The creators of the Internet were concerned with convenience, not security. If you use the Internet a lot, chances are that someone is monitoring your network activity with spyware, scripts, cookies, and possibly a camera. In this case, strangers can find out who you are, where you live and other information. In this article, we'll show you how to avoid online surveillance.
Steps
Method 1 of 3: How not to catch a virus

Step 1. Update your operating system regularly
Attackers monitor users by installing viruses on their computers or hacking into computers. Regular system updates will eliminate vulnerabilities and neutralize malicious codes.

Step 2. Update programs regularly
The latest versions of programs add new features, fix vulnerabilities and fix bugs.

Step 3. Update your antivirus regularly and do not disable it
If you do not update the antivirus database, it will not be able to detect some viruses. Also, do not turn off the antivirus (let it constantly run in the background) and regularly scan the system for viruses. We recommend that you enable automatic updating of the antivirus or always allow it to update when prompted.
Antivirus programs look for viruses, spyware, rootkits and worms. Most anti-spyware programs are no better than good anti-viruses

Step 4. Use only one anti-virus program
If you install several antiviruses on your computer, they will conflict with each other, which will slow down your computer. In the best case, one of the antiviruses will work falsely, and in the worst case, antiviruses will interfere with the correct operation of each other.
An exception to this rule is anti-spyware like Malwarebytes. They can work efficiently along with antivirus software, providing an additional layer of security

Step 5. Do not download files from untrustworthy or suspicious sites
For example, if you want to download the VLC media player, do so on the official website of the media player (www.videolan.org/vlc/). Do not click on links to random and unofficial websites, even if the antivirus does not issue warnings.

Step 6. Use a firewall
The firewall checks all incoming and outgoing connections. A firewall prevents hackers from finding your computer and also protects you from accidentally navigating to dangerous websites.
Most antivirus programs include a firewall, and all major operating systems also have a built-in firewall, so you probably don't need to worry too much about the firewall

Step 7. Do not use an administrator account
Remember that if you log in as an administrator, any software, including viruses, can gain administrative rights. This will allow malicious codes to damage the system and monitor your activity. If you use a "guest" account, the virus must be much more powerful in order to penetrate the system and work in it. From under the guest account, malicious code will be able to send information about you, but nothing more.
Method 2 of 3: How to Secure Your Internet Connection
Step 1. Protect the wired connection
Make sure no unknown wires are connected to the router; also make sure that no strangers have plugged your cable into the internet.

Step 2. Secure your wireless connection
Make sure your wireless network is WPA2 and you are using a strong password.
- Using WEP technology or not using any encryption at all is very dangerous.
- If your router does not support WPA2, buy a new one.

Step 3. Do not browse the web through a proxy server
Remember that working on the Internet through a proxy, you have to trust strangers who own the server and configure it. They can track your activity and save all the data that you send / receive through the proxy. Also, proxy owners can remove protection from the website you are using, which will allow them to obtain your bank card number, passwords, bank account information and other confidential information. It is safer to use a regular internet connection, since the internet provider with whom you have signed a contract is responsible for it.
Do not use services that hide IP addresses - they are actually proxy services

Step 4. Open only secure sites (with the HTTPS prefix)
In this case, you and the site owners will know about the sent / received data.
- Install a special extension in your browser, for example, HTTPS everywhere, so that it informs you about protected sites.
- If your browser warns you that a site's certificate is invalid, do not open or close that site.
Method 3 of 3: How to use the DAA Opt-Out Tool
Step 1. Remember that hundreds of companies are monitoring your online activity
Many companies, including Google and Facebook, use computer algorithms to track your activity and serve you targeted ads. This is done using cookies and other technologies. Such monitoring can be blocked using a special service.
Many advertising companies allow you to opt out of their tracking, but for this you have to open their sites one by one; using the DAA service, you can block the tracking of many companies at once

Step 2. Go to the DAA service page
Its address is optout.aboutads.info.
- The scan will take 1-2 minutes.
- Make sure third party cookies are enabled in your browser. Otherwise, this method will not work.
Third-party cookies are enabled by default in most browsers, so if you don't know what they are, they may already be activated in your browser

Step 3. Click Continue when the message appears
In this post you will find information about what the DAA service is for.

Step 4. Click Opt Out of All

Step 5. Review the results when you block the surveillance of all companies

Step 6. Click Try Again if some companies have not been blocked
Sometimes there are minor glitches, so you need to re-block some companies.
If you failed to block a company, the service does not work - please try again later

Step 7. Click View Updated Results to display the companies that you have blocked from tracking

Step 8. Install the Protect My Choices browser extension
It is necessary so that you do not accidentally release the lock when you clear the history. Extension links:
- For Google Chrome
- For Mozilla Firefox.
Advice
- Don't open emails from people you don't know.
- Do not run multiple anti-spyware at once.
- Website owners will not receive your exact IP address: in most cases, the IP address provided by the ISP is dynamic, meaning it changes from time to time (only the ISP can know who you are). Technically, an ISP cannot log in and identify all users.
- Hackers don't need your IP address because an IP address is just an address. For example, if a burglar knows your address, it will not make it easier to break into your home. Likewise with IP addresses.
- Many websites include tools that allow them to monitor your online activity. But this kind of surveillance can be blocked using many extensions, for example, Ghostery.
- Don't open email attachments from strangers.