Hacking: Guide To Basic Security, Penetration Testing And Everything Else Hacking (2015)
Chapter 5: Few General Tips Of Computer Safety
By now you must be having a fair idea about the various facets of hacking and the guidelines for ensuring basic safety to your personal computers and also to large scale, computer networks. Given below are some general tips that you can keep in mind to avoid falling prey to the threat of hacking.
➢ Never open mails from unknown sources and more importantly, do not ever download the attachments to your system.
➢ Always engage in safe browsing. Avoid visiting websites that you suspect of having malware.
➢ When installing a new program, make sure that the old program is completely uninstalled before you begin installing the files pertaining to the new one.
➢ With respect to whatever programs and software you have in your system, ensure that they are updated to the latest version possible.
➢ If you are one of those work-at-home professionals, do not hesitate to enlist the services of a professional firm of computer security experts to keep your system and network well guarded.
➢ Do not reply to chat room invitations and messages from people whom you don't know or whose authenticity you suspect.
➢ Always keep a back up of your files and information in a separate external source that is kept secure.
➢ Many computer security experts believe that while browsing the internet, it is better to use Mozilla Firefox browser than Internet Explorer. Firefox provides better inbuilt security features than other browsers.
➢ Deactivate features such as Java, Active X etc in your browser, when not in use.
➢ As mentioned earlier in this book, shift to operating systems like Macintosh or Linux if you are comfortable with their operation. The incidence of hacking in computers using these operating systems is very less compared to the vastly more popular Windows.
➢ The last and often overlooked tip - turn off your computer when not in use. Do not keep your computer in sleep mode and leave your workstation for more than twenty minutes. It is impossible to hack into a system which is not switched on.