Several Easy Steps to Secure Your Computer




About: Welcome! Please take some time to take a look at the instructables that I have made. Computer slow? Want to learn how to use Craigslist? Tired of knocking the water out of your ears after swimming? Want to m...

VERSION 2.0 will be out soon. You can see on the last step what I have in store for this instructable, please be patient as I sift through it all and get the process rolling.

In this Instructable I will show you a few tips to make your computer a lot more secure. The great thing about this guide is, everything you'll see is free! This can also benefit you in more ways than one. Each step is a separate way to secure your computer. These are all great steps and I hope that you take the time to read them. If you have any suggestions for new topics, feel free to leave a comment and I'll research it!

I update the Instructable pretty much every time someone leaves a suggestion in the comments. Please check back every now and then for something new and update your rating if you see fit. This Instructable will never be "closed" so express your interest and input!

One more thing: If you have a really old computer, and therefore a very small hard drive, do everything that does not involve installing a program first, and then try the programs if your machine is still unsecure.

Just a note: for the steps about Removing Spyware, Adware, Malware, Live internet Protection, etc. This is the program that I use that is free and seems to work great for me. I would suggest using these, but feel free to research into another program and let me know if you found a better one!

Please excuse if there are any steps under construction. If you have any suggestions that would help me, please leave a comment! I am working to get them published in the near future.

Teacher Notes

Teachers! Did you use this instructable in your classroom?
Add a Teacher Note to share how you incorporated it into your lesson.

Step 1: Priority Updates

Windows Updates..... We all hate them..... But they will save your computer someday!

No operating system [Windows, Linux, Apple] is always complete, or perfect. Hackers work to get through the operating systems every day, looking for vulnerabilities. Each week, and sometimes even on a daily basis, certain 'holes' in the Operating System must be repaired or updated, to prevent the hackers from breaking in.

Windows Update is one such service to the windows user. It is very, VERY, important to the security of your PC to either set your computer to automatic updates [recommended] or visit windows update, regularly.

As always,back up all your personal files [Documents, Pictures, etc] First!

Not only should you update your OS, but also your Internet Browser and Applications. There will often be many bug fixes and speed boosters that will come with an update of your programs, so check it out!

Step 2: Windows Security Center

Windows Security Center in Windows Vista puts all of your computer's security needs in one easy-to-find, easy-to-monitor location.

Windows Security Center helps make your PC more secure by alerting you when your security software is out of date or when your security settings should be strengthened. The Security Center displays your firewall settings and tells you whether your PC is set up to receive automatic software updates from Microsoft.

Other improvements over the version of Windows Security Center that debuted in Microsoft Windows XP SP2 include showing the status of software designed to protect against spyware, your Internet Explorer 7 security settings, and User Account Control. In addition, Windows Security Center can monitor security products from multiple companies and show you which are enabled and up to date.

Windows Security Center monitors the following security components for Windows Vista:


Windows Security Center monitors your system to see if you have a firewall installed, whether it's the Windows Firewall or a firewall product from another company. If there is an issue with your firewall, Windows Security Center notifies you and provides guidance to help you correct the problem.

Automatic updating

Windows Security Center verifies that the automatic updating feature is enabled and using recommended Microsoft settings. If automatic updating is not enabled, or if the settings differ from the recommended settings, you will receive an alert and instructions on enabling automatic updating.


Windows Security Center verifies whether your computer is running antivirus software. When you're using antivirus software, Windows Security Center monitors things such as real-time scanning and virus signatures. If real-time scanning is not enabled or if virus signatures are out of date, the Security Center will alert you and recommend a solution.

Antispyware and other malware protection

Windows Security Center verifies whether your computer is running Windows Defender or another company's antispyware software. When you're using both Windows Defender and third-party antispyware software, Windows Security Center monitors spyware definitions and other details. If scanning is not enabled or if spyware definition files are out of date, the Security Center will alert you and recommend a solution.

Internet security settings

Windows Security Center monitors the security settings that are associated with Internet Explorer 7 and alerts you whenever your computer might be at risk from settings that are lower than the recommended levels. Windows Security Center provides a button that you can use to restore settings automatically or access Control Panel, where you can correct settings manually.

User Account Control

To foster safer computing, the User Account Control service and policy must be enabled and uncorrupted. Window Security Center monitors the status of User Account Control and notifies you if User Account Control has been changed to a setting that's at odds with the recommended settings. You can restore User Account Control to the recommended settings with the click of a button.

For more information:

Here is where you can find it:
Control Panel
Security Center

Step 3: Firewall

Windows Firewall is a critical first line of defense to protect your computer against many types of malicious software.

Properly configured, it can stop many kinds of malware before they can infect your computer or other computers on your network. Windows Firewall, which comes with Windows Vista, is turned on by default and begins protecting your computer as soon as Windows starts. The Windows Firewall Control Panel is designed to be easy to use, with several configuration options and a simple interface.

More advanced than the Windows Firewall in previous versions of Windows, the firewall in Windows Vista helps protect you by restricting other operating system resources if they behave in unexpected ways-a common indicator of the presence of malware. For example, if a component of Windows that is designed to send network messages over a given port on your PC tries to send messages by way of a different port due to an attack, Windows Firewall can prevent that message from leaving your computer, thereby preventing the malware from spreading to other users.

Frequently Asked Questions for Firewalls

For more information:

Here is where you can find it:
Under Search Type in:
Windows Firewall


Control Panel
Windows Firewall

For those advance users, to find Advanced Security:
Under Search Type in:
Windows Firewall with Advanced Security

Step 4: Wireless Network

Use a router to share an Internet connection

Consider using a router (also called a residential gateway device) to share an Internet connection. These devices usually have built-in firewalls and other features that can help keep your network better protected against hackers.

Don't stay logged on as an administrator

When you are using programs that require Internet access, such as a web browser or an e-mail program, we recommend that you log on as a standard user rather than an administrator. That's because many viruses and worms can't be stored and run on your computer unless you're logged on as an administrator. Another point is to not stay logged on period whenever you are away from your computer for any length of time.

Use a network security key

If you have a wireless network, you should set up a network security key, which turns on encryption. With encryption, people can't connect to your network without the security key. Also, any information that is sent across your network is encrypted so that only computers that have the key to decrypt the information can read it. This can help avert attempts to access your network and files without your permission. Common wireless network encryption methods are Wi-Fi Protected Access (WPA) and WPA2.

Change the default administrator name and password on your router or access point

If you have a router or access point, you probably used a default name and password to set up the equipment. Most manufacturers use the same default name and password for all of their equipment, which someone could use to access your router or access point without you knowing it. To avoid that risk, change the default administrator user name and password for your router. Check the information that came with your device for instructions about how to change the name and password.

Change the default SSID

Routers and access points use a wireless network name known as a service set identifier (SSID). Most manufacturers use the same SSID for all of their routers and access points. We recommend that you change the default SSID to keep your wireless network from overlapping with other wireless networks that might be using the default SSID. It makes it easier for you to identify which wireless network is yours, if there is more than one nearby, because the SSID is typically shown in the list of available networks. Check the information that came with your device for instructions about how to change the default SSID.

Position your router or access point carefully

Wireless signals can transmit a few hundred feet, so the signal from your network could be broadcast outside of your home. You can help limit the area that your wireless signal reaches by positioning your router or access point close to the center of your home rather than near an outside wall or window.

For more information:

Step 5: Remove Background Programs (Task Manager)

You can use Task Manager to start programs, to start or to end processes, and to view a dynamic display of your computer's performance.
How to start Task Manager
To start Task Manager, take any of the following actions:

  • Press CTRL+ALT+DELETE, and then click Task Manager.
  • Right-click an empty area of the taskbar, and then click Task Manager.

Your computer has a lot of programs running that you may not even know about. This step will show you where to find everything going on in your computer and stop some of the junk ones that you never use. Follow along in the pictures and in the step to learn how to view what's running and end the ones you don't want.

Features and uses of Task Manager:

  • View Programs that are running
  • View Processes that are running
  • Performance measures

How to exit, switch to, or start a program
The Applications tab displays the status of the programs that are running on the computer. To exit, switch to, or start a program, follow these steps:

1. Click the Applications tab.
2. Do one of the following, as appropriate for the action that you want to perform:
  • Exit a program

To exit a program, click the program that you want to exit, and then click End Task.

Note When you exit a program in this manner, any unsaved data in that program is lost.

  • Switch to another program

To switch to another program, click the program that you want to switch to, and then click Switch To.

  • Start a program

To start a program, click New Task. In the Create New Task dialog box, click Browse, locate and select the program that you want to start, click Open, and then click OK.

Note This procedure is very similar to starting a program by using the Run command on the Start menu.

How to end a process
The Processes tab displays information about the processes that are running on the computer. A process can be an application that you start or subsystems and services that are managed by the operating system. To end a process, follow these steps.

Note Proceed with caution when you end a process. If you exit a program in this manner, data that has not been saved will be lost. If you end a system process, a system component may no longer function correctly. To match a process with a running program, right-click the program name on the Applications tab of Windows Task Manager, and then click Go To Process.

1. Click the Processes tab.
2. Do one of the following, depending on the action that you want to perform:
  • If you want to end a single process, click the process that you want to end, and then click End Process.
  • If you want to end a process and all processes directly or indirectly related to it, right-click the process that you want to end, and then click End Process Tree.

How to monitor your computer's performance
Click the Performance tab to view a dynamic overview of the performance of your computer. This includes the following measures:

  • Graphs for CPU and memory usage
  • The total number of handles, threads, and processes that are running

Handles are unique identifiers that allow a program to access system resources such as files, registry keys, fonts, and bitmaps. Threads are objects within processes that run program instructions.
  • The total number of kilobytes (KB) that are used for physical, kernel, and commit memory

Step 6: Remove Startup Tasks (System Configuration)

In Windows Vista, all of Windows' essential programs are loaded through something called "Windows Services." This means that most of the startup items you see in Vista are completely optional and can be turned off. However, a good rule of thumb is to disable only those programs that you recognize and don't need to have running all the time. When in doubt, leave it on. Or, better still, check out Paul Collins' huge "Startup Applications" list at This list of over 13,000 startup items you may encounter in MSCONFIG tells you which items are absolutely necessary, which items are optional, and which items you should definitely uncheck.

Here is where you can find it:
Start Menu
Select "Run" on the right hand side
In Dialog Box, type in: msconfig
Click OK
In dialog box, go to the "Startup" tab
Uncheck the programs you don't want to run at start up.

Step 7: Advanced SystemCare Free

Slow down, freeze, crash, and security threats are over. Advanced SystemCare Free is a comprehensive PC care utility that takes a one-click approach to help protect, repair, and optimize your computer. It provides an all-in-one and super convenient solution for PC maintenance and protection. All work will be done with 1 click and 1 minute. Compared with its nearest competitor, Advanced SystemCare Free provides the more essential and practical formula for Windows: Removing Spyware and Adware, Preventing Security Threats, Privacy Protection, Fixing Registry Errors, Temporary Files Cleanup, Startup Cleanup, Repairing Windows, Speeding up System and 1-click Mechanism.

This utility offers a one-stop-shop for cleaning and maintaining your computer for better overall system performance. The interface is very simple, featuring only a few buttons, which makes it easy to get down to cleaning immediately (in fact, it automatically runs on start-up) and doesn't confuse you with multiple steps.

The Maintain Windows section focuses on four areas of maintenance: spyware removal, Registry cleaning, a privacy sweep, and deletion of junk files. The Diagnose System button provides system optimization tools, detects spyware, defragments your disk, and scans for hijacked Windows settings. In our tests the scan and clean for each of these areas took less than 10 minutes to complete. In many of these scans, it is difficult to tell what exactly is being accomplished by some of the tools, but we were able to test against other trusted apps, which confirmed Advanced SystemCare's efficacy in those areas.

Under the utilities section you are given several tools, which are similar to plug-ins, for other areas of optimization and diagnostic tests. Overall, Advanced SystemCare Free is a good way to maintain your system's speed and clear out junk files, but you'll need to remember to run it regularly because scheduling of scans is only available in the paid Pro version.

Advanced SystemCare Free Home Page
Download Advanced SystemCare Free

Step 8: Web Browser: Firefox

What makes Firefox different? Most importantly, we're open. That means anyone around the world (and we have thousands of experts watching our back) is able to look into our code and find any potential weak spots in our armor.

And when we hear about a problem, we roll up our sleeves and get to work fixing it right away. It's in your best interest (and ours) to take care of the issue, even if it means admitting we're a little less than perfect.

Simply put, your security is our top priority.

There's a Method to Our Madness.

Nobody loves the Internet more than we do. But, scammers, spammers and trigger-happy viruses are true threats, so you need to protect yourself while using the Web.
That's Where Firefox Comes In.

Using it is the safest way to surf the web because:

  • We don't try to tackle the problem alone. An international community of security experts is working around the clock to make your web browsing safer (thanks to our open source way of doing things). It's like having your neighborhood watch led by a group of highly trained ninjas.
  • We consider your security every step of the way. Security experts work right from the start to identify and address potential problems before a single line of code is written.
  • We stay on top of the issue. We're constantly monitoring threats and releasing new Firefox updates to stay one step ahead. Operating in an open source world means anyone can help us find and fix our weak spots.

Firefox Home Page

Step 9: Avast! Home Edition Antivirus

avast! antivirus Home Edition is FREE to use but it is necessary to register before the end of the initial 60 day trial period. Following the registration you will receive by e-mail a license key valid for a period of 1 year. After you have downloaded and installed the program, the license key must be inserted into it within 60 days. The registration process is very easy, and it will take you only a couple of minutes.

Anti-spyware built-in
Web Shield
Anti-rootkit built-in
Automatic updates
Strong self-protection
Virus Chest
Antivirus kernel
System integration
Simple User Interface
Integrated Virus Cleaner
Resident protection
Support for 64-bit Windows
P2P and IM Shields
Network Shield

Register Page

Information Page

Download Page

** Just a note, this really does help! I was looking for a good icon on google, clicked on an image, and this program popped up warning me that there was a virus on that page! With everything going on today, you really need protection.

Step 10: Remove Spyware (Spybot Search and Destroy)

Another tool is Spybot - Search & Destroy. This works a lot like Adware, but having both will further protect your computer.

It detects and removes spyware, a relatively new kind of threat not yet covered by common anti-virus applications. Spyware silently tracks your surfing behaviour to create a marketing profile for you that is transmitted without your knowledge to the compilers and sold to advertising companies. If you see new toolbars in your Internet Explorer that you haven't intentionally installed, if your browser crashes inexplicably, or if your home page has been "hijacked" (or changed without your knowledge), your computer is most probably infected with spyware. Even if you don't see the symptoms, your computer may be infected, because more and more spyware is emerging. Spybot-S&D is free, so there's no harm giving it a try to see if something has invaded your computer.

To see a list of threats Spybot-S&D can remove, in the navigation bar at the left click on Support --> Threats. For an introduction to Spybot-S&D, please read the tutorial. If you fear incompatibility with other software you are now using, although we can assure you that there is no danger you can review our compatibility overview which lists some software whose compatibility has been analyzed.

Spybot-S&D can also clean usage tracks, an interesting function if you share your computer with other users and don't want them to see what you have been working on. And for professional users, Spybot-S&D allows you to fix some registry inconsistencies and extended reports. A list of all the application's features is also available.

Spybot S&D Home Page

Download Spybot Search and Destroy Link

Tutorial on how to use Spybot

Step 11: Remove Adware (Ad-Ware SE Personal 2008)

Another great tool is Ad-Ware SE Personal 2008. They currently give you a free version that I have used for years now and it has worked great. Run it at least once a month!

It is important that you use up-to-date security software to detect and remove malicious programs. Virus programs can slow down your PC and cause unwanted behavior, even damage to your data.

Spyware tracks your movements on the Web for advertising purposes, but can affect your PC's performance as well. Use anti-spyware programs to remove it.

Adware SE Personal Download

Step 12: Live Protection for Online Browsing: Windows Defender

Windows Defender detects and removes spyware

Windows Defender is software that helps protect your computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software by detecting and removing known spyware from your computer. Windows Defender features Real-Time Protection, a monitoring system that recommends actions against spyware when it's detected, minimizes interruptions, and helps you stay productive.

The benefits of installing Windows Defender include:

Spyware detection and removal

  • Windows Defender quickly and easily finds spyware and other unwanted programs that can slow down your computer, display annoying pop-up ads, change Internet settings, or use your private information without your consent.
  • Windows Defender eliminates detected spyware easily at your direction, and if you inadvertently remove programs that you actually want, it's easy to get them back.
  • Windows Defender allows you to schedule your scanning and removal times when it's convenient for you, whether it's on-demand or on a schedule that you set.

Improved Internet browsing safety

  • Windows Defender helps stop spyware before it infiltrates your computer. Windows Defender also offers a continuous safeguard designed to target all the ways that spyware can infiltrate your computer.
  • Windows Defender works without distracting you. It runs in the background and automatically handles spyware based on preferences that you set. You can use your computer with minimal interruption.

Protection against the latest threats

  • A dedicated team of Microsoft researchers continuously searches the Internet to discover new spyware and develop methods to counteract it.
  • A voluntary, worldwide network of Windows Defender users helps Microsoft determine which suspicious programs to classify as spyware. Participants help discover new threats quickly and notify Microsoft analysts, so that everyone is better protected. Anyone who uses Windows Defender can join this network and help report potential spyware to Microsoft.
  • To help protect your computer from the latest threats, you can choose to have updates that counteract new spyware automatically downloaded to your computer.

Windows Defender is included with all versions of Windows Vista and is available to download for genuine copies of Windows XP Service Pack 2 or later, or Windows Server 2003 Service Pack 1 or later.

Learn more about Windows Defender and other Microsoft anti-malware solutions, and to learn more using Windows Defender, watch this demo.


Download Windows Defender

Check to see if you already have it, if so turn it on!

You can find it here:
Control Panel
Windows Defender

Have any questions on the program? Click here: Windows Defender: Support

Step 13: Malwarebytes' Anti-Malware

Give a general description of the StepHave you ever considered what makes an anti-malware application effective? We at Malwarebytes have created an easy-to-use, simple, and effective anti-malware application. Whether you know it or not your computer is always at risk of becoming infected with viruses, worms, trojans, rootkits, dialers, spyware, and malware that are constantly evolving and becoming harder to detect and remove. Only the most sophisticated anti-malware techniques can detect and remove these malicious programs from your computer.

Malwarebytes' Anti-Malware is considered to be the next step in the detection and removal of malware. In our product we have compiled a number of new technologies that are designed to quickly detect, destroy, and prevent malware. Malwarebytes' Anti-Malware can detect and remove malware that even the most well known anti-virus and anti-malware applications fail to detect. Malwarebytes' Anti-Malware monitors every process and stops malicious processes before they even start. The Realtime Protection Module uses our advanced heuristic scanning technology which monitors your system to keep it safe and secure. In addition, we have implemented a threats center which will allow you to keep up to date with the latest malware threats.

Key Features

  • Support for Windows 2000, XP, and Vista (32-bit only).
  • Light speed quick scanning.
  • Ability to perform full scans for all drives.
  • Malwarebytes' Anti-Malware Protection Module. (requires registration)
  • Database updates released daily.
  • Quarantine to hold threats and restore them at your convenience.
  • Ignore list for both the scanner and Protection Module.
  • Settings to enhance your Malwarebytes' Anti-Malware performance.
  • A small list of extra utilities to help remove malware manually.
  • Multi-lingual support.
  • Works together with other anti-malware utilities.
  • Command line support for quick scanning.
  • Context menu integration to scan files on demand.

*Really, this is just a complete scanner, no real time protection.

Information Page

Download Page

Step 14: Malicious Software Removal Tool

The Microsoft Windows Malicious Software Removal Tool checks computers running Windows Vista, Windows XP, Windows 2000, and Windows Server 2003 for infections by specific, prevalent malicious software including Blaster, Sasser, and Mydoom and helps remove any infection found. When the detection and removal process is complete, the tool displays a report describing the outcome, including which, if any, malicious software was detected and removed.

Microsoft releases an updated version of this tool on the second Tuesday of each month, and as needed to respond to security incidents. The tool is available from Microsoft Update, Windows Update and the Microsoft Download Center.

Note The version of the tool delivered by Microsoft Update and Windows Update runs in the background and then reports if an infection is found. If you would like to run this tool more than once a month, use the version on this Web page or install the version that is available in the Download Center.

Because computers can appear to function normally when infected, Microsoft advises you to run this tool even if your computer seems to be fine. You should also use up-to-date antivirus software to help protect your computer from other malicious software.

Download Malicious Software Removal

Help and Support for Malicious Software Removal Tool

Click here for the main page, make sure you download the newest version!

NOTE: This is not a program that you keep, it's more of a one time thing, so you'll need to either save the .exe file to a safe place or download it more than once. You'll also find that many of the antivirus and antispyware programs have this built in.

Step 15: Full System Recovery

Make it new again!

On some systems it is possible to do a Full System Recovery. In some cases, this requires Recovery CD's, which came with your computer, or are freely available from the manufacturer. Many of the newer systems have the recovery information stored on the machine and it simply requires a key pressed during boot up.

Back up all your personal files [Documents, Pictures, etc] First!

  • HP & Compaq computers
  • Dell computers
  • EMachine computers
  • Gateway computers
  • IBM & Lenovo computers
  • Acer Computers
  • Asus computers
  • Toshiba computers

Quick reference guide to enter restore menu for various PC
Make ....................... Key(s) ....................... Notes
Acer ......................... Alt+F10 .................... During Boot
Asus ........................ F9 ............................. During Boot, after logo appears
Dell ......................... Ctrl+F11 ................... During Boot, after logo appears
Gateway ................. F11 or R ................... During Boot
HP/Compaq .......... F10 ........................... During Boot, after logo appears
IBM/Lenovo ............ F11 ........................... During Boot
Packard Bell .......... F11 ........................... During Boot, after logo Appears
Sony Vaio ............... F10 ........................... During Boot, after logo Appears
Toshiba .................. 0 (zero) .................... Press and hold before powering up

If this doesn't work, you may want to format your computer completely and start over.

Step 16: Macintosh

Step 17: Several Easy Steps to Boost Your Computer's Speed

In this Instructable I will show you a few tips to make your computer run a lot faster. The great thing about this guide is, everything you'll see is free! This can also benefit you in more ways than one. Each step is a separate way to clean up your computer. These are all great steps and I hope that you take the time to read them. If you have any suggestions for new topics, feel free to leave a comment and I'll research it!

PLEASE don't be scared by the amount of steps or excessive wording in the Instructable. Each step is one way. For example: All step 1 is saying is to dust your computer. I am just putting more information on it for those who are wondering why it works. This seems like a lot to do, but is actually not that much. A lot of the steps at the end may not even apply to you.

I update the Instructable pretty much every time someone leaves a suggestion in the comments, as you can note with Spybot S&D and Virtual Memory. Please check back every now and then for something new and update your rating if you see fit. This Instructable will never be "closed" so express your interest and input!

One more thing: If you have a really old computer, and therefore a very small hard drive, do everything that does not involve installing a program first, and then try the programs if your machine is still sluggish.

Just a note: for the steps about Removing Spyware, Adware, Malware, Live internet Protection, Ram Booster, and a Registry Cleaner; this is the program that I use that is free and seems to work great for me. I would suggest using these, but feel free to research into another program and let me know if you found a better one!

Please excuse if there are any steps under construction. If you have any suggestions that would help me, please leave a comment! I am working to get them published in the near future.

Several Easy Steps to Boost Your Computer's Speed

Step 18: How Often You Should Use These Steps

Step 1: I would check for updates about every day, or set it to notify you whenever there is one. Constantly update your OS!

Step 2: This is a one time setting, check on it every once in a while to make sure nothing has been changed.

Step 3: This is a one time setting, check on it every once in a while to make sure nothing has been changed. Always have it running!

Step 4: This is a one time thing, check on it every once in a while to make sure nothing has been changed.

Step 5: Check on it whenever you feel necessary.

Step 6: Check on it whenever you install a new program, or once a month to make sure nothing has changed

Step 7: I would run this every day for slow computers, and about every 3 days for fast computers.

Step 8: One time download, use it for your internet browser. Be sure to keep it up to date and adjust your security settings!

Step 9: Run once a week to keep up to date and protected. Have the live protection constantly running.

Step 10: Run once a week to keep up to date and protected.

Step 11: Run once a week to keep up to date and protected.

Step 12: Run once a week to keep up to date and protected.

Step 13: Run once a week to keep up to date and protected.

Step 14: Run once every few weeks to keep up to date and protected.

Step 19: Wrap Up

Because of this Instructable, your computer will now be DRAMATICALLY safer! Thanks for reading, please rate and comment, and enjoy your much more secure computer!

If you have any suggestions for new topics, feel free to leave a comment and I'll research it!

A repeat from my introduction, but please, check back every now and then for something new and update your rating if you see fit. This Instructable will never be "closed" so express your interest and input! Also, if you feel that I need to give more information, or that my information is wrong on any of these steps, also let me know. I am trying to make this Instructable the best it can be!

Thanks, and click here for my other great instructables: lukethebook333's Instructables

If you want to get a notification each time I add a step or edit this instructable, feel free to subscribe to me!

Step 20: UNDER CONSTRUCTION: More Details...

Ultimate Guide

Recommended Software:

Zone Alarm Free Firewall

AVG Anti-Virus Free

Secunsia PSI


Mcaffe Site Advisor:

Mcaffe Stinger

Combo Fix

PC Health Optimizer Free Edition,71557-order,4/description.html

Comodo Firewall,63762-order,4/description.html

AVG Anti-Rootkit,65198-order,4/description.html

HouseCall (32-bit version),22919-order,4/description.html

Avira AntiVir Personal Antivirus

Notes from Symantec:
You may think an email is harmless - until you open it and it's not. Scan emails before you open them, and take extra caution when launching executable (.exe) files attached to an email. Like don't do it. Never open attachments in email from unknown senders and never reply to spam.

Notes from Symantec:
Take your passwords to the gym. The stronger your passwords, the more likely they'll fend off devious intruders who are looking for weaklings they can bully. Passwords should have at least eight characters and should combine alphanumeric and special characters ($, *, &, etc.). You should also change your passwords every 45-60 days.

Notes from Symantec:
Physical security counts. True, most PC security threats are virtual, but problems can also begin in the real world. If your computer is open to snoopers, try a screen-locking feature, or just shut your system down. If you've got a laptop, lock it down with a cable. And whatever you do, don't leave your passwords written down where someone can easily read them. There are a number of routine things users can do to bolster security. These include: using the screen-locking feature when away from the computer, shutting the computer off when done for the day, locking laptops with a cable, not leaving passwords written down, and being extra mindful of physical security of PDAs and handheld devices, which are popular targets for thieves.

Be the First to Share


    • Made with Math Contest

      Made with Math Contest
    • Multi-Discipline Contest

      Multi-Discipline Contest
    • Robotics Contest

      Robotics Contest

    27 Discussions


    8 years ago on Step 4

    There are programs that will break 128bit network security keys. Keep a look out on your network and if u see computers that yoou do not know then set up MAC Address filtering to only allow the computers you know to access your network. I had a neighbor that would bug on to my wireless network to do his uploading. i set up WEP keys and it took him less than an hour to get the key, log on and start uploading again. I set up MAC Address filtering and it's been 2 weeks an he hasn't been able to get on.

    1 reply

    Reply 7 years ago on Introduction

    MAC filtering can b bypased too, it takes to see you connected and then he disconnects you and spuff ur MAC and start the dictionary/rainbow table attack again, if u wanna keep som1 out u need a SSID randmoly generated that has a maxlenght of 32 characters and your PSK key from WEP2 (only) of 63 characters long, both shud be random letters and numbers.

    Example :
    SSID: SEuB2ScDk9VMPhEuoBXTp8bdSinLnPZs
    PSK : nWIz0u45bccqyI9aXsu464jKVAm6LTXSGwnZl8adEjGF7v7eHeQawyL1ELx3Y8z

    This will make all dicitonsry and rainbowtables useless. WEP2 use the SSID to 'salt' the key, and thats why u need to change it to somthig new and unique.
    For paranoid ppl they cann add a internal VPN for more security :D.


    8 years ago on Step 16

    I have an idea. This is not advertising, you should put this in there. Sophos, who usually makes mac and window anti-virus for windows also makes a FREE home edition Mac anti-virus that is absolutely amazing!!!!!! It targets the threat, and all you have to click is remove and it's gone! Literally, its that simple and it only takes a few easy steps to install (run the .dmg, install, put your computer's password, click install and done). And, this program doesn't take up much window space. It doesn't cloud your desktop with useless windows full of useless information, because the icon is just a tiny black shield in your menu bar. SERIOUSLY MENTION THIS TO PEOPLE.

    And as an added bonus to the anti-virus, Sophos also has their "NakedSecurity" blog where they post everyday about up-and-coming new viruses, and they also have a facebook page (not sure about twitter)...


    9 years ago on Introduction

    In light of the recent email database theft, the person responsible for IT at Instructables should read this.

    What Kind of people just sit around and cause havoc for others god go get a job and stop hacking others computers


    10 years ago on Step 1

    With mac... for hackers its like trying to run across rapids to make a virus that will REALLY effect macs but the ways that you can hack it is like stepping on a stone in the rapids

    5 replies

    I dont use macs actually (only once at my friends house for a week) and I had to do EVERYTHING on them and personally... i hate them, I just love keynote and iTunes vs powerpoint and windows media player

    first of all..when apple made a contest to see who can hack into one of their took one hacker 20 mins to crack into it. he said "it was easy to crack cause it is a least windows updates its self every once and a while." and second Apple says that it doesnt need any type of anti-virus program, but if you look at your computer you can find a anti-virus program already installed into it.

    well... the "anti-virus program" pre installed on macs is Unix, macs are unix based, not DOS based like windows and linux is also Unix based, its not an antivirus and newer macs (tiger and leopard) are ideal for businesses and for game designers, I personally enjoy macs for making presentations


    Reply 10 years ago on Step 16

    Sorry about that, I was just looking into options available for mac computers, but so far I've been rather busy. It's mainly up here to see if anyone has ideas.


    10 years ago on Step 8

    I've done some research on various web browsers recently and have found out that Google Chrome is actually in the top spot when it comes to browser security. A team of hackers went through the big name browsers such as IE, FF, Chrome, Opera etc. and Chrome ended up being the only one to last through the entire test. One feature with Chrome that I really enjoy is it's sandbox feature. Every tab is it's own process so when one tab goes down it doesn't take your entire browser down. Hope this helps.

    3 replies

    Reply 10 years ago on Introduction

    Unfortunately I do not... I didn't get the chance to read that in depth about the tests themselves but tonight when I've got some free time I'd be happy to do a little research and let ya know what I find.


    Reply 10 years ago on Introduction

    What makes it secure currently is it's minuscule market share. As more and more people start to use it, more and more security bugs will be discovered.


    10 years ago on Introduction

    You nailed the anti virus things. may I reccommend Ccleaner. It cleans out your pc every now and then. Also try comodo firewall protection. It stops any program from accessing the internet without your permission!

    1 reply