Lily: Why does anyone want to hack my computer?
Keep hackers out of your computer
In addition to following the basic steps such as updating your Windows operating system and software, enabling firewall, using good antivirus software, or an Internet security suite, here are some precautions to follow.
- Use a secure password for user and online accounts
- Eliminate shit
- Choose your web browser wisely – use security modules
- Use HTTPS as much as possible
- Use 2-step authentication (or MFA) whenever possible
- Turn off your computer or internet connection
- Use common sense
Protect yourself from hackers!
2]Use a secure password for user and online accounts
Simple passwords make it easy for anyone to sign in and take over your account. In most cases, hackers will change your password after taking control of your machine so that you cannot log in. What happens next to recover the machine is a tedious process. It is always recommended to use secure passwords, which contain alphanumeric characters and also include special characters.
You can force Windows users to apply the login password policy and create a secure password. You can also block your account after three attempts. Read our article on limiting login attempts.
For online accounts, I would recommend using password management software such as LastPass, which generates secure passwords and stores them securely so that you can use them without having to remember them. Also, it’s best to have different passwords for different sites, so if one account is compromised, the others are still secure. The first of all tips to prevent piracy is to use a secure password.
3]Erase the shit
You never know what kind of programs are installed on your computer when you buy a new one. Lenovo set a good example by installing Superfish that allowed cybercriminals to launch Man in the Middle attacks. A new computer comes with a lot of software that you will never need. The first step after buying a new computer is to remove all the software and programs that you do not need. There are some third-party crapware removal tools that allow you to decide which programs you want to maintain and automate crapware removal. You can use any of these programs, or you can manually remove unwanted programs and toolbars. The manual method is safer but requires a bit of sweat on your part. If you see a program that you don’t understand, it’s best to consult someone and then remove it.
Web browsers are the means by which we can connect to and interact with the Internet. There are many browsers on the market. Choose your browser wisely. It should be able to protect you even when you’re browsing. For example, Internet Explorer has a SmartScreen Filter that tries to check the reliability of websites. If you use Google Chrome, you’ll find add-ons that tell you if a website is trusted. Similarly, for Firefox, NoScript allows you to browse safely by blocking unwanted scripts. You can only allow scripts on the websites you choose. Also, make sure your browser is always up to date, as this is a common vector used by hackers to compromise systems.
5]Use HTTPS as much as possible
HTTP stands for Hyper Text Transfer Protocol. HTTPS is an advanced version that has an S added to the protocol and means that the connection to the website would be “secure”. By “secure” it means “encrypted”. Cannot do HTTPS only. For a website to become HTTPS, it must pass a variety of tests to see if the website is really as secure as it is supposed to be. Almost all social networking sites offer HTTPS. All e-commerce stores also offer HTTPS. With HTTPS, you are more secure than a simple secure or insecure HTTP connection.
To make sure you remember to use HTTPS, you can set up Group Policy in Windows 8.1. Browser plug-ins are available to ensure that websites are required to always load the HTTPS version so that your login credentials and bank or card details are secure. One of these plugins is “HTTPS Everywhere” and is available for browsers based on Google Chrome and Firefox. For Internet Explorer, well, it’s being rolled out with Windows 10, and hopefully the new “Spartan” browser will have something similar sooner or later.
6]Use 2-step authentication (or MFA) whenever possible
Most websites currently offer two-step authentication. That is, in addition to signing in with your user ID and password, you must enter additional information that is sent to a personal device such as a phone. Banking websites, cloud storage, etc. offer you the advantage of two-factor authentication. Some social networking sites and email service providers also offer this feature. This helps keep you safe because even if someone can decrypt your password, they may not be able to access your account because the second step is usually linked to a personal device, usually a phone, to which associates a PIN code. sent. Unless the hacker also has access to the phone, login attempts will fail and you will be safe.
2-step authentication can be a bit annoying when using multiple devices or clients to access accounts. For example, if you try to sign in with your phone and the message is sent to your phone, you need to log out of the app to verify your PIN. Sometimes it gets frustrating. In such cases, you may need to create an application password for each client or device to facilitate use from devices such as phones or tablets. Learn how to secure a OneDrive account with 2-step authentication. As they say, prevention is always better than cure.
7]Turn off your computer or internet connection
Finally, always turn off your computer or disconnect your internet connection. In fact, with the growth of high-speed Internet connections, many users choose to keep their computer on all the time, even when they are away from the machine for a long period of time. These “always on” computers are more sensitive.
8]Use common sense
Do not download email attachments from unknown senders. These days, you also need to be very careful about what you download and where you download it from. These and many other rules must also be followed. Be alert at all times. The online world can be as bad as the offline world!
There is no infallible protection against hackers and malware. These hacking tips are just a few of the many computer precautions you should take.
If you want to share other tips for preventing piracy and hacking, do so.
Read more: Free Anti-Piracy Software for Windows PCs