Search This Blog

Monday, April 12, 2010

How to Prevent Our Computer From Damage

Starting with summary which make you know exactly what this topic talking about:

1- Preventing Viruses, Spywares and Bugs from corrupt your computer.
2- Making strong defense against hackers.
3- Configuring the programs and operating system to help you protecting your computer and set it in fixed environment.
4- Protecting operating system from any changes could happen without your permission.
5- Finishing with some excellent tools which make you professional on detecting most of viruses, spywares and let you manage all processes you do it or even operating system do it by your permission or without.


Here we go:

To be able protecting your computer you must know all things happening around you starting with programs you using and it's functions and how it's working passing to operating system, So whenever you know well dealing with operating system and programs which working in it whenever you'll take step to the next level for know how control to it with the best ways and easiest. Then Become obvious from the previous explanation that we now should firstly configuring operating system because it's the most important thing at all to building great protection:

- Advise to setup new and clean operating system because you don't know what's the status of excited one now and to be starting with free system suspicions.

- After installed the operating system and stabilized, Now starting configuring step by step:

1- Click Start > All Programs > Windows Update to search for the latest updates for operating system and this step is so important so you must do it.

2- If you faced problem to enter Windows Update which about Illegal copy and stuff like that download the following patch and apply it to let you checking the updates:
http://rghost.ru/91598

TIP: After download extract with Power ISO then open installer. bat file.

3- Repeat step 1 to continue checking the updates then will show up Updates page and this time select all High Priority updates except any items belong to Windows Genuine Advantage Validation Tool make sure you didn't select it! as shown in picture:

4- Now go to Control Panel > Internet Options

5- Select Security tab and click Default Level then Custom Level as shown in picture:

6- Will show up Security Settings window, then under Scripting field and find Allow paste Operations via script and select Prompt option (This for prompt the user when some site try to enter the Clipboard and it's used to save copied data from and to anywhere as shown in picture:

7- Select Privacy tab then choose the protection slider to Medium High as shown in picture:

8- ...and if you want more protection you can find Run ActiveX controls and plug-ins option then select for it Prompt and simply i can say it's group of rules which used by websites to how sharing the programs informations and how displaying contents but this function has a disadvantage which is become today most sites using it and without any chance of safe so when select Prompt it's mean that would show up windows messages every time Internet Explorer find out some page needs to activate some contents and of course come the function of ActiveX controller so select Prompt to prevent bad sites to use this function against you like some anonymous actions happen and changes in system without your knowledge as shown in picture:

9- Go to Content tab and click AutoComplete button then remove check mark besides Prompt me to save passwords and User names and passwords on forms and this is belongs to username and password which you write it into web pages to gain access them and it's very important to able block all bugs front of spyers to steal your data like E-Mail information so i advice before you shutdown your computer in the end of the day that you delete all these data by pressing Clear Forms and Clear Passwords as shown in picture:

9-1 After you finished your work on computer go to General tab then press Delete Cookies button then show up confirming message click on OK as shown in picture:

10- Click Delete Files... then show up confirming message then check mark Delete all offline content and pressing OK as shown in picture:

10-1 ...and pressing Clear History... then show up confirming message click Yes as shown in picture:

11- Go to Advanced tab and get down till you find Security item then check mark the choice Do not save encrypted pages to disk and This is for saving the encrypted data like Data Banks, Passwords and so on and check mark Empty Temporary Internet Files folder when browser is closed and this is for delete the saved data in Internet Temporary Files automatically each time Internet Explorer closed as shown in picture:

12- Now comes role of System Restore and this finction extremely used by viruses because it has very important goal to corrupt a lot of files as much from system files each time this function used so i recommend to disable this function quickly, There are steps comes next soon will do that in better way and with 100% guaranty

12-1 Go to Control Panel > System then choose System Restore and check mark Turn off System Restore on all drives then click OK then show up confirming message tell you as shown in pictures:

12-2 Then go to Start > Run and write services.msc then find down on System Restore Service item and double click it to open then under Service status press Stop and under Startup type choose Disabled and by followed previous steps you have disactivated and don't create new files directly objecting by viruses as shown in picture:

12-3 Go find Remote Registry item and do same previous actions on it to prevent entering Registry Editor from out this computer as shown in picture:

Now going to next level and it's programs which help operating system to creating a strong defense against hackers attack after you did previously configuring the best ground for operating system, Comes now the programs that you'll use it and make you step by step achieve that:

"I have chosen these programs and specially these versions for some reasons which I tested and found they worked fast with strong performance and their disadvantages are low even nonexistent"
- McAfee VirusScan 10.0.27
- McAfee Personal Firewall Plus 7.1.113
- Pop-Up Stopper Free Edition 3.1.1014
- About AntiSpyware programs i think you wouldn't need it because there is next level which make you protected form this attacks whatever how much strong is it or even tricks that do it
- McAfee VirusScan 10.0.27
What a famous program which you can trust it, and now this is what looks like:

First of all there is red square on the top of left corner icon showing the protection activated or not and must be ON (green color) and that explaining the program is working as should be.

