Internet Security and Privacy Protection Resources

Privacy Protection Recommendations
  1. Do not click links in unsolicited email messages
  2. Do not fill out forms in e-mail messages
    • e-mail may not be from who it claims to be from (i.e. spoofed). Many common Internet frauds start with spoofed e-mail;
    • Viruses can be delivered to your computer by simply looking at a web page using a vulnerable web browser.
       
  3. To protect your correspondence with other people please use mail encryption tool.
  4. Verify website identity before entering passphrase
    Fraudulent "phishing" websites designed to trick you into divulging your passphrase or other sensitive information are common. Spoofed e-mail (see above) is commonly used to lure victims to phishing websites. Never assume that a website is the website you intended to be at based on its appearance. Before entering your passphrase, ensure you are at the real website by:
    • Checking for an active padlock in the browser status bar;
    • Checking the browser location bar for a site name beginning with (exact spelling is critical);
    • Checking the SSL certificate being using for for appropriate "Issued To", "Issued By", and Thumbprint fields.
     
  5. Keep your operating system and applications updated
    Use Windows Update to make sure you have the latest security patches installed. Also check for updates to your application programs, especially Microsoft Office.
  6. Use a hardware and/or software firewall
    A firewall can protect your computer from malicious traffic. A hardware firewall/router acts as a barrier between the outside world and your computer. A software firewall performs that function to a lesser degree but can also block malicious programs on your computer from sending data out to the Internet. Windows XP includes a simple firewall, but it is disabled by default.
  7. Do not run untrusted applications
    Running any program that arrives via email or that was downloaded from the Internet can be dangerous. Only run applications that you wish to grant complete access to your computer and the data contained on it.
  8. Use a Spyware and Adware removal programs
    Hidden spyware programs you even do not know about penetrate your system, collect your personal data, and transmit it over the network. This information may include:
    • Passwords;
    • Credit card data;
    • Files and folders;
    • Details of your computing and web surfing activity;
    • And another valuable data.
       
      
  9. Protect your Web Privacy. Clean Your System Files.
    Web browsers store all activities of your Internet surfing, including:
    • Images you have viewed;
    • URLs you have typed;
    • Web pages you have visited;
    • Credit card and password information you have entered;
    • And all the information you are interested in.
       
  10. Encrypt local document and folders.
  11. Upgrade to a better web browser and e-mail client
  12. Use an Anti-Virus program
    If you follow all of the above recommendations a virus will have difficulty infecting your computer. However, since a computer virus can be a vehicle for a criminal to gain total control of your computer and thereby any information stored on, sent by, or received by your computer, it is prudent to install antivirus software from a reputable source and run it regularly. Since new viruses are discovered daily, it is important to keep antivirus software and the virus definitions it uses for detection up to date at all times.
  13. Use Proxy Servers or Anonymizers
     

 

 
Copyright © 2protect.info, 2004-2006. All right reserved.
All trademarks and registered trademarks are the property of their respective owners.

 

Sitemap