SAFE COMPUTING
Computing isn't what is used to be, especially if you use the Internet for looking up information, or to send and receive e-mail. Whilst users at institutions or companies are protected from computer viruses and hackers, many home users are vulnerable simply because they are unaware that someone has gained access to their machine.
They do this by secretly planting a small program on your machine which can:
corrupt files,
steal files and passwords,
damage your computer,
monitor your keyboard strokes,
record your surfing habits,
use your computer as a 'zombie' in denial of service attacks,
steal credit card and bank account details.
they can also find out your interests and sell that information to other companies who will fill your mail box with junk mail.
How can you protect yourself?
It's surprisingly easy, and it doesn't have to cost much either. In fact, you can download all the protection you want from the Internet for free if you so wish.
VIRUSES
Viruses are usually sent by e-mail, although they can be picked up from any infected removable storage device. This could be a memory stick, CD or even a floppy disk. Infected websites are another source of infection. It's wise not to share removable media unless you know that it doesn't contain a virus. E-mail viruses normally come as an attachment, and the golden rule is to never open an attachment unless you are quite certain that it is safe to do so. Even if you know the sender, don't assume that he or she actually sent the mail to you in the first place. Most viruses propagate by sending themselves out to everybody in the address book of an infected computer. Your contact may have his or her address stored on dozens of other computers and would be completely unaware that the virus is using it.
If you receive an unsolicited e-mail which tempts you to visit an 'unusual' or interesting website, there is every likelihood that it is no more than a ploy to infect you with a virus, so be warned!
Viruses can cause all sorts of problems. They can physically damage your computer by telling it to switch off the cooling fan, or completely format your hard disk causing you to lose everything you had stored on it. Some will corrupt files or send your files to all your contacts for them to see. Others obtain your personal details and use your credit cards. Many viruses are little more than nuisance value because they just flash words on your screen, but unfortunately the more malicious ones seem to be the most successful.
Beware of E-mails warning you of a virus and asking you to forward the warning to everybody in your address book. These are usually hoaxes and are no more than chain letters. To find out if you have received a hoax warning check:
http://vil.mcafee.com/hoax.asp USING ANTIVIRUS SOFTWARE
You can buy Antivirus software from any computer store, and it's not expensive. Norton Antivirus will set you back around £40 to purchase and perhaps £15 a year for updates. But there are many others available including McAfee, F-Secure, Panda and Sophos. Alternatively you can download AVG Free Antivirus Software from
http://www.grisoft.com or Avast
http://www.avast.com/ But remember, new and more dangerous viruses are being discovered all the time. So it's important that you regularly update your antivirus program at least once a week (more often if possible) by downloading the latest virus definitions from its website.
A comprehensive list of the Anti-virus software available can be found at
http://www.pcmag.com/category2/0,2806,4796,00.aspSPYWARE
Spyware usually consists of small programs known as Trojans. They can be planted on your computer when you visit certain websites, or download shareware. Trojans conceal themselves inside programs and spy on your surfing habits, relaying information back to the website owners. At worst spyware can contain a keylogger which will record every word you type and send it to a cyber criminal living half way around the world. Often, spyware arrives in the form of a 'cookie' which is a tiny data file that a website sends to your browser to store on your computer's hard drive for later retrieval. The stored data is then sent back to the website every time you visit that site. The data can contain information such as a user name and password, items you are purchasing, or other text information the Web site has been set up to ask you for. Not all cookies are spyware though. Many websites (e.g. PC-Pals) drop cookies onto your computer to help you browse their website faster by alerting you to any new additions since you lasted visited it.
Unfortunately, not all antivirus software can detect spyware, but there are several free downloads which will weed out these Trojans. One is Ad-Aware which can be obtained from
http://www.lavasoftusa.com If you want a list of software which is known to be spyware look at
http://www.spychecker.com You might then wish to consider whether you want to continue using it. Another excellent SpyWare remover is SpyBot Search and Destroy, which is available free-of-charge from
http://www.safer-networking.org or Spyware Blaster
http://www.javacoolsoftware.com/spywareblaster.html Although you should only use one antivirus software software at a time, it does no harm to have several different antispyware programs since they all tend to detect different types of spyware.
HACKERS
Once you are connected to the Internet your computer is wide open to attacks from hackers. Information passes in and out of your computer through 'ports', and anyone with sufficient knowledge can gain access through one of your computer's open ports. Hackers use scanner programs to search for vulnerable Internet users. Once they find a computer which allows them access, they can have full control of it if they wish to do so. They can access your files, passwords, bank accounts and personal details. They may choose to use your computer as a 'zombie' to make Denial of Service(DOS) attacks on websites or Internet Service Providers. If you want to learn more about DOS attacks, look at
https://grc.com/default.htm If you are using a router to access the internet then you will already have a great deal of protection. However, if you are using dial-up you can install a personal firewall. Such programs can be purchased from computer stores, or downloaded for free. One of the best is Zone Alarm.
http://tinyurl.com/nv6hw The basic version is free, but you can, if you wish, purchase Zone Alarm Pro which gives the same protection, but provides more information about the source of the attack. The vast majority of people use the free version because even if you know who is attempting to hack into your computer, there's not really much you can do with the information.
If you want to check how vulnerable your computer is, click on Shields Up
http://grc.com/x/ne.dll?bh0bkyd2 It?s a security site which will attempt a 'friendly' hack, and will inform you if it has succeeded or failed. Firewalls only allow programs of your choice to access the Internet and will make your computer 'invisible' to potential hackers by closing its ports. Another security site which will attempt a 'friendly' hack and also perform a free virus check is
http://tinyurl.com/mxc83 Yet another useful site is
http://www.pcflank.com which provides many differing simulated attacks with which to test your PC's defences.
WINDOWS UPDATES
Microsoft release frequent security patches for all editions of Windows and Internet Explorer. By clicking
http://v4.windowsupdate.microsoft.com/en/default.asp will scan your computer and advise you of any security patches you should acquire. This is a free service.