虽然计算机使我们的工作更轻松,但它们可以告诉其他人很多关于它的用户的信息。他们可能包括同事、共享计算机的朋友,甚至黑客。无论(Whether)是在线还是离线,计算机都可以将信息泄露给他人。本文旨在为所有人提供一些安全的计算技巧——尤其是老年人和刚接触计算的人群。
安全计算提示
1 使用有效的防病毒软件
如果您的Windows(Windows)计算机上没有良好的防病毒软件或Internet 安全套件(Internet Security Suite),则很容易被感染,尤其是当您访问Internet时。为了安全起见,请使用能够防御恶意代码的防病毒软件。周围有很多防病毒软件。其中有些是免费的,有些是付费的。无论您选择什么,请确保它正常工作。
防病毒软件不仅应提供针对病毒的保护,还应提供针对其他形式的恶意软件(如广告软件、间谍软件等)的保护。
大多数防病毒程序(antivirus programs)声称可以提供全方位的保护。但请记住,对于Internet(Internet),没有什么叫做 100% 保护。这就是为什么您还需要第二道防线。除了实时防病毒软件外,请继续运行您的反恶意软件的计划扫描,并偶尔使用在线防病毒扫描程序(online antivirus scanners)或第二意见扫描程序。(second-opinion scanner)
2.使用好的防火墙
除了防病毒软件可以保护您的计算机免受病毒侵害之外,您还需要保护自己免受黑客攻击。为此,您必须使用适当的防火墙。防火墙是使您的计算机从Internet上消失的硬件或软件。这就像在保护您的计算机的无形墙后面工作。
如果您使用的是Windows 7或 8,操作系统中的防火墙就足够了。请阅读我们关于如何在 Windows 中配置 Windows 防火墙的(how to configure the Windows Firewall in Windows)文章。如果需要,可以使用第三方防火墙。不是每个人都对Windows(Windows)内置防火墙感到满意。Internet上有免费和付费的防火墙。查看我们在 Windows Club 上的最佳免费防火墙列表。(list of best free firewalls)
如果您使用普通路由器,我建议您也打开路由器内部的防火墙。几乎(Almost)所有路由器都带有硬件或固件防火墙。您可以通过登录路由器的配置页面来打开它。大多数路由器的登录页面地址是192.168.1.1。在进行更改之前,您可能需要备份现有设置,以防您还想更改其他设置,例如DNS等。
一个好的DNS将保护您免受恶意网站的侵害。有许多DNS既快速又提供保护。您可以使用Comodo DNS或您喜欢的任何其他 DNS。
3.定期清理历史
浏览器可能会泄露有关您正在访问的网站的信息,并且可能对您的隐私构成严重威胁。为防止被发现或避免其他人知道您在浏览器或Internet上所做的事情,请记住在完成浏览后清除历史记录。在您使用的每个浏览器中,都有清除历史记录、缓存和 cookie 的选项。某些浏览器(例如TOR等)不会在本地存储任何信息。如果您非常重视您的隐私,您可以使用它们。像 TOR(Browsers like TOR )这样的浏览器甚至不会让网站猜测你的位置。
或者,您可以使用第三方计算机垃圾清理器(third-party computer junk cleaner)来清除历史记录、cookie、缓存、临时文件和注册表。使用第三方清理程序可以确保从您使用的机器上的所有浏览器中删除历史记录。
4.保持Windows操作系统和安装的软件更新
操作系统应始终与补丁和更新保持同步,以使其受到完全保护。Windows开发人员会不时发现问题,并在每个月的第二个星期二(Tuesday)发布补丁。您应该安装这些更新。为确保您不会错过更新,最好打开 Windows 更新(Turn on Windows Updates)并选择自动更新选项。您可以使用Windows(Windows)操作系统控制面板(Control Panel)中的Windows 更新(Updates)选项设置这些属性。还有几个第三方软件更新检查器(software update checker )持续检查计算机上安装的软件的更新版本的可用程序。
5. 浏览时保持安全
为了在浏览时保持安全,最好使用虚拟专用网络(Virtual Private Network)。这会在您的计算机和您可以浏览Internet(Internet)的 VPN 中心点之间创建一个加密隧道。有免费和付费VPN(VPNs)。例如,您可以使用Spotflux。有许多可用的VPN(VPNs)。查看互联网(Internet)上一些最好的免费 VPN 软件。了解如何在浏览时保持在线安全和保护个人信息。
6.不要陷入网络钓鱼尝试
始终知道您在使用计算机时在做什么。有很多人想利用您或您的信息谋取个人利益。他们将尝试通过电子邮件、网站上的表格和其他通信方式与您联系。他们会询问您的信息以代替有利可图的东西。不要上当受骗。如果您收到一封电子邮件说您中了彩票,并且您知道自己没有购买任何彩票,那么最好忽略此类电子邮件。网络钓鱼电子邮件和攻击是窃取后来用于身份盗用的信息的主要来源。了解如何识别网络钓鱼(how to identify phishing)。
7.了解社会工程学
有时,冒充朋友的人会试图从您那里获取信息——关于您或您的组织。如果有人对你不应该分享的信息变得过于友好和感兴趣,请当心。这可能是一种社会工程攻击(social engineering attack)。人们与您交朋友是为了获取他们出售给他人或自己使用的信息。在大多数情况下,他们感兴趣的是组织信息。他们可能会要求您帮忙查看数据库并向他们提供信息。他们可能在社交网络上,甚至可能是面对面的。远离这样的人。
