Wednesday, September 30, 2009
Is My Computer Infected?
Posted by seapiano683 at 8:28 AM 0 comments
Understanding Viruses
Posted by seapiano683 at 8:27 AM 0 comments
Worm or Virus...What's the Difference?
Posted by seapiano683 at 8:25 AM 0 comments
What to Look for in Antivirus Software
Posted by seapiano683 at 8:23 AM 0 comments
Why Buy Antivirus Software?
Posted by seapiano683 at 8:22 AM 0 comments
Sunday, September 27, 2009
Summary
Posted by seapiano683 at 7:35 PM 0 comments
Install and Use a File Encryption Program and Access Controls
Posted by seapiano683 at 7:34 PM 0 comments
Use Care When Downloading and Installing Programs
Posted by seapiano683 at 7:32 PM 0 comments
Use Strong Passwords
Posted by seapiano683 at 7:30 PM 0 comments
Make Backups of Important Files and Folders
Posted by seapiano683 at 7:28 PM 0 comments
Install and Use a Firewall Program
Posted by seapiano683 at 7:26 PM 0 comments
Use Care When Reading Email with Attachments
Posted by seapiano683 at 7:24 PM 0 comments
Keep Your System Patched
Posted by seapiano683 at 7:22 PM 0 comments
Install and Use Anti-Virus Programs
Posted by seapiano683 at 7:20 PM 0 comments
What Should I Do To Secure My Home Computer?
Posted by seapiano683 at 7:18 PM 0 comments
Information in the Clear
Anyone, or, more accurately, any program, in that Internet room that can hear that conversation can also probably understand it. Why? Because just like the conversation at home, most Internet conversations are in the clear, meaning that the information exchanged between computer systems is not concealed or hidden in any way.
Again, this is how the Internet works. You need to know that the information sent across the Internet may be at risk of others listening in, capturing what you send, and using it for their own benefit.
Later, we’ll talk about encryption as a way to address this problem. Encryption uses mathematics to conceal information. There are many programs you can install to encrypt the information you send across the Internet.
Posted by seapiano683 at 7:16 PM 0 comments
Things You Ought To Know
One starting point for solving home computer security problems is being aware of how the Internet and some of its technologies work. If you know how they work, you can evaluate solutions to the problems that come up. You can also use the Internet more safely and responsibly. In this section, we’ll talk about two topics: trust and information in the clear as it crosses the Internet.
TrustHuman beings are trusting by nature. We trust much of what we hear on the radio, see on television, and read in the newspaper. We trust the labels on packages. We trust the mail we receive. We trust our parents, our partner or spouse, and our children. We trust our co-workers. In fact, those who don’t trust much are thought to be cynical. Their opinions may be all too quickly ignored or dismissed.
The Internet was built on trust.1 Back in the mid 1960s, computers were very expensive and slow by today’s standards, but still quite useful. To share the expensive and scarce computers installed around the country, the U.S. government funded a research project to connect these computers together so that other researchers could use them remotely. This project was called the ARPAnet, named after the government research agency – ARPA, the Advanced Research Projects Agency – that funded and managed the project.
Key to the ARPAnet was the level of trust placed in its users; there was little thought given to malicious activity. Computers communicated using a straightforward scheme that relied on everybody playing by the rules. The idea was to make sharing ideas and resources easy and as efficient as the technology of the day provided. This philosophy of trust colors many of the practices, procedures, and technologies that are still in place today.
Only within the last few years, when Internet commerce (known as e-commerce) began to spread, it has become inadequate to rely principally on trust. Since the days of the ARPAnet, we’ve changed the way we use computer networks while others have changed the underlying technologies, all in an attempt to improve the security of the Internet and the trust we place on it.
Let’s dig deeper into two examples of what we trust in our daily lives. When you receive mail through the post office, many envelopes and the letters in them contain the sender’s address. Have you ever wondered if those addresses were valid; that is, do they match the address of the person or persons who really sent them? While you could check to see that those addresses are valid and refer to the person they name, it’s not an easy task.
How would you go about it? Would you call the phone number provided with the letter? That number could also be invalid, and the person that answers the phone could be as misleading as the original address. Perhaps you could call directory assistance or the police department that has jurisdiction over the town where the letter was supposedly from. They might be helpful, but that is likely to take lots of time. Most people wouldn’t bother.
And it’s not just return addresses either. How about advertisements, news stories, or the information printed on groceries? Suppose you were on a low-fat diet. You’d want to buy foods low in fat. To select the right foods, you’d read the product label at the grocery store. How do you know that the label information is valid? What’s to say it’s not forged? And how would you know?
The Internet has many of the same issues, and email is one of the best examples. In an email message, an intruder can easily fabricate where the came from. But this information forging – called spoofing by intruders and security professionals – is not limited to just email. In fact, the basic unit of information transferred on the Internet – called a packet – can also be easily forged or spoofed.
What does this mean and why should you care? It means that any information you receive from some other computer on the Internet should not be trusted automatically and unconditionally. When you trust an email message that turns out to have a harmful virus attached to it, your computer can be infected, your files destroyed, and your work lost. And that’s why you should care.
This is how the Internet works. It was built on trust. Over time, there have been technological changes that are worthy of a higher level of our trust than before. Nonetheless, a true sense of insecurity is better than a false sense of security. So, think about the information you trust. Be critical and cautious.
Posted by seapiano683 at 7:02 PM 0 comments