SlideShare une entreprise Scribd logo
1  sur  41
Be Your Own IT Guy!Viruses, Worms, and Hackers: Protect Your Personal Computer
“Just Minutes to the Internet” “Softwarecompanies should take more responsibility for security holes, especially in browsers and e-mail clients. There are some straightforward things the industry should be doing right now to fix things, and I don't know why they haven't been done yet.” Tim Berners-Lee - World Wide Web Founder
Relaxing Day Surfing….. Or so you were thinking on your day off, but the PC is slow, or maybe didn’t start at all..you try everything but it just sits there laughing, time you face facts……………
         YOURE INFECTED!!!! .
The Problem…. There is a tradeoff between ease of use and security for computers To sell more products, companies have to make computers easy to use. However, today’s powerful computers plugged into the internet shouldn’t be treated like any other new household appliance. They need informed users who maintain and protect themselves.
The Even Greater Problem… The Internet is being scanned constantly by automated self-replicating worms and deliberate attacks.  Hackers want to exploit computers with lax security to take advantage of hard drive space, relatively fast connections, and passwords to your finances.
Common Security Problems for Home Machines May include: privacy invasions backdoor/trojan infections where an unauthorized person remotely has complete control of your computer.     virus and worm infections,  spyware warez (file-trading) servers installed,  your computer is used to attack other computers destruction of files (data, operating system, etc)
Am I at Risk at home?  Why? Cable modems / DSL: have a fast, always on connection that hackers can return to again and again.  This atmosphere also provides a good breeding ground for self-replicating worms. “Camping out” on a WiFimodem: keeping the same router address allows hackers to scan your system and return at a later date to infect it. Short dial up modem sessions: Occasionally, security incidents occur on dial-up machines with both worms and “hacking” incidents.
Malware, Viruses, and Worms Viruses are small programs which cause some unexpected event on a computer and automatically spread to other computers via e-mail, open file shares, and programs installed on the computer (e.g. Kazaa, AOL Instant Messenger, etc). Worms are self-replicating viruses that are loaded into computer memory rather than altering files on the machine.  A worm’s main goal in life is to spread to as many other machines as possible.
Malware, Viruses, and Worms Malware is software which has malicious intent that is usually installed without the owner’s knowledge.  Malware may be disguised to look like benevolent software. A fake Antivirus called “Antivirus 2009” and now Antivirus 2010” has infected dubious millions.
How to Make Your Home Machine As Secure As Possible Make sure your computer has good passwords Patch your machine regularly Install an anti-spyware product Use a good anti-virus product and update it regularly Use a router-based firewall or install a personal firewall Know what is running on your system Use good “internet hygiene”
Where do I start? There are 3 facets to PC Security: Prevention Defense Last Resorts
Prevention Passwords Patches  Updates
Make Sure Your Machine Has Good Passwords Most operating systems require a password to protect your computer from unauthorized access. Passwords should not be dictionary words and should consist of 7+ characters of mixed case including numbers, letters, and symbols. Perfect Password a free password generator that is exceptional can be found at:                      WWW.GRC.COM
Patch Your Machine Regularly Computer software vendors provide regular updates for their products that can protect against known security vulnerabilities.  These updates are called patches. Use automatic updates where possible (e.g. Windows Update) or download updates from vendors.  Try to download major / “critical” patches to removable media such as CD and install them before putting your computer on the Internet for the first time. When you hear of a new major vulnerability or patch, try to install it as soon as possible.
Automatic Updates of MS Windows Operating Systems All Windows OS patches can be accessed at the Microsoft Website, you may have to use IE to access.  You can set up your Microsoft operating system to check for updates automatically Using Windows 7. Vista and XP: 		Click on the Start button > Control Panel > System Using Older Versions: Click on Start > Control Panel > Automatic Updates
Automatic Updates of MS Windows Operating Systems Using Windows 7, Vista 	or XP, select System  	then click on the  	Automatic Updates tab Be sure the check box  	near the top is checked, 	then select the radio button 	which suits you. Using Windows 98 or Me  	select the Automatic Updates 	icon (this next screen  	will differ slightly)
DEFENSE: The best defense is a great offense! Firewalls Antivirus Anti-Spyware Good Old Fashioned Common Sense
A. Personal Firewall A personal firewall is a software-based filter between your computer and the outside world that is installed on your computer to protect it  from unauthorized access by other external users.   Personal firewalls are configurable to specify which incoming and outgoing programs, ports, and IP addresses can be accessed. Recommended personal firewalls that are free for personal use:  Zonealarm http://www.zonealarm.com Comodo http://personalfirewall.comodo.com/ PC Tools ,[object Object],[object Object]
B. The Anti-Virus A program called "Rother J" was the first computer virus to appear "in the wild" — that is, outside the single computer or lab where it was created in 1981. The first publicly documented removal of a computer virus in the wild was performed by Bernt Fix in 1987. He developed a macro thought of as the first Anti-Virus.
