How To Protect Your Computer And Privacy Without Any Computer Knowledge
Step-By-Step Techniques A Child Can Do
To delete cookies, open Internet Explorer > Click Tools > Internet Options > In the General tab, click "Delete Cookies." > You will be asked whether you wish to delete cookies > Click Yes. Now, Click Settings > Click View Files > Press Ctrl + A > Click Delete. There are also a few software's available for deleting third-party cookies like Cookie Crusher. Sometimes, when you install these software's, it is possible that the internet speed is slowed.
To surf the web safely, you can update the relevant security patches that are available in the operating system vendor's website. You might also use a firewall as it controls Internet Cookies and also blocks unwanted data. There are a lot of other hardware and software firewalls available on the web. In general, pornographic gambling, etc. websites pose a greater risk of installing spyware or adware in your system.
Other important things you will have to take care when surfing the web are to block pop-ups and disable AutoComplete.
To block pop-ups, you can download toolbars from Google, Yahoo, MSN, etc. To add a site to the Restricted Sites zone in Internet Explorer, Start Internet Explorer > Click Tools > Internet Options > Click the Security tab > Click Restricted Sites, and then click Sites > In the Add this Web site to the zone box, type the Web address for the site that you want to restrict, and then click Add. Repeat this step if you want to add other sites to the zone. > Click OK > Click Default Level to set the Restricted Sites zone to the recommended level, which disables Active Scripting > Click OK.
You can also disable Active Scripting in Internet Explorer for all sites. This might cause many Webs sites to be displayed incorrectly.
To disable Active Scripting for all Internet sites, Start Internet Explorer > On the Tools menu, click Internet Options > Click the Security tab > Click Internet, and then click Custom Level > Under Active Scripting in the Scripting section, click Disable > Click OK > Click OK.
To disable AutoComplete, Start Internet Explorer > Click Tools > Internet Options > Click the Content tab > Click AutoComplete > Remove the checkmarks from Web addresses, Forms, Usernames and passwords on forms > Click Clear Forms and then Clear passwords > Click OK > Click OK.
Unless absolutely necessary, it is not recommended to download and install any freeware. If you do download free software, only download from developer's site. Many copycat sites exist that are fraudulent. Downloading from them will most certainly install spyware on your system.
It is also recommended to set the security settings to high if children have access to computer. This can be done by launching Internet Explorer. Click Tools > Internet Options > Select the Privacy tab > Move the slider and set the security settings to high. Also ensure that you do not click pop-ups.
Never ever store your email addresses and password in the system. People might get access to the stored passwords. The best way to store passwords is in the form of an encrypted file for example on a floppy disk. Buy a package of floppy disks from a computer shop and save a text file with your username and password. Then send the file to a floppy disk and delete the file from your computer.
You can also use a free software. This software called Password Safe will save your passwords on your computer but you will create one unique password to access them all.
This is also great if you do not want to use floppy disks.
If the above are followed properly, you just improved your security. The easy to follow instructions make your computer more safe and immune against threats.
CopyRight All Rights Reserved
Related Tags: identity theft, spyware, adware, computer, internet, online, security, browser, ie, mozilla, threats
Karl Sultana sells popular software NoAdware. Articles related to Internet security are updated regularly on his blog. Download NoAdware to remove adware and spyware dangers today.
Your Article Search Directory : Find in ArticlesRecent articles in this category:
- Free Internet Security Software from Google
Selecting the internet security software for your computer can be a daunting task for most home user - Home Key Logger - Track Computer Activity
What goes through your mind when you think about a home key logger? Do you think about a rogue progr - Computers and Electronics Have Changed The Way We Live
You push the on button and your monitor screen springs to life. Next, you use your mouse to bring up - What PacketShaper Can Do For You?
What is PacketShaper?It is an application-intelligent traffic management system which delivers predi - Key Logger Software for Your Computer
One thing that many of us are concerned about is the safety of our children and what happens when th - Keep Your PC Healthy With Computer Tips & Tricks
Everybody just has to have a computer these days. Life without a computer is unimaginable. I am sure - Antivirus - What is a Computer Virus?
Before understanding what a computer virus is, it is necessary to understand what a virus in when it - Gibberish Spam Email - Why Do Spammers Send It?
We have all seen many spam emails that just make no sense. They contain pure gibberish in the subjec - Your Children And The Internet - 5 Tips To Keep Your Children Safe While They Are Online
If your children are on the Internet you may be concerned about their safety. We hear stories regula - Advantages and Disadvantages of Broadband Phone Service
Broadband phones, also known as “VOIP†are catching on faster than ever. And no wonder,
Most viewed articles in this category:
- Experience the new Microsoft Zune and Future Technology with Bill Gates at CES Keynote
After the demonstration of Windows Vista by Bill Gates at the CES keynote, Robbie Bach, President of - Internet Connection Sharing in Windows XP
This articles explains in detail how to set up a small network at home so you can share your Interne - Nortel VPN Client Overview
The Nortel VPN Client creates the secure connection for VPN users into a private network. Once you l - Computer Phobias
Years ago around the end of January I would develop Chinophobia (fear of snow). Maybe it was becaus - iPod Stuff: How To Set Your iPod's Alarm Clock
The good thing about the iPod alarm clock feature is that you can wake up with the tune of your favo - CCTV: the story continues
CCTV – Closed Circuit Television – for some time at least has been used by various gover - Why Someone Stole My Mobile Phone
Not so long ago my mobile phone was stolen. I kept asking why I was the one who got targeted, especi - Office printers: introduction to technology and types
With every bit of information transfer and manipulation going digital these days, almost the entire - Computer hardware simplified
Computer Hardware is a comprehensive term which refers to all the physical parts of a computer inclu - Cordless phone technology: a brief history
Cordless Phones – as the term suggests – is a phone sans any cord. Instead the handset c