WordPress For Non-Techies: Free WordPress Tutorials – WPCompendium.org

How To Add A Physical Layer Of Security To Your Computer

This tutorial is part of our tutorial series on WordPress Security. In the previous section of this tutorial, we showed you how to set up a computer backup system to protect your device’s valuable files and data. In this tutorial, you will learn how to add a physical layer of security between your computer and the internet to make hacking into your computer more difficult.

Please also review our WordPress Security Guide For Beginners and our free WordPress Security Checklist.

***

How To Add A Physical Layer Of Security To Your Computer

Here are several ways to add a physical layer of security between your computer and the internet to make hacking into your computer more difficult:

Use A Router

A simple and very effective way to add a physical layer of security between your computer and the internet is to use a router.

A router is a small computerized box that connects between your home network and your ISP’s (Internet Service Provider) DSL/Cable modem. A router provides wired and wireless Internet connections to all laptops, computers, tablets, and smart entertainment components within your home or business network …

Most people already use a router to connect to the Internet, but if you’re not, then it’s a good idea to consider doing so. It doesn’t have to be expensive. If you use a laptop, you can opt for a good quality wireless router.

Using a secure router will help make it harder for people surfing the web or driving around your neighborhood looking for opportunities (called ‘wardriving’) to access your machine.

If you plan to install a router, here are just a couple of things to keep in mind:

An SSID is the name of a wireless local area network (WLAN). All wireless devices on a WLAN must employ the same SSID in order to communicate with each other. The SSID on wireless clients can be set either manually, by entering the SSID into the client network settings, or automatically, by leaving the SSID unspecified or blank.

Some newer wireless access points disable the automatic SSID broadcast feature in an attempt to improve network security. This, however, will not deter hackers, and may even provide them with an opportunity to lure unsuspecting users into logging into a false WiFi network disguised as the access point with the SSID turned off.

Use A Firewall

A firewall is a software program or piece of hardware that helps screen out hackers, viruses, and worms that try to reach your computer over the Internet …

(source: Microsoft.com – What Is A Firewall?)

Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet.

To learn more about protecting your computer from viruses, worms, malware, adware etc., see the tutorial below:

Microsoft Windows comes with a built-in firewall, but depending on your security needs, you may also want to consider adding a physical firewall to your computer setup.

Firewalls – Hardware Vs Software

There are benefits and differences to consider between using hardware and software based firewall programs.

For instance, a hardware-based firewall:

One of the downsides of using a hardware-based firewall, however, is that it typically only recognizes and blocks bad stuff coming into your system; it often can’t tell if bad stuff (like an email virus) is going out of your computer.

A software-based firewall, on the other hand, runs directly on a computer, and so:

In a nutshell, a software firewall is able to take a closer look at malicious traffic and intercept it before it leaves your computer.

The main downside to software firewalls is that they only typically protect the machine they’re installed on, so you would need multiple licenses to protect multiple computers.

Use An Encrypted Virtual Drive

Modern technology makes it possible to encrypt all of your online activities (e.g. what videos you watch online, what files you download, who you chat online with, etc …), so it’s no surprise that you can also encrypt data on your computer.

If you need to take computer security to a level where you really want to make it difficult for anyone to access sensitive information such as logins, bank account details, financial data, legal documents and correspondence, etc., then you should consider saving your files to an encrypted virtual drive (EVD).

EVDs require entering a correct passphrase or password in order to encrypt data and access the encrypted information. Without the correct password, all encrypted data will remain encrypted or unintelligible to those viewing it.

You can encrypt an entire disk drive or just some files. If you only encrypt some files, sensitive information can still be leaked through other areas, such as your browsing history, system logs, and temporary files. If you encrypt the whole disk and forget your password, then you will have to reinstall everything.

For this reason, we recommend keeping only the most sensitive data on an encrypted drive while you work, and making a regular backup of those files on an unencrypted drive and then storing the unencrypted drive in a remote location.

If you use Windows, you can create a virtual, encrypted drive on your computer by simply configuring some internal settings. See the link below for a tutorial on how to do this.

To learn how to create and encrypt a virtual hard drive using Windows , visit the site below:

How To Create A Virtual Hard Drive In Windows 7

You can also purchase external drives and encrypt these using software.

Here are some popular encryption software programs:

USBCrypt

USBCrypt encryption software is specifically designed to protect removable USB drives with passwords.

USBCrypt is easy to use and offers a wizard-style interface that guides you through the steps of selecting a password and encrypting your external USB drive. USBCrypt lets you encrypt external drives with strong encryption algorithms .

Drives protected with USBCrypt can be used with other Windows computers without USBCrypt software installed on them, as well as other types of external drives, such as FireWire drives, Zip drives, and other types of rewritable drives. USBCrypt also offers the option of creating a “spare key” file on your main computer, which you can use if you forget your encryption password.

To learn more about USBCrypt, visit the site below:

TrueCrypt

TrueCrypt is a popular open source software that provides automatic, real-time (on-the-fly) and transparent encryption.

TrueCrypt can create a virtual encrypted disk within a file and mount it as a real disk, encrypt an entire partition or storage device such as USB flash drive or hard drive, or encrypts a partition or drive where Windows is installed.

Screenshot tutorials on how to create encrypted drives are provided in the software site’s documentation section.

Development of TrueCrypt was discontinued back in 2014 and has subsequently not been maintained. A number of security flaws have been uncovered and as a result, we recommend looking at the list of free alternatives provided below:

To learn how to migrate existing data encrypted by TrueCrypt, visit the site below:

Next Step:

Now that you know how to add a physical layer of security between your computer and the internet to make hacking into your computer more difficult, the next step is to learn how to harden your computer security.

To learn more about hardening your computer security, see the tutorial below:

See Also …

References

(Source: Pixabay)

***

"I was absolutely amazed at the scope and breadth of these tutorials! The most in-depth training I have ever received on any subject!" - Myke O'Neill, DailyGreenPost.com

***

Recommended Video Courses For WordPress Users

How To Use Amazon S3

Learn how to set up and use Amazon S3 to upload, store, manage, and protect your site’s images, large media files, downloadable files, stream videos and more.

More info: How To Use Amazon S3

Recommended Video Courses For WordPress Users

How To Use cPanel

cPanel is a powerful and simple-to-use web hosting management software application that gives website owners the ability to quickly and easily manage their servers and websites using a simple and intuitive dashboard.

This video course will teach you how to use the main features of cPanel to manage your web hosting.

More info: How To Use cPanel

Recommended Video Courses For WordPress Users

Using Password Managers

Password Managers provide an easy and secure way to keep track of all your passwords. This video course shows you how to use two FREE powerful password management tools.

More info: Using Password Managers

Recommended Video Courses For WordPress Users

WordPress Security

Learn how to keep your WordPress site or blog secure and protected from malware, hackers and brute-force attacks.

More info: WordPress Security

Recommended Video Courses For WordPress Users

How To Back Up & Restore WordPress Sites

Learn how to safely and automatically backup your WordPress files and database and how to easily restore your WordPress site if something were to happen.

More info: How To Back Up & Restore WordPress Sites

Recommended Video Courses For WordPress Users

How To Use FTP

This video course shows you how to use FTP (File Transfer Protocol) to transfer and upload files between your hard drive and your server using a free FTP program called Filezilla.

More info: How To Use FTP

Recommended Video Courses For WordPress Users

How To Set Up WordPress On Localhost

Learn how to install, set up, and locally host a fully functioning WordPress site on your computer.

More info: How To Set Up WordPress On Localhost