It is amazing how easy it is to protect yourself against the deadliest of threats.and the best way to date is knowledge.having the proper knowledge always leads to proper protection methods.although simple solutions can be lifesavers sometimes.
Through years of extensive use of computer and internet,followed by intensive research in Internet security. and later working as networking security specialist in high profile IT companies in EUROPE and ASIA,i have come to a small list of necessities. and here are my favourites!!
1.Activate protection. If your operating system or software has a firewall, spam blocker, or other built-in security application, make sure it's turned on. The firewall included with Windows Vista is adequate.
Also activate spam filtering and other online protection provided by your ISP or e-mail service, such as Yahoo, Google, or MSN. For spam, that may be enough.
2.Update and renew. Set your operating system and security software to update automatically. Spam, spyware, and virus-detection programs incorporate "rules" or "definition" files that must be updated regularly to catch the latest threats. If your computer remains disconnected from the Internet for long periods, you should ensure that automatic updates to your operating system security are occurring, or update manually. And when your software warns you to renew your service, be sure to do so, ensuring that protection doesn't lapse.
3.Upgrade your computer and browser. If you're running Windows XP or earlier Windows versions, consider upgrading to the more secure Windows Vista, which lets you surf in a protected environment that prevents online threats from damaging your operating system and contains a two-way firewall that blocks both incoming and outgoing threats. (The outgoing firewall needs some improvement to make it more effective.) At a minimum, upgrade to the Internet Explorer 7 or Firefox 2 browser. Both notify you about known forged, or "phished," Web sites.
3.Install a toolbar with security features. I think they're a good second line of defense
4.Shut off your computer. Turning off your computer when not using it for long periods (or at least disconnecting the Internet cable) can reduce the chance that a malicious remote computer will penetrate your operating system security and access it. And you'll save energy.
5.Use public computers with care. Avoid using computers at libraries, hotels, or airports for conducting financial or other personal business. The same goes for using your own computer on a public wireless network, especially if you're not on a secured Web page or haven't disabled your system's computer-to-computer connections
6.Consider a Mac. Although Mac owners face the same problems with spam and phishing as Windows users, they have far less to fear from viruses and spyware. Because Apples are less prevalent than Windows-based machines, online criminals get less of a return on their investment when targeting Macs.
i personally use a Mac whenever i am in a very dangerous situation.and i just cant rely on my experience and skills to trust my PC.
7.Run antivirus software. It actually works and you need it. That's true even if you own a Mac. Although Mac users have much less to fear from viruses and spyware, they aren't immune to them. And an antivirus program will prevent virus-laden files from being transferred from Macs to PCs.
i have personallly succesfully exploit Mac's holes through its safari browser 3 times in lab environment where it is supposed to be much safer.
8.Run two antispyware programs. Spyware is so insidious, and sometimes difficult to detect, that it warrants double protection. Set the better of the two programs to block spyware in real time. Use the other to scan whenever you suspect something might have escaped the first program
9.Avoid using hyperlinks in e-mail. Hyperlinks can show one address but take you to another. Before clicking on links in Web pages, hover your cursor over the URL and see whether the address that appears at the bottom of your browser looks as if it's related to a page or site you expect to visit. When you arrive at the site, verify that the URL shown in your browser's address bar is the correct one. Pay attention to the part of the URL between "http://" and the next slash. Look for tricks such as the use of a zero where the letter O should be. Verify the address and then type it into your browser. Or use a favorite or bookmark you've already stored in your browser.
10.Type carefully. Tricksters sometimes create lookalike sites that use common mistypings of popular URLs