilities written as command-line batch files. Microsoft Great Plains Dexterity Customizations Microsoft Business Solutions is on the way to popularize it's ERP systems implementation. Right now such products as Microsoft CRM and Small Business Manager (cheap version of Microsoft Great Plains, based on the same Great Plains Dexterity runtime and DYNAMICS. A Tale of Two Regeds Tech support tells me to type 'regedt32' as opposed to 'regedit' to access the registry from the command line (Start > Run). I question the use of 'regedt32,' but he says to do it anyway. How To Become A True CCNA I've worked my way from the CCNA to the CCIE, and along the way I've conducted job interviews and casual conversations with dozens of CCNAs and CCNA candidates. Believe me, people who "sneak by" the CCNA exam by braindumps, memorization, and never touching a router or switch are QUICKLY found out in job interviews and on the job. Cisco Certification: A Survival Guide To The Cisco Cable Jungle One of the most confusing parts of beginning your Cisco studies is keeping all the cable types separate in your mind, and then remembering what they're used for. This often occurs when a CCNA or CCNP candidate starts putting together their own home practice lab, and they suddenly realize that they have the equipment to run labs, but not the cables. Buying a Personal Computer (PC) For many people the computer industry is a seeming unsolvable jungle filled with mysterious words. Here is a guide to help you understand the personal computer and to give you the information needed to make a shopping decision you can live with so you can enjoy your PC for years to come. Selecting a Personal Digital Assistant A Computer in Your HandCarrying around an address book and planner is becoming a thing of the past. With new PDA developments, you can manage your contacts and schedule, use e-mail, and even listen to music. Can Movie Theatres Compete with Home HD TV in the Future? The battle is heating up for market share, home movie theatre, X-Box, Playstations and virtual reality take on the big screen and theme parks. You might be surprised to learn that the war is just beginning. Keeping Passwords Secure As the web has evolved, so have the methods of collecting personal information. A large number of websites require visitors to register to gain access or participate. |
home | site map |
© 2006 |