Keep you're PC Secure by Following Ways
A---Make your Internet Explorer more secure - This can be done by following these simple instructions:
1--From within Internet Explorer click on the Tools menu and then click on Options.
2--Click once on the Security tab
3--Click once on the Internet icon so it becomes highlighted.
4--Click once on the Custom Level button.
a-Change the Download signed ActiveX controls to Prompt
b-Change the Download unsigned ActiveX controls to Disable
c-Change the Initialize and script ActiveX controls not marked as safe to Disable
d-Change the Installation of desktop items to Prompt
e-Change the Launching programs and files in an IFRAME to Prompt
f-Change the Navigate sub-frames across different domains to Prompt
g-When all these settings have been made, click on the OK button.
h-If it prompts you as to whether or not you want to save the settings, press the Yes button.
5--Next press the Apply button and then the OK to exit the Internet Properties page.
B---Use an AntiVirus Software - It is very important that your computer has an anti-virus software running on your machine. This alone can save you a lot of trouble with malware in the future.
- Avoid Getting 'Hooked' By Phishers (1)
- Credit Card Users (1)
- CRIME RELATED TO COMPUTER NETWORK (1)
- CYBER CRIME INVESTIGATION AND PREVENTION (1)
- cyber crimes and children (1)
- Digital Signatures (1)
- Gmail Spam (1)
- INTRODUCTION TO COMPUTER (1)
- Keep you're PC Secure (1)
- protect yourself from scammers (1)
- STUDY ON CYBER CRIMES (1)
- The Menace of Cyber Crime (1)
- TO ESCAPE FROM PHISHING OF YOUR COMPUTER (1)
- Warning signs of a 419 Nigerian Advanced Fee Fraud Scam email (1)
- WHAT ARE COMPUTER VIRUSES (1)
- What is a firewall (1)
- WHAT IS A NETWORK (1)
- What is Cyber –terrorism (1)
- What is Cyber Crime (1)
- WHAT IS INTERNET (1)
- What is Intrusion Detection System (1)
- What is Phishing (1)
- What is Virtual Private Network VPN (1)
Watch out for “phishy” emails. The most common form of phishing is emails pretending to be from a legitimate retailer, bank, organization, o...
Children are a lot smarter than we always give them credit for. This is especially true when it comes to technological issues. Few could ar...
Credit Card Users In case of losing the credit card, lodge a complaint with the bank immediately. It will enable the bank to anno...
Digital Signatures It provides a method for employing digital signatures, which enable the recipient of the information to verify the a...
Introduction to Computers Today Information Technology is changing at a lightening, speed, by ripping of age-old beliefs. ...
In 1820, Joseph-Marie jacquard, a textile manufacturer in France , produced the loom. This device allowed the repetition of a series of...
What is a network? A network is a system that sends and receives data and messages enabling two or more computers communicated with each...
Cyber Crime: Cyber crime is an evil having its origin in the growing dependence on computers in modern life. The definition o...
Phishing is an attempt to criminally and fraudulently acquire sensitive information, such as usernames, passwords and credit card details, b...
A promise to share or transfer millions of dollars to you for your help or participation.(Out of 6 billion people in the world you were sing...