Hey, guys! I just got bored and decided to make this guide about how to protect your computer and your privacy from threats. Feel free to make this a Sticky if you want to, Moderators and Administrators *wink, wink*.
The first thing we need to get out of the way is that nothing is ever completely or truly secure. People might give clever definitions of something that could be completely secure, but it is a utopia—something that can be imagined but never achieved. There is always a way around or through any security precaution that we construct. When you are online, you are vulnerable to threats that could potentially ruin your life. Some people don't take viruses/malware too seriously, and most of them (if not, all of them) end up having to waste their time trying to remove threats after an infection, or getting a new bank account and/or having to save up money again. A well coded virus could potentially cause great destruction upon your system. Additionally. there's a possibility that all of your personal information can be stolen by hackers without them putting any effort into doing so. Nobody wants that, neither do the hackers themselves.
So hopefully, this guide can help you prevent malware and hackers from laying a finger on both your privacy and your beloved computer <3
The Basics of Information Security
Information security is the act of protecting data and information systems from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction. Let's talk about several basic types of threats you need to be aware of to be an effective security administrator:
Malicious software: Known as malware, this includes computer viruses, worms, Trojan horses, spyware, rootkits, adware, and other types of unwanted software. Everyone has heard of a scenario in which a user's computer was compromised to some extent due to malicious software.
Unauthorized access: Access to computer resources and data without consent of the owner. It might include approaching the system, trespassing, communicating, storing and retrieving data, intercepting data, or any other methods that would interfere with a computers normal work. Access to data must be controlled to ensure privacy. Improper administrative access falls into this category as well.
System failure: Computer crashes or individual application failure. This can happen due to several reasons, including user error, malicious activity, or hardware failure.
Social engineering: The act of manipulating users into revealing confidential information or performing other actions detrimental to the user. Almost everyone gets e-mails nowadays from unknown entities making false claims or asking for personal information (or money!); this is one example of social engineering. Many information security technologies and concepts can protect against, or help recover from, the preceding threats. It all starts with planning, which is effectively free.
Now, let's move on with some tips and tasks that can help you protect your computer and privacy.
1. Install a good anti-virus program, and also a partner for it
This is an automatic and logical action - even my grandmother knows that. If you don't have one, I'm telling you: you need one. Oh, also update the virus database and program when available.
Here are some good anti-viruses and anti-malware companies:
Antivirus:
I need not to say this, but I've seen people acting as though they can take on all the millions and billions of viruses out there that could just invade their system with no problems. If you are one of these people, someone may be watching you reading this guide.
3. Turn on your firewall
Okay, all of the first three are logical and automatic. An enabled firewall blocks viruses and hackers from attacking your system. Sounds promising, right?
4. Do not click suspicious, shortened links
Does the link look like this?
If so, do not click them.
A simple click of any kind of these links could possibly redirect you to a website that installs a malware in stealth. Meaning you won't know that it's installing Trojans or a keylogger in your computer.
5. Do not click a link or download an attachment from an unknown source in your email
OMG, an executable file that extracts Call of Duty: Ghosts in my PC! Better download it since it's free. Oh, great! Free PS4s?! All I need to do is to go to this link and provide information about where I live and bank details, and they'll deliver a PS4?!?! Sounds great!
No, actually, it sounds suspicious, doesn't it? Common sense suggests that you shouldn't provide any personal information to unknown websites, never click suspicious links, and never download anything from unknown sources. Don't get tricked, I know this may be obvious for all of you, but I call this spam and scam.
6. Be careful of double extension files.
Be wary of files with a double extension such as ".txt.vb" or ".jpg.exe". As a default setting, Windows often hides common file extensions, meaning that a program like Paint.exe will appear to you as simply Paint. Double extensions exploit this by hiding the second, dangerous extension and reassuring you with the first, safe extension – which is utterly meaningless to your computer; your system only recognizes the extension to the extreme right and run the file as such. If a common file type whose extension you never normally see suddenly becomes visible for no apparent reason, right-click on it, select Properties, and look for the complete file name. You may be surprised to find out what kind of extension it really has.
To make you file extensions visible, find Folder Options in your Control Panel. (Note that it may be tucked away in Appearance and Personalization or something to that effect.) Under the View tab, scroll down to Hide Extensions for Known File Types and make sure it is unselected.
(Source:
7. Block Advertisements and Pop-Ups using programs
Advertisements are annoying, right? Did you know that you can block them? You should, since you're on the Internet everyday for 8 hours. Oh, and turn on the "Block Pop-Ups" setting in your web browser, even Internet Explorer has that setting.
[video=youtube;pVYtzF5SemU]https://www.youtube.com/watch?v=pVYtzF5SemU[/video]
Use AdBlock to block advertisements and pop-ups:
What's the point of having an anti-virus, but not scanning your computer with it? Who knows? Maybe you already have an infected file in your computer right before you installed your anti-virus/anti-malware software. Scan it periodically, this is an important part of protecting both your system and your privacy.
9. Install Windows Updates
As much as I hate saying this, since I'm annoyed with Windows Updates myself - you have to install them. These updates fix minor problems in your computer and also updates Windows' virus database (for Windows Defender and Firewall). I find the fact that my computer turns off itself while I'm working on a school project annoying. Luckily, you can turn off the automatic updates and just toggle through installing them later when you turn off your computer. So that's useful.
10. Google or scan a suspicious file on your Desktop
What? You don't remember having that file on your Desktop? You don't know what it is? Well, it's either you scan it with your anti-virus or you Google it, or you can do both. Suspicious files stand out too much for you not to take action, so be aware.
11. Be wary when using P2P programs
Peer-to-peer (P2P) networking has become a launching pad for viruses. Attackers incorporate spyware, viruses, Trojan horses, and worms into their free downloads. One of the most dangerous features of many P2P programs is the “browse host” feature that allows others to directly connect to your computer and browse through file shares.
P2P can accidentally give access to logins, user IDs and passwords; Quicken files and credit reports; personal information such as letters, chat logs, cookies, and emails; and medical records you accidentally house in accessible folders on your PC. As with email and instant messages, viruses in P2P files are capable of weaving their way through as many users as they can, stealing information and delivering it to cyber criminals who forge identities and commit fraud.
(Source:
12. Use a VPN (Virtual Private Network) if you want to and if you can afford to
If you're really concerned about your privacy so much (plus, if you have lots of money), then it shouldn't hurt to subscribe for a great VPN provider. Oh, and did I tell you that you can prevent yourself from being DDoSed by a random by using a VPN?
Here are some information about VPNs:
Even if you follow these steps that I have provided you so far, rare, hardcore no life hackers could potentially still access your system. It's always good to buy an external hard-drive to back up your data with. You can also buy cloud storage online or use free ones for backup. Or... you can use your USB. All depends on how much "important" (varies to people) files/information you have.
14. Seek help if you need it
Think of yourself as a player of League of Legends or DotA, and think of the smaller viruses as the creeps/minions, and the most dangerous ones as the enemy champions/characters. Think of the fed/fat teammates as the better and more experienced ones. You can't "solo" all of the enemies, you need help from your teammates, right?
The same goes for computers. If you need help, you need help. Don't go against that fact, because it could end up as a tragedy for you.
You can get help from various websites, but the trend right now is to use a famous tech forums such as:
The most important part of all is that you should be aware of what is happening in your computer.
Research and learn about important things that are happening in your computer. Open Task Manager (Ctrl + Shift + Esc or Ctrl + Alt + Delete) and see if there are suspicious running files on the background.
Here are some common symptoms of viruses to pay attention to:
Virus
Follow these steps and you shall protect yourself from various threats!!
Hopefully this was helpful for some of you, though most of you may know these already, so don't bash me for that.
This took me hours to organize and make, so tell me how you guys think about it xd
The first thing we need to get out of the way is that nothing is ever completely or truly secure. People might give clever definitions of something that could be completely secure, but it is a utopia—something that can be imagined but never achieved. There is always a way around or through any security precaution that we construct. When you are online, you are vulnerable to threats that could potentially ruin your life. Some people don't take viruses/malware too seriously, and most of them (if not, all of them) end up having to waste their time trying to remove threats after an infection, or getting a new bank account and/or having to save up money again. A well coded virus could potentially cause great destruction upon your system. Additionally. there's a possibility that all of your personal information can be stolen by hackers without them putting any effort into doing so. Nobody wants that, neither do the hackers themselves.
So hopefully, this guide can help you prevent malware and hackers from laying a finger on both your privacy and your beloved computer <3
The Basics of Information Security
Information security is the act of protecting data and information systems from unauthorized access, unlawful modification and disruption, disclosure, corruption, and destruction. Let's talk about several basic types of threats you need to be aware of to be an effective security administrator:
Malicious software: Known as malware, this includes computer viruses, worms, Trojan horses, spyware, rootkits, adware, and other types of unwanted software. Everyone has heard of a scenario in which a user's computer was compromised to some extent due to malicious software.
Unauthorized access: Access to computer resources and data without consent of the owner. It might include approaching the system, trespassing, communicating, storing and retrieving data, intercepting data, or any other methods that would interfere with a computers normal work. Access to data must be controlled to ensure privacy. Improper administrative access falls into this category as well.
System failure: Computer crashes or individual application failure. This can happen due to several reasons, including user error, malicious activity, or hardware failure.
Social engineering: The act of manipulating users into revealing confidential information or performing other actions detrimental to the user. Almost everyone gets e-mails nowadays from unknown entities making false claims or asking for personal information (or money!); this is one example of social engineering. Many information security technologies and concepts can protect against, or help recover from, the preceding threats. It all starts with planning, which is effectively free.
Now, let's move on with some tips and tasks that can help you protect your computer and privacy.
1. Install a good anti-virus program, and also a partner for it
This is an automatic and logical action - even my grandmother knows that. If you don't have one, I'm telling you: you need one. Oh, also update the virus database and program when available.
Here are some good anti-viruses and anti-malware companies:
Antivirus:
-
You must be registered for see links
-
You must be registered for see links
-
You must be registered for see links
-
You must be registered for see links
-
You must be registered for see links
-
You must be registered for see links
-
You must be registered for see links
-
You must be registered for see links
-
You must be registered for see links
-
You must be registered for see links
I need not to say this, but I've seen people acting as though they can take on all the millions and billions of viruses out there that could just invade their system with no problems. If you are one of these people, someone may be watching you reading this guide.
3. Turn on your firewall
Okay, all of the first three are logical and automatic. An enabled firewall blocks viruses and hackers from attacking your system. Sounds promising, right?
4. Do not click suspicious, shortened links
Does the link look like this?
You must be registered for see links
You must be registered for see links
You must be registered for see links
If so, do not click them.
A simple click of any kind of these links could possibly redirect you to a website that installs a malware in stealth. Meaning you won't know that it's installing Trojans or a keylogger in your computer.
5. Do not click a link or download an attachment from an unknown source in your email
OMG, an executable file that extracts Call of Duty: Ghosts in my PC! Better download it since it's free. Oh, great! Free PS4s?! All I need to do is to go to this link and provide information about where I live and bank details, and they'll deliver a PS4?!?! Sounds great!
No, actually, it sounds suspicious, doesn't it? Common sense suggests that you shouldn't provide any personal information to unknown websites, never click suspicious links, and never download anything from unknown sources. Don't get tricked, I know this may be obvious for all of you, but I call this spam and scam.
6. Be careful of double extension files.
Be wary of files with a double extension such as ".txt.vb" or ".jpg.exe". As a default setting, Windows often hides common file extensions, meaning that a program like Paint.exe will appear to you as simply Paint. Double extensions exploit this by hiding the second, dangerous extension and reassuring you with the first, safe extension – which is utterly meaningless to your computer; your system only recognizes the extension to the extreme right and run the file as such. If a common file type whose extension you never normally see suddenly becomes visible for no apparent reason, right-click on it, select Properties, and look for the complete file name. You may be surprised to find out what kind of extension it really has.
To make you file extensions visible, find Folder Options in your Control Panel. (Note that it may be tucked away in Appearance and Personalization or something to that effect.) Under the View tab, scroll down to Hide Extensions for Known File Types and make sure it is unselected.
(Source:
You must be registered for see links
)7. Block Advertisements and Pop-Ups using programs
Advertisements are annoying, right? Did you know that you can block them? You should, since you're on the Internet everyday for 8 hours. Oh, and turn on the "Block Pop-Ups" setting in your web browser, even Internet Explorer has that setting.
[video=youtube;pVYtzF5SemU]https://www.youtube.com/watch?v=pVYtzF5SemU[/video]
Use AdBlock to block advertisements and pop-ups:
-
You must be registered for see links
-
You must be registered for see links
-
You must be registered for see links
-
You must be registered for see links
-
You must be registered for see links
What's the point of having an anti-virus, but not scanning your computer with it? Who knows? Maybe you already have an infected file in your computer right before you installed your anti-virus/anti-malware software. Scan it periodically, this is an important part of protecting both your system and your privacy.
9. Install Windows Updates
As much as I hate saying this, since I'm annoyed with Windows Updates myself - you have to install them. These updates fix minor problems in your computer and also updates Windows' virus database (for Windows Defender and Firewall). I find the fact that my computer turns off itself while I'm working on a school project annoying. Luckily, you can turn off the automatic updates and just toggle through installing them later when you turn off your computer. So that's useful.
10. Google or scan a suspicious file on your Desktop
What? You don't remember having that file on your Desktop? You don't know what it is? Well, it's either you scan it with your anti-virus or you Google it, or you can do both. Suspicious files stand out too much for you not to take action, so be aware.
11. Be wary when using P2P programs
Peer-to-peer (P2P) networking has become a launching pad for viruses. Attackers incorporate spyware, viruses, Trojan horses, and worms into their free downloads. One of the most dangerous features of many P2P programs is the “browse host” feature that allows others to directly connect to your computer and browse through file shares.
P2P can accidentally give access to logins, user IDs and passwords; Quicken files and credit reports; personal information such as letters, chat logs, cookies, and emails; and medical records you accidentally house in accessible folders on your PC. As with email and instant messages, viruses in P2P files are capable of weaving their way through as many users as they can, stealing information and delivering it to cyber criminals who forge identities and commit fraud.
(Source:
You must be registered for see links
)12. Use a VPN (Virtual Private Network) if you want to and if you can afford to
If you're really concerned about your privacy so much (plus, if you have lots of money), then it shouldn't hurt to subscribe for a great VPN provider. Oh, and did I tell you that you can prevent yourself from being DDoSed by a random by using a VPN?
Here are some information about VPNs:
-
You must be registered for see links
-
You must be registered for see links
-
You must be registered for see links
Even if you follow these steps that I have provided you so far, rare, hardcore no life hackers could potentially still access your system. It's always good to buy an external hard-drive to back up your data with. You can also buy cloud storage online or use free ones for backup. Or... you can use your USB. All depends on how much "important" (varies to people) files/information you have.
14. Seek help if you need it
Think of yourself as a player of League of Legends or DotA, and think of the smaller viruses as the creeps/minions, and the most dangerous ones as the enemy champions/characters. Think of the fed/fat teammates as the better and more experienced ones. You can't "solo" all of the enemies, you need help from your teammates, right?
The same goes for computers. If you need help, you need help. Don't go against that fact, because it could end up as a tragedy for you.
You can get help from various websites, but the trend right now is to use a famous tech forums such as:
-
You must be registered for see links
-
You must be registered for see links
The most important part of all is that you should be aware of what is happening in your computer.
Research and learn about important things that are happening in your computer. Open Task Manager (Ctrl + Shift + Esc or Ctrl + Alt + Delete) and see if there are suspicious running files on the background.
Here are some common symptoms of viruses to pay attention to:
- The web browser’s default home page has been modified.
- A particular website comes up every time you perform a search.
- Excessive pop-up windows appear.
- The network adapter’s activity LED blinks frequently when the computer shouldn’t be transmitting data.
- The firewall and antivirus programs turn off automatically.
- New programs, icons, and favorites appear.
- Odd problems occur within windows (slow system, applications behaving strangely, and such).
- The Java console appears randomly.
Virus
- Run and update antivirus software.
- Scan the entire system periodically.
- Update the operating system.
- Use a firewall
- Run and update antivirus software.
- Scan the entire system periodically.
- Run and update antivirus software.
- Scan the entire system periodically.
- Run and update anti-spyware software.
- Scan the entire system periodically.
- Adjust web browser settings.
- Consider technologies that discourage spyware.
- Run and update antivirus software.
- Use rootkit detector programs.
- Use a spam filter.
- Configure whitelists and blacklists.
- Close open mail relays.
Follow these steps and you shall protect yourself from various threats!!
Hopefully this was helpful for some of you, though most of you may know these already, so don't bash me for that.
This took me hours to organize and make, so tell me how you guys think about it xd
Last edited: