To setup your computer safely Read the Vendor document carefully and follow the guidelines

Why do you need to secure your Desktop?

A personal computer used without proper security measure could lead to exploiting the system for illegal activities using the resources of such in secured computers. These exploiters could be Virus, Trojans, Key loggers and sometimes real hackers. This may result in data theft, data loss, personal information disclosure, stealing of credentials like passwords etc. So, protect and secure your Personal Computer before it is compromised.

"The olden phrase is always golden... Prevention is Better than Cure."

Things to remember ….while using your personal computer

  • Always install Licensed Software so that you have regular updates of your Operating system and Applications. In case of open source software, make sure to update frequently.
  • Read the “Terms and Conditions” / “License Agreement” provided by vendor/software before installation.
  • Properly shutdown and switch off your personal computer after the use along with your external devices like Monitor, Modem, Speakers etc

Do You Know?

82 % of Home Users experienced at least one security threat during 2011

Software Installation

  • Installation of Operating System
  • Get proper Licensed Operating System and read License agreement carefully before installing the OS.
  • Switch on your personal computer and go to BIOS Settings and change your first boot drive to CD Drive.
  • Insert your CD/DVD into the CD drive and restart your system using Ctrl+Alt+Delete.
  • After restart, the system boots from the CD/DVD.Follow the installation steps as specified by the vendor document.
  • Use the CD provided by the Vendor to install your
  • Motherboard drivers
  • Monitor drivers
  • Audio & Video drivers
  • Network drivers


Physical Security

  • Regularly clean your system and it’s components.
  • Note: Turn your PC Off before cleaning it.
  • Properly organize the power cables, wires, to prevent from water, insects etc.
  • While working at PC, be careful not to spill water or food items on it.
  • Always follow “Safely Remove” option provided by the Operating System while disconnecting the USB devices.
  • By setting BIOS password, you can prevent unauthorized access to your personal computer.
  • Switch off the computer when it’s not in use.
  • Note: To setup BIOS password refers “Setting password to BIOS” section.

Internet Security:

  • Follow Internet Ethics while browsing.
  • Check the copyright issues before using the content of Internet.
  • Always access the site which uses https (Hyper Text Transfer Protocol Secure) while performing Online transactions, Downloads etc, which is secure.
  • If the site uses SSL, verify the Certificate details like Who is the owner, Expiry date of the certificate etc to confirm whether it is trusted or not.
  • You can do this by clicking the lock icon.
  • Use only Original Websites for downloading the files rather than Third Party websites.
  • Scan the downloaded files with an updated Anti-Virus Software before using it.
  • Install and properly configure a Software firewall, to protect against malicious traffic.

Data Security

  • Enable Auto-updates of your Operating System and update it regularly.
  • Download Anti-Virus Software from a Trusted Website and Install. Make sure it automatically gets updated with latest virus signatures.
  • Download Anti-Spyware Software from a Trusted Website and Install. Make sure it automatically updates with latest definitions.
  • Use “Encryption” to secure your valuable Information.
  • Note: For encryption password is required, always remember the password used while encrypting it, else data would not be available thereafter.
  • Strong password should be used for “Admin” Account on computer and for other important applications like E-mail client, Financial Applications (accounting etc).
  • Backup :Periodically backup your computer data on CD / DVD or USB drive etc.. in case it may get corrupted due to HardDisk failures or when reinstalling/format ting the system.
  • Recovery Disk: Always keep recovery disk suplied by Manufacturer / Vendor of the Computer System to recover the Operating System in the event of boot fail- ures due to system changes such as uncerificated Drivers/unknown Software pub- lisher.
  • Startup programs should be monitored / controlled for optimal system performance.

Browser Security:

  • Always update your Web Browser with latest patches.
  • Use privacy or security settings which are inbuilt in the browser.
  • Also use content filtering software.
  • Always have Safe Search “ON” in Search Engine.

e-Mail Security:

  • Always use strong password for your email account.
  • Always use Anti-Spyware Software to scan the eMails for Spam.
  • Always scan the e-Mail attachments with latest updated Anti-Virus and Anti-Spy ware before opening.
  • Always remember to empty the Spam folder.

 Wireless Security:

  • Change default Administrator passwords.
  • Turn On WPA (Wi-Fi Protected Access) / WEP Encryption.
  • Change default SSID.
  • Enable MAC address filtering.
  • Turn off your wireless network when not in use.

Modem Security:

  • Change the default passwords.
  • Switch off when not in use.


Read the vendor document carefully and follow the guidelines to know how to setup the personal computer

  • Connect
  • Keyboard
  • Mouse
  • Monitor
  • Speakers and Network Cable …... to CPU (Central Processing Unit) as directed in vendor document.
  • Connect CPU and Monitor to Electrical Outlets.


  • Do not install pirated software such as
  • Operating System Software (Windows, Unix, etc..).
  • Application Software (Office, Database..etc).
  • Security Software (Antivirus, Antispyware..etc).
  • Note: Remember, some Pirated Software themselve can be rogue programs.
  • Do not plug the computer directly to the wall outlet as power surges maydestroy computer. Instead use a genuine surge protector to plug a computer.
  • Don’t eat food or drink around the PC.
  • Don’t place any magnets near the PC.
  • Never spray or squirt any liquid onto any computer component. If a spray is needed, spray the liquid onto a cloth and then use that cloth to rub down the component.
  • Don’t open the e-Mail attachments which have double extensions .


