Menu
Is free
check in
the main  /  Programs / How to protect your computer from unauthorized password access. How to protect your computer from hacker penetration: Useful Tips

How to protect your computer from unauthorized password access. How to protect your computer from hacker penetration: Useful Tips

Computer viruses deliver many troubles and problems to many users. And all of them in the overwhelming majority of cases are installed antivirus. The output one - the antivirus does not provide the necessary level of protection. This problem needs to be solved by comprehensive computer configuration and learning the basics of security.

1. What you need to know about viruses

The virus is a malicious program created by an attacker. The purpose of the first viruses was the self-affirmation of their creators, and their action was harmful to the computer. Today, the overwhelming majority of viruses are essential to illegally receiving funds in one way or another.

In order to effectively protect against viruses, you need to know how they act. The main tasks of viruses is to penetrate the user's computer, provide your launch, protect yourself from detecting and deleting, destructive actions.

2. Types of viruses

Viruses infect the computer in various ways and depending on this are divided into different types.

File virus

Infects other programs and files by adding their own software code. Thus, when starting an infected program or file, malicious code is performed. If system files are infected with the virus, the malicious code is automatically started with each computer loading.

Worm

Worm is a self-changing virus. Penetrating the user's computer, the worm duplicates itself, places many copies in different folders With different names, which makes it difficult to remove it. Worms can also be copied through local network In public folders on other computers, send themselves e-mail through messaging programs and using network attacks.

Double virus

Some viruses remove or make hidden files and user folders and replace them with malicious files with the same icons and names. The user tries to open them and runs malicious code. Such viruses are encountered now on flash drives.

Troyan

Trojans call viruses that do not infect other files, but place their own files on the user's computer. Often these files are located in the operating system folders, are masked for system files, are written to autoload and run each other to download the computer. Trojan identification is harder, since their actions are similar to other programs that also add their files into the system and start with the computer.

False program

Some viruses are masked for useful programs for downloading files from the Internet, viewing video on sites, improving computer performance and even virus protection The user itself installs the program, uses it and does not even suspect its "undocumented capabilities".

Also such programs are often trying to get money from the user. For example, a false antivirus or a program to eliminate errors in the system detects several dozen non-existent viruses or problems on your computer, some of them are properly fixed for free, and the rest after purchasing the full version or send SMS. This is a classic fraud.

3. Actions of viruses

Regardless of the method of infecting a computer, viruses can produce various actions and on this feature are also divided into different types.

Displays obsessive advertising in Internet browsers, replace the address of the homepage, redirect users to various sites. Installed as an additional program, plug-in or browser panel with other free programs or under the guise of something useful from the Internet.

Spies and keylogeres

Designed to theft of confidential information and passwords. The user's actions are followed, looking for confidential information on the computer, collect data entered from the keyboard, from the clipboard, screenshots of the screen and send them to an attacker. The purpose of such programs is the most different data. Bank card numbers allow you to steal funds from the bank account. With hacking accounts of social networks and Skype, messages can be sent to your friends with a proposal to download some file or visit the site. Mail can be used to send spam. Licensed keys Programs, account and property from online games can be sold.

Furgents-blockers

Block the operation of the operating system and display a message with the requirement to send an SMS or pay a certain amount for some account. After that, promises to unlock the computer. But in the overwhelming majority of cases, unlocking does not occur. In order to remove such a virus and restore the normal operation of the computer you need to have some experience.

Locker extortionists may report that you allegedly violated the Windows license agreement, submit to law enforcement agencies (Ministry of Internal Affairs), show shocking pictures and text of obscene content.

Enterprises-encrypters

Imperceptibly encrypt on the computer all custom files - Documents, photos, videos, etc. When all files are encrypted on the screen, a message appears with the request to send an SMS or pay a certain amount for some account. After that, it is promised to execute files. But in most cases, the decoding does not occur.

Restore encrypted files is possible only from the backup. I recommend to store valuable files (documents, photos, etc.) on the external disk.


Batnets

Apply to a large number of computers and provide an attacker access to them. The virus does not show itself as long as he does not receive a special team. Infected computers (zombies) are used to organize large-scale attacks on enterprise servers, government agencies and spam mailing.

Backdors

Open access to the computer. Using them the attacker can download various malicious programs on the computer. As you need, these programs can be deleted or replaced by others.

4. Ways of penetration of viruses

Viruses can penetrate a computer with several ways - with an infected flash drive, a CD / DVD disk, from the Internet and local computer network. In this case, various vulnerabilities in the operating system, programs, social engineering and phishing can be used.

Flashki

Many viruses are distributed using files on flash drives and external disks. It is enough to insert a flash drive into an infected computer and the virus will immediately be on it. Then when inserting a flash drive into a healthy computer, the virus is transferred to it. After that, the newly infected computer begins to infect other flash drives.

CD/ DVD.- Disci

Viruses can be transferred via CD / DVDs. It can be both infected user files and viruses penetrated through the disk recording program.

the Internet

On the Internet, many infected files and programs, after downloading and opening, the computer is infected with the virus. In addition, on modern sites, scripts and other technologies based on the program code are used to enhance interactivity. The attackers create scripts designed to spread viruses. It is enough to go to the site with such a script and the virus is already on your computer, even if you have not downloaded anything and have not been installed.

The local network

If one of the computers united to the local network with other computers will be infected, then viruses can be transmitted to other computers through publicly available folders or using network attacks. If your provider other than the Internet service has a local network, the intensity of network attacks and the probability of infection will be high.

Vulnerabilities in the system

Network attacks are constantly produced on the computer computers, which are possible both from the local network and from the Internet. They use various vulnerabilities in the operating system, network services and drivers. Special network packages are sent to the user's computer, which lead to failures in the operation of software components in order to intercept control over them. Then the loophole is created in them, through which the virus hits the computer. To infiltrate, it is enough to connect the computer to the local network or the Internet, no user actions are required.

Vulnerabilities in programs

Viruses can also penetrate a computer through various vulnerabilities in programs. It can be both network attacks on programs using Internet and various infected files. For example, malicious code can be implemented in Word, Excel, PDF file or in any other. When opening an infected file, there is interception of control over the program and the further introduction of the virus into the system.

Social engineering

Many viruses apply with email And Internet sites by believing the user in the fact that it will get something useful, valuable or interesting if it opens a certain file or goes to some site. If the user believes and implements the proposed action, then its computer will be infected with the virus.

Also, users are sent emails, messages in social networks, skype, SMS, and even come calls to report some personal data. At the same time, the attacker may be represented by an employee of the bank, the support service of some site and even another or relative.

Phishing

Phishing is a substitution of an address of a popular site in order to infect the computer with a virus or get confidential information.

There are reports of users allegedly on behalf of the site administration or social network where it is really registered, with a proposal to go to the site to solve some question and suggests a link very similar to the official address of the site. If the user passes through this link, then its computer is infected with the virus.

Also, the attackers create special sites exactly repeating the authorization pages of official websites of banks, postal services, social networks, online games, etc. The site address, too, can also be very similar. Then the users are sent out an email allegedly on behalf of the site, with some notice and reference to go to the site. By clicking on the link, the user hits the fake authorization page where you are invited to enter a login and password. After entering the password, it is sent by an attacker and occurs when the account is taken, and the user is redirected to the real website and does not notice the substitution.

After the virus enters the computer, it is prescribed to the startup to run each time the computer is turned on. Here are the main ways to start viruses:

  • Task Manager
  • Windows registry
  • Windows services
  • Plugins and panels of Internet browsers
  • Windows Explorer plugins
  • Infected system files
  • Boot sector or disc partition
  • Alternative NTFS streams
  • Network stack
  • Pool print
  • In addition, there are still hundreds of so-called autorun points. The same virus can use several of them at once. This greatly complicates the identification and removal of malicious programs.

    6. Self-defense of viruses

    Almost any virus, penetrating the computer and speaking into autoload, tries to protect itself from detecting and removing in various ways.

    Automatic restart

    The easiest way to protect the virus is to start several independent processes that are followed by each other. If one of the processes is completed, then the remaining restarts it. This complicates the disconnection of the virus to remove it.

    Protection against deletion

    Viral processes in the memory of the computer are followed by the virus files on the disk and autorun points. If the user or antivirus deletes the virus file or the point of its autorun, the virus processes in the memory of them are restored. Also, the self-restoration of the virus can occur with each computer loading.

    Disguise

    More advanced modern viruses use various methods disguise.

    Often, their encryption is used to protect viral files from detection, which does not allow anti-virus programs to identify malicious code. When loading the virus code is extracted from the encrypted file and is placed in the computer's memory.

    Polymorphic (mutating) viruses change their code with each infection of the new computer, and sometimes even with each computer reboot. This does not allow an antivirus capabilities to identify malicious code for already known signatures.

    Ruckites are special components included in the complex of protection of modern viruses. They penetrate the kernel of the operating system and have the highest powers. Rucker are designed to hide the virus from the antivirus program. For example, they can intercept antivirus appeals to the disk and the registry, delete the names of viral files from the data stream, the registry settings and transmit an antivirus to the closer data.

    Also, the virus itself can work in kernel mode, where only the most important components of the system have access to access, such as device drivers. From there they can even fight antivirus programs.

    Neutralization of antivirus

    Some high-tech viruses can successfully confront antivirus programs, fully or partially neutralize their algorithms.

    The most dangerous virus is the one that does not allow himself to detect does not lead to problems in the operating system and long lives on a computer to theft of confidential information and user money.

    7. Basic ways to protect against viruses

    I decided to divide the methods of protection against viruses and security threats to the main - mandatory for everyone, and additional - at the request of the user. In this section, we will consider the basic ways of protection, and in the next talk about additional.

    Modern viruses are high-tech programs with a complex of disguise and self-defense, which is difficult to detect and neutralize. Therefore, integrated measures should also be used to protect against them. This is an antivirus program, overlapping all possible methods Penetration of viruses and following safety principles when working on a computer. All this is not so difficult, just once it is good to configure the computer and not violate certain rules.

    7.1. File virus protection

    In order to protect against viruses of infecting files, it is enough to install any antivirus.

    Paid antiviruses provide a high level of protection and other security threats. Acquire them makes sense if you are dealing with valuable confidential information or carry out serious financial transactions. The best for Russian-speaking countries is Kaspersky Internet Security. If the computer is weak, then you can buy faster and easy Dr.Web Security Space.

    From free, for Windows 7.8.1.10 operating system, I recommend AVAST. For Windows XP - 360 Total Security or Avira. Both programs are fast, lungs and are well suited for weak computers. 360 Total Security has different additional functions - Disk cleaning, tracking windows updates, Protection of a webcam and is suitable for those who love to understand everything. Avira contains all the necessary security elements and is more suitable for minimalism lovers who do not want to delve into the settings.

    Never turn off the antivirus and do not open suspicious files as if it did not want it. In the overwhelming majority of cases you will not get the desired and just harm yourself.

    7.2. Protection against false and infected programs

    Use only popular well-known programs. Download programs only from developer sites and popular well-known sites. Check all downloaded files on Virustotal.com.

    Discard the installation of dubious programs, especially those that, according to the test results on Virustotal.com, are undesirable. Always choose a selective installation and shoot ticks with additionally offered components.

    7.3. Protection against viruses on flash drives

    Protect against the infection of the computer through the USB flash drive is easiest. To do this, disable the autorun flash drives in the Windows registry. I made a special file that sets the desired parameters in the registry automatically and works with all versions of Windows. You have enough to run it and agree on making changes to the registry.

    In order for the changes to take effect, you need to restart the computer. After that, the autorun of viruses from the flash drives will be impossible. Note that the autorun window when inserting flash drives will not appear. You can go to the USB flash drive through the Windows Explorer (my computer).

    You can download the File File File File in the "" section.

    7.4. Protection against viruses on CD / DVDs

    The autorun CD / DVDs could also be disabled in the registry. But the spread of viruses on disks is already rare and antiviruses are easily blocked. And turning off the autorun disc will deliver many inconvenience, since you manually have to look for the autorun program on them. Therefore, I recommend not bothering with it.

    7.5. Protection from scripts in the browser

    For a Firefox browser, there is a very good Noscript plugin. After installing it, some sites may lose part of the functionality. But enough simple click Mouse adding them to the list allowed and their functionality will be restored.

    But you do not need to add everything in a row, but only those sites that you absolutely trust. Then safety on the Internet will be at a fairly high level.

    For browser Chrome. There is a similar plugin Scriptblock. The principle of his action is the same. On the allowed sites, scripts are not blocked, and on the rest you will be safe.

    7.6. Password protection in the browser

    All browsers allow you to remember passwords for sites when you first enter.

    It is convenient, since at the subsequent inputs to this site the password is not required to enter. But this is not safe, since the browser password can be abducted.

    For Firefox and Chrome browsers, there is an excellent LastPass plugin, which also offers to save passwords when entering them on sites, but keeps them in a secure repository. When entering sites, it substitutes a login and password to the right fields, which is very convenient.

    Do not enter your passwords on other people's computers, as they can be infected with a spy or keylogere.

    You can download LastPass plugin in the "" section.

    7.7. Social Engineering Protection

    Do not click on dubious advertising on the Internet, especially on blinking pictures with incredible promises. At best, you will get to the site where you are fraudulent, you will try to convince something to buy, in the worst to the site infected with the virus.

    Never download files and do not follow the links from email messages if they come from addressee unknown to you. No matter how tempting or harmless was this message, in 99% of cases you want to deceive!

    Also, do not open the attachments and do not follow the links from the strange messages that came from someone from your acquaintances (such as looking at my photo or download a cool program). Most likely, this suggests that your acquaintance account hacked and use to send malicious messages. Contact your acquaintance, ask whether he sent you this message and warn you about a possible problem.

