Personal Technology Information |
|
New Computer? Steps to Protect Your Computer Before Connecting to the Internet
Getting a new computer should be an exciting and gratifying experience. After all, you'll be able to do things faster, safer and without having to worry that your old hard drive is so full that one more file will "break the camel's back." However, there are dangers out there that probably didn't exist when you bought your last computer. And there's the question of what will happen to your old hard drive, with all your personal data on it. Let's deal with your new computer first. This information applies specifically to Windows XP, although it has broader application as well. Remember:
Standard (wrong) advice to home users has been to download and install software patches as soon as possible after connecting a new computer to the Internet. However, since the background intruder scanning activity is pervasive, it may not be possible for you to complete the download and installation of software patches before the vulnerabilities they are trying to fix are exploited. This Special Report offers advice on how to protect your computer before connecting it to the Internet so that you can complete the patching process without incident. We strongly recommend following all the steps when upgrading to a new operating system from disc(s) as well as when connecting a new computer to the Internet for the first time.
A network firewall or firewall router is a hardware device that is installed between the computers on their Local Area Network (LAN) and their broadband device (cable/DSL modem). By blocking inbound access to the computers on the LAN from the Internet a hardware-based firewall can often provide sufficient protection for you to complete the downloading and installation of necessary software patches. A hardware-based firewall provides a high degree of protection for new computers being brought online. If you connect to the Internet before you install a firewall, it may be possible for the computer to be exploited before the download and installation of such software is complete. XP has a built in firewall that may or may not be enabled. If Microsoft XP has not had Service Pack 2 installed, follow these instructions to turn on the Internet Connection Firewall. If XP is installed WITH Service Pack 2, then your firewall is enabled by default. Microsoft has provided both detailed and summarized instructions for enabling the built-in Internet Connection Firewall on Windows XP. We strongly recommend that you install a third-party firewall application and THEN turn off the Windows firewall. We recommend ZoneAlarm (www.ZoneLabs.com), which is FREE. Zone Alarm is the top rated firewall, and protects both incoming and outgoing data. XP's firewall ONLY protects against incoming data. Zone Alarm's setup file is approximately 7 megabytes, which will easily fit on a CD or USB drive. Follow the instructions there to install all Critical Updates. However, if you are going to install Service Pack 2, READ THIS FIRST! Pay particular attention to "Get the latest PC manufacturer updates for SP2, because you may need to update drivers for your PC to work properly. Only download software patches from known, trusted sites (i.e., the software vendors' own sites), in order to minimize the possibility of an intruder gaining access through the use of Trojan horse software. Staying Secure Follow the principle of least privilege - don't enable it if you don't need it. Consider using an account with only 'user' privileges instead of an 'administrator' or 'root' level account for everyday tasks. You only need to use administrator level access when installing new software, changing system configurations, and the like. Many vulnerability exploits (e.g., viruses, Trojan horses) are executed with the privileges of the user that runs them - making it far more risky to be logged in as an administrator all the time. Moving Your Applications and Data Unless you've never had a computer before, you'll want to move your old data onto your new machine. There are several ways to do this quickly and easily (although there are often a few glitches). The best article on the subject is www.pcworld.com/howto/article/0,aid,115632,00.asp. Protecting Your OLD Data So, what do you do with your OLD computer? Perhaps someone else can use it, maybe a school or a retirement center? One of the biggest mistakes people make is thinking that deleting files using Windows Explorer actually deletes the files! It DOESN'T! When you delete files in Windows, all it does is delete the pointers that show where the files are. Any competent computer whiz can easily find a program on the Internet that will rebuild the file pointers, and then they have access to all your files- your emails, your business information and your financial information. You can go to any flea market in the country, and chances are you can purchase a used hard drive with the old owner's data still on it! Many professional identity thieves are doing just that!!!! What CAN you do? Personally, I remove the hard drive from the computer, and I keep it (not in a place that it would be found if a burglar came into my house). Another alternative is to use a free disk wiping utility or purchase one. To effectively remove data from a hard drive, it must be overwritten completely several times. All of the temporary files, all of the caches, all of the "swap files" that are created as you work may be lurking in some unknown corner of the hard drive. Contrary to popular belief, even reformatting the drive does not necessarily make file recovery impossible! Consider this - A recent search of hard drives that had been discarded revealed:
|
RELATED ARTICLES
