Security your computer

Feeling Insecure?

An insufficiently protected computer is at risk for damage by virus, Trojan or worms. The owner of an insecure computer is at risk for Identity Theft, Stalking/Harrassment, and legal action for crimes perpetrated by hackers.

Understanding and implementing basic security and privacy measures for your home can go a long way towards protecting your family, your finances, and your computer.

FIRST THINGS FIRST

What is a Firewall?

A firewall is a system designed to prevent unauthorized access to your computer or network (a network is a connection of two or more computers).

Do I need a firewall?

Take this short quiz to help you decide what is right for you:Will your computer ever be connected to the Internet or any other computer?If the answer is yes, you need a firewall.

What Will a Firewall Do for Me?

If your firewall is properly configured and updated, it will stop “most” hackers from gaining access to your computer. A hacker breaks into your computer to get personal information like credit card numbers, social security numbers, bank account numbers or to use your computer under their remote control to do things like that to other computers.

Keep in Mind

A firewall is not 100% effective. New hacker programs and methods are being developed everyday. That is why firewall applications need to be regularly updated. Updates for firewall applications are a must to keep up with these new methods, just like updates to your anti-virus software are necessary to protect you from the latest virus.

What are computer viruses, Trojans and worms?

Simply stated, a virus, Trojan or worm is a small program written to cause harm to one or more computers or networks. A Virus, Worm or Trojan can also be designed to retrieve information from your computer to be delivered to an attacker for future use. For example, credit card information, passwords, and security access codes.

More specifically, a virus is a parasitic program designed to enter a person’s computer clandestinely. The virus attaches itself to files or boot sectors and is self-replicating.

A Trojan (or Trojan horse) is a malicious program that pretends to be a benign application. It is designed to cause your computer to do something that is unexpected. Since it does not spread (not self-replicating) it is not really a virus.

A worm is a parasitic program designed to replicate itself on your computer and then spread to other computers via email (through your address book or contact list).

What types of files are most likely to be infected?

Programs of the following types are the most likely to be infected with a virus. New viruses are developed daily, so this list is not, nor can it be all-inclusive.

* exe

* com

* vbs

* mp3

* drv

* sys

* bin

* script files

* macros

What can I do to protect my computer?

* Only download or accept files from reliable sources.

* Use a firewall to block unauthorized access to your computer.

* Install a good anti-virus program and keep it updated

* Scan all e-mail attachments and downloaded files before opening

What is Spyware/Adware?

Spyware is a type of program that gathers personal information from your computer and relays it back to another computer, generally for advertising purposes. These programs can also change your computer’s configuration, force open ads or redirect your browser.

Often, when you download freeware and shareware programs (such as Kazaa or Wild Tangent), you unknowingly trigger adware by accepting an End User License Agreement.

Why is spyware dangerous?

Adware and spyware not only pose privacy and security threats, these programs substantially slow down your computer because of the enormous amount of resources required to process and transmit data (and open all of those pop-up windows!). Oftentimes, your computer is not able to process legitimate programs because of the toll these programs are taking on your computer. Aside from your computer crashing, these types of programs may leave security holes that make your computer susceptible to exploitation by hackers.

How do you know if there is spyware on your computer?

Your computer may exhibit some or many of these symptoms:

* Endless pop-up windows

* Your home page has changed

* Strange toolbars on your browser

* Unfamiliar icons in your taskbar

Your computer is sluggish, and has a hard time opening programs or saving files

How can you prevent spyware from being installed on your computer?

* Be wary of free downloads

* Always read the End User License Agreement before installing new programs

* Don’t click on links within pop-up windows (click the “X” icon in the titlebar to close)

* Adjust your browser preferences to limit cookies and pop-up windows

* Install an Anti-Spyware Program

How to Recognize Spyware

The following tips are not comprehensive, but are common indicators that spyware may be running on your computer:

* Your computer receives a large amount of pop-up windows, even when you are not browsing the Internet. You may also receive a lot of unexpected or unusual errors.

* When you browse the internet, you are unable to choose webpages, unable to use certain keys or mouse buttons, or are redirected to different pages.

* You see new toolbars in your Internet browser, or unfamiliar icons in your task tray or on your desktop.

* The homepage of your browser or your search function have been changed.

* Your computer or Internet connection seems much slower than usual.

Avoiding Spyware

* Avoid downloading free programs or applications from unfamiliar websites. Download only from trusted sources.

* Avoid downloading anything from an e-mail link unless you are certain it is trustworthy; some spammers advertise anti-spyware programs that will in fact install more spyware on your computer.

* Never click any links in pop-up windows. Always use the X icon in the title bar rather than clicking “Close” in the window. These pop-ups may indicate spyware.

