Protect yourself from hacker- Computer Security

How to Protect yourself from hacker

Basic Computer Security
This chapter will specialize in topics associated with computer security (e.g. privacy, networking,
passwords, etc.). After reading this articleyou’ll know how to protect yourself from
other hackers. you’ll also know how to execute attacks against the defenses of your
targets. you need to read this material carefully:

  • computer security is very important for the
    “offense” and “defense” of hacking.


You should treat security as a crucial part of employing a computer. you’re probably using
the internet to perform a search, read your emails, buy stuff, or sell your own merchandise. this stuff became easier due to computers and networks. However, this convenience comes with a hefty price: lack of security.

The following tips will assist you in protecting yourself from hackers:

  • Don’t share your usernames and passwords with anyone (not even your closest
  • Read the security/privacy policies of every site that you simply will access before entering
    personal data.
  • Don’t buy anything from untrusted sites. The last item you would like to try to gives your
    money and/or financial information to unscrupulous individuals. If you would like to shop for
    something online, search for trustworthy sites like www.amazon.com and
  • Do not share the login credentials of your email accounts with people. Some
    emails contain private and/or tip.

Protect yourself from hacker

How to create a strong password

Follow these tips to help yourself craft unique, complex passwords

  • Do not use personal information Don’t use your name or names of family members or pets in your passwords.
  • Do not use real words  Password cracking tools are very effective at helping attackers guess your password. These programs can process every word in the dictionary
  • Create longer passwords The longer the password, the harder it may be to crack. Try for a minimum of 10 characters.
  • Password should be in alphanumeric data: like password should be combined in alphabetic, numeric or special character or symbol. an example – Rouj@234%$#, Make your own complex password as it is .
  • Don’t write them down Resist the temptation to hide passwords under your keyboard or to post them on your monitor. Stories about hackers getting passwords by rummaging through trash
  • Change passwords on a regular basis Passwords for your online financial accounts should be changed every month or two. Computer login passwords should be changed at least once a quarter.
  • Use different passwords on different accounts Don’t use the same password on more than one account. If a hacker cracks it, then all of the information protected by that password on other accounts could also be compromised.
  • Do not type passwords on devices or networks you do not control Never enter your password on another person’s computer. It could be stored without your knowledge.
  • Use a password generator, like Norton Identity Safe, to help create unique and strong passwords.

protect yourself from hacker

Keep in mind that keeping your passwords secret isn’t enough. A hacker can still access that piece of data through a keylogger. Basically, a keylogger may be a program that records all the keys that you simply press. to guard your computer against keyloggers, you should:

  • Make sure that your computer’s firewall is on
  • Run spyware/adware scanners on a daily basis
  • Use an on-screen keyboard to enter your login credentials
  • Install an anti-malware program on your machine

Protect yourself from hacker


The term “malware” refers to programs that are designed to “infect” a device (e.g. computer, tablet, smartphone, etc.). Let’s discuss the various sorts of malware:


Basically, viruses are computer programs that infect other programs. Most viruses run
only when the program they infected runs. this is often the most reason why viruses are hard to
detect. an epidemic has two parts: the “infector” and therefore the “payload”. confine mind, however,
that the payload isn’t required. meaning a harmless program remains an epidemic if it
attaches itself to a trusted computer virus.


This term came from the legendary “Trojan Horse”, an outsized Trojan Horse that spelled
doom for Troy. In hacking, a Trojan may be a program that contains other programs. The
“container” is usually harmless. In fact, it is often a program that draws unsuspecting
users. Once an individual download and installs a Trojan program, the malware inside will
spread within the target machine.


This is one of the foremost dangerous malware out there. Basically, spyware records the
activities you are doing on your computer and transmits the info to the hacker. This data
transmission occurs via the web. Hackers divide spyware into two types: harmless and
harmful. Harmless spyware focuses on non-confidential data (e.g. the websites you visit).
Harmful spyware, on the opposite hand, collects tip (e.g. passwords).


Basically, the adware may be a sort of malware that shows advertisements on a person’s computer.
This malware becomes extremely active whenever the infected machine is online.
It is true that adware is one of the safest sorts of malicious programs. However, it can be
frustrating if a pop-up advertisement will appear whenever you click on a browser.

How to Fight Malicious Programs

Staying far away from unscrupulous sites can assist you to prevent malware infection. However, it is likely that some malicious programs will still latch onto your machine. it might be best if you’ll install a reputable anti-malware program and scan your computer regularly. Here are a number of the foremost popular antivirus programs today:

protect yourself from hacker

  1. Norton Security
  2. AVG Internet Security
  3. Avast Antivirus
  4. McAfee Antivirus

Important Note: If you’re a lively internet user, you ought to scan your computer for malware a minimum of once every week. Adjust this frequency to twice or thrice every week if you’re
dealing with tip.

Protect yourself from hacker



Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top