You surely know what a password is. When accessing private data on a protected system, you need a password (sometimes also called passphrase) and most often an username to tell the system your identity.
Most things about passwords have already been said,
but some things can't be repeated to often!
When choosing your password, don't choose something that others could simply guess. Don't use the name of your spouse or cat, or the company name printed on your computer or monitor. While the best thing would be a random string of characters and numbers and even special characters, if you really need something that is easy to remember, take parts of words and combine them into something that you can still speak, but that gives no sense. Attach a few numbers to it to be on the saver side.
Don't write your password down on a sticky attached to your screen, or anywhere on your workspace. If you need to write it down, put the paper with it into your wallet, but never anywhere the computer.
Don't save a file with all your passwords on your computer. If you can't remember them all, write them down. If you really want to save them in a file, encrypt that file.
What is a firewall?
You can think of a firewall as a barrier that checks information (often called traffic) coming from the Internet or a network and then either turns it away or allows it to pass through to your computer, depending on your firewall settings.
How does a firewall work?
For example, if you are exchanging instant messages with someone who wants to send you a file (a photo, for example), the firewall will ask you if you want to unblock the connection and allow the photo to reach your computer. Or, if you want to play a multiplayer network game with friends over the Internet, you can add the game as an exception so that the firewall will allow the game information to reach your computer.
Although you can turn off the firewall for specific Internet and network connections, doing this increases the risk that the security of your computer might be compromised.
What is "Spyware" and "Adware"?
First of all, don't be so gullible.
Question - things that you are told by others in email. Whether it's friends, relatives, strangers or otherwise, many of these Malware/Adware/Spyware troublemaking programs are suggested by someone else, they're just passing it on to you.
Question - websites that prompt or insist that you install a program.
Question - things you have seen on the internet or have suddenly popped-up on your screen before
Take the time to research the consequences before you click it, accept it or install it
How does Spyware and Adware affect every internet user?
Another kind that is detected under the spyware category are tracking cookies. Cookies are used all over the internet in useful and less useful places. Advertisement companies often set cookies whenever your browser loads a banner from them. In that case and if that cookie contains a GUID, the company gets notice about every site you visit that contains their ads.
These malicious components not only invade your PC so they can't be removed, but take up your hard drive space, slow down your PC and cause connectivity problems. Fun, huh?
What is Malware?
Due to the many facets of malicious code or a malicious program, referring to it as malware helps to avoid confusion. For example, a virus that also has Trojan-like capabilities can be called malware.
How to protect against Spyware and Adware?
Virus and Trojan Horses
What is a Virus?
In addition to replication, some computer viruses share another commonality: a damage routine that delivers the virus payload. While payloads may only display messages or images, they can also destroy files, reformat your hard drive, or cause other damage. If the virus does not contain a damage routine, it can cause trouble by consuming storage space and memory, and degrading the overall performance of your computer.
What is a Trojan?
A Trojan is malware that performs unexpected or unauthorized, often malicious, actions. The main difference between a Trojan and a virus is the inability to replicate. Trojans cause damage, unexpected system behavior, and compromise the security of systems, but do not replicate. If it replicates, then it should be classified as a virus.
A Trojan is a program that has gotten onto your machine without your knowledge and contains malicious code, that would for example allows persons using another computer to connect to yours over a network. Typical trojans are open to anyone trying to connect (any person on your local network or even the internet). Special trojans are designed to make you machine accessible just to the person who infected your computer with the trojan.
The access an outsider can gain using a trojan on your machine can be nearly anything. From watching all your behaviour (like a keylogger) to manipulating your computer to basically doing anything you can also do using your keyboard and mouse.
Your computer can get infected with a trojan by multiple ways. A person with physical access to your machine can place it there, but you can also accidentally install it yourself by opening an unknown email attachment that by chance contains a trojan.
According to some definitions, trojans are also programs that sneak into other programs, for example to gain access. As these programs are consciously used by the other, they are not trojans, but are backdoors.
How to protect against viruses and trojan horses?
Educate yourself about viruses and how they are commonly spread. You can unwittingly bring viruses into the network by loading a program from a source such as the Internet, online bulletin board, or e-mail attachments.
Learn the common signs of viruses: unusual messages that appear on
your screen, decreased system performance, missing data, and inability
to access your hard drive. If you notice any of these problems on your
computer, run your virus-detection software immediately to minimize the
chances of losing data.
Be sure to obtain the latest virus signature files for your program when they are available, because new viruses are created every day.
LINKS TO EXPLORE HOAXES AND SECURITY:
United States Computer Emergency Readiness Team :
United States Computer Emergency Readiness Team :
/*********************************************** CREDIT for the Scripts used here goes to: Dynamic Drive CSS Library. Visit http://www.dynamicdrive.com/ for these scripts and 100s more. ***********************************************/