Home Contact Us
Sunday, May 18, 2025  
Search the SMG website  
 

Technology Consulting
Virus/Spyware Removal
DSL and Cable Modem Setup
Troubleshooting and Repair
Wireless Networking
Data Back-Up & Recovery
Computer Training
Remote Computer Support

Basic Computing Tips
Internet Browsing Tips

Why SMG?
Open positions




Secure Internet Browsing Tips

If you have not already done so, install an antivirus application. The default installation of Norton AntiVirus® activates an Automatic LiveUpdate feature that regularly checks Symantec's servers for new antivirus definitions. Don't disable this feature. When you connect to the Internet, Automatic LiveUpdate will run. Don't abort installation of new anti-virus definitions. If you abort installation, you may have real problems thereafter with this feature. Norton AntiVirus®, also, includes an Auto-Protect feature that provides real-time scanning for viruses. Don't disable this feature unless you are installing software that requires it to be disabled. Even if you have Automatic LiveUpdate activated, it is advisable to run LiveUpdate on a weekly basis to ensure that Norton AntiVirus® components and virus definitions are fully updated. Don't neglect to renew your subscription service before it expires.

Make sure your PC has the latest operating system updates. http://update.microsoft.com/

According to Symantec, the "blaster" worm, also known as "LovSan" infected more than 400,000 computers around the world. Had the worm infected Windows®9x machines (on the home user level, only Windows 2000® and both versions of Windows®XP® were open to infection), the number of infected machines would have been much greater. The lesson learned from this worm is that an updated antivirus application will not protect you if the virus makes its way onto your computer by exploiting a flaw in the operating system or browser. Be sure to download and install all current critical updates and appropriate operating system patches.

If you have a broadband connection (DSL or cable), you should be concerned about security. These "always on" connections make your system vulnerable to penetration by hackers. While there are many types of software and hardware security solutions, one of the simplest and most effective is a router. A router is a piece of hardware typically containing a firewall that provides a defense against unauthorized intrusions. Physically the router sits between your DSL or cable modem and your PC. Using CAT-5 cable, you connect the modem to the router and then connect the router to the network card on the back of your computer. Unless you are a router expert familiar with arcane filtering rules, don't alter any settings on your router. The router provides security two ways. First, it only allows connections to your computer where you make the request. If you click on a hyperlink to retrieve a Web page, the page will load. If a hacker tries to gain access to your computer using the http port (port 80), the attempt will be blocked by the router. Second, the router hides your IP address. Using the Network Address Protocol (NAT), the router allows for sharing of a single IP address assigned by an ISP by all computers on a LAN. NAT dynamically assigns IP addresses to the computers on your LAN that are mapped to the single IP address and reverse maps the dynamically assigned addresses to the single IP address. The NAT assigned addresses are private, local addresses that cannot be accessed by intruders. In addition to the security afforded by a router, it allows all computers on your network to share files, printers and a broadband Internet connection. Please note that a router does not protect you against viruses. Remember to install an antivirus application and update the virus definition files and components regularly.

Be very careful with e-mail.

Hoax e-mail scams are on the rise. A scam message will spoof a legitimate e-mail address and sender. For example, the message may appear to emanate from Pay Pal with a subject field reading "Account verification required." You click on a link in the message and go to a knockoff Pay Pal site that looks authentic. You enter personal data, including credit card details. You hit the Submit button and your identity has just been stolen.

A worm, W32.Mimail.J@mm, uses a variant of the Pay Pal account verification scam to trick users into supplying credit card data, which the worm then sends to certain e-mail addresses. Unlike the knockoff Pay Pal scam described above, the worm creates pages for data entry on the user's own computer. For more information, go this Symantec page. And this from internetnews.com (http://www.internetnews.com/ec-news/article.php/3109201, Pay Pal Phishers Turn to E-mail Viruses, November 14, 2003), quoting a Sophos security expert, "It's the first time I've seen someone trying to steal personal information by spreading an e-mail virus. It just shows that the spread of viruses and spam have started to intermingle at a dangerous point. It shows that users need a solution to deal with both problems at the same time."

Since some viruses can launch and infect your computer if you view e-mail in the preview pane, don't use it (If is visible, from the menu bar, select View > Preview Pane to hide it.).

A virus spread by e-mail named "W32/Klez.e@MM" continues to infect machines. While the virus has several symptoms, the most common is a fake error message, such as "There is not enough memory to start LOYE292.EXE quit some programs, and try again." If you perform a search of your hard drive, you will not find LOYE292.EXE. If you re-boot your computer, you will get the error message again, but the file name will be different. If you computer is infected with this virus, it can prevent running a virus scan using your anti-virus application. It can corrupt Word® and Excel® files so that they can't be opened. Removal of this virus requires a special tool and re-installation of the anti-virus application after the system has been cleaned. While some may say Klez, which first appeared in October 2001, is old news, variants are found with some degree of frequency on machines that we repair more than two years after its initial debut.

Don't download any program unless you fully and completely understand what the program will do. Don't be fooled by programs that promise to accelerate your Internet connection. Most Spyware programs contain code that causes them to load when you start your system, sapping system resources and degrading performance, especially when you are on the Internet. Some of these programs are virtually impossible to un-install without losing your Internet connection or causing a system crash.

  Copyright © 1996 - 2009
SMG Technology Corp.
All Rights Reserved.
Privacy Policy