[Shtoom] Learning how to Protect Your Computer - John Schrerer
paul.kholer at gmail.com
Tue Jul 3 15:41:58 CEST 2007
It is often said that there is no such things as 100% security. While that
is true, it is no reason why you shouldn't take all necessary precautions to
prevent unauthorized access. In this article we will examine a few ways to
protect your data.
Out of all the different ways an intruder can access your
computer, local access is the most promising way to circumvent your
security. If a person has local access to a computer, it is only a matter of
time before the data on the computer will be extracted.
However, protecting your computer against local attacks is also easy and
only takes a few minutes. First, put a password on your BIOS configuration.
Typically, it involves pressing Esc, Tab, F1, or some other key to access
the BIOS configuration. From there, the configuration menu should have a tab
about security. Open the tab about security and choose a decent password
(there are hints about choosing a good password later on). Also, set the
computer to boot up from the hard drive first, and do not let it try to boot
from the A: drive or the CD-ROM drive. The reason why it shouldn't attempt
to read the A: or CD-ROM drive is that an intruder could use a CD-ROM
bootable O.S. like Knoppix to steal your password, even though a BIOS
password is set. Now save the changes and exit.
Now to set a password on your accounts on Windows operating systems:
For *NT* and *XP* users: Make sure your administrative account has a
password on it. Also, put a password on any other accounts you have and
disable the guest account.
For *95*, *98*, and *ME* users: The security offered on these platforms is
insufficient for the protection of your data. The best option for these
platforms would be to rely on other forms of protection, such as encryption.
The Internet opens up a host of security issues, but since the
security problems are so prevalent there are many good solutions. We will
now take a look at a few of them.
Firewalls protect things called ports. *Ports* are what your
computer uses to access the Internet. To view a webpage, for example, your
computer connects to the website's computer through port 80. Programs called
*Trojans* can open ports on your computer and let people get into your
computer and do whatever they want, including stealing passwords and credit
cards. With a firewall, you can close most ports and protect your computer
from Internet attacks. A firewall that I highly recommend is Zone Lab's free
firewall called ZoneAlarm. It can be found at Zone Lab's website,
Ah... its name rings like poetry in my ear... but seriously,
anti-virus software is seriously serious business. Seriously. No way around
it, you need to be protected! Anti-virus software is not the be all end of
computer security, nor was it meant to be. However, it is a major and
powerful form of defense against viruses, trojans, and worms. Now let's talk
money... the universal language. Most anti-virus products cost money and a
subscription cost... so check around for the best deals. However, the most
prominent anti-virus software products are Norton Anti-virus and McAffee .
But for you people who can't live without freebies, try AVG by Grisoft . The
personal version is free... and awesome. Literally... no joke... free. Wow.
Try them all and decide which one you like the best. After you have one,
setup auto scan if it isn't setup already. Okay, now you are ready!
Concentrate, and become one with the force!
Spyware... that this stuff can just be plain nasty. These are
the programs that discover information about you and send it to their evil
masters. Beware! Danger, Will Robinson! Now, lets talk about ways to destroy
them. People will have day-long arguments over which product to use, but the
two main programs (both free!) are Spybot: Search and Destroy and Ad-aware
. Try them both, and see which one you like.
Now for the most powerful security tool... listen carefully... this is
powerful! COMMON SENSE! Firewalls, anti-virus software, and spyware
protection is useless against social engineering. Social engineering is
conning a person into compromising their security. Now I know what you are
saying, why would someone ever compromise their security because some
stranger told them to do so!?!? It doesn't make sense... but it happens. All
the time. Think about some e-mail messages you might have gotten... "I
Luuuuv you!" "Your pictures are inside!" "I saw your profile... " If a virus
is attached, and you download it hoping to see something and you see
something quite different, you have been the victim of social engineering.
Most social engineering attacks are more powerful and dangerous, but you get
Checklist to protect yourself:
___ Set a bios password.
___ Change startup to hard disk.
___ Set password on user accounts.
___ Disable guest account.
___ Download and setup firewall.
___ Download and setup anti-virus software.
___ Download and setup spyware remover.
___ Use common sense!
Remember, security is not a destination, it is a journey.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Shtoom