[iwar] [fc:Protecting.Your.Computer.Now.Part.of.National.Security]

From: Fred Cohen (fc@all.net)
Date: 2001-11-04 20:26:30


Return-Path: <sentto-279987-3761-1004934359-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Sun, 04 Nov 2001 20:27:08 -0800 (PST)
Received: (qmail 2079 invoked by uid 510); 5 Nov 2001 04:25:05 -0000
Received: from n18.groups.yahoo.com (216.115.96.68) by 204.181.12.215 with SMTP; 5 Nov 2001 04:25:05 -0000
X-eGroups-Return: sentto-279987-3761-1004934359-fc=all.net@returns.groups.yahoo.com
Received: from [10.1.1.222] by n18.groups.yahoo.com with NNFMP; 05 Nov 2001 04:26:02 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 5 Nov 2001 04:25:59 -0000
Received: (qmail 58093 invoked from network); 5 Nov 2001 04:25:59 -0000
Received: from unknown (216.115.97.167) by m4.grp.snv.yahoo.com with QMQP; 5 Nov 2001 04:25:59 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1.grp.snv.yahoo.com with SMTP; 5 Nov 2001 04:25:59 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id fA54QUx02115 for iwar@onelist.com; Sun, 4 Nov 2001 20:26:30 -0800
Message-Id: <200111050426.fA54QUx02115@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Sun, 4 Nov 2001 20:26:30 -0800 (PST)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Protecting.Your.Computer.Now.Part.of.National.Security]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 8bit

Protecting Your Computer Now Part of National Security

By Bill Husted, NewsFactor Network, 11/1/2001
<a href="http://www.newsfactor.com/perl/story/14492.html">http://www.newsfactor.com/perl/story/14492.html>

You have a weapon sitting on your desk that terrorists could use. It's a
good idea to make sure they can't. 
Once upon a time, in a more peaceful world, protecting your computer was
smart but not all that important. In the past month we've found a new
definition of important. 
Back then, in the world before the horror show, a computer virus could
do its worst and - when the day was done - all that was lost was some
bits and bytes on your hard disk. 
Way back then, a hacker attack was annoying. It might slow the Internet
by some few seconds, or commandeer your computer as a tool to be used to
flood a Web site with too much data to handle. Worst case, a few Web
sites slowed down or even temporarily shut down. Life went on. 
Protecting the Net 
Nowadays, there's a new and better reason to protect your computer. By
protecting it, you are taking a small step toward protecting the
Internet itself. The Internet has become a lifeline. It's living up to
the reason it was created: to provide a fail-safe way to communicate. 
The Internet was built to offer dependable communications, no matter
what. It has many alternative paths for information to follow, so that
if one malfunctions, another can take its place. 
A lot of folks - right or wrong - are afraid to open their postal mail
these days. So e-mail has become more important. Besides, the
information that flows over the Net has always been more than just
instant-message chats and e-mail from your Aunt Sally. It is a vital
link for researchers - including those working on ways to identify
bioterrorist threats. It is used by government and volunteer
organizations to coordinate relief and help measures. 
It's worth protecting. 
How To Help 
You can help. It's a tiny thing, but - for many people who want to help
and don't know how - there are things you can do at home to protect the
Net and the information it carries. 
There's no way of knowing if terrorists are sophisticated enough to do
serious damage to the Internet. It seems unlikely. But just a short
while ago, it seemed unlikely terrorists could acquire and deliver
deadly anthrax spores. 
We know - because it has happened before - that hackers can hijack your
home computer and use it to overwhelm Web sites in what is called a
denial-of-service attack. We also know some worms and viruses can take
over e-mail programs on individual computers and send enough mail to
slow the Net. 
That means you have a weapon sitting on your desk that terrorists could
use. It's a good idea to make sure they can't.

Install a Firewall 
We've talked about firewalls before. A firewall protects the security of
your PC. It's a good first step. 
If you have a copy of Windows XP installed, use the built-in firewall.
If you don't know how to do that, type the word "firewall" in the help
menu and you'll find directions that guide you through the process. 
Or, for other computers and operating systems, download a good firewall
program - there are plenty of free ones - such as Zone Alarm (available
for download at www.zonelabs.com). 
Then examine the way you compute. If you leave your computer on while
you sleep - and you're connected to an "always on" Internet service such
as a digital subscriber line or a high-speed cable modem, consider
turning the machine off at night. That's a sure way to protect it. When
you hit the off switch, the computer is completely off-limits to
hackers. 
Next, if you don't have a good anti-virus program, get one. Symantec
makes one of the best - Norton AntiVirus - but any anti-virus program is
better than none. 
Update Antivirus 
If you have failed to keep your anti-virus program up to date, start
doing that. At least once a week, check the Web site of the company that
manufactures the anti-virus program for updates. Most anti-virus
programs can be set up to automatically check for updates. If yours can
- Norton is one that can - use that feature. 
Then keep in mind that many viruses travel the Internet on hoax e-mails.
If you get an e-mail with an attachment, think twice before opening the
attachment. If necessary, call the sender and tell them to send the
information some other way. 
Think three times - then think again - before forwarding an e-mail with
an attachment. I don't care if it promises riches if you forward it, or
if your best friend includes a note vouching for what the e-mail says.
Many e-mail viruses move this way. Don't help out by forwarding the
e-mail. 
Just keep in mind that your computer really is not a thinking machine.
Let it stick to the computing and - especially during a time like this -
it's important that you do the thinking. 
© 2001 Cox News Service i/a/w ScreamingMedia, Inc. All rights reserved. © 2001 NewsFactor 
Network. All rights reserved.

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:58 PST