IT tutorials
 
Windows
 

Windows 8 : Security - Safe Computing

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
5/9/2013 3:09:07 AM

Windows 8 is a very complex operating system that was designed to allow developers to do just about anything you can think of. Microsoft has certain rules of the road that developers and the programs they create must follow to keep users safe. For the most part, users aren’t expected to have to think about safety; Microsoft tried to engineer automated security into Windows 8. However, vulnerabilities can be exploited. You can eliminate 95 percent of the serious problems you might encounter by obeying the following ten commandments.

Commandment 1. Thou shalt update your Windows 8 computer immediately and completely.

Windows Update is Microsoft’s push subscription service for delivering Windows operating system and Microsoft Office upgrades and patches. Since the bad guys watch for patches and vulnerabilities and attack them as soon as they can, you need to use Windows Update to immediately install updates.

Image

 The Windows Update icon

Commandment 2. A user shalt thou be.

Always log in as a user, not as an administrator. You can view and change your account privileges in the User Accounts control panel to give you the access you need on a daily basis. When you run as an administrator , your privileges are too broad and can be used to compromise your system. Elevate your privileges only when you are installing software or performing a task that requires it. Also, you should never give away your account login information.

Image

 The Run As Administrator command

Commandment 3. Thou shalt hide behind the firewall.

When you place your computer behind a router or firewall, it becomes much harder for evildoers to find your system and attack it. You should turn on Windows Firewall  and allow only the types of incoming traffic you approve. 

Image

 The Windows Firewall icon

Commandment 4. Thou shalt run an antivirus program.

Windows Defender , described later in this chapter, is a very competent program and is turned on by default. If you don’t have an antivirus program running, Windows 8 will complain.

Image

 The Windows Defender icon

Commandment 5. Thou shalt not open email attachments from unknown sources.

When you open an email attachment , you run the risk of running a program that can modify your system. Attachments that are programs are no longer labeled as such, so make sure that you are certain of the source of the attachment and its purpose before opening it.

Image

 Beware of attachments.

Commandment 6. Thou shalt not tap or click links in emails from unknown sources.

A link  may take you to a web page that contains programs that compromise your system.

Image

 Beware of links—especially deals that are too good to be true.

Commandment 7. Thou shalt not download files from untrusted sources.

Evil knows no limits. Avoid the ten plagues contained in unknown files by downloading  only from known sources.

Image

 Know whence thy download comes.

Commandment 8. Thou shalt not expose thyself to others.

The dark forces want to know who you are; indeed, they want to know everything about you. With just your name and social security or credit card number, almost anything is possible. Be especially careful when entering personal information into a computer. Make sure that a site’s URL matches what you expect to see, and that you are using an HTTPS connection. Impersonation, or phishing, is a common technique used to compromise your system.

Commandment 9. Thou shalt use strong passwords (but not strong language).

A strong password  has the following attributes: It is not a word; it is not a name; it does not appear in a dictionary or encyclopedia; it cannot be looked up on a search engine; it contains both upper- and lowercase letters; it contains at least one number or symbol. The longer the password, the better.

Image

 Use numbers, symbols, and a mix of upper- and lowercase letters.

Commandment 10. Thou shalt back up not once, not twice, but thrice.

Avert Armageddon: Store three copies of every file—one on two different types of media, and one copy stored at a separate location. This is called 3-2-1 backup , a philosophy outlined by Peter Krogh in his book The DAM Book: Digital Access Management for Photographers.

Hosanna to Leo Laporte at TWiT.tv for proselytizing for safe computing on his many podcasts. These commandments are based in part on his advice.

Image

 3-2-1 backup: three copies, two media, one copy offsite

Advice on good security practices could fill a book; this chapter can provide only some of the basic information. Microsoft maintains an extensive security site called the Microsoft Safety & Security Center  (www.microsoft.com/security/), which provides background information, tips, updates, and fixes.

Image

 The Windows Safety & Security Center is a good place to learn about safe computing on Windows 8.


Tip

Never rely on manual systems for protection. Set up your backups to run automatically so that you are always protected.

 
Others
 
- Windows Small Business Server 2011 : Recovering Backups (part 3) - Recovering the Operating System, Restoring a Backup Catalog
- Windows Small Business Server 2011 : Recovering Backups (part 2) - Recovering Applications and Data
- Windows Small Business Server 2011 : Recovering Backups (part 1) - Recovering Your Server, Recovering Volumes, Recovering Files and Folders from the Local Server
- Windows Small Business Server 2011 : Using the Backup Once Wizard
- Automating Windows 8 Configuration : Managing Preference Items
- Automating Windows 8 Configuration : Configuring Group Policy Preferences
- Automating Windows 8 Configuration : Understanding Group Policy Preferences
- Using Windows Home Server’s Command-Line Tools : Understanding Batch File Basics (part 2)
- Using Windows Home Server’s Command-Line Tools : Understanding Batch File Basics (part 1)
- Windows 7 : Email and Newsgroups with Windows Live Mail - Finding and Reading Newsgroups
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us