AuthorsDen.com  Join (free) | Login 

     Popular! Books, Stories, Articles, Poetry
   Services MarketPlace (Free to post!)
Where Authors and Readers come together!

Signed Bookstore | Authors | eBooks | Books | Stories | Articles | Poetry | Blogs | News | Events | Reviews | Videos | Success | Gold Members | Testimonials

Featured Authors: Jeff Alt, iJoan Hovey, iG. Roscoe, iLaurie Conrad, iMaryAngela Nangini, iWilliam Guy, iRichard Sharp, i
  Home > Internet > Articles
Popular: Books, Stories, Articles, Poetry     

Dan Ronco

· Become a Fan
  Notify me of new titles
  added by this author.

· 43 titles
· 9 Reviews
· Share with Friends!
· Save to My Library
·
Member Since: Nov, 2007

   Sitemap
   Contact Author
   Message Board
   Read Reviews

Books
· 2031: The Singularity Pogrom

· PeaceMaker: A Thriller

· Unholy Domain


Short Stories
· A View of United States Energy Supplies in 2028

· Softrware Keeps Getting Smarter

· The Unique Structure of my Novels

· Dan Ronco Interviewed on Fascinating Authors

· Listen to Dan introduce Unholy Domain

· Listen to Dan Read from PeaceMaker


Articles
· My Favorite Television Sci-Fi Characters

· On Science Fiction Characters

· Looking for a New Member to Join our Writing Group

· Where does the Darkness come from?

· Protect Your PC: Part Two

· Will Humanity Survive the Singularity?

· Where Will the Engineers Come From?

· Will YouLive to be 100?

· Lifeblogging

· What Makes A Great Thriller?


News
· Midwest Book Review: 2031: The Singularity Pogrom

· Material Witness: a story that develops at breakneck speed and is cinemati

· Win a Free Copy of Unholy Domain

· Book Chase: Unholy Domain is a rollercoaster ride

· Soulless Machine Review: UD is an Action Packed Coming of Age Story

· NothingBinding.com: Unholy Domain almost screams Look around you!

· J. Kaye's Book Blog: Unholy Domain is a real page turner.

Dan Ronco, click here to update your web pages on AuthorsDen.

Protect Your PC
By Dan Ronco
Last edited: Saturday, April 19, 2008
Posted: Saturday, April 19, 2008



Share    Print   Save  Become a Fan
Recent articles by
Dan Ronco

• Where Will the Engineers Come From?
• Superhumans: The Next Step?
• Long Term Friendships
• Looking for a New Member to Join our Writing Group
• The Future is not Star Trek
• Will Humanity Survive the Singularity?
• My Favorite Television Sci-Fi Characters
           >> View all 34
You can go a long way in protecting your PC with just a few easy steps.

 

 
 
 
While it’s a great tool, using the Internet carries a certain amount of risk. We read about virus and worms destroying information, we’re annoyed by those pesky ads that keep popping up on our display, and we see TV shows about identity theft. It’s easy to become worried. Heck, I’m guilty of scaring people,too; my first novel, PeaceMaker, is about an intelligent virus that shuts down the Internet.
While the risks are real, there are a number of steps to mitigate the problems. And you don’t have to be a techie, either. This article contains common-sense suggestions that the average home computer user can employ.
Identity theft, a growing problem, usually results in the loss of social security numbers, bank or investment account information, or passwords. A typical scam is an email that states that there is a problem with your account and asks you to log into a fake website that looks just like the official one. You are asked to update your information, and the scammer captures all the data as you enter it.
The common sense solution is to never click on an email into a sensitive account. Always go directly (or through your favorites list) to the real website.
As we all know, the Internet is riddled with viruses and worms. A virus is a program that attaches itself to another program, usually riding email from one computer to another. The virus is activated when the email is opened, and it may consume your computer resources, destroy important information, attach a copy of itself to every email you send, or carry on any number of unpleasant activities. A worm might be as dangerous as a virus, and it can spread all by itself.
The best defense is a comprehensive anti-virus software product provided by firms such as Norton or McAfee. These AV products check every email message entering or leaving your computer and search for every known virus or worm. When it finds software that matches the signature of a known virus or worm, it isolates the virus or worm and warns the user. The usual course of action is to erase the offending software.
Although you should keep your virus definitions up to date(automatic updates should be utilized), a brand new virus could sneak past the AV product and infect your computer. Although the AV product received the virus definition too late to prevent the infection, it might catch it later. The AV product checks every file as it’s accessed, so there is a good chance it will detect the virus that infected your system. A weekly scan of your entire file system is a good idea, just to be extra careful.
Spyware is another pesky problem. Ever wonder where those annoying popup ads come from? It’s adware, a form of spyware, which is tracking software installed on your computer with little or no notification, consent or control. Spyware monitors your activities and may displays ads based upon the websites you’ve visited. Furthermore, it may keep track of all your activities and then report the results to some other party across the net.
Spyware is designed to be difficult to remove. Often, these programs are impossible to delete through the Windows Add/Remove function. Many AV products now incorporate anti-spyware functionality. In addition, it’s not a bad idea to install a dedicated anti-spyware program to back up the AV software. Anti-spyware products may prevent spyware from installing, and  they warn the user of installed spyware. As before, a weekly scan of your files is a good practice.
Microsoft’s Internet Explorer is by far the most frequently used browser. As a result, most virus and spyware writers focus the bulk of their efforts on IE. As a result, third party browsers, such as Firefox, are not vulnerable to all the viruses that infect IE. If you are having a bad time with infections, consider moving to another browser.
Finally, set up a firewall on your computer. A firewall regulates the inbound and outbound connections between your PC and the Internet. It prevents unknown outside computers from connecting to your PC. Hackers and automated software are constantly searching for unprotected computers, but a firewall should prevent them from breaking in. Windows includes a firewall, as do many of the comprehensive AV products. Firewalls are not foolproof, but they add another line of defense.
This article is not a comprehensive description of ways to protect your PC, but it’s a good starting point. A good AV package, including anti-spyware and a firewall, properly used is a great tool. Combined with common sense, you will dramatically reduce the risk to your PC.
 

Web Site Outside the Box
f

Want to review or comment on this article?
Click here to login!


Need a FREE Reader Membership?
Click here for your Membership!



Books by
Dan Ronco



Unholy Domain

Buy Options
Signed copy!
Amazon, more..




PeaceMaker: A Thriller

Buy Options
Signed copy!
Amazon, more..




2031: The Singularity Pogrom

Buy Options
Signed copy!
Amazon, more..


Popular
Internet Articles
  1. Social What? Followers, Fans and Friends
  2. Is The Internet Good or Bad
  3. Why are our children and teenagers not pro
  4. Fall 2014 Update: Texts, Meanings, and Gue
  5. AuthorsDen on Facebook
  6. Something is 'not quite right'
  7. Urgent News For Authors
  8. Free Listing on New Book Promotion SIte
  9. Get 200k right now! If you find a better d
  10. Harpies and Magpies on the Internet
  11. The Helium.com Interview
  12. Interview with author Louise Aveni on E.T.

You can also search authors by alphabetical listing: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z



Featured Authors | New to AuthorsDen? | Add AuthorsDen to your Site
Share AD with your friends | Need Help? | About us


Problem with this page?   Report it to AuthorsDen

AuthorsDen, Inc. All rights reserved.