Windows Updates

Windows Update is a service provided by Microsoft that provides updates for the Microsoft Windows operating system and its installed components. These security updates are delivered on the second Tuesday of each month, Patch Tuesday, but security updates can be delivered whenever a software update is required to prevent an exploit targeting Windows users.

Windows Update can be configured to install updates automatically, ensuring that a computer is always up-to-date and not vulnerable to computer worms and other malware.

Windows 7 and Vista provide a Control Panel to configure update settings and check for updates.

Read more: Windows Updates

A computer connected to the Internet without a firewall can be hijacked and added to an Internet outlaw's botnet in just a few minutes. A firewall can block malware that could otherwise scan your computer for vulnerabilities and then try to break in at a weak point.

The only way to make a home computer 100% secure is to turn it off or disconnect it from the Internet. The real problem is how to make it 99.9% secure when it is connected to the Internet. At the very least, computers need to have personal firewall and some anti-malware software installed and kept up-to-date to find and remove viruses, spyware, Trojans and other malware. A home network that uses a wired or wireless router with firewall features provides additional protection.

Microsoft Windows Firewall
The Vista and XP Service Pack 2 and above operating systems have personal firewalls built in that are turned on by default to block threats from the Internet. You need to leave this feature turned on until you replace it with third-party software and/or hardware. If your PC is still running XP with Service Pack 1 or lower then you need to go to the Microsoft Updates Site and run Windows update to get the latest version.

Third-Party Personal Firewall Software
These firewalls block both incoming and outgoing threats. A PC has outgoing threats when it becomes infected with a virus, trojan horse or spyware. These third party firewalls try to distinguish between threats and legitimate software. Three common ways to address this are by including a list of safe software for the firewall to check [a white list], malware to block [a black list] and/or by issuing a pop-up alert for the user asking for advice on what to do. A good free version of this is made by ZoneLabs and can be obtained by clicking here.

Hardware Firewalls
A hardware firewall is usually a small box that sits between a computer or network and the modem. The firewall is based either on "network address translation" (NAT) which hides your computer from the Internet or NAT plus "stateful packet inspection" (SPI) for more protection. There are a couple of basic types of hardware devices for home users, Wired Routers and Wireless Routers. They are inexpensive enough to be used with one computer and can also be used to create a home computer network. They can be used in addition to a software firewall on each computer because they run on a separate box preventing most compatibility problems.


Its essential these days if you are running a PC with Windows to have some form of antivirus software running on your computer. Especial if your computer is conneceted to the Internet for browsing or email. While you can purchase software such as Norton and Kaspersky to do the job, there are some free antivirus packages out there which can be just as good. Two of these packages are AVG Antivirus and AntiVir. Although now Microsoft have joined the party with Microsoft Security Essentials this seems to work well and I have been installing it on any newly purchased computers recently. These all scan for viruses and spyware/adaware to keep your computer as free as possible from the nasties on the net. They will also inform you of phishing sites (sites that try to get your usernames and passwords by masquerading as being legitimate). Other free software for scanning for spyware/malware is available in the form of spybot, but this software need to be manually updates and used on a regular basis.

Excellent artice here at about phising and ID theft.



Copyright dalesmedia © 2005-2017. All Rights Reserved.