Sunday, August 16, 2009

Tag Technorati: {grup-tag}
my beloved in the blog I will give this tip to find the weakness of your computer. because I get a complaint - a complaint about it all,complaints examples such as:

1. weaknesses of the computer where I?
2. and need to be confused whether my computer?
 
so I write in my blog to share knowledge because so many people that need it all. and you can download antivirus below:

1. smadav
2. AVG 8.5
3. Symantec 2009
4. ansav 3,5 beta
5. avast prefisional editions
6. Kaspersky 2010
    1. Make the investment to buy the Internet security solution that combines antivirus, firewall, penetration detection and management weaknesses to get maximum protection from malware and other threats.
    2. Make sure that the security patch has been installed and new immediately applied to all applications which have disadvantages.
    3. Make sure that the password used is a mixture of letters and numbers, and often-to change them often. Password should not contain words from the dictionary.
    4. Never open, view, or run an email attachment unless the attachment is known that the objective and sent sepengetahuan receiver.
    5. Update the virus definitions regularly. With the latest virus definitions, you can protect your computer from viruses that are spread out.
    6. Regularly check whether the operating system that is used has a weakness. This can be done by using Symantec Security Check which can be accessed via http://www.symantec.com/securitycheck.
    7. Use anti-phishing solution. And, never let the information confidential, financial or personal, except if the request can be ascertained that the information is truly official.
    8. get involved with efforts to track and report the attack. By tracking service from Symantec Security Check, users can immediately identify the location of potential attacks and forward the information to the attackers ISP or authorities.
    9. beware because of security threats can be automatically installed on Computer that use the file sharing program, download free software and freeware or shareware version specific.
   10. Avoid clicking on links or attachments in email messages or IM, these things may be a risk that the computer does not need to.
   11. Read the end-user license agreements (EULA) carefully and be sure to understand all requirements before acceptance. Some of the specific security risks can be installed when users agree to the EULA, or due to user acceptance.
   12. beware software that displays ads on the appearance. Many spyware programs that track how users respond to ads such as this, the presence of such a program is a sign of danger. Ads that appear to be a spyware.
Categories: , ,

0 Comments:

Post a Comment

Subscribe to RSS Feed Follow me on Twitter!