Internet safety: 8 steps to keeping your computer safe on the internet

Internet Safety is difficult, yet critical. Here are eight key steps to keep your computer safe on the internet.

Viruses and spyware and worms … oh my!

The very concept of “internet safety” is almost an oxymoron these days.

It seems like not a day goes by that we don’t hear about some new kind of threat aimed at wreaking havoc across machines connected to the internet.

Anti-Microsoft sentiment coupled with the massive installed base make Microsoft products, and particularly Microsoft Windows, an irresistible target for hackers and “script kiddies.” In recent years, products like Adobe Reader, Java, Flash, Firefox, and more have come under attack as their popularity has increased. Even Macs are no longer invulnerable.

Here are some things you can (and should) do to stay safe.

1. Use a firewall

Firewall


A firewall is a barrier between something that is potentially dangerous and something that you want to keep safe. The term comes from
... continue reading »

A firewall is a piece of software or hardware that sits between your computer and the network and only allows certain types of data to cross. For example, a firewall may allow checking email and browsing the web, but disallow things like Windows file sharing.

If you’re connected to the internet through a router, then you already have a type of hardware firewall that prevents random networking-based external threats from reaching your computers.

If you’re using a dial-up internet connection, a firewall may not be as important, although it doesn’t hurt to have one. A software firewall may be your only option.

2. Scan for viruses

virus


A virus is a computer program written by someone presumably with the intent of spreading and causing grief. Like a human virus
... continue reading »

Sometimes, typically via email or other means, viruses are able to cross the firewall and end up on your computer anyway.

A virus scanner will locate and remove them from your hard disk. A real-time virus scanner will notice them as they arrive, even before they hit the disk, but at the cost of slowing down your machine a little, and occasionally even interfering with other operations.

Important: Because new viruses are arriving every day, it is critical to keep your virus definitions up-to-date. Be sure to enable the scanning software’s automatic-update feature and have it do so every day.

3. Scan for spyware

spyware


Spyware is a class of malware that is typically designed to spy on you or your computer, silently collecting information that is subsequently
... continue reading »

Spyware is similar to viruses in that they arrive unexpected and unannounced and proceed to do something undesired. Spyware can be relatively benign from a pure safety perspective, as it might “only” spy on you. But that’s enough. It can violate your privacy by tracking the websites that you visit, add “features” to your system that you didn’t ask for, or record your keystrokes and steal your account login information for any online services that you might use.

Some of the worst offenders are spyware that hijack normal functions for themselves. For example, some like to redirect your web searches to other sites to try and sell you something. Of course, some spyware is so poorly written that it might as well be a virus, given how unstable it can make your system. The good news is that, like virus scanners, there are spyware scanners that will locate and remove the offending software.

4. Stay up-to-date

vulnerability


A vulnerability is a bug or design flaw in software that allows that software to be used in some malicious and unintended way. All software has bugs, which are nothing more than
... continue reading »

I’d wager that over 90% of virus infections don’t have to happen. Software vulnerabilities that malware exploits usually already have fixes available by the time the virus reaches a computer.

The problem? The user simply failed to install the latest updates that would have prevented the infection in the first place.

The solution is simple: enable automatic updates in both Windows and applications and visit Windows Update periodically.

5. Educate yourself

phishing


Phishing is the attempt to represent one’s self – typically via email – as someone or some organization that you are not for the purposes of maliciously acquiring sensitive information. The most common examples are
... continue reading »

To be blunt, all of the protection in the world won’t save you from yourself.

  • Don’t open attachments that you aren’t positive are OK; attachments are one of the most common ways that malware sprads.
  • Don’t fall for phishing scams. Be skeptical. Phishing is a common way that online accounts are hacked into and can lead to more serious issues like identity theft.
  • Don’t click on links in email that you aren’t positive are safe.
  • Don’t install “free” software without checking it out first. Many “free” packages are so because they come loaded with spyware, adware, and worse.

When visiting a website, did you get a pop-up asking if it’s OK to install some software that you’re not sure of because you’ve never heard of it? Don’t say OK.

Not sure about some security warning that you’ve been given? Don’t ignore it.  Research it before doing anything.

And of course, choose secure passwords and don’t share them with anyone.

6. Secure your home network and your mobile connection

wifi - open


Open WiFi is any WiFi connection that has not been configured with a password. Anyone with a WiFi-capable device can connect to an open WiFi hotspot. If a password is used on a WiFi connection, then
... continue reading »

If you’re traveling and using internet hot spots, free WiFi, hotel-provided internet, or internet cafes, you must take extra precautions.

Make sure that your web email access – or for that matter any sensitive website access – is only via secure (https) connections or that your regular mail program is configured to use encrypted connections as well. Don’t let people “shoulder surf” and steal your password by watching you type it in a public place.

Make sure that your home WiFi has WPA-security enabled if anyone can walk within range and that you’ve changed your router’s administrative password.

7. Don’t forget the physical

encryption


Encryption is the process of mathematically processing data using an encryption “key” – such as a password or passphrase – in such a way that the result of the combination is
... continue reading »

An old computer adage is that “if it’s not physically secure, it’s not secure.”

All of the precautions that I’ve listed above are pointless if other people can get at your computer. A thief can easily get at all of the unencrypted data on your computer if they can physically get to it. Even login passwords can be trivially bypassed if someone has access to your computer.

The common scenario is a laptop being lost or stolen during travel, but I’ve also received many reports of people who’ve been burned because a family member, friend, significant-other, or roommate accessed their computer without their knowledge.

8. Back up

image backup


An image backup is a complete copy of a hard disk or other media being backed up. The copy is complete in that it can be restored to a completely empty hard drive – as in a replacement hard drive after a failure – and the result is
... continue reading »

I know that backing up doesn’t feel like a “security” measure, but ultimately, it can be one of the most powerful ways to recover if you even encounter a security related issue.

Having a recent backup to restore to can quickly undo the damage done by almost any form of malware.

Having a back copy of your data (all your data) can help you recover after computer is lost or stolen (not to mention when a hard disk dies).

Backing up your email and contacts can be a critical way to restore your world should your online account ever be compromised.

Backups truly are the silver bullet of the computing world: a proper and recent backup can help save you from just about any disaster, including security issues.

Overwhelming? It might seem so, but…

Tools

This all might seem overwhelming, but please believe me when I say that it’s not nearly as overwhelming as an actual security problem if and when it happens to you.

The good news is that the majority of the things you need to do to stay safe on the internet are things that you set up once and let happen automatically thereafter or new habits you form yourself based on the important things that you learn about keeping things secure.

While we might want it to be otherwise, the practical reality of the internet and computing today is that we each must take responsibility for our own security online.

Reprint Rights: I feel that the information contained in this article is so important that I encourage you to share it with your friends, family, and co-workers. To that end, permission is hereby granted to republish this article in its entirety, with the following conditions: the text may not be modified, the links must remain active/clickable if published in a form or format that supports linking, and the article must of course be attributed to Ask Leo! – also clickable, please.

I’ve also made available a free downloadable PDF of this article that you are encouraged to share with whomever you like. You can download it here.

This is an update to an article originally posted : June 19th, 2005

There are 122 comments:

  1. steve Reply

    Hi Leo, Steve here from the acres, and I have a question conserning spy ware and such. I found with a spy ware scanner about 101 spy ware things most were update things and such from microsoft and other software that seems to be important. It ( the spy catcher ) gave no other info on weather it would hurt or hinder the proformance of my machine or such. How do I find out other than the obivious of finding out weather to take them out or not? thanks for the help if possible, Steve @ Kens corgi acres

  2. Leo Reply

    Hi Steve,

    You didn’t mention which tool you were running – if it happens to be spybot (the one I run), it does a very nice job of providing additional information about each item it’s flagged. I assume some of the other tools may have something similar, but I can’t say for certain. Your question is definitely a common concern … sort of a “now what?” after you get those 101 flags :-).

    Most of what typically gets reported are tracking cookies. An *over* simplification (and my opinion) is that most tracking cookies are a) safe, and b) also quite safe to delete. Afterwards you may need to log into a site that normally remembers you, but that’s typically about as inconvenient as it gets. Ditto for things like media player, real player and so on. I regularly run spybot, scan the results, and if there’s nothing obvious to me, I go ahead and have the tool cleanup / delete everything it finds. Again, this is with the caveat that I’m using spybot search & destroy, and am comfortable with what it’s found.

    Leo

  3. michael horowitz Reply

    In addition, you also need to install bug fixes for the software on your computer. Doing it for all the software is most likely not practical, but certainly it should be done for Windows and MS Office.
    At the moment the procedure for applying bug fixes (aka patches) differs for just about every software program. :-(

    Another suggestion is to avoid Internet Explorer, Outlook and Outlook Express. If you are very familiar with computers, these programs can be configured for reasonable safety in their latest versions. However, if you are not familiar with computers or are using older versions, they are each an accident waiting to happen.

    Mozilla is a free replacement for IE and has the advantage of not supporting ActiveX (a potentially dangerous technology). Mozilla also comes with an email program that is a free replacement for Outlook Express.

  4. Eliza Reply

    Dear Leo,

    I used two spy scanner & trojan remover. But both can’t remove some of the trojans e.g. win32:Trojan-gen.{VC}. They even could not be quarantined!
    Eliza

  5. James Reply

    Don’t forget about trying to stop the problems in the first place.
    i.e. security settings in internet options should be set up so only sites in your “trusted sites” list can download files and run script.
    I set the “Active Scripting” setting to prompt for all other “internet” sites so I can decide whether to allow the site to run potentially dodgy script. It has to be said that this is a bit irritating though as sometimes you get lots of messages.
    However, if you turn the scripting off completely a lot of sites don’t work.

    PS- I recommend Ad-Aware and Spybot.

  6. Kerra Reply

    Here’s one that’s leaving me scratching my head. I have a winxp system that Norton 2004 says is infected with the Korgo.L virus, so I hop out and get the specific removal tool for it. I run it, but it says the system is not infected with the virus. So I run Norton again…yep, you have the virus it says. Can’t fix, can’t quaranteen, can’t delete. I see the file that is indicated, I have deleted it in safe mode with restore off but it keeps coming back. How do I get rid of the durn thing??

  7. Leo Reply

    This is a situation where I immediately visit other virus manufacturer’s websites and look for other tools or manual removal instructions. In this case I found a set up on Trend Micro’s site that seems promising: http://ask-leo.com/d-korgol

    Let me know of that helps.

  8. pat Reply

    hi leo hope you can help me i had a free scan it showed 415 infections 2malignant proscess it totaled items scaned where 43506 signature 10684 this is my first computer i dont know what to do? it runs great please help do i have to order it i cant right now thank you pat

    • Jack Reply

      Pat, You will have that issue with anything that offers a ‘free scan’. The huge amount of ‘bad stuff’ it claims to have found is a scare tactic, so when you click to clean them up, you get routed to their purchase page, and many will pay for it, to get rid of all of that bad stuff, that doesn’t exist. (Some of it may be legit problems.)

      “CCleaner” (Piriform), “Spyware Blaster” and “SpybotSD”, (“SD”=Search and Destroy.) are all freeware programs, which each does a very good job of getting rid of the bad stuff, that is actually there.

      Don’t forget to set a restore point, through the Control Panel>System>System Protection, for just in case, until you get them tuned to your needs. Each has an “Exclude” option for things like your index (Search) folder and files.

  9. Leo Reply

    Anti virus or Anti Spyware? In either case I’d let (or get) the tool that actually cleans things up for you after they report what they’ve found. Most do.

  10. Collin Reply

    Hi Leo, My boss’ computer has a HUGE problem. Whenever we attempt to open explorer, my computer, or basically anything that was pre-installed we get the message “Explorer.exe has generated errors and will be closed by windows.” We have no idea and other forums are pretty stumped. Maybe it’s spyware, we don’t know. Any help would be appreciated!

    Collin

  11. Cheryl Reply

    I currently have Symantic & Norton for computer security. The files have grown so large they are causing “glitching” problems. I want to replace all the internet security’s I would need and also having control overy the updates required. IE: I do not use the parental control programs, yet Nortons automatically downloads large files for this function, so I do not need these updates.
    I need to know what programs I should be looking at.

    • samg Reply

      5 years ago I wouldn’t have touched any Norton software. Even if obtained free. But people say it’s been improved. To remove Norton/Symantec you have to run their free REMOVAL TOOL. Otherwise it will not be totally removed. If you want to run paid IS or AV software, I suggest trying Kaspersky. F-secure? Can’t vouch for McAfee. They may be good. Search the net for best software suggestions. If you have more than 1 computer look for IS, AV software that covers 3 computers. Free AV works fine. Have used it for 3 years. AVG currently. Avast and Panda cloud in the past. Again search the net for reviews. If you have deeper problems search for rootkit removal software to run. It scans outside the operating system. Then install malware removal software. I run Malwarebytes and Spybot search and destroy. Adaware used to be a favorite of mine. Then if you still have problems search for adwcleaner. Their site is in French which Is beyond me. But download that program and run it. It’ll find things nothing else will that I know of. You download it and run it. No install. It notifies you if you need to go to the site and update.
      Some Comodo software is good. I’ve tried most. Run cleaning essentials occasionally but the firewall and IS Is clunky, glitchy in my experience. But free. Thanks for your free ebook for internet security. Leo. And for distributing the newsletter. I’m a home user and it refreshes my mind, perplexes me, and sometimes provides a laugh. May you have many more happy years.

      • samg Reply

        OOPS! I just noticed the posting dates on these. This is 08/2013!

  12. maria cooper Reply

    Are music downloading prgrammes a really bd idea? WE seem to always have viruses on our computer after we’ve used it (MP3 downloading). Also Our firewall (ZoneAlarm) under prgramme control it has Access and Server columns, I don’t know which programmes to make trused and which to allow?

  13. Leo Reply

    It depends on the program. The file sharing programs like Kazaa seem to be the most problematic.

  14. Benjamin Lindelof Reply

    Best setup:
    Router + Software Firewall + Antivirus + AdAware SE

    None of this is provided by Microsoft. Even the Software Firewall works, but try Norton or Zone Alarm.

    I recommend Norton across the board. They have saved me a few times; a virus comes out in the morning and they have an update specifically for it that afternoon!

    Router: Make sure it’s a router and not just a ‘switch’.

    Ad-Aware SE: Available at http://www.lavasoftusa.com

    I hate spyware!

  15. auctionhugh Reply

    This is only my opinion. If you have fast internet (DSL or Cable Internet), you should/must have a router between your DSL/Cable modem and your computer. The router can be wired or wireless.

    A wired router is a small, inexpensive (Under $40) piece of hardware that provides a huge help protecting your computer – because they all have a built in firewall that requires no attention from you to maintain.

    As an added bonus, they also allow you to hook more than one PC/Laptop to your fast internet connection at the same time! And if you want to set it up, you can use it to create a home network that allows all your computers to share one printer easily.

    This is just one wired router that will work fine for you, there are many others: http://tomshardware.bizrate.com/nc/marketplace/search/search__prod_id–6646705,rf–tng011,sort–6.html

    One other note, Windows XP Service Pack 2 turns on the updated “Windows Firewall”. If you’ve installed “SP2″ you probably have a firewall running. However I still strongly recommend a router with built in firewall.

    Hope this helps,
    Hugh

    ________________________
    Stop being frustrated with your Web site -
    Let Kathleen help you!
    She will give you great service and appreciate your business!
    Professional, artistic, and EASY for you!
    http://www.kallenweb.com/

  16. poorak Reply

    Is there any firewall which works under safe mode with networking in win XP.

  17. Leo Reply

    I’m not sure about software firewalls. I’d check the WIndows XP built-in firewall … I’d be surprized if that didn’t work. And certainly an external firewall such as a router will work.

  18. Moise peck Reply

    HI, I was just wondering if can help me find a few music download sites that do not carry viruses (trustworthy) when downloading music

  19. kiran Reply

    Hi ,
    i have a pc at home without internet connection. I use to browse internet from a nearby browsing center. It seems my system has been attacked by virus as i had copied a file(not exe but pdf file) in the browsing center in a floppy and store d in my system. now i am not able to see folder options in my tools menu of windows explorre . Also my system has become slow. Any idea y dthis happende

    Thanks
    Kiran

  20. Leo Reply

    Why is hard to answer. But it definitely sounds like you need to run an up-to-date anti-virus and anti-spyware scan.

  21. Henry M Reply

    Also remember you can block known spyware sites. Or other sites that have been known to install applications without your approval *cough* viewpoint *cough*. (Long story short – a process was installed and running that I never approved of. Leo’s site has excellent information viewpoint)

    My hosts file now has these following entries in order to hopefully prevent future unapproved installations:

    127.0.0.1 creativeby.viewpoint.com
    127.0.0.1 http://www.viewpoint.com
    127.0.0.1 http://www.one.org
    127.0.0.1 one.viewpoint.com
    127.0.0.1 track.vwpt.com

    Thanks Leo!

  22. Zac Paullan Reply

    Hi Leo,

    Great site.

    I have a new 200gig hard disc and i want to format it and then install windows xp. I have never formatted my pc and do not know the commands or what to do?. I have been told to format my new hard disc UNCONDITIONALLY. How do i do this?

    Thanks!

  23. Leo Reply

    If you reboot from your Windows install CD, one of the options along the setup process will be to formnat the hard drive.

  24. Ali Reply

    I have 6 procsses in windows task manager how do i delete them without damgeing my system? isass.exe, svchost.exe, csrss.exe, taskmgi.exe, spools.exe, msmgs.exe,…..can anyone help? (running win xp pro)

    • samg Reply

      As Leo says “don’t do it”. Look harder in task manager and you’ll see most if not all are MS windows functions. Are you joking?

  25. James Reply

    I don’t have an installation CD for Windows XP –
    and I can’t boot up my notebook..where can I download it?

  26. Leo Reply

    You cannot legally download it. You’ll have to get one from wherever you got your laptop, or you’ll have to purchase one.

  27. ellen collicutt Reply

    how do you change your msn messenger hotmail name with out having to make a new account?

  28. Walt Reply

    I would do what it takes to get Automatic Updates to work, or start visiting Windows Update on a very regular basis.

  29. latanya Reply

    Hi leo, just recently gave someone my ip address..can they find out where i live..they said they could help me fix a problem i was having…i also have computer phone service..can they get my phone number..How do i block it? Hellppppppp.

    Scared!!!

  30. JoyLeaf Reply

    I have stopped using Windows update since I learned that it’s verification process is spyware and lets the mothership, Microsoft know what software I choose to use and if I have a registered copy. I have read about this on several sites with a good reputation and am looking for a way to get updates without using their verification program. Any help you can offer with this problem?

  31. kuldeep Dashora Reply

    There are “Trojan horse” type programs, such as Back Orifice and Netbus, that could cause the behavior you are describing. Both BO and Netbus are Windows 95/98 applications designed to allow other people to access your machine (generally for malicious purposes) over the Internet.

    In order for anyone to use BO on your machine, you have to install the server side of the application. This is normally done by getting you to download an application or by sending the server EXE to you in an e-mail message and hoping you execute it. This is why it is called a Trojan horse — you have to consciously or unconsciously run the EXE to install the server — it does not propagate itself like a virus (see How Computer Viruses Work for a description of Trojans and viruses). Once you execute the server EXE, the server is installed and will start running automatically every time you turn on your computer.

    With the server installed, an evil-doer can run the BO client program and control your computer remotely, running programs, erasing files… Obviously, this is not a good thing. It is easy to detect Back Orifice either manually or with software.

  32. Benjamin Wilson Reply

    I have McAfee Internet Security Suite 2007 on my computer and results, cookies are spyware: clean, no viruses, spam (Outlook Express 6 has a feature from the program that I use to mark mail as spam and has its own SpamKiller under the Inbox when it starts up with a +/- button to show/hide SpamKiller (Ex: [SPAM]=AdventureQuest= New User Confirmation; normal e-mail ex: =AdventureQuest= New User Confirmation.)

  33. omarfathel Reply

    it’s very important to be educated to know where is the trusted sites to view and where is the suspecious sites is located, so my advice is to give a good education to internet users about the sites that they should trusted, and may be in the future to make an web site that recommend the good sites to the users. thank you

  34. Kim Reply

    Which antivirus product is most compatible with
    Vista-loaded new computers? I have used Norton Antivirus on my previous computers, but have heard terrible things about NAV 2007 making Vista computers run very slowly. The computer is an EMachine, with Vista Home Premium version.

