rbeckey
Well-Known Member
- Joined
- Jul 18, 2012
- Messages
- 1,560
- Reaction score
- 26
In my position at work I get inundated with unusual computer related problems. I know that some of you on this forum have much more computer knowledge than me, and it is likely that some of you have far less. I have learned a little through hard experience. I do not claim the attached letter is comprehensive, but a place to start if you have done little or nothing as of yet. It was written for a person who has little computer skill to be able to follow.
This is a long post, and not about rockets, but if your machine isn't running, no Rocketry Forum for you! If nothing else, even if you do have an IT degree, please read the section at the end about spyware. It really can save you some hassle, and maybe worse. There are huge privacy issues and I know two families who lost their OS due to massive spyware infections.
"In recent months it has come to my attention that many people do not have adequate security on their personal computers. The PCs here are automatically protected by the network, and are still susceptible to certain kinds of attacks. If your home computer is connected to the internet in any way, you must take certain precautions to safeguard your personal information. If you have a broadband connection, your risk is greatly magnified. With a few simple precautions you can secure your PC.
Most of us are aware of computer viruses that can infect our systems, and possibly lead to data corruption. The threat is much more serious than that. A type of virus called a Trojan can let another person completely control and access your home computer as if he were sitting at the keyboard. Do you use your PC for shopping, banking or taxes? All of this information can be copied from a distance, without your knowledge, if the right virus can get into your system.
If you have an antivirus program and do not regularly update the virus definitions (at least weekly) there are several recent viruses that will disable the antivirus program and any new version of it you install, but make it look as if were actually functioning. You must keep your virus definitions up to date AT ALL TIMES. There are settings in the antivirus software that will do this for you automatically. If you have not been seamlessly protected for the past year or so you must be certain that your system is free of certain viruses before you can trust the antivirus software to function correctly. Both the Symantec and McAfee web sites have online tools for this purpose.
Most viruses are spread via email. We have all seen the admonishments from the Network Administrator not to open certain emails because they contain known viruses. At home, you must use common sense. Do not open any email with a generic subject, such as "This is Cute" or "You'll love this." Set your email client not to open attachments that may carry viruses. In Outlook Express 6, this can be found under "Tools," "Options," "Security," "Virus Protection." You may disable this feature temporarily to view things from persons you trust, IF: They warn you in a separate message they will be sending an attachment AND you are certain they maintain adequate virus protection. Remember that the message containing a virus likely comes from a known person whom you have received email from in the past. The virus will email itself to you from their computer without their knowledge. Trust no one completely unless you are certain that they maintain adequate security on their own computer.
In addition to the threat of virus attacks, there are other types of attacks that Windows based operating systems are vulnerable to. One is called a port probe. This is traditionally called "Hacking." Ports are Windows utilities that are used by other programs to access the operating system. They allow third party software and device drivers to function in the Windows environment, among other things. If left unprotected they can also let unauthorized persons take control of your computer, destroy your operating system, or copy sensitive data. Antivirus software, even when functioning properly, does not protect your system from this kind of attack. A device or program called a firewall is required. In Windows XP Home and Professional systems a firewall is included in the operating system, but must be activated by the user. Follow the directions below to set up your firewall.
To enable or disable Internet Connection Firewall
1. Open Network Connections
2. Click the Dial-up, LAN or High-Speed Internet connection that you want to protect, and then, under Network Tasks, click Change settings of this connection.
3. On the Advanced tab, under Internet Connection Firewall, select one of the following:
a. To enable Internet Connection Firewall (ICF), select the Protect my computer and network by limiting or preventing access to this computer from the Internet check box.
b. To disable Internet Connection Firewall, clear the Protect my computer and network by limiting or preventing access to this computer from the Internet check box.
If you are using an older Windows operating system, you may down load a free software firewall called Zone Alarm, which is simple to use and highly rated. There are also other solutions available from antivirus companies and other freeware. I do not endorse any specific program, but you absolutely must choose and install one of these services. After you install a software firewall you may be asked to specify which programs are allowed to access the internet from your computer and vice versa. Do not allow access unless you can determine the purpose of the program involved.
If you have a broadband connection in your home, consider installing a router. This device allows multiple computers to share a broadband connection and can often be found for $30-40 after rebates at Best Buy, CompUSA or Circuit City. In addition to allowing several computers to connect to the internet or share a single printer, they offer hardware firewall protection for all connected machines. Some expert opinions are that a hardware firewall is more effective than a software firewall, but some software firewalls offer more control.
