Currently, there is a continuing confrontation in the computer industry between those who write malware and those who fight it. Against this background, the task of protecting users' computers from unlawful encroachments is urgent. There are many ways to solve it, and each user decides for himself which of them to use.
Necessary
- - antivirus;
- - firewall;
- - the Internet.
Instructions
Step 1
Install an antivirus. Consider antivirus software available on the market. You can choose both paid ones, for example, Kaspersky AV or Dr. Web as well as free ones like Comodo or Avast! Please note that no antivirus provides absolute protection against malicious programs (viruses, worms, Trojans, etc.), and its effective operation is associated with keeping the anti-virus databases up-to-date (constant updates).
Step 2
Install the firewall. A personal firewall, or firewall, helps protect the operating system from network attacks (such as denial of service or port scans) and malware that spreads from computer to computer through the networks between them. Most operating systems come with a standard firewall.
Step 3
Install an alternative web browser. Try not to use the standard web browser that comes with the operating system (for example, Internet Explorer that comes with Windows). Typically, a standard web browser has many flaws that can be exploited by cybercriminals to obtain confidential information about users and compromise computers. The exception is Linux operating systems, which include open source software by default, which means they are more secure.
Step 4
Install an alternative operating system. The widespread propaganda of Microsoft Windows contributes to the spread of malware due to its low security. Open source operating systems are generally more secure because they are developed and inspected by programmers around the world. Consider installing one of the Linux distributions, Mac OS, or another operating system.
Step 5
Update your operating system. Many malicious programs penetrate the computer not only due to the illiteracy of the user, but also through the vulnerabilities (shortcomings) of the operating system. Operating system developers are constantly improving their products and release appropriate updates at regular intervals. Timely installation of updates will increase your security in the face of computer threats.
Step 6
Use trusted sources. Do not install software from unverified sources. Do not click on suspicious links on the Internet, including those received by email. It is advisable not to visit websites containing adult content and hacking software - they can also pose a threat.
Step 7
Improve your computer literacy. Constant work on yourself, studying new materials and mastering new methods and programs in the field of computer security will make you more knowledgeable and experienced user, and your computer more secure.