Software, your way.
burger menu icon
WillMaster

WillMasterBlog > Misc

FREE! Coding tips, tricks, and treasures.

Possibilities weekly ezine

Get the weekly email website developers read:

 

Your email address

name@example.com
YES! Send Possibilities every week!

6 Basic Security Rules You Can Follow

Doing a few things correctly, always following a few rules – things you can actually do – will achieve a lot of security.

Computer security is one area where logic must prevail over emotion. Thinking or believing everything is being done securely is not the same as actually doing so.

Below are a few basic security rules and reasons. It is not comprehensive. Even security experts admit it is impossible to do everything right all the time.

Still, if you follow the rules presented here, your computer will be more secure than many or most other peoples'. Thieves and crackers have something in common: In general, when a car or house is locked or a computer is secure, they'll try the next one until they find an insecure one.

My qualification for writing this article doesn't come from studying security full time. Instead, it comes from over a decade of internet computer programming, including clean-up of infected websites. Understand I am not a security expert. I just know some things about it that can help reduce personal risk associated with lax security.

Here are 6 basic security rules you can follow.

Rule 1: Keep your computer's operating system and other software updated.

Why? Responsible software publishers update their software to close security holes when they are revealed. Crackers search for old versions of software to take advantage of known security issues.

Rule 2: Install professional and effective virus/trojan software and run it as recommended by the software publisher or distributor. Keep the software updated.

Why? To reduce to a minimum the chance of becoming infected.

A malware infection can:

  • Put your usernames and passwords into the hands of crackers.
  • Spam from your computer.
  • Infect your friends's computers.
  • Infect your websites.
  • Other nasty things.

Virus and trojans can

  • Damage your data beyond recovery.
  • Spread to other computers.
  • Other nasty things.

Rule 3: When your computer asks if it is OK to run or install something, don't habitually click the affirmative button. Instead, pay attention to what is being asked and decide whether or not you really want to run or install the thing.

Why? Virus/trojan/malware software may be asking for permission to run, perhaps with benign-seeming names. Don't unwittingly grant bad software permission to wreak havoc on your computer.

Rule 4: Use a unique and strong password for everything.

Why? A strong password to avoid guessing. Still, just in case, guessing or otherwise obtaining one of your passwords gives crackers access to only one account. If several accounts had the same password, the cracker would have the password to each of those accounts.

Rule 5: Don't click on any link in email that purports to be related to a website where you would have to log in. Instead, when you want to log in, type the website's URL into your browser's address bar or use your own bookmarks.

Why? The link in the email could be a malicious link to get a virus or trojan or some malware into your computer. There are numerous ways, some quite devious, to make malicious links appear benevolent, to make you think the link is to one place when it actually sends your browser to another. (And, that other can actually and truly look exactly like the website you are used to – the crackers just copied the website to fool you.)

Rule 6: Don't open email attachments, even when sent from a friend's email address, unless you were expecting it.

Why? Opening a cracker's attachment can infect your computer. The reason not to open attachments, even when sent from a friend's email address, is because the friend's email address may be spoofed in the email or the friend's email account may have been broken into.

Bonus rule: Rely on your intelligent examination of the things you do to conclude you are doing things in a secure manner.

Why? When it comes to computer security, belief and confidence are no substitute for the actuality.

Those rules are things you can actually do. Following them will achieve a lot of security for you.

Will Bontrager

Was this blog post helpful to you?
(anonymous form)

Support This Website

Some of our support is from people like you who see the value of all that's offered for FREE at this website.

"Yes, let me contribute."

Amount (USD):

Tap to Choose
Contribution
Method


All information in WillMaster Blog articles is presented AS-IS.

We only suggest and recommend what we believe is of value. As remuneration for the time and research involved to provide quality links, we generally use affiliate links when we can. Whenever we link to something not our own, you should assume they are affiliate links or that we benefit in some way.

Recent Articles in the Library

Submit Form Data Without Bothering User

To silently and effectively submit a form on a web page, Ajax with FormData() can be used.

CSS Dots

CSS dots can be used for interactions between web page and website user.

Email Testing

One thing to test when email doesn't get sent or doesn't arrive is whether the server actuall sends email.

Tap to Select

Find out how to make a link or button to select the content in a div or other HTML element.

Capitalizing the First Letter of Words

Here, find both PHP code and JavaScript code to capitalize the first letter of a word.

Fixed-position Table Header

During a vertical scroll, the table header scrolls out of view -- unless the header is fixed in position.

Simple Floating Menu

When not needed, the menu on the left side of a web page retracts to be out of the way. Tap it and it expands.

How Can We Help You? balloons
How Can We Help You?
bullet Custom Programming
bullet Ready-Made Software
bullet Technical Support
bullet Possibilities Newsletter
bullet Website "How-To" Info
bullet Useful Information List

© 1998-2001 William and Mari Bontrager
© 2001-2011 Bontrager Connection, LLC
© 2011-2024 Will Bontrager Software LLC