Another type of attack that is more recent and much less widely known is spyware and malware. These are very small and simple programs that are covertly installed in your computer while you are doing something as innocuous as surfing the web or reading email. Once again, even properly functioning antivirus software will not protect you from this threat. Typical malware and spyware reside quietly in your hard drive and track your movements on the web, sending a constant flow of information back to their owners about where you go and what you buy. They can also act as Trojans, which were defined above, or key loggers, which record every keystroke you make, and send that information to a specified person. Obviously, this could include private information and passwords. They also allow popup ads to proliferate on your computer. One symptom of this is popups that occur when you are not online. Internet browsers, such as Internet Explorer, use "cookies" to enable personalization of certain web content. This technology has been perverted to include tracking cookies, which can be used to track your movements on the web and target you for advertising. Another symptom of malware and spyware is that your computer seems to be taking longer to boot up or shut down, or that your internet connections seems slower than it used to be. That is because each of these programs uses a certain small percentage of your computer's resources to function, and as they add up, the deficit becomes noticeable.
There are several parts to solving this problem. The first and most simple is not to download and install anything from the internet that promises a free utility unless it is from a trusted, known source. Examples of free programs that include spyware or malware are "Weatherbug," "Comet Cursor," "Bonzi Buddy," and most notorious, "Kazaa" and other file sharing clients. Downloading and installing one file sharing program can result in as many as 200 unauthorized programs and cookies on your computer. If you require the use of one of these programs, search the web until you find a "cleaned" version of it.
Another required action is to disable ActiveX on your computer. Under "Tools" in the internet browser you will find "Options." Under "Options" is "Security" and "Custom Level." The ActiveX controls can be disabled there. ActiveX is a utility that can be exploited to run malicious software on your computer. If you have ever had your homepage changed to something you did not authorize, this is one very mild way ActiveX controls can be exploited.
A final and most effective method to control these pests is to acquire and use programs such as "Spybot" and "AdAware" that seek and destroy known spyware, malware and tracking cookies on your computer. Free versions of both are available for download. You must update the definitions of these programs and run them at least weekly. It is not uncommon for a first time user to find 200-300 unauthorized and identified malicious processes and cookies on their computer. One person I know found 600! Weekly totals after that will depend on your habits, but 30-40 is not uncommon. There is nothing found in these searches that has a legitimate purpose. If a certain program does not work after you delete the offensive content, which is common with "Kazaa" and other file sharing clients, then you must delete the entire program and find a cleaned version of it to install, or accept the risks of leaving your computer open to intrusion at any time.
I would also suggest that you go to the Windows Update page at Microsoft and install at least the Critical Updates as soon as possible. A link to Windows Update can be found under "Tools" in the top of the browser window.
If you attempt these security measures and find that you are already infected with an antivirus disabling virus, or ActiveX or other programs that you cannot seem to remove, contact a computer repair service for assistance. Remember that every day that you leave these matters unattended, YOU ARE AT RISK."
This is a long post, and not about rockets, but if your machine isn't running, no Rocketry Forum for you! If nothing else, even if you do have an IT degree, please read the section at the end about spyware. It really can save you some hassle, and maybe worse. There are huge privacy issues and I know two families who lost their OS due to massive spyware infections.
"In recent months it has come to my attention that many people do not have adequate security on their personal computers. The PCs here are automatically protected by the network, and are still susceptible to certain kinds of attacks. If your home computer is connected to the internet in any way, you must take certain precautions to safeguard your personal information. If you have a broadband connection, your risk is greatly magnified. With a few simple precautions you can secure your PC.
Most of us are aware of computer viruses that can infect our systems, and possibly lead to data corruption. The threat is much more serious than that. A type of virus called a Trojan can let another person completely control and access your home computer as if he were sitting at the keyboard. Do you use your PC for shopping, banking or taxes? All of this information can be copied from a distance, without your knowledge, if the right virus can get into your system.
If you have an antivirus program and do not regularly update the virus definitions (at least weekly) there are several recent viruses that will disable the antivirus program and any new version of it you install, but make it look as if were actually functioning. You must keep your virus definitions up to date AT ALL TIMES. There are settings in the antivirus software that will do this for you automatically. If you have not been seamlessly protected for the past year or so you must be certain that your system is free of certain viruses before you can trust the antivirus software to function correctly. Both the Symantec and McAfee web sites have online tools for this purpose.
Most viruses are spread via email. We have all seen the admonishments from the Network Administrator not to open certain emails because they contain known viruses. At home, you must use common sense. Do not open any email with a generic subject, such as "This is Cute" or "You'll love this." Set your email client not to open attachments that may carry viruses. In Outlook Express 6, this can be found under "Tools," "Options," "Security," "Virus Protection." You may disable this feature temporarily to view things from persons you trust, IF: They warn you in a separate message they will be sending an attachment AND you are certain they maintain adequate virus protection. Remember that the message containing a virus likely comes from a known person whom you have received email from in the past. The virus will email itself to you from their computer without their knowledge. Trust no one completely unless you are certain that they maintain adequate security on their own computer.