    Anyone have advice? I am still on dial-up internet, using AOL and wonder how much protection AOL provides for incoming viruses. Also, how good is the Firewall and Windows Defender stuff built into Vista Home Premium operating system?

    Thanks!

  35. Leo A. Notenboom Reply

    —–BEGIN PGP SIGNED MESSAGE—–
    Hash: SHA1

    “Most” compatible I couldn’t tell you. I’m sure that many run well on Windows
    Vista. I happen to use the latest version of CA’s eTrust AntiVirus on my Vista
    machine and it works well: http://ask-leo.com/d-etrust

    Leo

    —–BEGIN PGP SIGNATURE—–
    Version: GnuPG v1.4.7 (MingW32)

    iD8DBQFGtz6kCMEe9B/8oqERAofDAJoChFUj9zrSoxvGbFxkVCuDVmIN0gCeJxCs
    HKC5r3sOKjDRyBXbDHH7bWQ=
    =Wncz
    —–END PGP SIGNATURE—–

  36. Roz Weir Reply

    I downloaded CCleaner just now and ran it but it wants to delete things I use…I don’t understand how to keep from deleting the whole list…there are things that need deleting but not the whole list..HELP..how do I keep from deleting everything it wants to delete?

  37. vincent Reply

    I’m afraid ccleaner does not let you choose which items within a selection to delete…
    You either delete the index.dat files or you don’t.
    You either delete the temporary Internet files or you don’t.
    etc.
    Sorry…

  38. Nit Reply

    i am going to change my residence soon…so i will get a new internet connection…so will my ip address change??

  39. rowal5555 (rob) Reply

    To Judy Kirkham et al.
    In addition to the great tips here at ASK LEO, I would strongly recommend you visit http://www.bleepingcomputer.com which is a site of 1000s of experts and newbies dedicated to helping one another with the day to day problems we all face. I am 66, and have learned almost all I now know from this friendly site. Cheers

  40. D. W. Whitlock Reply

    I am new to Leo’s site. Very cool. Extremely helpful. Just wanted to recommend using download.com when downloading freeware programs. Their site is totally clean of spyware, malware etc. I am currectly using Super Anti Spyware and Avira AntiVir. Both are free and perform outstandingly. They scan quickly too. Check them out. Best regards, D.W.

  41. BEVERLY Reply

    Dear Leo
    I have the warning dangerous spyware image on my
    desktop and it won’t go away I’v got norton and spybot and neither has helped to delete this warning from my desktop. I’ve gone to my control panel and tried to change the settings and I can’t the arrows that allow you to change the settings are all frozen. Can you please tell me
    what I can do to get my beautiful desktop of the beach back. I got it from trying to download a movie toolbar and ended up with inbox.com which I cannot uninstall. Please help me.
    thank you
    Beverly Kemp

    Sounds like you are still infected with spyware of some sort. Sounds very similar to: How did you clean up your friend’s infected machine?

    - Leo
    24-Feb-2009
  42. Henrik Nielsen Reply

    To shameem (January 3, 2009):
    The software you link to is not free, it’s a limited trial. KeePass does the same thing, but is really free and open source.

  43. Dusty Reply

    hi everyone i am new to leo’s site i just wanted to recommend a site that yall try if you ever need complete internet security go to http://www.kaspersky.com i use kaspersky myself and it’s the best i have never once had a virus or anything so give it a try :)

  44. James Reply

    I know you’re not the only person to spell the plural of virus as virii, but do you know of any authority for it.
    I’m afraid I find it mildly irritating.

  45. Isaac Reply

    i recently installed symantec antivirus on my computer but it is refusing update and even run a scan.I tried to repair it but it tells me there is interruption before the completion of the installation.

  46. ajay Reply

    hi sir
    i am suffering from virus that change jpeg and mp3 file into yan chit tal file and all files with above extensions are infected,.
    after using antivirus it is not removed and all imager are converted into a girl image with love writtn when i see them in thumbnail view and my computer icon has been changd into two keys icon.
    please advice me

    thanks.

    I’d send you here: How do I remove a virus?

    Leo
    12-Sep-2009

  47. patricia dorey or shellbone Reply

    how do you do that when your using the college libraies computer or it don’t even let you get to your e-mail account

  48. iain deuchar Reply

    My daughter installed Firefox on my laptop and was then unble to access certain facebook applications. How useful is Firefox if the pc is already protected by AVG free version and Spybot? How many javascript settings would have to be changed and is it wise to have more than one anti-virus system running at the same time. I have been using AVG for some years and would be sorry to let it go. Thankyou.

  49. albert piccioni Reply

    how do I know if someone is reading my harddrive while my pc is turned on or off?

  50. carolyn Reply

    Trying to download new intrnet security and it keeps saying that the old one still there but it’s not on uninstall list

  51. Anu Reply

    How do can I prevent my children from going to wrong/ pron sites and how can I keep track of the sites visited by them?

  52. MmeMoxie Reply

    Leo, just went to your store and found the FREE PDF file, Internet Safety – Keeping Your Computer Safe on the Internet, about this very subject. I must tell you, this is an awesome PDF file!!! I have already downloaded it and plan on passing this file to everyone that I repair or build a PC for, which means family and friends. I also, plan on using my ‘copy’ as a training tool, for others.

