Hearty Welcome to Our Computer Safety Tips Website!

Windows Antivirus& free software

Anti virussoftware is must-have protection. This review picks the best antivirus software based on its virus detection abilities, features, and breadth of protection. Whether you're seeking total system coverage or an ala carte solution, each of the following products provides superb virus protection for Windows-based PCs. Because every system is unique, evaluate several of these antivirus products to find the software best suited for your PC and your level of experience.
1. Avira AntiVir PersonalEdition Premium
AntiVir is a consistent leader in independent antivirus tests. Avira's AntiVir PersonalEdition Premium is a low-impact, easy to use virus scanner that also includes rootkit detection and phishing protection. Five euros of each purchase is automatically donated to the Auerbach Foundation, a non-profit that supports various charity and community-related services. AntiVir PersonalEdition Premium should be used in conjunction with a firewall.

2. Kaspersky Anti-Virus Personal
Kaspersky Anti-Virus Personal offers excellent antivirus protection, perhaps unsurpassed in its ability to unpack and scan compressed files - something that trips up a lot of other vendors. Should be used in conjunction with a firewall.
Compare Prices

3. BitDefender Antivirus Plus

Softwin's BitDefender Professional protects against viruses, spyware, and instant messaging threats, as well as offering firewall rules to block undesirable traffic and a privacy gateway to keep your identity and preferences private while surfing the Internet.
Compare Prices

4. McAfee VirusScan Plus

McAfee VirusScan Plus is an ideal candidate for those seeking an antivirus/firewall combination without all the bloat of traditional Internet security suites. McAfee VirusScan Plus makes an easy job of removing adware and spyware, something not all antivirus products deliver.
Compare Prices

5. Panda Antivirus 2007

Panda Antivirus 2007 combines antivirus, antispyware, and antiphishing with its highly touted behavior-based TruPrevent Technology. License covers use on two computers and includes free tech support via email (telephone support options are also available).
Compare PricesRead Review

6. F-PROT Antivirus

F-PROT Antivirus for Windows offers a feature that's increasingly harder to find - it includes a command-line scanner that can be used to create a rescue CD for scanning the system in Safe Mode. This is a particularly effective way to remove stubborn resuscitators. Firewall not included.
Buy Direct

7. G Data AntiVirusKit (AVK)

AntiVirusKit (AVK) provides a double layer of protection, bundling two of the best antivirus engines - Kaspersky and BitDefender - under a single, easy-to-use console. Like Nod32, you'll also want to bolster G Data's AVK with a firewall.
Buy DirectRead Review

8. AVG Anti-Malware

AVG Anti-Malware combines traditional virus protection with adware and spyware scanning, in a low impact footprint ideal for resource-strained PCs or those who just want the best performance possible out of their computers. Free tech support is available via email and the standard license includes two years of protection. Should be used in conjunction with a firewall.
Buy Direct

9. Eset Nod32

Nod32 features a small footprint, low performance hit, and fast scan speeds, providing focused virus protection ideal for gamers or those with an older PC. Should be used in conjunction with a firewall.



Internet Web Site Safety

However, that said, many people have found love online so, if you're still interested in trying to find your soul mate,

OK, your anti-virus is current and constantly updated and you run a firewall. You never open e-mails or attachments from an unknown source and you’d rather eat worms that reply to spam. You have an anonymous nickname, you don’t use any of your personal details in your profile online and you never send e-mails, texts or IM ’s that contain your telephone number or real name. Good - you have your online safety completely covered…don’t you? Well, hang on there just a minute. What about your Web site?
For adults
Cyberdating
How to have fun, but stay safe
1)CyberdatingSo many of us work too hard, or spend so much time with our families that we don't have time to get out and meet people.
2)While the most optimistic among us expect prince charming or princess charming to knock on our front door between our favorite TV shows, or online chats, most of us realize that this won't happen.
3) As more people are getting online, more are turning to cyberdating services or cyberdating chats.
Caber romance.
4)Before we start...you need to recognize that the only way to stay truly safe in a dating situation is to not date, period! There are always risks in dating, especially when you date strangers (blind dates, first dates and cyder-dates). In addition, teens should not be cyberdating.
5)There are special rules for teens online.
6)Cyberdating is a little different from the other first dates, though. When you first meet a cyberdate in person, off line, you feel as though you know them - the normal first date precautions are often tossed to the wind. You know their favorite actors, authors and foods.
7)You know everything they have told you, but they may not have been telling you the truth.
8)You do not really know them. So treat them as strangers, use all the normal precautions you use with strangers, even cute ones. You should not give any more information to a first cyberdate than you would to a stranger you meet on a plane, or in a club, or in a bar.
9)Women tend to lie about their weight or age, while men tend to lie about their income, level of baldness and athletic condition.
10)Teenagers pretend to be older than they are. The one rule you can count on is that everyone lies a little. So, keep an open mind.
11)That photo they sent you may be five years old, heavily doctored up with a graphics program, from when they used to be thin or when they had hair, or of someone else altogether. The best thing about the Internet is also the most dangerous - a person's personality can show through, what you are inside gets a chance to shine without getting overpowered by what you are outside. But, the cues we use in life; body language, dress, personal hygiene, tone of voice...the way we judge the truth of statements...are lost in cyberspace.

How behavior in internet
1)You can be anything or anyone you want to be online. I keep trying to get people to believe that I am tall, blond and gorgeous! (So far, no takers...).
2)That cute brunette 24-year-old guy may not be cuter, may not be 24 and most importantly, may not be a guy. There is not truth in advertising protection when you date online.

Do not give out personal information online
1)Personal information that would let someone find you off line would never be shared online. Your full name, where you work, where you live, your phone number (see my note on giving out your phone number), your fax number...these should not be shared online.
2)Use an online dating service that uses an anonymizer or re-mailer to mask your real e-mail, or set up a Hot mail or other free account just for dating online.
3)Caber romance can quickly turn to cyberstalking - it is better to be able to terminate that particular account than to have to set up a new main account, and notify everyone you know.

Take your time - do not rush into things
1)Take your time to try to get to know the person online first. Everyone can put their best caber-foot forward in the first couple of e-mails. Being consistent is tougher.
2)Make sure you keep the old e-mails to compare the information they give you. In one e-mail, they might tell you they work for the postal service, in another that they are a student - make sure you check out these inconsistencies.
3)They could be taking night classes, or they could just as easily be lying.Do not be rushed, and do not rush the other person. Let the relationship develop online until you are comfortable with each other - take your time.4)Ask your friends - sometimes they are not blinded by the same rose-colored glasses you might be. What you considered cute might ring differently to them. This might seem like dating by committee, but it helps you keep perspective.
5)Especially when we have been hurt before, we think that we have now found the perfect checklist for a partner.
6)When we see these points in the other person, we forget to explore the other points. Life is more than satisfying a "how tall are you, where do you live (geographically-desirable), if they want or don't want children, or have or don't have children, how much they earn, what religion they are and whether they like romantic movies and Touched by an Angel..." checklist. Values, experience and all the baggage we carry needs to be explored - this takes time. Give it the time it deserves.

Honesty is the best policy
1)When you go to one of those dating site, they ask you your height, weight, religion, income...lots of personal stuff. In addition, maybe you are not as thin, tall or make as much money as you want to.
2)Maybe you have not been to church or a temple or mosque in thirty years. Maybe you are afraid that if you tell them your mother is living with you (or even more embarrassing, that you are still living with your mother...) no one will want you.
3)However, if you start out lying, you will be caught, eventually. If you want to shave a few pounds off, or use an older picture...Tokay. Nevertheless, confess once you think the person might be more than a one-time romance.
4)Do not bait and switch, it's the surest way to end a promising relationship.

Start with a phone call

1)You should move from fantasies and chatting online to a phone call before you meet off line in person. The safest way to do this is by using a public phone. .
2)Set up a time for the call, and give the other person the telephone number of the public phone.
3)Once you are comfortable enough, you can share real phone numbers, but make sure you have caller ID service. If things go sour, you can always block their calls.
4)It also lets you know what their number really is. If they block your caller ID, do not accept their calls.

