Return-Path: <sentto-279987-2789-1002585734-fc=all.net@returns.onelist.com> Delivered-To: fc@all.net Received: from 204.181.12.215 by localhost with POP3 (fetchmail-5.1.0) for fc@localhost (single-drop); Mon, 08 Oct 2001 17:06:08 -0700 (PDT) Received: (qmail 11488 invoked by uid 510); 9 Oct 2001 00:04:26 -0000 Received: from n14.groups.yahoo.com (216.115.96.64) by 204.181.12.215 with SMTP; 9 Oct 2001 00:04:26 -0000 X-eGroups-Return: sentto-279987-2789-1002585734-fc=all.net@returns.onelist.com Received: from [10.1.1.223] by n14.groups.yahoo.com with NNFMP; 09 Oct 2001 00:04:30 -0000 X-Sender: fc@big.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-7_4_1); 9 Oct 2001 00:02:14 -0000 Received: (qmail 23675 invoked from network); 9 Oct 2001 00:01:34 -0000 Received: from unknown (10.1.10.142) by 10.1.1.223 with QMQP; 9 Oct 2001 00:01:34 -0000 Received: from unknown (HELO big.all.net) (65.0.156.78) by mta3 with SMTP; 9 Oct 2001 00:03:49 -0000 Received: (from fc@localhost) by big.all.net (8.9.3/8.7.3) id RAA16344 for iwar@onelist.com; Mon, 8 Oct 2001 17:03:49 -0700 Message-Id: <200110090003.RAA16344@big.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL1] From: Fred Cohen <fc@all.net> Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Mon, 8 Oct 2001 17:03:49 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Keeping.your.computer.secure] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Keeping your computer secure The Associated Press, 10/8/2001 http://www.nandotimes.com/technology/story/126245p-1331502c.html The increased security across the country after the terrorist destruction of New York's World Trade Center has moved the antivirus software folk to remind us that it's important that your computers be secure, too. And, oddly enough, they have just the thing to do the trick. If you keep it reasonably up to date with downloads from the manufacturer, antivirus software will protect your machine from known forms of mischief and malice. And because nasty software can do anything from making a tasteless joke to destroying your data or sending key personal information for identity thievery, it's probably worth the investment if you don't already have it. But remember that the real problems are invariably caused by some new evil creation that isn't discovered until the damage is done. To guard against that, you'll have to rely on the wetware between your ears and some common (although uncommonly practiced) sense. First, don't open e-mail from an unknown source. The odds are high that it's mindless commercial or political spam, but it also could contain a virus. Second, if you've ignored the first rule, don't click on any attachments, especially ones with file names ending in extensions normally used for executable files and macros, namely, exe, com, bat, vbs and others. Be especially suspicious about file names or come-ons that appeal to your baser instincts. Example: in March, the attachment named NakedWife.exe was too enticing for many to resist. Third, don't download files unless you trust the source, bearing in mind that anything that looks too good to be true probably is just that. Someone offering free commercial software or music for download at the best is breaking the copyright law and at the worst is infecting your machine. Finally, when you're not using the computer turn it off, especially with the "always on" Internet connections now available. Or, if you can't bear the thought of waiting through a system boot sequence, make certain you have firewall software installed. Firewall software interrupts attempts to probe your machine and either stops them cold or asks you if the activity is permitted. Most of us aren't running mission-critical systems such as air-traffic control on home PCs, and security there must happen at many and higher levels. For the home user, some virus software and lots of sense will do the trick. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide! http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:54 PST