Mind State Software
 HOME  | FIX ME NOW  | PRODUCTS & SERVICES  | PROJECT PRICING  | CLIENTS  | SIGN ME UP  | ABOUT US  | 1kWORD Video Training 

April 19th, 2024

Our Recommended Security Profile

Because of the massive number of hackings and hijacking of personal computers and browsers, Mind State Software developing has assembled a security profile.

After a lengthy review of the problems, we have developed a security profile for our clients that seem to bring enormous relief to these problems.

Plan of Attack

In most cases, attacks have occurred from three different directions. First, many of our clients are downloading images and emails that contain viruses. As everyone knows, the types of attacks from these viruses seem to be changing by the month.

Another long existing problem with all internet users has been the applications containing spy programs. This is simple function to add to any application, which can detect whether the personal computer is currently connected to the internet. If so, then the spy function setting on the personal computer can broadcast messages containing application data to a host, which is another computer connected to the internet. The two problems caused from spy functions is memory, CPU and internet access speeds are all being utilized, and people are able to monitor your personal computing information.

As of the latest release of Microsoft Operating Systems (98, 2000, XP home and XP Pro), hijacking of browsers and other resident software is eating internet users alive.

Dial-up users have experienced the problems of hours downloading updates and damaged the operating system because of telephone line disconnects. This causes more frustration, loss of time and potently lots of money to repair the download damage. Let Mind State download the security updates while we tune-up you’re PC.

Choose a Weapon!

1). Create a backup of the PC. Even if the backup is on the C: drive, it is still a backup.

2). We recommend sealing off the perimeter by installing a firewall. Our favorite product has been Sygate. They have both a personal version which can be downloaded for free and a professional package for small and medium customers. Important: Make sure you receive and send emails containing attachments successfully after the firewall is installed.

3). Get the latest security patches from Microsoft. These are release fixes, and many are related to security, which means they change problem areas that hackers have been gaining the most success. A word of caution, XP Service Pack 2 (SP2) release has been laden with its\ share of bugs. We are resolving complaints from customers because their printers and modems suddenly no longer work, since they install SP2.

4). A reasonable spyware for most people will cut down impending hijacks. We have been recommending Microsoft's Beta Spyware. It is free to download (at the moment), and it seems to sufficiently clean up spy functions from most personal computers. For the tougher jobs, we have used Spy Doctor and this product killed more robust hijacks.

5). Remove unnecessary spyware applications. In other words, if you have a spyware and anti-virus product that your not sure if it has helped, then loose it. Go with a product that works and save processing power. Two is not always better than one.

6). Load a decent anti-virus detection product. If you have one, great! Otherwise, we have been suggesting that people use Symantic's Norton Anti-virus. A 90 day trial version can be loaded for free.

7). Monitor the processor performance and background applications running during the OS boot. Is their a processor hog that is killing the PC?

8). Review memory needs. Most of our clients have spent good money for the PC, but because of memory requirements, they tend to believe their computer is not qualified to work better. It's kind of like buying a superior automobile and driving it on minimal tire quality. An application like cpu-z can quickly provide the cpu and memory specifications quickly.

9). Install Firefox internet browser. The look and feel is as simple as Microsoft's Internet Explorer. In our experience, the Firefox browser has suffered less hijacks.

Mind State Software Developing Inc. - Here to help
All Logos and Trademarks in this site are the property of their respective owners.