Download it from here:
http://www.esnips.com/doc/19e9cadd-9eda-4e09-b221-23a3a82c29aa/SuPeRGeNiUs.3

- McAfee Personal Firewall Plus 7.1.113
This is for making Firewall to protecting operating system from invaders as shown here:

...and as I said before about protection status must be ON (green color) to be sure that the program working good.

There is unique function in this program which make you able trace any one tried to enter your computer with Visual Tracer as shown in this picture:

This is some details:

Download it from here:

http://www.esnips.com/doc/d4f0cfc0-236d-4a76-bf4b-69cffd4dddbf/SuPeRGeNiuUs.32

Now configuring the program by follow these steps:

- From left column choose Options and then click Security Settings as shown in this picture:

Then you will see this window:
1- Move the slider to Tight for maximum security and in the same time let you exploring the internet in safe environment.
2- Check mark this option to make the program scan all incoming data processes for more protection.
3- Remove the check mark from this options to prevent restricted users from changing firwall settings.

- There is function in most sites and chating programs make the user saving Log-in information automatically so you should take care from this function and dealing with it carefully to be not surprised some day that this information has been stolen.

- The best way to protecting computer too i recommend you to use Administrator account just in case if you want to install something or change system settings except that don't working on it in normal mode because you like this make the system going down as soon as possible, so i advice to create Limited account let you doing what you want and prevent the others from what they going to do you can do this account by following this steps:

1- Go to Control Panel > User Accounts
2- Under Pick a Task... choose Create a new acoount
3- Type now the account Name that you wish and press Next

4- Under Pick an account type choose Limited then press Create Account

If you now want to install something there is good function make you turn into accounts without restarting windows or even exit windows it's calling Fast User Switching by clicking Windows logo + L on keyboard then choose what account you wish to enter and click on it like Admin. account to install something or changing system settings.

- Pop-Up Stopper Free Edition 3.1.1014
This program we will use it to block all Pop-up windows and let the spyers do what they need, It's easy and don't need any experience just install and let it do his work as shown in this picture:

Download it from here:

http://www.esnips.com/doc/6841ce74-d053-4457-9912-08267b374a03/SuPeRGeNiUs.33

- I recommend when there is pop-up sjow up don't use the normal steps to close it just use Alt + F4 to close it because most of these pop-ups probably contain reflected codes that's mean not necessary like when you click No in the pop-up messages to be safe and do what you command it but may be do the opposite thing and it's Yes

- ShadowUser Pro 2.5
My opinion the Greatest Technology in Software World simply because it's make the operating system working in special environment and any changes happening to it removed in the next run of windows like a Peace of Cake, This program make you control all over the operating system and hard drive in same time by let you able select which partition you wish to protect from changes or even whole hard drive but i don't recommend that so come on and let it kick the anonymous changes forever

This is what looks like:
Download it from here:


...and now after install and restart open the program and configuring it as shown in this picture:

1- Choose Configuration tab in left column
2- From the right choose the partition(s) you wish to protecting them from changes
3- This is how you'll Enable it: Right click the program icon in the taskbar (right bottom corner and icon it has gray color in case the program disabled) and choose Enable ShadowMode
3-1 Show up window as specified in this picture click Activate from it:
3-2 Then show up another window choose Reboot Now from it as specified in this picture:
4- This is how you'll Disable it: Right click the program icon in the taskbar (right bottom corner and icon it has orange color in case the program Enabled) and choose Disable ShadowMode
4-1 Show up window as specified in this picture click Deactivate from it:
4-1-1 Choose first choice Lose all changes, except for excluded files then click Deactivate so you asked the program after restart disable the program
4-2 Then show up another window choose Reboot Now from it as specified in this picture:

- File Monitor

So you need more protection then this is what I talking about "Realtime" processes, it's let you able to watch every thing happening to the system in second by second it's great tool to catch what you think is not safe (This is for files) as shown in this picture:
Download it from here:


- Registry Monitor

This is for watching what's happening in the Registry Editor in realtime second by second and what's get in as shown in this picture:
Download it from here:
http://www.esnips.com/doc/466e8808-c985-44d4-b16d-5aa403b7df24/SuPeRGeNiUs.3
Digg Google Bookmarks reddit Mixx StumbleUpon Technorati Yahoo! Buzz DesignFloat Delicious BlinkList Furl

0 comments: on "How to Prevent Our Computer From Damage"

Post a Comment