Search This Blog

Showing posts with label how to protect our computer from hacker while online. Show all posts
Showing posts with label how to protect our computer from hacker while online. Show all posts

Saturday, October 22, 2011

How to Protect your computer from Hackers while Online

o protect you from hackers on the Internet, we recommend the firewall Jetico: this is the best.
And to arrange everything: he is French and free.

After defining your trusted zone, that is to say the LAN between your computer and your Internet connection
before you will allow or not the software you use to connect to the Internet. Usage rules for Web browsers,
messaging software, or FTP clients are preset and enable the software to access the Internet safely.

For other software, you refuse to authorize ad hoc or permanent access to the Internet.
If you are unsure, you can reject the connection, even if the permit later if needed.

Follow the guide to properly deal with Jetico and have optimum protection.

Download and install Jetico:
Jetico is a free firewall. You can download it from here
~ Once the download is complete, click the Run button.
~ Confirm the launch of Setup Jetico by clicking the Run button.
~ The installation wizard opens Jetico. Click the Next button.
~ Check the box I accept this agreement and click Next three times.
~ Jetico files are copied to your computer. Check the Yes box, I now proceed to the configuration.
~ Click the Finish button when done.

Set the network monitoring:
You must now define your area of confidence, that is to say your computer or network on which you have your computer
(your router or your box for example).
~ The Setup Wizard opens Jetico. Click the Next button.
~ Jetico found himself the address of your network: 192.168.1.0. If in doubt, you can check the documentation for
your router or your box.
Click the Next button.
~ Ignore the setting of the sensitive area by clicking Next.
~ Finally click the Finish button.
~ Click OK to restart your computer.

Allow early access:
When you restart your computer, locate the icon Jetico in the taskbar (it is 2 small gray arrows).
This icon indicates that Jetico is operational. At the same time, one or more windows on the screen.
Jetico actually detects programs wishing to connect to the Internet.
Watch the online application to find out what software is.
If the software has the right to connect to the Internet, it may be your antivirus, for example,
select the Custom option (reject) and click Edit Rule.

In the window that appears, scroll down the list and select the option Verdict Accept. Click OK twice.
For software which you do not know whether or not allow access to the Internet, select the Block this activity.
You can change this permission later if needed. Windows and software that start at boot time to finish loading.

Manage Permissions:
Now you must assign the rules of predefined software the most important: your web browser, email software, your FTP client, ...
~ Start your first Web browser.
~ A window Setting the event network Jetico opens. Select Treat.
~ Scroll to the right, select the proposal that corresponds to your software, Web browser here.
~ Click the OK button.
~ Then do the same with your mail client, Outlook, Outlook Express or Thunderbird, for example,
and choose Treat Customer Messaging.

Improved browser protection:
Some predefined rules, like those that manage your Web browser, are content to allow certain types
of communication, without preventing other. To improve your security, you can force the blocking of
communications that are explicitly permitted.
~ Double click on the icon Jetico in the taskbar to bring up the main program interface.
~ Open the Settings tab.
~ Scroll down and click on Optimal protection Web Browser. Note that this option may also
be located in Racine, rules on applications, Ask the user.
~ Click the right mouse button in an empty space right frame of the window and then select the command
New Rules for application.
~ In the window that appears, scroll down the list and select the option Verdict Reject.
~ Click the OK button. The rule is added on top of the list of other rules.
~ Then click on this new rule and, while holding the mouse button down, move there at the end of the list.
~ Finally, click on the Save icon, shaped disk.

Manage Alerts:
As and when you launch the software, check if Jetico need access to the Internet and they must be
accessible from the Internet.
A dialog box Setting the network event opens for you to specify if the software is allowed or not to connect
to the Internet.
~ For specific needs, as for a research update, select the Allow this activity.
The software will then have immediate access to the Internet. Uncheck the box Save my answer.
Your review will then be asked again during the next attempt to connect the software.
~ To deny access to Internet software, select the Block this activity.
~ If the software require a simple access to the LAN (not internet) to play with friends in the network for example,
select Treat and select applications in trusted zone.

How to make a PayPal ACC without the need to verify anything

If you are from North America you have to face prompt of Paypal  that ask you for your SSN (Social Security Number). This is very Easy metho...