Personal Technology Information |
New Computer? Steps to Protect Your Computer Before Connecting to the Internet
Getting a new computer should be an exciting and gratifying experience. After all, you'll be able to do things faster, safer and without having to worry that your old hard drive is so full that one more file will "break the camel's back." However, there are dangers out there that probably didn't exist when you bought your last computer. And there's the question of what will happen to your old hard drive, with all your personal data on it. Let's deal with your new computer first. This information applies specifically to Windows XP, although it has broader application as well. Remember:
Standard (wrong) advice to home users has been to download and install software patches as soon as possible after connecting a new computer to the Internet. However, since the background intruder scanning activity is pervasive, it may not be possible for you to complete the download and installation of software patches before the vulnerabilities they are trying to fix are exploited. This Special Report offers advice on how to protect your computer before connecting it to the Internet so that you can complete the patching process without incident. We strongly recommend following all the steps when upgrading to a new operating system from disc(s) as well as when connecting a new computer to the Internet for the first time.
A network firewall or firewall router is a hardware device that is installed between the computers on their Local Area Network (LAN) and their broadband device (cable/DSL modem). By blocking inbound access to the computers on the LAN from the Internet a hardware-based firewall can often provide sufficient protection for you to complete the downloading and installation of necessary software patches. A hardware-based firewall provides a high degree of protection for new computers being brought online. If you connect to the Internet before you install a firewall, it may be possible for the computer to be exploited before the download and installation of such software is complete. XP has a built in firewall that may or may not be enabled. If Microsoft XP has not had Service Pack 2 installed, follow these instructions to turn on the Internet Connection Firewall. If XP is installed WITH Service Pack 2, then your firewall is enabled by default. Microsoft has provided both detailed and summarized instructions for enabling the built-in Internet Connection Firewall on Windows XP. We strongly recommend that you install a third-party firewall application and THEN turn off the Windows firewall. We recommend ZoneAlarm (www.ZoneLabs.com), which is FREE. Zone Alarm is the top rated firewall, and protects both incoming and outgoing data. XP's firewall ONLY protects against incoming data. Zone Alarm's setup file is approximately 7 megabytes, which will easily fit on a CD or USB drive. Follow the instructions there to install all Critical Updates. However, if you are going to install Service Pack 2, READ THIS FIRST! Pay particular attention to "Get the latest PC manufacturer updates for SP2, because you may need to update drivers for your PC to work properly. Only download software patches from known, trusted sites (i.e., the software vendors' own sites), in order to minimize the possibility of an intruder gaining access through the use of Trojan horse software. Staying Secure Follow the principle of least privilege - don't enable it if you don't need it. Consider using an account with only 'user' privileges instead of an 'administrator' or 'root' level account for everyday tasks. You only need to use administrator level access when installing new software, changing system configurations, and the like. Many vulnerability exploits (e.g., viruses, Trojan horses) are executed with the privileges of the user that runs them - making it far more risky to be logged in as an administrator all the time. Moving Your Applications and Data Unless you've never had a computer before, you'll want to move your old data onto your new machine. There are several ways to do this quickly and easily (although there are often a few glitches). The best article on the subject is www.pcworld.com/howto/article/0,aid,115632,00.asp. Protecting Your OLD Data So, what do you do with your OLD computer? Perhaps someone else can use it, maybe a school or a retirement center? One of the biggest mistakes people make is thinking that deleting files using Windows Explorer actually deletes the files! It DOESN'T! When you delete files in Windows, all it does is delete the pointers that show where the files are. Any competent computer whiz can easily find a program on the Internet that will rebuild the file pointers, and then they have access to all your files- your emails, your business information and your financial information. You can go to any flea market in the country, and chances are you can purchase a used hard drive with the old owner's data still on it! Many professional identity thieves are doing just that!!!! What CAN you do? Personally, I remove the hard drive from the computer, and I keep it (not in a place that it would be found if a burglar came into my house). Another alternative is to use a free disk wiping utility or purchase one. To effectively remove data from a hard drive, it must be overwritten completely several times. All of the temporary files, all of the caches, all of the "swap files" that are created as you work may be lurking in some unknown corner of the hard drive. Contrary to popular belief, even reformatting the drive does not necessarily make file recovery impossible! Consider this - A recent search of hard drives that had been discarded revealed:
|
RELATED ARTICLES
Taking Advantage of the iPod Experience Music lovers have been carrying around radios and other bulky music devices in order to take their tunes along withthem as they go from place to place. With the iPod - a portable unit that's manufactured by Apple - the music experience offers a higher quality in a much more compact size. iPod users get the picture iPod users start to get the picture and it's turning out to be colorful fun!!The latest generation of hi tech gadget users are watching the different media they use start to converge as Apple launches its latest grab for the market with iPod Photo. Not only can you listen to all your music on the go, or organize your business and social life, but now your entire photo collection can be viewed at hand too. How to Save an Image in a SQL Server Database? Most of the web applications have a lot of images used in it. These images are usually stored in a web server folder and they are accessed by giving the relative path to the file with respect to the root folder of the website. Flash Memory, Part I: MMC and SD MMC and SDFlash memory is available in so many formats that it can be difficult to know what will work with any particular device. Devices such as MP3 players, PDAs, mobile phones, digital cameras, and personal computers can take advantage of flash memory to bolster their storage capacity, but selecting the right format may be easier said than done. Web Standards HTTP ProtocolThe web is run on port 80. You are probably wondering what "port 80" is, right (whether you actually are or not is irrelevant)? Well, the answer is easy (not really). An All Too Familar Pain Lost & Found for the 21st CenturyIn today's hectic world more and more people are turning to those handy gadgets and mobile products that can be taken with them anywhere they go. The more things consumers own, the more they're prone to lose them. Learning To Navigate Ciscos Online Documentation When studying for your Cisco CCNA, CCNP, or CCIE exam, you've got a powerful online weapon at your disposal. It's Cisco Connection Documentation, found at www. Get Ahead When You Build Your Own Computer If you've been kicking around the idea of building your own computer, it actually isn't a bad idea. It's easier than you might think, and you can probably come out with a system that gives you more kick for your money, than you'd see in retail, or those made-to-order places. A Beginners Guide to Avoiding Viruses "Aaaaaahhhhhh! I've been invaded by a virus!" Getting a virus means getting sick and no one in their right mind wants to be ill. Well, now that computers have become our close friends, it's a shock to learn that foreign bodies too can invade them with malicious intent. Buying a Home Theater Receiver Buying a receiver is one of the most important decisions you're going to have to make when building your home theater. The receiver has a number of functions including; connecting and switching audio sources; connecting and switching video sources; decoding surround sound formats; amplifying an audio signal and sending it to your speakers; tuning in to radio stations; and acting as the interface between you and your home theater. 2 PC Annoyances and How To Solve Them! I have a love-hate relationship with my computer.In fact, often I love to hate my computer!It will do things I know even the great Mr. Help, I Need a New HDTV! (Part 3 of 5) Feeling overwhelmed in selecting a new TV? With all the choices these days, you may feel like, "Where do I start?!"In part 3 of our 5 part article, we the discuss what HDTV is.HDTV stands for High Definition TV. Windows PDA Medical Software Benefits PDA Medical BenefitsIf you are concerned about your medical history, the Internet has some great windows medical pda software that is available for free. Freeware is all the rage, and finding good quality freeware that is medically related is easy and fun. Is Desktop Search Deserving? Google, in their march to stay ahead of the pack of competition, has released Google Desktop Search. With Microsoft's MSN in the lead position and nipping at Google's heels, and Google's new shareholders to please, Google has more incentive than ever to deploy technology both better than the other guy's, and sooner. 7 Reasons NOT to Take Your Laptop on Holiday! Heading off on vacation soon?Then perhaps you're tempted to take your trusty laptop along for the trip.After all, you bought it for its mobility, and it's nice to stay in touch via email with your family and friends back home. Why Build Your Own Computer System Have you ever thought about building your own computer system? Maybe you've heard friends talking about doing this sort of thing, but you were never sure what was involved. This article attempts to answer two questions. Your Home is in Your Hands I would like to tell you about a magic home. You or your children have bought a home and fixed it up very nicely. 10 Tips to Stay Safe and Secure Online The Internet can be a dangerous place.While you're enjoying the convenience of online shopping, Internet banking and subscription websites, nasty people lurk around every corner. Portable DVD Players - Things To Know In my humble opinion nothing makes a long trip easier (especially if you have kids). A portable DVD player is the ideal solution for those long plane rides or endless drives in a car to keep everyone entertained, especially when you have new hit DVD to play. Is Your Web Browser Putting You At Risk? It's free, it comes with Windows and it's used by approximately 94% of the Internet population. It also poses an unacceptable security risk. |
home | site map | contact us |