Keep you're PC Secure by Following Ways
A---Make your Internet Explorer more secure - This can be done by following these simple instructions:
1--From within Internet Explorer click on the Tools menu and then click on Options.
2--Click once on the Security tab
3--Click once on the Internet icon so it becomes highlighted.
4--Click once on the Custom Level button.
a-Change the Download signed ActiveX controls to Prompt
b-Change the Download unsigned ActiveX controls to Disable
c-Change the Initialize and script ActiveX controls not marked as safe to Disable
d-Change the Installation of desktop items to Prompt
e-Change the Launching programs and files in an IFRAME to Prompt
f-Change the Navigate sub-frames across different domains to Prompt
g-When all these settings have been made, click on the OK button.
h-If it prompts you as to whether or not you want to save the settings, press the Yes button.
5--Next press the Apply button and then the OK to exit the Internet Properties page.
B---Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.
Labels
- Avoid Getting 'Hooked' By Phishers (1)
- Credit Card Users (1)
- CRIME RELATED TO COMPUTER NETWORK (1)
- CYBER CRIME INVESTIGATION AND PREVENTION (1)
- cyber crimes and children (1)
- Digital Signatures (1)
- Gmail Spam (1)
- INTRODUCTION TO COMPUTER (1)
- Keep you're PC Secure (1)
- protect yourself from scammers (1)
- STUDY ON CYBER CRIMES (1)
- The Menace of Cyber Crime (1)
- TO ESCAPE FROM PHISHING OF YOUR COMPUTER (1)
- Warning signs of a 419 Nigerian Advanced Fee Fraud Scam email (1)
- WHAT ARE COMPUTER VIRUSES (1)
- What is a firewall (1)
- WHAT IS A NETWORK (1)
- What is Cyber –terrorism (1)
- What is Cyber Crime (1)
- WHAT IS INTERNET (1)
- What is Intrusion Detection System (1)
- What is Phishing (1)
- What is Virtual Private Network VPN (1)
Popular Posts
-
Watch out for “phishy” emails. The most common form of phishing is emails pretending to be from a legitimate retailer, bank, organization, o...
-
Children are a lot smarter than we always give them credit for. This is especially true when it comes to technological issues. Few could ar...
-
Credit Card Users In case of losing the credit card, lodge a complaint with the bank immediately. It will enable the bank to anno...
-
Digital Signatures It provides a method for employing digital signatures, which enable the recipient of the information to verify the a...
-
Introduction to Computers Today Information Technology is changing at a lightening, speed, by ripping of age-old beliefs. ...
-
In 1820, Joseph-Marie jacquard, a textile manufacturer in France , produced the loom. This device allowed the repetition of a series of...
-
What is a network? A network is a system that sends and receives data and messages enabling two or more computers communicated with each...
-
Cyber Crime: Cyber crime is an evil having its origin in the growing dependence on computers in modern life. The definition o...
-
A promise to share or transfer millions of dollars to you for your help or participation.(Out of 6 billion people in the world you were sing...
-
Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, b...
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment