Return-Path: <sentto-279987-3761-1004934359-fc=all.net@returns.groups.yahoo.com> Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 04 Nov 2001 20:27:08 -0800 (PST) Received: (qmail 2079 invoked by uid 510); 5 Nov 2001 04:25:05 -0000 Received: from n18.groups.yahoo.com (216.115.96.68) by 204.181.12.215 with SMTP; 5 Nov 2001 04:25:05 -0000 X-eGroups-Return: sentto-279987-3761-1004934359-fc=all.net@returns.groups.yahoo.com Received: from [10.1.1.222] by n18.groups.yahoo.com with NNFMP; 05 Nov 2001 04:26:02 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 5 Nov 2001 04:25:59 -0000 Received: (qmail 58093 invoked from network); 5 Nov 2001 04:25:59 -0000 Received: from unknown (216.115.97.167) by m4.grp.snv.yahoo.com with QMQP; 5 Nov 2001 04:25:59 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1.grp.snv.yahoo.com with SMTP; 5 Nov 2001 04:25:59 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fA54QUx02115 for iwar@onelist.com; Sun, 4 Nov 2001 20:26:30 -0800 Message-Id: <200111050426.fA54QUx02115@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Sun, 4 Nov 2001 20:26:30 -0800 (PST) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Protecting.Your.Computer.Now.Part.of.National.Security] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 8bit Protecting Your Computer Now Part of National Security By Bill Husted, NewsFactor Network, 11/1/2001 <a href="http://www.newsfactor.com/perl/story/14492.html">http://www.newsfactor.com/perl/story/14492.html> You have a weapon sitting on your desk that terrorists could use. It's a good idea to make sure they can't. Once upon a time, in a more peaceful world, protecting your computer was smart but not all that important. In the past month we've found a new definition of important. Back then, in the world before the horror show, a computer virus could do its worst and - when the day was done - all that was lost was some bits and bytes on your hard disk. Way back then, a hacker attack was annoying. It might slow the Internet by some few seconds, or commandeer your computer as a tool to be used to flood a Web site with too much data to handle. Worst case, a few Web sites slowed down or even temporarily shut down. Life went on. Protecting the Net Nowadays, there's a new and better reason to protect your computer. By protecting it, you are taking a small step toward protecting the Internet itself. The Internet has become a lifeline. It's living up to the reason it was created: to provide a fail-safe way to communicate. The Internet was built to offer dependable communications, no matter what. It has many alternative paths for information to follow, so that if one malfunctions, another can take its place. A lot of folks - right or wrong - are afraid to open their postal mail these days. So e-mail has become more important. Besides, the information that flows over the Net has always been more than just instant-message chats and e-mail from your Aunt Sally. It is a vital link for researchers - including those working on ways to identify bioterrorist threats. It is used by government and volunteer organizations to coordinate relief and help measures. It's worth protecting. How To Help You can help. It's a tiny thing, but - for many people who want to help and don't know how - there are things you can do at home to protect the Net and the information it carries. There's no way of knowing if terrorists are sophisticated enough to do serious damage to the Internet. It seems unlikely. But just a short while ago, it seemed unlikely terrorists could acquire and deliver deadly anthrax spores. We know - because it has happened before - that hackers can hijack your home computer and use it to overwhelm Web sites in what is called a denial-of-service attack. We also know some worms and viruses can take over e-mail programs on individual computers and send enough mail to slow the Net. That means you have a weapon sitting on your desk that terrorists could use. It's a good idea to make sure they can't. Install a Firewall We've talked about firewalls before. A firewall protects the security of your PC. It's a good first step. If you have a copy of Windows XP installed, use the built-in firewall. If you don't know how to do that, type the word "firewall" in the help menu and you'll find directions that guide you through the process. Or, for other computers and operating systems, download a good firewall program - there are plenty of free ones - such as Zone Alarm (available for download at www.zonelabs.com). Then examine the way you compute. If you leave your computer on while you sleep - and you're connected to an "always on" Internet service such as a digital subscriber line or a high-speed cable modem, consider turning the machine off at night. That's a sure way to protect it. When you hit the off switch, the computer is completely off-limits to hackers. Next, if you don't have a good anti-virus program, get one. Symantec makes one of the best - Norton AntiVirus - but any anti-virus program is better than none. Update Antivirus If you have failed to keep your anti-virus program up to date, start doing that. At least once a week, check the Web site of the company that manufactures the anti-virus program for updates. Most anti-virus programs can be set up to automatically check for updates. If yours can - Norton is one that can - use that feature. Then keep in mind that many viruses travel the Internet on hoax e-mails. If you get an e-mail with an attachment, think twice before opening the attachment. If necessary, call the sender and tell them to send the information some other way. Think three times - then think again - before forwarding an e-mail with an attachment. I don't care if it promises riches if you forward it, or if your best friend includes a note vouching for what the e-mail says. Many e-mail viruses move this way. Don't help out by forwarding the e-mail. Just keep in mind that your computer really is not a thinking machine. Let it stick to the computing and - especially during a time like this - it's important that you do the thinking. © 2001 Cox News Service i/a/w ScreamingMedia, Inc. All rights reserved. © 2001 NewsFactor Network. All rights reserved. ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST