Getting Comfortable With The Basics

Computer & Internet Security

Simple tips to reduce your exposure to spyware and viruses:

  • Stop using Windows as an administrator. Use it as a limited user instead.
  • Use Google Chrome as your web browser. It’s free and far more secure.
  • Don’t click on links in an e-mail.
  • Only get the software from the original vendors.
  • Keep the anti-virus software up to date. (I recommend using Windows 10 built-in AV)
  • Be careful of what gets installed, and be careful what you click.
    These simple tips will reduce your exposure to spyware and viruses:

If you think you have malware?
Uninstall 3rd party anti-virus in Windows

Update your Operating System regularly!  Turn on automatic updates in Apple’s OS X and Windows 10. Apply all critical updates immediately. Criminals often create hacks within 24 hours of Microsoft’s patches (these are called zero-day exploits), so you must protect yourself the day the updates appear.

  • Also, update these software tools immediately when you offer updates.
  • Adobe Acrobat Reader (Don’t forget to uncheck the Optional offers) 
    • Stop using Adobe Acrobat altogether!
      • The Chrome and Microsoft Edge browser, pre-installed on Windows 10, has useful PDF features. You can view documents, draw on PDFs, and do some simple levels of editing. It isn’t the most powerful PDF editor, but for many users, Microsoft Edge is more than good enough.
  1. Windows 11’s native browser is Microsoft Edge. You can install Firefox or Google Chrome. These browsers are free to download and install.  I use all four browsers: Microsoft Edge, Internet Explorer, Firefox, and Chrome.   Glenn
  2. Don’t open e-mail attachments, even if it’s from someone you know. If you get something from someone you know, ensure they are the sender. E-mail attachments are the number one way viruses and trojan horses get into computers.  Be especially suspicious of those jokes of the day e-mails from your friends.
  3. Don’t click links in an e-mail. That link could lead you to a phishing site and may guide you in installing malicious software. Please copy and paste links into your browser or type them in by hand instead. I often do a Google search for the site. Google will return a valid address; if the site has problems, the search result will usually have many links warning about the issue.
  4. Don’t download files from places you aren’t sure are safe. Stick with well-known sites.
  5. Use a Standard User account instead of an administrator account for your day-to-day use. Using a standard account can help protect your computer. By preventing you from making changes that affect the computer without a second chance to think. Before installing something new (perhaps malware) or deleting files required for the machine to work.
    • Create an additional user account named “security” and give it Administrator rights. Make it’s password something you can easily remember (write it down). It does not need to be super secure because it is only used on this one local computer, never online.
    • Then, downgrade your existing account to “Standard User.”
    • Now, whenever you are logged into your day-to-day account and want to install software, for example, Windows will pop up a dialog asking for the Administrator password before any new software can be installed.
      • Note: This technique makes it almost impossible for malware to get installed without you first entering the administrator’s password.
    • See Manage user accounts in Windows for step-by-step instructions.
  6. Use a firewall. The best firewall is a hardware router, which you use to share an internet connection. Even if not billed as firewalls, they are, and they’re pretty helpful.
  7. Use Gmail as your e-mail provider. Like bank websites, Gmail uses HTTPS encryption to keep your e-mail secure.
    • Google has added (account activity) extra security to Gmail, alerting the user if it suspects suspicious activity. For example, if you always check your e-mail from the exact location. Google notices events from the other side of the planet and will let you know the geographic area.
    • At the lower right of Gmail’s home page, look for “Last account activity.” You can see your sign-in history, including the dates and times you used your Gmail account. You can also see the IP addresses used to access your account.
  8. Avoid tech support phone scams – Cybercriminals often use the names of well-known companies, like Microsoft, in their scams. They think it will convince you to give them money or your personal information. While they usually use e-mail to trick you, they sometimes use the telephone instead. It is a SCAM!!! Microsoft does not call customers, have partners who do that, hire sub-contractors or people, or even get volunteers.
  9. Why should you use Google 2-step verification?How it works: –  Google 2-step verification adds an extra layer of security to your Google Account by requiring you to have access to your phone and your username and password when you sign in. If someone steals or guesses your password, the potential hijacker still can’t sign in to your account because they don’t have your phone. Some other e-mail provider also offers 2-step verification. I have a page with additional information on Two-factor authentication.

I use 2-factor authentication on all sites that offer it. Using 2-factor authentication is a bit of an effort to set up, but it makes your accounts more secure than most banking sites.  Glenn

  • These things are not complicated; you don’t have to be a “security expert” to figure them out.  I follow these practices and haven’t had spyware or viruses in years.

Uninstall 3rd party anti-virus in Windows 

After uninstalling 3rd party anti-virus, built-in free Microsoft Windows Defender will activate.

Most computer users have one of the highly advertised 3rd party security suites Norton, McAfee, Trend Micro, Kaspersky, or AVG Internet Security. Your new computer may have security software installed by the manufacturer (usually a trial version) or as a subscription from your Internet provider (Verizon or Comcast), or perhaps you bought it in a store. However you came to have one of these products installed on your machine, I recommend you uninstall any 3rd party anti-virus programs and allow the free built-in Windows Defender to activate. You will save money and, more importantly, let your computer operate faster with fewer warning messages and pop-ups.


Uninstall 3rd party Anti Virus Programs (Win 11)

To uninstall a third-party antivirus program on Windows 11, open the Start menu, go to Settings > Apps > Apps & features, locate the antivirus program you want to remove, select it, and click “Uninstall.”.

Key steps:
  • Access Settings: Click the Start menu and select “Settings”. 
  • Navigate to Apps: Select “Apps” from the left-hand menu.
  • Choose Apps & features: Click on “Apps & features”. 
  • Select the antivirus program: Find the antivirus software you want to uninstall in the list. 
  • Uninstall: Click on the program and choose “Uninstall” 

Windows Defender will automatically activate after you remove the 3rd party Anti-Virus program. 

  • Check the status of Windows Defender.
    • Press the Windows Key (it has the Windows flag symbol).
    • Choose Settings.
    • Select Privacy & Security from the left list.
    • Select Windows Security.
      • Protected areas should have green checks.


Final Thoughts  


  • Connector Guides To Learn About Connector Technology​ – This connector guides illustrate the variety of cable connectors available and provide detailed pictures to help you identify them.
    • Getting The Most For Your Money – Monoprice is a premier manufacturer of high-quality cables, components, and accessories for computer and consumer electronics.    It’s not just about getting a high price. There’s no sense in buying a product that doesn’t perform or won’t last. Quality is a top priority at Monoprice. In addition to the comprehensive testing that is done at the factory level, they have a local product testing lab.
  • Explore the Dropdown menu. – Sometimes referred to as a pull-down menu or dropbox, a dropdown menu is a list that appears when clicking on a button or text selection. For example, many programs will have a “File” dropdown menu at the top left of their screen. Clicking on the “File” text generates a new list with additional options.

 

Tech News by Topic