Protecting your computer


You're probably reading this because you want to protect your computer, or have been a victim of and experienced hacking on your computer.

The truth is, as technology grows, so does the amount of people who know less and less about the new technology. The younger generation will naturally learn about this new technology, but for older people, it opens the door to becoming unprotected. People are generally less inclined to learn about new technologies as they grow older.

At Helium22 we want to close the door, to prevent malicious hackers and anyone who would want to obtain your data unauthorised.

Our first taster video is FREE, and our series comes with 4 more videos to assist you to protect your PC. We are going to tell you about things which virus protection companies and PC manufacturers don't want you to know about. We are not here to discredit any organisations, however we do believe that you should have the ability to protect yourself. No one should have the right to criminally obtain your data without your physical consent. To be forwarned is to be forearmed.

Operating System: Windows 10


Video 1 - FREE


Overview: You will have a good grounding about how to get the best out of your personal computer.

    Part 1 - Knowing your PC

  • What's on your PC?
  • Speeding up your computer
  • Basic security settings
  • Part 2 - Staying safe online

  • Using Browsers to view websites
  • Visiting websites you know and don't know about
  • Downloadng FREE stuff from the Internet
  • Reading Emails from unknown people
  • Staying safe with Social Media
  • Part 3 - Start protecting your PC today

  • How hackers find out who to target
  • Lock down your PC
  • Protect your children online
  • Protect yourself online

Video 2 - Subscription required


Overview: We are going to build upon what you learned in the other videos to make it more difficult for hackers.

    Part 1 - How to protect your folders

  • Default settings are there to help you in a perfect world
  • Understanding file attachments
  • Compressed files
  • Part 2 - Computer settings

    Your computer under the hood

  • Identifying processes which should not be running
  • Removing programs that you don't want
  • Keeping your PC clean
  • Part 3 - Introduction to Virus, Worms, Trojans, Adware and Rootkits

  • Identifyin what type of malicious programs you have on your computer
  • Removing malicious programs on your PC
  • Identifying the source of your virus

Video 3 - Subscription required


Overview: We are going to build upon what you learned in the other videos. You will understand the purpose of Anti-Virus software and Malware removal tools.

    Part 1 - Anti-virus software

  • Which Anti-Virus (AV) software are the best ?
  • How AV software prevents malware on your PC
  • Why are AV softwares sometime ineffective?
  • Part 2 - How to protect your PC with Anti-virus software

  • Using Anti-Virus software
  • What Anti-Virus software companies don't want you to know

    Part 3 - Locking down entry points into your PC

  • Access through USB devices
  • Access through Emails
  • Access through FREE software
  • Access through the Internet

Video 4 - Subscription required


Overview: We are going to build upon what you learned in the other videos to understand Networks

    Part 1 - Home network

  • How hackers can enter your computer remotely
  • Security network check list
  • Part 2 - Cable and Wireless Internet connections

  • How hackers can enter your computer through a fixed cable and wireless connections
  • Locking your router
  • Password protecting your PC and router
  • Ensuring your have a firewall
  • Part 3 - Start protecting your PC today

  • How hackers know who to target
  • Lock down your PC
  • Protect your children online
  • Protect yourself online

Video 5 - Subscription required


Overview: We are going to build upon what you learned in the other videos to make it more difficult for hackers to obtain details about you.

    Part 1 - Identity Protection

  • Who has been looking up your information
  • How hackers steal your passwords and your identity
  • How to prevent identity theft online
  • Part 2 - Tools

  • Tools to use to identify viruses before the spread
  • Locking down the Internet
  • Locking down the PC
  • Part 3 - Helium22 Communications Network

  • Sharing knowledge about malware
  • Utilising Helium22 removal services

Contact Us