Meet,with a friend and in a very public place

1)The first time you meet in person, bring a friend. Meet in a mall, or fast food restaurant. Plan for a short first time get together - coffee or a soda. Tell them in advance that it will just be for a few minutes, so they will understand.
2)Treat this as a blind date, only with more care.
3)In a blind date someone you know knows this person, in a cyberdating situation, no one really knows this person. If they insist on meeting you alone, do not go.
4)Then compare what this person told you about himself or herself online - does it match reality? If not, find someone else.

Tell a friend
1)Make sure someone knows whom you are meeting, where you are going and when you are coming back. (Someone other than the person you take with you.)
2)Store all of the e-mail conversations, and let your friend know where to find them.
3)If anything goes wrong, they will be the source of information on how to locate the person you have been chatting with.

Never leave or go home with them
1)You can extend the meeting to dinner or anything else in a public place. However…PUBLIC is the operative word here. 2)Remember when your mother told you never to get into a car with a stranger? Do not go home with them, to a private place of any kind...not for a while.
3)Take this slow, even if you are not used to taking dating slow...this is special.

Report any attacks or threats to law enforcement
1)If things go wrong, whether you followed the rules or not, do not be embarrassed to go to the police. Give them all the facts. 2)If you do not report this person, they in all likelihood will do it again.
2)You are allowed to say "no" and have it respected. If anything goes wrong, it is not your fault.

Learn more about protecting yourself and your privacy online and off line
1)We have a lot of information at our Web site, and many classes you can attend online to teach you how to enjoy cyberspace safely. If you have a special question you need answered, feel free to write to Parry directly.

Make sure you're using a reputable online dating service or chat

1)Most will give you a free trial period. Make sure that you can use all of their service during that free trial. Make sure they use anonymities or re-mailers, to mask your real e-mail address.
2)Some people at the end of the free trial give out their e-mail address to allow the other person to find them when the free trial is over - make sure it's an e-mail account you have set up just for this purpose.
3)Do not give out your Web site address if it contains personal information, or personal e-mail address.
If someone makes you uncomfortable, report it to your dating service right away.
4)Make a copy of the message, and keep copies of anything you found offensive so they can check it out. Many also have an e-overlooking feature to keep you from being harassed from someone.
5)Try not to make your essays provocative.
6)Flirtation's escalates quickly and it is almost impossible to step back to a less amorous level.
7)If you have a problem with your service, contact them. If they will not help you, contact us.
8)We do not endorse any services, but have found that match.com and matchmaker.com seem reputable and have a safe cyberdating area.
9)wired safety hosts one of the leading cyberstalking help groups online. If you need our help, visit our Deerstalking's Self-help area or just send an e-mail to our Deerstalking's and Harassment Division via our contact form.
10)Do not respond when the deerstalker's contacts you. Just ignore them - most of the time they go away. Never share a photo with anyone online you would not want broadcast to 120 million people all over the world.
11)Often caber romances end in one party cyberstalking the other.
12)Do not give them any ammunition.
13)When the old-fashioned "for a good time, call Sally" is posted on one bathroom wall, the results can be horrible, when it is posted on the Internet's cyberwall of sexual UseNet groups and chats, it can be very dangerous!
Remember
These tips are just for those over 18 years old.Take your time, use your head and be careful!Do not believe everything you read online,Therefore, have fun, but be smart...and do it safely! Remember the honesty thing Use your head - you might be lonely, but you are still safe.

Internet safety tips


This Information is useful for Internet Surfers.

1)Don't save your login information. Always log out of Web sites by clicking "log out" on the site. It's not enough to simply close the browser window or type in another address.
Many programs (especially instant messenger programs) include automatic login features that will save your user name and password. Disable this option so no one can log in as you.

2)Don't leave the computer unattended with sensitive information on the screen. If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information.

3)Erase your tracks. Web browsers such as Internet Explorer keep a record of your passwords and every page you visit, even after you’ve closed them and logged out.

"To disable the feature that stores passwords
Before you go to the Web, turn off the Internet Explorer feature that "remembers" your passwords."

1. In Internet Explorer, click Tools, and then click Internet Options.

2. Click the Content tab, and then click auto complete.


3. Click to clear both check boxes having to do with passwords.

"To delete your temporary Internet files and your history
When you finish your use of a public computer, you should delete all the temporary files and your Internet history."

1. In Internet Explorer, click Tools, and then click Internet Options.

2. On the General tab, under Temporary Internet files, click Delete Files, and then click Delete Cookies.

3. Under History, click Clear History.

"To delete other files saved by corporate portals, such as Share point Portal Server
If you're using a corporate Web site that allows you to view internal corporate documents, you may be inadvertently storing sensitive documents on the public computer."

1. Delete all the files in the temporary folder of your user account which you can find by browsing to C:\Documents and Settings\user name\Local Settings\Temp.

2. If your company uses Microsoft Office share point Portal Server, empty the temporary folder (My Documents\share point Drafts).

4)Watch for over-the-shoulder snoops. When you use a public computer, be on the look out for thieves who look over your shoulder or watch as you enter sensitive passwords to collect your information.

5)Don't enter sensitive information into a public computer. These measures provide some protection against casual hackers who use a public computer after you have.
But keep in mind that an industrious thief might have installed sophisticated software on the public computer that records every keystroke and then e-mails that information back to the thief.

Then it doesn't matter if you haven't saved your information or if you've erased your tracks. They still have access to this information.
If you really want to be safe, avoid typing your credit card number or any other financial or otherwise sensitive information into any public computer.




How to repair small problems(software&hard wear)

Symptom:
You hear a clicking noise coming from the computer.
Reason:
The reason for this issue in many cases is a head crash or bad head alignment that causes the HD to fail to initialize.
It can happen to a new as well as an old HD, with older drives being more prone to head crashes and head failures.
Action:
Turn off the computer immediately and bring the HD to a data recovery expert.
The longer you continue to work with the computer attempting to access the HD, the lower the chances that you will have a successful recovery.
Media:
HD 2.5”,1.8” (Laptop), HD 3.5” (Server), RAID Array.(Server)

Symptom:
In many cases a hard drive crash is followed by reduced or slow computer performance.
Reason:
The reason for this issue is in many cases caused by overheating.
It can happen to a new as well as an old HD, with older HD being more prone to overheating issues.
Action:
In cases where you experience these symptoms, and you don’t have access to your operating system. STOP! Do not continue to use the computer.
Turn off the computer and immediately bring the HD to a data recovery expert.
Media:
HD 2.5”,1.8” (Laptop), HD 3.5” (Server), RAID Array.(Server)
symptom:
You deleted a file and emptied the recycle bin/trash can.
Reason:

Human Error.

Action:
STOP! Shut down the computer immediately using the physical power button, in order for the system to stop writing any data the HD and bring it to data recovery expert.

If you continue to use the computer after the file/folder got deleted you can lower the chances that you will have a successful recovery of the lost files or folders.
Media:

HD 2.5”, 1.8” (Laptop), HD 3.5” (Server, Desktop), RAID Array.(Server)

symptom:
You formatted a HD with important data.

Reason
Human Error.
Action:
Stop working on the computer, shut down the computer and bring it to a data recovery expert.

the more actions you will do to that specific HD, the lower the chances that you will have a successful recovery.
Media:
HD 2.5”, 1.8” (Laptop), HD 3.5” (Server, Desktop), RAID Array.(Server)
Symptom:
You deleted pictures in your digital camera.
Reason:
Human Error.
Action:
Stop working immediately with the camera and take the memory card out.

Bring it to a data recovery expert. We can help recover the deleted pictures.

The longer you will use the camera after the pictures got deleted, the lower the chances that you will have of a successful recovery.
Media:
All digital camera memory cards.
Symptom:
You formatted the memory card on the digital camera.
Reason:
Human error.
Action:
Stop working immediately with the camera and take the memory card out.

Bring it to a data recovery expert., We can help recover the formatted memory card.

The longer you will use the camera after the memory card was formatted, the lower the chances that you will have a successful recovery.
Media:
All digital camera memory cards.
Symptom:
One or more of a RAID array drives failed or the RAID array failed to initialize and you no longer have access to the array data.
Reason:
One or more of the HD failed or the array controller failed.
Action:
Stop working immediately with the server, number the order of the HD (0,1,2…) and bring that array preferably with the array controller to a data recovery expert.

