Home About us Advertise Directory Contact Infotek3000

 

# A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

Bookmark and Share

Hacker Proofing Article
100% Hacker Proof means turning off your computer or disconnecting it from the Internet. That's no good if you want to use your computer!

 

Discussion

Hacker Proofing ImageHow do we make our computer 99% hacker proof?
A computer connected to Broadband Internet (cable, DSL) is like saying "please... take me for a ride". A broadband Internet connection is easier to hack into because it is connected 24hrs and will usually use a static IP address (the same address always). This means that once a hacker finds your computer, it is easier to find it again.

  1. Most 56k dial-up Internet connections use a new IP address (Dynamic IP) each time you connect. This makes it harder to find your computer again unless a Trojan horse has gotton into your system. It can phone its owner each time you connect. Security and privacy software provides some protection because most "attacks" are impersonal and are not targeting you or your computer.
  2. They are often simply targetting those who are connected to the Net. If you make it difficult for them to find your PC and gain entr to it, they will most try somewhere else. If a hard-core hacker decides to attack your computer, you can make it difficult for him or her but if theyre good, they will likely find a way in.
  3. Large organizations employ computer security staff and consultants to protect their computer networks. Most people need not be too concerned about hackers, however, Telecommuters are a often working from home but are usually connected to their employers network. This makes you a special risk and you should contact your computer security staff for advice. It has been alledged that Microsoft was reportedly hacked through a telecommuter's home computer.
Hacker Proofing Software
To find out from direct experience why you need a personal firewall, we suggest that you try one. After a few days, use the report function to see how many times your computer has been scanned. Please note that many scans are not dangerous, for example, your cable/dsl Internet service provider may be checking to see that your connection is ok. Check a vendor's website for updates after you install your firewall. The last step is to test the firewall to see how well it works and to make sure that you installed and configured it correctly.

Some Easy Steps
The Internet offers no magic bullet. It takes a variety of actions and tools to use the Internet safely. Try starting with the easy steps.

  1. Keep Windows, your browser and email software up to date and check weekly for security patches.
  2. Use the built-in security features of Windows, your browser and email software. Consider using alternatives to Microsoft products like Opera and Eudora.
  3. Have your ISP scan your email for viruses and junk mail (spam). If you have another email service, check its features too. If your service providers do not offer anti-virus and/or spam filtering services, consider those that do.
  4. Use strong passwords. If you have a lot of passwords, consider password manager software.
  5. Back up your data files on a regular basis.
  6. Install Personal Firewall software. If you are connecting two or more computers to the Internet, you should also use a Hardware Router with firewall features.
  7. Use Anti-Virus and Anti-Trojan software. Update the definitions at least once a week.
  8. Use additional security and Privacy software to block email virus scripts, remove spyware, manage cookies, detect web bugs, filter content, encrypt outgoing email, remove scumware, clean temporary browser files, block outgoing private information, block incoming spam, and block ads (banner, pop-up & pop-under).

Checklist

  1. TEST your security online with sites like Shields Up, Hackerwhacker and Security Space.
  2. TIGHTEN up Windows by installing security patches.
  3. Checkout Internet security FREEWARE.
  4. Checkout Links to REVIEWS of personal firewall software products for Windows such as: BlackICE, CheckIT, ConSeal PC Firewall, Deerfield, eSafe Desktop, eTrust EZ Firewall, Firekeys, Freedom, GuardWall. HackTracer, Internet Firewall 2000, Kerio, Look'n'Stop, McAfee, Mindsoft, NeoWatch, Norman, Norton, Outpost, pcInternet Patrol, PC Viper, Preventon, Privacyware, SecureUp, Sphinx, Sygate, TermiNet, TGB::BOB, Tiny, VirusMD, VisNetic & ZoneAlarm.
  5. Checkout Links to reviews of hardware ROUTERS and WIRELESS routers with networking, Internet connection sharing, and NAT or SPI firewall features: 2Wire, Asante, D-Link, Hawking, Linksys, Macsense, MaxGate, MultiTech, NetGear, Nexland, Siemens, SMC, SnapGear, SofaWare, SonicWall, WatchGuard & Zyxel.