Internet Safety
Internet Safety
Internet Safety
Patrimonio | Dreamstime.com
Leo A. Notenboom
http://ask-leo.com
v1.01
Internet Safety - Keeping Your Computer Safe on the Internet
2008 - Leo A. Notenboom - http://ask-leo.com
Page 1
In its entirety (the whole book and only the whole book)
In its original form (no changes are made and no markups are
added)
You may not charge for this ebook when you share it. Furthermore, you
may not incorporate this ebook into any product or collection that is not
free.
This book is based on my experience and anecdotal evidence. I've tried to
ensure that everything written here is as accurate as possible at the time
of publication, but I cannot assume any responsibility for mistakes or
omissions.
On top of that, I know nothing about your specific computer, your specific
experience and your specific abilities to understand and act appropriately
on the information herein.
The bottom line is that you, and only you, are responsible for using this
information appropriately, safely and as you see fit, and for any of the
consequences of having done so.
Note that any trademarks, service marks, or product names are the
property of their respective owners. There is no implied endorsement
when I reference something by name. Endorsements, if any, will be clear
and quite explicit.
Finally, this book is intended to inform and entertain, but it's still not a
replacement for common sense.
Contents
1.Virii & Spyware & Worms ... oh my! ................................................ 4
2.Use a Firewall .............................................................................. 6
What's a firewall, and how do I set one up? ...................................... 7
Do I need a firewall, and if so, what kind? ........................................ 9
Do I need SP2's Windows firewall or not? ........................................11
3.Scan for Viruses ..........................................................................12
Viruses: How do I keep myself safe from viruses? ...........................13
I run anti-virus software, why do I still sometimes get infected? .........16
When do I actually need to run a virus scan? ...................................18
4.Kill Spyware ...............................................................................19
How do I remove and avoid spyware? .............................................20
So just how sneaky can spyware be? ..............................................22
5.Stay Up-To-Date .........................................................................23
How do I make sure that Windows is up-to-date? .............................24
6.Get Educated ..............................................................................26
Phishing? What's Phishing?...........................................................27
How do I get rid of all this spam?!?! ...............................................29
7.Secure Your Mobile Connection......................................................31
How do I stay safe in an internet cafe? ...........................................32
Can hackers see data going to and from my computer?.....................34
8.Don't forget the physical ..............................................................35
How can I keep data on my laptop secure? ......................................36
What backup program should I use? ...............................................38
That's It, And Yet... ........................................................................40
1.
Piksel | Dreamstime.com
These days the very concept of "Internet Safety" seems like an oxymoron.
Not a day goes by where we don't hear about some new kind of threat
aimed at wreaking havoc across machines connected to the internet.
While products other than Microsoft's are certainly vulnerable, antiMicrosoft sentiment coupled with the massive installed base make
Microsoft products and irresistible target for hackers and "script kiddies".
In this book we're going to cover the basics - the things you must do, the
software you must run and the concepts you need to be aware of - to
keep your computer and your data safe as you use the internet.
It's not hard, and once things are in place it's not even time consuming.
But it is necessary.
Let's summarize what we're going to cover:
Viruses - the threat is real and changing every day. Machines get
infected quickly and easily if you don't take steps to protect
yourself.
Education - Are you the weakest link? All the protective software
and hardware in the world can't protect you from yourself.
2.
Use a Firewall
Matthiashaas | Dreamstime.com
connection, click the advanced tab and you'll find the Windows Firewall.
Even if you do nothing else and you're not sure what you really want to
do, you should turn this on. Other popular firewalls include ZoneAlarm,
Comodo and BlackIce Defender.
Finally, when you believe you're protected or even if you know you're not
you should visit Gibson Research and run "Shields Up", a vulnerability
analysis. It will try to access and analyze your computer from the internet,
list for you exactly how you are vulnerable, and tell you the potential
steps you can take. It tends to be a little techie but it's worth the effort.
3.
Devonyu | Dreamstime.com
Sometimes, typically via email, viruses (or virii) are able to cross the wall
and end up on your computer anyway. A virus scanner will locate and
remove them from your hard disk. A real time virus scanner will notice
them as they arrive, even before they hit the disk, but at the cost of
slowing down your machine a little.
Important: because new virii are arriving every day, it's important to
keep your virus definitions up-to-date. Be sure to enable the scanning
software's automatic-update feature and have it do so every day.
The best advice is to use one, any one, and have the others "on call" for
those cases when malware sneaks past the one you use regularly.
If you do install more than one package, you should not enable the "real
time" scanning for more than one at the same time - they will conflict with
each other, and will cause unpredictable results.
4.
Kill Spyware
Bobb | Dreamstime.com
Spybot Search and Destroy - Spybot is free and does a great job of
ferreting out and removing spyware. Spybot is one of the most
commonly recommended tools when people are dealing with
spyware issues. It also includes options that will help "immunize" or
prevent certain types of spyware issues from occurring in the first
place.
Download and install the package of your choice. Now. Before you forget.
2. Update the Spyware Database
Your first step should be to update the spyware database that came with
the installation. New spyware is being created every day, and databases
the anti-spyware programs use are being updated as well. You need to get
the latest database for your anti-spyware program right away.
Most of the programs have update functions that will locate, download,
and install the latest databases automatically. Microsoft's anti-spyware
program will do it automatically for you.
As you can see, it's just another reason keeping your machine safe from
spyware and other malicious software is so incredibly important.
5.
Stay Up-To-Date
Lincolnrogers | Dreamstime.com
I'd wager that over 90% of virus infections don't have to happen.
Software vulnerabilities that the viruses exploit usually already have
patches available by the time the virus reaches a computer. The problem?
The user simply failed to install the latest patches and updates that would
have prevented the infection in the first place. I still see this constantly,
as some of the most popular articles on Ask Leo! deal with exploits that
were patched nearly 2 years ago. The solution is simple: enable automatic
updates, and visit Windows Update periodically.
Notify after install - finally, you can just have Automatic Updates
do it all, on a schedule you can define. Check, download, and install
as soon as updates are available.
Internet Safety - Keeping Your Computer Safe on the Internet
2008 - Leo A. Notenboom - http://ask-leo.com
Page 24
6.
Get Educated
Vojtechvlk | Dreamstime.com
To be blunt, all the protection in the world won't save you from yourself.
Don't click on links in email that you aren't positive are safe.
When visiting a web site, did you get a pop-up asking if it's ok to
install some software you're not sure of because you've never heard
of it? Don't say "OK".
Not sure about some security warning you've been given? Don't
ignore it.
In most browsers if you hover the mouse over that link on a web page,
you'll see that it does not go to eBay, (you'll see the real destination
either in popup text, or in the browser's status line near the bottom of the
window as shown above). But it looks like it does. If you click on it, you'll
be taken somewhere else entirely. The same tricks work in HTML
formatted email, which is what most of these phishing attempts use.
Internet Safety - Keeping Your Computer Safe on the Internet
2008 - Leo A. Notenboom - http://ask-leo.com
Page 27
Now, in the example above, it's obvious you're not at eBay if you click
through. But if the destination site looked like eBay, you could be fooled
into thinking it was legitimate.
So if you're tempted at all, hover your mouse over the link, and look
before you click!
The actual destination should match what you expect. Exactly. If the link
claims to be eBay, http://ebay.hacker.com is not where you want to go.
Nor is http://www.ebay.cc (note that it's not ".com"). In the original
question, "msn.net" as a return address is not the same as "msn.com".
That's a big red flag.
The actual destination should be a name, not a number. If the destination
of the link takes you a link that has numbers, such as
http://72.3.133.152, chances are it's not valid.
The actual destination should probably be secure. That means it should
begin with https:. If the target destination begins with the regular,
unsecured http:, chances are it's not legitimate.
The single, most important rule regarding these emails is simple: if they
provide a link to click on, ignore them. Never click a link in the email
itself.
If you must satisfy your curiosity, then type what you know to be the
correct URL into your browser by hand, and login to your account as you
normally would. If there's something you need to do or verify, then you'll
probably see it then.
And if you're still not sure, then give the institution a call. Trust me;
they'd rather have you ask than have to deal with the possibility of
identity theft.
email from an unknown source to prove that the sender is human. If the
respond and confirm that they are, a) they are remembered and never
have to see a challenge again, and b) the mail they sent you is delivered.