Antivirus & Anti-spywares There are many FREE antivirus soft-wares as well as very good pay packages. Look for limited resource users and ease of use.  For the money, here are personally tested best bets:  Kaspersky Antivirus OR Internet Security NOD32 Antivirus OR Smart Security Sophos Internet Security
FREE Antivirus Solutions Avast! Antivirus Avira “The Umbrella” Antivirus BitDefender ClamAV    and the new: Microsoft Security Essentials Panda Cloud (first cloud AV)
THREATFIRE A nice addition to any windows based system is PC Tools “Threatfire” which comes with the firewall as a package and can be downloaded by itself. Protects against rootkits and malware infections. Best of all, its free!
Keep Your Anti-virus Program Up to Date Update virus definitions weekly, or more often if you hear of a new virus Set virus protection to automatically download virus definition updates if possible. Perform a full virus scan of your hard drive(s) at least monthly (if not more often)
MRT.EXE One last note about anti-virus protection, Windows based PCs all have a “secret” stand alone scanner that is updated monthly for the big threats to your PC. The Malicious Software Removal Tool can be accessed through your run button in the start menu and typing simply:    “MRT.EXE”
C. Protect Your Machine From Spyware (Adware) Spyware:  software that is installed on a computer without the user’s knowledge which monitors user activity and transmits it to another computer. Many spyware programs are set to monitor what web sites you visit and how long you visit them for, generally for advertising / marketing purposes (adware).
How Would I Get Spyware Installed On My Machine? Spyware is usually bundled with other software such as  shareware or freeware programs (e.g. Peer to Peer file-sharing programs, games, etc).  The disclosure for the spyware is usually in the fine print of the licensing agreement.  Who reads these anyway? Another way to get spyware on your machine is by clicking on a deceptive pop-up message.
Consequences of Spyware Spyware runs in the background, using your computer’s system resources and memory to log what you are doing.  This could interfere with other programs on your computer, and could even cause your computer to frequently crash or lock up. Spyware also uses your internet connection to send information about your activities to someone else.  This could cause your internet connection to slow significantly.
Examples of Malware One example would be a virus that has a “backdoor” installed.  This means that someone at a remote location has total control of your computer.  That person can modify or add files to your computer, install programs, add user accounts, or even delete all of your files! Another example is a “keylogger”, which records every stroke you enter into your keyboard.   The keylogger may record a wealth of information:  credit card information, passwords, chat room transcripts, private e-mail messages, etc
Scared Yet? Take a Deep Breath and Protect Your Privacy! Install software to detect and remove spyware, adware, and malware Adaware Spybot S&D MalwareBytes Anti-Malware Remove-It Pro  A-Squared Free Edition         Of these Spybot and A-Squared are the two best to choose.
Know What Is On Your System You should periodically determine what all of your running processes are on your computer, and if they are valid. You can analyze what processes are on your Windows system by downloading a tool such as TCPView, Everest and Belarc Advisor. ALL FREE! On a unix system, you can analyze running processes by typing the command “lsof”.
D. Good Old Fashioned Common         			Sense!  Here you're looking to avoid that “Oh God, what did I just do?” OR the dreaded “What…are..you…doing..PC?” feelings we have all had.
Prevent Identity Theft When Making Online Purchases Look for a padlock at the bottom of web pages,  indicating that the site is secured by encrypting data when submitting sensitive information such as credit card numbers or a SSN. A secure site means that your data is encrypted during transmission.  Keep in mind that it says NOTHING about how secure the data is once it is stored on a remote computer.
Prevent Identity Theft When Making Online Purchases Purchase from well-known companies (Don’t buy from mass e-mail solicitation) Realize that reputable web sites will never e-mail request for any personal information such as SSN, password, credit card or bank acct. number, etc.
Use Good Computer Hygiene “Think before you click” Be careful with e-mail attachments – call or write back to confirm before opening Be careful about what web sites you go to. Be careful when prompted to download software Use good passwords and change them periodically for both machine and web sites you visit! Don’t create non-password protected file shares Backup data frequently Remove internet access when it is not needed Install minimal applications and services
So Now I'm Safe Right?  No Antivirus is 100% effective and neither is a firewall. Hackers create malwares and viruses faster than companies can prevent. Its estimated more than 30 a day!  Sometimes there's nothing you can do for an infection as its in too deep and replicates every time it senses a removal.  You may be infected right now and never ever know it.
THE LAST RESORT Total re-install and reformat or “wipe” of your machine using the windows disk.  D-BAN (Derek's Boot and Nuke) format tool, for those tough cases you want to make sure its gone, and recreate a brand new hard drive.
To Review…. There are a lot of simple steps you can take to keep your computer secure and free of intruders.       These include: Prevention: Using “good” passwords Updating and Patching your computer Defense Installing anti-virus, anti-spyware, and firewall products Knowing what is running on your computer and turning off unnecessary software Using good internet hygiene and purchasing habits The LAST RESORT
      WWW.Majorgeeks.COM
Questions?
How To Protect Your Home PC

Contenu connexe

Tendances

Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.QuratNaeem
 
Computer viruses
Computer virusesComputer viruses
Computer virusesaagmansaini
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses WorkCerise Anderson
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From MalwareINFONAUTICS GmbH
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - whiteRozell Sneede
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5AfiqEfendy Zaen
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effectguest7b2ba1
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risksAnzaDar3
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remediesManish Kumar
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systemsSejahtera Affif
 

Tendances (20)

Computer Virus.
Computer Virus.Computer Virus.
Computer Virus.
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
How Computer Viruses Work
How Computer Viruses WorkHow Computer Viruses Work
How Computer Viruses Work
 
How To Protect From Malware
How To Protect From MalwareHow To Protect From Malware
How To Protect From Malware
 
Computer virus
Computer virusComputer virus
Computer virus
 
Removing virus tri fold - white
Removing virus tri fold - whiteRemoving virus tri fold - white
Removing virus tri fold - white
 
Computer viruses
Computer virusesComputer viruses
Computer viruses
 
Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5Virus and Malicious Code Chapter 5
Virus and Malicious Code Chapter 5
 
computer security
computer securitycomputer security
computer security
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
Jeremy Virus Effect
Jeremy   Virus EffectJeremy   Virus Effect
Jeremy Virus Effect
 
Itc lec 15 Computer security risks
Itc lec 15   Computer  security  risksItc lec 15   Computer  security  risks
Itc lec 15 Computer security risks
 
Computer Viruses
Computer VirusesComputer Viruses
Computer Viruses
 
Virus
VirusVirus
Virus
 
List of Malwares
List of MalwaresList of Malwares
List of Malwares
 
Types of malicious software and remedies
Types of malicious software and remediesTypes of malicious software and remedies
Types of malicious software and remedies
 
Cscu module 02 securing operating systems
Cscu module 02 securing operating systemsCscu module 02 securing operating systems
Cscu module 02 securing operating systems
 
Computer virus
Computer virusComputer virus
Computer virus
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Computer virus
Computer virusComputer virus
Computer virus
 

Similaire à How To Protect Your Home PC

Computers.ppt
Computers.pptComputers.ppt
Computers.pptSdhrYdv1
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & preventionPriSim
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Mainsmeech
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirusBESOR ACADEMY
 
Internet security
Internet securityInternet security
Internet securityrfukunaga
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfasujal2009
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ictmakanaya
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final pptaritradutta22
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computingMukul Kumar
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdfBlogger
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools ollyabraham
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptxTayyabaAbbas4
 
Computer virus
Computer virusComputer virus
Computer virusHemn Amin
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Cimab Butt
 
Computer Security
Computer SecurityComputer Security
Computer Securitysecrettub
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.pptAsif Raza
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeComputer Explorers
 

Similaire à How To Protect Your Home PC (20)

Computers.ppt
Computers.pptComputers.ppt
Computers.ppt
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
Computer Security 101
Computer Security 101Computer Security 101
Computer Security 101
 
Safety Plano Library June 4 Main
Safety   Plano Library June 4 MainSafety   Plano Library June 4 Main
Safety Plano Library June 4 Main
 
Computer virus and antivirus
Computer virus and antivirusComputer virus and antivirus
Computer virus and antivirus
 