    Thank you for caring about your readers. This is a wonderful tool for everyone, newbie and expert alike. No matter how knowledgeable you are about computing, you simply need to have material available as a reminder or refresher or for educating.

    Thanks for your kind words! You’ll be pleased to know that there’s an updated version, which will remain free, in the works.

    Internet Safety – Keeping Your Computer Safe on the Internet is available here for free.

    Leo
    05-May-2010

  53. Jim Reply

    There are many free antispyware programs you can use such as Spybot, Malwarebytes, Adaware, and even the new Microsoft one.

    href=http://www.onlinecomputertips.com/tutorials/spyware.html>Spyware cleaning tutorial

    href=http://www.onlinecomputertips.com/spyware/malwarebytes.html>Malwarebytes Anti Malware

    href=http://http://www.onlinecomputertips.com/spyware/sec_essentials.html>Microsoft Security Essentials

  54. Barry Karas Reply

    9/Jun/2010 16:46

    You wrote “viri” as the plural for virus. The correct plural is “viruses”.

    Sincerely,

    Barry Karas

    PS Perhaps “viri” is okay in the UK and Australia?

  55. Chetan Reply

    Hi, I visited this website first time today and found it really interesting. How much elaborated your articles are. I really liked them. I will keep on visiting on your website and will let others know about it, if you keep the same quality. Keep it up man! Gud luck!

    Thanks for such a knowledgable resource.

  56. Dodgie Osabel Reply

    Thank you, Leo, for this very helpful reminder — to watch ourselves. All your tips and good advice will come to naught if we forget or ignore them.

  57. Ian Reply

    Leo the article is great! I seen another article that I think will help anyone who thinks they have a virus or spyware on their computer. The company offer a free antivirus as well and interesting article on spyware removal. Worth a look.

  58. Suellen Crawford Reply

    Norton & that type of protection do not protect my yahoo email, only windows mail, at least that is what I understood them to tell me. How do I protect email if not windows mail?

  59. Ann Reply

    How do I stop the live-time virus scanning of the McAfee program my AOL contract provides? It slows my machine down too much. I would like to have more control over when anti-virus program runs.

  60. Sandi Arie Reply

    Hello,
    I was told at work yesterday from a friend that I have a virus.I have a Mac.He said cookie came up.He is well protected,so anything he gets thats got a virus won’t open.I’m new on the computers how do I fix this?
    Thank you
    Sandi Arie

  61. John McCloskey Reply

    When using your computer off-line, disable your internet connection if it still has an IP address. This is more than just closing the browser.

  62. legitimate Reply

    How to avoid my network (ISP) spy on my activity in internet ???
    if use VPN can help that ??

  63. George Mc Connell Reply

    Hi Leo , First of Leo i really enjoy reading your news letter , i dont understand most of the info thats not your fault as you will see by my question i am an Novice .Here goes i have a HP laptop i turned it on the other Day all the lights came on i could hear the fan start up but nothing on the monitor (not lit up ) and then the fan and lights shut off, Ithink the lap top is about 10 Years Old ,maby it’s had it what do you think ,Thanks Leo .

  64. Mark J Reply

    @George
    Could be a number of things. 10 years is an old computer. It may have just given up the ghost. You’d have to bring it into a technician to see what the problem is. If the computer is unrepairable, it’s still probable that your data is recoverable from the hard drive. You may want to have them recover that data for you.

  65. Jody Miller Reply

    I was somewhat aware that setting up a standard account on my desktop for a friend was not a wise idea. They don’t pay much attention to sites they visit and their passwords are so Easy!! Since on my desktop/his standard acct.? His G-Mail got hacked and so did his Live acct. I surely hope this does Not affect My Admin. acct. or jeapordize me!! I immediately ran all scans, went to my Admin. side, removed his email address’s (as I had already gotten the person that hacked his email) several gibberish emails; meaning “foreign” talk. You could tell this person was Not from the USA. So? Not advisable to Even set up a standard acct. on your computer for Anyone!!

  66. DDDes Reply

    Leo,~~Three Harsh Software Programs Indicate I Have No Immediate Threats , Am Free Of Malware + Worms Etc Microsoft Windows Indicate That My Problem Is SERIOUS & Indicate >ati2dvag -display driver stopped working or not responding!~I Believe Them , As You Would BUT Despite My Attempts To Locate The Required Updates As Soon As I Attempt To Download a Legacy Driver Microsoft Windows Warn Me To Not Do So ???~~I Am At a Loss To Overcome This Series Of Blue Screens + Black Screens & Start Up Difficulties !~~~This Issue Is Unlike Anything I Have Read~!!~~Can You Address The Issue Re display driver version>8.221-06012421-030152c-ATI ~Regards To You , DDDes

  67. Bonney Reply

    What is “As251f” . These files (folders) show up sometimes out of nowhere. They show up on my work server. Is it dangerous, spyware?

  68. PANKAJ RATHI Reply

    awesome content on networking and very easy explanation dear thank u so much for sharing this with us and teaching us in a great manner thanks once again

  69. Mark Miller Reply

    I agree. Thanks for the tips. The first thing that everyone should use is technology to monitor what kids are up to on the web. For example, I use a free app called Qustodio to monitor who my girl talks to on Facebook as the app allows me to watch the profile pictures of accounts she interacts with. My way of ensuring that she stays safe. Just Google for it.

