Sei sulla pagina 1di 8

Six steps to computer security (quick lesson)

Free, online classes, available 24/7: www!pcom/"o/learnin"center


!ttp://!#$%&7www#!pcom/articles/view'rticle/p/course()/4$*$+web,a"e()-%$$$$$.
/, online class
(n to)ay0s internet a"e, t!e c!ances o1 your computer an) your )ata bein" compromise) are 1airly
!i"! 2uckily, t!ere are ways you can secure your computer an) protect your )ata (n t!is brie1,
you0ll learn six simple steps t!at will !elp you protect an) secure everyt!in" you0ve worke) so
!ar) to store on your computer 3!e six steps are as 1ollows:
4se an internet 1irewall
4p)ate your computer0s operatin" system
5ake t!e most o1 your antivirus so1tware
,revent spyware, a)ware, an) spam
6!oose a reputable pop7up blocker
,!ysically sa1e"uar) your computer
(n t!is quick lesson, you0ll learn !ow to protect your notebook an) )esktop computers 1rom
!ackers, crackers, viruses, spam an) ot!er t!reats 8ou0ll also 1in) out !ow to p!ysically protect
your computer 1rom t!e1t an) ot!er potential )an"ers 's t!is is an on7)eman) class, all lessons
are available w!en t!e class enrolls
4se an internet 1irewall ,a"e 2 o1 7


'n internet 1irewall can !elp prevent outsi)ers, suc! as !ackers, 1rom accessin" your computer
via t!e internet (1 intru)ers are allowe) insi)e your system (unknowin"ly, o1 course9), t!ey can
be quite )i11icult to stop an) can c!an"e or )elete 1iles, use your computer to sen) unwante)
emails to ot!ers, launc! attacks on ot!ers, an) "enerally cause )ama"in" e11ects
Firewalls come in two 1orms: !ar)ware an) so1tware ' !ar)ware7base) 1irewall is usually a
router, or a personal computer t!at0s been tweake) to act as a 1irewall to t!e rest o1 your !ome
network 3o)ay, !owever, many internet 1irewalls use) in t!e !ome or small o11ice settin" are
so1tware7base) 3!ese 1irewalls can be acquire) 1rom a t!ir) party, suc! as :one 2abs0
:one'larm ;r, t!ey mi"!t alrea)y be built into your operatin" system, suc! as (6F ((nternet
6onnection Firewall) or <in)ows Firewall in 5icroso1t <in)ows =,, )epen)in" on w!ic!
service pack you !ave installe)
(1 you )on0t use a 1irewall, attackers can 1in) an) attack your computer wit!in %> minutes o1
connectin" to t!e internet (1 you use an ?always7on? 1orm o1 internet access, suc! as cable
mo)em or x@S2 ()i"ital subscriber line), it0s especially important t!at you install a 1irewall an)
keep it up to )ate
/ar)ware 1irewalls
/ar)ware 1irewalls sit between your computer an) your connection to t!e internet Aouters are
currently t!e most popular 1orm o1 !ar)ware 1irewall ' router is a small )evice wit! usually 1our
or more ports on t!e back into w!ic! you plu" in Bt!ernet cables (1 purc!asin" a router, you
s!oul) select one t!at !as more t!an enou"! ports to accommo)ate t!e number o1 computers on
your !ome network
Some cable an) x@S2 mo)ems !ave built7in 1irewalls, as )o many <',s (wireless access
points) Aea) t!e manual t!at came wit! your equipment or call t!e manu1acturer0s tec!nical
support )epartment to 1in) out
(nstallin" a !ar)ware 1irewall can be )one quickly an) easily For example, assume you !ave a
cable or x@S2 mo)em t!at you use to access t!e internet, an) your mo)em )oes not !ave a built7
in 1irewall 3o install a !ar)ware 1irewall, suc! as a router, )o t!e 1ollowin":
,lu" an Bt!ernet cable, suc! as t!e commonly use) 6ate"ory >, into t!e C(6 (network inter1ace
car)) on your computer
,lu" t!e ot!er en) o1 t!e cable into an Bt!ernet port on t!e back o1 t!e router
,lu" a secon) Bt!ernet cable into a secon) port on t!e router an) t!e ot!er en) into t!e back o1
t!e cable or x@S2 mo)em Doila9
(mme)iately a1ter you set up your router/1irewall, c!an"e t!e )e1ault user name an) passwor)E
t!e )e1aults are well7known
(1 you use a wireless router, enable t!e %2&7bit <B, (<ire) Bquivalent ,rivacy) encryption key
1or more protection <it!out it, your nei"!bors coul) connect to your wireless !ome network
wit!out your knowle)"e
<!en consi)erin" a !ar)ware 1irewall, note t!at many o1 t!e popular makes an) mo)els, suc! as
t!e 2inksys FBFSA4% 4 ,ort 6able Aouter, s!oul) run un)er G*$ 6ompare t!at to t!e cost o1
replacin" t!e )ata on your computer an) t!e value o1 your time spent cleanin" up a1ter your
computer0s been !acke) 77 you may 1in) t!at G*$ is well wort! it

