The official logo of webweevers.com - a division of HidalCorp

 

 

WebWeevers.com

 

<< BACK

CONTACT US

The Official Flag of the Great United States Of America!

DEO JUVANTE

 

  integrity
    flagstaff bmx
    flagstaff info
    faith
 

Google

 
 
terms of use
    All information provided within this website (complete) is offered as is and is not supported or specifically recommended over any other site.
   

Should you have any questions, comments or otherwise, please click on this text, my picture above.

 

A "Stumble Upon" Community Favorite
A "Stumble Upon"
Community Favorite

 
 
    to top

 

Computer Protection

A list of Nine rules to lower computer vulnerability and raise computer safety and internet protection for you and your family while online - including a free firewall, free SpyWare elimination utilities, free on line exposure test and more!

E-Mail this important page on computer protection and internet safety to family and friends you care about today!   They'll thank you for this information that will protect themselves and their family on line.

Reducing a computer's vulnerability to hackers (true computer protection and internet safety) is much like using anti-theft devices and common sense to guard against your car being broken into. Strangely, few people would leave their keys in the ignition while away from their vehicle, yet most might as well hand over their workstations and servers to the lowliest hacker as they don't have any security in place.

 

Click on a link below

 

 

Free Computer Safety and Internet
Protection Fire Wall Software

 Zone Labs ZoneAlarm FREE firewall software - computer protection and internet safety Get your FREE copy of "ZoneAlarm" software (Windows only) which serves as a firewall to protect your computer from hackers and other malicious on-line users by clicking here.  Set up as "personal use".  (If that doesn't work, click here).

"If you're worried about security for your small-office or home network (and you should be worried), look into ZoneAlarm Pro."   - Seán Captain, PC World

NOTICE: Before and after you install "ZoneAlarm" (above), click on the link below titled "ShieldsUp" and see the before-and-after difference--it's crazy!

Back to top

Just like vehicle protection measures, you can stop a lot of potential intruders but never all. Most hackers are of the "script kiddie" variety, non-programmers using commonly available hacker tools to penetrate systems if only for their own amusement. Since their skills are limited, they hunt for the easy kill rather than a challenge, so our mission here is to make your computer as unattractive as possible. The rules outlined below are a checklist of things you must do to properly secure your system. At the end of this article you'll find useful links that will help you actually implement these measures.

 

Rule 1: Mind your passwords. It is simply incredible that in this day and age most computer users persist in choosing the weakest passwords, typically because they're easy to remember. Forget convenience: Under no circumstance should you ever use real words or combinations of real words, nor should you use numbers that have any significance to you such as your birth date. Script kiddies will use password guessing tools and it might take only seconds to guess yours. Additionally, using the same or similar password everywhere is foolish, sort of like leaving your credit cards and house keys in your car! The best policy is to use random sequences of characters for passwords.

 

Rule 2: Use encrypted connections. The Internet tools most commonly used on workstations and servers are inherently insecure. For instance, never use the popular Telnet, POP, or FTP programs unless passwords are passed in a strongly encrypted format over the Internet. Sadly, authentication is typically in plain text, which makes life easy for hackers using packet sniffers to automatically grab scores of plain text passwords from Internet noise while they sleep. Remote shell sessions such as with telnet should be completely encrypted if you use such sessions to switch to other userids or root id, lest you want to give script kiddies a big break! SSH is the best substitute for Telnet and can also be used instead of FTP. By the same token, sensitive information should NEVER be sent via email. Note that any encryption between client and server requires that both ends support the encryption method.

 

 

Rule 3: Hide! Cloaking your computer's Internet presence via a firewall is the first line of defense. All hackers use scanning tools to quickly find weaknesses in a computer's Internet interfaces. Firewalls work at the packet level and not only can detect scan attempts but also block them, thus making your system look unattractive or even hide its existence altogether.

 

Test your Internet Safety

Test your internet security and computer safety and protection by clicking here!
Click here!

 

Shields UP! quickly checks the security of your computer's connection to the Internet.

Back to top

Rule 4: Don't trust anybody! Be very careful about what programs you download from the Internet. Do not install software from little known sites especially. Programs can hide "trojans" that once launched will modify your system and/or connect to remote servers without your knowledge, perhaps allowing hackers to slip into your system. Nowadays, most download sites will include a checksum, typically PGP or MD5 encoded, which can be used to verify that the program is authentic before you install it. It's not too paranoid to make it a rule to never trust anything from the internet, as even the biggest website could be subverted by hackers and you wouldn't notice.

Rule 5: If you're managing a server, limit what other users can do on the system. From limiting them to certain areas of the file system and which applications they can run to limiting their memory and process usage, there are many things you can do to reduce the serious risk posed by reckless users.

 

Click below for AdAware SpyWare eliminator

AdAware spyware removal utility

"AdAware" SpyWare removal utility

"AdAware" is critical to your windows operating system if you're concerned about sharing (or not sharing) all your surfing habits, system info, personal info, etc, with the Internet viewing public.

This FREE program finds SpyWare loaded on your system (how ever it got there), makes you aware of its presence and asks for your decision about it's future on your system.  It's an Internet security and computer safety must!

Back to top

Rule 6: Keep your system up to date. Vulnerabilities are continuously being found in popular programs and operating system kernels, some of which might allow an intruder to gain root access to your system. Unfortunately, word of such "holes" travels quickly in hackerdom, so it's important to be on top of them yourself. Software creators post "patches" and/or new versions of their programs to fix those defects. It's hard to keep track of them all, but you can save yourself a lot of grief by subscribing to mailing lists that warn you of such incidents. Again, software producers often maintain such lists themselves, as do sites specializing in computer security, and it's usually free to subscribe. You can also reduce the risks by avoiding using new applications or those that a long history of vulnerabilities.

Rule 7: Disconnect from the Internet when you're not actually using it. This is the ultimate protection to stop intrusions, but of course it doesn't stop trojans unless you literally unplug your physical connection. In the case of servers, where your connection is always on, disable any daemons that aren't needed or seldom used. Note that the daemons running by default on a newly installed operating system are quite often the most vulnerable, and most hosting services won't bother to disable them for you.

 

Click below for SpyBot SpyWare destroyer

SpyBot Search and Destroy!

"SpyBot" Search and Destroy!

"SpyBot" Search and Destroy is another program that finds SpyWare on your system--increasing computer protection and internet safety.  It does a more thorough job in finding questionable matter in your system, but it includes things that you MAY NOT WANT TO REMOVE.  

So, be careful with this particular program!  Use this free software at your own risk!

Back to top

Rule 8: Don't continue using a computer that you know has been compromised by hackers. To do so allows the hacker to potentially gain access to more systems and exposes you to the possible theft of some of your sensitive data. The only solution is to reformat the hard disk(s) and re-install the operating system, or smash your computer to bits if you prefer!

Rule 9: Use every security mechanism you can, not just one or a few. They serve different purposes and thus complement each other. Always rolling-up the car windows and locking the doors is a good start, but you wouldn't really call that a security system, would you?!

Stick to the rules or let the hackers rule the day!

Some useful links you can follow to get further knowledge on the subjects discussed today:


AUTHOR:

Tom Germain has been our ace programmer at iEntry.com. He has expertise in several different languages and operating systems.  Basically, he's just a geek stud. - Pete

 

This article was originally published at webpronews.com on May 3, 2001

 

 

 

  flagstaff photos

 

  iq tests

 

  hidalgo

 

  suicide

    photography
    tithing
 
Winner of the International Association of Web Masters and Designer's "Golden Web Awards" for the years 2003 - 2004
Winner of the prestigious International Association of Web Masters and Designer's "Golden Web Awards" for the years 2003-2004
 
Click here to add to "My Google"
Click here to add to "My Yahoo!"
 
 
notice
    © 1997+
All rights reserved
    Another webweevers.com
Production
    A division of
HidalCorp
 
 

 

 

Quote of the Day
This Day in History
Hangman

 

 

 
 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 


©
C. Czach Hidalgo 1996+ webweevers.com
"Fire @ F-Holes Cove"
Blue Ridge Reservoir, AZ
September 4, 2007

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

eXTReMe Tracker