Sunday, June 23, 2013

Tips to stay protected in an open wireless network

For many users the security of wireless networks that do not inform on any key when the network can not be accessed with a password key in the hat, as it is an open, unsecured network. Often it happens that you're left with no choice but to use it.
It is fact that if you do not not want security measures to protect your computer, chances are that the information your data will be downloaded from an intruder or track your keystrokes without your knowledge. Here's how to use your computer in a non-secure network.
Turn on the Auto-connection
If your computer is on a public network, disable automatic connection, if you do not want to use the Internet in public hotspots. If you need to use the Internet in such a connection, you can create it manually.

Online transaction is a big no
For online transaction, you have sensitive data that are harmful to you and could be a way for hackers to steal its use. Try to avoid any type of online transaction on an open network. Why do not you do these operations on a secure network?

The use of "https" is recommended
"Https" is a secure data transmission from the Web server on your computer and vice versa encrypted channel. Thus, it is advisable to "https" instead of "http" in the use of open network. However, there are sites that do not support "https". In such a scenario, it is best not to use these sites.

Turn off file sharing
Do not forget to disable a folder, file sharing or partition on your system before connected to an open network. Your files can go into the wrong hands.

Enable the firewall
To avoid any kind of malicious programs away from your computer, it is good to activate the firewall. This filter difficult issues and allows you to stay in the protected network.

If you are in an open network, you should follow these practices strictly keep away from the danger zone. But I advise you away from this network as much as possible.

No comments:

Post a Comment


Anti Spyware Anti Trojan Elite Antivirus Apps for Android Phones Antivirus Apps for Samsung Antivirus Review Antivirus Support Avast AVG Avira Antivirus BestCrypt BitDefender Boot Sector Virus BullGuard Clamwin Classroom Spy Pro Cleanup inbox and manage emails Cloud Backup Cloud Computing Security Comodo Computer Certification Courses Conficker worm Cyber Bullying cyber security Data Protection DoctoAntivirus Downloads DR Drive Genius3 eScan Antivirus Fake Antivirus Fast PC Fat Data Recovery Firewall protecion Folder Guard Professional GFI Languard Hackers HitmanPro IDS IE antivirus Installerex IT Consultants K-Secure VPN K7 Antivirus Kaspersky Linux antivirus Loaris trojan malware Manually Virus Delete mcafee MCAfee SuperDAT Microsoft Security Essential Most Danger PC Viruses Netgate spy emergency NOD32 Norman Malware Norton Online Antivirus Panda Cloud antivirus PC Care PC Doctor Pc Resources PC Technician PC Tools Antivirus PC Virus PDA Antivirus Pop-Up Removal PrivateFirewall Protector Plus Registry Clean Remove Spyware Rootkit Virus Safe Emailing Security Shardana Antivirus Rescue Disk Smartphone security Social Network Safety spyhunter Spyware SuperantiSpyware Symantec The Cleaner 2011 Top Antivirus Top Destructive Viruses Trojan Horse Trojan Killer trust port Twitter Protection USB Security Vipre Internet Security Virus Definitions Virus Scanners VueScan Pro WEB Antivirus Website Security WinASO Registry optimizer windows 7 Windows 8 Protection Windows Vista Virus Windows.8.1 WinMend System Doctor Wireless Network Protection Zemana AntiLogger