ALL >> Computers >> View Article
The Wonders Of Defensive Computing

The rapid advancement in computers and the increase of the use of its applications has paved the way for a practice called defensive computing. This practice has been developed to combat the different threats that may arise from the use of the computers and thus pinpoint solutions on how to anticipate problems such as lapses in network security and data loss. People who engage in this practice know just how important data in their computers can be and are willing to take steps in ensuring the safety of computer data.
To begin with, we must first acknowledge the fact that most of the danger that exists for our computers come from the access of the internet. By willingly allowing one's computer to share its connection to tap into the massive information resource called the internet, one also allows itself the risk of potentially having other people to access information coming from one's computer. But by practicing defensive computing, these risks are minimized. Some of the methods to use include the installation of a firewall, which serves as filter for both incoming and outgoing connections and communications with the ...
... computer, and thus can block unauthorized access to one's computer.
The presence of anti-malware software also serves as a good practice of defensive computing, as programs that contain malicious intent for one's computer may still escape the detections of a firewall.
It is also vital that one be very wary of the content of the websites that one visits, or be very cautious on the files that one intends to download. Many of the malware programs that exist today appear in a number of disguised forms. Actions such as opening e-mail attachments without first scanning or checking for threats is a big no-no in this practice. Users should be wary of misleading subject lines or appealing words on their electronic mails, as these may contain harmful software.
Along with these practices, the constant practice of saving and backing up data is as crucial as to the aforementioned above. Among the effects that malware can bring to the data stored in one's computer is the ability to corrupt or delete them. As malware is continuously being developed and newer threats emerge every now and then, there would always be a threat for a possible deletion of data. Thus, it is highly recommendable that aside from constantly updating one's anti-malware software, one has to constantly engage in the practice of copying and saving back-up files. Users may choose to save data that they deem important in another computer, or place them in external storage devices such as CDs, DVDs, or flash drives. Users may also opt to having some sort of restoration software installed. These are programs that allow data previously saved in the computer and deleted unintentionally to restore them.
Practicing defensive computing is therefore crucial in today's Internet age, especially when you often use your computer. One must be able to abide to these practices to guarantee the smooth performance and security of his/her computer.
Download antivirus program are available in the internet. The current Norton Internet Security download packages are Norton Internet Security 2011 and Norton 360 All-In-One Security.
Add Comment
Computers Articles
1. Rsgoldfast Runescape Gold:fishingAuthor: RuneScape gold
2. Understanding Mobile Intranet Workflow
Author: goodcoders
3. How To Personalize Your Mobile Ux?
Author: goodcoders
4. How To Optimize The Fintech Software Release Management Process
Author: goodcoders
5. Data Recovery Services Near Me: Your Ultimate Guide To Retrieving Lost Data
Author: adeel khan
6. Top 5 Data Cleansing Tools Of 2025
Author: Ben Gross
7. Come Ottenere Una Licenza Windows 11 In Italia: Guida Completa
Author: LicensePlanet
8. How To Build A Strong Brand Identity With Graphic Design
Author: dnd teams
9. Exploring The Generative Ai Market: Trends, Growth Drivers, And Future Outlook
Author: simran
10. Microsoft Dynamics 365 Vs Salesforce – Comparisons (2025)
Author: Maria
11. Top 5 Influencer Marketing Software Of 2025
Author: Ben Gross
12. Augmented Reality And Its Role In Manufacturing
Author: goodcoders
13. Effortless Environment Tracking With Tempgenius: Wifi Humidity Monitoring And Wireless Data Loggers
Author: Chris Miller
14. Sales Technology Trends That Will Impact Your Business In 2025
Author: Ben Gross
15. Infrastructure Management: Ensuring Efficiency And Sustainability
Author: ServerLT