programming4us
programming4us
SECURITY

Implementing Security in Windows 7 : Understanding Windows 7 Security

- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019
Before getting to the details of securing your PC, it helps to take a step back and look at the security and privacy tools that Windows 7 makes available.

These tools include your user account password, Windows 7's User Account Control and Parental Controls features, the Windows Firewall, the Windows Defender programs, and the anti-phishing and anti-spam features of Internet Explorer and Windows Live Mail.

User Account Password

Windows 7 security begins with assigning a password to each user account on the computer. This prevents unauthorized users from accessing the system, and it enables you to lock your computer. See "Protect an Account with a Password" and "Lock Your Computer," later in this chapter.

User Account Control

User Account Control asks you to confirm certain actions that could conceivably harm your system. If you have an administrator account, you click Yes to continue; if you have a standard account, you must enter an administrator's user name and password to continue.



Parental Controls

If one or more children use your computer, you can use Windows 7's Parental Controls to protect those children from inadvertently running certain programs, playing unsuitable games, and using the computer at inappropriate times. See "Set Up Parental Controls," later in this chapter.



Windows Firewall

Because when your computer is connected to the Internet, it is possible for another person on the Internet to access your computer and infect it with a virus or cause other damage, Windows 7 comes with its Windows Firewall feature turned on. This prevents intruders from accessing your computer while you are online.



Windows Defender

Spyware is a software program that installs on your computer without your knowledge or consent. This program surreptitiously gathers data from your computer, steals your passwords, displays advertisements, and hijacks your Web browser. To prevent spyware from installing on your computer, Windows 7 includes the Windows Defender program.



Phishing

Phishing refers to e-mail messages or Web sites that appear to come from legitimate businesses and organizations, but actually come from a scam artist. The purpose of the message or site is to fool you into divulging personal or private data, such as passwords and credit card numbers. Internet Explorer and Windows Live Mail come with anti-phishing features to help prevent this.



Junk E-mail

Junk e-mail — or spam — refers to unsolicited, commercial e-mail messages that advertise anything from baldness cures to cheap printer cartridges. Many spams advertise deals that are simply fraudulent, and others feature such unsavory practices as linking to adult-oriented sites, and sites that install spyware. Windows Live Mail comes with a junk e-mail filter; see "Set the Junk E-mail Protection Level," later in this chapter.


Other  
  •  Programming COM+ Security (part 3) - Compiling and Installing the COM+ Application
  •  Programming COM+ Security (part 2) - Creating the Serviced Component, Specifying the COM+ Application Type
  •  Programming COM+ Security (part 1) - Creating the Serviced Component, Specifying the COM+ Application Type
  •  COM+ Security : COM+ Security Explained
  •  Password Hacks (Part 3) - Alternatives to passwords
  •  Password Hacks (Part 2) - Criminal activity
  •  Password Hacks (Part 1) - Stop Thieves Taking Data And Protect Yourself
  •  Programming .NET Security : Using the Code-Access Security Policy Tool (part 2) - Evaluating Security Policy
  •  Programming .NET Security : Using the Code-Access Security Policy Tool (part 1) - Administering Policy Levels
  •  Programming .NET Security : Extending the .NET Framework (part 2) - Using the AuthorMembershipCondition Membership Condition
  •  
    Top 10
    Free Mobile And Desktop Apps For Accessing Restricted Websites
    MASERATI QUATTROPORTE; DIESEL : Lure of Italian limos
    TOYOTA CAMRY 2; 2.5 : Camry now more comely
    KIA SORENTO 2.2CRDi : Fuel-sipping slugger
    How To Setup, Password Protect & Encrypt Wireless Internet Connection
    Emulate And Run iPad Apps On Windows, Mac OS X & Linux With iPadian
    Backup & Restore Game Progress From Any Game With SaveGameProgress
    Generate A Facebook Timeline Cover Using A Free App
    New App for Women ‘Remix’ Offers Fashion Advice & Style Tips
    SG50 Ferrari F12berlinetta : Prancing Horse for Lion City's 50th
    - Messages forwarded by Outlook rule go nowhere
    - Create and Deploy Windows 7 Image
    - How do I check to see if my exchange 2003 is an open relay? (not using a open relay tester tool online, but on the console)
    - Creating and using an unencrypted cookie in ASP.NET
    - Directories
    - Poor Performance on Sharepoint 2010 Server
    - SBS 2008 ~ The e-mail alias already exists...
    - Public to Private IP - DNS Changes
    - Send Email from Winform application
    - How to create a .mdb file from ms sql server database.......
    programming4us programming4us
    programming4us
     
     
    programming4us