0 ratings0% found this document useful (0 votes) 265 views198 pages2022-09-01 The Complete Internet Security Manual
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here.
Available Formats
Download as PDF or read online on Scribd
Rs
SS a=) Wane NE
Security
mt
The esSemtial,[Link] protecting ~ y)
your privacy and BoMaey a Se eee” oli
PAGES!
100% Independent SEP 2022 EDITIONWant to master your PC?
Then don’t miss our NEW Windows PC
& Laptop magazine on £5 Readily now!
Are Your.
Socials
Safe?)
Keep Your Data
& Yourself Secure! a
WINDOWS 11 4
A Deep Dive
Discover New
Functionality ‘& Features
fel Segall Aube osmThe Deore Manual Series Series
Internet
Viruses, malware, ransomware, phishing, smishing, vishing, social engineering
the list of digital threats with peculiar names expands daily and hardly a
moment goes by without some form of attack appearing in the news, We live
in interesting times, where data is worth more than il or gold and your
personal information is greatly sought after by cybercriminals, scammers and
hackers. How prepared are you for this new age of digital vandalism and theft?
Is your Windows computer secure against the continual onslaught of the
modern ontine world? We'll help you secure your computer, network and
devices against such threats and with easy to follow tutorials, help arm you
against potential threats and attacks. For parents and guardians, we also cover
looking aut for your children when online, together with guides on haw best to
protect them and advice from industry experts. You'll soon be security savy
and prepared for whatever digital threat looms on the horizon.Contents
°0
10. Types of Security Risk
@ iliac tecnica
Does Information Move Around the Internet?
12 Hackers and How Can Internet Data be intercepted?
44 Social Engineering 10 Tips to Protect Yourself Against interception
16 Ransomware: How it Work
18 TheVirus Top Ten
Phishing, Vishing and Smishing How to Secure Yourselfon Twitter
BM 22 Pharming How to Secure Yourself on W
24 Windows 10 Security What to
26. vigital
& Protecting Yourself
Top Ten Antivirus and Securit
a ems
Bitdefender Total Sec.
Kaspersky Total Security 2018 96 Windows 10 Privacy Settings
McAfee Total Protection Review 98 How to Check which Apps are Sending Information
100 Whatis a firewall?
Setting Up Windows 10 Se
Why Updat 1102 Improving the Windows 10 Firewall
What to Keep Updated and How 104 Creating a Security Plan
106 Checklist
1108 What isa Sandbox?
ur Web Browser
ure Your Home Network
Wireless Security Standards? 4110 Running Windows 10 as a Sandbox
‘to Secure Your Wireless Network 112 Installing VitwalBox
114 Installing Windows 10
116 Creating VirtualBox
18 aWindo
120 Up Window
a2 ate a Windows 10 System Image
ryption?
Encrypting Your Windows 10 Lap
Top Ten Encryption Tools for Winds
Whatis a VPN?
How Can a VPN improve Windo
Top Ten VPNs
Using a VPN for Added Security and P
126 dows 10 Lockdown Tips
126
4128 What the Experts
BED versions com :| ar
tC
Rag Contents (Gi
® Cees @ Further Protection for Young Adults
132 Children Online: What are the Risk: 168 staying Safe with Facebook for Teens
134 Social Media & Children 170 staying Safe with Twitter for Teens
136 Search Engine Safety 172 Staying Safe with Instagram for
138 174 Staying Safe with WhatsApp for Teens
140 a 2 1 176 staying Safe with Snapchat for Teen
178 Creating a Child Account in Wind
4144 Top Child Friendly Email Programs and Services 180 Windows 10 Family Features
Cyberbullying 182 Problems with In-ap
How to Prevent and Deal with Cyb 184 Tips on How to Stop In-app Overspendi
Helping Your Child Through the internet 186 Online Child Safety at School
ld and Online Gaming, iit Safe? 4188 Where to Find Help with
ying Safe when Gaming Onlin - Advice for Your Child inline Child S
190
2
ing What's Going On
Monitoring Online Activity for Non-Technical
Guardians
Tips for Technical Guardians to Monitor a Child's
Online Act
0 Install and Use
Hosts File to Block7) Digital Security In Numbers)
nformation regarding cyber security doesnt alwayshave
Jerse infact, to makeiteasierto digest,
and to just show you how virulent and bitterly hostile
computer-bome security threats are, here's a collection of
statisticsto giveyou the heebie jeebies; all the more reason
then to keep this manual close to hand,
Fe
Over the next
year thereisa ~
z Social Media Users
0 a
- CHANCE + 50: © 20)
you could be
' Haven’tchanged _ Haveneverchanged
3 theirpasswordinthe | their password
lastyear oy
i pe re ATAU RNRSET : chTRSRETE W hAOEAmember of Devices hacked in RANSOMWARE
the publicis LESSTHAN: _ ATTACKS on
HACKED every: BUSINESS every:
¥
}
2 : /
fey Atestaton, Advances Ang
Setings, andor ntepty Contos,
Vit Smartcard, EVET enabled
protcion and many more
Impressive protection esteWhilst its all fine and well teaming
about the different security risks
you face every time you boot up
often questions
red, Weve
ther ten popular
digital “security questions
that we hope wil help fil in
any blanks.
Digita
Sole rity
Understanding Security
Trying to understand the digital seeuty world can be hard
work There'sso much totale, thats easy
in the quagmire of acronyms and hore
\wecan help you outwith these ten FAS.wi ¢ igital Security FAQ je
Dol need ’
anantivirus —wssaurseause yes Windows
(program? | 0usesttebtinvindows
Defender pregame prota
youenine mere tan ample
ee ee
secuityisequied
Viruses and yo sy ven legtinaewebstes
matwareare | canbemectedwivavsor
onlyon dodgy — | somecthertormofmalnare
sites, right? Rsremberon scaneute ins
an enter yoursystem inter
a eae
COnine banking lremarily
Sale and uses thelatest and
Isonline
banking safe? coremualyeniingsecurty
encryption metradologes There's
itary gadescurity at every
~ leweloltheontne process. andits
hightuneyto beached.
y
‘Are hackers Whiststvethornos hae
eae aren interestedin te average
se, ey rear bigger aes,
there arelnstances whee you
_ tule targetedforene reason
‘exarothec Generally speaking the
‘veage serilloniybe targeted
enmasse nacounywide
rshingersiniar tack
—_—
Yes tees noting sopiegyou
Can! Aschoolof thoughtisthat whille
phishing phone
sscammeron
the line?
youkeepthem anthele, tung
itintos mack prankcel youre
saingsomeane ese rom being
Guped, However, beso simply
teltemyouhnow they tying
tescamyouand hangup.
Does having extra
security cost?
rn
How often dol
~~
How do know it
something being
offered is ascam?
~ et
I think I've just
been scammed,
what do!do?
~ get
ve opened ascam
‘email attachment,
what do! donow?
get
ot of heer cansou
tan ao ot coy
rsyesberg romana at
Eoacaael
Jaane ae
rods nosttebete
Scryammcsra |
Windons10kaep conus
Update ce noperatin,
elerng the ate updatesin the
tclground However isalvays
best doa dat checkforany
UpdatesorbothWindowsandany
rowan you regula ise
Thats adifeatqusion tans:
oe often than ot, itsc0 good
tobetrvethentstieytobea
scomolsomelomor cote
Therearetimesthovghuhen
rruineofles remade ts best
toresarch ae macho possible
bebrecommitingtoanthna
Iycuthinyeu\ebennscamme,
Eee
Changes change your Whos
sor foe yourbankthatyour
teas maybecompromse, eral
frends arlaties hat yevebaen
samme fleapolcerepat san
yur computer heatsanecheck
yourcedtcadepots
——
y
“her a geod charceyou may
havea insonyour computer
Coseallopen rogers open
\wrdons Deende and doa Full
[Link]
is detected Delener ill you
\whattoge Then cancer|
thd paysite and scan the
cemputersgin
0—_—
mbenpbteonsonDee aeProtecting
Neb S21
Pe ee er gee eeu eae Sa se no
Peta ces eee cued cette leer
Po amecaetn Mees oN el Cena ect enn
Eee ea ne te a ea
Using a Virtual Private Networks an excellent way to improve your
Windows security, we'll look at how a VPN works, what the best VPNs are
Eo Lecernee Cuenta tae
Ear Eee eee eed
Emaar) Pat sa
Seed Peed
Pr ora mete ao
EOE rea ere cl
Pec cance
ieee
Cees
36 Kaspersky Total Security
Pony ua
eee
eee
Searels a mere ns
SORT Ett STD
ee eee
PT ST a ere
reese EaeiaitcioyBe Smart
We've looked at some of the many varied ways in which you can be compromised by a digital
attacker and some of the ways in which you can help protect yourself However, it’s often more
beneficial to be able to recognise the signs of a digital security issue.
Weakest Links
Interms of gal secu youre only asstrongas the weakest ink your secu chain Youcan dckallthe sect bows but fyoudon'txow whatto
lookforinthe frst placeyouestilwineable
ESTOS tc sir of brechinyour dg ERD icuctecvourba
scuyistnesudcen change noted some od sal a
darlyand youve
rs that youto
aserd anbelrarandomstewatmoterjustsemttingsmaltobegin dently thenyour account cou ead beh shar il
vith Sometimesa hake wth akeylogein lace he water bore take smal amounisopuchaenexpensve Resta cheekthe vay ofan
Accessngyour bank inwhichcaseyou necttowrusscanyeurPCimmesatly, account ele emptyngthe aultas wee Contact your barkimmedatey
teal ecehe spam emails ETT orcottiem:
one you adden sar getrgemas ofa vinsethes
operating rds pastcua, dow down overtime but yeu poe
ise yourklnare, deci inal ct ary cmp one day adits ncesby onerthan usual
comngton
gent Ma"
trasnoh ele k Tenth toate
Futheingthe boveersue i
SED Yee etesome
compute to another and they infect,
‘oncathenacke
huge cbt uae
mebenpbteonsonProtecting Yourself
Top Ten Antivirus and
Security Packages
While the built-in Windows Defenders a great antivirus and security tool, it’s nowhere near as,
capable as one of the many third-party security suites. The likes of Bitdefender, McAfee and
Symantec have years of security specialism behind their products.
Better Protection
third ary security suite offers much than vius scanning With oneof these, yu'recovered against most, natal igtaltreats erearetensecury
suites worth considering yer serious about your dial protection,
ccs opchoce
Whit youcan protect upto ten FC:
nen shopping onli,
Bidetente | Bien
Torr | Tora
‘SECURITY SECURITY
FEED YteeToatrccionotes: tvolvins GUSTS orth rire possiblest
vers aval Avis Ps Total Protection adi
parc tl oer excelent setts and bevels of
casisonm for ome uses tht cure protcte italy ary heat alas
ecu online oud so,
WEBRon:
UMc): UWMcAfee
cel ie)
cat erat)Top Ten Antivirus and Security Packages e
sper’ Total Secuty2018 sone ofthe best go-to SET teeter Secury sa comprehensive rection
products waloble onthe mare. ts get saluefor cage er everyy users Rote one banking petecton,
money ard oferssuperb protection er yourPC arc other deviesYougst ssforany mais temps toconolyourwetcamanda ne tuned
parental convo, secure pasouedstorape, enenion andicerty pcecion balance beeen scutty and pry,
alluserasngleseuiy ste
poi
Be Set
hasthasofeedtceatiinssctetrmanarsbutis (SREB ccrtos boon these and rotctn sn
he pds tone sey dria aoe woth foraloteyerandot ah sped ae ten
loge. th oberon at groin ang eee ey soed octet ve Secu Tolisha roe the
protection and eal poecton a ora easanabe cos oo. home se asnat onl dos prove supe arts protection, Naso es
ait Pate Neterk VPN for ced pracy when nine
Noe
cual Tn culaig
Cet aes
eo cor)
a 4
Trend MiroMaimum Secuttyoferssupeitve
ee io Inte Secutty san award winning secunty proteton oruptofveaerent dees alngith
ute that ofr plenty of geatfesturesandelements ts eended protection fr cere Inte passerdsand xian socal
uik, eos touse costelectve ard does an exallertjob atprotconyou media ses W's gretvaluelormeney and promseralent oe,
sndyour vices om moder scurty thes,
rerBw Protecting Yourself)
Bitdefender Total Security
2019 Review
Bitdefender is regarded as one of the best antivirus and security compani
in the world. Its products
have won numerous awards and have been proved time and time again to be efficient and effective
whilst offering cutting edge technology.
The Ultimate Protection
‘Theres aloo ofr rom Bitdefender’ Total Sacurty 2018's oneofthe leading security sites avalable ad ised as possibly the best total protection
package inthe world Lets ee what thastotfe,
Tota Security 2019s Bieler faghip product and cles comprehensite
security packages for Weds, macOS and Ando uses, al under a singe
vyeb poral Pricing does ato sihty, depending on whet special deal may be
‘nail but expacto pay somewhere thereon of £899 foraseyeor
creer up toe dees.
What do you ge for your mane? Wel, defender has used the ate wih
regards ts protection suite, nat anes taskfora company with alorghistoy
fated proving acing security suite onthe mat. Total Secu 2019
is quel €35 tral and underand, wth the unease istalaten and a
compltesystemscantakng re merethanalfan hou
est ofthe problem wth modem secu suites the heay interface thet
comes with he package A mode suite mustincludea wea of elements to
ate even sihty competive nan aeody sauce! and quate apsessie
‘mafetleeThisin um creates anintetacethatsoen too duteredarcalite
‘rerahemngforte necomer Btdeenderthough hasmanagedto pacage
together a clean an sek evo, wih the mast prominent ates valde,
wih jut ccor acoupletcieisoftremause
Natural yeu cancigrnuch doperint th satings slong pre efred
profes and modes ortwaakng the oreo etharightn te secur,
‘wthoutcompromisngsheavera derces orighteingeverthing
Uuptoanalmost NS evel of seeuty dean,
Itspaciedfllofirtrestngar sll features some of bch
you never though youl apprecate unt yu actualy had
them to hand. Fer ample, he vleraly Sanne wil Paeeee
hunt down ary missrg Windows upd, sus ath WF early 2019 one ofthe
security and even weak pastas gation wth your eat
browsers excelent, fring dearly defined green tks Ne ———_ products avo oday™
to seach ents that af cease ot, eluding,
intgaten with Facebook. You can as setup asecurevaut
forfies tht you wantto marks ute priate and keep aay
Fromanyprngeyes,
‘ou command eventing om the Bkfender Cone Act
Dashboard wich wildsplaythecunertsubscptin,tothesas
of our Btceender instal devices, ets reports and so on Its
sip interface that heps the suf you want o see prominent, wile
ly hiding the deeper information tat only the more advanced user
‘may be intrested inviening Ofcourse, should anything untoward Rappen to
ayof he Btdleder instal dees youl eadve te aperoprite waning
Interestingly shuld you atte the parental eatzeson aye dees the
robo con
chard wil inform youcyour eis nine acy vised ses and sca
rmediabehaious
Rarsomnare & handled by an independent module that eis action,
‘once enabed lately pote flesinyourDocurerts lds with he
‘optont incl other folds, [Link] attempted onethese pote es
resulsin amessage appearing, loving you to confirm the acon Ths makes
Tinctesingy cult for ansomvrareto stat encypting and messing around
vithyourvalued
(nt ofall he supe fates though the eel canning engine The
Bitdefender scan s uick and does so your computer down weve being
actveinthebackround orwhlecorductingafllstem san
Inshot fovreinthemattferacompeteand ful featured securysut, hen
Bdefendar Tea Sect 20191sthe one you shoul most cently consicet,“Oneafits mony spend fetuesis@
vinerabilty scanner that informs you
‘fry wecknessesinyour system”
“onceintaledit
automaticaly updates
cond eepsyousate fiom
algal treats”
Bitdefender Total Security 2019 Review
Scanning.
2% =
“Thesconning engin squckond
icentand doesnt unnecessary
slow your computer down’Bw Protecting Yourself)
Kaspersky Total Security
2019 Review
Kaspersky was one of the first security companies to offer the end-user a cross platform AV
protection suite, some years ago now. Since then, the company has improved its products
staggeringly and as such is now one of the leading security suites available.
Next Generation Protection
‘There area tof features to ie about Kaspersky Total Secrty 201, al of whichhelpyounot ony be protected rom whatever's outer, butalsobetor
manage your system,
aspera Tt Security 209s the mega product ofthe capa’ AV and
protection utites home wes reasonably pred ot around £2389 fo¢one
deve plusayearssubserpon eingto amacmumot £103 rive deves and
‘ate yer subscrion Obdoush pres can change, ceperdrgon what eas
‘[Link] webatefortnelate pce
uch ke the Btefendr entry Kaspeny has gne to gat lengths to pride
‘an e350 use and simple understand intrce i, gain ioe Belen,
{youTeabletodeledeepernttheinner workings theaverageuserinitany
bewildered by pages upon pages feral agon cans and sub-menu RS
handy too that eveything starts fom the Kaspesy online portal where yu
download your phased oftware alongs salle fr aher modules
uetualy al under thesameumelacontalcente
The fontend categories that are aulabl isthe contol cote ar: Sean,
Database Update, Safle Honey, Passed Nanay, vary Potato, Bala
and Restor, Protection or al deoes ae Parertal Coto. ost are ist
‘lant, howe components such as Safe Money and racy Potion
desene alte merece
Sole oney utes Kasper unique protection engine whereby your anne
\ransactors areal behind re rodue’secunty web, Tis eaturetakes care
of protecting yourshoppng as wells oninebankingcoitsan mpresshe
vneaponinte aeady mpl Kespersyasnal
Prnacy covers a range of ferent features. The core compan
rote you while suring guaréig your online derty and
Information, while aio actly Hocking malious webstes
and prevertng any fom of waching 0 monitoring a0
ses an element that los ay ater to acess your
Meee eee | deena kaarg
Sumtchae endo
Needlsstsay the eaturesavalablearecotanlympresshe
Boyond thefew neve mentioned above, here ao cntos
to prose browser secu, etecton for any cle ane,
a dpe scanner and’ 3 sted aplication mode that
wil ony allow whitest pogras tp be exited, You can
{rete a Kaspersly Rescue Disk hich yee abl to boc Fem
shouid something eve go wrong aloningyou tostanandclean your
computer without neeng to aces Windows. The It goes on ard
coves prety much everything you woud vant fom an allencompasng
seoury sit,
In tems of speed of operation and the performance hit on the system,
Kaspersky Total Seeuty 2019 is about on par wth that of Bitdefender,
Admitted, nt aft 2 completing 2 fl system scan, but ts ay 2
rminuteorso out Te perernance ton thesstem neg gla, UT
bbehard presse to ote any negative impact once the softwares installed
sevdcontinalyseancing,
‘Onelat component werth mendoningisthe Parton esti With his,
Kasper ofersa method oflecpngchicen sale whie they use th doves
‘oucancrestusgeschedulng @PSsafezonesandreceve notions shoud
snythingsspcour attempt aces yourchids deve when they tush
Beyond that, hee ae also testo stop chiden accessing adit tes, o tes
‘patean emrecuringcomet.
Kaspasly Total Securty 2019 an impressie product and ore thatthe
home user can certainly el confident abouts quick et use, regulaty
Updated and eke al the ight ove forthe point of ew ofa user, parent
and someone who wants o make sure they as secure as posse onthe
rmodemintetKaspersky Total Security 2019 Revi cH
Woe oe bow <—e ae
2 e
ED Pte toting eae <=
K an
‘Components such os Privy Thee ot tke obout Kspersys
Protecion are nelcomecand Aogshipproduct ts quick easy rouse
remarkably usefulto the end user nd teksalthe ight bares”
‘Your protection sive now
>
“Thecontalcentre
inteoceisunctred
Privacy Protection condeasytofoow
ith plenyofopions
‘ovailbie”™Bw Protecting Yourself)
McAfee Total Protection
Review
The name McAfee has been synonymous with antivirus and security since the late ‘80s and is
considered as the granddaddy of the computer security world, Its latest complete protection
package, Total Protection, has lot to offer the end user, as you'll soon see.
McAfee For Consumers
fee's now apat of ntl Security andas sch its backed by the atest generation f hardware eve security as wll as its award winning sofware
scarningengie.
ThenamellcAcehassoonsomeinterestngpressoverthelat decade notist
From the securtysotwareitsa but also th regards tothe compary founder,
che Heike. The founders colourful ies ase, Meee Tot Protections
aingulatyimoressesuteat took Thecestsalitehgherthanthe previous
ents price at 5.9 fora years subscription thug ejonal and special
offers il reducethat amount considera). However onehigigted feature
is the Vie Protecton ledge, whereby your money refunded sould Mees
notbeabletoremavea viusthat’s aendy on your computes,
Its woth mentioning tha the annual subscrtion icudesisallsion on
smunlmted umber of devs; whichis certainly wor considering youre
‘nectthemany medem hausehaids tha owns countess ikemet connected
devices computersand eeryhingn bomen iswihoutdouty,anexcalrt
checefotheheme use.
Both instalation and the fit ul tem scan were slower than that of
Bitdefender andkaspersy, but ony by about ve minutes youre constantly
inarush you may wantto consider the ther suites, hee most uses vil
besatsied it the result fom Mee ~ at anyrate,tghvesyoutime to make
acupafteahleyaurewating or thescan tinh
As with the other products woe looked at the intarae is serge to
understand and nsigate, wih he cor and mest used functors thin
es reach ofthe meus pointer, while themore advanced optons are
nes tucked aay fr those who area litle more knowledgable
aout such things shor, itor wl and keeps the wealth of
‘nalable options at bay until the user requests them, Needless
‘osy,thesetngs are eters, alanngthe advanced usera
higher degee of contro overte way thesutoftols works,
within thesytemonubichits installed
Mesfees theesiered approach to sjstem protection is
wort of mentioning Fist, the scanning technology does
a thorough, netted com inspection ofthe es on
the gste. Heustic anal then aes over, monitoring
behaviour of fs, functors and even cade inspection, to
check or pose unknaun viruses based an the way they
work Lath, anything thats even remotely supicaus &
automatically ploadedtothe Move Global heatntlignae
Labforanajsis Should the code prexeto be anew formofins,
the team behind the impressive sounding lab wil eat a fx and
ushitouttatheather to hunceed milion plus Mcee users sot
rice geting computer vin but at ast with Melee you can be assed
that you misoruneishebpingothes
The Passnerd Managemen feature i n interesting acon tothe MeNloe
‘ate oft. ely ines ax Key Scunty component tha, although
atthe to ofthe leguepassword management progam, doesboastarult
‘actor authentication process. In adn, you can Stina Tre Key
password frallmember offamiy -uptofve wes,
‘Among the multe of features youl ind File Lock an interesting action
‘This an imoressve encryption mecharism thal lock your fs behing an
imperetratic,miltary gade enenption wall. its nat actuated by deft
\whch i understandable as encryption does sl cary wth it a higher level
‘of user lonledge and isnt something the average user wil immediately
conser adostnig hen sting up fe compute scat.
‘Asforpafoance, neve akeady mentioned that Mees somewhat slver
‘than that of iltender or Kaspersy uta withthe other erties you won't
notice any percevabl slowdown inte computer operaton ithtistal,
ets Tot Protecton doer an xcallentcboFeepingyoutles and personal
Ieforaton sae when online and wth is aed features its etary worth
lookngina 2 restr eth
U McAfee
AC) <-))
cease)McAfee Total Protection Revie
— |
| ‘one
|
|
|
“Thereoreample fetes to explore
"Mckee simple to use updote and nd aise timproveyeur secu
‘moniter Pls the edd bonus of when nine
Unlimited deve instaloton isan
ling fcr”
“The seanning tos quickos
theorher products wevelooked
catbutitcertoinlyasefective”
eae
Call us your cyber bodyguard
155Bw Protecting Yourself
Setting Up Windows 10
Security
Before we dig deeper into the many levels of Windows 10 security features, it's worth taking a
moment to check that the initial security features are in indeed up and running, and doing what
theyre supposed to.
‘Are You Secure?
Remarkably despithavingan antirusclentnstalled, someusersarent ven aware ofthe delat Windows 10 secur features. Here'saquickten step
processto check everehingis workings shoud
FE sco cicingon i ac SanSaoneroesinge Studer opr dao enone eck
‘innit erythro Deveney pram For eon far
anicckbetonopunterapmeriterase sectyed smn UsrAntCoaal i) ttOt dex Core sets none be
UC opto. The other features canbe founda search femtheWindows
=D® riters SMB
FAR best maten 5
2 ‘Security and Maintenance =
a Control panel
Settings
YP Check security status
© Change security settings
“slope Sct aaron con be BRR it wryou chan atentioares aspen crcl t
‘yseciontoerpendit eal alteoponswtintheSecrty_rocec;obwul yc don, 0 you an sym a invest theisue. There
ide displaying On withthe exception free Sent Setings
nich wiley OK
a
sroebdrscocn‘a
(_ Setting Up Windows 10 Security cH
Close down the Security and Waintenance [Link]
Windows Stat Button nd serch fo Defender Ck eesti
Windows Defender eet Centeoption,
a @
‘Search suggestions
D defender see web resuits
yovrenotusing ath par secu and ute, hen you
86 to ake seat Yindows Delendeis actwated and
werkng, There arenumerus options avaiable inthe new lock rex Eton
Windows update of lender Each can be selected witha mousecck and
vewed separately
5 Your device is being protected.
8
“
GB *
Clckthe Vis vet rateton option This pen anew
vindow aloingyou to parma uickerFullcancfthe
‘stethatcetal therumber oft ound ad the number ffl canned
ac
© Vie test protetion
ifyoudickthe nus & Theo Protection Settings option. you
ante opt to improve te 5:zem protection. Make sure
thatalthesub options ae set toOn and rl downto define he program’
efautnancstons.
sr
mF Vas test protection seins
euro theain Vu Theat Proton page, youcan
Clekthashigicon fom hestrptothelet ofthe sren; ten
Clekon the Advanced Sen nk ated unde the Quek Sean Butoh are
options oun Ful ten scan, aCistom xan (larvae fr
example eran Ofinescan
Advanced sane
Last lckon the Frewal Network Protection fom he xn
stiptothelt Again, ute not wing dedkeate, ted party
_ecutysute,make ure that the Prater Publ Frewalsaresttocn ths
protectngyoursjtem rom unvanie inten
10 Firewall & network protection
15 Pe ecto reteWhy Updating is Important
Continual updates, rebooting after an update has been installed, then the inevitable second reboot
straight after the first to apply the update: it’s little wonder people stray from the regular update
checks. Whilst it can be a pain though, keeping things up to date is a top priority.
Update, reboot, update, reboot
Upatesmay weet bane ofthe modem computers bth arte forareasn snot the iter aryore weed those updates ip
protector sect Hreare lO easonwy theyre pean
emer es rau
ofthe ruses round tay ext ler ntheWindonscade that
Lek core
B
ie
scutythatsbeen pogammed int the developer Fr
ides the authenieation shared asa et 7 ‘i siruch needed spe
UPDATE
i S9 8 8 G *
eS
soofen beng protected
Your device is being protected.BRSTTRTSSRTER To ccordthelotreaion the Wins GEN Non genuine cores fWindowshave been
Fresalls one oftefest ayers scurtyon thom in Micosots Sdesince legate
ours With ccs toyourcemperram ancthersourceismontored sharing anthe nemet gsned popular, These day the ct of downloading
3nd even backed, stcppingpeertial eas efor they even tthevins Somethings rampant. Windows 10 updates ensure that youre using
efercelaye Updetesmakesue atthe Frevalisuptoseatchforthejob, genuine copy the OS, whichuilulimately secure yeu PC against threats
Fram pated copies
10 Frew & network protection
ask for .
—_—_ genuine
Microsoft
software
‘snot just the Windows coreflesthat require
[Link] — ATTEN. cosothasbeplonstorthe fut
‘canbea partftheaverl Winds 10update schedule Thre are Windows ’cten mertoned hat his wil
‘wueabiis in Of oo, hich shen exited canallowmabcioescodes _bethelast i vesinaf the OS asthey wil be uning Windows IDasasene
thesjsten Th he Gvemeupdatsorother Mice produce in _opposedto diferent vesionsovertime Ths mearstwillbeaconstart
Windows Update'sAdvoneed Options Uupdatecyte with adingorremoringof features Updatesensireeu'e ing
thelateterions
1) Advanced options
ecm hw te a tated
— gf Windows 10
~ as a Service
Updatesnateny patch any winery,
theycanasofse syste resources by
imgrodngthe coe and seaming the avaiableresurces nshor i you
AswellasOfice Microsotprovidesbaseler _computerispesoringbette, hen ican ely handebockgyoued sare
dives frmostoftheharcwateavelabletodsy. _thmatscarewthovt afecing hat ou redoing
‘These divesaresgned and verted asa 2 ny new pee ohare
‘tale varand il be eae according the diver protection engine.
REAMLININ
A onsatnage
‘e9 mG/Mmislax®Bw Protecting Yourself)
What to Keep Updated
and How
Discussing updates is one thing but how do you go about making sure that you have the latest
updates and that al the necessary components are being updated correctly? Thanks to the
improved update process of Windows 10, this is surprisingly easy.
Keeping Up To Date
Witt esto update Wndows 1, thr ae len tht can emia Weve aad meroned tats noon Windows that needs updating
aeosoteae and aes
dows Stat button foloned by Sates thcog con jst
the ponerioncn thestpta these Ti wll ape the nde
Satins, cate the st erty Update Set and
BERD iecctsincncynecminin cate REED su cetorneneraconere
dows 10 les. You Bem updates are delivered. This page details the way Windows,
bese othe comptes once creen te
urchin per thopton ro
By default Windo i
unload andi updses fo he cove
cancheckloranonthespot by cckingthe Check forupdates butter and yo
‘anseevint’ dead been updated by ckingthe dat history ik under
‘heupéatebutton
sroebdrscocnsual aomatical updated Wind
acuaee ca
he harchare manufacturers
velar perfomance update, Forex, yum an ca graphics,
BB open nvidia Control Panel
Check or updates
Update notifications >
BB waa controtPanet
Exit
‘Thetidie GeForce Experience allows you to improve in-game
tvaphicsandchack forthe tes rer Usual thsisgone
automaticaly ard you arena af ay avlabe ives However you War
tocheckmanvaly clckonthe Drier tabfoloned by Checktor Upc
ESTER Titccory programs and aplication zo equi rega
update checks, gain, ths isusuay done automatically,
yeulaurch the program nqueston tfen chk forthe atest version
ot, kor nk uch 35 Check for Updates ors usual inthe Hep
tor evenundertheFlemenuscfyouraveure app
rchaed om 283 and
ingthedece’s
rout nae and number ncentrtintoaeeechengie
cameras a
Boat sb
{ing te Wndows Serban an choang Davee
anager fon tere inte Dei ana won lec he Natu
sant pati ihc and elec UpdateBw Protecting Yourself
How to Secure Your
Web Browser
The web browser is possibly the weakest link in the entire security chain. It's the software product
that'son the front line, the one that will inevitably bear the brunt of any Internet attacks and as such,
attackers focus a lot of effort on making the browser a portal into your system.
Safer Surfing
Securingyourveb bromserittoo fc. There are plenty of options avallabe induding some thi party adé-onsyou can wsetoimprovesecuy. For
this tutarial we¥eusing chrome.
Stary opering Chrome andcicking onthe vee vertical dts in
Tretaprightare bowser widow. This the nktothe
valabe opts om te lstchaose Stings
boxopen slat theopton or
Enayptall scat wthyour avn sie siphrace Erte
vase youcanemeberin the bows provided aed this
cur fal data synced bebien Creme are helt
ESTER cereal ecommendesthatyousgn ino Chemeusing 7 : Ci
Gosgl account, as hs can reatympovethe ove securyof Show Advanced Stings. The stew econo appear unde
‘hebronserFor example wher yousignin under the Signin secon in etings, the Adhonedsetngs s Pray. Sart by cickirg onthe Content Setings bution
clckontheAdvaneed ye Setings button efit option avalable
© 9 C0 [@ awn oie a Gea
he ‘et ceo cron may
1Content Seng allows greater degree ofcntl over Cookies,
Script Fas, op-ups your computers mcophone and
‘renthewebcam banesteeve into we ant mf altheaptons thn
‘sented space. Forma scart, dsabe Jase and ash and
rake suethe mc and webcam are protects to,
TE
Clckthe Donebutton when yu rished wih Content
‘ering totum youtothe Crome Senge page Within
Priaysil ensure thelist opten, Senda "Do Not Tack request sted THs
ullsiop an tad elemens om montoxingyou owsng ates,
a
‘tet gee ea
ean rn ny tb esprit,
a
1 ean snatch agaton ero:
1, Us pscton ence compte ches nd URL Ypein te ie
ves paseo anita pger ae ly
amt oe sorbet ree Cooye
Pra yun dent dng
eases pace sping ree
Asam ge ttt nd oa apr eee
Senda Do Net cee throng ale
Just under the previous steptckbax it also recommenced to
‘uct to Paste nd Ferme bos that fro enable
‘Aol and Save your Pastore. whist. pan ta corstantyeter
asswerdsthiswilstop ay hjackChromeatiacs fom gaiing your semames
and passwords,
ene att to Sota mins sige ih Mage do tinge
How to Secure Your Web Browser cH
Under the Downloads secon itsan idea totickthe boxAsk
hereto save each il bore download, Ain thiscanbea
bitofapain forthe ser homevert stops malicious backround downleads
Fram afecting your system, gungyou mae cortol andthe ality stop
theprocess
1 satus ace blo dontnseg
Tothletofthe chrome Setings page youcan sensor
Benson, Stings and Abou cle Extensons ek Whe
ensionspageopenscoldowntthebotiemandclcktheGee More
Beensirsink
With the Chrome Web Store launched, via the Extension in,
searhforAdblock Ps. thin theres clekon the ado
Chrome button on fist optionfr AblockPus This wl nsallanadverisng |
ocr thin chrome seuringyeu fem any threats rom intet adver
othe same rr anant-racng aden] and MITPS vereProtecting Yourself
How to Secure Your
Home Network
We've mentioned previously that an attack doesn’t always come from the other side of the globe
butcan indeed be a little too close to home at times. Home network hacking is possible with the
simplest of tools available on the Internet, often even just tapping into a cable,
Network Protection
\thoutbeing too paral remarkably aso get into aneighbourshome network youliveinablockofflatsor you use powertne adapters you may
need to consider these ten steps or better neworkprotecton.
Themastcomman ety pinto gan acess
toy reworks va the router Therouter
‘tamyourISP may well fring telat: fos oferentenburitdoesnt
Take geist the lssrerabesactensoftherternet 0 obtanalot
paserds. Theor, changethe cea username and passwort access
Nostroutes these days come th afomot
autenteation calles AC Medi cess Coe)
addres iting Evrynetertabie dec, computers alts games cools,
‘comewithaunique AC addes,Tefiterg allows youtoertarthe MA
eases of your dese, so ol they can be used on yourrouter Cora your
‘outer cocumentation lr more details
Incanbeapainbuty dang 0HCP on yourouer
and optngfor sac Paddrexes Every devienthat
onsets t03 DHCP router il eee on adres. Bj inate te gO
speeiytheacressange aval lsaticl pret butts war considering
According oTstwave's 2013 Gobel Sci Repo.
‘maryhomenewerhacksareconduted when the
[Link] ith arp cept to
steal bandwith andview fies younayhaveon aNAS dive Theshor, simple
seluton so power of therutratright andifyougo cu ortheday.
or¢ How to Secure Your Home Network cH
PTSD ereiineadartesaeonecalent — RRRANPRER) shoringresauce andes tom onecomputeto
resource for connecing ed
another's erect rebut consicersharingless you
newarkevceswithauttralinglengtheofeaceareunsthehame However, ve incoee proximity ther Once halerhas gine 2ce=stayout
ependingon teaapexisposbleto se anther adaperoganaccessto network geting ay shared folders you have val ea decide. nexreme
yous Never honesareconmanwhareyeuteabletopickupanothernewerk, cases crtshareanythingbut general ighten passed conscL.
Sousethemeyptonbutani the aapte has one
PRESTR ence adminraioncnbohtheraternd
7 computer certainly help you out when you're nota
ERD COesomenthctemetionsaicit gym Petapsauconastoyarhone neh ems Wet
prose ps of sie anetonsee ‘the reasons, tdoes leave a potertial apin your home network secuy. Consider
‘hanthatf wireless btfyourelvnginshaedacoredatoncrafarbiock, Nn dos ev pote gin ycusrhome neo Secu
make surethat nyunseencablelenghhscantbe access byaeighbouri’s__‘eSPBMcamPleteycoublechekrgsheaurenseaton Stop noch
e35jenaughtospleinto an Eee cable and steal bandwith v0
Te | Giertesmten tere
ofgerteapensttt ere
tc
PINTER Consdervsinganetwok napsing roam,
suchas Qper-Avat ogainabeter
undertandingaf whet devices attached to yournetreBacomefarlar
vith the ress, manufactur, models and so en aevery corrected
‘bec, That ay, houlanthingnewappes oul Init ot something
youalloned.
| et
yourunasmalloficemakesuethatallyoural
ts ae located aes here they ae secu,
Betnd desks and general ava tom where th pubic oan sts may be) Protecting Yourself
What are Wireless Security
Standards?
Wireless security has adhered to a number of standards since 1999, each improving over
the last due to the ability for a then-modern computer to hack the security levels behind
them. Tighter controls are needed as computers and the way they connect have become
increasingly more complex.
WEP, WPA, WPA2, IEE!
Ami theconsingarorys es
interesingtoleam ftherhistoy.
The site fecal
nd Becton Engrs thePia i the upgaded
sStandadseurytecnnology UPAR
desire a afer the seran mee 236,
bit encyption key, whch isvitualy unzadabe
urls youre a ec escrch ab with felon
alata spare enquantumeampsng aed ects
ardor decrypirg pass. Tara a feet
substondace ttn WPI, wth AES. ances
rcypionStndac) and TAP emeeralkey egy
otc both of wich ae encapton mehods,
fang sth th lesser ised CO (Courter
Node wth Cher Block Chang Message
Autheneston Caceres)
"ay
WPA
lacing the WEP standa
WPA BF Prot Aces) provided
2 uch needed impronement forthe ever
adrancing march of secur became the
‘senda in 203 an ofered the wee athe Bt ot
‘hemor aept 128 ey es of encryption AGED
ey tock woul take several ete when ts fst
sired these doy ts extinaed tha it ould tke
sera mnths, majbe ls he take wed several
Computes woting 3 8 caster. Naty 128° hey
lengs ae ied nambingy more complex [Link]
by todas stondares the hecreial process ofa
rutefoe attack nul tae mote tie han
theunkersehas estimated to ex,
Vic save very ngtine
(. What are Wireless Security Standards? cH
WEP
Tis the nga wiles
ercypton security standard, Wied
qubalent Pracy. Wht te pectccol
wore forthe ate nes eles nett,
ans cen renhaded by he ever ircesng,
power cf the aeage comput WEP uses a Dit
Stendadenrypton key. hichis ala erst of
fethenorasheadecal gts thatscurds ikea
lec possbllassta crack btameden, poet
comguter would be able wo break Obit
etaypton a aeund30seconds compa
isto mntsora computer inthe
Tae.
Access
Point
Teling bout aces pits ts
ith had tata 3 9 ch
or rrr the es sal and
set can pysealy Be» nba of
een capone eh a a th
‘or pose ade eset he
Toure at overs 8 wed Bhat
tet to 02a Se wes
‘il and vce ven a0
rcerecosbeWariles
‘ceshortProtecting Yourself
How to Secure Your
Wireless Network
Itmay seem a little far-fetched but it's not unfeasible for a hacker to sit outside your house with a
tablet or laptop and gain access to your home network via the router's Wi-Fi signal, Understandably
it's quite rare butit's worth considering beefing up your protection.
WiFi, Lock and Key
‘Alto standardtip on potectngyour WtFmerge wih those of potacngyour red network commonsense mos and hepinganeyean
‘whats pingoninyour owner
The Service Set dere (S31 sthename ofthe
Areutescome wth agenecuserameard
router thats broadcast so yeu abletolocateand
isoureDependingcn te made and
rmanucureraftercutes is upsgless/iopstholsftheeerameand __connectoit Mostrouters wl dslay te named othe make end
posto Forearoe, em wmunuepessnodscomandchoos yourovter. model, makngiteasr for ahackrt filth information they ned ain
Wahatbeng theca changethe administer iemameandispacsvcrd, 6085 Rsreconmendtheeoreto frequent changethe SD.
RouterPasswords oe inate
FETSRCITSED se sccied cues erdtohmetherounsatot PISSED) 852 possteto eect an option hie your S80 fom
\semanes and passed Athowghthes amore bring oadas. hist hisdoea zopitbenghacked,
scurethonthatfthedeautse hey ae siltainablefom themorecktious _dossmae tall mre eeu for someone has casa long around for
‘quoterofteleret Apotenia hacker illeasiybe ebletogeteldotsesof networks acess You" need to cart you ote documentation fed
passwords sowherposiblechargethelS doutemameandpasswor. how tide your Sf make ard made
oc)
xx ... a
eine:
enoneost madern routes il ready come wh thelatest
suit sondarerabled, WP2; but ee are instances of
‘ome outerdeleutingtoa leer ecu typeterthesakeofovce
compatbity essential at youensure your outers using the atest and
best form of eneysion fryourprotction.
TTT Te frewathatcomes wih windows vis
0d butte real fom ted party av
Software seven beter and for extapotcten,makasurethat routers
Inewalis enabled ad does'thave ay potentials,
Goce
ee
ee
Someroutrscone equipped with he ably
‘ona guest retwotc Ts enabes sets to
connecttothe route wtheut requir an encrypted passe Obvious
a pteral bie gapinyourhomenewerasecuty Myauhaveroneedota
‘guest network thenlookte the documentation on how sable
¢ How to Secure Your Wireless Network cH
ost uses ill hive ther roterlocated
Intel oom nearthe master phone
socket. This means that rot only wl he route broadcast trough he house,
ItSab broadcasting over much ofthe seein ont. Consider lacingthe
routerin amore cental location of your house. This aes reat coverage,
hist ing is ial reach Beyer
Roticanctecue)
‘Te WPS baton onarouter ond ade willow
cexsypaingofthe wo without nedto enter the
enerypon passed This cerry converentbutsomeene who may gan
paca acestayourouter ibe abe to partheroun deve Looks
tumingot wPsintherouters stings,
sre
<=
Ice)
Omen
CESS
om
— Soa
Firing MAC odes was iscussed reviousy
baits nonhrepeating wth regards wiles
nesvrscurty 8 fiterigthoze devices that ar alone ta connecttojour
router andheepinganeje on whats connecting yout abeto conte your
seeuttytoafrtighr degree than wal
(isisBw Protecting Yourself
What is Encryption?
We've mentioned encryption and its impact on your privacy and security, but what exactly is it?
‘The definition of encryption is ‘the process of converting information or data into a code, to prevent
unauthorised access’
Kryptos Communications
Tobetterunderstand enzypton isworth takinga mamenttoleam aboutits orgs, how it’s been developed over theyeorsand howit applies to cur
‘moder communications.
‘The word eran coms fom he selet Greek word Krypto which means
hcdenorsauet irtesting), hewscthingmesagestom ctescanbetaced
acto eay Eytan sorb who nsetedronstardd herogyphs within oer
‘conmmuncations in rer to hide the message fom csi vewersAccring ©
histor the Spartans used too leabe ith mesages gave. When the
Sips were re they were mesingless but when wrapped around asa of 2
eraindomete te choos cul be deipheable
‘[Link] maden ors encyption ae fr mote advanced but the veal
cove concept hae remained the same ta be abl to snd 2 message to hers
without anyone leben able to decipher. However, mck eneyption new
requres more tan sol sending coded messages Not only is covertly
requted eneypton mast perlrm aleve of authentication, so the orn of the
ommuncaion can be vee integty oF the communcatons, where bath
the ender and thas no eve the communicate canbe ere ta he
message hasbeen aeredindaween andsorefom of nonrepudation where
thesendecannt deny hingsenthecommoniatonin theft plce
During the eat dial age the ony uss of enenyption were the goverment and
‘itary, ands ch between the they ete set ofegpethns and standards
toprotctnecomunestin onthe bate! nd fom one goverment aS)
tothe nat, These algeitns grein complonly 3 ecology advanced and
‘ast long before he miltary-based fos of encytion were beng used in
ommercl modes commarcaions Wein afew shar yea bank arses,
‘ach ithe and dataset to and maxes began tsi these
ras protacalsto proet erste inrmaton,
Today wee reusing and using dees that boast ‘nny
yade2S6-bt 36S forms of encypion, standard thas regarded
% near impossible to beak wthox spending bills on
‘Speci hadvate and sateen plan Engh the meer
fermefencrypontakesdataand pesto alot
topeterwthaley Thsceatesagutled fleet charac tat
can only bec reed ithe cect ey app to ceca
the data, Agotins today ae dhded ito wo caters
symatieand asmmetic
Symmetic hey ches use the same ley ta both enenpt
nd decrypt data The ost popula symm cipher AES
Ubchaned eration Saad, cele by the mia and
ovemmenttopetetcommunicatons rd data, Thisisafstorm
of decrypt that equi the sender to exchange the hy used to
encrypt dt tthe recent before theyre beta ead
-Asymmetc bey oper ae ao kaoun as pubic ey enptowaphy and
use wo mathematical Inked lays publi nd rate, Te pub hey can
robo con
be shared with eveyone and is uly gna by sofware or provid by 2
esgnated auteriy,Theprateleyissomating hats usualy enlyknoun bythe
iebual use estrgly both ypesof ays can be apple, whee one seas
public ard another a rately, ich canbe combined ofr a shared
cneryptoniee
“These ys are mary carats erg, prove nigh posse for someone
1] te Fre hack them, The Bats Force method hes sng 3 raga on 3
‘computertotryeverypassiblecombiraten of aeyuntithecarectene fain In
thecaseolthe2sebitencyption twoulake2™ deen conbintonsta beak
thekey you erate forceonetilion bys persecorit woddstltake you
semeuhereintheregencf iC yeasinore track 56-btereypon. Howe
8 power computer can probaly manage sound te billon clusters per
second, soin theory would ake 32° years for your senda deskop tocrackit
“ae inmindtattheuiverschasthertealy onl bemineverce fr yeas,
umber tigasthatare geal fartoorind boggingtacomershend Sufce
to sy tat yar abl to use 25-bit enxyton Fx your communications oF
tect your data thn out gong tobe protect fr atest seven ies the
‘orentageotreunkere
Encryption is the act of
protecting your data from
prying eyes- traced as far back as ancient
-standard
hieroglyphs.”
er
t, using non-
Egyp'
me
“Making data impossible to read
is just one step, you also need
the key to decrypt that data.”
“The universe is 14 billion years
but it would take seven
times that time to crack 256-
old,
bit
encryption.”Bw Protecting Yourself
Encrypting Your
Windows 10 Laptop
Windows 10 Pro comes with Microsoft's BitLocker program to encrypt the file system; however,
Windows 10 Home versions do not have this feature. Thankfully there are many encryj
programs available for download, we're using DiskCryptor in this tutorial.
Windows 10, Under Lock and Key
Wie goingto encrypt 268 USB Nash inthis example, purely foreas of useandto demonsratehow youcan encrypt your entirelaptop hard vel)
Encypton does fect the core cat other hanmangit
‘nposbleto ead without the decryption but it abays
‘worth making sreyou havea backup call your dataport ary stem elated
‘changes house your worker tain the Documents le then start by
cpeningitin Winsonsoore,
PressCi+A to highghtallthe fs, then press C+ to copy,
themtothe cpa Ned choose asultablebackip locaton
suchasanesteralornetwork rie and hen reed, press Cit pase the
‘ped data int the elation, Then should something gong you havea
recentbachupcfyourmest used dt,
BED 1s atvaysbostoensrsfe databefore commencing with
anghinglethis Sabo alaays woth cog as we ace) atestof
thesofvareistonacskthatyoudon’ mind messing upshouldyou gt the
rooess wrong Let stat by navigating te Dror hamanage an
‘serotonin. Page
EVD :ngtnerenutothetplet, clckontheDowrlaadsrk. Look
forthelaest verson nthe Dlond section anche ink
forthetnstale:Thiswilopenaconfimationbxclckthe Save Filebutton 9
dowmlead thediskCyptorexetati fe‘Thederyptsetupevefle should now be n your Downloads
‘older Double cickitandseect esto aczeptthe Windows
ceonfemation Wh the DskCypto setup wreow open, cckthe Notion
ad accept bens grerent on theflloning age Forth remainder
‘theoptionscheesathedeaultscikngNex When dove cbekthelstal
baton anaeboot compe
oe
<=
— ‘Ji
oe
EET ier arct00t cickthewindowsStatbutonandlocatethe
rentyinsaleDiskCryptorprogans. You wilreedtocickYesto
autores administrate aces. nth hapten youcan sete sf
curerdyrstalecharé rvs inyeur syste. Yeu canclekeach num and
‘ews evomaton athe batom a te DSkGptr wind
‘sary selecting dskyou wana eneypt novelas
mentioned beer we garg o tests ouronaUSBstcx We
‘econndyou dao, tise convcaleththe proces Hh the
corectie selected therccktheEnerypt batonto height orrighcick
andchaose Encrypt fromthe env
(C Encrypting Your Windows 10 Laptop cH
‘ovtenowoleed selactionofxaabe algorithms
hoose Hom Cick he dep-doun Bot view them al but we
recommend tying th the ceauk AES algorthm frthe ime ing Lee
thewipe Medeor as None and when you'e ready clckthe Ne baton.
oe
E> Inthe next section, choose a unique password for accessing the
nent de youYenoted how stongtepesverdis. hen
yore, ene againin te Confrm bax Chek the Oke sto the
Snenton races
Coo
Depending onthesae oe dead how much ata thes
one, theencyptonprocesscoultakesomati hens
complete yo nailed and the sliced wl euly ery, wh you
bingo crass and decnyptitusingthe password yousetupin te preous sep
Comers == ®Bw Protecting Yourself
Top Ten Encryption Tools
for Windows 10
There's no shortage of programs that can encryptfiles, folders and entire drives for Windows
10. Whilst some are very good indeed, others tend to fal by the wayside by not offering as good
asolution.
Encryption Galore
Hee aren fret enrytlon toto you to corse that werk wal wth Windows 1, andsome previous versonstoe, Some are oer cost but
Aheyreai godin ek ong
‘alableoniforussof Winds 1 Pro, Windows 2 Pamanilya compression program, 7-2p can also ery your data
Proandrerpse and iedous 7 Eee sad we he 26 btstandan simple use completly ee
Ltimsteversins hovrerunringtheHomeverions youinasdtaupgrace va erdcomesinethe 3-6 wesionsdeperdingon whch ypeyou" cor
Thetis sto orfernthe Windows Sten shor, Loder offers hildsk Windows systems
encrypionwth 18-286 4ES standards =
‘Thisisa hei enenpton progam tats basedon the boater excl ee pogram Crypts 256 it
popular ruccpt ites enhanced seu tsof encryption esto useinterace coud storgeinegaion,
lees of encryption andsuppor or UF dives avaiable fr Windons passyerd management secured bes andisaalbleinamultudect
‘ersion 7 onnards aswel a Moc O5X Linacendeventhe Raspbeny deer anguoees Theres supportfor Wedows Vista onward as vl as Suppo
3 fore zesoner4GB
eS ieeeAnexcellent and comprehensive folder locking
rogram, wth supporter 25-bit encryption rd
\Wincowsvesone rma vad. teats the ron a 0 butyl nee
to checkforthemostecent prcrg For youroney, you pscut backs,
Use protection, password alts, asec fehedetarcmach move.
costing around E60, Cyptoéxpr oe support
Torwncons ernst ora united
fs ercypten 25552 AES ener uiimtedsecureflevals non
thet ercxypten asym and copy ls around your sem.
else port
—
Tis isan interesting product ast roves
loud based encryption for ny flesor folders you
‘poadinto your onine storage. afer: AES 256 bitenention and an easy
‘use setup and integration into your oud provider ts PayasyouGo, 9
youonlypayorwhat you use
C Top Ten Encryption Tools for Windows 10 cH
Thien fale moreadvancedbutonceyoumssterits
Intriacesitsan externa power pram and ee.
les desned fore and emal excypion,cfeinginceable levels scuryfor
\ndows upward ad hcrsoR Outlook 203 and newer.
oT y
Tiss simple andes) toure program
that supports AES 256 bitencryption,
compatibity wih Windows Mobie reunited support and updates and
iCal inluess om ieewal to elppresenthacars om garingaccess 0
yourgstem,
Paramus
We sedDiskCyptocin theprevous ttl asits2
fil sightornard progam thatcanachieveigh
levelof enerypionth ase, Tete aletmoreyoucan dovethRandyoucanWhat is aVPN?
Your system may be secure to any online threats but it doesn’t always mean your privacy is assured.
Thisis where a VPN comes in, ast offers the user a heightened level of anonymity when online and
even another level of security and protection.
Virtual Private Network
sings VPN can help ide yourenline presence his thismay seem ke an alway togettollegl contents actualy designed to help for your
bascrighttontem and digital pracy.
ssantally a YEN ual Pate Newer sasener or goupefsenesinarenote
locaton hat youcanconrectiotheugh acter. The VPNsenersthen eyo
Intend P adds wth thar ove, so you cerned to 3 PN thats
located in usta then your aces would be asifyou were actualy stata
slap domnunde
‘Te banat of tis ae mary bt lay a VPN wl allow you to access eon
resid webstes,protactyou rom wack and shel! your browsing acs
From hase who want tod out aha you ate pesoraly based Obusy thre
‘comesaregateside nthe tarmafbengableto acces content thatyeurcounty
has ere ig frome reas btn the postive, VPNs hve alle pele
Incounwies wih earaordarly ghteictnsto pt acesso the ouside wort
often enabling then to repat on what szngen tei on county tothe ver
Hever most users having 8 VPN means the able to gin anes to TV
Chanelsn the S, Canada, Europe andotte pat ofthe wa noc
‘about being able to madera ‘chest the ste by fring the rset fo
thek youre somenhare ese ther than where you atalyae though, Remote
“sorleandemplayeswholvinathercouniescanconnecttacomean/ VPNs
‘eedbeabletovsethecomparysnetworkresoucesasthey were AKA St
inthetuling
The connection fom your compute othe VPN senate et is usualy
sequetothetuneo 256i eneryptin evs dependingonteVPNcompan/ho
ishostngthe snc Al your ntaret af il ite trough the VPN servers
systems, ofeing mull layer of protection fom vies, maar and
ria, Beyond he other posible canariosusniga VPN whist youre
road. orang abate carpe il enadleyoutoaccessyeur
home county srices and work rescues, One mre element
thats worth mentioning hac using iF haspats one of he
Diggs secu risk or saves using a VPN can ely
imeroeycursecry wbistsingacaestee WF.
est operating stems core wth the aly to connect to 2
{trough ther eto eng. you Rave the ewer
andconneton deta ofteVPNingpeston hen you Teale
tocennect ot ung the bln Windows 0, Liat or mac,
options. Hower, he mare commen, ard in some respects
ser meted tous th cent ach mot VPNS ro fr
Standard Tecentiscfen simply acomecton window tbat wil
‘skye yourloge deta hen provide a method of ling you
tocomecttoary of provider oolocaton savers ited by county.
‘nee the cries mad, you spy cok the connect bos aed wthen
fon seconds yourP adres wil beecate wehnthe chosen county.
Thaearepeny of VPN reviderste chose fom and wllckattencthe mst
poplar na whe. Some ale a ee connection serve that’ handy fo quick
browsing buts very fst To gin aces to faster sere, wth bet security
ad protection etre you ned to pay a orth or anual sbection fe
‘Thani for the most par you be epecedto pay interegon of
sStofLSpermonthThiepansyaubatercnerage andthe aly ouse upto he
‘ormoce deer dees includes anc phones
‘verte coming pages we i tle dope int PN 3s you can image, sing
cneuilsigicarey mprveyour prtecton when one in temsof Windows 10,
‘secu the use o 9 VPNs Quy Decor al 0 bythe eno his chater
oullberewledgeabeand heiptilyuingeneto your on advange
“auPlsntistedtetrcesto
fooimanietencas tan besedty
A ierwestoanesteadatice as
e-.)
ali
Using a VPN will protect your
access online and filter all
your Internet traffic through its
secure service.What is a VPN?
“You're able to access
web pages and Internet
services from all over the
world, even if you can’t
from your own country.”
“AVPN greatly improves
security for devices and when
you're using free Wi-Fi at cafés
and other such locations.”a
Protecting Yourself
How Can aVPN Improve
Windows Security?
We've emphasised the enhanced privacy that a VPN offers when you're connected toits services,
and the heightened levels of anonymity, but what security benefits does a VPN bring to a Windows
10 computer with an antivirus program already installed?
Security Beyond Anonymity
tesa good queston:howcan a VPN mprave Windows secu? Whilst the privacy side wal catered fo there are some god security enhancements ad
features a\PNbringstothetable,
Exolencnenund
Cybershost has protected you
from malicious content!
fonimawareito — ATMS ae ecomecionbet
NMED rir es
roads trough he YPN
teniteanbererovedor stopped the VPi befccc ere"
ahem itcomes to moble secur. Anyone wth
alte nowedeand some fe tol ia the ret can intercept public
IW network and ackyour connection, evesingalyour da AVPN wil
enenptthe data and protect you,
FREE
wotkng brad oryeuearerete
HLCaL ATR Te Og]
ToT
Ure
oerkd
A
XOOL®
Aa
Thessaly oF Sand Anais
VPN cients means tratyour eal
da we da storeconyourderce
jlo secue Mobile VPN ape ll
ethesame ees ofprotaton
aidsecuny, your data cant be
‘Stolen when youenatever nar
( How Can a VPN Improve Windows Security? oe
Er
fara ler secury
hee they actively black
wees Inert acs ea
asthey provider
four Fee aa
ebsites, However some
BRRIISEED to sorecounes data etrtin ve are quite aha
vith govermers and ther bodes bang able acess
yourdstalogforas longer youve been able to aces the tant A ood VPN
won eta ay kgs of your brosingandin mest aces wo'teven handover
ry pesoralinimation eatngta you toother agences.Top Ten VPNs
There's no shortage of programs that can encrypt files, folders and entire drives for Windows
10. Whilst some are very good indeed, others tend to fall by the wayside by not offering as good
asolution
Encryption Galore
Her aretenifrenteneryption toolsforyouta consider that work welth Windows 10, and some previous esos to, Some arr others cost but
Soeuigetescomoe
EEE Scccicommcmicacacns” ERS carn ccs
depen ooeoetrtneeae oc
‘ouniesand hundreds of sees pretcebrowing 2 locking a8
fexemers united wae andbandnidthardanan-fegeprnesyem. all seems sl priced an igh regard amongthe press andmecia. Net
a fora mere $575 er month aod £450.
loraeund 583 per month for wto he doce
css st
@® Noraven
Despite clout name, Hee My As VPNisconsideredtobeone
pion
\Withsuppr formule devices, 255 eA
nd sc05 01
cofthebetserees valle Aeng ith th valsecue 25.8
‘encryption connection you ge bliin span aces oer 30 cats
anorymousemal vse, a eo ray acces and fee extensions lr you
browser. fxpect to pay atound ES per month,
)_HIDEM ASS! ©
actions wordwie wth 75 plssere,
Pure is great cho forthe homer Teac ares ependingan he
cage but expect payin theragon $580 round £458).
"hese VPN worth checking the te pring,
> vpnQUINCE Wh united tes fl eval zenicevth
ami matare,adbocing and ant rack, Theses
2360 AES eneypton, vera thousand enersin 7D. pus cation, supper
uptofve devices at serves and app supporfor 5, dod and ions
Prone Pcingaresbuterpecttopay around $399 (appox. 7) perrnnth
FRUITEEDD reneh esnctne hint essed and aor vPR
serie, For $49 round 5 per month dependingon the
adage yougetacestofast sever unimited bandwith, ro ggg, 26
ES erenypten ad sopra up toe dierent dees
Tunnelea-VPN offers nna SONS per
month ne serve moingupto$399 (around
£775) peemonthforunlstacbanawishFrtieyou gt acces ta fete
across ent pe costes, 255 it deSenenypten and soporte indo,
105 Ando macOS ana brome ade,
Tunnel Dean
(_ Top Ten VPNs
GAUGE Ce eteintemet Access Pots
wath offectures thts
impress sence. 256-btevels of encntion, otafiloggngadtockng,
‘upper fore devs and aecesstb oer te thosand seers across erty
fvecourtries ts suprsingy cheap to, aust $595 (about #540 per meth
dependigon the package youcpt for
a privateinigmetaccoss™
\WpPNisan exceptional gpodseniee that oer acess to
Fastserve multiple device suppor, united bandwith
ard conection 6 DIAS eteypon and accesstocversevery global
locaton ard handed f srs The Premium package cots us £583 per
‘month for acne ya subecgion,butcheck real foray changes
vyprypn
MRTD) ces teisanineresingynamedvPNservce
mores features epectio see eleatedlevesof
encryption unesticts acess, an casjtouseimerace andunlimitea ac
You et2G8 per month free bt for SS round 5.16 youcan have
united acess and tacBw Protecting Yourself
Using a VPN for Added
Security and Privacy
We've covered how a VPN works, how it can improve your security and given you a top ten chart of
recommended providers but we've not looked at how you would set one up and what it’ like when
upand running.
CyberGhost
‘Wi'e ging to use Cyberchst asthe example VPN fr this tutorial Youlneed to purchase oneofthe avalablpackagesto begin vith, Premiumis3.74per
‘month white Premium Pluss 53
VPN nacton Stan by navigating men coaghosty
thePrcnglnkintheupper potion of hemo CybwrGoststeforyourregenat stun
yerGros lent sofware Clk Sovfleto dounload toyour
Downcodsfose,and passvordthatyousetp
nelogin isconfimed yout taenbockto them
avai optonsforthe ac
‘clentindow wherethe
E> Before you use the sen
7 Stings lnk
cans mutple opto forthe
eros wl wekthyour Pe
couple of things
peftheclent in
al speaking thedetauts efae
nnacingtotheCjerchoetVPNopen
es
la deta info
en based onjour Pade
using the county. yen atte a on
possberadue youtalintaThsietheknde
Using a\
1 CjbeGhsetchnt and
then he Chooee My Sener button nthe
hors your oun serverfomthe
rmrgt. Tisallovsyouta
Look trough heist an
rethe ing teaser
sere flowed cling be Con
ena anacer geese
personal dea : iOnline Protection
and Disaster
Recovery
While you can successfully protect yourself and your own computer, as
EOE rence nc hn gts
influence of many external factors. We look at how datais transmitted
from your computer to the Internet and how a canny hacker can
eres nag rieer eh a teiee ince”
Oa sees) ces tess
Eases ea ete etl crue aCe
even when you're out and about with your Windows 10 laptop and
Cueg eas
70 How Does Information Move Around 82 How to Secure Yourself
the Internet? ‘on WhatsApp
nen coer T Eee rect
Intercepted? mee)
eC eect et aed fools
Interception EOC er ees
oad Eee
7B__ Howto Secure Yourself on Facebook 97 How to Remove a Virus or Malware
ere es
How to Remove a Virus or Malware
omen eaeBw Online Protection and Disaster Recovery )
How Does Information Move
Around the Internet?
Before we get into online protection and disaster recovery, it's worth taking a moment to look at
how information moves around the Internet, in particular your information, Just how is data sent
from your PC across the Internet, to potentially fall into the hands of someone else?
Information Superhighway
‘Thelnteretisa huge, complex network of computers and s widely credited as humanity's greatest achievement ts esimated thatthe ntet houses
-somethingintheragion of 10 bytes of formation whichis quite alt,
That estate 10 bytes equates to an eye of pte ifmaton held by
fer sing connected device tat males up the rte, some hich your
inlormaion san mpossblerumberta vival, sno were ony ing abytes
teats of storagein mos of our devces More othe port hough, how on
ath does hat conectogther andhow doesitworkt
Tobe abet taremtallthatinfomatn,thedstathatnels around thelteret
'sinpadies Eacholhese paces coma heade and foo Theintrmaton
"red inthe header ar eotr contain the cea egardngte dia rsa
Foreramplefyousendanemaitoscmeen,sscon 3s youdickthe enduron
the dat wil Bewapped up in hetero foots, spt ito numerous paket
andsertonitsmery Way
hist that oud gal machin these way ego cal thes ple, he
realty gute eft. Tose pales can ae any rte posible og tthe
destination a: dred the ade areiota Tose oes doa acess ll
havetobethe same ete Some packtsmay vad fom on severtothenetia
[Link] ano Thesene atte oherend il se
theiforaton provide the header neces tocol theesage, orm
thedataandpresrttntheera recipient ayn which yourteneditt.
Rema the server at the other nd detects mising packs ican
request the miss intrmatio fom ts aula cennecrs. Ay
mseng data can Penbesent aan aterratve rue vpeatgthe
Inlomtionastgoesso other packets ilfnon thatthe preveus
rexel gating tough. The header ard foes he el the
‘enerthathedatapecets areal present andihat he shoud
look thee wl aie scoring,
tis happrsin lisconds. Tissoundsincresty comple
‘don apr tmaesthentemet gpa obe aslo umbating,
eet ening ith nce paces of a wy thats
how twodsbutiseed of tenga lambing, he erat
‘xmor acute the saves and cmp atached tit are
latamag da packets bythe milan eva score
Just as we\e san each computer onthe net connected
using an adds. These ae restr across the ret, 5 the
hese an foes in ech paket contain he adress the sender
and wert cata ishesingta. Tha ay, ot usta adam olcion
of dota roeling srs the eer n the hoe oflancingin thet le The
NS, Daman Name Sst, converts the ares to readable ras, such
‘ Googecom andthe ke, and back aga. That way when you enter the ema
‘creer someone zorevherecon the ONSzere= ill cane theinkrrtion
nde pockatssattotrerdeant destination,
‘The protocols used throughout the Inmet dele what the data beng
‘communicated actualy Forex IMP irteret Message Aces Poca
2 mal pete er accessing eral ona remot era, sch 36 accessing Gl
These pctocis Rap turer the vansssin of data tos mented Icaton,
rangi more acre ad tli te computer onthe ote nd whats rd
hot piece tgithetejgsan putt packets that wilberecied.
Essentally tsi how normation sent and rested sound the Ite
‘lacus, thee lat mere gong on nthe background than we\e mentioned
are. Te compleaty at youcan into when deangith datas que
‘sagging anda lite bomidenngat mes utes to say aos packs of data
‘contamination about something or someone and somewee othe ae
aa that cman information about ou, whee yeu are, what youe
‘dong. and ether persnal deta such as bank accounts, pasword aes,
and ates.
The Internet is regarded as the
greatest human achievement,
and it’s not difficult to see why