Secure the Computer When Browsing

Bookmark and Share
When our computer connected to the Internet means that the PC is part of our global network and the same with the show where we are. With mendial-up to the Internet means that the PC is part of our global network and the same with the show where we are. Because to be able to interact with other computers on the global network, we would not need to have the address clearly. Address in the form of a given IP Address automatically and random from the existing stock. Although the Address ID is different each time we mendial-up to the Internet, but actually being able from the provider record. In addition to IP Address, information about Internet users can be detected through cookies or during the data transfer. In fact a lot of impressions that we leave even though the only stop in the right web site. Threat of danger also occur when we are forced to provide personal data when registering on-line shopping. There is the possibility of data theft in the journey, and then stored in a certain time on a server. One time data can fall into the hands of the cracker (malicious hackers).

Each time the connection to the Internet to be sure we use the browser program. Often Web Browser automatically inform the operating system, browser version, screen resolution, active / not to Java and Javascript.Basically, this information is very useful when you want to deliver web site visitors to pages that have special technical equipment is appropriate. Earlier information collected, analyzed and assessed. Thus, managers get a web site description of the structure of visitors. In fact most of the web site managers really want to know more, such as name, address, telephone number, e-mail, hobbi and others. Usually offer free or download a new access will be active after a visitor to provide personal data.

The spread of e-mail addresses can also occur when we register in the mailing list or participate in a sweepstakes or kuiz. The spread of e-mail addresses are used by some providers. They gathered all the e-mail address, then sell them to the marketing agents. This is the mail boxes are often filled with ads or JunkMail.

Not long after Windows XP launched, some appear tudingan addressed to Microsoft. Section through Windows XP, Microsoft has become a detective government the United States. According to several publications, Windows XP is the potential to transmit data to fihak Microsoft. Transfer of this data is of course not transparent to the user computer. Not surprisingly since the publication of Windows XP, many people say that Windows XP is installed to record the program, create a surf or even to report the existence of the pirated program is installed in the hard disk.

When we know the threat of danger such as this, then as a highly recommended security steps to anticipate this danger, particularly when high-risk profession you become the victim of data theft or breach of privacy. Here are tips, tricks that can be done.

Wherever possible avoid the form on the website. Because of the emergence of various JunkMail is incurred as a result of the worst form of the free. When prompted to fill out a form to download the software, cancel the download, find another trusted source such as a FTP server or website of famous, such as www.download.cnet.com Open one or more e-mail account on the e-mail service for free on the Internet, which is used for special registration on the website. When incoming mail ads that are close too many accounts.

Should use the provider that provides a dynamic IP Address. Through the existence of a static IP Address your PC easily found. Take advantage of the provider to give a proxy server. This proxy server functions as a mediator. Message that we make will be sent to the proxy server, the next request will be submitted to the website concerned. Thus the only website to contact the proxy server and the other party can only be there until the track only. If your provider does not provide a proxy server, you can take advantage of online-proxy, one of which is Anonymizer (www.anonymizer.com). You simply enter the URL you want is available on the website in the Anonymizer. However, the use of online-proxy this will slow the performance of the computer, because all data must be through the anonymizer server first.

Avoid the storage of cookies that the website can not observe movements in your long period of time. To prevent cookies can use programs such as Webwasher (www.webwasher.de) or Naviscope (www.naviscope.com). This program will filter ads, cookies javasript and others. In fact we can do so without additional tools, namely to remove the info in the cookie folder? Temporary Internet Files?. Other way is disabling the creation of cookies by selecting the new menu? Tools | Internet Options | Security? in the IE browser, then click Custom Level. In the Security Settings dialog box, find the Cookies, and select Disable on-the-Allow cookies that are stored on your computer.

Strengthen the content of e-mail with e-mail using the web-based such as Yahoo and GMX. Besides, use encryption program news, so that guaranteed that only the recipient can open and read it. Program standards for the encryption is Pretty Good Privacy (PGP). This program can be obtained at the International PGP freeware (www.pgpi.org).

Use a firewall program to protect the computer from a variety of infiltration such as trojan horse virus and a variety of harmful programs. Example of a firewall program are: Tiny Personal Firewall (www.tinysoftware.com), Sygate Personal Firewall (http://sygate.com/free/spf_download.htm), Personal Firewall ZoneAlarm (www.zonelabs.com), yvernWorks Firewall (www.wyvernworks.com).

Use anti-virus program with the latest update, and perform regular system scans to detect if there is a trojan horse on computer nest. Visit some of the website to learn about anti-virus information. Example
is a local website which is www.vaksin.com.

When the data stored on the hard disk is data which is very important, you should do backups regularly and use a recovery system that can protect the workstations and servers from virus attacks, cracker or ignorant hands who want to damage the computer operating system. System recovery can be provided by Ontrack Data International Incorporated (www.ontrack.com) or the Norton Utility from Symantec inc.

Do not report the errors that occur when using an online
Windows XP, because of your personal data will also be sent. Turn off the feature with a choice of turning off the bug report = = Send selection and report on critical errors. How: from the control panel select System, select Advanced and click the Bug-Report.

Remove the user account that is clearly not made by Microsoft. Log in to Control Panel | Performance and maintenance | Administrative tools | Computer Managements. Click Local user groups and then click Users. Delete user account? Support_388945a0?. For users of Windows XP Home Edition does not need to do this.

Turn off the feature in Internet Explorer that promises a quick search in the folder? Tolls | Show related links?. In this folder is hidden from the tool company Alexa Internet (www.alexa.com). This program will store and analyze each site you visit. The data collected is: name of the site you visit, the data you enter when completing the online form, the IP address and URL address of our direction, including passwords, browser and operating system you use, and others. To do this turn off feature is: run regedit, open the menu: HKEY_LOCAL_MACHINE | SOFTWARE | MICROSOFT | INTERNET EXPLORER | extention. Delete entry? C95fe080-8f5d-11d2-a20b-00aa003c157a? Now? Show related links? berfungi not and we can use the search engines safely.

Turn off the auto update function with the entrance to the Control Panel | System, select the auto-update and disabled this feature. To find out the latest Windows updates should visit http://windowsupdate.microsoft.com. Remove the check in? Automatically check for Internet Explorer Update?. How in IE go to Tools | Internet Options. Click the button? Advanced, here akan feature is found.


{ 0 komentar... Views All / Send Comment! }