4. Be Cautious of Bargains
Whenever you search for products online, you need to be wary of websites that you are not familiar with, do not have a relationship with, or do not trust. Even websites listed in Google search results or other search engines are not necessarily reliable. Service providers do not have the time to vet these sites for you.
In recent times, cybersecurity companies worldwide have made significant contributions to exposing many fraudulent sales advertisements.
Typically, online scammers place numerous links to their websites on search engines, accompanied by enticing promotions and discounts, hoping to lure as many people as possible to their sites. These links often direct users to websites containing forms requiring full details such as cardholder name, card number, expiration date, and CVV of the payment card. Once users provide all this information, they gain nothing but an error page, along with instructions to send money via mail. In reality, they lose access to their payment card and their money.
A similar type of scam has emerged known as phishing, where online fraudsters impersonate reputable companies and send emails to customers containing links that require them to input similar information as mentioned above. This approach has completely changed.
Therefore, users should always exercise caution and seek out trustworthy and well-known online shopping sites. Be careful with overly generous promotional offers.
5. Backing Up ‘System State’ in Windows 2000
The backup application in Windows 2000 (Start | Programs | Accessories | System Tools | Backup) features a “System State” backup option that allows users to quickly restore their systems in the event of a cyber attack.
This application typically backs up the following components: boot files, the COM+ class registration database, and the registry. If the PC is part of a domain, it will also back up the Active Directory (NTDS) and SYSVOL. If the system is a server, all data will be included in the backup.
Many disasters, including security breaches and other calamities, can be swiftly recovered from such backups. Additionally, backup programs often include scheduling features that are very convenient for users.
The best practice is to consistently back up your system to ensure effective protection and quick recovery.
6. Backing Up Windows Registry
The Windows Registry is a database that stores most of the configuration information for Windows. If there are issues with the Registry, it means that your operating system will also face problems. Therefore, to ensure safety, you should regularly back it up to prepare for situations where you may need to eliminate a virus that requires Registry intervention or restore the Registry.
To back up the Registry, follow these steps:
- Go to Start | Run, then type the command Regedit
- When the Windows Registry Editor window appears, click on the My Computer icon in the left pane.
- Go to File | Export, choose the folder where you want to save the Registry, check the “All” option instead of Selected Branch, then select Save.
- To restore the Registry, simply go to File | Import and point to your Registry backup file.
Online Security: 80 Defensive Steps for Internet Users – Part I