If the array failed to load, do not try to replace a HD, in case the array did not initialize it would not help and might cause the rebuilding on the array and you could lose the data completely.

Do not try to replace a controller – it doesn’t have the raid information structure of the old one and you might accidentally initialize the RAID array and delete the existing information.
Be advised that most RAID array data losses are caused by human errors.
media:
RAID array (SCSI + ATA + SATA)
Symptom:
Backup Tape couldn’t be read by the tape drive or the backup software while performing a restore of a backup.
Reason:
Magnetic Tape might be old and has some surface problem.
Action:
Bring the Tape for a diagnosis to a data recovery expert.

Please be advised that in some cases it’s easier and cost effective to recover data from damaged HD than a tape. In cases where you are restoring data because of other failed media we would like to evaluate both backup tapes and hard drive.
media:
Magnetic Tape.

Safety tips to avoid data loss
1)Always back up your data. Make sure that copies of your most important data are being kept off site.
2)Always turn off your computer using the operating system shut down process.
3)Never upgrade your system if you don’t have a backup.
4))Always use up-to-date hardware and software utilities for data security, such as virus protections and firewalls.
5)Laptops should be operated on a hard and flat surface to allow proper ventilation and to avoid over heating.
6)Servers should have fans, ventilation or portable air conditioning systems as close as possible to avoid operating in high temperatures.
7)Allow enough space around the external drive’s cooling fans and remove any items that may block air flow.
8)Drives should be stable and stationary when operating. If you have to move your computer – turn it off first.
9)When touching or handling the media, make sure static electrical charges will not occur.
10)Always test your backup before you reformat your drive.
11)In case you hear unusual sounds coming from your computer, turn it off immediately to avoid further damage.

Laptop Safety Tips

Laptop Security password tips
Do NOT leave your Laptop unattended. Laptops should not be stored in student lockers.Purchase a locking security cable to attach to your laptop around an immovable object.Set your BIOS password. The BIOS is required to boot the computers. If the BIOS is password protected, the computer will not boot (or you will not be able to enter or change the BIOS settings.) Check your laptop manual on how to set your BIOS password. (This is a separate password than a windows password).Regularly change access passwords (both BIOS and e-mail passwords).
1.Never use any option that “remembers” your password so that you do not have to re-enter it the next time you connect
2.Back up key data onto floppy disks. Carry all disks separately from the laptop.
3.Make hard copies of important files and documents.
4.Keep the amount of data stored on your machine to a minimum.
Write down the laptop model type, model number, serial number and specs.Mark your laptop to make it unique and easy to identify (i.e. engraved).

Laptop advanced safe tips:
1.Always back up your files.

Any file saved to your file server account (Explore, Learn, Reflect, or Discover) will be backed up daily by Computing Services. However, backing up files on your laptop is your responsibility. With a laptop, you are not only at risk for losing work due to a hard drive failure, but also at risk for losing all your files due to loss or theft.
1.We purchase insurance for all new laptops, but this will only help replace your laptop; your files will be gone permanently.
2.This can be devastating if your laptop is the only place you're storing your dissertation, a grant proposal, your tax records, or any other personal or confidential files.There are several ways to back up files from a laptop.
3.You can save a copy to a floppy or zip disk. If you have a modem, you can e-mail files to your office computer.
4.If you have a network card, you can plug your laptop into the LRDC network and save your files to your file server account.
2.Don't save your passwords on your laptop.
remember
e-mail and dial-up software allow users to save their passwords. Although this makes using your laptop convenient and easy, if your laptop is lost or stolen, complete strangers will have total access to your e-mail messages and Internet access.
3.Be careful when placing your laptop on an airport .
1.The most common laptop theft scam involves two people working together to steal your laptop directly from the security convener belt. After spotting your laptop carrying case, they get in line for the metal detector directly in front of you.
2.The first thief walks through the security check with no problem.
The second thief has a great deal of trouble, emptying pockets and checking for jewelry several times, which distracts you and the security personnel. At this point, you may have already placed your luggage on the conveyor belt.
3.This allows the first thief to walk away with your laptop, while the second prevents you from walking through the metal detector. To prevent this from happening to you, wait until the last possible moment to put your laptop on the conveyor belt to assure you will be the only person able to pick it up at the other end.
4.Label your laptop and all accessories.

