GoVisits Web Directory » News Articles » Personal Technology Information » Protect Your PC from Viruses, Worms & Trojans

Protect Your PC from Viruses, Worms & Trojans

Each of the items in the checklist below is part of a broad and easy to implement security policy.

  • Install all windows critical updates for your operating system from the Microsoft Update site - it's free! All that's required to keep your Microsoft operating system up to date is an Internet connection.
  • Install and configure a firewall - either a hardware or software based firewall is a must! If you are using a router, it probably has firewall capabilities included. Software firewalls are available at minimal cost; one of the best is free!
  • Install and configure antivirus software - the cost is minimal, there are even free versions available - the protection is priceless! Update the definition files daily - scan your drive weekly - it can all be automated with most programs.
  • Create a backup - even the best plan can be circumvented - be prepared for the worst with a complete backup of your hard drive! If you already have a CD burner and software installed in your machine, you probably have the tools to create a complete system backup - for only the cost of a few CD-R's!
  • Obviously, the costs to properly protect yourself from the worst threats to your security are almost nil. If you need help with any step above, simply use a Google search to find help - it's freely available.

    Follow these four simple steps and you will have implemented comprehensive and complete protection for your PC. If you are unable to initiate your own plan, hire an expert to do the job. You won't be sorry!

    © 2004 ODEC


    Personal Technology articles

    1. Make Windows XP Run Faster!

      A friend told me: "My computer startup seems to be taking a long time. And when the hard disk finally stops churning, everything just seems slower than when it was new. Can you suggest any maintenance tips to reduce the startup time and make Windows ... more to this article

      Article category: Personal Technology Information

    2. Mail-merging: The Principles

      About mail-mergingMail-merging is the process of merging variable data and fixed text.Using mail-merging, you can create individualised letters, envelopes, labels and other documents without having to laboriously create each individual ... more to this article

      Article category: Personal Technology Information

    3. 10 Time Saving Keyboard Shortcuts

      Time is money. And when you constantly have to divide your time between your mouse and your keyboard, your workflow rate really slows down.That's particularly true when you're working on a laptop, where the pointing device is even slower.... more to this article

      Article category: Personal Technology Information

    4. Portable Technology: Getting to Know the Treo

      Up until the recent past, those who wanted to take advantage of a mobile phone, data organizer, wireless e-mail with text messaging, web browsing and a digital camera had to have separate units for each. With today's technology comes the Treo ? offer... more to this article

      Article category: Personal Technology Information

    5. How to Save an Image in a SQL Server Database?

      Most of the web applications have a lot of images used in it. These images are usually stored in a web server folder and they are accessed by giving the relative path to the file with respect to the root folder of the website. .Net being the platform... more to this article

      Article category: Personal Technology Information

    Protect Your PC from Viruses Worms Trojans information

    Article categories

    Bluetooth Headphones For Your PDA

    Nothing is worse than having to negotiate all kinds of cable...

    Personal Technology Information

    A Beginners Guide to Avoiding Viruses

    "Aaaaaahhhhhh! I've been invaded by a virus!" Gett...

    Personal Technology Information

    How to Use SQLXML to Retrieve Data from SQL Server Database?

    Using SQL Server 2000 and above versions you can retrieve da...

    Personal Technology Information

    Virtual Memory - What is It?

    I recently got an e-mail asking about virtual memory. The pe...

    Personal Technology Information

    The Ipod Mini: Why Its Not that Hot

    I got my eyes set on a iPod mini, as it looked good for quit...

    Personal Technology Information

    USB Drives - What to Look For in a USB Device

    Those small USB drives have so many names, pocket drives, th...

    Personal Technology Information

    Cisco Certification: Building Your Own Home Lab, Part I

    CCNAs and CCNA candidates hear it all the time: â??Get some...

    Personal Technology Information

    Email Management

    If you utilize a computer at home or work it is likely that ...

    Personal Technology Information

    SOBIG.F Virus Promises Ill Be Back

    On 21 August 2003 Symantec Security Response upgraded the W3...

    Personal Technology Information

    Setting File Permissions On A Unix Server

    File permissions are one of the strengths that the Unix worl...

    Personal Technology Information

    Why Using an Ad Blocker Can be a Bad Idea

    Ad Blocking is getting to be a common sport on the internet....

    Personal Technology Information

    The Help Desk

    When you think of a help desk, what do you picture? Do you s...

    Personal Technology Information

    Help, I Need a New HDTV! (Part 3 of 5)

    Feeling overwhelmed in selecting a new TV? With all the choi...

    Personal Technology Information