The basics of computer protection.
Data security and access control tips.
Published
: June 25, 2005
Summary: If you are the only holder of a computer or owner of a shared family PC
- you might still want to set up your computer with user accounts, privilegies and other
security rules and software. Doing so prevents unauthorized
access to the Windows computer, make it more stable and gives you joy sharing the home computer or surfing the WEB online.
Remember that even the most higher computer security can be broken due to certain factors that you've missed.
Check-out your system with the followig list of security measures.
The idea behind two-factor authentication is that more than one factor (password) is required for the authentication to succeed.
For instance, Rohos Logon Key can enhance a password prompt with the requirement to plug in a USB flash disk (or USB stick, pen drive) into the computer.
Use firewall, like ZoneAlarm to control what goes in and out from your computer.
Check / adjust your Windows security settings so they are safe.
Don't use public computers for anything you need to type in your logins, they usually have keyboard monitors that capture your passwords/keystrokes.
Make backups and store them in safe place (at least once per month).
Easiest way to do a total-backup is to make an "Image" of your harddrive or partition and store it on safe location.
How to use disk encryption to protect your privacy.
Sharing a computer with someone else means that others could see your private files, install games or software you didn't want, or change your computer settings.
Learn the most appropriate ways to protect your sensitive information.
Virtual encrypted disk inside-out
Rohos software creates a virtual encrypted disk within a file and mounts it as a real disk drive. Encryption is automatic, real-time (on-the-fly) and transparent.
Software Links
Rohos Logon Key - Smartest, most feature-rich USB security Windows login solution. Two-factor authentication via USB stick for fast login.
Rohos Disk - Smart disk encryption program. MS Office integration. Using two-factor authentication to access your files.