1.Many people at LRDC have identical laptops. Label or tape your business card to the top of your laptop and to all of your laptop accessories to help prevent someone from accidentally taking your equipment.
5.use a laptop carrying cases

2.In addition to being designed to carry all your laptop accessories, laptop carrying cases are designed to provide protection. Newer laptops are more robust, but it's still easy to crack the screen.
3.Replacement screens can cost almost as much as the laptop itself and are not covered by warranties or insurance. Also, repair time will typically be 1-2 weeks.
6.Be careful when plugging your laptop.
1.The modem and 10BaseT connections on your laptop look similar. A 10BaseT cable allows you to attach to a local area network. It is wider than a phone line and will not fit into your modem. However, a phone line will easily fit into a 10BaseT connection.
2.This of course will not work and if the phone rings while you have it plugged in, the voltage will be enough to potentially cause severe damage to your laptop. Also, when traveling to other sites, make sure you use an analog line.
3.Digital lines carry more electricity than analog lines and can also irreparably damage your modem.
7.Never allow other people to use your laptop.
1.When traveling to another site, it can be very tempting to allow someone to make changes to your network settings in order to allow you to connect to their local area network. This can result in them accidentally wiping out your current dial-up and LRDC network settings.
2.Allowing your children to use your laptop also puts you at risk.
3.If they install programs—especially games, shareware, and screen-savers—you are at risk for software incompatibilities, which can result in computer crashes.
4.This also puts you at an increased risk for computer viruses. Either situation can result in a full-days repair.
8.How to maintain laptop
(In weather)

It’s that time of year again in North America where temperatures climb and weather becomes erratic. Add to that the possibility of power outages and you have new challenges to face when using your laptop. Take care in warm and hot weather to follow these tips to ensure you use your laptop safely and don’t have any problems with it.

1.Heat Range
1.Most laptop computers operate properly in the safe temperature range of 50 to 95 degrees Fahrenheit or 10 to 35 degrees Celsius.
2.Keep in mind that when bringing a laptop in from the warm hot air, the laptop must cool down to the interior temperature before you use it.
3.By the same token if you use your laptop outdoors, then let the laptop warm up to the outside temperature before starting it up.
2.In Cars

4.Just as you wouldn’t leave people or animals in a car in hot weather, you should not leave your laptop and other mobile gear either.
5.Leaving your laptop closed in a vehicle in hot temperatures will cause damage to your laptop.
6.The heat is not good for the internal components or the external casings.
3.sharp Sun

1.Never leave your laptop where it is exposed to direct sunlight, whether it is in use or shut down.
2.If you must use your laptop outside in bright conditions you can use either:
a laptop glare screen which cuts down on the glare caused by the sun
a laptop hood which cuts down on the amount of light directed at the laptop display.
4.Humidity
1.In warm weather people are fond of saying it’s not the heat itself that bothers them but the dreaded humidity.
2.Humidity is the amount of moisture in the air and the recommended safe range of relative humidity is 10-80%.
3.Moisture can cause damage to the internal components of a laptop and you may not even realize that the damage has occurred.
5.Take it Out
1.If you use your laptop in hot temperatures consider using a removable hard drive to store your data on. This way you can help protect your data and ensure that your removable hard drive stays protected from exposure to heat and the sun.
6.Weather Watching
1.In warm, hot weather there are more storms, often with little or no warning and more severe weather occurrences which mobile professionals must face when traveling.
2.Equipment to help protect your mobile gear includes having surge protectors, power investors and spare batteries.
3.External battery charges that don’t require an electrical connection are another wise investment.
7.t Cool
1.Use a laptop stand to disperse heat that your laptop generates.
2.Laptop stands are available in a variety of styles to suit your working needs.
3.There are laptop stands which include fans to help dissipate the heat and keep your laptop working at its best.
Note :Laptop Desks & Laptop Stands
8.Pack it Wisely
1.Using a properly fitted and well-padded laptop case for your mobile gear will help keep it insulated against heat, moisture and direct sunlight.
2.When buying your laptop case make sure all your mobile gear will fit securely and be protected from the effects of weather

9. on the road
3.The newest laptops are powerful, light, and thin enough to fit easily into the slenderest of carry-on baggage. *This makes them a great accessory for flying or any other mode of travel, but also easier to lose or have stolen.
4.It pays to be extra vigilant at airport security checkpoints where thieves know people can be flustered.
5.You should also store your laptop in the seat in front of you, instead of in the overhead compartment when you fly.
6.But even if you're extra careful, it's still possible to lose your laptop.
7.If you spend some time securing your laptop before you go on the road, you could help keep your personal or financial information from falling into the wrong hands.
8.Here are our top tips to help you secure the information on your laptop.
Protect your information If you keep a lot of personal or financial information on your computer, invest in an operating system that includes file protection.
9.Windows Vista and Windows XP Professional have the tools to protect your information through a process called encryption.
10.To learn more, see Encrypt Your Data to Keep It Safe .
11.Protect your laptop with a strong password If you travel with your laptop frequently, you should secure it with a strong password.
12.Check your computer's Help and Support service to learn how to add or change your system password.
13.To find out how to create passwords that are tough for hackers to crack, but easy for you to remember, see Strong passwords: How to create and use them.
14.Back up before you go Always back up your information before you take your laptop on a trip.
15.You can't always avoid the financial loss of your equipment, but you can avoid losing all your information in the process.
16.To learn how to make copies of all of your information using Windows XP, see How to back up manually or by using the Windows XP Backup utility.
For Windows Vista, see Windows Vista: Windows Backup.
If you use Windows Live one care, see Windows Live one care Backup and Restore.

Remember
:-
Delete
e-mails from your in box folder and save important e-mails to a different folder.
Set your Identification: Under settings, choose control Panel. Click Network Icon and click Identification tab. Computer name: Type your Suffolk e-mail address (first 3 letters of last name followed by first 5 digits of your Suffolk ID number) Work group: law laptop Computer Description: your Suffolk e-mail address.


Security for your computer

good computer security can seem like a daunting task. Fortunately, following the few simple steps outlined below can provide a good measure of security in very little time.
Use anti virus software and keep it updated. You should check for new definition updates daily. Most anti virus software can be configured to do this automatically.
{Top Anti virus Software}
{Top Spy ware Scanners}
Anti virus 100% Free Norton Anti virus Free ! Delete all Viruses - 100% Free!Norton.
Install security patches.
*Vulnerabilities in software are constantly being discovered and they don't discriminate by vendor or platform. It's not simply a matter of updating Windows; at least monthly, check for and apply updates for all software you use.
For Windows updates, visit the Windows Update Center
Use a firewall. No Internet connection is safe without one.
most use full tips your computer:-

*Download Panda Anti virus Kill all Viruses & Spy wares with the latest Panda Anti virus software's.

*Firewalls are necessary even if you have a dial-up Internet connection - it takes only minutes for a a non-firewall ed computer to be infected.
Free zone alarm Firewall
Using the Windows Firewall

*Secure your browser. If you use Internet Explorer, you will be able to take advantage of the security zones settings to ensure optimum browsing safety. Not only will you enjoy safer browsing, you'll be able to eliminate unwanted pop-ups as well.

Securing Internet Explorer

*Take control of your email. Avoid opening email attachments received unexpectedly - no matter who appears to have sent it.

*Reading email in plain text offers important security benefits that more than offset the loss of pretty colored fonts.

*Remember that most worms and Trojan-laden spam try to spoof the sender's name. And make sure your email client isn't leaving you open to infection.
(Plain(text) is Better)
How To Secure Your Email:-

*Avoid P2P and distributed file sharing.

*Torrent, Kazan, Untellable, Morpheus and at least a dozen other file sharing networks exist.

*Most are free. And all are rife with Trojans, viruses, worms, aware, spy ware, and every other form of malicious code imaginable.
*There's no such thing as safe anonymous file sharing. Avoid it like the plague.