    If the message in your opinion may have a high importance (for example, from your bank), call there. Do not inform anyone your passwords for banking operations, email, etc. Official representatives are not entitled to ask.

    Be selective in social networks, do not add everything to your friends who ask you. These people can try to get your personal data, send you messages on infected, fraudulent sites or just fill out with advertising. When suspicious activity appears, remove these people from friends.

    Recently, intruders also often use SMS and even calls to deceive. Do not send response SMS and do not call specified numbersSince the money will be removed for it from your account. Do not follow the links to SMS, with the help of them now apply viruses on smartphones. Specify all the information on official phones and on official sites, and not by contact information that sent you.

    Recently, reports have become frequent that something happened to your relative or you won some very valuable prize (car, house, apartment, etc.) and you are asking for money to settle some moments. Never trust such messages and check the information on reliable channels. The main thing is the understanding of the fact that no one ever gives anyone to anyone. If you did not buy anything and were not registered to participate in the promotion, then this is 99% deception.

    7.8. Protection from Phishing

    To protect yourself from the substitution of the site by Phishing Never proceed by links that are sent to emails. Open the new browser page and go to the desired site from bookmarks or enter the address manually.

    All modern browsers have built-in phishing protection. If the site is defined as phishing, then access to it is blocked.

    Similar blocking windows can be displayed when a malicious software.

    But browsers can define only fakes of the most popular sites or those sites that hit the blacklist.

    The most effectively with phishing is struggling with comprehensive paid antiviruses, such as Kaspersky Internet Security and Dr.Web Security Space. Most popular free antiviruses also have phishing protection.

    7.9. Protection against vulnerabilities in the system

    To protect against vulnerabilities in the operating system, it is necessary to regularly establish important updates, as it is mainly updated security. Go to "Control Panel \\ System and Security \\ Windows Update Update Update Update" and check update settings. I advise you to enable installing updates to automatic mode.

    Despite the fact that the official support for Windows XP is stopped, for some old computers, this is the only system that provides sufficient speed and functionality. There is a way to extend the receipt of security updates for Windows XP until April 2019. To do this, I made a special file that brings a small change in the Windows registry. It is enough to run and agree with the introduction of changes to the registry.

    After that, the installation of security updates in Windows XP will last until April 2019.

    You can download this file in the "" section.

    7.10. Disabling unnecessary services

    Another generally accepted method of protection is to disable excess functional. If potentially vulnerable components are disabled, then the attack is impossible on them. First of all it concerns windows servicesthat work on each computer and most often become objects for attacks. Many of them are not needed for the normal operation of the computer, and their disconnection also has a pleasant bonus in the form of an increase in system speed.

    Hard Drive A-Data Ultimate SU650 120GB

    In order to disable excess services, you need to go to the computer control console. To do this, click on the right mouse button on the "My Computer" or "Windows" icon (in Windows 8.10) and select "Control ...".

    We go to the service section.

    Now you need to click right-click on the service that you want to disable, and select "Properties".

    After that, set the "Start Type: Disabled" and click OK.

    Now, when you enable the computer, the service will not start.

    You can painlessly disable some services that are not network. Also, if you do not have a local computer network, some network services can be disabled. I prepared a description of the most important services and recommendations on their configuration. You can download them in the "" section.

    7.11. Protection against vulnerabilities in programs

    To protect against vulnerabilities in programs, it is advisable to regularly update them to new versions. Most programs have update check. As soon as the update for the program is detected, the user is invited to install it. Do not neglect update programs, especially those who work with the Internet (browser, Skype, torrent client, etc.).

    7.12. Protection against network attacks

    The best way to protect against network attacks is to disable unnecessary services, regularly updating the operating system and programs to eliminate vulnerabilities that are used in attacks.

    But there are also programs specifically to protect against network attacks that are called firewalls. The principle of the firewall is that it does not miss Internet packets to a computer that contains data not requested by the user. For example, if you have entered the site's address in the browser, then in response to get Internet packages with the content of the site and the firewall will miss them. Infected Internet packages come to a computer without a user request and firewall blocks them.

    In operating rooms windows systems There is a built-in firewall, which is called firewall. With a competent system security setting, it is usually enough. But there are also third-party solutions that are more advanced and reliable. If you have valuable confidential information on your computer or you are actively working with payment systems, then additional protection in the form of a good firewall does not prevent.

    Firewall is part of paid antiviruses, the best of which are Kaspersky Internet Security and Dr.Web Security Space. If you have such an antivirus, then your computer is securely protected from network attacks and a separate firewall you do not need. In addition, such a solution will be the best in terms of compatibility of antivirus with firewall.

    From the free most popular firewall is Outpost Firewall Free, which can be installed from the Complex Anti-virus package Outpost Security Suite Free and use in addition to any free antivirus. The disadvantage of such a decision is possible conflicts between antivirus and firewall.

    The best way to protect against attacks from the Internet or local provider is connected to a computer through a router. The router has the functionality of the hardware file. He hides a computer from hackers and reliably blocks all the unsolicited Internet packages even before they fall into the computer. In addition, the router to some extent protects the motherboard from electrical breakdowns by the provider, which happens quite often.

    But the router does not protect against attacks with infected computers connected to a home or office local network, but only from those that come from the Internet. Therefore, the software firewall must work on each computer.

    7.13. Backup system

    Even the quality configuration of the computer and the following security principles do not give 100% guarantees that some tricky virus will not penetrate into the computer. But there is a means that reliably protects you from the consequences of infection. This is the creation.

    The built-in Windows Recovery Tool is not effective. First, it protects only the most important system files, and the virus can be in another place. Secondly, viruses often penetrate backup storage and restored with the system restoration, which reduces the entire backup system.

    In order to create a reliable copy of the system, you need to set up a computer with scratch and make a complete disk "C" using a third-party program. Additionally, it will protect you and from any failures in the system or software.

    One of the best backup programs is Acronis True Image.She is paid. But there is an excellent free alternative - Paragon Rescue Kit Free.

    To successfully back up the system, followed by quick recovery must be observed a few simple conditions.

    User files should not be stored on the "C" disk, otherwise when the system is restored, they will be lost. Note that the files on the "desktop" and in the My Documents folder are physically on the "C" disk. Therefore, store all your files on another section, for example on the "D" disk.

    Do not install the game on the disk, as they occupy a very large volume, which will make it difficult backup and restoring the system. Install the games to another partition, for example, to disk "D".

    Hard Drive A-Data Ultimate SU650 240GB

    Detailed instructions for using backup programs are on developers sites from section "".

    7.14. Backing up files

    A backup copy of the operating system is designed to quickly restore the computer's performance and complete elimination of viruses. But it will not protect your files if you remove or encrypt the virus.

    To protect personal files, you must regularly perform their backup. You can simply copy files on the USB flash drive or external disk standard meansBut it is not so comfortable and can take a lot of time. It is better to use effective synchronization algorithms for this.

    For example, in the popular Total Commander file manager there is a directory synchronization feature. Open the folder with your files on the computer disk, and the folder on the flash drive in the right pane.
    TRANSCEND JETFLASH 790 8GB

    Go to the "Tools \\ Synchronize directories" menu.

    Set all the parameters as in the screenshot above and click the "Compare" button. After the comparison is completed, click the active button "Synchronize".

    One of the best free programs designed for synchronizing files is. The principle of operation is similar, but it works even better.

    In the left pane, the folders you want to synchronize on the disk of your computer, and in the right folder on the flash drive or elsewhere in which backup copies will be stored. After that, first presses the "Compare" button, and then "synchronize". I, for example, synchronize my disk folders on another computer on the local network.

    Synchronization takes significantly less time than copying files, since only new and modified files are copied. In addition, the files you deleted on your computer are deleted from the backup.

    Remember! The question is not that you will lose your files if you do not make backup copies, and when it happens ...

    8. Additional methods of protection against viruses

    In this section, we will look at the additional less popular protective methods that you can apply at your own wishes. However, some of them can significantly increase the protection of your computer.

    8.1. Protection against spies and keylogs

    Exist special programs To protect against spies and keylokers. The most popular of them are Ad-Aware Free AntiVirus +, Malwarebytes Anti-Malware Free, Spyware Terminator. But all modern antiviruses have protection against spies and keylogres, and the use of simultaneously multiple antivirus programs can lead to various problems.

    8.2. Plugin to protect against phishing

    If you work with a large number of social and payment services and want to have additional free protection, you can install a plugin to protect against phishing. One of the most popular is McAfee SiteAdvisor, which supports Firefox and Chrome browsers. It does not require any configuration, but simply blocks phishing and some other malicious sites.

    Similar plugins add some antiviruses to browsers, such as Avast. The link to McAfee Siteadvisor plugin is in the "" section.

    8.3. Protection using DNS servers

    There are special secure DNS servers to protect against malicious sites. One of the most popular free DNS servers belongs to Yandex (DNS.yandex.ru).

    It is enough to register the address of the secure DNS server in the settings of the network card and all sites before they are downloaded to your browser, security checks on the Yandex server. Several DNS servers are offered: without protection, with protection against malicious sites and with additional protection against adult content (can be used on a child's computer).

    In Windows XP, go to the "Start / Control Panel / Network and Internet Connections / Network Connections" menu.

    In Windows 7, go to the "Start / Control Panel / Network" menu / Network Control Panel and Sharing / Change Adapter Settings.

    In Windows 8.10, right-click on the Start button and select Network Connections.

    Select the "Internet version 4" protocol and click the Properties button.

    Enter Yandex DNS servers addresses.

    After that, only proven secure sites will be downloaded in your browser.

    8.4. Work from under the limited account

    If you are seriously concerned about the security of the computer, then the good idea will create a limited user account and work from under it. It is done easily through the "Control Panel / User Accounts ...".

    After that, the password is installed on the administrator account and it is used mainly to install new programs and configuring the computer.

    The fact is that the virus, hitting the computer or only running in the browser, receives the powers of the user who is currently working at the computer. If the user works with administrator rights, the virus will start with the administrator rights and will be able to change any system files and registry parameters. If you work under a limited account, then if the virus is still leaving through a well-configured protection system, it will not be able to infect system files and registered in the autoload, and the antivirus program will be easier to neutralize it.

    8.5. Cleaning the system

    Keep your operating system clean and order, then viruses will not be so comfortable using one of the popular programs for cleaning the system from garbage. They delete files from temporary folders of the system, programs and browsers. In these folders, viruses and malicious scripts often love to sit. In addition, you will save space on the disk.

    Such functionality has, for example, antivirus 360 Total Security. I can recommend an excellent popular program. It monitors the cleanliness of the system and deletes temporary files with each computer boot, the link to it is also below.

    9. Links

    Here you can download all the files mentioned in the article and will help you in protect your computer from viruses.

    TRANSCEND STOREJET 25H3 2 TB hard disk
    TRANSCEND STOREJET 25M3 1 TB hard disk
    TRANSCEND STOREJET 25M TS500GSJ25M TS500GSJ25M 500 GB hard disk

    Computers meet at home, at work, in stores and in other public places. And despite this, we forget to take care of computer security.

    1. Weak passwords are practically classic. The code by type "12345" will not be an obstacle to not only hackers, but just curious neighbors. The mansion is the use of one login for all accounts.
    2. Backing up for cars in "cloud" repositories may not be saved, then do not fall into despair at the sight of a encrypter virus. Not to mention the actions of the owners of the PC, leading to the loss of information.
    3. Opening of suspicious letters, viewing related investments, the transition to the proposed links will result in infection with viruses, loss of nerves, and even money.
    4. Updates programs do not always carry new features. Upgrades may contain important "patch", covering peculiar "holes" and blunders in applications. Which will later become an expensive for the penetration of malware.

    And of course, the installation of antivirus. Last, although it will not be a panacea from all trouble, but can save from many mistakes.

    Selection of a free antivirus program

    Of course, it is worth thinking above the paid solution, but sometimes even free-distributed anti-virus software will save from trouble. We recommend:

    Browsers with protection against many threats

    Web browsers covered a fairly serious functionality for protecting user data, for example, the new Yandex browser not only checks all downloadable files, but also encrypts open Internet connection. This is not the entire protective potential, more details can be read on the corresponding page of the site.

    Any child already at the earlier age begins to actively be interested in the toys, in which his parents play, - that is, computers, laptops, tablets, etc. often passion for such, to a certain limit for forbidden, toys over the years is only increasing. Of course, the computer opens a lot of useful opportunities for development and can give your child a good start in life, but for parents from the moment your child will make his first steps and will already be able to get to the magic screen, which are pressed by keystrokes and mysterious mouse. Life will turn into a molded nightmare. Young "researchers" are fully able to handle not only an operating system and important working documents, but at the same time, and the computer as a whole (here and the wires for which you always want to pull, and easily failing the connectors, and the system unit together with the monitor who will not be difficult to drop in the game of the game). However, the physical spectrum of problems that may occur through the fault of your kids are already a separate topic, and in this article we will restrict ourselves to considering the protection options for system and software stuffing of a home PC.

    Blocking a computer

    The presence in the family of a small child (and rather, too) is a problem, and there is already a double problem with the computer. To believe that yours, let only be the first steps, the child will not be interested in a bright screen and the tempting keypad buttons - at least naive, and the results from accidentally pressing the buttons and perform any spontaneous actions will not make it wait. Therefore, at the first danger of the younger generation, parents should immediately block the computer.

    In principle, it is quite built enough for this Windows Functions Blocking activated by pressing the keyboard combination Win + L is then to unlock it will be necessary to simply select your account and enter the password. You can also block the computer by selecting the appropriate command - in Windows Vista / 7 commands Block From the list of commands button Completion of work (Fig. 1). If desired, if none of these two ways suits you, you can create a label on the desktop that is responsible for the same operation. The label is created in the usual way, only in the field Specify the location of the object The command is entered rundll32.exe user32.dll,LockworkStation.(Fig. 2). Upon completion does not prevent replace standard icon Label on a brighter, which would immediately rush to your eyes.

    Fig. 1. Blocking a computer with built-in Windows tools

    Fig. 2. Creating a label to block a computer

    It is worth noting that the keyboard and mouse in the built-in Windows tools are not blocked. If it does not suit you, you will have to use third-party utilities, which are either developed by enthusiasts specifically to protect against playful children's pens and are free (including BLOK), or are professional solutions for blocking a computer and are offered on a commercial basis (an example is the LOCK program. MY PC).

    Blok is interesting to those parents who briefly submit to a computer of small children to view cartoons (you can enable a cartoon child, and then activate the blocking, without closing the player, - Fig. 3) or, on the contrary, for a certain period there are a computer in the included state without supervision . None of the most interesting cartoon will prevent the child to use the minutes of viewing in parallel to "pointing the order to their own way", the benefit of the keyboard and the mouse will be within reach. As for situations, when parents leave the included computer at all unattended, then there are even more opportunities, and the consequences can be the most deplorable.

    Fig. 3. Blocking a computer without disconnecting the monitor
    Using Blok

    A more reliable blocking option provides professional tools (such as Lock My PC), but for a home computer it may make sense only if you want to fully block your computer from the grown chad, which, due to excessive enthusiastic information technology, not I am satisfied and with lust looks at your more powerful car. With the help of solutions such as a plan, you can block the computer (Fig. 4), which will be fully impossible access to any items, including the keyboard, mouse and desktop. It will be impossible to view any information on it, launch applications, access files and folders (including currently open) and even restart the computer by pressing the Ctrl + Alt + Del keyboard combination. Ordinary reboot even in safe mode Or the nutrition failure will not be deregulated - you can unlock the computer only knowing the password.

    Fig. 4. Configure computer blocking parameters in Lock My PC

    Lock My PC 4.9

    Developer: FSPRO LABS.

    Distribution size: 1.6 MB

    Work running:Windows 2000 / XP / Vista / 7/8

    Distribution method: http://fspro.net/downloads.html)

    Price: Personal license - 19.95 dollars; Business license - $ 29.95.

    Lock My PC is a tool for blocking a computer at the moment of the user. To block, it is enough to double-click on the appropriate icon in the system tray or press a special keyboard combination. It is possible to automatically block after the expiration of the user's inactivity period. When locking, the mouse and CD / DVD drives are turned off (this will not allow you to remove compact on them) and it becomes impossible to use the main keyboard combinations: Ctrl + Alt + Del, Alt + Tab, etc. On a blocked computer, any, in any, in including created independently, images in gIF formats, JPEG, BMP and ANIMATED GIF. Unlock the computer only knowing the user password or the administrator password.

    Blok 4.5.

    Developer: Sergey Tsumarev

    Distribution size:1.33 MB

    Work running: Windows XP / 7/8

    Distribution method: Freeware (http://remontnik-it.ucoz.com/load/0-0-0-1-20)

    Price:is free

    Blok is a utility for blocking from small children of keyboard and mouse with a monitor disable function or without on. The first option is designed to ensure safe for PC, a cartoon or fascinating animation screensavers; The second is designed to situate when the included computer turns out to be unattended for some time. Blocking is not performed instantly, but with a delay of 6 s, that in the case of blocking without disconnecting the monitor allows the parent to switch to the player window or turn on the screensaver. Lock removal is carried out by pressing the Ctrl + Alt + Del key combination.

    "Freezing" system

    If the child is still quite small, but has already received his own computer (for example, an old laptop), then the operating system is more reliable, using the freezer program - for example, such a recognized commercial solution as Shadow Defender, or a free utility, TOOLWIZ TIME FREEZE.

    This kind of program makes a "snapshot" of almost all the hard disk with a system partition, including the system registry, and when the computer is rebooted, the Ourser is returned to its original state. This automatically means that any fatal changes made on a PC with a young experimenter (change system settings, delete system files, dragging in an unknown direction of system folders, etc.), the computer will not be scary. Similarly, you can roll out not only unwanted changes that occurred as a result of accidental actions or user errors, but also changes in the system made by malware. However, it is not worth perceiving this kind of software products as tools for protection against malicious codeSince the technology of rollback technology used in the "freezer programs" helps far from all cases, in particular, does not protect against rootkits. Therefore, the presence of an antivirus solution on a computer is strictly necessary.

    "Freezing" of the system - the tool is rather radical, because after rebooting the computer, all changes made during operation in the "freezing" mode will be canceled. This is optimal when it is assumed that the you need to save documents, images and other data for the younger generation. If you want to save on your computer, all the same data is necessary, you will have to worry about it in advance and enable the folder to save them into the number of exceptions.

    Use in the practice of the "Freezers" program is easy - in the simplest version, it is enough to specify the utility of the protected disk (Fig. 5) and configure the program so that the "freezing" mode automatically turned on when the system is loaded. True, it should be borne in mind that to work in this mode on a "freezed" disk there should be quite a lot of free space, since a specific disk area is temporarily (before rebooting) is reserved for a virtual area - with a lack of free space on a secure section, the program can work incorrectly . Another nuance is that when leaving the "Frost" mode (this may need to install or change, if necessary, a computer is restarted - this is not entirely convenient, but tolerant, if such manipulations are rarely produced. Also do not forget about the possibility of excluding folders (Fig. 6 and 7).

    Fig. 5. Enabling the secure disk mode in Shadow Defender

    Fig. 6. Determining the folders in Shadow Defender deleted during operation in the "Frost" mode

    Fig. 7. Adding a folder to the exception list in Toolwiz Time Freeze

    Shadow Defender 1.3.

    Developer:Shadowdefender.com.

    Distribution size: 2.68 MB

    Work running: Windows 2000 / XP / Vista / 7/8

    Distribution method: Shareware (30-day demo version - http://www.shadowdefender.com/download.html)

    Price:$ 35

    Shadow Defender is a simple and effective solution to protect a computer from unwanted changes, oriented on small business, educational institutions and home users. The application allows you to control the "freezing" of any of the disks, while the disk can remain in the "frozen" state after the system is rebooted. In secure mode, the system starts in the Shadow Mode virtual environment ( shadow copyEmulating original files), and all changes are not saved on the original section. Perhaps an exception individual files and folders of the "frozen" disk - in such folders and file files will be automatically saved; In addition, it is allowed to exclude from the "freezing" of certain sections of the system registry. If you need to save Kakieto files or folders that are not included in the list of exceptions, in the course of working with a "frozen" disk, it suffices to use the toolage from the tab Save. For security purposes, the user is notified of the lack of free space on the "frozen" disk and protect access to the password program.

    TOOLWIZ TIME FREEZE 2.2

    Developer: Toolwiz Software.

    Distribution size: 2.63 MB

    Work running:Windows XP / VISTA / 7/8

    Distribution method:freeware (http://www.toolwiz.com/downloads/)

    Price: is free

    Toolwiz Time Freeze - simple program For "freezing" system. The utility can be launched at download windows Immediately in the "freezing" mode; It is also possible to enable the "freezing" mode by activating the corresponding command from the menu in the system tray or from the start-up panel on the desktop. Only data on the system disk is protected from changes, some folders and / or files can be made to the list of exceptions to save changes in them in the "Frost" mode. Access to the application settings can be protected by a password.

    Limiting access to system resources

    With a collaborator with the child, the "freezers" of the system is quite difficult to use the computer. Why? For normal operation, every time you will have to turn off the "freezing" mode, and therefore, restart the computer, and at the end of your own work, do not forget to include protection, which is quite tedious. Another option is possible: set up a PC so that parents can normally work with frozen system disk. The latter in practice implies a painstaking configuration of the list of panels, in which the information should be maintained. At the same time, some of the folders still will have to be protected in one way or another, so that your child in the gusts of enthusiasm can do something. In our opinion, the most correct will not "freeze" the system, but if possible, restrict access to system resources, important folders and files.

    The very first thing in this case is to configure a separate account for a child, under which it will enter the system, and establish preferred system settings, as well as determine the desired set of applications. Of course, the guest profile on the computer must be disabled, and the password is installed on the administrator profile - otherwise, bypassing a similar blocking, if desired, it will not be difficult.

    At the same time, it will be useful to use the parental controls embedded in Windows 7/8 and note which child programs are allowed to use (Fig. 8). It should be borne in mind that after limiting the list available applications Embedded tools to restrict access to important system operations, such as changing settings in the control panel components (in particular, in the "System and Security" folders, "User Accounts and Family Safety", "Programs", "Network and Internet", etc. p.), Running the system registry, etc. It may not be necessary, since all such actions will automatically be banned.

    Fig. 8. Setting parental control parameters for child profile in Windows 7

    Can go different and via the editor group Policy GPedit. MS block access to those components of the operating system, the change in which is most critical and even can lead to fatal consequences. In particular, it does not prevent closing access to the control panel (or hide in it "System and Security" folders, "User Accounts and Family Security", "Programs", "Network and Internet", etc.), prohibit access to Means for editing the system registry and using the command line, set the ban on the launch of a number of applications, etc. To change the settings, you must enter Windows under the account with the administrator rights and start the Group Policy Editor by clicking the Windows + R key combination and entering the command gpedit.msc.. Then reveal a branch User configuration ® Administrative templates And adjust the settings you are interested in - for example, to completely prohibit access to the control panel (Fig. 9). Of course, "prohibit everything and the whole" - not always the most reasonable decision. It is much better to manually adjust the list of prohibited / allowed control panel elements, deleting the most dangerous items from it, but it is longer and more difficult, as you need the knowledge of the so-called canonical names of the control panel (you can familiarize yourself with the MSDN Library library - http: // MSDN .microsoft.com /).

    Fig. 9. Installing the prohibition on the launch of the control panel in Windows

    Other ways to configure restrictions on the change in system data are possible, but by connecting third-party applications. These can be specialized tools focused on system administrators (for example, acceptable by price and relatively easy to use the WinLock program), or utilities for configuring parental control (Child Control, TimeBoss, etc.).

    By connecting the WinLock program, block access to important components of the operating system can be in a quarter second. So, it is easy to prohibit the use of the editor windows registry, start the control panel and download in safe mode, prevent the option to start the CMD.exe console, prohibit the installation and removal of programs, deprive the child the ability to block the computer and other. It may be reasonable to ban other (not having so fatal consequences, but also causing certain Difficulties) Operations - For example hide the properties of the screen, delete the "Folder Properties" item from all the Explorer menu, disable the dropping objects in the Start menu, secure the taskbar and prohibit it setting, block the renaming of the shortcuts on the desktop, etc. (Fig. 10).

    Fig. 10. Setting the locks and prohibitions in WinLock

    As for the tools for setting up parental control, then the possibility of blocking access to the settings of the operating system in them, of course, more modest, but these solutions are interesting to those parents who want to protect their data at the same time and establish control over the work on the computer for the younger generation. For a Russian-speaking audience in this regard, the TimeBoss program is more interest (Fig. 11) - mainly due to the presence of a Russian-speaking interface. With it, for example, you will be able to disable the control panel and the task manager, block the launch of the system registry, as well as the change in date and time, etc. At the CHILD CONTROL application, more impressive opportunities in the Windows access control plan: You can prohibit the use of command Rows, launching the system registry, opening the control panel, changing user accounts, etc. (and taking into account the selected security level), as well as hide some discs (Fig. 12).

    Fig. 11. Restricting access to system operations in TimeBoss

    Fig. 12. Installation of system restrictions with the help of Child Control

    WinLock 6.11

    Developer: Crystal Office Systems.

    Website programs: http://www.crystaloffice.com/winlock/

    Distribution size: 4.96 MB

    Work running:Windows 2000/2003 / XP / Vista / 7/8

    Distribution method:shareware (30-day demo version - http://www.crystaloffice.com/download.html)

    Price: WinLock - 23.95 dollars; WinLock Professional - $ 31.95 (in SoftKey.ru WinLock Professional - 450 rubles.)

    WinLock is a convenient tool to restrict access to important system resources and user data. The program is presented in two versions: Base WinLock and Extended WinLock Professional; The capabilities of the basic version do not allow you to restrict access to webressours and use encryption.

    The main purpose of WinLock is to configure user access restrictions to important system resources of the system and confidential information. The program is loaded automatically from the OS and allows you to prohibit access to the system registry and control panel, turn off the hot windows keys (for example, Alt + Ctrl + Del, Alt + Tab, Ctrl + ESC, etc.), hide the Start menu and block the taskbar, etc. from the changes. The utility can be used to block access to interchangeable media (CD / DVD drives, USB devices, etc.) and hiding the display of certain disks in the My Computer folder and in the Explorer, blocking the launch of specific applications (for example, you can safely Disabling download download managers), as well as files and folders with important information. It is possible to prevent access to dubious webressurours based on black and white lists (the black list is compiled by keywords) and install restrictions on the duration of the user's work on the computer. All such settings are made based on the user profile and cannot be changed without knowledge specified for the password utility.

    Child Control 2013.

    Developer: Salfeld Computer

    Website programs: http://salfeld.com/software/ParentalControl

    Distribution size:23.26 MB

    Work running:Windows 2000 / XP / Vista / 7/8

    Distribution method: Shareware (30-day demo version -Http: //salfeld.com/download/)

    Price: $ 29.95

    Child Control is perhaps one of the best solutions in the parental control setting, allowing you to restrict access to a computer in terms of introducing a limit both by time and resources used. The program also provides detailed statistics for use. system resources And visiting websites, can send generated reports to parents to the specified e-mail and is equipped with a functional for remote control.

