Windows: In the Control Panel, click Network and Internet and then Network and Sharing Center. Click Change advanced sharing settings and then choose Turn off file and printer sharing. [1] X Trustworthy Source Microsoft Support Technical support and product information from Microsoft. Go to source macOS: Click the Apple menu and go to System Preferences… > Sharing. Remove the checkmark next to “Printer” to stop sharing your printer. [2] X Research source
Windows: Turning off printer sharing in the Network and Sharing Center also turns off file sharing for Windows 10 and 11. But you can go a step further and make your PC undiscoverable—in Control Panel > Network and Internet > Network and Sharing Center, click Change advanced sharing settings, and then choose Turn off network discovery. macOS: Click the Apple menu and go to System Preferences… > Sharing. Remove the checkmark from “File Sharing” to stop sharing all files, or check the list of users in “Users & Groups” to remove access for certain users only. [3] X Research source
Windows 10: In the Windows menu, go to Settings > System > Shared experiences and select Off. [4] X Trustworthy Source Microsoft Support Technical support and product information from Microsoft. Go to source Windows 11: In the Windows menu, go to Settings > System > Nearby Sharing and choose Off.
Click the Control Center icon at the top-right corner of the screen (the two sliders). If the AirDrop icon is blue, click it to turn off AirDrop. [5] X Research source
Whichever scanning program you choose, make sure it scans your registry objects. This is where you will first see problems with a hacker. Memory, startup, filesystem, and heuristic areas are also important in your scan.
Find your program either by inserting the disk and navigating to your computer menu or by going into your downloads and double clicking on the program. Select language and read through the agreement. You must accept the terms to move forward. Select an installation directory. Clicking next after you accept the terms will automatically select your default locations for your installation directory. You’re ready to install. You will be asked if you’d like to create a desktop icon and then you’ll see a final confirmation asking if you’re ready to install. Once you confirm, your installation will be completed in the next couple minutes.
You can pause the scan at any time by clicking the button at the bottom of your progress screen.
Most anti-malware programs will list the threats by severity. Red will represent malware, whereas yellow often represents items that are potential danger. Remove malware to protect your computer. It is up to you which programs to keep. Select the boxes that you wish to remove. The programs listed will be next to a box. Check them and then click “Remove Selected. ” Once the removal is done, you’re scan will tell you that it was quarantined.
These can be found online simply by searching their names. The free download option is on the homepage for each of the programs.
Choose options, and then Network Neighborhood. Select the interface you use to connect in the drop-down list that appears. Uncheck the box next to “Allow others to share my files and printer(s)” and then click OK. Now your computer is safe from local and outside attacks.
Find the single check box. This will be titled “Enable Java content in the browser. ” Un-check this box. Click OK. Now you’ve disabled Java. [14] X Research source
A list of your browsers will appear when you click to expand “Default Java for browsers. ” The list will have boxes next to them. Check the boxes next to a browser if you wish to run Java in that browser.
Keep your router up-to-date so it can protect you from known vulnerabilities. [15] X Expert Source Stan KatsCybersecurity Expert Expert Interview. 24 June 2021.
Don’t make it a weak password. It should include non-dictionary words, special characters, and numbers. Write this password somewhere that you’ll remember it.