So1tware 1irewalls
(1 you !ave )ial7up access to t!e internet, you )on0t nee) a !ar)ware 1irewall /owever, you )o
nee) a so1tware7base) 1irewall So1tware 1irewalls are popular wit! t!e !ome user community
an) available 1rom a wi)e variety o1 ven)ors 5any ven)ors o11er 1ree so1tware to !ome an)
e)ucational users, or at least 1ree trial versions 3!ese ven)ors inclu)e, but are not limite) to, t!e
1ollowin":
Flack(6B ,6 ,rotection: (nternet Security Systems
Herio ,ersonal Firewall: Herio 3ec!nolo"ies
Corton ,ersonal Firewall 2$$4: Symantec 6orporation
;utpost Firewall ,A;: '"nitum
3iny ,ersonal Firewall: 3iny So1tware, (nc
:one'larm ,ro: :one 2abs
3o set up a so1tware 1irewall, )o t!e 1ollowin":
@isconnect your computer 1rom t!e internet
(t0s best i1 you can complete 1irewall installation be1ore you0ve ever connecte) to t!e internet, but
t!at0s not always possible
Bnable your operatin" system0s 1irewall or acquire a t!ir)7party so1tware 1irewall an) install it:
(1 it0s built into your operatin" system: For example, to enable <in)ows Firewall in <in)ows =,
wit! Service ,ack 2 installe), click Start I 6ontrol ,anel I I <in)ows Firewall (n t!e <in)ows
Firewall )ialo" box, click t!e ;n (recommen)e)) option, an) t!en click ;H
(1 it0s t!ir)7party so1tware: (nstall t!e so1tware accor)in" to t!e manu1acturer0s )irections
4sually, it0s as simple as clickin" an (nstall button in t!e so1tware inter1ace or locatin" an)
)ouble7clickin" t!e Setupexe 1ile
'1ter installin" a 1irewall, you nee) to c!eck t!e settin"s to make sure you0re in)ee) as protecte)
as possible 3!is can be tricky sometimes, so i1 you nee) !elp, )on0t !esitate to ask a
knowle)"eable 1rien) or t!e manu1acturer0s tec!nical support sta11
Sometimes i1 you set t!e 1irewall 1ilters too !i"!, you spen) more time allowin" tra11ic in an) out
t!an workin" 8ou may !ave to re7a)Just t!e settin"s as you "et use) to t!e 1irewall settin"s
<it! a 1irewall in place between your computer an) t!e internet, you0re well on your way to
muc! improve) computer security /owever, )on0t rely only on your 1irewall 1or protection '
1irewall can be breac!e), an) once t!at !appens, you0ll nee) to 1all back on ot!er computer
security measures to )e1en) your computer0s resources a"ainst intru)ers
Secure passwor)s
(t0s important t!at you use secure passwor)s on t!ese )evices ' secure passwor) is one t!at is
!ar) to "uess 8ou create a secure passwor) by usin" a combination o1 uppercase an) lowercase
letters, numbers, an) symbols ' "oo) met!o) to use is to t!ink o1 a sentence or a son" title t!at
you likeE 1or example, Kot 3o Ket 8ou (nto 5y 2i1e 8ou coul) use K2"yi2m2 (t0s easy to
remember 1or you an) !ar) 1or ot!er people to "uess
4p)ate your computer0s operatin" system ,a"e # o1 7


Cow t!at you !ave t!e 1irewall in place, you s!oul) keep your computer0s most 1un)amental
so1tware 77 its operatin" system 77 current by applyin" t!e most current so1tware up)ates Failure
to )o so leaves your computer extremely vulnerable because 1laws in operatin" systems are
usually well7known an) tar"ete) by !ackers an) crackers
Aunnin" an up)ate involves applyin" service packs an) critical security up)ates to your
operatin" system Fecause service packs are normally very lar"e 1iles, your best bet is to install
t!em 1rom a 6@ t!at contains t!e necessary 1iles 8ou can also connect to your operatin" system
ven)or0s website to )etermine w!ic! critical up)ates or patc!es are require)
'lways apply one maJor service pack or up)ate at a time, an) make sure everyt!in" works
correctly be1ore installin" t!e next one 3!at way, i1 t!ere0s a problem, you know w!ic!
installation cause) it
'1ter you run t!rou"! t!e up)ate process, you mi"!t 1in) t!at you !ave to repeat t!e process
several times to "et all o1 t!e up)ates 3!is can occur i1 some o1 t!e latest up)ates require an
earlier up)ate be applie) 1irst 8ou may !ave to restart your computer a1ter eac! up)ate is
applie)
<in)ows 4p)ate
(1 you use a current <in)ows operatin" system, suc! as <in)ows =,, you can use t!e <in)ows
4p)ate 1eature in to manually )ownloa) an) install up)ates 1rom t!e 5icroso1t <in)ows 4p)ate
website 6lickin" t!is link starts an automatic searc! o1 your system to )etermine w!ic! up)ates
are available to you 3o automatically )ownloa) up)ates now an) in t!e 1uture, enable t!e
'utomatic 4p)ates 1eature in (click Start I 6ontrol ,anel I Security 6enter on your computer)
5ake t!e most o1 your antivirus so1tware ,a"e 4 o1 7


'n antivirus so1tware pro"ram !elps protect your computer a"ainst most viruses, worms, 3roJan
!orses, an) ot!er malicious co)e 5any new computers come wit! antivirus so1tware alrea)y
installe) /owever, antivirus so1tware must be up)ate) re"ularly, w!ic! usually requires a
subscription 1rom t!e so1tware manu1acturer (1 you )on0t !ave a current subscription 1or your
antivirus so1tware, your computer is vulnerable to new t!reats 3!ere1ore, you s!oul) install
antivirus so1tware, use it, an) keep it current 4p)ates are usually available at least once a week,
alt!ou"! t!ey can come more o1ten )urin" perio)s o1 !eavy virus activity on t!e internet
Some popular antivirus so1tware packa"es are available as 1ollows:
Corton 'ntivirus: Symantec
DirusScan: 5c'1ee Security
F7,rot 'ntivirus: FA(SH So1tware (nternational
,67cillin (nternet Security: 3ren) 5icro
'1ter you0ve installe) your antivirus so1tware, you s!oul) con1i"ure it to c!eck all 1iles,
incomin" an) )ownloa)e) 1iles, as well as email messa"es an) attac!ments (n ot!er wor)s,
con1i"ure it to c!eck all new 1iles an) perio)ically scan ol) ones Set t!e ?c!eck 1or up)ates?
sc!e)ule 1or a )aily c!eck
Bmail attac!ments
@on0t open or launc! any email attac!ments t!at you0re not expectin" (especially i1 t!ey !ave t!e
extensions bat, com, exe, lnk, or pi1) Dirus writers intentionally make email messa"es an)
attac!ments appear as t!ou"! t!e 1iles are comin" 1rom a 1rien) or co7worker by usin" someone0s
a))ress book to pass t!e virus on <!en you receive an unexpecte) attac!ment, c!eck wit! t!e
person w!o sent it to you be1ore openin" it, or )elete t!e messa"e an) t!e attac!e) 1ile wit!out
openin" or launc!in" it at all
S!are) !ar) )rives
Diruses an) network attacks can sprea) t!rou"! a network by 1in)in" s!are) !ar) )rives (1 you
nee) to s!are access to 1iles, limit t!at access to a speci1ic 1ile or 1ol)er 5ake sure t!at your
s!arin" options are 1or a speci1ic person wit! rea)7only access, an) use a secure passwor) Cever
s!are your operatin" system 1ol)er or any 1ol)er t!at contains pro"rams
,rotect yoursel1
<it! a t!in client, all applications run on a server, w!ic! makes it easier to protect your business
1rom spam an) spyware
,revent spyware, a)ware, an) spam ,a"e > o1 7


