Thursday

How to Snoop-proof Your Computer

Do you worry about people snooping around on your computer or trying to use software or underhanded tricks to spy on you? Be proactive. Learn what signs to look for and how to protect your private information.

One of the most obvious ways that people spy on unsuspecting computer users is to access their computer while they're not around. Improve your security by setting a BIOS password, also known as a "power-on password. To set a BIOS password, you must access the BIOS during start up. If your computer is set to display messages during start-up, it will briefly display the correct key to press in order to access the BIOS. If this message does not appear, try repeatedly pressing the "Esc" key or the "F1" key during the boot sequence. Once you have accessed the BIOS, follow the onscreen menu to set the password. Write down the password or use something very easy to remember because it is difficult to reset this password if you forget it. BIOS passwords are not a 100% fool-proof method for keeping out snoops. Someone who knows what they are doing can bypass a BIOS password if they have enough time to remove the case and gain access to the motherboard. If this happens, you would know it the next time you used the computer because it would no longer require the password or your password would no longer work if they changed it.

Give would-be snoopers one more obstacle by setting an operating system password for every user account that accesses the computer, especially the administrator account. The administrator account is often overlooked and left unprotected by Windows users as it is hidden by default. None of these passwords are effective if the computer is left logged-on all the time. Log off the computer when it is not in use and power it down while you're away.

Other tools that snoops use against you are various spyware programs with capabilities that include, capturing images of your screen, recording your keystrokes (key loggers), tracking your internet browsing history, intercepting email and instant messages or even recording through the computer's attached web cam and microphone. It's difficult enough to prevent intrusion on your computer by unknown attackers accessing your computer through the Internet. It's even more devastating when you are blindsided by friends, family, or guests in your home who snoop into your privacy.

To combat this, begin by uninstalling any programs that you do not regularly use. If possible, do a complete reformat of the hard drive and reinstall only the operating system and the programs you use the most. For Windows users, identify all of the programs that are required to operate the computer using the Windows Task Manager, which may be found by pressing the "CTL", "ALT", and "Delete" buttons quickly in sync. Write down a list of all of the entries under the "Applications" tab and then do the same for the "Processes" tab. Update this list each time you install something new. Grant your primary user account administrative rights to the computer and disable the ability to install programs from all other accounts. Each time you use the computer to access personal information, check your list against the Windows Task Manager and if you find any suspicious entries, identify them by searching for their exact name on Google.

Periodically check the connection from your keyboard to your computer to verify that no add-on devices have been installed without your knowledge. There are hardware devices that function just like software key loggers, which are capable of recording your keystrokes. They may be installed by disconnecting the keyboard and then connecting it through the device into the computer. They are small and almost undetectable unless you are looking for them. Also look for any unidentified USB devices that may be connected to the computer, most likely in the back. A USB wireless access point could be left attached and allow someone to compromise the computer at their leisure without having physical access to it.

If you use a wireless network, log into the router and be sure the wireless connection is secured. Try accessing the network from an unauthorized device and see if you are able to get in. Keep up-to-date antivirus and internet security software running on the computer to thwart malicious attacks from viruses, Trojans, and other forms of malware. If you are still not satisfied with these measures of security, purchase an external or removable hard drive and take it with you wherever you go. Store your private information on this drive and not on the shared computer.


Related articles
Permanently Delete Pictures and Files From Memory Cards
How to Protect Pictures and Video of your Family

No comments: