Want to be safe on the Internet? Here is a collection of articles that will help you understand the tricks and tactics used by malware writers and that explain how to set up some powerful computer defenses. Read these and you will be well prepared to protect your computer against hackers and cyber criminals.
1. What is two-step authentication?
With databases being broken into and passwords stolen all the time, complex passwords are no longer a sufficient security measure. An additional defense is “two-step authentication”. This helps protect your account from unauthorized access if someone manages to steal your password. This article explains how it works.
2. Ad injection and you - how adware gets on your computer
Microsoft discussion of how you get tricked into downloading adware or worse.
3. Different Kinds of Malware Explained
Malware is a commonly used catch-all term for any type of harmful software but there are many different kinds. Viruses, worms, Trojan horses and a variety of other bad stuff are explained in this article.
4. Buffer Overflow Basics
The most common type of security weakness is something called “buffer overflow”. A major portion of malware attacks target this weakness. This article explains what buffer overflows are and how malware uses them.
5. What is a DDoS attack?
We constantly hear about some website being attacked and taken off the air by hackers using DDoS. If you ever wondered what a DDos attack involves, this article explains.
6. How to protect your Windows XP system after April 2014
There are still many users of Windows XP. What to do when Microsoft discontinues security updates? This article gives some answers. One excellent security measure to consider is also discussed in link 11 given below.
7. Free Network Sniffers, Analyzers and Stumblers
A collection of free software for analyzing who’s doing what on your network. Programs for Windows, Mac, Linux, and even Android.
And let’s not forget the formidable assembly of security information right here at Gizmo’s. Pay attention to what is said in the articles linked below and you will be well armed against attempts to invade your computer. Here are just a few from the outstanding selection of security articles that are available on our site.
8. How to Tell If A Website Is Dangerous
These days you never know what might be on a website. This article gives clear and detailed explanations of how to check out a website.
9. How to Stay Safe While Online
Step-by-step procedures for making your computer safe
10. What Else Have You Just Downloaded?
It’s all too common these days – downloads are bundled with stuff you don’t want or try to install things you didn’t ask for. This article tells you what to watch out for.
11. An Introduction and a Quick Guide to Sandboxie
Over the years, I have recommended Sandboxie to many people. A typical reaction is, “It sounds very interesting but it’s too complicated for me.” This article removes that excuse. With the clear explanations that are given there, almost anybody can set up the really powerful defense provided by Sandboxie. I especially recommend Sandboxie to those who wish to continue using Windows XP.
12. Safe Computing in Under an Hour
A quick way to get your PC ready for the dangerous world out there.
And there you have it - use the information in these articles and you’ll be much safer on the Internet.
Get your own favorite tip published! Know a neat tech tip or trick? Then why not have it published here and receive full credit? Click here to tell us your tip.
This tips section is maintained by Vic Laurie. Vic runs several websites with Windows how-to's, guides, and tutorials, including a site for learning about Windows and the Internet and another with Windows 7 tips.