PDF download Download Article
Make sure your computer is safe from viruses when browsing the internet
PDF download Download Article

Downloading malicious code can be devastating to your devices, your security, your privacy, and your data. We talked to cybersecurity specialist Michael Thompson-Brown to find out the best ways to protect your computer. This wikiHow article teaches you to avoid downloading malicious code.

Quick Steps

  1. Install and update antivirus software.
  2. Download and install all patches and software updates.
  3. Be careful of all programs, links, and attachments you open.
  4. Avoid unsecured websites.
  5. Disable pop-ups and autorun/autoplay features.
  6. Change your password frequently.
  7. Use a firewall.
4

Be Careful of Links and Attachments

PDF download Download Article
  1. Don't click links or download attachments that were sent to you by people you don't know and trust.[4] Before clicking a link, hover over it and check the URL. Make sure it goes to the website it says it goes to. Also, check the spelling of the link to make sure it's not a spoof link designed to look official. If you receive a message claiming to be from an official institution, such as a bank, asking you to click a link and sign in, don't follow the link. Sign in on their official website or contact the company directly.
    • If a link has a file that contains a ".exe" extension at the end of it, do not click on it.
    • Scan all files with an antivirus scanner before opening them.
5

Be Careful When Downloading Free Software

PDF download Download Article
  1. Avoid downloading free software from sources that you don't know and trust. Especially if the software isn't normally free or seems too good to be true. Free software downloads may intentionally or unintentionally contain malicious code.
    • Scan any files and programs you download with an antivirus scanner before opening them.
    • Check ratings and reviews for any program you download it. Lots of negative reviews could be an indication of malware or malicious code.
    • Make sure you read the install prompts during the installation process of any software you install.[5]
    • If you have to download free software, read the terms and conditions carefully. Try to stick with open-source software that has its source code publically available so that it can be scanned by malicious code by experts.
  2. Advertisement
6

Change Your Passwords Frequently

PDF download Download Article
  1. Also, make sure you are using strong passwords as well as using a different password for each account. This will go a long way to prevent unauthorized access to your accounts. You can manage your passwords using a password manager. If you suspect your device is infected with malicious code, change your passwords immediately.
    • Cybersecurity expert and computer repair specialist Michael Thompson-Brown says "People use, and reuse the same username and password combination over and over again. They use it for four different things, which is extremely risky. For example, if you use that same password/username at some little site, and they get hacked, [the hacker now has] that pairing. If you've used that same username/password combination for your email, you're in a lot of trouble."[6]
    • Michael Thompson-Brown goes on to say "Use a password manager you know, and use better passwords. A better password is a longer password, not necessarily more complex. Adding numbers and symbols doesn't necessarily help. The total number of characters is the most important thing."[7]


9

Limit Web Browsing Access

PDF download Download Article
  1. You can purchase software that blocks content and applies DNS filtering to block individual websites or website categories. Content blockers can be installed on a specific computer to block content on that computer, or applied to a router to block content on the entire network. If you are administering a network or home network, it is recommended you apply content blockers and DNS filtering to your entire network.[8]
  2. Advertisement

Expert Q&A

Ask a Question
200 characters left
Include your email address to get a message when this question is answered.
Submit
Advertisement

Tips

Submit a Tip
All tip submissions are carefully reviewed before being published
Name
Please provide your name and last initial
Thanks for submitting a tip for review!

You Might Also Like

Advertisement

References

  1. Dan Rubianes. Tech Strategist. Expert Interview
  2. https://www.cisa.gov/news-events/news/protecting-against-malicious-code
  3. https://www.bu.edu/tech/support/information-security/security-for-everyone/how-to-identify-and-protect-yourself-from-an-unsafe-website/
  4. Dan Rubianes. Tech Strategist. Expert Interview
  5. https://codesigncert.com/blog/12-best-security-tips-to-prevent-malicious-code
  6. Michael Thompson-Brown. Cybersecurity Expert. Expert Interview
  7. Michael Thompson-Brown. Cybersecurity Expert. Expert Interview
  8. https://www.youtube.com/watch?v=DdMLjofLUws
  9. Michael Thompson-Brown. Cybersecurity Expert. Expert Interview

About This Article

Dan Rubianes
Co-authored by:
Tech Strategist
This article was co-authored by Dan Rubianes and by wikiHow staff writer, Travis Boylls. Dan Rubianes is an IT Business Leader and the Founder and CEO of Cloudience based in Phoenix, AZ. Dan has over 25 years of experience in cybersecurity, cloud security, compliance and modernization. He is the author of the book Email Invasion and the creator of an online security course “Cybersecurity for Healthcare” on the security awareness website LearnComply.com. Cloudience provides Managed IT Services to businesses, with the promise of reducing downtime, increasing productivity, securing data, meeting regulatory compliance, and providing their clients with a competitive edge. Dan is trained as a Certified Information Systems Security Professional (CISSP) and holds certifications in Microsoft, Google, Sophos, Sonicwall, Fortinet, A+ and multiple Cybersecurity and Cloud domains. This article has been viewed 1,424 times.
How helpful is this?
Co-authors: 4
Updated: May 25, 2025
Views: 1,424
Categories: Internet Security
Thanks to all authors for creating a page that has been read 1,424 times.

Is this article up to date?

Advertisement