Revealed: 10 General Practices for Home Networking



I have talked about home networking in my previous article. They are a combination of two or more computers that are set up at home or offices to communicate with one another. I also said once you are connected to the internet, your system can be easily corrupted.



In this article, I want to talk about some of the general practices that can be done to save our networks. I believe that If you follow some of the practical steps that I am going to list out in this article, you can stay secured from Hackers and others that might want to attack your network. Follow me as we look at some of these steps in this article.

#1           Use Anti-virus as part of home networking practices

I have said this in many of my articles. One of the ways to stay secured in a home network environment is to use anti-virus. This will help you to detect malicious software that might want to run on your network and eliminate them. This will help you to stay secured from every malicious code that might want to steal personal and confidential information from your network.

#2           Turn off Ethernet interface as part of home networking practices

There is the need for you to turn any Ethernet port that is not in use. When you have unused Ethernet port on your switch or your router. You can administratively shut it that so that such ports will not be used as a means of gaining access to the network. This will help you to stay secured from Hackers.

#3 Personal firewall as part of home networking practices

In order to stay secure in a network, there is a need for you to use a personal firewall on your system. When you make use of a firewall, you will be able to monitor traffic going in and out of your network. Firewall work more or less like anti-virus that scans all data going in and out of the network. Without it, you might become a victim of network attacks.

#4 Turn of scripts

There is the need for you to turn off Java scripts and ActiveX which hackers can use as a means of gaining access to your network. Turning off this script ensures that you do not fall, a victim of malicious attacks, normally when you are on the internet, some of these scripts are passed from the sender computer to the receivers’ computers. This can cause some issues at times. That is why Java and ActiveX scripts need to be turned off.

#5 Email attachments

In order to stay secure in a home networking environment, you should also ensure that you scan all email attachments before they are opened. Some of the email attachments flying around are sent by hackers. You should never open an email if you are not sure of the source of the attachments. Make sure you scan every email before they are opened.

#6 Backups

If there is anything that you need to do regularly, it is to back up your data regularly. You have to make sure that you have a backup copy of your document so as to avoid a situation where you will lose important documents to hackers or viruses. You can choose the frequency at which you will be backing your data. This can also be automated so that it will be done automatically.

#7 Trusted source

In order to save on home networks, you have to make sure that you only run programs from a trusted source. When you also need to download any software or program, you have to be sure that it is only downloaded from the manufacturer website. Without that, you are giving an open invitation to hackers to attack your network.

#8 File extension

10 General Practices for Home Networking

The Windows Operating system contains the option to “hide file extension for known file types”. You have to disable this option in order to have file extensions displayed by Windows.

Patching as part of home networking practices

You have to keep all the file applications including the operating system patched.

Boot Disk

There is a need for you to make a boot disk to recover the system when it is damaged or compromised.



Now your take on this argument.

We would also like to hear what you feel about the topic we discussed today. Your feedback is very important to us. Feel free to drop your comments and recommendations. If you have a contrary opinion, you can drop that too.

You can also join our Facebook Page CRMNigeria for more updates. You can do that by clicking on the link or searching for our page on Facebook.

Click here to Download 5 E-Books that I have taken time to prepare for you.

These E-Books contains formulas that have helped many of my students to nail the PMP Exam. You can also make use of this E-Books. While you are using it if you have questions to ask me concerning the Formulas, feel free to shoot me a mail. I am committed to assisting you to nail your PMP exam. It’s a pledge. You can always count on me as a friend. 

PS: For like seven years since I started blogging I have tried many platforms and tools. Some worked and some of them performed below expectation. Here are some of the tools that I will gladly recommend for you any day, any time.






You can also download our Mobile App here.

Click here to Like our Page on Facebook

Follow us on Twitter

Domain names for just 88 cents!3 Major Roles of PMO in Projects 1
Action Point.
You need to confirm your subscription by clicking on the link sent to you. You can check the spam folder for it. Add us to your mailing list to receive directly from us.

PS: Click on the link below to sign up for my Online E-Course CRM Training. Make sure you confirm your subscription by clicking on the link sent to you. Thanks.

Revealed: 10 General Practices for Home Networking 1

Leave a Reply

Your email address will not be published. Required fields are marked *


CommentLuv badge