    With the help of Child Control, for each of the children, it is easy to clearly adjust access to the computer as a whole and the Internet and individual programs in particular; Block the use of individual applications and visiting unwanted Internet resources, taking into account the selected security level, pre-installed categories, keywords, official black lists of sites and white lists of URLs allowed for visiting. Possible setting time sx limits by category Websites, such as video and online games. There is a toolkit to limit access to the most important system components Windows - you can block access to the system registry, command line, control panels, date and time change component, etc. and prohibit access to personal folders and even separate disks. In order to protect the utility from hacking, the younger generation is provided to use a password access to the program and work in a hidden ("Stealth" mode.

    Time Boss 3.08

    Developer: Nicekit Software.

    Distribution size:1.4 MB

    Work running: Windows XP / VISTA / 7/8

    Distribution method:shareware (30-day demo version - http://nicekit.ru/download/timeboss.zip)

    Price: Time Boss - 620 rubles; Time Boss Pro - 820 rub.

    TimeBoss is a simple and convenient program for organizing parental control. The application is offered in two editions: Base Time Boss and Extended Time Boss Pro. Time Boss Pro Edition additionally provides a functionality for remote control within the local home network (you can remotely change the settings, promptly add time, etc.) and is equipped with keylogger protection (to exclude the possibility of receiving a password access to the program).

    TimeBoss allows you to restrict the time of the computer's computer activity (including in games and the Internet), to determine the list of available applications (including games), enter restrictions on a number of system operations, prohibit access to individual folders and disks, as well as adjust the visits to sites during Internet surfing . The program provides control for all user-registered users and therefore, if necessary, can be used to configure different limit options for different profiles. For security reasons, it is implemented using a password access to the program, work in hidden ("Stels") mode, as well as protection from deleting an application when booting Windows in safe SAFE MODE mode.

    Restricting access to personal folders

    The use of different profiles with the child associated with the Windows-connected parental control in no way limits the access of your child to folders and disk files with all the consequences. Therefore, without additional protection can not do. Options for setting access restrictions to important folders can be different. The most accessible way to prevent them with access to children is to include in the properties of the corresponding objects attribute "Hidden". Hidden thus folders and files will not be visible in the conductor to other users of the system, but only provided that the checkbox "Do not show their parent folders contains hidden files, folders and discs "(Fig. 13). In principle, at first it may be quite enough to protect its data.

    Fig. 13. Hiding the folder in the built-in tools of Windows

    Using the built-in tools of the operating system, you can also configure access restrictions to specific folders - for example, allow only their viewing, which will prevent accidental deletion of important data. To do this, it is enough in the conductor to click on the disk, folder or file with the right mouse button, select the command from the context menu Properties, activate the tab Safety, Select a child account, and then define access to the selected object for it, configuring the required limitations (Fig. 14). Of course, you need to configure access restrictions under an account with administrator rights.

    Fig. 14. Determining restrictions of access to the folder in the built-in Windows tools

    In this way, you can even completely prohibit access to individual folders, but the folders themselves will remain in the system visible if the "hidden" attribute will not be set to the displays the display of hidden folders and files. Unfortunately, hidden using built-in funds Windows folder will be visible in file managers (Far, Total Commander, etc.) that do not use the standard dialog to display files and folders. Therefore, such a concealment is not suitable for everyone.

    To organize more efficient protection of those folders that you would like to stay away from curious children's eyes, you can go to another way - use a specialized solution, such as the Free Hide Folder utility or Protected Folder. Fully hide individual folders with their help with their help simpler simple - just drag the corresponding folder from the conductor into the utility window either directly in the Utility window add this folder to the number of protected (Fig. 15 and 16). Hidden with connection free utility Free Hide Folder Folders will not be visible in Windows Explorer Even when the "Show hidden files, folders and discs" option is enabled, however, if your child is hidden enough and you forget to prohibit use in the children's profile of file managers (FAR, Total Commander, etc. ), then bypassing the defense you have installed will not be difficult. Commercial program Protected Folder provides a more reliable level of concealment - the folders protected in it will also be invisible in file managers; Access to them without knowledge master password is impossible. It is worth noting that it is possible to protect confidential folders using the above-mentioned Parental Control utilities and TimeBoss.

    Fig. 15. Hide folders in FREE Hide Folder

    Fig. 16. Installation of protection to the folder in Protected Folder

    Fig. 17. Hiding important data in the CHILD CONTROL program

    Such a data hiding will help protect them from unauthorized access and random damage or deletion in many cases, although the chances of accessing folders in a young hacker have, if you do not take care of blocking the capabilities of the system booting from an optical drive or flash drive and installing a password on the BIOS. In addition, the theoretically bypassed protection can be if you remove the disk and connect it to another computer. True, if you have any kind of qualifications, parents hardly already make sense to fight with software.

    PROTECTED FOLDER 1.2.

    Developer: Iobit.

    Distribution size:3.4 MB

    Work running:Windows XP / VISTA / 7/8

    Distribution method:shareware (demo version 20 launches - http://ru.iobit.com/downloads/pf-setup.exe)

    Price:600 rub.

    Protected Folder is a convenient program to protect files and folders from unauthorized access by completely hiding or restricting data access. In terms of access restrictions, it is possible to install a ban on reading (the files will remain visible, but they can not be launched, copying and read) or prohibit an entry (cannot be moved, deleted and modified). Hidden data invisible in Windows Explorer and in file managers. Access to the program is protected by master password. The functionality is provided to configure exceptions - by default, a number of system folders and files are included in the list of exceptions, since the access limit to them leads to incorrect operation of the system.

    FREE HIDE FOLDER 3.0

    Developer: Cleanerersoft Software.

    Distribution size: 875 KB

    Work running: Windows 9X / ME / NT / 2000 / XP / 2003 / Vista / 7/8

    Distribution method: Freeware (http://www.cleanerersoft.com/download/fhfsetup.exe)

    Price:is free

    Free Hide Folder is a simple and compact utility for hiding personal folders. Protected folders become completely invisible to Windows Explorer, even when the "Show hidden files, folders and discs" option is enabled, but will be displayed in other applications, such as FAR, Total Commander, etc. Access to the program is closed by a password master.

    As everyone is well known, with children there are always enough problems, and if there are also a computer at home available, then you will not have to miss you. You will probably lax a lot of ways to secure wires, hiding from children's eyes system Block With valuable filling, strengthening the monitor, and then transfer to the study of the most different software (for example, what was considered in the article) to limit the access to the younger generation to the computer, the operating system, as well as important folders and files. However, if a real computer genius grows in the family, then even after the protection of everything and all of you can hardly be resting on the laurels. In this case, it will only be recognized as a defeat that, maybe for the better, because then it will immediately become clear that computers are the true vocation of your child.

    Any computer connected to the Internet may potentially become a victim of hackers and put the attack on their part. Hackers and attackers constantly "roam" over the network, looking for vulnerable places for hacking computer systems. Hacker can steal just some small part of the information from your PC to cause you serious harm. The worst thing you can do is just assume that your computer itself is securely protected.