The Importance Of Email Backup Viruses, software failures, power failures, human errors, hard drive failures are only a few examples of what could destroy the data on a hard drive, including all documents, pictures, emails and other files!Most home computer users don't need an expensive backup solution; as they only need to burn the folders with important documents and pictures to a CD-RW from time to time; this ensuring that in case of a disaster they can easily get them back.Togeder with documents and pictures, it's a critical operation to save the emails, attachments, address book and other important data from within the email client; otherwise in case of a computer problem the user will find himself in the impossibility to get them back, and this can be a really unwanted situation especially for webmasters or people who rely on their emails. Is Desktop Search Deserving? Google, in their march to stay ahead of the pack of competition, has released Google Desktop Search. With Microsoft's MSN in the lead position and nipping at Google's heels, and Google's new shareholders to please, Google has more incentive than ever to deploy technology both better than the other guy's, and sooner. Are You Well Protected? Winter?the official start of the cold and flu season. Though, technically speaking, things got started a little early. Flash Your nVidia Video Cards BIOS You will need the following:1. 1. The Benefits of Open Source If you are a building a website or a forum, chances are you are using a web editor or paying for message board services. The costs of using these "out of the box" products can add up, especially if you are trying to grow your business. Selecting the Perfect Big Screen TV Selecting a TV isn't as easy as it used to be in years goneby. Rather than going to the local department store and choosing a console that would take up a large portion of the living room, we now have other options. Basic Diagnosis Guidelines for Your PC Simone is exasperated. She has to work on her university assignment but her PC is not working properly. Dynamite Comes in Small Packages - Tiny Personal Audio MP3 Players Pack Powerful Music Enjoyment MP3 players are Hot! Playing music has come a long way since the transistor radio, portable tape and CD player days. Most players are no larger than a deck of cards. Cut Through the Hype and Make the Right Digital Camera Comparisons There are soooo many choices. With all the styles and features, and prices are all over the map, digital camera comparisons can be mind-boggling. Mail-merging: The Principles About mail-mergingMail-merging is the process of merging variable data and fixedtext.Using mail-merging, you can create individualised letters,envelopes, labels and other documents without having tolaboriously create each individual one. Tips for Buying a PC Buying Your PCBuying a PC that's right for you and your family is not all that simple task. More so if you're going to buy an unbranded or an assembled one. Enhanced Web Browsing With Toolbars As the Web grows more crowded and just plain "noisy" withinformation bombarding us from every angle, most peoplewelcome any tool, trick or shortcut to help them wadethrough the mountains of data to find what they want.Since your web browser represents your main window to theInternet, it makes sense for any tool which enables you tofind what you need and get around faster online should sitright where you need it most. iPod users get the picture iPod users start to get the picture and it's turning out to be colorful fun!!The latest generation of hi tech gadget users are watching the different media they use start to converge as Apple launches its latest grab for the market with iPod Photo. Not only can you listen to all your music on the go, or organize your business and social life, but now your entire photo collection can be viewed at hand too. How To Recognize The Telltale Signs Of Spyware Spyware is the software that collects information aboutyour online activities and preferences. The information isthen sent to another computer with the intention of sellingit to online advertisers. Image Formats: GIF, JPEG, BMP When browsing the internet you are likely to come across many different image formats. However, the most common formats are: CompuServe GIF, JPEG, and Bitmaps. 10 Easy Steps to Speed Up Your Computer - Without Upgrading 1. Empty the Temp directory regularly. How To Remove One Operating System from a Dual Boot Windows XP Computer In Windows Xp, you can install two operating systems on the same hard disk of one computer.Whether you have two copies of Windows Xp, or two different operating systems, then you end up with dual boot machine when you restart your Windows Xp computer. Uninstall Windows Media Player 10 and Start Enjoying Your Media Again Windows Media Player 10 has been full of bugs from Microsoft since they offered it as a download from their site. Windows Media Player 9 was nice and simple. Cisco Certification: What To Expect On Exam Day Cisco Certification: Taking Your First Certification ExamYou've studied hard; you've practiced your configurations; you've used your flash cards over and over again; and finally, the big day is here. Your first certification exam!For many Cisco certification candidates, their first exam is the CCNA Composite exam or one of the two exams that make up the CCNA, the Introduction To Networking exam or the ICND (Interconnecting Cisco Networking Devices) exam. Why Get a Microsoft MCSE Certification? In the years of the dot com boom and bust, the Microsoft MCSE Certification has gotten its eye blackened over an over. Paper Microsoft MCSE's who were excellent at finding brain dumps and passing exams gave the Microsoft MCSE Certification a bad name. |
home | site map |
© 2006 |