8 Steps To Secure Windows

 


Visitors: 341

The Internet is awash with viruses, Trojan Horse programs and worms which are constantly looking to infect vulnerable computers that are connected to the internet. If a worm gets into your computer it does not limit itself to the individual e-mails you send to friends, family and colleagues, as it can spread itself automatically to all addresses stored in your email program.

Take positive steps today to ensure both Windows and your email program are secure.

1. Install a more secure operating system. If you are not using Windows 2000/XP then you should consider upgrading to these systems. They use the NTFS (New Technology File System) and that is much more secure than FAT32, which earlier operating systems use.

2. Switch off windows scripting. Many applications can use Windows Scripting Host (WSH), but unfortunately worms also use this programming language. A famous example of this is the “loveletter virus". You should therefore restrict the use of WSH by disabling scripting.

3. Pay attention to the files types you open. Many worms hide behind false file types. JPG, GIF or ZIP files that may be sent to you as an attachment in an email are good examples. You can modify windows so you can better control these file types and protect your PC from possible infections.

4. Correctly configure Outlook and Outlook Express. These popular email programs are always a target for Hacker and Worm attacks. Ensure that you have all the security settings that these programs contain switched on.

5. Correctly configure Internet Explorer. Check the security settings in Internet Explorer. The security level should be set to “Medium" at the very least.

6. Protect your Microsoft Office Programs. The macro functions of Microsoft programs, for example Word, are popular ways for hackers to use to get into your PC. Ensure that you have correctly configured the security settings to prevent this.

7. File and printer control. To prevent access to your computer, you should deactivate file and printer sharing unless you are on a secure network.

8. Set up a firewall. In addition to good anti-virus software, you should also install a firewall. This will give your PC added protection against attack. Windows XP has a firewall built into it. Users of other operating systems should invest in a third-party firewall for their computers.

No PC can be 100% secure, but what you can do is minimise the security risk. By making changes such as those outlined in this article you can vastly improve the level of security on your PC.

**************************************************************************************************************** Create fantastic e-books and audio e-books without any knowledge of HTML etc. The “Dead Easy E-Book" creator visit http://www.pandas-with-typewriters.com for more info plus other great software. ****************************************************************************************************************

Note: You may use this article in your e-zine or on your site as long as the article and resource box remain unchanged

Copyright Mike Morris 2005

(496)

Article Source:


 
Rate this Article: 
 
Some Fast Steps to Generate Secure Passwords
Rated 4 / 5
based on 5 votes
ArticleSlash

Related Articles:

Secure Your Windows XP And Your Data

by: Vincent Moore (March 23, 2008) 
(Computers and Technology)

How Secure Are uPVC Sash Windows?

by: Joel Tarplin (January 26, 2011) 
(Home Improvement/Heating and Air Conditioning)

Important - Severe Windows Security Flaw: What You Can Do Right Now To Secure ..

by: Olga Farber Becker (January 03, 2006) 
(Computers and Technology/Data Recovery)

Total Home – Ensure your Windows in Norwich are Secure, Stylish and Energy ..

by: Fiona Muller (August 11, 2011) 
(Home Improvement/Kitchen Improvements)

Simple Steps to Secure Your Computer

by: Russell Card (January 12, 2007) 
(Computers and Technology)

Steps to Secure Your Wireless LAN

by: Gavin Sanderson (July 23, 2007) 
(Computers and Technology)

5 Steps To Ensuring Your Website Is Secure

by: John Lenaghan (August 10, 2006) 
(Internet and Businesses Online/Web Hosting)

10 Steps To Secure And Manage Your Passwords

by: Cavyl Stewart (December 11, 2004) 
(Computers and Technology/Software)

7 Easy Steps to Secure Your Wireless Router

by: Andy J Jones (March 18, 2008) 
(Computers and Technology/Hardware)

Some Fast Steps to Generate Secure Passwords

by: Anna Sonen. (September 23, 2010) 
(Computers and Technology/Software)