Frugal Village Forums banner

1 - 1 of 1 Posts

Unix Ninja
3,209 Posts
Discussion Starter #1
Simple and easy ways to keep your computer safe and secure on the Internet

It is a fact; the Internet is just not a safe place to connect your computer to. There are worms constantly scanning for vulnerable computers to infect, trojans disguised as helpful programs but actually install malicious ones, spyware that reports your activities back to their makers, and hijackers that take control of your web browser and browsing experience. For those people who have been the victim of one of these mentioned infections, removing them and getting your computer back in your control can be a daunting and frustrating experience. The purpose of this article is to teach you how to setup your computer in such a way that you minimize as much as possible the risks of contracting one of these infections. Each step is very easy to do and regardless of your computer experience you will have no trouble following along. It is also important to note that there is not one step listed below that is more important than the other. They are all equally important to keeping your computer safe and secure.

1. Use an AntiVirus Software - It is very important that your computer has an antivirus software running on your machine. By having an antivirus program running, files and emails will be scanned as you use them, download them, or open them. If a virus is found in one of the items you are about to use, the antivirus program will stop you from being able to run that program and therefore infect yourself.

See this link for a listing of some online/stand-alone antivirus programs:

2. Update your AntiVirus Software - There is no point running an antivirus program if you do not make sure it has all the latest updates available to it. If you do not update the software, it will not know about any new viruses, trojans, worms, etc that have been released into the wild since you installed the program. Then if a new infection appears in your computer, the antivirus program will not know that it is bad, and not alert you when you run it and become infected. Therefore it is imperative that you update your Antivirus software at least once a week (Even more if you wish) so that you are protected from all the latest threats.

3. Occasionally Run Online Virus Scans - Unfortunately not all antivirus programs are created equal. Each program may find infections that other antivirus programs do not and vice-versa. It is therefore recommended that you occasionally run some free online antivirus scanners to make sure that you are not infected with items that your particular antivirus program does not know how to find. Two online scanners that we recommend are:

Every once in a while, maybe once every 2 weeks, run one or both of these scanners to see if they find anything that may have been missed by your locally installed antivirus software.

4. Visit Microsoft's Windows Update Site Frequently - If you are a Windows users you must visit regularly. This site is a Microsoft site that will scan your computer for any patches or updates that are missing from your computer. It will then provide a list of items that it can download and install for you. When visiting the site, if it asks if you would like to install the Windows Update software, allow it to do so and it should only ask you to do this once. When the site is loaded you should then allow it to check for new updates and download any that it finds. If it has you reboot your computer, reboot and when your back at the desktop visit the site again and check for new updates. Repeat this process until there are zero critical updates available. This will ensure your computer has all of the latest security updates available installed on your computer and is secure from any known security holes.

5. Visit the Apple Security Updates Site Frequently - If you are an Apple user then you frequently check the Apple Security Site for any new updates and download them if they are available. Information on finding and downloading the latest updates can be found at the Apple security site that we linked to earlier in this step.

6. Use a Firewall - I can not stress how important it is that you use a Firewall on your computer. Without a firewall your computer is susceptible to being hacked and taken over. You may say "Why do I need a firewall?" I have all the latest updates for my programs and operating system, so nobody should be able to hack into my computer". Unfortunately that reasoning is not valid. Many times hackers discover new security holes in a software or operating system long before the software company does and therefore many people get hacked before a security patch is released. By using a firewall the majority of these security holes will not be accessible as the firewall will block the attempt.

For a tutorial on Firewall's and a listing of some available ones see the link below: Understanding and Using Firewall's

7. Install Ad-Aware - Just as you installed and use an antivirus program, it is essential these days to use a Spyware protection and removal program. Ad-aware is a program that you can use to scan your computer for spyware, dialers, browser hijackers, and other programs that are malicious in nature. This program should be used once a week, remembering to update it before you use it, to scan your computer for malicious programs.

A tutorial on installing & using this product can be found here:

Using Ad-aware to remove Spyware, Malware, & Hijackers from Your Computer


Install Spybot - Search and Destroy - Just as a particular antivirus program does not find the same things as another antivirus programs, spyware removal programs do not always find infections that other spyware removal programs do. Therefore we recommend that you not only run Ad-Aware once a week, but you should run Spybot -Search & Destroy along with it, as always updating it before you scan with it.

A tutorial on installing & using this product can be found here:

Using Spybot - Search & Destroy to remove Spyware , Malware, and Hijackers


Install SpywareBlaster - Many known malicious programs are ActiveX programs that integrate into Internet Explorer. If you use Internet Explorer, then we recommend that you download and install SpywareBlaster. This program will load a huge list of known malicious programs into your computer's configuration and make it so that you can not run these programs on your computer and therefore become infected.

A tutorial on installing & using this product can be found here:

Using SpywareBlaster to protect your computer from Spyware and Malware


Update all these programs regularly - As always if you do not update your programs, your programs will not be able to find the newest infections that may be racing around the Internet. It is therefore important that you upgrade the software and spyware/virus definitions for a particular program so that they are running the most effectively.

11. Switch to another browser, like Firefox, or make your Internet Explorer more secure - Internet Explorer is inherently insecure. With that said your best choice is to switch to another browser like Mozilla Firefox. It's an excellent browser and tends to be much more secure. You can find more info on switching from Internet Explorer to Firefox here

Switching from Internet Explorer to Firefox

If you still decide to continue using Internet Explorer, then at least follow these steps to make it more secure:

1. From within Internet Explorer click on the tools menu and then click on Options.

2. Click once on the Security tab

3. Click once on the Internet icon so it becomes highlighted.

4. Click once on the Custom Level button.

1. Change the Download signed ActiveX controls to Prompt

2. Change the Download unsigned ActiveX controls to Disable

3. Change the Initialize and script ActiveX controls not marked as safe to Disable

4. Change the Installation of desktop items to Prompt

5. Change the Launching programs and files in an IFRAME to Prompt

6. Change the Navigate sub-frames across different domains to Prompt

7. When all these settings have been made, click on the OK button.

8. If it prompts you as to whether or not you want to save the settings, press the Yes button.

5. Next press the Apply button and then the OK to exit the Internet Properties page.

By following all these steps you are sure to keep your computer at minimal risk to future infections or hack attempts. This is unfortunately not a fool proof method of securing your computer as new risks are released almost every day, but your susceptibility to these attacks will be diminished greatly.

Lawrence Abrams
Bleeping Computer Basic Internet Security Tutorial
1 - 1 of 1 Posts