*Keep abreast of Internet scams.

*Criminals think of clever ways to separate you from your hard earned cash.

*Don't get fooled by emails telling sad stories, or making unsolicited job offers, or promising lotto winnings.
*Likewise, beware of email masquerading as a security concern from your bank or other commerce site.

*Don't fall victim to virus hoaxes. Dire sounding email spreading FUD about non-existent threats serve only to spread needless alarm and may even cause you to delete perfectly legitimate files in response.

Remember:-
There's far more good than bad on the Internet. The goal isn't to be paranoid. The goal is to be cautious, aware, and even suspicious. By following the tips above and becoming actively engaged in your own security, you'll not only be protecting yourself, you'll be contributing to the protection and betterment of the Internet as a whole.

safety tips for using a all computer's

Are public computers at libraries, schools,house, office, internet cafes, airports, and copy shops safe?

1).Update your virus software weekly - there are always new viruses.

2)Scan for viruses every night - you have to do it these days.

3)Back up all your data files at least weekly to a tape drive - lots of people lose everything!

4)Take one copy of your back-up disk to a second location in case of emergency - many people have thanked me for this advice.

5)Use a firewall if you have DSL or a Cable Modem connection - or you will become infected with a virus or harmful file.
6)Upgrade to Windows2000 or XP for more security and less reboots!

7)Keep a back-up of all you files on another hard disk - easy to retrieve

8)Don't DEFRAG more then once a month - too often wears on your hard disk.

9)Don't fill your hard disk with too many MP3 files - keep a min. of 300 MB available.

10)Get a good back-up battery - Just a surge protector is not enough.

11)Despite what others have told you, it is better for your computer (not server) to be shut down every night.

12)Windows 95 and 98 particularly likes to be restarted. Windows 2000 and XP are better designed to be on all the time, however, your system may still heat up and reduce the life of your hard drive if you leave it on all the time.

point 1
*
Don't save your login information. Always log out of Web sites by clicking "log out" on the site. It's not enough to simply close the browser window or type in another address.
*Many programs (especially instant messenger programs) include automatic login features that will save your user name and password. Disable this option so no one can log in as you.

point 2
*Don't leave the computer unattended with sensitive information on the screen. If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information.
point 3
*Erase your tracks. Web browsers such as Internet Explorer keep a record of your passwords and every page you visit, even after you’ve closed them and logged out.
*To disable the feature that stores passwords.
Before you go to the Web, turn off the Internet Explorer feature that "remembers" your passwords.
1. In Internet Explorer, click Tools, and then click Internet Options.

2. Click the Content tab, and then click auto complete.

3. Click to clear both check boxes having to do with passwords.

To delete your temporary Internet files and your history
When you finish your use of a public computer, you should delete all the temporary files and your Internet history.

1. In Internet Explorer, click Tools, and then click Internet Options.

2. On the General tab, under Temporary Internet files, click Delete Files, and then click Delete Cookies.

3. Under History, click Clear History.

To delete other files saved by corporate portals, such as Share point Portal Server
If you're using a corporate Web site that allows you to view internal corporate documents, you may be inadvertently storing sensitive documents on the public computer.

1. Delete all the files in the temporary folder of your user account which you can find by browsing to C:\Documents and Settings\user name\Local Settings\Temp.

2. If your company uses Microsoft Office share point Portal Server, empty the temporary folder (My Documents\share point Drafts).

point 4
*Watch for over-the-shoulder snoops. When you use a public computer, be on the look out for thieves who look over your shoulder or watch as you enter sensitive passwords to collect your information.

point 5
*Don't enter sensitive information into a public computer. These measures provide some protection against casual hackers who use a public computer after you have.

*But keep in mind that an industrious thief might have installed sophisticated software on the public computer that records every keystroke and then e-mails that information back to the thief.

*Then it doesn't matter if you haven't saved your information or if you've erased your tracks.

They still have access to this information.
If you really want to be safe, avoid typing your credit card number or any other financial or otherwise sensitive information into any public computer.



THAN Q FOR VISITING OUR COMPUTER SAFETY TIPS WEBSITE