5any websites an) 1reeware so1tware tools spy on users an) report activities to t!ir) parties
w!o, in turn, use t!at in1ormation to sen) you spam emails by t!e !un)re)s (1 you sur1 t!e
internet, your computer will "et spyware an) a)ware (1 you (or members o1 your 1amily) s!are
1iles or )o instant messa"in", you0ll "et spyware an) a)ware even 1aster
3!e best )e1ense a"ainst spyware an) a)ware is not to )ownloa) it in t!e 1irst place /ere are
1ew !elp1ul tips t!at can !elp protect your computer 1rom )ownloa)in" potentially )an"erous
pro"rams:
@ownloa) pro"rams only 1rom websites you trust
Aea) all security warnin"s, license a"reements, an) privacy statements associate) wit! any
)ownloa)s
Cever click '"ree or ;H to close a win)ow (nstea), click t!e re) = in t!e upper7ri"!t corner o1
t!e win)ow or press 'ltLF4 on your keyboar) to close a win)ow
Fe cautious about usin" ?1ree? music an) movie 1ile7s!arin" pro"rams, an) be sure you clearly
un)erstan) all o1 t!e so1tware packa"e) wit! t!ose pro"rams
/owever, no matter !ow care1ul you are, you will pick up some o1 t!ese unsavory pro"rams an)
will nee) a way to "et ri) o1 t!em 8ou s!oul) )ownloa) an) install a spyware/a)ware c!ecker,
an) run it re"ularly as part o1 your secure computin" routine Some popular c!eckers are:
')7'ware: 2avaso1t
6<S!re))er: (nter5ute
Spybot 7 Searc! M @estroy: ,atrick 5 Holla 7 Sa1er Cetworkin" 2imite)
Spy Sweeper: <ebroot So1tware
Spam
Disit your (S, (internet service provi)er) website or call t!eir tec! support line to veri1y t!at
t!ey0re runnin" some type o1 spam an) antivirus scanner (n some cases, t!ey nee) to enable t!e
spam 1ilter 1or you or con1i"ure it to start catc!in" viruses be1ore t!ey "et to your computer (n
ot!er cases, you may nee) to "o to a website to con1i"ure t!e so1tware Bit!er way, you want a
system t!at )eletes virus attac!ments, scans all incomin" email, an) 1la"s messa"es t!at appear
to be spam
8ou can also set up email 1ilters wit!in your email client (suc! as ;utlook Bxpress, Bu)ora, an)
ot!ers) Some spam 1ilters mark email t!at appears to be spam by placin" NNNS,'5NNN in t!e
subJect line ;t!ers put t!e term =OS,'5 or a similar !ea)er in t!e mail 1ormat area 8ou can
set up 1ilters to 1in) t!ese messa"es an) move t!em to a separate inbox 1or you to )elete at your
leisure 3!ere are ot!er t!ir)7party pro)ucts, suc! as 6lou)mark Sa1ety Far, Spam'ssassin, an)
Fayesian 5ail Filter, t!at automatically remove known spam an) place t!e messa"es in a
separate inbox 1or you 3!is proce)ure keeps you 1rom !avin" to )eal wit! %$s to %$$s o1 spam
messa"es )aily to 1in) t!e 1ew messa"es you really nee)
Spyware an) a)ware
Spyware pro"rams can monitor system activity an) recor) personal )ata, suc! as passwor)s,
account names, cre)it car) numbers, an) ot!er sensitive )ata ')ware on t!e ot!er !an) is
so1tware t!at 1acilitates )elivery o1 unwante) a)vertisements, web pa"es, or ot!er content to a
)esktop, usually t!rou"! a web browser
Heep spyware out wit! security t!at0s built in
6ontrollin" spam on your own server may be more e11ective t!an 1armin" it out to an (S, /,0s
,ro2iant servers are t!e secure an) a11or)able option, w!et!er you0re buyin" your 1irst or
expan)in" your existin" server line
6!oose a reputable pop7up blocker ,a"e * o1 7