If they do not respond then you never see the email.
The problem with challenge response relates to any mailing list you might
sign up for, any on-line purchase that might result in sending you an
email confirmation, or any legitimate organization that might send you
valid yet automated email. This is email you want. Yet senders to such
lists do not have the time or the resources to respond to a challenge for
each of their recipients. Typically they'll simply ignore all challenges. The
result: unless you remember to proactively white-list them beforehand
then you won't get the email you request.
7.
Cyrano | Dreamstime.com
If you're traveling and using internet hot spots, free Wifi or internet cafes,
you must take extra precautions. Make sure that your web email access is
via secure (https) connections, or that your regular mail is over an
encrypted connection as well. Don't let people "shoulder surf" and steal
your password by watching you type it in a public place. Make sure your
home Wifi has WEP security enabled if anyone can walk within range.
Secure your Email! Email is perhaps the biggest open security hole in
these situations. If you use a POP3/SMTP email client, the default
configuration for most is totally unsecure. I could sit in a corner of the
internet cafe and not only read your email with you, but also steal your
account name and password. It really is that unsecure.
Internet Safety - Keeping Your Computer Safe on the Internet
2008 - Leo A. Notenboom - http://ask-leo.com
Page 32
With POP3 and SMTP you should contact your email provider and see if
they support SSL connections. If they do, it's a slightly different
configuration in your email program but once done all of the
communication between your email program and email servers are
securely encrypted.
Online or web-based email services deserve special consideration. Most do
not support https connections. The one exception is Gmail, which will use
https if you make sure to login through an https connection.
Consider a VPN. Not all sites support https, as it takes extra work on
their part. For example there is no https version of ask-leo.com, you can
only access it through unencrypted http, and that's the norm for most
sites that don't process confidential information. But that means that
someone could still be watching where you go. If you don't mind them
seeing that you're visiting ask-leo.com, or what you might happen to
search for on Google, or whatever other sites you're visiting in the clear,
then you don't need to do anything.
And not all email providers will provide secure connections.
However, if you're a "road warrior" and spend a lot of time in internet
cafes, have an unsecure email configuration, or browse a lot of sites that
you'd rather not be so easily sniffable, you might consider a VPN (Virtual
Private Network) service. I've never used one personally, so I can't
recommend one specifically but there are several. HotspotVPN is just one
example. Using these services you create an encrypted connection to the
service and route all your internet traffic through them. When you do this
the folks in the cafe see only encrypted data which they can do nothing
with.
So, how big is the risk, really?
It depends.
I'd expect busy hotspots near sensitive areas to run a fairly reasonable
risk. Busy coffee houses, airport WiFi, libraries and the like seem like
"target rich environments" for the potential hacker. These are certainly
places where I'd make sure to take these safety measures myself.
Less busy hotspots? Perhaps not so much.
But it is possible, and more frighteningly, it's not all that hard for someone
who's technically savvy.
And every time you use public internet facilities and hotspots, you may be
at risk.
8.
Stevebyland | Dreamstime.com
Lisafx | Dreamstime.com
We've covered the basics, from firewalls and malware protection, to basic
education and even understanding the risks associated with anyone being
able to reboot your computer.
It's a great foundation, a good beginning, but in reality ...
It's only a start.
Things are changing every day. New tools, new threats and new situations
are showing up all the time. I don't want to sound like an alarmist,
because I'm not really, but it's important to build on what you've learned
here and stay aware of what's happening as you continue to use your
computer and the internet.
In fact, I hope you'll take advantage of the many resources out on the
internet. Yes, of course I'm particularly hopeful that you'll come visit
http://ask-leo.com, perhaps even sign up for my free weekly newsletter but even if you don't, realize that a lot of information is out there, and
there are a lot of folks out there just like you who are looking for, and
giving back, great help and advice.
And as for me? Well, you know where to find me. Drop me a line, or a
question, any time
Leo A. Notenboom
http://ask-leo.com
Internet Safety - Keeping Your Computer Safe on the Internet
2008 - Leo A. Notenboom - http://ask-leo.com
Page 40