Tuesday, September 17, 2013

General network security recommendations

The following are general security guidelines for all home and small office networks.

Keep your computer up to date
To help keep the computers on your network safer, turn on automatic updating on each computer. Windows can automatically install important and recommended updates or important updates only. Important updates provide significant benefits, such as improved security and reliability. Recommended updates can address non-critical problems and help enhance your computing experience. Optional updates are not downloaded or installed automatically.

Use a firewall
A firewall can help prevent hackers or malicious software (such as worms) from gaining access to your computer through a network or the Internet. A firewall can also help stop your computer from sending malicious software to other computers.

Install Anti-virus software on each computer
Firewalls help keep out worms and hackers, but they're not designed to protect against viruses, so you should install and use antivirus software. Viruses can come from attachments in e‑mail messages, files on CDs or DVDs, or files downloaded from the Internet. Make sure that the antivirus software is up to date and set to scan your computer regularly.

Use a router to share an Internet connection
Consider using a router to share an Internet connection. These devices usually have built-in firewalls, network address translation (NAT), and other features that can help keep your network better protected against hackers.

Don't stay logged on as an administrator
When you're using programs that require Internet access, such as a web browser or an e‑mail program, we recommend that you log on as a standard user account rather than an administrator account. That's because many viruses and worms can't be stored and run on your computer unless you're logged on as an administrator.

Wireless network security recommendations
If you have a wireless network, there are some additional security precautions that you should take.
  • Use a network security key
If you have a wireless network, you should set up a network security key, which turns on encryption. With encryption, people can't connect to your network without the security key. Also, any information that's sent across your network is encrypted so that only computers that have the key to decrypt the information can read it. This can help avert attempts to access your network and files without your permission. Wi‑Fi Protected Access (WPA or WPA2) is the recommended wireless network encryption method.

Note: We recommend using WPA2, if possible. We don't recommend using WEP for network security. WPA or WPA2 are more secure. If you try WPA or WPA2 and they don't work, we recommend that you upgrade your network adapter to one that works with WPA or WPA2.

Change the default administrator name and password on your router or access point 
If you have a router or access point, you may be using the default name and password set up by the manufacturer’s. Most manufacturers use the same default name and password for all of their equipment, which someone could use to access your router or access point without your knowledge. To avoid that risk, change the default administrator user name and password for your router. Look for the information in the manual that came with your device for instructions about how to change the name and password.
Change the default SSID
Routers and access points use a wireless network name known as a Service Set Identifier (SSID). Most manufacturers use the same SSID for all of their routers and access points. We recommend that you change the default SSID to keep your wireless network from overlapping with other wireless networks that might be using the default SSID. It makes it easier for you to identify which wireless network is yours, if there's more than one nearby, because the SSID is typically shown in the list of available networks. Check the information that came with your device for instructions about how to change the default SSID.



Position your router or access point carefully


Wireless signals can transmit a few hundred feet, so the signal from your network could be broadcast outside of your home. You can help limit the area that your wireless signal reaches by positioning your router or access point close to the center of your home rather than near an outside wall or window.




Friday, September 6, 2013

What is Windows Easy Transfer?

Windows Easy Transfer guides you through the process of transferring files and settings from one Windows computer to another. Using Windows Easy Transfer, you can choose what to transfer to your new computer and how to transfer it.

·         Click to open Windows Easy Transfer. ‌If you are prompted for an administrator password or confirmation, type the password or provide confirmation.

What can I transfer to my new computer?
You can transfer most files and program settings. Specifically:
·         Files and folders: Everything within the Documents, Music, Pictures, and Shared Documents folders. Using advanced options, you can select additional files and folders to transfer from other locations.
·         E‑mail settings, contacts, and messages.
·         Program settings: Settings that keep your programs configured as you had them on your old computer. Windows Easy Transfer doesn't transfer the programs themselves. Some programs might not work in this version of Windows, including security programs, antivirus programs, firewall programs (your new computer should already have a firewall running to help ensure safety during the transfer), and programs with software drivers.
·         User accounts and settings: Desktop backgrounds, network connections, screen savers, fonts, Start menu options, taskbar options, folders, specific files, network printers and drives, and accessibility options.
·         Internet settings and favorites: Internet connection settings, favorites, and cookies.
·         Music: Electronic music files, playlists, and album art.
·         Pictures and video: Pictures which includes any visual file type (for example, .jpg, .bmp, .gif) and personal videos.

Which versions of Windows will work with Windows Easy Transfer?
You can use Windows Easy Transfer to transfer files and settings from a computer running Windows XP, Windows Vista, or Windows 7 to another computer running Windows 7.

Note :  You can't transfer files from a 64-bit version of Windows to a 32-bit version of Windows.


Remove spyware from your computer

If you have spyware or other potentially unwanted software on your computer, you should use an anti-spyware scanner and removal tool to try to remove it. You can also try to remove spyware manually. You might need to use both of these methods more than once to completely remove the spyware or other potentially unwanted software.

Use an anti-spyware scanner and removal tool
Windows Defender is a feature in this version of Windows that helps prevent spyware and other potentially unwanted software from infecting your computer. When Windows Defender is on, you're alerted if spyware and other potentially unwanted software tries to run or install itself on your computer. You choose whether to ignore, quarantine (move to a different location on your computer where it can't run), or remove each item that is detected.
Spyware scanners are also frequently included in antivirus programs. If you have already installed an antivirus program, check to see if that program includes spyware protection features or if you can add them as an update, and then scan your computer regularly. To see a list of other spyware protection programs, go online to the Microsoft Security at Home website.
Remove spyware manually
Spyware can sometimes be hard to remove. If an anti-spyware program notifies you that it can't remove spyware, follow the instructions provided by the anti-spyware program. If that doesn't work, try these options:
  • Try installing an antivirus or another anti-spyware program. Many antivirus programs also come with anti-spyware protection.
  • Check Programs and Features for items that don't belong on your computer.
Click to open Programs and Features.
Use this method with extreme caution. Control Panel lists many programs, most of which are not spyware. Many spyware programs use special installation methods to avoid showing up in Programs and Features. Occasionally, a spyware program will offer an uninstall option and can be removed with this method. Only remove programs that you can positively identify as spyware, and don't remove programs that you might want to keep, even if you don't use them very often.
  • Re-install Windows.
Some spyware can hide itself so well that it can't be removed. If you still see evidence of spyware after trying to remove it with an anti-spyware program or after trying to uninstall it using Control Panel, you might need to re-install Windows and your programs.

Warning: Re-installing Windows will remove spyware, but it will also delete your files and programs. If you have to re-install Windows, make sure that you back up your documents and files, and make sure that you have access to the installation discs you will need to re-install your programs.