[iwar] [fc:Keeping.your.computer.secure]

From: Fred Cohen (fc@all.net)
Date: 2001-10-08 17:03:49


Return-Path: <sentto-279987-2789-1002585734-fc=all.net@returns.onelist.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 08 Oct 2001 17:06:08 -0700 (PDT)
Received: (qmail 11488 invoked by uid 510); 9 Oct 2001 00:04:26 -0000
Received: from n14.groups.yahoo.com (216.115.96.64) by 204.181.12.215 with SMTP; 9 Oct 2001 00:04:26 -0000
X-eGroups-Return: sentto-279987-2789-1002585734-fc=all.net@returns.onelist.com
Received: from [10.1.1.223] by n14.groups.yahoo.com with NNFMP; 09 Oct 2001 00:04:30 -0000
X-Sender: fc@big.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-7_4_1); 9 Oct 2001 00:02:14 -0000
Received: (qmail 23675 invoked from network); 9 Oct 2001 00:01:34 -0000
Received: from unknown (10.1.10.142) by 10.1.1.223 with QMQP; 9 Oct 2001 00:01:34 -0000
Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 9 Oct 2001 00:03:49 -0000
Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id RAA16344 for iwar@onelist.com; Mon, 8 Oct 2001 17:03:49 -0700
Message-Id: <200110090003.RAA16344@big.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL1]
From: Fred Cohen <fc@all.net>
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Mon, 8 Oct 2001 17:03:49 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Keeping.your.computer.secure]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Keeping your computer secure 
The Associated Press, 10/8/2001 http://www.nandotimes.com/technology/story/126245p-1331502c.html

The increased security across the country after the terrorist
destruction of New York's World Trade Center has moved the antivirus
software folk to remind us that it's important that your computers be
secure, too. 

And, oddly enough, they have just the thing to do the trick. 

If you keep it reasonably up to date with downloads from the
manufacturer, antivirus software will protect your machine from known
forms of mischief and malice.  And because nasty software can do
anything from making a tasteless joke to destroying your data or sending
key personal information for identity thievery, it's probably worth the
investment if you don't already have it. 

But remember that the real problems are invariably caused by some new
evil creation that isn't discovered until the damage is done.  To guard
against that, you'll have to rely on the wetware between your ears and
some common (although uncommonly practiced) sense. 

First, don't open e-mail from an unknown source.  The odds are high that
it's mindless commercial or political spam, but it also could contain a
virus. 

Second, if you've ignored the first rule, don't click on any
attachments, especially ones with file names ending in extensions
normally used for executable files and macros, namely, exe, com, bat,
vbs and others.  Be especially suspicious about file names or come-ons
that appeal to your baser instincts.  Example: in March, the attachment
named NakedWife.exe was too enticing for many to resist. 

Third, don't download files unless you trust the source, bearing in mind
that anything that looks too good to be true probably is just that. 
Someone offering free commercial software or music for download at the
best is breaking the copyright law and at the worst is infecting your
machine. 

Finally, when you're not using the computer turn it off, especially with
the "always on" Internet connections now available.  Or, if you can't
bear the thought of waiting through a system boot sequence, make certain
you have firewall software installed.  Firewall software interrupts
attempts to probe your machine and either stops them cold or asks you if
the activity is permitted. 

Most of us aren't running mission-critical systems such as air-traffic
control on home PCs, and security there must happen at many and higher
levels.  For the home user, some virus software and lots of sense will
do the trick. 

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:54 PST