BIOS (Basic Input / Output System) Settings :

  • Computers BIOS is the first program that runs when computer is started. You can tell the BIOS to ask for a password when it starts, thus restricting access to your computer.
  • To enter the BIOS setup program, sometimes called CMOS setup:
  • Turn on or reboot your computer. The screen will display a series of diagnostics and a memory check. A message will come “Hit the key to enter the BIOS setup program” will appear. [It’s not always the DEL key some BIOS’s use F2 or F10 or any other key combination, check your motherboard manual for more details].
  • Note: Some BIOS versions use a graphical type menu with icons (a GUI) or have a text inter- -face, the principle however is exactly the same.
  • There are two options that relate to passwords, Supervisor Password and User Pass word, these relate to controlling access to the BIOS Setup Program and the Machine Boot respectively.
  • Note: Not all BIOS’s have this password feature, your bios may not have it in which case you won’t be able to restrict access to your computer in this way.
  • Select USER PASSWORD and you’ll be prompted to enter a password. You should now enter a password of up to eight characters (most BIOS’s are limited to eight characters unfortunately). I recommend you to use the full eight but take care that you choose something you’ll not forget. The BIOS will then prompt you to confirm the password, just type the same thing again. Now you’ll want to set your system to ask for that pass- -word every time it boots, so select the BIOS FEATURES SETUP option, to see a menu. It’s the Password Check option if you are interested in, so select it and change the set- -ting to “ALWAYS”. Now navigate back to the main menu and select SAVE & EXIT SETUP. Your machine will then reboot and you’ll be prompted for the password. Each and every time you boot you’ll be asked for password you chose.

Note: This method of restricting access to your computer is not completely foolproof, there are ways around it. But it will stop or at least delay the majority of casual attempts to get ac -cess.

Note: If you forget your BIOS password, consult your motherboard manual or if you don’t have one, consult the website of the BIOS manufacturer.

How to connect a Wireless Modem to a Desktop Computer ? 

Instructions to be followed while connecting the Wireless Modem

  • Make sure you have the necessary equipment. Your wireless modem package should include the wireless modem (or wireless adapter); an installation CD-ROM with a manual; an Ethernet cable (or a USB cable if you have a wireless USB modem); a wireless antenna (conforming to wireless standards such as 802.11a, 802.11b, or 802.11g); and a power adapter. Call the retailer or the manufacturer of your wireless modem if any of these items are missing.
  •  Read the manual to learn how the equipment functions. For example, use the wireless antenna to connect to the wireless network ; use the Ethernet cable (or USB cable) to connect the computer to the modem.
  • Attach your wireless antenna to the modem.
  • Hook up an Ethernet cable from your computer to a LAN/Ethernet port on the modem. Or, if you have a wireless USB modem, connect the USB cable to the USB port of the computer.
  • Connect the power adapter to the power connector of the modem, plug it in and switch it on.

Setting Up the Wireless Modem

  • Open your Web browser and enter the URL of the modem’s administrative site. If you can’t find it in the users’ manual, call the modem manufacturer’s/vendor’s customer service.
  • Log in to the administrative site by entering the user name and password provided in the user manual. Again, if you cannot locate these, call the modem manufacturer’s/vendor’s customer service. Usually the default username and password is “Admin.”
  • Select the Internet connection type. There are four types of Internet connection: “Dynamic IP Address,” “Static IP Address,” “PPPoE/PPPoA” and “Bridge Mode.” Call your Internet service provider (ISP) to ask which setting best suits their wireless service.
  • Choose “Dynamic IP Address” to get an IP address automatically from the ISP’s server. For every wireless Internet connection you make, you receive an IP address. In some cases the IP address is dynamic (it changes every time you connect to the Internet), and in other cases it is static (the IP address remains the same even after you disconnect and reconnect to the Internet). If the address is dynamic, you will have to choose this setting so that the modem automatically takes the IP from the ISP’s server whenever a new wireless connection is established. Enter your modem’s MAC Address (usually found at the back of the modem) and other details. Refer to the user manual or call the modem manufacturer’s / vendor’s customer service to get these details.
  • Select “Static IP Address” if you are provided with a static IP. You will need to fill in the fields for “VPI,” “VCI,” “IP Address,” “Subnet Mask,” “ISP Gateway Address,” “Server Address,” “Primary DNS Address,” “Secondary DSN Address” and “Connection Type.” These details can be obtained from your ISP.
  • Opt for “PPPoE/PPPoA” if your ISP uses this type of connection. DSL users may use this connection. Enter your user name, password and other details. These will be provided by your ISP.
  • Select the “Bridge Mode” if your ISP uses this connection type. Enter the relevant details provided by your ISP.
  • Finish the process by clicking on the icon that says “Finish” or “OK” or something similar. Your modem should be set up now.
  • Enter any URL address in your browser’s address window to check whether Internet is working or not.
Page Rating (Votes : 0)
Your rating: