Monday, October 5, 2009

How to Make Sure Your Laptop Secure in Public Places

When working on site, either in a client's office or in a café, you need to protect your laptop, whether it's against the theft or cyber-Nosy Snoop tries to browse your iTunes library (or worse). As you probably did your business securely over a VPN to connect their internal network, what are your personal passwords and local files? Let's look at some good habits for access to computer laptop safe, then more advanced tactics.

Every laptop user should have hacked a healthy paranoia about the possibility of receiving stolen her laptop, or while using a Wi-Fi public airport or coffee. Stay safe and use some tools in the operating system your laptop's built in to ensure your safety.

Turn on your firewall. When you open a Wi-Fi, make sure that you have a firewall on your laptop and blocking unwanted incoming connections. In the Windows Control Panel, click Windows Firewall. On your Mac in System Preferences, go to Security and click on the tab "Firewall" to turn it on.

To protect your password - or unshared - shared folders. If you are at home, a folder of documents with other computers behind the firewall is a good idea. But if you're traveling, you may not want everyone to see in a position to your collection of photos from the family vacation. Ensure that your shared folders are password protected to do if you do not securely over a network. Even better would be to clear all the shares if you are in a public network.

Use HTTPS (secure connections to websites on the Internet), if possible. If you check your webmail like Gmail or Yahoo Mail, or visit a website with the option to make sure that https: / / (instead of http://) port to encrypt all information you provide here as your password. Most modern web mail and calendar programs such as Gmail and Google Calendar offers https: / / option.

Do not store encrypted passwords in your web browser without them. Of course, if you store your passwords in your web browser, you will win a lot of time together. However, if a thief, a colleague or family member uses your computer, it is also simply kill that person to connect to your accounts. Three weeks ago, I have way to save the passwords in your browser with a master password stored in encrypted form - to do so.

Lock up your laptop with an effective lock. If you often work in a public place and tend to your laptop unattended, invest $ 15 to $ 30 on a laptop lock physically anchor your laptop to the desktop. It is a simple way to deter thieves.

Always have a backup of your important data. Back up your computer to give you the things in the event of theft or hard disk failure or spill coffee. If your laptop is re-docked in the home or office, you use an external hard drive to store your documents. If you are constantly in motion, working a service of remote backup as Mozy or Carbonite over the Internet in the background and can restore your files from anywhere.

Run anti-virus and software protection against malicious software. For security reasons it is recommended for all computers, not just your laptop. Last week, Microsoft's new and free software Security Essentials. Download it and check your laptop on a regular basis.

The super-paranoid and technologically inclined hackers can use standard techniques for locking the files and records. These include:

Encrypting files and records. Through the use of free tools that you can encrypt an entire disk or just a folder full of files. If you encrypt data with a secret key to read the crowd into an unreadable format, the film attempts by thieves to private files. To decrypt, you need a master password. On a Mac, you can create an encrypted disk image using Disk Utility. Mac with File Vault (coming in the System Preferences, Security), which encrypts the contents of your files from unwanted kept out. Windows Vista and Windows BitLocker-7 provide the future application of data encryption. Otherwise, you can create a free utility called True Crypt to encrypt a folder or drive.

Protect your network traffic through the SSH tunnel. Another common technique is among the elite technology with an SSH tunnel or a secure connection to an external computer (such as your home server or desktop) to connect to the Internet. Since the network is already active, it seems that you encrypted information to a single goal to send: Actually, you use a trusted remote server as a proxy for your entire work network

No comments:

Post a Comment

Sponsor Links

How To Fix Slow Computers?
Find Used Computer Cheap
Best Deal Ever
Click Here!

Start Protecting Your Computer The Right Way!
See To Believe
Use Your Money For Something Else!
Click Here!

The Amazing Money-Making Secret
No Need To Work Anymore
Need To See To Believe!
Click Here!

Bookmark and Share