    Who is a hacker and how are they becoming?

    Computer hackers are faces who want to access a computer to use it without any knowledge or permission on your part for their illegal purposes.

    The motive of most hackers is curiosity, challenge in life or a false sense of power, while the motive of others is only money. However, whatever the motive of a hacker, hacking a computer is illegal activities, and hackers are real peoplewhich can break into your computer exactly as thieves can penetrate your home.

    Therefore, you should know how to stop hackers (thieves) and how to protect your computer from hackers who can steal your money or damage personal reputation.

    There are various subgroups of hackers who differ in their "moral" installations.

    • For example, "White" Hackers do not hack systems for malicious purposes,
    • while "Black" Hackers undermine security for criminal purposes, such as theft of credit card information or vandalism.

    Stages of activity

    1. Hacker first collects information about the target target,
    2. finds out the best attack plan,
    3. and then attacks possible vulnerabilities (weaknesses) in the system.

    Such malicious programs like trojans and worms are specifically designed and used with hackers for hacking.

    Although there is no completely unmistakable method to protect against hackers, you, however, can prevent yourself from becoming an easy target for them. We learn how to protect your computer available, efficient and free ways.

    Hacker Utilities: Antivirus, Firewall and Antispion

    First of all, download and install the antivirus application. Anti-virus software helps protect the system from external threats. Malicious, Trojan, hacker programs and viruses are developing "without stopping" for a variety of reasons. Such programs are designed to produce different computers, including the shutdown of the firewall.

    They can go in the first wave of attack before the hacker will actually be able to search your computer in search of the information you need.

    The constant updating of the antivirus program will help you protect your computer from the latest versions of viruses.

    Start scanning viruses regularly. Select a convenient time when you do not use your computer or, for example, left for affairs - because viral scan slows down the work of your computer. Scan the hard drive at least once a week.

    Always use Firewall (firewall). Firewall is designed to block unauthorized and unwanted traffic, and this is your main protection line from hacking and invasion of a hacker. Almost all computer operating systems include firewall, but sometimes it can be turned off by default. Leave the firewall turned off - it's like leaving the front door of your home open at night.

    Turn on the system firewall (press "Start" - "Control Panel" - "Security", then "Windows Firewall") if you do not use a third-party firewall. Know that the launch of several firewalls is simultaneously redundant - it does not provide additional security, and in fact it can even be counterproductive. Therefore, choose something one.

    Firewall will protect the computer from external hackers by making it invisible for them and their attacks. It is very unlikely that the hacker will spend a lot of his time to try to hack your personal firewall.

    Find a reliable anti-spyware program and install it on PC. Spyware (Spyware), located in the system, can collect small pieces of information without your knowledge.

    Spyware is often used by marketing firms to monitor customers' buying habits. Information received from Spyware, even if this is done for marketing purposes, is still mined without your knowledge and consent.

    Web Surfing and Mail

    How to protect your computer when web surfing? Never allow browsers to memorize your passwords on web sites, login-forms, profiles, etc. Of course, it may be inconvenient to enter each time the password when you enter the system on your mailbox, in a social network or payment system.

    But, allowing your browsers to memorize passwords for you, you invite hackers to arrange a "party" on personal accounts and in the system.

    Make your passwords long and complex, with a good combination of letters and numbers. For full reliability, do not use anything related happy birthday, the names of your children or something like.

    If a hacker wants to hack something from you, at least, make it pretty "sweat". Never use the same password for different accounts, and change the password every 90 days.

    Hackers are known to use email as a form of malicious codes. Never open an email attachment from someone who you don't know, even if you are very curious to do it.

    Do not open emails and messages from strange sources. The discovery of "strange" messages and investments that come along with them is one of the best ways to become a "mining" of hacker.

    Load files or anything else from those sources you trust. Often hackers can attach elements to download or even hide viruses and other things like "Safe Loading", which after installation begin to steal personal information.

    It can be very tempting to press on various "annoying" ads that can jump out in the form of online advertising, like "you just won a free iPhone!".

    But most of these ads can be falsified to establish spyware or advertising software in your OS, after pressing them. You ask for trouble if you click on these ads.

    Disconnect your computer from the Internet if it is not used. Most people prefer to leave their computer connected, because they find it convenient to quickly go online.

    However, leaving the computer on, even when you are not, you create some security risks. Hacker in this case, a person or robot may have more time to test and identify vulnerable seats in your computer security.

    And the off of the computer will not only save energy, reduce the wear of the computer parts, but also prevents from hackers transmitting signals to your computer. The only correct way to make the computer is completely invisible and protected from hackers - to disable access at all.

    Keep your operating system with updated last safety patches. Use the function automatic update Computer operating system.

    Operating system developers regularly release security updates for all registered users. Hackers skillfully recognize OS security loopholes, and turning off the automatic update leaves these loopholes open.

    Finally, track events in the system. Check system logs periodically to find out what your computer does. If you receive notifications about any programs that you do not know, be alert. Watch out for any warnings and TCP / IP messages.

    So how to protect your computer from hackers? Just follow the above tips, keeping your computer up to date with support for firewall (firewall), and it will help you keep hackers at a distance, because that they are likely to keep looking for a easier target than your PC.

    Currently, hacking custom computers are increasingly gaining distribution. Hackers are trying to access foreign devices for various purposes - from the banal spam sending from your email address to the use of personal information for mercenary purposes, and your task is to protect PCs in all ways. Let's figure it out how to protect your computer from the penetration of hackers.

    How do hackers penetrate?

    To begin, it is necessary to understand how hackers can carry into the device and what means they access your files and information directly on the hard disk. Only after that it will be possible to protect the device.

    In most cases, the role of a hacker executes a specific program that falls on your PC one of the possible ways. Simply put, malicious software is most often called viruses. You can secure your computer from unauthorized access and penetration into personal space using an antivirus program. In this case, the system will warn you about what you are trying to load malicious or suspicious software. All programs can be divided into several types of harm levels:


    What if you hacked a computer?

    First of all, copy all the important information on a third-party drive, which does not apply to this PC. If it does not work on one device, it will be safe on the outer carrier. However, before this you need to check files using antivirus for possible infection. If the hackers do not get to the files, then boldly copy them to the USB flash drive or outdoor hard Disk, and remove a PC.

    After that, it is necessary to scan the system for viruses and suspicious software. After scanning, disconnect the system from the Internet and reboot. If, when repeatedly checking the antivirus did not begin to beat the alarm, it means that the danger passed. For greater reliability, use only licensed antivirus programs and update databases in a timely manner. This will help reliably protect your system. Now you know how to protect PC.

    Disable remote access to the computer

    • Go to the "Start" menu and go to the conductor;
    • By the "My Computer" icon, click the right mouse button and select the item "Properties";
    • On the left, select the item - "Setting the remote access";
    • Tab "Remote access" click "Advanced";
    • Remove the checkbox "Allow remote control this computer ";