10 Tips to Computer Security

Make your computer and internet experience more enjoyable and secure.

1. Always, always, always back up your most important information and keep it in a safe place. I store all of my files including photos, other books that I have written and drafts that I am currently working on, as well as songs I have written, (yes, I am also a musician) on a separate hard drive that is not connected to the internet. When it comes to extremely sensitive information like account numbers, passwords, and user names, I record those hand written in a notebook that never leaves my desk. It keeps my data secure and it also keeps it safe. I recently had a hard drive crash in my laptop and had to have it replaced, without this data I would have been lost. Keep it secret, keep it safe.

2. Keep your operating system up to date and that includes your web browser and any software programs you are using like Microsoft Office. Also make sure you go to the respected web site like Microsoft.com or Apple.com and not some third party site where you may give out personal information unknowingly.

3. Make sure your computer has a firewall that will stop malicious attacks such as worms, malware, adware, and Trojans.

4. Every year you have to renew your anti-virus software program. It is a necessary expense to protect yourself while using the internet. Set your anti-virus program so that it will automatically be updated when updates are available.

5. Do not open e-mails if you don’t know where they come from and most certainly don’t open unknown e-mail attachments. I am sure you have heard of the expression, “curiosity killed the cat,” and that’s where a lot of people get into trouble. They are curious about those “unknown things” and then all of sudden they become a victim. Once more, if you don’t know it, don’t open it. I mark e-mails of this nature as spam and it keeps it from going into my in box. It has been my experience that these e-mails will be received many times and once I mark it as spam it goes straight into my spam folder and I don’t have to deal with it again.

6. If you don’t know where the program comes from, don’t open it. If you are like me, you probably get e-mails forwarded to you by friends and family members that have a compelling story, cartoon, or a joke, and while you are tempted to open it because it comes from someone you know, it is most likely infected with some type of worm, Trojan, or spyware. My mom forwards e-mails like this to me and I just delete it without opening it. Sorry mom, but I’ve told you about this before.

7. Go into your e-mail settings and your favorite browser settings and optimize your security. I set my security setting on high for the internet and medium for those sites that I trust. JavaScript and Active-X are quite frequently used by computer criminals to infiltrate your computer with nasty malicious programs.

8. It’s a good bet that the hidden file names are not disabled on your computer. In the Windows operating system for example, the hidden file names are enabled by default, however I’m not sure about Mac or Apple. If you disable this setting you will be able to see if there are any unusual extensions that aren’t suppose to be there and that will send up a red flag.

9. Change your passwords periodically and make them difficult to figure out. This has happened to me; someone hacked into my e-mail and sent e-mail advertisements to everyone in my address book. You will know when this happens to you because those in your address book will contact you and say, “hey! What the heck? I just got an e-mail from you telling me about how to meet Asian babes for a good time, or how to meet and date new singles.”  My wife had something to say about that one.

10. Lastly, turn off your computer and or disconnect it from the internet when you are not using it. A hacker cannot get into your computer or attack it if it is not connect to the internet or turned off.

To be in compliance with United States Federal Trade Commission Regulations, I must tell you that I, or my publishing company, may receive a commission from the sale of these products or programs. It takes a great deal of time to research, investigate, assemble, and publish, and to be honest, the few dollars  in commissions I, or my company, make in bringing you the best of the best in programs are what keeps my company going.  Allow me to take this time to thank you for reading this article and reviewing the following offers.


Today more than ever, you must be vigilant in protecting your personal information from being stolen. It definitely pays to learn all you can about the world of fraud and identity theft. With this identity theft program you will learn how criminals get the information they need to steal identities. Remember this, cyber criminals have one weakness and that is they are looking for an easy score and your best defense is making your personal and financial information exceptionally difficult to get. Learn the five different methods identity thieves use to steal your information and the five pieces of information you should never post on Face Book or any other social media. This program has an identity protection plan and an iron clad special ops strategy that will never fail to keep you one step ahead of the cyber criminals and without having to pay an ongoing monthly fee.

Click here to get all the details


Remain vigilant in protecting your personal and private information

Level the playing field when it comes to cyber criminals

Keep your information out of reach

Learn how identity thieves get information to steal your identity

Learn the 5 different methods identity thieves use

Stay one step ahead of the cyber criminals without paying monthly fees

Click here to get all the details



In this high tech world, it becomes more important than ever before to protect your identity and financial privacy. This privacy protection program will give you the information you need to keep your personal and financial information private. This information to anonymous living will benefit you greatly in protecting your identity and preventing identity theft.  You will also use financial privacy principles for banking secrecy, gain freedom from internet stalking, and have workplace privacy and employee privacy.

Click here to get all the details


How to protect your identity

How to protect your financial privacy

How cyber thieves come up with new ways to steal your identity

How cyber thieves come up with new ways to steal your financial information

About financial privacy principles

How to keep your banking information secret and safe

About workplace privacy

To keep it secret keep it safe

click here to get all the details



If you want to get rid of your debt fast this program will show you how you can pay off your debts in five years or less including your mortgage. This program is structured with action steps for rapid debt elimination and it’s guaranteed to work for everyone.

Click here to get all the details


Will help you get rid of your debts fast

Will help you pay off your mortgage

Is action step by action step

Is guaranteed to work

Click here to get all the details