So you've bought your computer and want to get online? It's not as simple as connect the wire and off you go these day's. The internet is a weird and wonderful place as long as you can control what you do.
Simple Steps - Protect your Computer online

That's why you need to protect yourself. These can be done in a number of very simple steps. This article will get you started but you should always try to be smart when your surfing the net!



Step 1: Anti-Virus Scanner

Whether you're connecting to the internet or not, you need an Anti-Virus scanner. Your computer can become infected with "viruses". These are little files or codes that have been written to ruin your computer! That's why they must be stopped!

There are many programs out there that can help, but it's best to trust only the mainstream programs as these are used widely and updated regularly.

Recommendations:
AVG Anti-Virus Free
http://free.grisoft.com/doc/1

Avast antivirus
http://www.avast.com/

Step 2: Firewall

Ok so your thinking what is a "firewall" sounds scary right? Well it's not really. It is again another line of defence against the number of ways your computer can be attacked. In simple terms it blocks other computers and programs from connecting to you and playing with your stuff. Think of it as an internet wall of fire, where you allow what can pass through.

Software - Again there are many programs available to protect you, Recent Microsoft Windows machines come with Windows Firewall, which can be described as basic at best. We do recommend you go for mainstream again.

Hardware - A firewall can also be included as part of your hardware, like an internet router "that's the box that sits between your pc and the internet line". This is the best and recommended way to have a firewall. As it blocks intruders before it gets to your pc.

Recommendations:
Zone Alarm
http://www.zonelabs.com/store/content/company/products/znalm/freeDownload.jsp




Step 3: Be AWARE!!

Simply put watch what you download and accept to save to your PC, sometimes people can send you files in e-mails. They look ok but when you run them they will install something onto your PC and leave you upset and distraught. Always scan something that has been downloaded before opening it and never open/run programs that have been sent in an e-mail from unknown sources.
Step 4: Go for it

That's pretty much it to get you going. If you think something doesn't look right, it probably isn't. Hopefully this will get you going to start with, wait till you find out about spy ware and Trojan's!! Good Luck and Safe Surfing
Global Positioning System unit is taking a high toll in the latest addition of gadgets and electronic devices. GPS - Global Positioning System is a satellite based electronic device that provides information on time, positioning and weather conditions. Sometimes the satellite navigation system may not be re-installed but you can connect it separately to your device. GPS devices can be loaded in cars, mobiles, home computers, laptops, digital cameras or smart phones.

Hackers Are Eyeing Your GPS Too

How the GPS device works?

Each device has an inbuilt GPS receiver connected to the GPS satellite that coordinates the location and shows the position. The security forces and security system of countries have become largely dependent on GPS navigation system. The military defense, civil, navy and aviation forces are using GPS systems to track, coordinate and regulate the locational activities. The excessive use of GPS to track positions has made it more vulnerable to hacking. Attack on Global Positioning System for hacking and hijacking is on the rise. Installed GPS devices have enabled easy hacking of smart phones, iPhones, laptops and cars and last but not the least is aircraft hijacking. Through GPS, jamming a hacker can get a complete remote access of the electronic device.

How Can A GPS Device Be Jammed?

The purpose of GPS jamming is to block the signaling and prevent it from working. To disable a GPS tracking device a variety of methods is used. Hackers using mobile phones and other radio signal related electronics devices can disable the GPS too and not only that they can replace the real GPS signal with a fake one. This will show fake locational position. These GPS spoofing gadgets actually send fake radio signals replacing the real signal transmitted. Many people tend to relate GPS signals with navigation. The use of GPS as a time signal has potentially made it more susceptible to GPS spoofing which poised as a bigger threat today rather than simple GPS blocking.

How do you protect your GPS device is a big question?

Ethical Hacking Institutes are building technically sound experts who can actually prevent you from hackers. These ethical hacking training centers run certified ethical hacking courses. You can hire certified ethical hacking individuals who can technically and exclusively device programs for you to protect your GPS system.

Interloping, manipulating or nullifying of a GPS device is a punishable offense. So be on your guard and stay well informed and aware if you are technically and professionally dependent on the Global Positioning System. Remember whatever GPS device you have it is always prone to hacking.
Your keyboard has a problem and you want to open your session to check your settings and drivers for your hardware. Problem: Unable to enter your password without keyboard. Fortunately, you can use the keyboard to login and continue using your computer.

1. On the Windows Welcome screen, click the Options icon in the bottom left ergonomics.

Login without a keyboard - Windows 7

2. Then check the box Type without the keyboard and click OK.

Login without a keyboard - Windows 7

3. A keyboard appears on the screen. Use it to enter your password and click OK.

Login without a keyboard - Windows 7
 4. Your session opens. The keyboard remains on the screen allowing you to enter text if necessary until you find the cause of the fault on your keyboard.

Popular Posts