How to prevent your PC from becoming a Zombie - 12 Scams of Christmas - Computer Advisory Services - for all your IT Needs

Go to content

Main menu:

How to prevent your PC from becoming a Zombie

Published by in General · 10/10/2012 15:03:23

You may know the basic facts on botnets, networks of compromised machines commandeered by hackers. But, are you aware of how to keep your own PC from being affected? Here's a look at specific steps you can take to help ensure that your computer does not end up under the control of cyber criminals.

Use anti-virus and anti-spyware software and keep your software updated.

Use a firewall and make sure it's properly configured.

A firewall provides critical protection to keep your PC safe from unauthorized access. To complement your anti-virus or anti-spyware software, use a user-friendly firewall, like Panda Firewall
, to monitor and block suspicious traffic that could be a sign of bot compromise.

Run regular security updates for your operating system, web browsers, and other applications.

Keep all of your applications up-to-date with the latest security patches. It's critical that you run Microsoft Update ( to install all of the current Windows patches. You can do this easily by setting your PC to receive automatic security updates.

Run different scanners to check for infections, including rootkit revealers. But, always make sure you're using reliable, respected security software.

Many computer users like to run a variety of different scanners to help find infections. Keep in mind - you also need to use caution when it comes to the security software you use. Rogue security software is on the rise, attempting to play off of computer user's fears about malware infections to peddle their fraudulent software. Be cautious and ensure the software is legitimate before downloading any programs.

Practice safe online behavior - click with care!

Be vigilant and use common sense when browsing the Web. You should be especially cautious when checking your e-mail or messages on social networking sites; don't open attachments or click links from unknown senders or in unsolicited messages.

Back to content | Back to main menu