Internet Computer Security 101a
Internet Computer Security 101a
Security is a real problem, and not just for home users. Billions of dollars are spent by people every year on computer security programs and the aftermath of security threats.
Dont believe it cant happen to you.
Number One:
WINDOWS UPDATES
(Repeat this ad nauseam)
1. Move the mouse over Start, then Control Panel and click it. 2. If your Control Panel looks like the picture on the left, click on Switch to Classic View located on the left panel. Double-click on Automatic Updates
3. If you see the green dot next to Turn off Automatic Updates you are going to want to change that. For the sake of easiness, you can just click the circle next to Automatic (recommended) and it will do all the work for you. You can choose when to download and install them by clicking on the drop-down button (arrow button) and choosing how often and what time of day. You can also have the updates automatically download but not install until you choose, or have Microsoft notify you when updates are available and download and install them yourself. Click the OK button to make changes.
10
11
Number Two:
1: Windows Updates
FIREWALL
12
1. Move the mouse over Start, then Control Panel and click it. 2. If your Control Panel looks like the picture on the left, click on Switch to Classic View located on the left panel. Double-click on Windows Firewall.
3. If you have no firewall at all, you should probably turn this on by clicking the circle next to On (recommended), even if you plan on putting a different firewall program on the computer. You can always turn Windows Firewall off when the new program is installed. Unlike anti-spyware and anti-virus programs, having too many firewalls is not generally a good thing, because the settings tend to conflict and then you cant get online at all. If you have a hardware firewall, which looks like a router, you dont need to have Windows Firewall on.
13
14
15
16
1: Windows Updates
Website: http://www.zonelabs.com
17
18
Number Three:
ANTI-VIRUS
19
20
7. Manually scan e-mail for viruses if your program doesnt do so automatically. 8. Use a firewall. 9. Avoid using peer-to-peer file sharing programs like Kazaa. 10. Avoid clicking on free offer pop-up windows. 11. Avoid websites that offer illegal product keys for otherwise expensive programs, like Windows XP or Adobe Photoshop.
21
Treasure Chest
Scan Define test areas Update virus database Resident scanner sensitivity
22
Feaures: AVG Resident Shield Real time file protection Internet Mail E-mail protection Scheduler Update Manager Shell Extension - Scan objects through Windows explorer
23
Feaures: Real-time File Protection Internet Mail E-mail protection Scheduler Update Manager
24
25
26
Number Four:
ANTISPYWARE
27
28
5. Avoid AOL.
6. Install some sort of pop-up blocker (included with Service Pack 2). 7. Dont believe the pop-up offers. You will not get a free computer, or video game, or whatever they are offering without suffering.
29
of Spybot Search & Destroy, Ad-Aware, and Microsoft Defender (formerly Anti-Spyware Beta 1). And yes, you will want to install them all. Unlike anti-virus programs, its OK to have more than one anti-spyware program running on your computer.
A free program that offers real-time setting protection, browser tweaking, HOSTS file locking, advanced blocking, and much more.
30
A free anti-spyware program that offers real-time protection and integrates seamlessly into Windows XP. You must have a validated copy of XP to use this program (through Windows Genuine Advantage).
32
33
Number Five:
CONFIGURE WINDOWS
34
No long-winded explanation needed here. In our final bit on the basics, well talk about two components of Windows that are relatively simple to configure but do a decent job for safety and 1: Windows Updates security: user accounts and content advisor.
2: Firewall 3: Anti-Virus 4: Anti-Spyware
35
1: Windows Updates 3. If children are going to be using the computers, create an account for 2: Firewall them with limited rights. 3: Anti-Virus 4. Turn off fast user switching and make people log on using 4: Anti-Spyware CTL+ALT+DEL. 5. If you expect to have many different accounts, it is best to let that be handled by a server, and you will be able to specify more advanced rights options.
1. Move the mouse over Start, then Control Panel and click it. 2. If your Control Panel looks like the picture on the left, click on Switch to Classic View located on the left panel. Double-click on User Accounts.
3. If you have no firewall at all, you should probably turn this on by clicking the circle next to On (recommended), even if you plan on putting a different firewall program on the computer. You can always turn Windows Firewall off when the new program is installed. Unlike anti-spyware and anti-virus programs, having too many firewalls is not generally a good thing, because the settings tend to conflict and then you cant get online at all. If you have a hardware firewall, which looks like a router, you dont need to have Windows Firewall on.
36
37
1. Open Internet Explorer. In the main menu, click on the word Tools, and then click on the words Internet Options in the drop-down menu.
38
4. The first tab youre on will be Ratings. This is where you set the level of restrictions for websites. There are four categories: language, nudity, sex, and violence. To change the restriction level for each category, you have to click on the word and it will be highlighted. Below the categories is a slider. By moving the slider to the left or right, you set the restriction level from 0 to 4, with 0 being the MOST restrictive and 4 being the LEAST restrictive. When you move the slider, it will tell you what level you are on and give you a short description of what a person is allowed to see. Remember, on Level 0, a person will be able to see pretty much nothing, and on Level 4 a person will be able to see pretty much everything.
39
5. Click on the Approved Sites tab. Here you have the ability to type in websites that a person is always allowed to see or never allowed to see. To do this, type an address in the box under Allow this Web site: and the Always or Never button will become available. To always allow the site, click Always and to never allow the site, click Never. When you do so, the site will appear in the box under List of approved and disapproved Web sites: with a green checkmark (approved) or a red dash (disapproved). To remove a site from the list, click on it and then click the Remove button.
40
41
42
43
The NotSo-Basics
44
45
Number Six:
46
These are the kind of things Average Joe most likely wouldnt know about unless they had a virus or were searching the internet for a cheap way to block porn sites. Most people probably wouldnt mess with them, but knowing about them and the role they play when connecting to the internet is actually quite important.
47
Before you begin, you will need to be able to view hidden folders and files. To do this, go to My Computer, then Tools, Folder Options and click the View tab. Click the circle next to Show hidden files and folders if the green dot isnt already there, and click the checkbox next to Hide extensions for known file types so there is no green check in the box. Then click the Apply button.
1. Open My Computer, then doubleclick on your hard drive (C:). Open the Windows folder, then the system32 folder, then the drivers folder, then the etc folder, then open the hosts file.
2. Your computer might not know what program to open the file with. If it doesnt a new window will open with a list of programs to choose from. WordPad is the easiest choice. Click the OK button to continue.
48
49
50
Number Six: HOSTS File & PAC Proxy Auto Configuration (PAC)
Technical jargon, right? Lets skip the long winded description. What you need to know about PAC is that it is a file that can be used to block access to websites. It is similar to the HOSTS file in how it blocks access, but the big difference is rather than using the actual website it looks for keywords in the address itself. In a way, this is easier than using the HOSTS file, since 1: Windows Updates you dont actually have to know the address to block it. The flip 2: Firewall side? Configuring a PAC is a little more work, probably a little 3: Anti-Virus too much work for the novice computer user. However, with a 4: Anti-Spyware good HOSTS file and using a PAC (as well as using the content 5: Configure Windows advisor), you can effectively block access to most porn sites as well as sites that can infect your computer with spyware and viruses.
51
2. As it stands, the file is good to go. However, if you want to tweak it, open the file in WordPad.
3. There is a lot of information here, but its easiest to just skip to the important parts. Using Find search for the words pass list. Here you can enter sites that will always be allowed.
When you want to add a site to the list, its important to follow the format. The best thing to do is copy a line and paste it below the bottom one in the group, then change the part of the site listed in quotation marks.
52
4. Now, using the Find command, type the phrase blocked wordlist a and hit the enter key.
5. Directly above that is all the a words on the blocked list. Scroll down and you will see a rather large list of words commonly linked to explicit material, in alphabetical order. Just a warning: some of these words are pretty bad. Save and close the file when you are done.
If you want to add more keywords to the list, just follow the form. Its easiest to just copy a line, paste it, and change the keyword in quotes. Asterisks need to be included.