8.不使用时锁定计算机
培养的最佳安全计算习惯之一是在您不在电脑旁时使用密码锁定电脑屏幕。几乎不需要片刻。您只需按WinKey+L即可锁定计算机。这可以防止其他人在您不在时窥探您的计算机。
9.点击缩短链接时要注意
社交(Social)网站推广了短链接。这些短链接通常并不安全。如果有人在没有任何上下文的情况下向您发送链接,或者该链接是由不受信任的来源发送的,请不要单击它。您也可以在点击链接之前使用第三方服务来了解链接指向的位置。wheredoesthislinkgo.com就是这样一种短 URL 扩展器(Short URL Expander)服务。
10. 安全使用社交网站
社交(Social)网站很有趣……也很冒险。尽管它们旨在共享信息,但仅在必要时共享。过度分享会导致入室盗窃、身份盗用、负面促销等。在这些网站上玩得开心时,请保持头脑清醒。使用(Use)体面的语言。情绪激动时尽量避免使用社交网站,这样您就不会发布任何可能让您以后后悔的东西。请记住,当人们需要有关您的信息时,他们会在社交网站上查找您。所以你应该小心你如何在那里投射自己。
现在阅读:(Now read:) 5 个健康问题,每 40 位以上的计算机用户都应该知道(5 health issues, every over 40 computer users should be aware of)。
Safe Computing Tips, Practices and Habits for Windows users
While computers make our work easier, they can tell others a lot about its users. Thеy could include colleagues, frіends who share the computer, and even hackers. Whethеr online or offline, computers can give аway informatiоn to others. This article intends to offer sоme safe compυting tips for all – especially the sеniors and the new-to-computing crowd.
Safe Computing Tips
1 Use an effective antivirus
It is very easy to get infected if you do not have a good antivirus or an Internet Security Suite on your Windows computer, especially if you visit the Internet. To stay safe, use an antivirus that provides you protection against malicious code. There are many antiviruses around. Some of them are free and some are paid. Whatever you choose, make sure it works properly.
An antivirus should offer protection not only against the virus but also from other forms of malware such as adware, spyware, etc.
Most antivirus programs claim to provide all-around protection. But remember that there is nothing called 100% protection when it comes to the Internet. That is why you need a second line of defense as well. In addition to a real-time antivirus, keep running scheduled scans of your anti-malware, and use online antivirus scanners or a second-opinion scanner occasionally.
2. Use a good Firewall
As well as an antivirus protects your computer from viruses, you need protection from hackers. You have to use a proper firewall for this purpose. A firewall is hardware or software that makes your computer disappear from the Internet. It would be like working from behind an invisible wall that secures your computer.
If you are using Windows 7 or 8, the firewall in the operating system is good enough. Please read our article on how to configure the Windows Firewall in Windows. If you want, you can use a third-party firewall. Not everyone is comfortable with Windows built-in firewall. There are both free and paid firewalls available on the Internet. Check out our list of best free firewalls on The Windows Club.
If you use a normal router, I would recommend you to turn on the firewall inside the router also. Almost all routers come with a hardware or firmware firewall. You can turn it on by logging into the configuration page of the router. The address of the login page of most routers is 192.168.1.1. Before making changes, you may want to back up existing settings in case you wish to change other settings too, such as DNS, etc.
A good DNS will protect you against malicious websites. There are many DNS that are both fast and provide protection as well. You can use Comodo DNS or any other DNS that you prefer.
3. Clean History Regularly
A browser can give away information about what sites you are visiting and can be a serious threat to your privacy. To prevent getting caught or to avoid others from knowing what you were doing on the browser or the Internet, remember to clean history after you are done with the browsing. There are options to clean history, cache, and cookies in every browser you use. Some browsers like TOR etc do not store any information locally. You can use them if you are very serious about your privacy. Browsers like TOR would not let even the websites guess where you are located.
Alternatively, you can use a third-party computer junk cleaner to clear the history, cookies, cache, temporary files, and registry. Using a third-party cleaner would ensure that history is erased from all browsers you have on the machine you used.
4. Keep Windows operating system & installed software updated
An operating system should always be up to date with patches and updates so that it is completely protected. Developers of Windows identify issues from time to time and issue patches every second Tuesday of the month. You should install those updates. To make sure you do not miss out on updates, it is better to Turn on Windows Updates and choose the option to update automatically. You can set these properties using the Windows Updates option in Control Panel in Windows operating system. There are also several third-party software update checker programs available that keep on checking for updated versions of the software installed on your computer.
5. Stay safe while browsing
To stay safe while browsing, it is always better to use a Virtual Private Network. This creates an encrypted tunnel between your computer and the VPN’s central point from where you get to browse the Internet. There are both free and paid VPNs. You can use Spotflux, for example. There are many VPNs available. Check out some of the best free VPN software available on the Internet. Learn how to Stay Safe Online & protect personal information while browsing.
6. Do not fall for Phishing attempts
Always know what you are doing when on the computer. There are many out there who want to use you or your information for personal gains. They will try to contact you via emails, forms on websites, and other modes of communication. They will ask you for your information in lieu of something lucrative. Do not fall for scams. If you get an email saying you won a lottery, and you know that you do not buy any lottery, it is better to ignore such emails. Phishing emails and attacks are the main sources for stealing information that is later used for identity theft. Learn how to identify phishing.
7. Know about Social Engineering
Sometimes people posing as friends try to fish out information from you – regarding you or about your organization. If someone is becoming too friendly and interested in information you shouldn’t share, beware. It could be a social engineering attack. People befriend you to obtain information that they sell to others or use themselves. In most cases, it is organizational information that they are interested in. They may ask you favors to look into databases and provide them with information. They may be on social networks or even in person. Stay away from such people.
8. Lock the computer when not using it
One of the best safe computing habits to cultivate is to lock the screen of the computer with a password when you are not at it. It hardly takes a moment. You just have to press WinKey+L to lock the computer. This prevents others from snooping into your computers when you are not around.
9. Be aware while clicking on shortened links
Social sites have promoted short links. These short links are not often safe. If anyone sends you a link without any context or if the link is sent by untrusted sources, do not click on it. You may also use third-party services to know where a link leads to – before you click it. One such Short URL Expander service is wheredoesthislinkgo.com.
10. Use Social sites safely
Social sites are fun… and risky. Though they are meant to share information, share only as much as is necessary. Oversharing can lead to burglary, identity thefts, negative promotions, etc. Keep your mind in control while having fun on such sites. Use decent language. Try to avoid social sites when emotional so that you do not post anything that may make you regret it later. Remember that people look up for you on social sites when they need information about you. So you should be careful about how you project yourself there.
Now read: 5 health issues, every over 40 computer users should be aware of.