Torrent Invites! Buy, Trade, Sell Or Find Free Invites, For EVERY Private Tracker! HDBits.org, BTN, PTP, MTV, Empornium, Orpheus, Bibliotik, RED, IPT, TL, PHD etc!



Results 1 to 2 of 2
Like Tree1Likes
  • 1 Post By Napoleon

Thread: Top 10 Tips to Keep Yourself Safe While Using Public Computers

  1. #1
    Extreme User
    Napoleon's Avatar
    Reputation Points
    7581
    Reputation Power
    100
    Join Date
    Jan 2012
    Posts
    3,410
    Time Online
    27 d 16 h 20 m
    Avg. Time Online
    9 m
    Mentioned
    23 Post(s)
    Quoted
    15 Post(s)
    Liked
    1476 times
    Feedbacks
    44 (100%)

    Post Top 10 Tips to Keep Yourself Safe While Using Public Computers

    In an era where computer and its usage go hand in hand with our day to day work, no one can be disassociated with the world of technology. The world is no more separated by the boundaries but rather has become a closer place to live in, a “global village”. However, this technology comes with a bane just as it is considered as a boon for a large cause. The increase in cases of cyber crimes is just an example of it. Very often we have to use public computers, be it in laboratories or in cyber cafés. But we sometimes are a bit callous in our attitude and which ultimately harms us and our privacy at large. Thus it is very important for us to take utmost precaution while working on public computers. A few of them are enumerated as below:

    Select A Less Interrupted Computer

    The first thing we should have in mind is that we should choose a computer that is interrupted not very often. Many a times when we are sitting at a place where it is very easy for people standing nearby to peep at our screens, we should avoid entering our passwords or other secured contents. No matter how uninterested the person nearby might seem, we should always have our precaution at hand. Thus we should always prefer a seat which is in the corner or at least well protected from general view.

    Use Portable Software or Live CD

    It is always advisable to carry portable software in the USB or even a Live CD comes in handy wherever it’s possible. This helps in surfing in our own environment and thereby gives protection from the common computer browsers. A few tools in this regard can be as MojoPac, Portable Firefox, Portable IM solution like Miranda or Pidgin or few web Messengers like Yahoo Messenger, Meebo, Google Talk. Live CDs like Ubuntu or Knoppix can also be very useful. Though this software might be not very user friendly but surely these are secure enough.

    Delete Your Downloaded Files


    It is very common for the users to download or create files and folders on the computers but we very often forget to delete such files and folders and leave them on the computer itself which can be accessed by other users. Thus the third point to be kept in mind is that we should always delete the files and folders that we have created or downloaded from the hard disk. In order to make it more secured and be totally sure that no one can access such files or folders we can use software like Ultrashredder, which is portable too.

    Use windows on-screen keyboard for entering email account details


    The most common and easiest tool for cyber crime is usage of Keylogger. Basically a keylogger is a software application that helps in tracking what one has typed over the keyboard. The utility of such software comes in handy for the corporate offices since they can track what are the websites that their employees surf through and how they use their computer. The software works in the background and whatever is typed in through the keyboard is sent to an email address in a document form or any other such form as formulated. However the real misuse of such software comes into play when one types-in secured information like the username and passwords to open the email accounts or surf through various social networking sites. Whenever we open our accounts in such software enabled computers the username and password is sent to an email address which is already feeded and they are uploaded as plain text, thus giving the receiver an access to our account. So to avoid this use windows on-screen keyboard for entering username and password for your email accounts and other personal accounts. To select on-screen keyboard got to Start-> All Programs-> Accessories-> Ease of Access-> On-Screen Keyboard, it looks something like this
    on-screen-keyboard-300x154.jpg
    Check the status of security solutions installed

    The problem has its various solutions and each one has its more importance. However nothing can match the avoidance of public computers and use only personal ones, as they say “precaution is better than prevention”. Amongst other solutions available one is to check through various anti-virus software if such software is installed or not. However the anti-virus software might not be, sometimes, potent enough to detect it or worse enough there isn’t any such software even installed. Thus the ultimate option at hand is to either generate one time passwords which gets destroyed after one has logged in thus even though the password is sent but still one cannot access the accounts as next time a new password is required.

    KYPS is one such website which helps us to generate such multiple passwords. Besides this one may also opt to send the mails to a secondary email account. So even if one’s account is hacked it is the secondary one while the primary one is still intact and secure.

    Clear web browser history
    google-chrome-clear-browsing-history-300x215.jpg
    One should also remember to clear the traces or history of the websites visited. The temporary internet files and stored passwords and cache should be removed from the browser so that there isn’t any information left behind which can be used by someone other user. If you are using Mozila Firefox you can take the advantage of private browsing also.

    Some software programs will clean out all the junk files, detect Malware, delete unused registry keys, Automatic Driver updates, and more. Not everyone is comfortable clearing history or deleting temporary files so Buying software is the answer for some. You can get a free scan for your computer to see how it works before you buy.

    Never forget to logout from email account
    Negligence on ones part can always lead to a disastrous effect. Thus one should always make sure that whatever account/s one logs into, one should always log out of it. This is a great rule to help protect your online accounts. Many of us think that by just closing the window screen or the tab we have logged out but many social networking sites or email service providers keep one logged in automatically even if one has closed the window. Thus one should always make sure to log out of the account.

    Try to avoid online purchase while using public computers

    No matter how important it may be but one should never use public computers where usage of personal information is to be given or one has to make payment. One should never undertake transactions that involve credit cards or PayPal accounts on a public computer.

    Re-boot computer after your use

    Lastly, one of the safest and very effective measure as a precaution can be to reboot computer after its usage as this not only clear the RAM of the computer but also the pagefile is cleared

    Thus we see that of all the utilities and comfort that technology brings in our life we are never too very far away from misuse in this techno-driven markets. Thereby next time when you sit on a public computer keep these precautionary measures in the mind for sure.

    This guest post is by Debarshi Ghosh Dastidar. He is a tech enthusiast and a software developer. He is currently working with c++ programmers for Itransition – a software development company.

    Install a program to your computer!

    A software program will not upgrade your memory but it will clean out all the junk files, detect Malware, delete unused registry keys, Automatic Driver updates, and more. Not taking advantage of the latest updates and security patches can leave your computer vulnerable to attacks. At the moment I am using PC Matic to maintain everything for me. This software is amazing and has won a number of top awards. You can get a free scan for your computer to see how it works before you buy.
    LoGaN likes this.

  2. #2
    Extreme User
    LoGaN's Avatar
    Reputation Points
    1639
    Reputation Power
    62
    Join Date
    Jul 2013
    Posts
    684
    Time Online
    7 d 21 h 16 m
    Avg. Time Online
    2 m
    Mentioned
    10 Post(s)
    Quoted
    26 Post(s)
    Liked
    229 times
    Feedbacks
    13 (100%)
    One could also launch On Screen Keyboard in Windows OS by typing " osk " in the "Run " prompt


Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •