Protect your Windows system from MALWARE(Malicious Software)





Malwares are hidden softwares (usually installed by hackers) to gain access to your computers without you noticing them. They usually operate in the background to send information such as key logs, user passwords sensitive documents to someone who will later gain access your computer.

There are various forms of malicious software on the internet that can cause serious harm to your computer such as; computer viruses, Trojan horses, worms, ransomware, spyware, scareware and other malicious programs (you can find out about the different forms and how they attack on the internet, which we cannot cover on this blog)

There are different ways you can protect your system from Malware attacks. The easiest way is to buy a good internet security software. If you cannot afford a good internet security software to detect Malicious attacks, here are some steps you can take to protect your system.






  1. On your system, log in as the Administrator, go to Control Panel - Systems and Security - Administrative Tools - Computer Management as seen in the images below;























2. Under “Local Users and Groups”, click on “Users” and you will see all the user accounts available on the system with the description of the accounts. Create a new local user by right clicking on a empty space.









3. Create a username and password (Take note of the checkboxes so that the account will be enabled). Right click on the newly created account and go to properties. Click on the “Member Of” tab. Remove all memberships and leave Only “Users”.













4. There is an easier way to navigate to “Computer Management” which by typing the words on the search bar of the startup menu. It is the quickest way to access each application installed on your system.










  • By taking these few steps you can continue to login to your system using the newly created account. That way when any software wants to install itself, the system will prompt for administrator Username and Password and that way you can easily decline the process, therefore, saving your system from harmful applications.








NB: These steps explained above, do not guarantee a 100% protection but they provide and easy way to protect from obvious attacks. As new methods of protecting one’s computer are developed, attackers provide new methods of attacking systems. So the struggle is two ways 😊





Write a comment or send us a direct message for further information.




Like and share!!!  Thanks.



Comments

Popular posts from this blog

WHAT ARE THE ROLES OF A SOFTWARE TEST MANAGER

EVERY TESTING NEEDS A HUMAN TOUCH: WHY AUTOMATION ALONE IS NOT ENOUGH

The True Purpose of Testing - Artem Zakharchenko