8ou s!oul) install a pop7up blocker, suc! as t!e Koo"le toolbar or S3;,Pilla, on your browser
or use an alternate browser t!at !as a pop7up blocker built in, suc! as 5oPilla Fire1ox an) ;pera
/owever, you !ave to be very care1ul !ere 8ou s!oul) avoi) 1reeware tools 1rom non7reputable
ven)ors 5any 1reeware tools !ave spyware in t!em 3!ey a)vertise t!at t!ey )o one t!in" t!at
you nee), but be!in) t!e scenes, t!ey contain pro"rams t!at can !arm your computer
S3;,Pilla is an all7in7one pop7up blocker, spyware an) a)ware killer, an) more
3!e best way to stop pop7ups is to never allow t!em to install t!emselves on your computer in
t!e 1irst place 8ou can )o t!is by stayin" away 1rom questionable websites, an) never
)ownloa)in" an) installin" 1iles 1rom non7reputable sources (1 you0re alrea)y wran"lin" wit!
pop7ups, never click buttons or links in t!e pop7up a) itsel1 Some pop7up a)s track personal
in1ormation on your computer wit!out you even knowin" it
(1 you0re runnin" <in)ows =, wit! Service ,ack 2, enable ,op7up Flocker in (nternet Bxplorer
8ou can )o t!is by clickin" 3ools I ,op7up Flocker I 3urn on ,op7up Flocker
'not!er approac! is to replace your browser 1rom time to time wit! anot!er browser t!at0s less
vulnerable to t!e ways t!at spyware attempts to install itsel1 in your computer 8ou can learn
about t!e browsers an) tools by rea)in" news"roups or )oin" searc!es o1 t!e ven)or websites
liste) in 3able %
,!ysically sa1e"uar) your computer ,a"e 7 o1 7


2ast but not least is t!e p!ysical sa1e"uar)in" o1 your computer (n ot!er wor)s, make sure t!at
your computer an) t!e )ata t!at it contains is in a p!ysically secure location
5ake backup copies
(1 your 1iles are important to you, back t!em up9 /ar) )rives can 1ail an) viruses or ot!er attacks
can )elete 1iles 1rom your !ar) )rive 3o make your backups easy an) quick to per1orm, or"aniPe
all o1 your )ocuments an) )ata 1iles in lo"ically name) 1ol)ers 8ou can t!en quickly copy
everyt!in" to :ip )rives, 6@s, or @D@s 3!ere are also backup pro"rams an) backup services
available Searc! your 1avorite searc! en"ine 1or t!ose terms, respectively, an) you0ll receive
more results t!an you can ima"e Fe sure to )o your researc! t!ou"! an) make sure t!e company
is reputable Fack up your 1iles on a sc!e)ule t!at you can maintain 77 )aily, weekly, or mont!ly
77 but not less 1requently
8ou )on0t nee) to back up your pro"rams or t!e operatin" system (1 you !ave !ar)ware
problems or your operatin" system (or pro"ram) )e"ra)es to a point t!at requires you to restore
it, it0s sa1est to install t!e operatin" system an)/or pro"rams 1res! an) restore only t!e )ata 1iles
1rom a backup ;peratin" system or pro"ram )e"ra)ation )oesn0t !appen overni"!t, but usually
accumulates over a perio) o1 time
Heep your backup copies secure
5aximum sa1ety requires a secure, separate location Aemember t!at i1 )ata on your computer is
sensitive, so are t!e backup copies o1 it 'ppropriately protect w!atever you create 8ou can store
your backup me)ia wit! 1rien)s or 1amily, or "o as 1ar as "ettin" a sa1ety )eposit box ()epen)in"
on t!e importance o1 your )ata to you) (1 you keep your backups next to your computer an) your
!ouse burns )own, you !aven0t protecte) your )ata at all
Fe cautious about len)in" an) borrowin"
'llowin" ot!ers to use your computer can be risky i1 you !aven0t appropriately protecte) your
)ata Forrowin" ot!ers0 systems also !as risks 8ou can leave sensitive in1ormation be!in)
mistakenly (1 t!e borrowe) computer is in1ecte) wit! spyware, you can ina)vertently leave a lot
o1 in1ormation be!in)
Aemember t!e value o1 secure )isposal
Finally, w!en your computer is rea)y 1or retirement, be sure to erase any sensitive )ata 1rom its
!ar) )rive an) 1rom a))itional stora"e me)ia 3!ere are utilities available to !elp you sa1ely
erase )ata 1rom your !ar) )rive ;nce suc! utility is @arik0s Foot an) Cuke Aea) t!e
in1ormation about t!is utility care1ully an) be sure you really want to )elete all t!e in1ormation
on your !ar) )rive be1ore runnin" it
@epen)in" on t!e me)ia, secure )isposal can be easy or )i11icult to )o correctly (but it0s almost
never su11icient to rely on a simple @elete comman)) (1 you0re not sure about t!e steps, ask
someone w!o is (nsecure )isposal o1 computer me)ia is one way in w!ic! i)entity t!ieves !ave
become so "oo) at w!at t!ey )o
3!ere0s muc! more in1ormation available on t!e /, website re"ar)in" most o1 t!ese issues Feel
1ree to enroll in some o1 t!e more )etaile) online courses to learn even more about protectin"
your )ata an) securin" your computer

Potrebbero piacerti anche