Internet security
Internet securityInternet security
Internet security
 
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigfSOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
SOCIETAL IMPACTS OF IT gfgjgfutftujfujigf
 
Issues and precautions related to ict
Issues and precautions related to ictIssues and precautions related to ict
Issues and precautions related to ict
 
Virus and antivirus final ppt
Virus and antivirus final pptVirus and antivirus final ppt
Virus and antivirus final ppt
 
Understanding security and safe computing
Understanding security and safe computingUnderstanding security and safe computing
Understanding security and safe computing
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
Computer Virus
Computer VirusComputer Virus
Computer Virus
 
What are Computer Viruses.pdf
What are Computer Viruses.pdfWhat are Computer Viruses.pdf
What are Computer Viruses.pdf
 
Top 5 antivirus tools
Top 5 antivirus tools Top 5 antivirus tools
Top 5 antivirus tools
 
computer virus full explain ppt.pptx
computer virus full explain ppt.pptxcomputer virus full explain ppt.pptx
computer virus full explain ppt.pptx
 
Computer virus
Computer virusComputer virus
Computer virus
 
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)Virusandantivirusfinalppt 110413033802-phpapp02 (1)
Virusandantivirusfinalppt 110413033802-phpapp02 (1)
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
computer_security.ppt
computer_security.pptcomputer_security.ppt
computer_security.ppt
 
Keeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safeKeeping Your Children, your information and your equiptment safe
Keeping Your Children, your information and your equiptment safe
 

Dernier

Pokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy TheoryPokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy Theorydrae5
 
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...Cara Menggugurkan Kandungan 087776558899
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkacall Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkavikas rana
 
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)Delhi Call girls
 
WOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptxWOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptxpadhand000
 
LC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfLC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfpastor83
 
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)Delhi Call girls
 
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)Delhi Call girls
 
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...mitaliverma221
 
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)Delhi Call girls
 
the Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationthe Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationbrynpueblos04
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Morcall Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Morvikas rana
 

Dernier (14)

Pokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy TheoryPokemon Go... Unraveling the Conspiracy Theory
Pokemon Go... Unraveling the Conspiracy Theory
 
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
KLINIK BATA Jual obat penggugur kandungan 087776558899 ABORSI JANIN KEHAMILAN...
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarkacall Now 9811711561 Cash Payment乂 Call Girls in Dwarka
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka
 
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
(Anamika) VIP Call Girls Navi Mumbai Call Now 8250077686 Navi Mumbai Escorts ...
 
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Palam (Delhi)
 
WOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptxWOMEN EMPOWERMENT women empowerment.pptx
WOMEN EMPOWERMENT women empowerment.pptx
 
LC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdfLC_YouSaidYes_NewBelieverBookletDone.pdf
LC_YouSaidYes_NewBelieverBookletDone.pdf
 
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Dashrath Puri (Delhi)
 
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
(Aarini) Russian Call Girls Surat Call Now 8250077686 Surat Escorts 24x7
 
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Mukherjee Nagar (Delhi)
 
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
Call Girls In Mumbai Just Genuine Call ☎ 7738596112✅ Call Girl Andheri East G...
 
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
2k Shots ≽ 9205541914 ≼ Call Girls In Jasola (Delhi)
 
the Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentationthe Husband rolesBrown Aesthetic Cute Group Project Presentation
the Husband rolesBrown Aesthetic Cute Group Project Presentation
 
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Morcall Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
call Now 9811711561 Cash Payment乂 Call Girls in Dwarka Mor
 

How To Protect Your Home PC

  • 1. Be Your Own IT Guy!Viruses, Worms, and Hackers: Protect Your Personal Computer
  • 2. “Just Minutes to the Internet” “Softwarecompanies should take more responsibility for security holes, especially in browsers and e-mail clients. There are some straightforward things the industry should be doing right now to fix things, and I don't know why they haven't been done yet.” Tim Berners-Lee - World Wide Web Founder
  • 3. Relaxing Day Surfing….. Or so you were thinking on your day off, but the PC is slow, or maybe didn’t start at all..you try everything but it just sits there laughing, time you face facts……………
  • 4. YOURE INFECTED!!!! .
  • 5. The Problem…. There is a tradeoff between ease of use and security for computers To sell more products, companies have to make computers easy to use. However, today’s powerful computers plugged into the internet shouldn’t be treated like any other new household appliance. They need informed users who maintain and protect themselves.
  • 6. The Even Greater Problem… The Internet is being scanned constantly by automated self-replicating worms and deliberate attacks. Hackers want to exploit computers with lax security to take advantage of hard drive space, relatively fast connections, and passwords to your finances.
  • 7. Common Security Problems for Home Machines May include: privacy invasions backdoor/trojan infections where an unauthorized person remotely has complete control of your computer. virus and worm infections, spyware warez (file-trading) servers installed, your computer is used to attack other computers destruction of files (data, operating system, etc)
  • 8. Am I at Risk at home? Why? Cable modems / DSL: have a fast, always on connection that hackers can return to again and again. This atmosphere also provides a good breeding ground for self-replicating worms. “Camping out” on a WiFimodem: keeping the same router address allows hackers to scan your system and return at a later date to infect it. Short dial up modem sessions: Occasionally, security incidents occur on dial-up machines with both worms and “hacking” incidents.
  • 9. Malware, Viruses, and Worms Viruses are small programs which cause some unexpected event on a computer and automatically spread to other computers via e-mail, open file shares, and programs installed on the computer (e.g. Kazaa, AOL Instant Messenger, etc). Worms are self-replicating viruses that are loaded into computer memory rather than altering files on the machine. A worm’s main goal in life is to spread to as many other machines as possible.
  • 10. Malware, Viruses, and Worms Malware is software which has malicious intent that is usually installed without the owner’s knowledge. Malware may be disguised to look like benevolent software. A fake Antivirus called “Antivirus 2009” and now Antivirus 2010” has infected dubious millions.
  • 11. How to Make Your Home Machine As Secure As Possible Make sure your computer has good passwords Patch your machine regularly Install an anti-spyware product Use a good anti-virus product and update it regularly Use a router-based firewall or install a personal firewall Know what is running on your system Use good “internet hygiene”
  • 12. Where do I start? There are 3 facets to PC Security: Prevention Defense Last Resorts
  • 14. Make Sure Your Machine Has Good Passwords Most operating systems require a password to protect your computer from unauthorized access. Passwords should not be dictionary words and should consist of 7+ characters of mixed case including numbers, letters, and symbols. Perfect Password a free password generator that is exceptional can be found at: WWW.GRC.COM
  • 15. Patch Your Machine Regularly Computer software vendors provide regular updates for their products that can protect against known security vulnerabilities. These updates are called patches. Use automatic updates where possible (e.g. Windows Update) or download updates from vendors. Try to download major / “critical” patches to removable media such as CD and install them before putting your computer on the Internet for the first time. When you hear of a new major vulnerability or patch, try to install it as soon as possible.
  • 16. Automatic Updates of MS Windows Operating Systems All Windows OS patches can be accessed at the Microsoft Website, you may have to use IE to access. You can set up your Microsoft operating system to check for updates automatically Using Windows 7. Vista and XP: Click on the Start button > Control Panel > System Using Older Versions: Click on Start > Control Panel > Automatic Updates
  • 17. Automatic Updates of MS Windows Operating Systems Using Windows 7, Vista or XP, select System then click on the Automatic Updates tab Be sure the check box near the top is checked, then select the radio button which suits you. Using Windows 98 or Me select the Automatic Updates icon (this next screen will differ slightly)
  • 18. DEFENSE: The best defense is a great offense! Firewalls Antivirus Anti-Spyware Good Old Fashioned Common Sense
  • 19.
  • 20. B. The Anti-Virus A program called "Rother J" was the first computer virus to appear "in the wild" — that is, outside the single computer or lab where it was created in 1981. The first publicly documented removal of a computer virus in the wild was performed by Bernt Fix in 1987. He developed a macro thought of as the first Anti-Virus.
  • 21. Antivirus & Anti-spywares There are many FREE antivirus soft-wares as well as very good pay packages. Look for limited resource users and ease of use. For the money, here are personally tested best bets: Kaspersky Antivirus OR Internet Security NOD32 Antivirus OR Smart Security Sophos Internet Security
  • 22. FREE Antivirus Solutions Avast! Antivirus Avira “The Umbrella” Antivirus BitDefender ClamAV and the new: Microsoft Security Essentials Panda Cloud (first cloud AV)
  • 23. THREATFIRE A nice addition to any windows based system is PC Tools “Threatfire” which comes with the firewall as a package and can be downloaded by itself. Protects against rootkits and malware infections. Best of all, its free!
  • 24. Keep Your Anti-virus Program Up to Date Update virus definitions weekly, or more often if you hear of a new virus Set virus protection to automatically download virus definition updates if possible. Perform a full virus scan of your hard drive(s) at least monthly (if not more often)
  • 25. MRT.EXE One last note about anti-virus protection, Windows based PCs all have a “secret” stand alone scanner that is updated monthly for the big threats to your PC. The Malicious Software Removal Tool can be accessed through your run button in the start menu and typing simply: “MRT.EXE”
  • 26. C. Protect Your Machine From Spyware (Adware) Spyware: software that is installed on a computer without the user’s knowledge which monitors user activity and transmits it to another computer. Many spyware programs are set to monitor what web sites you visit and how long you visit them for, generally for advertising / marketing purposes (adware).
  • 27. How Would I Get Spyware Installed On My Machine? Spyware is usually bundled with other software such as shareware or freeware programs (e.g. Peer to Peer file-sharing programs, games, etc). The disclosure for the spyware is usually in the fine print of the licensing agreement. Who reads these anyway? Another way to get spyware on your machine is by clicking on a deceptive pop-up message.
  • 28. Consequences of Spyware Spyware runs in the background, using your computer’s system resources and memory to log what you are doing. This could interfere with other programs on your computer, and could even cause your computer to frequently crash or lock up. Spyware also uses your internet connection to send information about your activities to someone else. This could cause your internet connection to slow significantly.
  • 29. Examples of Malware One example would be a virus that has a “backdoor” installed. This means that someone at a remote location has total control of your computer. That person can modify or add files to your computer, install programs, add user accounts, or even delete all of your files! Another example is a “keylogger”, which records every stroke you enter into your keyboard. The keylogger may record a wealth of information: credit card information, passwords, chat room transcripts, private e-mail messages, etc
  • 30. Scared Yet? Take a Deep Breath and Protect Your Privacy! Install software to detect and remove spyware, adware, and malware Adaware Spybot S&D MalwareBytes Anti-Malware Remove-It Pro A-Squared Free Edition Of these Spybot and A-Squared are the two best to choose.
  • 31. Know What Is On Your System You should periodically determine what all of your running processes are on your computer, and if they are valid. You can analyze what processes are on your Windows system by downloading a tool such as TCPView, Everest and Belarc Advisor. ALL FREE! On a unix system, you can analyze running processes by typing the command “lsof”.
  • 32. D. Good Old Fashioned Common Sense! Here you're looking to avoid that “Oh God, what did I just do?” OR the dreaded “What…are..you…doing..PC?” feelings we have all had.
  • 33. Prevent Identity Theft When Making Online Purchases Look for a padlock at the bottom of web pages, indicating that the site is secured by encrypting data when submitting sensitive information such as credit card numbers or a SSN. A secure site means that your data is encrypted during transmission. Keep in mind that it says NOTHING about how secure the data is once it is stored on a remote computer.
  • 34. Prevent Identity Theft When Making Online Purchases Purchase from well-known companies (Don’t buy from mass e-mail solicitation) Realize that reputable web sites will never e-mail request for any personal information such as SSN, password, credit card or bank acct. number, etc.
  • 35. Use Good Computer Hygiene “Think before you click” Be careful with e-mail attachments – call or write back to confirm before opening Be careful about what web sites you go to. Be careful when prompted to download software Use good passwords and change them periodically for both machine and web sites you visit! Don’t create non-password protected file shares Backup data frequently Remove internet access when it is not needed Install minimal applications and services
  • 36. So Now I'm Safe Right? No Antivirus is 100% effective and neither is a firewall. Hackers create malwares and viruses faster than companies can prevent. Its estimated more than 30 a day! Sometimes there's nothing you can do for an infection as its in too deep and replicates every time it senses a removal. You may be infected right now and never ever know it.
  • 37. THE LAST RESORT Total re-install and reformat or “wipe” of your machine using the windows disk. D-BAN (Derek's Boot and Nuke) format tool, for those tough cases you want to make sure its gone, and recreate a brand new hard drive.
  • 38. To Review…. There are a lot of simple steps you can take to keep your computer secure and free of intruders. These include: Prevention: Using “good” passwords Updating and Patching your computer Defense Installing anti-virus, anti-spyware, and firewall products Knowing what is running on your computer and turning off unnecessary software Using good internet hygiene and purchasing habits The LAST RESORT
  • 39. WWW.Majorgeeks.COM