Computer Tamers computer logo
& Woman to Woman Computing
Google Plus
Google+
Linked In
LinkedIn

AboutContact usServicesNewsAnti-virus InformationHelpful InformationLinksHome

Internet Security Summary
From our Internet Security Specialist

Anti-virus | Spyware | Firewall | Web browser
Mac computers | Windows 8 (& 7 or Vista) | Android for Tablets and Phones
Sheila Brown, Owner, Woman to Woman Computing & Computer Tamers

Check our blog for the LATEST NEWS

  • "Home internet users top targets of online criminals"- CBC News
    Internet users at home are increasingly becoming the targets of online criminal activity because they tend to lack the security measures that protect businesses and other more sophisticated users, a new report says. (Read more)
  • Executive director, National Cyber Security Alliance, Ron Teixeira: "There is a major perception gap: Even though most consumers think they are protected, this study shows the opposite. Far too many people still lack the three fundamental protections they need to stay safe online — current anti-virus software, spyware protection, and a secure firewall."
PLEASE NOTE: We recommend the website www.filehippo.com to download software, but BE CAREFUL to not download "Release Candidate" or "Beta" versions unless you are very experienced, and have everything backed up.
You can pick the version to download on the right side of the program page, and then when at the version you wish, click ONLY on either "Download latest version" or "Download this version" on the upper right.
DO NOT click on any ads promoting other software.

Below you will find information to help improve your computing experience.
Contact us at (613) 721-2082 to make it even easier!

Anti-virus - Information & Programs

  • Please protect your own computer and those of your friends and acquaintances by using antivirus and antispyware programs on your computer, and keeping it updated. New "malware" (viruses, spyware, adware, etc.) appear quickly, and spread through unprotected computers, usually without the knowledge of the computer owner.

  • Recent versions forge the "from" line to one of the addresses in the infected computer, so it appears to be coming from someone else's computer or even yours. It might also appear to be a "bounced" message from a postmaster, saying you sent it out, and it couldn't be delivered. It could also appear to be a message from your Internet Service Provider, saying there is a problem with your account or your email.

  • Many message sent "from" financial institutions are an attempt to get your login and password. DO NOT click on links in these emails. Instead, type the email address of your bank's website into your browser. These messages are often referred to as "phishing". Few banks actually email their clients, instead they have messages on their websites both before login (general) and after (personalized).

  • We recommend NEVER opening an attachment unless you have specifically asked for a file, unless you know what it is and why you are receiving it. Much of the malware these days spread through the virus sending copies of itself to everyone in your address book, and are especially directed at attacking through Outlook or other Microsoft mail programs, as well as some other email providers, such as Yahoo and AOL. Most people affected have no idea that their computer is spreading the infections to their friends, who think it's safe to open an attachment or a link coming from someone they know.

  • Please note that few people are aware that spyware is as much a danger to your computer as viruses. Please see below for information on controlling spyware.
Top

Programs

  • Update your anti-virus program at least daily, and always before opening your email program, to give you the best protection.
  • We recommend the use of an excellent anti-virus program, Avast. This free (for personal use) program is available from Avast at www.avast.com/eng/download-avast-home.html - please note that it requires a registration, which is free, but is required each year (look for "Register here" on that page to register and/or renew).
  • If you wish to use a second program, we recommend the use of the free AVG antivirus or Antivir by Avira. The AVG program is available at www.filehippo.com/download_avg_antivirus and Antivir is at www.filehippo.com/download_antivir
  • You can also do an online scan of your computer at www.antivirus.com/free_tools - this only works when connected to the Internet, of course. Please don't depend on this as your only virus defense. We have seen it miss virus infections.
Top

Malware Detectors - "Pest control" for your computer

  • "Malware" is used as a catch-all term for many kinds of malicious software. Adware programs pop up ads in your face, sometimes even when you don't have a browser open and may also watch your online activities, profiling you for targeted advertising or more sinister purposes. Literal spyware gathers information about you and what you do with the computer, possibly enabling identity theft. Keyloggers are the ultimate spies, recording everything you type (including passwords). All of these are lumped under the term spyware.
  • Many people don't realize all the extra "stuff" that ends up on their computers just by visiting websites. In addition to the Temporary Internet Files (which should be cleaned out regularly), many websites place "cookies" on the computer, _most_ of which are harmless, and they also can put "spyware" programs into your computer as well.
  • You can remove the Temporary Internet Files in Internet Explorer by going to "Tools", then "Internet Options", then on "Delete Files" to clear what is stored already. Then click on the "Advanced" tab at the top, and scroll down to the "Security" section at the bottom of the popup window. Click to put a check mark beside "Empty Temporary Internet Files folder when browser is closed".
  • Beware emails promoting programs that will "clean" your spyware - these are often programs that remove other companies' spyware, replacing it with their own!
  • Check for problems weekly with MalwareBytes Anti-Malware by double clicking on the desktop shortcut, first checking for updates. If it tells you to restart the computer after cleaning, let it do it right away.
  • You may also wish to add SuperAntiSpyware. I run both in my computers, and always run Malwarebytes first, then SuperAntiSpyware.
  • In both cases, install them, update them, and click "Quick scan" and wait. It will prompt you on the steps at the end to remove if it finds anything to clean, and when the computer is restarted, it should be fine.
Top

Firewalls - The "keys" to your computer

  • Computers connected to the Internet are at risk of attack from unscrupulous hackers, especially those connected via high speed connections (cable or DSL). Hackers may attempt to take control of your computer for their own use. In the worst case, this could include the placing of child porn on your computer for distribution without your knowledge.
  • We recommend the use of the free ZoneAlarm firewall program, available at www.filehippo.com/download_zonealarm_free
  • During installation, it can pre-configure your computer for Internet access, but you will have to give permission for each program outside the standard connection. If it is a program you know (your email program or web browser or antivirus programs), click on "Remember this setting" so you won't be asked again for that program.
  • If you have given permission for a program you don't want, or denied access to a program you do want, double click on the ZA in the task bar, then when it opens ZoneAlarm, click on Program Control on the left, then on Programs - it will show you a list of those allowed (green check mark) and denied (red x). Blue question marks mean the program asks each time. To change a setting, just click on either the check mark, x or question mark, then change to what you want.
Top

Windows 8 computers & tablets (applies also to Vista and 7)

  • Windows 8 is just another / the newest version of Windows NT, and all the main software works in Windows 8, just as it does in XP, Vista and 7.
  • I recommend turning off the "User Account Control", as it's just a nuisance that is not necessary, at least for the prime computer user (running the Administrator account).
  • Then install, as a minimum, ERUNT, Avast, Malwarebytes, and SuperAntispyware (see above)
  • Most of your existing software will be fine, but contact us if you encounter problems, or need help.
Top

Android for Tablets & Phones

  • Android tablets and phones are wonderful - I use an Android phone/tablet, as well as a 7" Android tablet every day.
  • However, these wonderful "mini computers" that we can carry around need protection from many of the same things that are bad for computers.
  • I highly recommend that owners of Android systems download from the Google PlayStore: Avast for antivirus, Lookout for antimalware and phone backup and locating if lost/stolen, and Advanced Task Killer to free up memory on your phone or tablet and keep it running better.
  • Please do not download software "apps" from non-Google PlayStore sites.
  • A quick tip - if you want to check things out on a larger computer, just email yourself the link to anything you want to download on your Android tablet or phone, and it will make it much easier to check it out.
Top

Get a better web browser!

  • As well, our advice is to get a better browser! Unfortunately, most people use Internet Explorer, which is not safe to use in its standard format - experts advise either turn off some Internet Explorer features by setting all security zones to "high" or switch to another browser as the best immediate fix.
  • It is our opinion that Mozilla's Firefox and Google's Chrome are much better, faster, and safer web browsers, and are updated far more often.
  • Try it - you'll like them! www.mozilla.comand www.filehippo.com/download_google_chrome
Top

Mac (Apple) computers

Top

Member
Business Network International

Business Network Int'l

Computer Tamers
We'll tame your computer!

Tel (613) 721-2082
Cell (613) 720-0430
Fax (613) 226-7451


Email training@computertamers.ca

A Division of Woman to Woman Computing
Google Plus
Google+

Member:
Beta Sigma Phi
BNI Millennium Chapter
eWomen Network
LinkedIn
Website & Design S.C. Brown © 1998-2013 (applies to entire website)
Dec/13
About  Contact  Services  News  Security  Helpful Info  Links  Home
Top