* Ask your network administrator for help in securing your browser. Many newer browsers offer a pop-up blocking option that will help eliminate the inconvenience and potential threat of advertisement windows.

* Use a firewall. These programs will alert you when suspicious software is being installed on your computer, and may help prevent spyware.

* If you download software, scan it with a current and trusted virus-checker; some newer virus scans include spyware and will alert you if there may be a threat.

Coping with Spyware

If you think your computer may have had spyware installed on it, you should run a legitimate anti-spyware program. Ad-Aware, SpySweeper, PestPatrol, and Spybot Search and Destroy are well-known and trustworthy programs that will search your computer for spyware and eliminate it. Always make sure to use the most current version of these programs available, as spammers continually create new software. Some virus scanners will help you remove spyware as well, although these are often less effective than a dedicated spyware program.

COMMON THREATS

These are some of the most common dangers of unsecured computers online and unsafe practices:

What is hacking?

In the truest sense of the word, a “hacker” is a dedicated programming expert who believes in sharing his expertise and experiences with other hackers. A hacker does not believe in vandalizing or maliciously destroying data, or in stealing data of any kind. A “cracker” is a cyber burglar or vandal – an individual or group intent on causing malicious harm to a network or computer, or to steal information beneficial to themselves like passwords, credit card numbers and the like. For ease of use, the term “hacker” is used here to refer to either a hacker or cracker, as someone who enters or tries to enter your computer or network without authorization.

What kind of information can a hacker steal from my computer?

Personal information, names address, financial information, even the account information for your ISP and passwords, in short anything stored on your computer can be obtained by a hacker. A Trojan may record each and every keystroke you make, save the information to a hidden file, and automatically upload it to the hacker’s computer.

What else can a hacker do?

There are a number of reasons why a hacker would want to break into your computer. He may use your computer and ISP account for illegal activity, like distributing child pornography. One of the most recent uses of Trojans is to cause DDoS (distributive denial of service) attacks. In a DDoS attack, the client commands all of the “servers” located on individual PCs to attack a single website. Thousands of individual PCs can be commanded to access a website like eBay or Yahoo at the same time, clogging the site’s bandwidth and causing an interruption of service.

What can I do to protect my computer?

* Only download or accept files from reliable sources.

* Use a firewall to block unauthorized access to your computer.

* Install a good virus scanner program and update virus information files often

* Do not keep passwords, bank or financial account numbers, social security numbers or other personal and confidential information on your computer’s hard drive.

What are computer viruses, Trojans and worms?

Simply stated, a virus, Trojan or worm is a small program written to cause harm to one or more computers or networks. A Virus, Worm or Trojan can also be designed to retrieve information from your computer to be delivered to an attacker for future use. For example, credit card information, passwords, and security access codes.

More specifically, a virus is a parasitic program designed to enter a person’s computer clandestinely. The virus attaches itself to files or boot sectors and is self-replicating.

A Trojan (or Trojan horse) is a malicious program that pretends to be a benign application. It is designed to cause your computer to do something that is unexpected. Since it does not spread (not self-replicating) it is not really a virus.

A worm is a parasitic program designed to replicate itself on your computer and then spread to other computers via email (through your address book or contact list).

What types of files are most likely to be infected?

Programs of the following types are the most likely to be infected with a virus. New viruses are developed daily, so this list is not, nor can it be all-inclusive.

exe

com

vbs

mp3

drv

sys

bin

script files

macros

What can I do to protect my computer?

* Only download or accept files from reliable sources.

* Use a firewall to block unauthorized access to your computer.

* Install a good anti-virus program and keep it updated

* Scan all e-mail attachments and downloaded files before opening

What is Identity Theft?

Identity theft, or identity fraud, refers to all types of crimes in which someone wrongfully obtains and uses the personal information of another in such a way that involves fraud or deception, usually for financial gain. Identity Theft is one of the fastest growing crimes in America and other countries around the world.

Your personal data such as your social security number, your bank account or credit card number, telephone calling card number, and other valuable identifying data, including your date of birth, can be used by the wrong persons to personally profit at your expense. Using such information, unauthorized persons can not only wreak havoc with an individual’s personal finances but can even take over their identity altogether amassing enormous debts and even committing criminal acts in the name of their victims.

The effect on victim’s lives can be devastating both financially and emotionally and can take years to recover.

What to do if you are a victim of ID Theft

If you are a victim of identity theft, the Federal Trade Commission recommends a four-step action plan:Place a fraud alert on your credit reports, and review your credit reports.Close the accounts that you know, or believe, have been tampered with or opened fraudulently.File a complaint with the Federal Trade Commission.File a report with your local police or the police in the community where the identity theft took place.For details on how to complete each of these four steps, visit the FTC’s Identity Theft Site
What is Cyberstalking?

Although no universally accepted definition exists, it is generally considered as use of the Internet, e-mail or other electronic communications device to stalk or harass a person. Stalking is defined as repeated harassing or threatening behavior.

Can cyberstalkers really be dangerous?

YES! If a stalker takes it off-line and you start receiving snail mail or harassing phone calls from the stalker then they know where you live. You should contact your local law enforcement agency or the FBI immediately. When a stalker takes it “off-line” they are far more likely to pose a physical threat to the individual being stalked.

What should I do if I think I am being stalked or harassed online?

* Tell the person harassing you in straight forward terms, “Leave me alone, stop harassing me. Do not contact me again.” If you are in IM or chat, log off immediately and stay off-line for at least 24 hours.
* Do not reply to anything else the harasser says. No replies to emails, taunts or lies said about you. Do NOT REPLY! Harassment is a form of power over you. If you take that power away from the harasser and refuse to “play their game” then you have become empowered instead. You are now in charge!
* If the problem only exists IM or chat, go off-line and completely change your online identity. This means changing your nickname and all the information you have listed in your profile. Everything must be changed!
* In the case of email harassment you need to contact the harasser’s ISP (Internet Service Provider) and make a complaint.
* Stay out of problem chat rooms.
* Don’t give out your online ID except to “very” trusted friends and tell them not to give it out to anyone else.
* Be certain all of your online profiles do not contain any personally identifying information about you, such as age, sex, address, phone number, school attended and teams you play on or where you work.
* Be sure logging is enable In your IM and chat clients.
* Keep all log files that pertain to the stalker for evidence.
* Keep all e-mails that originate from the harasser or stalker and any replies you sent for evidence.
* If you feel you or your family is in physical danger from this stalker, or the stalker knows where you live or has made physical threats against you- CALL YOUR LOCAL LAW ENFORCEMENT AGENCY OR THE FBI IMMEDIATELY!
Don’t Be Lured By “phishing”!

“Phishing” is the use of e-mails or pop-up boxes that contain links to sites that ask you to enter or confirm information, such as personal information, financial information, passwords, or other sensitive information. Here’s an example:

Dolores receives an e-mail that appears to be from her bank asking her to click on the link provided to update her account information. She clicks on the link and a web site opens that looks just like her bank’s web site. She enters her information into an online form, hits send, and believes she has taken the appropriate action. In fact, she has just handed her personal information to a scammer! The e-mail was a phishing e-mail.

The sites these scams link to often look like the legitimate business they pretend to be. But the sites are phony and the scam is used to lure you into providing information that can used by criminals to steal your identity.

How do you recognize “phishing”? First and foremost, never click on links in e-mails or pop up boxes that ask you to verify or update personal information. Legitimate businesses do not ask for this information through e-mail links and pop-up boxes. Type the name of the link to businesses you deal with online yourself or add the links to your Favorites.

Your online activities (such as posting in newsgroups, signing up for services, or accepting cookies) allow marketers to capture information about you from the websites you visit, and many of them are handing out your data to strangers. Lost privacy cannot be recovered, and the information we share can be used against us.

Nicknames and Profiles
Never use personally identifying information when choosing an e-mail address or profile name: your name, sex, age or birth year, or your location. Instead, choose a “profile name” based on a hobby or other non-identifiable characteristic.

Smart Passwords
Change your password frequently. Create passwords as combination of special characters, numerals and letters. Do not use words in dictionary or personal details as part of your password since these are easier to crack.

Always Log Out
If you are using a public computer and a web-based mail, always be sure to log out of your account. Just directing the browser to a new page doesn’t log you out, and leaves your account accessible to anyone else who sits down at that computer.

Read the Fine Print
Always read the privacy policy of a website before you type information into a form or share it with the company. If they don’t have a privacy policy listed, don’t share your information!

Treat E-mail Like Postcards
Never email personal or financial information, assume that it can be read by third parties.

Free isn’t always Free
Be very cautious when downloading “free” programs online. These programs can include spyware, malware or viruses that jeopardize your personal information.

Check for the Lock
When submitting personal information online, always check the URL for https

 and a lock icon in the bottom right corner of your browser.

Know Who You Are Dealing With
Only do business with creditable companies.

Keep Up-to-date
Be sure that your anti-virus program is always up-to-date. Download and install patches (updates) for your operating system, firewall, browser, e-mail client etc.

Related Topics

For parents

Worried About Your Online Child?

Read more →

Learning center

New to the ‘net? We’ve put together a section of our site just for you!

Read more →