{"id":56,"date":"2009-10-29T15:26:06","date_gmt":"2009-10-29T09:56:06","guid":{"rendered":"http:\/\/ivyproschool.com\/blog\/?p=56"},"modified":"2024-11-09T16:37:04","modified_gmt":"2024-11-09T11:07:04","slug":"thinking-about-securing-your-home-computer","status":"publish","type":"post","link":"https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/","title":{"rendered":"THINKING ABOUT SECURING YOUR HOME COMPUTER?"},"content":{"rendered":"<p>Before diving into the tasks you need to secure your home computer, let\u2019s first think about the problem by relating it to something you already know how to do. In this way, you can apply your experience to this new area.<\/p>\n<p>So, think of your computer as you would your house, your apartment, or your condo. What do you know about how that living space works, what do you routinely do to keep it secure, and what have you installed to improve its security? (We\u2019ll use this \u201ccomputer-is-like-a-house-and-the-things-in-it\u201d analogy throughout, departing only a few times to make a point.)<\/p>\n<p>For example, you know that if you have a loud conversation, folks outside your space can probably hear you. You also routinely lock the doors and close the windows when you leave, and you don\u2019t give the keys to just anyone. Some of you may install a security system to complement your practices. All of these are part of living in your home.<\/p>\n<p>Let\u2019s now apply similar thinking to your home computer. Email, <a href=\"http:\/\/www.cert.org\/homeusers\/HomeComputerSecurity\/glossary.html#instantmessaging\" target=\"new\" rel=\"noopener noreferrer\"><strong><em>instant messaging<\/em><\/strong><\/a>, and most web traffic go across the Internet <em>in the clear<\/em>; that is, anyone who can capture that information can read it. These are <em>things you ought to know<\/em>. You should always select and use strong passwords and exercise due care when reading all email, especially the unsolicited variety. <em>These are things you ought to do<\/em>. Finally, you can add a <a href=\"http:\/\/www.cert.org\/homeusers\/HomeComputerSecurity\/glossary.html#firewall\" target=\"new\" rel=\"noopener noreferrer\"><strong><em>firewall<\/em><\/strong><\/a>, an anti-virus program, <a href=\"http:\/\/www.cert.org\/homeusers\/HomeComputerSecurity\/glossary.html#patch\" target=\"new\" rel=\"noopener noreferrer\"><strong><em>patches<\/em><\/strong><\/a>, and file encryption to improve the level of security on your home computer, and we\u2019ll call these <em>things you ought to install<\/em>.<\/p>\n<p>Source:\u00a0 <a href=\"http:\/\/www.cert.org\/\">www.cert.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Before diving into the tasks you need to secure your home computer, let\u2019s first think about the problem by relating it to something you already know how to do. In this way, you can apply your experience to this new area. So, think of your computer as you would your house, your apartment, or your condo. What do you know about how that living space works, what do you routinely do to keep it secure, and what have you installed to improve its security? (We\u2019ll use this \u201ccomputer-is-like-a-house-and-the-things-in-it\u201d analogy throughout, departing only a few times to make a point.) For example, you know that if you have a loud conversation, folks outside your space can probably hear you. You also routinely lock the doors and close the windows when you leave, and you don\u2019t give the keys to just anyone. Some of you may install a security system to complement your practices. All of these are part of living in your home. Let\u2019s now apply similar thinking to your home computer. Email, instant messaging, and most web traffic go across the Internet in the clear; that is, anyone who can capture that information can read it. These are things you [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-56","post","type-post","status-publish","format-standard","hentry","category-it-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Essential Tips for Securing Your Home Computer<\/title>\n<meta name=\"description\" content=\"Protect your computer like your home\u2014learn key steps to secure your data with strong passwords, firewalls, and encryption.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Essential Tips for Securing Your Home Computer\" \/>\n<meta property=\"og:description\" content=\"Protect your computer like your home\u2014learn key steps to secure your data with strong passwords, firewalls, and encryption.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/\" \/>\n<meta property=\"og:site_name\" content=\"R vs Python: Which Analytics Tool Should You Choose for Data Science?\" \/>\n<meta property=\"article:published_time\" content=\"2009-10-29T09:56:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-09T11:07:04+00:00\" \/>\n<meta name=\"author\" content=\"Spam Prats\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Spam Prats\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/thinking-about-securing-your-home-computer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/thinking-about-securing-your-home-computer\\\/\"},\"author\":{\"name\":\"Spam Prats\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\"},\"headline\":\"THINKING ABOUT SECURING YOUR HOME COMPUTER?\",\"datePublished\":\"2009-10-29T09:56:06+00:00\",\"dateModified\":\"2024-11-09T11:07:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/thinking-about-securing-your-home-computer\\\/\"},\"wordCount\":277,\"commentCount\":0,\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/thinking-about-securing-your-home-computer\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/thinking-about-securing-your-home-computer\\\/\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/thinking-about-securing-your-home-computer\\\/\",\"name\":\"Essential Tips for Securing Your Home Computer\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\"},\"datePublished\":\"2009-10-29T09:56:06+00:00\",\"dateModified\":\"2024-11-09T11:07:04+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\"},\"description\":\"Protect your computer like your home\u2014learn key steps to secure your data with strong passwords, firewalls, and encryption.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/thinking-about-securing-your-home-computer\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/thinking-about-securing-your-home-computer\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/thinking-about-securing-your-home-computer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"THINKING ABOUT SECURING YOUR HOME COMPUTER?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\",\"name\":\"Ivy Professional School | Official Blog\",\"description\":\"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/01d3469a45250acdf099bb1467ef3498\",\"name\":\"Spam Prats\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g\",\"caption\":\"Spam Prats\"},\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/author\\\/admin-2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Essential Tips for Securing Your Home Computer","description":"Protect your computer like your home\u2014learn key steps to secure your data with strong passwords, firewalls, and encryption.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/","og_locale":"en_US","og_type":"article","og_title":"Essential Tips for Securing Your Home Computer","og_description":"Protect your computer like your home\u2014learn key steps to secure your data with strong passwords, firewalls, and encryption.","og_url":"https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/","og_site_name":"R vs Python: Which Analytics Tool Should You Choose for Data Science?","article_published_time":"2009-10-29T09:56:06+00:00","article_modified_time":"2024-11-09T11:07:04+00:00","author":"Spam Prats","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Spam Prats","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/#article","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/"},"author":{"name":"Spam Prats","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498"},"headline":"THINKING ABOUT SECURING YOUR HOME COMPUTER?","datePublished":"2009-10-29T09:56:06+00:00","dateModified":"2024-11-09T11:07:04+00:00","mainEntityOfPage":{"@id":"https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/"},"wordCount":277,"commentCount":0,"articleSection":["IT Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/","url":"https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/","name":"Essential Tips for Securing Your Home Computer","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/#website"},"datePublished":"2009-10-29T09:56:06+00:00","dateModified":"2024-11-09T11:07:04+00:00","author":{"@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498"},"description":"Protect your computer like your home\u2014learn key steps to secure your data with strong passwords, firewalls, and encryption.","breadcrumb":{"@id":"https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ivyproschool.com\/blog\/thinking-about-securing-your-home-computer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ivyproschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"THINKING ABOUT SECURING YOUR HOME COMPUTER?"}]},{"@type":"WebSite","@id":"https:\/\/ivyproschool.com\/blog\/#website","url":"https:\/\/ivyproschool.com\/blog\/","name":"Ivy Professional School | Official Blog","description":"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ivyproschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/01d3469a45250acdf099bb1467ef3498","name":"Spam Prats","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d0af2e055007729b2006caa5ad5294a2ff77cf96b351e86845763a70a8c0fed2?s=96&d=mm&r=g","caption":"Spam Prats"},"url":"https:\/\/ivyproschool.com\/blog\/author\/admin-2\/"}]}},"_links":{"self":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/56","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/comments?post=56"}],"version-history":[{"count":1,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/56\/revisions"}],"predecessor-version":[{"id":12491,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/56\/revisions\/12491"}],"wp:attachment":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/media?parent=56"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/categories?post=56"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/tags?post=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}