Protect Your PC from Viruses, Worms & Trojans

Each of the items in the checklist below is part of a broad and easy to implement security policy.

  • Install all windows critical updates for your operating system from the Microsoft Update site - it's free! All that's required to keep your Microsoft operating system up to date is an Internet connection.
  • Install and configure a firewall - either a hardware or software based firewall is a must! If you are using a router, it probably has firewall capabilities included. Software firewalls are available at minimal cost; one of the best is free!
  • Install and configure antivirus software - the cost is minimal, there are even free versions available - the protection is priceless! Update the definition files daily - scan your drive weekly - it can all be automated with most programs.
  • Create a backup - even the best plan can be circumvented - be prepared for the worst with a complete backup of your hard drive! If you already have a CD burner and software installed in your machine, you probably have the tools to create a complete system backup - for only the cost of a few CD-R's!
  • Obviously, the costs to properly protect yourself from the worst threats to your security are almost nil. If you need help with any step above, simply use a Google search to find help - it's freely available.

    Follow these four simple steps and you will have implemented comprehensive and complete protection for your PC. If you are unable to initiate your own plan, hire an expert to do the job. You won't be sorry!

    ? 2004 ODEC

    Mike Burstein has been helping the SOHO and Small Business community grow & prosper for over 20 years by solving start up problems, creating best practices, automating their offices, getting free publicity and dramatically increasing traffic and sales.

    green cleaning service Park Ridge ..
    In The News:

    Your home address is easily accessible on people finder sites, putting you at risk for stalking and identity theft, but data removal services can help protect your personal information.
    Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
    Robot combat evolves at Unitree's Iron Fist King event as G1 robots face off in China, featuring knockouts, precise strikes and agile machines that can perform side flips.
    Take control of your digital privacy with actionable tips like Facebook privacy checkup, location tracking management and data removal services to protect your personal information.
    Smart TVs and streaming devices manufactured in China are being compromised by BadBox 2.0 malware before users even power them on; infections have been detected in 222 countries.
    The lightweight, 15-pound Tenniix tennis robot mimics pro playing styles like Nadal and Federer, using AI trained on 8,000 hours of professional tennis data.
    Oak Ridge's uranium enrichment facility supports America's AI ambitions amid concerns that China's aggressive nuclear reactor construction could give it an edge in powering data centers.
    Facebook scam ads now leverage AI and deepfakes to create convincing celebrity endorsements, targeting specific demographics with sophisticated schemes.
    Apple unveils iOS 26, macOS 26 Tahoe and iPadOS 26 with translucent Liquid Glass design at WWDC 2025, featuring ChatGPT integration as competitors advance rapidly.
    The Atom Touch prosthetic arm combines an AI neural interface with EMG sensors, allowing amputees to control individual fingers with precision at an affordable $25,000.
    Aspen officials aim to have crews on the scene within five minutes — something they say would be nearly impossible without precise location data the AI technology gives.
    Tech expert Kurt “CyberGuy" Knutsson says iPads are usually secure, but hackers can access them. Spot warning signs early to protect your data.
    Tech expert Kurt Knutsson reveals how to easily move photos and videos off your iPhone or Android to securely protect your favorite moments.
    The Social Security Administration is launching digital SSN access this summer. Tech expert Kurt “CyberGuy" Knutsson helps you learn how to use it and protect your identity.
    Glide underwater with CudaJet and make the ocean your playground. Kurt “CyberGuy" Knutsson discusses the redesigned tech that might be your next big thrilling adventure.
    Protect yourself from login alert scams with five security steps, including avoiding suspicious links, checking account activity and enabling two-factor authentication
    Skip the usual Father's Day gifts with personalized ideas for tech enthusiasts, home brewers, pool owners, seniors, outdoor lovers and privacy-conscious dads.
    DMV text scam alert: Fraudsters impersonating motor vehicle departments nationwide are sending threatening messages about unpaid tickets and tolls to steal your information.
    Fox News' AI Newsletter brings you the latest on this rapidly evolving technology.
    E-BAR, MIT's mobile robot, provides physical support for seniors with handlebars that follow from behind, helping prevent falls while maintaining dignity for aging adults.
    AI is changing everything – now, we can even use it to generate video. I tried OpenAI's Sora and Google's Veo – here's how they measure up against each other.
    Five simple phone setting tweaks that make your device work harder for you, from automatic text message deletion to scheduled focus modes.
    Android users can save time with 10 simple automations, including automatic battery saver mode, location-based Wi-Fi settings and scheduled "Do Not Disturb" mode.
    Personal information from 364,000 people was compromised in a LexisNexis data breach that went undetected for months, highlighting privacy risks.
    The Phantom 3500 jet features a windowless design that reduces drag and structural weak points, burning 50% less fuel than conventional business jets.

    Your Affiliate Business - Peripherals, Software, Computers

    I have always been interested in computers, but in the... Read More

    Cisco Certification: Building Your Home Lab, Part II

    In the first part of this home lab tutorial, CCNA... Read More

    Connect Your IPAQ to Linux

    Choose Not To ConformPalm pilots and pdas are constantly growing... Read More

    Portable DVD Players - Things To Know

    In my humble opinion nothing makes a long trip easier... Read More

    A Lesson in HTML

    As the owner of a Country Mall and Top Site... Read More

    Registry Tools Demystified

    Not sure what Windows registry is or how it works?... Read More

    How to Protect your PC from Spyware in the Cyber Age

    Wouldn't you be shocked to find that your personal sensitive... Read More

    Web Standards

    HTTP ProtocolThe web is run on port 80. You are... Read More

    Protect Your PC from Viruses, Worms & Trojans

    Each of the items in the checklist below is part... Read More

    How To Speed Up Your Aging PC And Make It Healthier Too

    With a little tweaking and with proper tools, you can... Read More

    404 Error Pages: What Are They And How Do You Create One?

    We've all seen them, you've been browsing a website and... Read More

    Setting File Permissions On A Unix Server

    File permissions are one of the strengths that the Unix... Read More

    Desktop Security Software Risks - Part 2

    This is the third in a series of articles highlighting... Read More

    Get Ahead When You Build Your Own Computer

    If you've been kicking around the idea of building your... Read More

    Is DVD Storage An Attractive Alternative For Your Computer Backup?

    If you have a computer for home use or for... Read More

    How to Save an Image in a SQL Server Database?

    Most of the web applications have a lot of images... Read More

    How to Place Home Theater Speakers

    You have your television and home theater receiver; you just... Read More

    Dont Let the Internet Overstimulate Your Mind

    The Internet is an awesome tool, but be careful and... Read More

    Selecting a Personal Digital Assistant

    A Computer in Your HandCarrying around an address book and... Read More

    Compile .BAT Files into Native Windows Applications (.EXE)

    Since the DOS days, batch files have been one of... Read More

    Why Build Your Own Gaming Computer?

    The best way to get the gaming computer that you... Read More

    Microsoft Great Plains Dexterity Customizations

    Microsoft Business Solutions is on the way to popularize it's... Read More

    How to Set Up Simple File Sharing WinXP

    The first step is: Start > My DocumentsSo you have... Read More

    Computer Geeks and Garden Gnomes

    First and foremost before I begin my ranting it is... Read More

    Mail-merging: The Principles

    About mail-mergingMail-merging is the process of merging variable data and... Read More

    cleaning help near Bannockburn ..