53
6. In the Internet Explorer menu, select "Tools", then "Internet Options", then go to the "Connections" tab. Click the "Settings..." or "LAN Settings..." button depending on whether you have broadband or a dialup connection. 7. Check the "Use automatic configuration script" box and enter the location of your PAC file. You must use the "file://" protocol when specifying your file location. When you get done, you should have something like this:
XP file://C:/Windows/system32/drivers/etc/proxy 2000 file://C:/WINNT/system32/drivers/etc/proxy 98/ME file://C:/Windows/proxy Click the OK box when you are done.
54
8. In the Internet Explorer menu, select "Tools", then "Internet Options", then open the "Security" tab. Select the "Local intranet" icon, then hit the "Sites" button. Remove the check from the "Include all sites that bypass the proxy server" box. 9. Next run IE-auto-proxy-cache.reg (which is included on the take-away disc) to disable proxy caching. If you dont do this, you wont be able to look at any website. You will need to do this for every account on the computer.
10. Empty your browsers cache. Select "Tools, then "Internet Options. On the "General" tab in the "Temporary Internet files" section, click the "Delete files..." button.
55
56
57
1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC
58
DONT PANIC!!!!!
Despite your best efforts, you get a virus. It happens. But it doesnt mean you have to call Symantec, pay Geek Squad to come over, or replace your computer. Yes, there really are people who get new computers when they get a virus. But you dont have to be one of them. All you need is some patience, know a few little tricks, and your computer will be as good as new in relatively little time, and with all your files intact too (we hope). Of course, no one would blame you if you just wanted to start from 1: Windows Updates scratch. Depending on the severity of the infection and the speed of 2: Firewall your system, it could take a very long time to clean it. If the computer doesnt have a lot of important files, you may want to reload it. If its a 3: Anti-Virus very important computer or you have no way to reload it (lost a disc, 4: Anti-Spyware 5: Configure Windows product key, etc.) then it would be worth the time remove the virus. The point is, whether or not you decide to try and remove a virus, you can 6: HOSTS & PAC do all these things by yourself, including reloading your computer.
59
Number Seven:
1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC
SYSTEM RESTORE
60
There are a number of ways to get to the location to turn this off. The easiest ways are to: a) Hold down the Windows key on your keyboard, and press the Pause/Break key ORb) Right-click on My Computer and click on the word Properties 1. The System Properties window should be open. Click on the System Restore tab. 2. To turn off System Restore, click the checkbox next to Turn off System Restore. Click the Apply button. You will get a warning message telling you that you will lose all restore points if you continue. Click OK. Depending on how many restore points you have, it may take a while. The status box at the bottom of the window will change from Monitoring to Turned Off.
61
1. Start the System Restore Wizard. This can be done one of two ways. You can find it by going to Start, All Programs, Accessories, System Tools, System Restore. If System Restore isnt in your System Tools menu, then the other way to get there is by going to Start, Help and Support, and typing system restore in the box next to Search and hit the enter key.
62
63
3. You will now see a calendar and a list box. To select a restore point, first pick a bold date on the calendar. On the list box, you will see all the restore points made for that day. Select the one you want in the list box by clicking on it, and then clicking the Next button.
64
65
66
Number Eight:
1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC 7: System Restore
SAFE MODE
67
68
1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC 7: System Restore
69
Number Nine:
1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC 7: System Restore 8: Safe Mode
WINDOWS REGISTRY
70
71
3. When you have a virus or spyware, it will many times set itself to automatically run when you log on the computer. Even if you remove a virus, you may still get a message when your computer starts about a program missing a link, which is usually because Windows is still looking for that program since the key about it is still in the registry. The most common locations an entry for this are found is in the following locations. You can get there by doubleclicking on the following folders: HKEY_LOCAL_MACHINE, Software, Microsoft, Windows, CurrentVersion, Run or RunOnce or RunOnceEx. To delete a key, just click on the name and hit the delete key. You will be asked if you want to delete it. Click Yes to confirm.
72
73
Number Ten:
1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC 7: System Restore 8: Safe Mode 9: Windows Registry
RECOVERY CONSOLE
74
Recovery Console isnt pretty. If you remember computers in the 1980s and working on DOS, this is what it is like. All the commands are text1: Windows Updates based, and there is a limit to what you can do. It may seem a little intimidating, since you arent really given a tutorial on how to use it, but 2: Firewall as long as you can follow directions you can do it. 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows So what does Recovery Console have to do with virus removal? If an infection corrupts files, you can use the console to repair them when 6: HOSTS & PAC nothing else seems to work. It is also useful for deleting a virus-related 7: System Restore file that you cant delete otherwise. But this is just the start of the 8: Safe Mode 9: Windows Registry features.
1. Insert your Windows operating system disc. If you are already in Windows, reboot. You should see a message on the screen that asks you press any key to boot from the CD. Press any key you want. Files will be loaded from the CD, and eventually, you should see the Windows XP Professional Setup screen.
75
4. After a few seconds, the Recovery Console will appear. You will see a list starting with 1:xxxxx and below it you will be asked which Windows installation you want to log into for. For the most part, all you will see is 1. To enter the installation, type the number (1, 3, etc.) and hit enter. You will then be asked to type the administrator password, the one for the default administrator account. If there is none, just hit enter, otherwise type the password and hit enter to continue.
76
4. You will then be at the command prompt, a very plain looking screen that will say something like C:\WINDOWS> with a blinking cursor. At this point, type help and hit enter. You will see a list of commands. Hit enter to see the rest one by one, or the space bar to see the next page of commands. If you dont want to see any more, then just press the escape key (ESC).
77
5. To see more information about a command, like how to use it, just type the commands name + /? (ex: del /?) or type help + the command name (ex: help del).
6. When youre done, just type exit at the command prompt to reboot the computer.
78
79
Number Eleven:
1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC 7: System Restore 8: Safe Mode 9: Windows Registry 10: Recovery Console
REPAIR INSTALL
80
3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC 7: System Restore 8: Safe Mode 9: Windows Registry
Should you decide to do one, there is no guarantee Windows will boot. And if it does, it is very important that you dont get online before turning Windows firewall on. In fact, until youve scanned for viruses, you probably shouldnt connect to the internet at all. If this doesnt work, then a complete reinstall may be your only option.
1. Insert your Windows operating system disc. If you are already in Windows, reboot. You should see a message on the screen that asks you press any key to boot from the CD. Press any key you want. Files will be loaded from the CD, and eventually, you should see the Windows XP Professional Setup screen.
81
82
4. Next, Windows Setup will look for existing installations of Windows XP, even if they arent functioning properly. You will be asked to repair the installation, or install a fresh copy. Hit the r key to do a repair install. If you are not given an option, then the Windows data is too corrupted. In any case, just follow the instructions.
83
84
1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC 7: System Restore 8: Safe Mode 9: Windows Registry 10: Recovery Console 11: Repair Installation
STOP!!!!
85
1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC 7: System Restore 8: Safe Mode 9: Windows Registry 10: Recovery Console 11: Repair Installation
What if there was a tool that magically reset your computer every night?
86
1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC 7: System Restore 8: Safe Mode 9: Windows Registry 10: Recovery Console 11: Repair Installation
OK, so maybe there is something like this (DeepFreeze). But is it free? NO!!
87
1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC 7: System Restore 8: Safe Mode 9: Windows Registry 10: Recovery Console 11: Repair Installation
I hope so!
88
Microsoft has created a tool for computer labs, or places where more than one person would be using the same computer. This tool is similar to Deep Freeze, but its 100% free.
1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC 7: System Restore 8: Safe Mode 9: Windows Registry 10: Recovery Console 11: Repair Installation
And if you run a computer lab, it will make your life SOOOOOO much easier you wont know what to do with yourself.
89
1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows 6: HOSTS & PAC 7: System Restore 8: Safe Mode 9: Windows Registry 10: Recovery Console 11: Repair Installation
Questions? Comments?
(Tomatoes to throw?)