In addition to the threat of virus attacks, there are other types of attacks that Windows based operating systems are vulnerable to. One is called a port probe. This is traditionally called "Hacking." Ports are Windows utilities that are used by other programs to access the operating system. They allow third party software and device drivers to function in the Windows environment, among other things. If left unprotected they can also let unauthorized persons take control of your computer, destroy your operating system, or copy sensitive data. Antivirus software, even when functioning properly, does not protect your system from this kind of attack. A device or program called a firewall is required. In Windows XP Home and Professional systems a firewall is included in the operating system, but must be activated by the user. Follow the directions below to set up your firewall.
To enable or disable Internet Connection Firewall
1. Open Network Connections
2. Click the Dial-up, LAN or High-Speed Internet connection that you want to protect, and then, under Network Tasks, click Change settings of this connection.
3. On the Advanced tab, under Internet Connection Firewall, select one of the following:
a. To enable Internet Connection Firewall (ICF), select the Protect my computer and network by limiting or preventing access to this computer from the Internet check box.
b. To disable Internet Connection Firewall, clear the Protect my computer and network by limiting or preventing access to this computer from the Internet check box.
If you are using an older Windows operating system, you may down load a free software firewall called Zone Alarm, which is simple to use and highly rated. There are also other solutions available from antivirus companies and other freeware. I do not endorse any specific program, but you absolutely must choose and install one of these services. After you install a software firewall you may be asked to specify which programs are allowed to access the internet from your computer and vice versa. Do not allow access unless you can determine the purpose of the program involved.
If you have a broadband connection in your home, consider installing a router. This device allows multiple computers to share a broadband connection and can often be found for $30-40 after rebates at Best Buy, CompUSA or Circuit City. In addition to allowing several computers to connect to the internet or share a single printer, they offer hardware firewall protection for all connected machines. Some expert opinions are that a hardware firewall is more effective than a software firewall, but some software firewalls offer more control.
Another type of attack that is more recent and much less widely known is spyware and malware. These are very small and simple programs that are covertly installed in your computer while you are doing something as innocuous as surfing the web or reading email. Once again, even properly functioning antivirus software will not protect you from this threat. Typical malware and spyware reside quietly in your hard drive and track your movements on the web, sending a constant flow of information back to their owners about where you go and what you buy. They can also act as Trojans, which were defined above, or key loggers, which record every keystroke you make, and send that information to a specified person. Obviously, this could include private information and passwords. They also allow popup ads to proliferate on your computer. One symptom of this is popups that occur when you are not online. Internet browsers, such as Internet Explorer, use "cookies" to enable personalization of certain web content. This technology has been perverted to include tracking cookies, which can be used to track your movements on the web and target you for advertising. Another symptom of malware and spyware is that your computer seems to be taking longer to boot up or shut down, or that your internet connections seems slower than it used to be. That is because each of these programs uses a certain small percentage of your computer's resources to function, and as they add up, the deficit becomes noticeable.
There are several parts to solving this problem. The first and most simple is not to download and install anything from the internet that promises a free utility unless it is from a trusted, known source. Examples of free programs that include spyware or malware are "Weatherbug," "Comet Cursor," "Bonzi Buddy," and most notorious, "Kazaa" and other file sharing clients. Downloading and installing one file sharing program can result in as many as 200 unauthorized programs and cookies on your computer. If you require the use of one of these programs, search the web until you find a "cleaned" version of it.
Another required action is to disable ActiveX on your computer. Under "Tools" in the internet browser you will find "Options." Under "Options" is "Security" and "Custom Level." The ActiveX controls can be disabled there. ActiveX is a utility that can be exploited to run malicious software on your computer. If you have ever had your homepage changed to something you did not authorize, this is one very mild way ActiveX controls can be exploited.
A final and most effective method to control these pests is to acquire and use programs such as "Spybot" and "AdAware" that seek and destroy known spyware, malware and tracking cookies on your computer. Free versions of both are available for download. You must update the definitions of these programs and run them at least weekly. It is not uncommon for a first time user to find 200-300 unauthorized and identified malicious processes and cookies on their computer. One person I know found 600! Weekly totals after that will depend on your habits, but 30-40 is not uncommon. There is nothing found in these searches that has a legitimate purpose. If a certain program does not work after you delete the offensive content, which is common with "Kazaa" and other file sharing clients, then you must delete the entire program and find a cleaned version of it to install, or accept the risks of leaving your computer open to intrusion at any time.
I would also suggest that you go to the Windows Update page at Microsoft and install at least the Critical Updates as soon as possible. A link to Windows Update can be found under "Tools" in the top of the browser window.
If you attempt these security measures and find that you are already infected with an antivirus disabling virus, or ActiveX or other programs that you cannot seem to remove, contact a computer repair service for assistance. Remember that every day that you leave these matters unattended, YOU ARE AT RISK."