Read Latex

Tuesday, July 08, 2008

PC Security Checklist


As more activities migrate to personal computers, system security becomes a greater concern. Threats to PC security include viruses, Trojans, worms, phishing schemes, buried processes and distracting scams. This note is Wintel-centric but applies to Mac and Linux boxes as well. This note addresses five categories of personal computing security.

A) Physical and Site Security - Routers and Locks

The web connection coming into your house is just another sewer pipe. Treat it accordingly. Use a router, lock it down.

1) Avoid connecting your DSL or cable modem directly to your computer. Instead,isolate your IP address by placing a router between you and the outside world. This also gives you additional ports that you can control access to and from. A router makes it difficult for an outsider to see your IP address (your internet phone number) or your MAC address (your hardware unique identifiers).

2) Install your router where you can see it. Control physical access to it.

3) Change your router name and password to something besides admin, admin.

4) Change your router IP address to something other than 192,168.1.1. Your browser will remember the new address. The router address can be reset by rebooting your router, but not without physical access.

5) The internet is NOT ham radio. Goodwill, Character and Integrity do not apply as in the licensed arts. Use 128-bit WEP or better encryption. Any device that connects to my router (the internet equivalent of a repeater) must have permission.

B) Soft Security - Anti-virus Software

You can do everything right and still get infected.

1) Install good anti-virus software. I currently use McAfee because it comes free with my Scottrade account and I can run three legal copies of it on other computers in the household. I have used Norton, but it costs too much, expires frequently and hogs system resources. I really like the free AVG software. It is excellent and they don't try to elbow out everything else. Computer Associates gives you a free trial and then makes uninstalling a total nightmare. This goes for several other packages. If a vendor doesn't provide a clean uninstaller, don't use them, because THEY are a virus.

2) Use firewall software. Insert exceptions for required sites and services like Echolink.

C) Email Security

Scan inbound and outbound email and attachments using anti-virus software.
1) Don't open attachments from people you don't know.

2) Google gmail allows you to report items as spam. Use it.

3) Report fraud and phishing emails to their respective agencies including the ISP, Paypal, Ebay, FBI and Attorney General. Some ebay frauds have been really authentic looking. Check for spoof URL's before responding.

4) Keep a primary email account, and route all other email accounts to and
from it. This is for convenience as much as security.

D) Browser Security - Plug-ins and Spyware

Try Firefox 3.0 or later. It is multi-platform, open source, and accountable.

1) McAfee red lights troublesome web destinations, including bad ham radio destinations which are rare. I average 490 searches a month so this is quite handy. Other products also do this. Do not let anyone or anything obstruct your access to good information.

2) Don't use products (e.g. Real Video) that monopolize services such as video display and attempt to be the end all. If you give them your name and address you will get on "some list". Some lists go everywhere. Some programs will leave background processes running to report back to the mother ship. Besides invading your privacy these make browsing and computing slow.. AT&T Yahoo DSL is notorious about filling your PC with wasteful market-driven processes. They have destroyed the quality of many a newcomer's experience by marketing them to death. Too many choices.

3) Use Google Safe Search to avoid sites that are a frequent source of viruses. Your computer will get sick. It's karma.

4) Use Microsoft AntiSpyware. Forced by their own losses to develop this product, it works and its free. It is fairly lightweight, process-wise. Enable the auto-download, but require them to ask permission to install. Keep track of what they are adding or subtracting from your computer. Their track record requires them to be supervised.

5) Avoid illegal download sites for music, videos, or software. Your computer will get sick. More karma. Why steal? You will have to make a list like Earl.

E) Kid Security

"Little eyes, watch what you see..."

1) Put kid computers in a public place like the kitchen.

2) Check your kids browser history, chat, IM, Skype, often.

3) Facebook trumps myspace, but not by much. Check online friends and memberships often.

Conclusion

We live in the age of hot and cold running knowledge. Anything that obstructs access to this knowledge is a loss of freedom.

We also live in the wild west of the information age. Forewarned is forearmed.


L. Van Warren - AE5CC