The 7 Most Important Hacking Tips To Keep Your Data Safe






Use a firewall. ... Install antivirus software. ... Install an anti-spyware package. ... Use complex passwords. ... Keep your OS, apps and browser up-to-date. ... Ignore spam. ... Back up your computer. ... Shut it down


The 7 Most Important Hacking Tips

Use a firewall. The easiest and most secure method is to use a firewall, such as Palo Alto's iControlli, to protect your system from being hijacked. firewall -- Installing iControlli On Your Router Download iControlli On Your Router. ... It is known for its simple design and easy installation. firewall -- Integrate With Your Router By creating and configuring firewall rules, iControlli makes it easy to secure your computer and even to enable privacy features. firewall -- Use iControlli With Your Router It will even let you create your own firewall rules, and the best part is that it is open source.


Setting up a firewall

Firewalls prevent unauthorized access to your computer. You'll need to use a third-party firewall. It can be any number of products from names like ZoneAlarm, AVG, Norton, Kaspersky or more. On Windows, you need to install and enable firewalls with the following registry key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Enabled On Linux, you need to install and enable them with the following command: /usr/bin/perl -e 'unset HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Enabled; echo "Firewall enabled" > /etc/rc.conf' You can also enable them from Windows Control Panel, then click on the "Internet and Internet Service Settings" option. Then click "Firewall" and change the "Enable" option to "Enabled".


Installing antivirus software

Every computer enthusiast and hacker I know advises their readers to invest in an antivirus software for their laptop, desktop and smart phone. Most of them also advise users to install additional security solutions on the systems, such as password managers or browser plugins. It's because if you don't install such software on your system, your computer will become an easy target for a hacker to steal your information. According to the latest data from NSS Labs, a third of hackers have used free or very free programs that allow them to circumvent firewall restrictions to gain unauthorized access to company systems. This is why it's important to keep your systems protected against potential hackers.


Installing an anti-spyware package

Ben got his computer cleaned by experts from Sophos. After installing an anti-spyware package, he said that he hasn't had any major problems. This includes viruses, as it detects and deletes suspicious content. However, the anti-spyware package only gets rid of the most obvious malware; if an attacker is able to evade the product's detection, it will sit dormant on your computer, without the possibility of being removed. There are a few different versions of anti-spyware on the market, and this is not an automatic switch. A simple question that I usually receive when people install anti-spyware is "Is it the malware that actually gets removed, or the false positive?" In this case, it's the latter. What are "false positives?


Creating complex passwords

This hackers say that "two-factor for authentication" makes no sense. You'll either have to remember a password or make it complicated enough for even you to remember. And maybe you will just have to write it down in a diary, never to be shown. What's more, they say, even when your password is stolen and the hackers access your bank account or email, you are not even out of the woods yet because it's another password problem—and these criminals have a huge array of passwords to choose from. It's like solving a jigsaw puzzle when the numbers are changed. This hackers say, "There is no need to store weak passwords. Use a simple passcode. Don't use it for anything more complicated than phone, credit cards, etc. Use a password manager such as LastPass or 1Password in one time.


Keeping your OS, apps and browser up-to-date

Microsoft Windows, Apple's Mac OS X, Google's Chrome browser, Mozilla Firefox and Internet Explorer 8 are all regular targets for hackers. Be sure to update them. Windows 8 has new security features that can aid you in protecting your data. Be sure to update your device with a system update when it comes available. You might also consider turning off Auto-Update so it only updates those apps and browsers you specify. Internet Explorer and Mac OS X users will want to ensure their firewall is activated and active. Be sure to also make sure your firewall is not only configured to block malicious websites but also block HTTP (hypertext transfer protocol) connections to known malicious sites. If you use a router and are not sure how it's configured, contact your ISP and ask for assistance.


Backing up your computer

When in doubt, always back up your data. It's easy to think that if all your important data is backed up on an external drive then you're safe. Unfortunately, there are times when it isn't as simple as you think. What if the drive breaks? You will be stuck without any access to your files until you can recover the lost information. Or what if your drive becomes corrupted by malware, or a bad decision by a hacker? There is no guarantee that the information will be recoverable. If your computer or network goes down, your important data is likely to be gone forever. Backups are a good idea no matter what, but the topic is especially pertinent in the modern world. When information technology tools and services have become so commonplace, they can easily fall into the hands of hackers.


Shutting down your computer

Always shut your computer down if it is left on, even if you think it’s turned off. Unplug it completely. While turning off your computer is definitely important for maintenance, be sure to always shut it down completely to avoid data corruption or even causing your computer to be shutdown on purpose.