Clean up your PC. Some things to do

Clean up your PC Some things to do Minimum Memory • XP – 1 Gig • Vista/W7/8 • At least 2Gig Which OS version • 4 GB or less 32 bit • Else 64 bit O...
5 downloads 4 Views 1MB Size
Clean up your PC Some things to do

Minimum Memory • XP – 1 Gig • Vista/W7/8 • At least 2Gig

Which OS version • 4 GB or less 32 bit • Else 64 bit OS • To address hard drive over 2.2GB need a 64 bit OS

Do not install more than one AntiVirus • Will slow machine down

Registry Cleaners do not do much

Do not run speedup/startup managers • Most people do not need them

Malwarebytes • Very Good cleaner of annoying and dangerous downloads • Recommend Pro

Blocking Bad Places Pro

My Recommendations

Problems with Antivirus Very Subjective

Problems AVG –slows machine, false positives BitDefender slows machine Norton Bad in Past , very difficult to remove, slow ESET Techie, Firewall issues with sharing Kaspersky Very Techie, difficult to use

Do not say yes to free scan or programs

Browser add-ons • Coupons • Games

Reset browsers Firefox

IE

Three Essential Steps to Make Yourself More Hack-Proof • Look, there’s no hiding from being hacked. Everything is vulnerable, and if you haven’t been personally affected by a data breach yet, you will. But while you can’t ever protect yourself 100 percent from malicious data theft, you can at least put a better lock on your door than the one your neighbor has. These three simple tips will go a long way toward helping you avoid having a hacker rifling through your files.

1. Don’t Reuse Passwords If they get you, this is how you’ll get got. Password reuse is a huge problem. That’s because when one service has a breach (say, LinkedIn or Adobe), people rush to try the exposed passwords on other sites—especially email, social media, and banking. If you use the same password multiple places, it makes you only as secure as the most vulnerable target. The same thing goes for your clever password schemes, too. If a human being can’t figure out the slight variations you’ve set up to track your Gmail, Facebook, and Wells Fargo passwords, a machine will.

2. Set Up Two-Factor Authentication I know two-factor authentication sounds a little scary. It even sounds a little scary when you call it two-step authentication. I know. But basically, it just means that when someone tries to log into an account from a new location (a different computer, a different phone, whatever) they also have to enter a code that’s sent to a trusted device. This usually means that you’ll get some sort of text message with a six-digit number you have to enter if you want to, say, log into Facebook from a computer in the library (bad idea!) or reset the password on your Google account. The thing you should know about two-factor is that once you have it set up, which is typically an easy process, you’ll rarely have to actually use it. It’s mostly a set it and forget it operation.

3. Use a Password Manager A good password manager will help you create and manage strong passwords that you can use to log in from the Web or your mobile device. All you’ll ever need to know is the master password. The rest of your passwords are encrypted, and can only be unlocked by that master password. You can use a password manager to both generate and track new passwords, and to perform a password audit of your existing ones. Dashlane, 1Password, Keeper and LastPass are all great options.

Roboform Everywhere • Works on all devices • Autofill forms • Remember passwords • Windows , Android, Ipad, Mac • Separate class hopefully

System Restore • Restores to an earlier time • Does not affect documents

Backup Sometimes Bad Things Happen

At least two Backup Types Online

Local

Pick up a hard disk • Less than $100 • Consider not keeping it connected

• There are virus that will encrypt your data

• CryptoLocker was a ransomware trojan which targeted computers running Microsoft Windows[1] and was first observed by Dell SecureWorks in September 2013.[2][3] CryptoLocker propagated via infected email attachments, and via an existing botnet; when activated, the malware encrypts certain types of files stored on local and mounted network drives using RSA public-key cryptography, with the private key stored only on the malware's control servers. The malware then displays a message which offers to decrypt the data if a payment (through either Bitcoin or a pre-paid cash voucher) is made by a stated deadline, and threatened to delete the private key if the deadline passes. If the deadline is not met, the malware offered to decrypt data via an online service provided by the malware's operators, for a significantly higher price in Bitcoin. • Although CryptoLocker itself is readily removed, files remained encrypted in a way which researchers considered infeasible to break. Many said that the ransom should not be paid, but did not offer any way to recover files; others said that paying the ransom was the only way to recover files that had not been backed up. Some victims claimed that paying the ransom did not always lead to the files being decrypted.