Tips To Avoid Having Your Computer Hacked

Tips to avoid having your e-mail account or computer hacked.

Before thinking of installing software for encrypting communication or data, you should adopt some good habits and follow these tips.

  • Avoid working with your back to a window
  • When you are travelling on a plane or train, attach a privacy filter to your screen. A privacy filter is a clear film which restricts side-on viewing when applied to your screen. Only the person sitting in front of it (you) can see the screen.
  • When travelling, try to keep your equipment with you as much as possible. This prevents anyone from being able to obtain files from your computer or being able to introduce a Trojan horse.
  • All operating systems (Windows, Mac OS and Linux) let you protect your session with a password. Make sure you use this feature.



If you work in an Internet café or on a computer which is not your own, make sure that you do not leave any traces once you’ve finished your work:

  1. If you have checked your email, Facebook or Twitter account, always make sure you log out.
  2. Delete your browsing history. This contains various information and an expert could also access some of your online accounts
  3. Never store your passwords in the browser on a public computer. If you do this by accident, delete them from the browser’s memory when you’ve finished your work.
  4. Clear form entry fields
  5. Delete cookies



Most online services (Twitter, Facebook, WordPress, Tumblr, Skype, etc.) let you recover a lost password by sending a password to your inbox. You must therefore protect your inbox as much as possible. If it is compromised, all your digital information could be too.

Google’s mail service, Gmail, offers an additional layer of security: ”two step verification”. This service lets you protect your mail account with:

  1. a username
  2. a password
  3. a code that you receive on your mobile each time you connect to your mailbox.

Therefore, without your mobile, you cannot access your mail.

When you log into your Gmail mailbox, remember to click on the “Details” link at the bottom of the page. This opens a window which displays the recent connections to your inbox. This way, you can detect any suspicious activity.


Password length is the key factor in creating a strong password which can resist a brute-force crack. Combining numbers, special characters and lower- and upper-case letters often creates weak passwords which are difficult to remember. If you use a “passphrase”, rather than a “password”, you can create a string of characters which is easy to remember and is much longer than your old password.


While it is important to install antivirus software on your computer, it is even more important to use common sense when you receive a link or an attachment by email, Twitter, Facebook or Skype. Social networks and communication tools are the main carriers of viruses.

Malware (malicious software) is also developed by specialist hacker which cannot be detected by antivirus software. The best defence is to act early, before malware infects your computer or smartphone.

  • Don’t download files or click on links which you receive from unknown senders.
  • Carefully check the email address or Twitter account of anyone who shares a link with you. If you have any doubt, check the sender’s identity with other contacts or by using a search engine.
  • If the file and sender seem suspicious, get expert assistance. Citizen lab is an organization which analyses the viruses sent by both dissidents and activists and helps them to protect themselves better.


Facebook and Twitter are useful communication tools. However, make sure you control the information that is made public. The following tutorials and online services can help you to manage your online presence better:

  • Check your Internet presence with namechecker
  • Privacy settings in facebook
  • Recent changes that you should know about
  • facebook
  • googleplus
  • twitter
  • linkedin
  • linkedin

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: