Computer Protection
Is your computer protected against common computer sickness? In this section,
you will actually install protection software on your PC, scan your hard disk
for damaged sectors, and develop a backup schedule. Please read the What is
Malware and Fighting these problems sections, and then follow the "What
you should do now" instructions.
What is Malware?
There are many types of Malware. All gain unathorized access to your computer
or disrupt normal operations. Some programs are blended, performing more than
one type of harm. Different malware types are:
- A virus is a program that runs without you launching it, and reproduces
itself on your computer. (http://www.webopedia.com/TERM/v/virus.html
) Most viruses can attach themselves to other programs. The only way to get
a new virus is to get a new file, but you get new files constantly through
web downloads, email attachments and many other ways. Anti-virus programs
protect you with both scans of your disk and scans of any new entries to your
disk, like e-mail attachments.
- A worm is a malicious program that will spread to other computers
without the user's knowledge. They can enter your computer through browser
and operating system security holes, as email attachments, email links, itstand
messaging links or pop-up ads, as well as through any file that is added to
your system. A mass-mailing work will send itself to everyone in your address
book. Some even infect mobile phones.
- A trojan does not replicate itself. Instead, it masquerades as a
useful utility or program, but actually performs another unintended function.
They might steal keystrokes or open a back door so someone can look at the
contents of your computer.
- A bot (sort of short for robot) is an intelligent agent that can
be a good program. It can automate a task and run automatically when it is
scheduled. Bots can be set to get their instructions from another computer,
in which case, they are called zombies. Bots can help with linking up many
computers together to form a botnet. The computing power of those linked computers
can be used to do any task the hacker wants.
- A Spyware program collects personal information from your computer
and sends it back to its own site. It can collect innocuous information such
as your web surfing habits, or it can collect financial and password information.
(http://www.webopedia.com/TERM/s/spyware.html)
An anti-spyware program (such as spybot) will protect against spyware. Often
download agreements tell you that spyware is being included in the program,
but these are not read.
- Adware is a form of spyware that is less dangerous. It displays advertisements,
but uses your computer resources. (http://www.webopedia.com/TERM/a/adware.html).
Lavasoft's ad-aware is great for removing these. A pop-up stopper will treat
the symptom, which is good too. Pop-up stoppers do not stop the adware from
running and using memory, just from popping.
- More detailed great description: http://www.kaspersky.com/cyberthreats?chapter=207716431
Fighting these problems:
- Backups are crucial. Expect that you will be hit by either software or hardware
problems eventually. Keep your install disks safely accessible for that emergency.
Backup regularly.
- New problems are being created, so yesterday's fighting tools are not good
enough. All anti-virus, anti-spyware or anti-adware programs need to be updated
at least weekly. Most come with buttons to help you connect to the internet
for updates before scanning.
- Phishing convinces users that a site or email is legitimate in order to
provoke the user to enter confidential information, often from ebay, paypal,
online shopping sites and banks. In one example, a computer worm took over
pages on MySpace and altered links to direct surfers to websites designed
to steal login details. Never give financial information as a result of clicking
on an email link or a link from another site. Go directly to the company's
web site first. You can also call the company and verify the request is legitimate.
- Before downloading software, see whether you can find the software at download.com,
which will include user and CNET ratings. If you must download from another
site, check that site in google by typing the site name (without the www or
.com) and the words mcafee, or cnet to find articles on whether the site is
acceptable.
- If an email asks you to delete a file, verify that the email is not a hoax
by searching for a portion of the message on http://www.snopes.com/
- One program will not protect you. Having one anti-virus running will not
protect your computer, as their focus is virus, not spyware or adware.
- You don't have to pay for all these. The free scanners are adequate.
- Microsoft windows operating system and the Internet Explorer browser comes
with security openings. Microsoft closes these as hackers find them, so it
is crucial to run the Windows Update option and install all the "critical"
or "security" updates. They take a long time, so be prepared.
- Scans often take a long time. Run them overnight when possible.
- When your system acts up (or rather slows down), it could be bad hardware.
To check your hard disk, you can run a disk scan, and then you can also defragment
it (which means that you put all the file parts together so that data isn't
scattered). Click here for instructions on how to find these tools in windows.
- When your system slows down, you can also check the processes in your task
list. (To see the task list, hit <CTRL> <ALT> <DEL> and
then hit the "processes" tab.) What you want to see there depends
upon what you have loaded in your system, but you may also see alot of unwanted
processes. You can copy each of the process names into google to see whether
it belongs to a program you want running. The Tech Guy Support Forum is a
great place to ask for help if you are stuck on removing a certain process.
- Guides to some free tools:
What you should do now:
- Play this game to help you remember the different types of malware. click
here (You may need to turn off java script blockers in your browser)
- Plan how you will backup your work for this class. For small projects, you
can just email copies to yourself. For larger projects, you can store a copy
on a backup or alternative drive, or on a flash drive or Rewriteable CD. Remember
that an electricity hit might destroy any drive permanently attached to your
system so be sure to backup to something not attached to your PC (flash drive
or CD) occasionally.
- If you do not have an antivirus program, you should purchase one or install
one of these free antivirus programs: http://www.freebyte.com/antivirus/
Note that Norton Anti-Virus is free if you live on campus. Call 877-3340 for
information.
- Read your anti-virus program information to see whether it protects against
spyware. If it does not, you can download spybot by clicking on http://www.safer-networking.org/en/download/index.html
- Installing Lavasoft's ad-aware is a good idea. It can catch adware that
anti-virus programs do not concentrate upon. Some of the sites you may visit
for the class will generate adware, and Ad-aware will remove it. You can download
it from http://www.lavasoft.com/ and
choose the free version.
Extra Optional Links:
Your book's antivirus and spyware info page - with good links:
http://www.infoweblinks.com/content/antivirussoftware.htm
http://www.infoweblinks.com/content/adblocker.htm
Here is a sheet you can fill out to outline your PC Protection schedule:
Print out the attached sheet, fill in the answers. There is no need to hand
this in, but you are welcome to discuss it with me if you are unsure of your
answers: http://home.adelphi.edu/~pe16132/csc170/systemtools_pcprotect.htm