123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

The Wonders Of Defensive Computing

Profile Picture
By Author: Aslam
Total Articles: 85
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The rapid advancement in computers and the increase of the use of its applications has paved the way for a practice called defensive computing. This practice has been developed to combat the different threats that may arise from the use of the computers and thus pinpoint solutions on how to anticipate problems such as lapses in network security and data loss. People who engage in this practice know just how important data in their computers can be and are willing to take steps in ensuring the safety of computer data.

To begin with, we must first acknowledge the fact that most of the danger that exists for our computers come from the access of the internet. By willingly allowing one's computer to share its connection to tap into the massive information resource called the internet, one also allows itself the risk of potentially having other people to access information coming from one's computer. But by practicing defensive computing, these risks are minimized. Some of the methods to use include the installation of a firewall, which serves as filter for both incoming and outgoing connections and communications with the ...
... computer, and thus can block unauthorized access to one's computer.

The presence of anti-malware software also serves as a good practice of defensive computing, as programs that contain malicious intent for one's computer may still escape the detections of a firewall.

It is also vital that one be very wary of the content of the websites that one visits, or be very cautious on the files that one intends to download. Many of the malware programs that exist today appear in a number of disguised forms. Actions such as opening e-mail attachments without first scanning or checking for threats is a big no-no in this practice. Users should be wary of misleading subject lines or appealing words on their electronic mails, as these may contain harmful software.

Along with these practices, the constant practice of saving and backing up data is as crucial as to the aforementioned above. Among the effects that malware can bring to the data stored in one's computer is the ability to corrupt or delete them. As malware is continuously being developed and newer threats emerge every now and then, there would always be a threat for a possible deletion of data. Thus, it is highly recommendable that aside from constantly updating one's anti-malware software, one has to constantly engage in the practice of copying and saving back-up files. Users may choose to save data that they deem important in another computer, or place them in external storage devices such as CDs, DVDs, or flash drives. Users may also opt to having some sort of restoration software installed. These are programs that allow data previously saved in the computer and deleted unintentionally to restore them.

Practicing defensive computing is therefore crucial in today's Internet age, especially when you often use your computer. One must be able to abide to these practices to guarantee the smooth performance and security of his/her computer.


Download antivirus program are available in the internet. The current Norton Internet Security download packages are Norton Internet Security 2011 and Norton 360 All-In-One Security.

Total Views: 260Word Count: 524See All articles From Author

Add Comment

Computers Articles

1. Expert Ppc Services In Pune
Author: Brandrisic Media

2. The Future Of Online Medicine Delivery Apps In 2025
Author: simonharris

3. Where Can I Book A Doorstep Laptop Repair Service?
Author: Smita Join

4. Unlocking Business Potential With It Services And Lexington Managed Services
Author: naviworld1h

5. Top 5 Workflow Automation Software Of 2025
Author: Ben Gross

6. Ensuring Medication Safety With Tempgenius: Medication Temperature Monitor And Remote Temperature Probe
Author: Chris Miller

7. Spiral Model Sdlc: Top Choice For Large, High-risk Software Projects?
Author: goodcoders

8. How To Develop An Employee Scheduling App Like Hotschedules?
Author: goodcoders

9. How To Build A User-friendly Mobile Website? 10 Super Tips From Experts
Author: goodcoders

10. How To Choose The Right Refurbished Desktop For Your Needs: A Buyer’s Guide
Author: Scogo Store

11. Why Choose Refurbished Laptops Over New Ones In 2025?
Author: Scogo Store

12. Cloud Computing Trends 2025
Author: Ben Gross

13. Gst-billing-software
Author: Priyanka Patil

14. Digital Transformation In Higher Ed: Leveraging Crm For Student Recruitment
Author: E2S Team

15. How To Contact Sbcglobal Email Support: A Step-by-step Guide
Author: SBCGlobalInfo

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: