Web and Computer Security
2008-06-25来源:
Well, if that would have been said to me by my father when I was 2 years of age, I would have understood. But when today, my own computer tells me that when I am 34, I wonder why I spent $1500 on my computer hardware and software just to enjoy the (un-realized) benefits of this great and revolutionary information technology?Today’s cyberspace is hazardous. None of today’s PC users can claim that they never had a computer virus issue or a PC security breach. Now, if you count today’s number of PC users worldwide, they will soon be 1 billion by 2010 according to analysts. When I see all the computer viruses, infections, trojans, and what not around me, and compare it with the 1 billion innocent computer users around the world, I simply feel sorry not only for those billion users but for myself too. But again, as a common user myself, I must admit it was not all doomsday for the whole industry since 1987 when I started to use computers. So, as a responsible member of this great IT revolution, I must share some of the best tips and tricks that I learned to use to make the minimum room for productivity on my computer.Please note this is a tutorial for someone who has basic know-how of computer usage. For those who are newbies, I would recommend asking a local expert’s help before trying anything out mentioned in this tutorial. In that case, make room for payment from deep pocket. For your own convenience, print this tutorial for step-by-step instructions.Whenever my computer is infected, I act on any of the following options;1. FORMAT HARD DISK: I back up all of my data on a CD-Writer if it is still accessible. And then format the whole hard disk drive and re-install each and every application.2. USE SOFTWARE: I exhaust all anti-virus and other software options. This is usually my first priority as compared to formatting the whole computer hard disk drives.Now, let me explain both options in detail;PRE-REQUISITES: Make sure you have a CD-Drive (Writer), empty writable CDs, Windows OS CD (bootable) that contains files such as Format.exe, Scandisk.exe, FDisk.exe, and Attrib.exe files. Microsoft Office CD, Anti-Virus CD, GoldenHawk CD writing software in DOS (copy2cd.exe and cdtools.exe), Serial Numbers of your License, Driver CDs of Motherboard, VGA, network, Sound and Modem devices. Optionally, download (using www.download.com or www.tucows.com) these software from any Internet Caf when your own computer is inaccessible and save it on a CD so that you can use it anytime for security purposes;Golden Hawk DOS based CD writing softwareHTech Fireman Windows based CD writing softwareDriver Genius ProPartition MagicAVG AntiVirusSpywareBlaster & SpywareGuardSpybot Search & DestroyAd-AwareIE-SpyAdZoneAlarmHiJackThis & CWShredderI have intentionally avoided mention of many commercially good and more friendly software’s mention here as I wanted everything to do FREE without any additional costs apart from the usual OS licenses. For your own convenience, you can research Google or Yahoo search engines find further information about such commercial software and their
相关文章
- Website Security - Creating a Bulletproof Site in 5 Easy Steps
- How Free Scripts Can Create Security Problems
- Secure Your PC From Hackers, Viruses, and Trojans
- Computer Viruses, Worms, and Hoaxes
- 8 Surefire Ways to Spot an EBAY Scam E-Mail and Protect Yourself from Identity Theft
- Viruses, Trojans, and Spyware - Oh My!
- Web Conferencing Readers - So What Do We Do with the PAYPAL SPAMMER
- Viruses and Worms: The Problems and Their Solutions
- Phishing - Its Signs and Your Options
- The 5 Critical Steps to Protecting Your Computer on the Internet