Basic Rules Plus Common Sense Add Up to Security
http://www.washingtonpost.com/wp-dyn/content/article/2005/12/23/AR2005122301
978_pf.html
By Rob Pegoraro
Sunday, December 25, 2005; F07

For some people, the worst gift ever would be a new computer with an
Internet connection. One embittered user wrote in October to say that he was
"so frustrated with hackers, virus, Trojans, worms, constant upgrades,
security patches, etc, etc." that he was going to suspend his Internet
account.

I'm guessing that a new laptop wasn't on his wish list this year.

But many other people have been booting up new computers and wondering how
to keep them secure. They are likely to get some confusing messages about
that. The worst one is "you can't" -- that you must accept these intrusions
because it's too hard to stop them all.

Nonsense. If you can learn to cook with fire, drive a car and pay your taxes
-- all activities in which, unlike computing, failure is punishable by
fines, imprisonment or death -- you can figure out how to operate a computer
safely.

Two other messages merely cause people to waste a lot of time and effort.

One is that you can only keep a computer safe by using the right tools. Your
PC will not be secure, the thinking goes, unless you add the correct
firewall, anti-virus software and anti-spyware utilities -- with any others,
you might as well leave the front door unlocked.

The other is that failure to practice the right rituals will invite the
wrath of the computing gods. This leads people to do things like unplug
their Internet connection every night (even though that's the easiest time
for a computer to get security updates) then plug it back in each morning.
They will turn off harmless Web-browsing options, just in case, and delete
browser cookies that don't threaten their PC's integrity. Some will even
reinstall Windows every year, just in case.

A smarter approach combines a little of both beliefs: Let your computer
guard itself with a firewall and automatic updates, pick safe programs and
keep them up to date, then use your common sense to spot the bait set out by
the perpetrators of viruses, spyware, phishing attacks and other "malware."

This applies whether you run Windows, Mac OS X or any other system--
although the risks are far lower outside Windows.

The first step is the simplest: Turn on your computer's firewall. By
screening unsolicited connections, it stops the most dangerous attacks, the
network worms that can board a computer without your consent or notice.
(Viruses must trick people into running them, which is why a PC guarded
solely by a firewall can be kept clean if used cautiously enough.)

In any new Windows PC, the firewall is already on; don't worry about adding
some other company's firewall software. In Mac OS X, open the System
Preferences window and select the Sharing category to activate the built-in
firewall.

The second step is to get any security fixes for your operating system.
Windows XP now does this automatically, downloading and installing patches
as they arrive. Mac OS X will fetch updates automatically, but you must
remember to install them yourself.

Step three applies to Windows users: Run whatever anti-virus program came on
the PC and make sure it will update itself past the initial trial period.
That will usually require buying a yearly subscription. Pay up, or switch to
the free Avast ( http://www.avast.com/eng/free_virus_protectio.html ) or AVG
( http://free.grisoft.com ) anti-virus utilities.

Step four also goes for Windows users: Switch from Microsoft's Internet
Explorer browser to such safer replacements as Mozilla Firefox (my pick) or
Opera, both available through free downloads ( http://www.mozilla.com and
http://www.opera.com ). Even after dozens of security fixes, IE's basic
design leaves it on a weaker footing than other browsers.

Because Microsoft's Outlook Express e-mail software shares code with
Internet Explorer, it can be a risk too -- although it does effectively
block access to programs attached to e-mails, the most common way for
viruses to spread. This aging program also doesn't screen against spam or
phishing e-mails (those messages that demand you verify a financial account
but lead you to a fake site). Instead, try the free Mozilla Thunderbird, a
cousin of Firefox, or Qualcomm's Eudora ( http://www.eudora.com ).

Step five goes for everybody: Update any programs that regularly access the
Internet, such as Sun Microsystems' Java software ( http://www.java.com ),
media programs such as iTunes and RealPlayer, the Macromedia Flash browser
plug-in ( http://www.macromedia.com/flashplayer/ ) and instant-messaging
applications. Most of these programs will look for new versions
automatically; if not, go to each application's Web site and download a
fresh copy.

Step six is the one that never ends: Use common sense when you run into the
unexpected. Don't attribute omniscience to Internet sites or think that
things must always work differently online than off.

That random Web page you just visited? No, it doesn't know about your
computer's software, so you can ignore the ad telling you to scan your PC
for trouble now .

The e-mail from the FBI, ordering you open the attached file to read about
the illegal Web sites you visit? Ignore that too. If the Feds really think
you're an outlaw, they would send men and women with guns to express their
concern.

That e-mail alert purportedly from your bank? Think about that: If your
account was really in that much trouble, wouldn't the bank call you instead
of sending an e-mail you might not read until days later? If you're really
worried, phone the bank yourself to check. Or type the bank's address into
your browser -- ignore the link in the e-mail -- and see if any messages are
waiting for you.

Don't rush to install strange new software. Let the collective expertise of
the Internet help you first: Run a Google search ("Is StrangeFreeProgram
spyware?") to see if other users had problems.

If you're not the only person using the computer, make sure that everybody
else follows these practices as well. If they can't or won't, lock your
account on the computer with a password, then set up a limited account for
them that will stop them from causing more than minor damage. In Windows XP,
go to the User Accounts control panel; in Mac OS X, select the Accounts icon
in the System Preferences' window.

What about all the anti-spyware and Internet-cleanup programs the security
gurus recommend? They are worth having around (although it's still in
testing, I recommend Microsoft's free Anti-Spyware), but if you do your job
right you'll never have to run them.



You are a subscribed member of the infowarrior list. Visit 
www.infowarrior.org for list information or to unsubscribe. This message 
may be redistributed freely in its entirety. Any and all copyrights 
appearing in list messages are maintained by their respective owners.

Reply via email to