STRENGTHENING YOUR ONLINE BASTION: ESSENTIAL TECHNIQUES FOR COMPUTER SECURITY