Ten Tips to Protect Yourself From Hackers Continued...
6. Do Not Plug In Random Devices - USB thumb drives are common place now, and many people believe that as long as they don't run anything off of the USB device that they will not get a virus. Nothing could be farther from the truth. Malware now can actually autorun by masking itself as an autorun.inf file. Windows will actually automatically run the malware the minute an infect USB device is plugged in. Only use devices that are yours or are from trusted sources.
If you still wish to use USB devices from strangers, at the very least, turn off your autorun settings on Windows. In Windows 7, go to your Control Panel, then Hardware and Sound, and finally to Autoplay. Uncheck Use Autoplay for all devices and Click Save. In Windows Vista, go to your Control Panel, then Hardware and Sound, and click on Play CDs or other media automatically. Uncheck Use Autoplay for all media and devices and Click Save.
7. Remove Admin Rights For Users - Businesses segregate administrative accounts from user accounts to protect their systems. Following this same idea in your personal life is an extremely good idea as well. By removing administrative privileges to user accounts, including your own, you minimize the risk of malware being able to install itself under your account. When malware tries to install itself, you will be alerted as the system will notify you that you cannot install a program without administrative privileges. From here, only use your admin account for installing known software, uninstalling software and setting up user accounts. Do not surf the web using your administrative account. By limiting your administrative account from the cloud (internet), you are better protecting the account from malicious hackers and their malware.
8. Run Virtual Machines - Virtual machines are extremely useful methods currently arising in both the business and personal world. Virtual machines are separate entity operating systems running on your current hardware. This means you can technically have two 'computers' running off of one machine. The advantage of virtual machines is the fact that if it is infected with malware, you can just shut down that virtual machine and delete it. When should you use a virtual machine? It would be most valuable to run when you want to visit shady, adult or underground websites. Shady, adult, underground websites are more likely than not malware infested, but many people still visit them. If you wish to visit these sites, visiting them in virtual machines is the safest bet.
9. Install a Firewall - Firewalls are a great investment, whether they be just software only or hardware. Firewalls allow users to prevent certain types of inbound traffic as well as outbound traffic. Many people only set up their firewall rules to prevent inbound traffic, so that they can prevent hackers from getting into their system. This is a big oversight as outbound rules are just as important. When malware sent by a hacker manages to find data in a victim’s computer, the first thing it's going to do is try to send the data out, back to the hacker. This means it will look for all available outbound connections it can find. By limiting outbound traffic, you will have effectively trapped the malware from sending information back and you will have valuable time for your anti-malware software to catch this malicious program.
10. Use Complex Passwords - A very easy concept but one that is always missed. A recent study performed in January 2010 by Imperva found that passwords such as '123456', 'password', and 'abc123' were among the top ten most used passwords from average users. These passwords are in no way complex and many hackers can easily have programs brute force their way through. Hackers actually have password dictionaries that contain simple passwords that many average users use for use in their tools in hacking. Using complex passwords can be annoying at first, but they are vital in protecting you from hackers.
11. Secure Your Wireless Network - Aren't there supposed to be ten tips on how to protect yourself from hackers? This last tip is extremely important but since not everyone has a wireless network, I'm adding it as an eleventh extra tip. If you do run a wireless network, set up the security features that comes with it. Don't keep the vendor supplied admin account, change it, give it a new password, but never keep it as is. Also, put some type of encryption on your network and disallow outside users from connecting. This can be as simple as checking a radio button that says Enabled WPA/WPA2 Encryption. Wireless networks that are unsecured are perfect hacking points that hackers can use to enter your network and eventually your computer. Find unsecured wireless networks was actually a tactic used against businesses by Albert Gonzalez in one of the largest online fraud cases in history.
Read over and follow these tips and you will have started your journey to protecting yourself from malicious hackers. These ten tips on how to protect your computer from hackers will give you a nice secured baseline and keep you ahead of many others.