|> home > articles > protecting your pc from the bad stuff||[previous page]|
Protecting Your PC From the Bad Stuff
By Rob Pirozzi
Guarding Access to Your PC - Get a Firewall
Beginning in the Zhou Dynasty, which was in the 11th century BC, construction was begun on what was to become the Great Wall of China. For 2,700 years, culminating in the mid-1600s, construction continued on the wall until it stretched 4,163 miles from east to west China. The wall was constructed to prevent invasion by other states of China and outer tribes.
When you connect your PC to the Internet either through cable, dial-up, or DSL, it is like China prior to the Great Wall. Anyone can invade your PC, and plunder, pillage, and destroy content on your PC. A firewall acts just like the Great Wall of China. When installed, it acts as a barrier between your PC and the outside world. It prevents unwanted and unauthorized access to your PC over your Internet connection.
Firewalls come in two basic forms:
Many people use both a hardware firewall and a software firewall. It is similar to having a fence to protect access to your yard, and then a front door to protect access to your house. Everyone should use at least one firewall, hardware or software. If you have a laptop, you should use a software firewall. That way the firewall goes with you, wherever you go, protecting your PC.
Plug the Holes - Make Sure to Download Operating System Updates and Patches
By now, the security holes and flaws in Windows have become legendary. To their credit, Microsoft publishes a steady stream of fixes, patches, and update releases to plug all known security holes, flaws, and problems. In order for your PC to benefit from these patches and updates, you must, at a minimum, download and install the critical security updates that Microsoft makes available. You can do this one of two ways:
Either method works well. The "Automatic Updates" route takes the thought and work out of the process. Regardless of which method you choose, the important thing is to keep Windows up to date. Out of date versions of Windows can leave your PC open to hackers and viruses.
If you are using Mac OS or LINUX, then none of this applies. You are already using inherently more secure operating systems. It is still, however, important to install updates and patches to these operating systems as well to be up to date and to provide the best protection against unwanted intrusion.
Take Your Medicine - Install Antivirus Software
A computer virus is an unwanted software program that:
A virus can get onto your computer from any of several sources, including:
Once on your PC, the impact of a virus can range from relatively benign to rendering your PC unusable.
Antivirus software is software that you use to protect yourself from computer viruses. It can detect and remove known computer viruses. There are many excellent antivirus packages available that are relatively inexpensive. There are also several excellent antivirus packages available for free for home, non-commercial use.
To prevent viruses from being able to harm your PC, you need to select one of the antivirus packages and install it on your PC.
TIPS: Make sure that your antivirus software is setup to:
Stop the Spies - Install Anti-Spyware Software
Adware is any software that displays advertisements on your computer screen, either through banner advertisements within an application, or through pop-up windows. Spyware, which may also be known as a spybot, or tracking software, is computer technology installed on an individual's PC that gathers information about them and their computer use. Adware and spyware removal software, or anti-spyware software, is software that is installed on your computer to combat the threats of adware and spyware. It will search your computer's memory, file system, system registry, and browser caches for the existence of adware and spyware. It will then remove or quarantine any items that it finds. Adware and spyware removal software may also monitor for, and actively block, the downloading of spyware applications.
There are two excellent anti-spyware programs available for free, Ad-Aware SE Personal from Lavasoft, and Spybot Search & Destroy from Safer Networking Ltd. There are also many excellent anti-spyware packages that range in price from $19.95 to $39.95. Select and install one of these packages and run it on a regular basis.
To prevent adware and spyware form being able to gather information about you, you need to select one of the anti-spyware packages and install it on your PC.
TIPS: Similar to antivirus software, make sure that your anti-spyware software is setup to:
Spring Cleaning - Think About Privacy Software
As you use your computer, and surf the web, traces of your activity get left behind, stored on your computer in lists, temporary files, and caches. The best case is that these "leftovers" can clutter up your PC, and, with time, degrade its performance. The worst case is that someone who gains unauthorized access to your PC can read these files and learn a fair amount about you, potentially helping them to steal your identity.
Privacy software removes all traces of your PC and Internet activity, helping to protect your privacy.
As with antivirus software and anti-spyware software, privacy software should be run on a regular basis. It, too, can be setup to run automatically on a regular basis so that an end-user does not have to do anything to protect their privacy. The first time the privacy software is run it is not at all uncommon for it to recover in excess of 500MB of disk space by deleting the "leftover stuff" on your PC.
To prevent unauthorized intruders from being able to gather information about you, select one of the privacy packages and install it on your PC.
Think Before You Click - Use Some Common Sense
A little common sense can go a long way when trying to protect your PC. Most of what can compromise your security will come through e-mail, or when you are surfing the web. Because of this, you definitely need to think before you click. If you have not realized it already, most unsolicited e-mail is garbage. No matter how good the offer may sound, the common sense rule of "if it sounds too good to be true, it is..." applies. Most of what you receive unsolicited is designed to scam you out of money, to trick you into divulging private information, to install spyware and adware on your computer, or to install viruses on your computer.
Identifying Suspect E-Mails
So how to you identify the bad "stuff"? It actually is fairly easy to identify "suspect" e-mails. Common bad or suspect e-mails include:
This list can go on forever with the many subtle variations. The bottom line is that if it does not feel right then consider it to be a bad e-mail.
Suspect e-mails should be deleted. Never click on links in suspect e-mails. Never open file attachments to suspect e-mails. Never reply or forward suspect e-mails. Simply delete them and move on.
Installing firewall software and antivirus software, and running anti-spyware software and privacy software should go a long way to protecting you when your are surfing. Here, again, some common sense applies. Avoid sites that do not "feel" right. Sites that are constantly trying to get you to fill out forms before you have much of a chance to learn anything about the site and the organization who owns the site are highly suspect. Pornography sites are famous for downloading spyware and viruses onto people's computers. Stick to sites you know, the sites of reputable companies, and sites that come recommended by people you trust and you should be okay.