  70. Lisa Reply

    These are great tips. I try to be smart when surfing the net and not open attachments and so on, but I have to be honest and say that I feel much safer because I have an antivirus to protect me in case I blow it (I use Unthreat Antivirus). So I agree, you have to use common sense but it’s also nice to have programs to back you up if you make a mistake.

  71. Nav Reply

    Nice and educating article!
    However, wanted to know, are Porn Sites and X-Rated Chat Rooms safe on Internet? This is a very big question and most of them indulge in the same!

    • Henry Reply

      Porn sites and similar sites normally are pretty safe.
      They need to make money so they do the best to stay “clean”.
      It’s just sites you think are trusted that are infected. “Christian” sites are good example.
      It’s very odd if you get a virus alert related to a pornsite.

      • Mark Jacobs Reply

        You may be right about porn sites, but there’s also the issue of links to fake porn sites which may give you malware without even providing porn.

  72. Mark J Reply

    @Nav
    Porn sites and illegal download sites have a much higher probability of containing malware than other kinds of web sites. Of course, any website can host malware, but porn sites are very common sources of infection. A service like WOT can be a help as it is based on user ratings and can warn you when you are going to a site which they rate as unsafe or untrustworthy. It’s not perfect but is one more layer of protection. But even if you use WOT, it’s still safer not to click on links to questionable websites as you might go to a bad site which WOT hasn’t rated yet.
    Web Of Trust – Website Trust Ratings from Other Internet Users

  73. Nav Reply

    Thanks @ Mark! I have an Issue, when I check my Last 10 Login IP addresses within my Gmail Account, I find that my individual Login IP is being differed sometimes even though I login from the same system and same Internet Provider. The location of my IP is also different. Does that mean that my system or email ID is hacked?

  74. Mark J Reply

    @Nav
    That’s not a sign of being hacked. Your ISP has a range of IP numbers that they assign to customers, and they can assign a different one each time you log in.

  75. TeChCrAzY Reply

    @Nav My laptop also got infected once with malicious software – all because of my fault. I had one of these pop-ups coming up saying that your computer is infected with viruses and click install for software update to remove it.
    Since I had recently installed an anti-virus software I automatically assumed it was a message from that software. Ohh but I was so wrong… and I realized it immediately after I clicked on the popup. But it was too late.
    I took remedial help immediately. But the technical guy said there is no option but to format your computer. He helped me with the backup so there was no data loss.
    But I learnt a great lesson that day. Sometimes even if you are aware and vigilant, some things may take you by surprise.
    So now, I am very careful with popups and I click only after reading and understanding it thoroughly.
    Thanks for these tips.I read some nice tips here also
    http://www.youngnerves.com/tag/how-to-prevent-malware/

  76. Tony Reply

    Everything above takes effort so what I am about to suggest is probably not for the lazy and careless.

    Read a bit on installing a Linux Dual Boot which is really easy nowadays or use a Live Linux Distro CD.

    In either case you get a START button, Firefox/Google chrome,Thunderbird.

    After that its the same as using Windows, just a lot safer. Google how many Linux Viruses or Trojans or Worms there are to why it is safer.

    With the Dual Boot, you get a menu at start up to select your Windows or Linux.

    If you don’t want to abandon MS Office or something else only on Windows just use Linux for e-mails and browsing.

    Live Linux CDs are really secure for Internet Banking as nothing can be written to the CD.

    Oh and as in the article BACKUP!!!
    Do this when you install a dual-boot linux just in case. In 15 years I’ve never lost a Windows yet but still you should BACKUP !!!

  77. Mike Reply

    Regarding your recommendation of AVG Free: I installed it and after it launched, a notification immediately appeared that there were only 29 days remaining before it stopped unless it was purchased. Maybe my concept of “free” is outdated!

    • James Reply

      It’s been about 2 years since I used AVG, but it sounds like you didn’t get the free version. When I did use AVG, I found that the download for the free was sometimes harder to find on their website.

      I once ended up with the pay version, which does expire if you don’t actually pay them. All I had to do was uninstall it. During the uninstall, it asked why and one of the options was that I didn’t want the paid version and would like to switch to the free version. It happily accepted my choice to do so and only uninstalled the paid components and then restarted AVG again.

      I no longer use AVG and go with Leo’s current recommendation: MS Security Essentials. I was finding AVG seemed to interfere with my computer use shortly after booting up.

      • Connie Delaney Reply

        Keep in mind too, that paying a small fee for something as important as virus protection might be a good idea. After all, we want the folks who work on the project to be able to go a good job and keep doing what they are doing. In order to do that they do need to be paid.

  78. Gerry Rains Reply

    I may have missed this in all of the responses, but the freeware version of Malwarebytes-Anti-Malware is, IMHO, a must have program. A full scan will take some time – obviously 100 GB of data will take longer than 15 GB, but you will be amazed at what has gotten past all of your Security programs. This is especially important after you have installed new software. CNET, once everybody’s friend, forces you – I really mean there is no choice – to accept all sorts of additions to your system that you never wanted. It’s not like the installations that let you click “decline” for an offered piece of software or those that allow you to uncheck a box. If you download from CNET and install, the cleanup is a lengthy process. It’s sad to see what was once my favorite site for opinions of reviewers having prostituted itself. You can still read the reviews, but DO NOT DOWNLOAD FROM CNET.

    • Mark Jacobs Reply

      Win Patrol is also great. Recently, I installed some freeware that came bundled with foistware, and Scotty asked me one by one whether I wanted to install those programs and I simply said no.

  79. Henry Reply

    On my main computer I run Linux or Windows in a virtual environment.
    I keep everything updated anyway but don’t run a real time virus scanner because that darn thing consumes too much CPU time all of the time.
    Just run a scan before opdating the real system.

    As in the past I my computer crashed because of some 500 undesirables on it I’m a bit suspicious.

  80. Kestrel Reply

    I have moved over to MSE. Can I use Avast and Malwarebytes pro too? That is will they conflict with each other?
    Kestrel

    • Mark Jacobs Reply

      MalwareBytes, no problem. Avast can be installed along with MSE, but if live malware scanning is turned on, it can conflict with MSE. Only one antivirus program should be live scanning at a time.

    • Leo Reply

      I would not recommend Avast with MSE (at least not with realtime scanning turned on in both – it’s OK to have both installed, I believe). Malwarebytes is fine and a good addition.

  81. Dave Hansen Reply

    Every other time I shut the computer down, it tells me to leave it running so it can install updates. Last night it was 168 updates ! This takes an hour or more to do. What the heck is going on ? And are these updates bringing some viruses along with them ?

  82. Margo Lurvey Reply

    Hi Leo,
    I am trying to download an update to my Adobe Flash Player. I have the question “do you want to block the cookie 127.0.0.1.?” So I’m asking you if I block that cookie, will Flash Player work properly?
    Thanks
    Margo

    • Leo Reply

      I’d have to know what software is presenting that question. I’m surprised that 127.0.0.1 is being used, but I’d be tempted not to block it.

  83. TOM TOM Reply

    if I’m working in a Wi-Fi cafe with both my Wireless Internet Connection and my Local Area connection disabled, can anyone hack my computer, or see what I’m doing, or anything else of that sort???

  84. Muhammad Raza Reply

    hi leo , i am from pakistan sir i am fond of Games , i have a core2duo laptop , i installed a AVg antivirus on my kaptop , but it scan the files of games and delete them , the result came that the game dont run, so i uninstalled it , will it is safe or not for my kaptop

  85. Rachana Reply

    Dear Leo,

    When i start my chrome or Mozilla or any of them to go browse other pages. In 1-2 minutes, i get a notification that my Google is stopped working and antivirus has just stopped an attack by uk based website. I have Norton antivirus, i have recently installed after this problem occurred Microsoft essential security program, i used scan.exe to check. But still i get this problem that net stops in 2-3 minutes.

    Is my PC getting attacked by someone – whats the solution.

    Regards,
    Rachana

  86. KyleBlene Reply

    I think if one simply gets a backup and recovery software, things become more convenient. I use Rollback Rx. If there are prblems that i feel have to do with the programs and software I simply rollback. Ofcourse this approach only workd if you’re willing to sacrifice unsaved data accrued over te last week or so. Which means that that data wasn’t very important. If you take these precautions you will be alright, won’t you. I realize that 90% dont do this but still thought that mentioning such an apprroach will enliven one dimensional collumns.

    • Connie Delaney Reply

      That’s a great suggestion – and really the only thing that works. If you use incrementals you can actually (fairly easily) do nightly backups and never lose anything. I also do a lot of my daily work in a Dropbox folder – so I am backed up to the minute on those.

      Here’s an article on what Leo does! http://askleo.com/how_do_i_backup_my_computer/

  87. Art Allen Reply

    Maybe a stupid question but cannot find the answer anywhere. I run Windows XP on my desktop but mostly do all my surfing on my ipad with the wi if that is connected to my desktop. As long as I just use my ipad, and set up a wireless printer, am I safe when support ends for XP ? Thanks

    • Leo Reply

      “Am I safe” is not a yes/no answer. If Windows XP is connected to a network and used for anything at all, it could be vulnerable. I now have several articles on XP’s end of life – I’d recommend you search for them here and give them a read.

  88. samson Reply

    i can’t download anything in my pc by using modem it is asking security ,want solution

    • Leo Reply

      “it is asking security” – no idea what that means. I need detailed steps and complete error messages to have a chance of helping.

  89. Carrie Reply

    My daughter was playing on my laptop and the message came up that there was a virus threat so I asked the AVG to remove it. Now when I open a new page this address comes up on another page – what is happening here, please help.
    {url removed}

    Thanks, Carrie

Leave a reply:

Before commenting please:

  • Read the article. Seriously. You'd be shocked at how many people make comments that prove they didn't.
  • Comment only on the article. If you have a new, unrelated question start with the search box at the top of the page.
  • Don't post personal information. Email addresses, phone numbers and such will be removed.

VERY IMPORTANT: because of a rise in comment spam that's making it through our filters any comments that do not add to the discussion - typically off topic or content-free comments - run a very high risk of being flagged as spam and removed.

If you have a new question unrelated to the article above, ask it on the Ask Leo! ask-a-question page.