programmer program software development hardware visual basic adobe jetform central java asp sharepoint portal server windows microsoft content management html sql internet linux blog web website .net code coding digital upgrades virus trojan spyware pc computer maintenance design xml output designer graphics photograph restoration manipulation tv capture network router modem mouse keyboard pc personal computer sound music mp3 cd burn art mosaic core 2 duo pentium amd semperon sempron athlon assembler flash photoshop php mysql database voip webcam stream printer laser wireless dsl adsl dvd video disk drive cpu remote desktop terminal service vnc
• Home
• Computer Services
• Software Development
• Contact Us
• PC Info
• Comments

resume
• Resumé
• Site Map
• Glossary
• Privacy & Disclaimer

Google


www
www.darteks.com.au


Like it or not, in our society we have to be aware of our personal security all the time. Things are just the same with our possessions and also our personal data (or that of our business or clients).
We will cover some of the basic considerations here.

Login Passwords
Everyone should protect their PC or laptop with a login password. This way, a login password prompt will appear each time you start your computer before the desktop even begins to load. It will prohibit any access to the computer at all. So, this is definitely not a password you want to forget! A password should ideally consist of a minimum of six mixed-case characters, at least one number and at least one non-numeric character (eg: # or $)

Screensaver Passwords
Once the computer has been powered up and logged into the network, screen saver passwords can deter an intruder when the user is not in the immediate area. Windows has the ability to set a screen saver password. The screen saver password locks the screen after a few minutes of inactivity (5-10 minutes being the optimal setting in an office) and requires a user to type the correct password before the computer can be used again. This makes unauthorized use of the computer more difficult. This is especially useful in an office environment.

Encryption
What happens to your confidential files if your PC or laptop is lost or stolen? Losing your computer doesn't have to mean losing your privacy. When you encrypt a file or folder, you are converting it to a format that can't be read by other people. A file encryption key is added to files or folders that you choose to encrypt. This key is needed to read the file. When you are logged on to your computer, you'll be able to read them. Anyone who tries to use your computer without your logon will not be able to read them.
With Windows XP Professional, you can help protect private customer and financial information by using its Encrypting File System (EFS). There are also many other data encryption programs available.

Fingerprint Readers
Allow you to log on to your PC and your favorite Web sites with the touch of your finger, without having to remember all your passwords. The user simply places their finger on the receiver whenever a password or username is required. If you are thinking of using this technology investigate the security of the product as, for instance, the Microsoft fingerprint reader device is to be used for convenience and not security (as it is said that the data transfer from the reader is not encrypted).

USB Keys
Offer an added level of protection to your PC or laptop. In short, you cannot log on to the computer without first plugging in the key (which looks like a USB memory key). Be aware though, that if you have problems with instructions when first setting up your key, you could be locked out of your computer. And if you lose your key at any time (and don't have access to a duplicate....can you have a duplicate?) you may really be locked out of your computer.

Physical Locks
The problem of computer and data theft is growing rapidly. These products are used in the private and public sectors as effective protection against the threat of IT hardware and data theft. Security solutions for computer equipment and data including laptop security cables, computer security cables, cables with alarms and system enclosures. Not a regular home solution, these locks are now commonplace in the office and retail situation.

Local Area Network (LAN) Security
Ethernet cables running around the office should always be in secure locations so that no-one can physically splice into your connection. Just the same, ethernet switch or hub access should also be secure.
Wireless LAN security involves using authentication and encryption procedures. Authentication prevents malicious users from being able to join your wireless network, while encryption also helps prevent malicious users from accessing your private resources or the Internet. The newer wireless LAN security standard, Wi-Fi Protected Access (WPA), has to our knowledge not yet been broken. WEP (Wired Equivalent Privacy) is not very secure and should be avoided if possible.

Go back to Previous Page