Top Internet Security “things to do”

Howdy one and all and a great big welcome back to this weeks fun filled adventure of The Weekly Geek.

Back in July I started on how to secure you computer (Basic Security Tips) and I have been working on Intermediate and Advanced tips ever since then, today I wanted to release a quick checklist.

Securing Your Computers, Network and Servers

Things to do:

  1. Turn on Windows Critical Updates – Schedule Auto Update.
  2. Install and configure for automatic update (hourly) a current anti-virus program (less than 1 years old).
  3. Install a Hardware firewall (router) and update it (quarterly).
  4. Install a new Software firewall (XP’s, Zone Alarm, Kerio) and update it (weekly).
  5. Configure you e-mail client (Outlook, Eudora, Pegasus) for security.
  6. Configure your browser (Internet Explorer, Opera, Netscape) for security.

  7. Install a Pop up blocker.
  8. Install and configure a Spam filter.
  9. Install update and run a current Anti-Trojan program.
  10. Constantly run a Cookie watching program.
  11. Install update and run a current anti-spyware tool or two.
  12. Properly secure your wireless network or hire someone to do it for you.
  13. Install HOST file.

Things NOT to do:

  1. Don’t pirate software, music or anything – Software, Music and Video swap sites.
  2. Don’t let your kids (grandkids) steal/pirate.
  3. Don’t use any file sharing or peer-to-peer internet networks.
  4. Do not open “strange” e-mails (My Naked Wife, Anna Kournikova, The IRS wants you, The FBI noticed you). They are infections looking to happen.
  5. Never respond to a pop up ad, not even the warnings
  6. Never respond to an unsolicited email (SPAM) not to remove or win $2 million.
  7. Don’t browse adult or questionable sites – drive by downloads are commonplace in those types of sites.
  8. Don’t install a “toolbar” unless you:
  1. Know what a tool bar is.
  2. Know exactly who made the toolbar.
  3. Know what you are going to use the toolbar for.

Continue reading

System Recovery / System Restore

Hello and welcome back to another exciting and fun filled edition of The Weekly Geek. In this weeks edition we are going to go over Microsoft Windows built in self healing options.

The first and most widely known is available in Windows ME and XP only, it is the “System Restore” feature.

Periodically the computer takes a snapshot of your hard drive, if you have a problem you can pick a restore point that was taken before the problem occurred and bingo, you are back in business. The beauty of this option is that you can also manually create a restore point. If you are going to make hardware or software changes it is recommended that you create a restore point. Regardless of the situation, let’s go ahead and create a restore point and see how to recover (restore) your system.

First backup all of your personal data (documents, files, spreadsheets, email and the such).

Now, go to “Start | (All) Programs | Accessories | System Tools | System Restore”.

Click on the circle (radio button) “Create A Restore Point” then select “Next”. Continue reading

Sony Sucks

Ok, there I said it. No, I don’t feel any better!

A couple of years ago (2005) Sony installed a Rootkit inside some of it’s music CD’s. They had to replace the CD’s or give refunds.

According to Wikipedia a Rootkit is “a set of tools used by an intruder after cracking a computer system. These tools can help the attacker maintain his or her access to the system and use it for malicious purposes.” They gain access by literally hiding within the operating system which makes them difficult to remove.

F-Secure has (once again) found Sony at it again, this time with hardware. A new USB drive and fingerprint reader installs not one but two Rootkits on your computer. Now Sony may have a better excuse this time using “security” as a factor. You see all security can be bypassed, it is just a matter of how. By using a Rootkit to “hide” the fingerprint readers files and constraints, it is much harder to hack and thus it “slows down” anyone attempting to access your computer or memory stick via the reader. This slowdown is only effective until someone figures out how about the Rootkit and then reverses it to do any of their bidding. Continue reading