Safe,Computing,Advice,Normal,f DIY Safe Computing Advice
Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable{mso-style-name:"Table Normal";mso-tstyle-rowband-size:0;mso-tstyle-colband-size:0;mso-style-noshow:yes;mso-style-parent:"";mso-padding-alt:0in When starting a new work at home business it is very easy to become consumed by it. We spend so much time trying to get the business up and running that we may end up becoming burned out and lose our motivation. There is so much to learn and
Normal 0 false false false MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable{mso-style-name:"1KG=0O B01;8F0";mso-tstyle-rowband-size:0;mso-tstyle-colband-size:0;mso-style-noshow:yes;mso-style-parent:"";mso-padding-alt:0cm 5.4pt 0cm 5.4pt;mso-para-margin:0cm;mso-para-margin-bottom:.0001pt;mso-pagination:widow-orphan;font-size:10.0pt;font-family:"Times New Roman";mso-ansi-language:#0400;mso-fareast-language:#0400;mso-bidi-language:#0400;}Keep yourcomputer updated at all times and dont forget third party applications such asAdobe, Flash, and Java. Some of the third party applications dont get updatedautomatically.Itsimportant to log out of your account when using public computers, by not doingso, you are putting yourself at risk because other people will be able to viewand access you account.Imagine asituation, Jack is a student and a frequent online shopper. He uses his creditcard information to purchase something online but he forgets to log out when heleaves. Here comes Steve and Mike. Mike uses the same computer Jack used andsees his credit card information. The both know what they gonna do with it abrand new home theater system for themselves at Jacks expense. Jack gets hiscredit card statement and he is definitely not very happy. Remember tochoose strong passwords instead of weak passwords. Weak passwords are likeleaving your keys in your door, allowing anyone to access your personal spaceor information. Strong passwords greatly reduce that risk because they have aminimum 9 characters, including upper and lower case letters, numbers zerothrough nine and some unique symbols such as the pound or dollar signs.One moresituation to imagine, Freda is going to use the public computer to check heremail. She gets a popup asking her if she would like to save her password.Freda thinks and finally she decides to say No. Good job Freda.Never opensuspicious email attachments. Hackers use email attachments to send viruses tocomputers. An email virus can destroy files on your hard drive and resenditself to other users. It can also steal your sensitive information and turnyour computer into zombie.You must definitelyuse antivirus software and update it regularly too. If you still do not haveany program, carefully read several reviews before installing it and choose something according to your needs.
Safe,Computing,Advice,Normal,f