123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

The Wonders Of Defensive Computing

Profile Picture
By Author: Aslam
Total Articles: 85
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The rapid advancement in computers and the increase of the use of its applications has paved the way for a practice called defensive computing. This practice has been developed to combat the different threats that may arise from the use of the computers and thus pinpoint solutions on how to anticipate problems such as lapses in network security and data loss. People who engage in this practice know just how important data in their computers can be and are willing to take steps in ensuring the safety of computer data.

To begin with, we must first acknowledge the fact that most of the danger that exists for our computers come from the access of the internet. By willingly allowing one's computer to share its connection to tap into the massive information resource called the internet, one also allows itself the risk of potentially having other people to access information coming from one's computer. But by practicing defensive computing, these risks are minimized. Some of the methods to use include the installation of a firewall, which serves as filter for both incoming and outgoing connections and communications with the ...
... computer, and thus can block unauthorized access to one's computer.

The presence of anti-malware software also serves as a good practice of defensive computing, as programs that contain malicious intent for one's computer may still escape the detections of a firewall.

It is also vital that one be very wary of the content of the websites that one visits, or be very cautious on the files that one intends to download. Many of the malware programs that exist today appear in a number of disguised forms. Actions such as opening e-mail attachments without first scanning or checking for threats is a big no-no in this practice. Users should be wary of misleading subject lines or appealing words on their electronic mails, as these may contain harmful software.

Along with these practices, the constant practice of saving and backing up data is as crucial as to the aforementioned above. Among the effects that malware can bring to the data stored in one's computer is the ability to corrupt or delete them. As malware is continuously being developed and newer threats emerge every now and then, there would always be a threat for a possible deletion of data. Thus, it is highly recommendable that aside from constantly updating one's anti-malware software, one has to constantly engage in the practice of copying and saving back-up files. Users may choose to save data that they deem important in another computer, or place them in external storage devices such as CDs, DVDs, or flash drives. Users may also opt to having some sort of restoration software installed. These are programs that allow data previously saved in the computer and deleted unintentionally to restore them.

Practicing defensive computing is therefore crucial in today's Internet age, especially when you often use your computer. One must be able to abide to these practices to guarantee the smooth performance and security of his/her computer.


Download antivirus program are available in the internet. The current Norton Internet Security download packages are Norton Internet Security 2011 and Norton 360 All-In-One Security.

Total Views: 240Word Count: 524See All articles From Author

Add Comment

Computers Articles

1. 10 Best Apps For Small Business
Author: 10 Best Apps For Small Business

2. Top Digital Marketing Trends For 2024
Author: Arvind

3. Scaling Your Business With Cloud Management Services: Best Practices
Author: shelli david

4. Full Stack Offline Training In Pune: 100% Job Guarantee
Author: atherv sir

5. Exploring The Potential Of Progressive Web Apps: An In-depth Guide
Author: Elite_m_commerce

6. Mastering Digital Marketing In 2024: Trends, Strategies, And Future Growth
Author: aarcodes marketing

7. How To Identify Scams When Buying Refurbished Laptops
Author: usedstore

8. 9 Tips To Write The Best Press Release
Author: 9 Tips To Write The Best Press Release

9. Bigcommerce Development: Custom App Development, Migrations, And Integrations
Author: Jeet Hanani

10. Find Your Perfect Gaming Gear: Discover Msi Stores Near You
Author: Prachi Grey

11. Unlocking Creativity And Productivity: The Lenovo Yoga Series In Mumbai
Author: Prachi Grey

12. Why You Should Hire A Dedicated Freelance Developer
Author: Upesto IT

13. Migrate Your Classic Storage Accounts To Azure Resource Manager By August 31, 2024
Author: Sparity

14. The Difference Between Virtualization And Cloud Computing
Author: otis

15. Cost Savings: Offshore It Staff Augmentation Explained
Author: Obii Kriationz

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: