Keeping Your Computer in Top Working Order

Total Page:16

File Type:pdf, Size:1020Kb

Keeping Your Computer in Top Working Order

Senior Net

COMPUTER HOUSEKEEPING

Keeping Your Computer in Top Working Order For Windows 2000 & XP Users & Keeping Your Computer Secure For All Users

2006

Rev: 8-06 Table of Contents

Introduction...... - 3 - Part I – Computer Housekeeping...... - 5 - I. Using XP’s Error-Checking Program...... - 5 - 1. Running Error-Checking...... - 6 - II. Using the Defragmentation Program...... - 6 - 1. Steps to running the Defragmentation program...... - 7 - III. Using the Disk Cleanup Program...... - 8 - IV. Backing up Your Files...... - 9 - 2. Installing Windows 98 or XP backup program...... - 9 - 3. Backing up with Windows...... - 10 - 5. Running XP System Restore...... - 10 - V. Power Management: Save Energy and Extend the Life of Your Computer - 11 - Part II – Computer Security...... - 12 - I. Passwords...... - 12 - II. Virus Checkers...... - 13 - III. Protecting your computer against program bugs...... - 14 - IV. Firewalls...... - 15 - Activating Windows XP firewall...... - 15 - V. Spyware Checker...... - 16 - VI. Phishing...... - 17 - VII. Keylogging...... - 18 - VIII. A word about “Cookies”...... - 18 - IX. You’ve Got Spam!...... - 19 - Six Ways to Curb Spam...... - 19 - Appendix ...... - 21 -

2 Housekeeping and Computer Security

Keeping Your Computer in Top Working Order and Safe from Outside Attacks

by JCA SeniorNet

Introduction

Housekeeping: Computer owners are often unaware of some useful ways to keep their machines in top working order. In this manual you will learn how to use the housekeeping utilities in your Windows XP computer that will both keep your computer running efficiently and protect it against virual attacks. Viruses are mischievous and damaging programs that get into your computer via e-mail attachments and over the Internet. You will also learn to back-up your files so they won't get lost if the hard drive (C Drive) fails.

Computers are akin to the average teenager whose top priority is not orderliness. In the case of your computer, it throws new data helter- skelter onto the hard drive and then spends increasing time searching for the data you want. There are several utility programs stored in your computer that are designed to help you organize and protect data on the hard drive. And these programs can keep your computer from becoming seriously impaired as more and more data are added to the drive. The goal of this manual is to help you learn ways to keep your computer running trouble-free with the help of a few utility programs.

In Part I, Computer Housekeeping, you will learn how to do the following:

 Organize and retrieve data that you store on the computer's hard drive, and  Protect your files from loss with back-ups (duplicate copies).

The good news is that a number of utilities are built into all Microsoft operating systems. The trick is to locate the programs, learn what they do, know how they work and remember to run them.

3 Security: If you are using the Internet then your computer is in constant jeopardy. Criminals, such as hackers and sleazy business people, constantly create new viruses to attack your machine. Unfortunately we Windows users are left to our own devices to protect ourselves by purchasing defensive software and taking other measures to secure our computers.

We users have to take on the responsibility of protecting our machines from hackers, spamers, viruses and spyware -- the malicious software that hijacks your browsing and searching -- and those who push ads at us through pop-up windows. Microsoft should ensure that its operating system is free of holes through which bad guys exploit our computers. Microsoft is trying to rectify this situation by including a security suite in its new operating system, Vista, to be released sometime in 2007.

The security issues with Microsoft Windows are so profound that some computer experts suggest that users abandon Internet Explorer and download Mozilla’s free Firefox browser or the more popular but less secure Netscape browser. Some also suggest switching to Apple’s Macintosh computer because of its virus free track record. Of course, for most of us who already own a Windows computer that may not be an option.

In Part II, Computer Security, you will learn how to do the following:

 Keeping your Windows operating system (OS) updated;  Choosing well-formed passwords;  Using virus protection; and  Installing programs such as firewall and antispyware.

4 Part I – Computer Housekeeping

I. Using XP’s Error-Checking Programs

Let's start with Error-Checking in Windows 2000 and XP -- and see what it does and how to do it. Error-Checking checks your hard drive to make sure it's in good working order. Here's what it does:

 Repairs errors that can occur with improper shutdown of your computer  Repairs file system errors  Improves the response time of your computer  Fixes errors on hard drives, floppy disks and most other data storage devices

The frequency for running this program depends on the amount of new data, including e-mail, which you put on your computer’s hard drive. As a general rule, plan on running the Error-Checking and the Defragment programs about once a month.

The Error-Checking program examines the surface condition of your computer’s hard drive (C Drive). It looks for flaws that can impair the recovery of data. If flaws are found, the program will isolate or "wall off" the flawed areas so your computer will not use them again.

Error-Checking will ask you to restart your computer before it begins. This is necessary in order to turn off all active programs. If other programs are active the Error- Checking program will not run, it will keep restarting and finally stop altogether.

A word of warning: The Error-Checking program can take several hours to run, depending on the time your computer takes to get the hard drive in shape. So consider running this program when you are through using your computer for the day. The computer will shut down after it has finished cleaning up you hard drive.

Note: If Error-Checking is unable to repair damaged data, or indicates that the hard drive may have sustained physical damage, you may need to take your computer in for repairs.

5 Running Error-Checking

Steps to use the Error-Checking program

 Open the Start Menu, My Computer, right click the C Drive icon  Click Properties in the dropdown menu  Click the Tools tab  Click the Check Now button in the box labeled Error-Checking  Highlight the C Drive in the drive selection menu  Check the Automatically Fix File System Errors box  Check the Scan for and Attempt Recovery of Bad Sectors box  Click the Start button  Click the Yes button at the next prompt. This will tell the computer to run Error-Checking the next time the computer is started.

Close the program. Go to the Start Menu and restart your computer. This will allow the Error-Checking program to examine the C Drive before Windows fully loads all its programs.

II. Using the Defragmentation Program

The Defragmentation program is designed to pull together the data for each file to improve the time it takes to launch, or open, programs. Disk fragmentation happens over time with normal use of your computer; this phenomenon is called fragmentation. Here’s how your computer works in storing files – including your e-mail messages. Initially on a new computer, all files follow each other in lock step. As you begin to delete files you no longer need, you create “holes” or vacancies in the file structure. Windows fills these holes with new data into order to maximize disk space. However, sometimes the new files are bigger than an existing hole, so Windows puts part of the file in one hole and parts in other holes. This means the entire file is on your hard drive, but is “fragmented,” with pieces scattered in various places. Your computer will work OK in this condition, but it can take longer to load files and applications, and there is an increased chance of a piece of a file getting corrupted.

The situation is illustrated below. The first line represents your “new” computer with all files in order. The second line shows what happens when you delete files. Deleted file B and file D leave empty holes. The third line shows the situation when a new long file F is added. It is fragmented into sections, filling in various holes on the hard disk. Finally, the fourth line illustrates the file structure after the disk has been defragmented.

6 File Fragmentation Illustrated

File A File B File C File D File E

File A Hole File C Hol File e E

File A File F-1 File C File F- File File F-3 2 E

File A File C File File F E When your computer is asked to retrieve file F from the hard drive, it has to move to several locations on the disk to pick up the various pieces. This slows down the computer and makes it prone to errors.

You can correct the fragmented situation by running the Defragmentation program. This utility will put the files back in proper order, as they are in lines 1 and 4 of the above illustration.

Steps to running the Defragmentation program

Begin by closing all programs you have opened. Then:

 Open Start Menu, click My Computer  Right click on the Local Disk C icon  Click Properties, click the Tools tab  Click the Defragment Now button in the box labeled Defragmentation  Wait to see if you are told the C Drive needs to be defragmented, if so,  Click the Defragment button  Click Close Program when program finishes

7 III. Using the Disk Cleanup Program

Disk Cleanup is a quick and easy way to remove unused system files, old programs and other extraneous bits of information that your computer collects as you cruise the web. (Disk Cleanup is accessed in the same way on all versions of Windows)

Steps to Running Disk Cleanup:

 Open the Start Menu  Go to Programs, Accessories, System Tools  Click Disk Cleanup  Select C Drive and OK  The computer will calculate how much space can be freed-up on your C Drive. Displayed are the items the computer recommends you trash, as they are no longer needed. By highlighting each file type, you will get a description of what's in each of the “components.” (Also, click on the More Options tab for additional clean-up possibilities.)  Check the box on left if you want to remove the contents of file (see illustration below).  Click OK

8 IV. Backing up Your Files

1. About Backing Up

The hard drive contains all the data that makes your computer useful. Any other part of the computer can fail and be replaced, but if the hard drive dies, all the data will be lost. Hard drive failures occur more often than you might expect. The question is not if your hard drive will fail but when? It’s the only moving part in your computer (besides the fan), and it will fail sooner or later, and it can't be prevented. The solution: make backup copies and store them in a separate place.

There are two types of files in your computer – data files and program files (often called application files):

 Data files are the documents you create: Word documents, Excel spreadsheets, pictures, e-mails, etc.  Program files are the files you use to create your work: Word, Excel, Photoshop, etc.

There's no need to backup the program files; they can be reinstalled from the CDs that were used to set up your computer. The important data to backup are the files you create. If they are lost, you'll have to recreate them. The best choice for backing up your files is to buy an external hard drive. A 250 to 300 gigabyte drive, which plugs into your computer’s USB port, can cost as little as $200. You could also consider a flash memory or “thumb” drive. A 1-GB drive costs around $30 or less. It is fast to use and very portable. However, it is the priciest option per gigabyte and limited to 16 GB’s.

2. Installing Windows backup utility

There are a number of options to consider when deciding what device to use to back-up your files. A CD holds 650 megabytes. If you have a lot of photos and music on your computer you will have to burn a number of CD’s to accommodate all your files. You can store 4.7 gigabytes of information on a DVD and double that with a “double- layer” burner. A popular option is an external hard drive which will easily hold every file you’ve created. Hard drives start at 40 gigabytes and go to a full terabyte – 1,024 GB or one trillion bytes. USB memory sticks are also an option for smaller file sizes, and can easily be stored away from the computer in a safe place.

A Microsoft backup program is available in your Windows XP operating system CD but it is often not installed. You may need to install it with the Windows XP CD that came with the computer. This backup utility will backup to a magnetic source or to a USB flash memory stick – it will not write, however, to a CD or a DVD burner.

To install Microsoft’s backup program:

 Click Start

9  Double click My Computer then double click on Control Panel  Double click on the Add/Remove Programs icon  Click the Windows Setup Tab  Double click System Tools on the list  Check Backup box and have Windows 98 or XP CD ready. (This is a small program so it will load quickly.)  Insert the CD into your CD drive and the program will load automatically.

3. Backing up with Windows XP

Steps to locating and running Windows Backup program:

 Click Start, Programs, Accessories, System Tools, Backup  Click Create a New Backup Job.  Click Back up Selected Files, Folders and Drives  Click the + at the C drive to expand the folder list.  Click the box at My Documents to Select This for Backup. To limit the backup size to a reasonable amount, select the My Documents folder which contains your data files. If this has been done, then click only that folder and click Next  Select the All Selected Files button or the New and Changed Files button  Click Next  Select the destination for your back up in the Where To Backup dialogue box. (See the discussion above). After you make your choice, click Next.  Check the Compress the Backup Data to Save Space box.  Check the Compare Original and Backup Files to verify data was successfully backed up. Click Next.  Give a name to your backup file. The current date is a good choice, click OK, click Start, click OK and Exit

Your backup is now complete. Remove the disk, or other media, and put it in a safe place.

4. Running Windows XP System Restore

Windows XP comes with a System Restore program. The computer automatically records system data, not program data, on your computer at preset times, e.g., every 2 weeks. (Note: this program does not record your work product, only system settings.) The program is located under System Tools. With this tool, you can choose "restore my computer to an earlier time" or "create a restore point." If you plan to install or remove a program, it's good practice to first select "create a restore point." The computer will make a backup file of your system data, which can be accessed if problems occur while adding or removing programs. If you forget to create a backup file, you can still access an earlier backup file, if needed.

10 V. Power Management: Save Energy and Extend the Life of Your Computer

A typical 150 watt computer uses about or 876 kilowatts a year. That electric bill can easily be reduced by changing the computers power management settings to put the monitor and the hard drive in sleep mode when not in use. In addition to the obvious advantage of saving energy costs you will also help to extend the life of your monitor and hard drive. Aside from the fans, the hard drive is your computer’s only moving part. The spinning disks in the drive can be programmed to idle when not in use, thus saving wear and tear on this vital storage unit.

Steps to putting your computer on a power diet:

 Right click on the Desktop  click on Properties  Select the Screen Saver tab  Click on the Power button to the right of the Energy Star icon  Select the Power Schemes tab of the Power Options Properties dialog box  For desktop PC’s, choose “Home/Office Desk” power scheme  Under “Turn off monitor” and “Turn Off hard disk” pick the times you desire. (For Example: “After 15 min” for the monitor and “After 30 min” for the hard drive.)

To wake the computer, simply move the mouse or press a key on the keyboard.

11 Part II – Computer Security

Keeping your data and personal information private and your computer safe from intruders (i. e. viruses, worms, spyware, spam, keyloggers and phishing)

If you are connected to the web, computer security software is no longer an option. It is a must! Your computer will be compromised if it is not fully protected. Surprisingly, Microsoft estimates that 70 percent of Windows users do not use security software or have let their antivirus software expire.

If not fully protected, unauthorized programs created by another user will surely find their way into your computer. Fast, always-on connections offer an open door into an unprotected hard drive. The likely route for invaders is via the Internet, via e-mail by opening an attached document, or from software you download from the web. A virus can take several forms such as a seemingly innocuous bit of data (i.e. a macro) in a document or spreadsheet. Regardless of how it gets on your computer, it can corrupt your data and/or your operating system. It can even reformat your entire hard drive.

Windows XP has a firewall utility as part of its security center. While the security center warns of the need to protect your computer from virus attacks, it does not contain an antivirus utility, nor does it even mention the need for spyware protection. We recommend that you download three defensive utilities – an upgraded firewall, antivirus and antispyware (see the Appendix for recommendations) and turn off Microsoft’s security center firewall once you have loaded your own – you don’t want two firewalls running. You might also want to consider, as an alternative, installing a security suite which gives you all three products in one package (see Appendix).

I. Passwords

When you are setting-up your web access to your bank account, or your personal account on Amazon.com or other sites that require special secure access, you will need to establish a password so when you return to that site you can re-access your account. It is important that you choose a password that another person cannot guess at or use a computer program to access your personal accounts.

Choosing a Good Password

For the most secure password you might be able to use special characters (*!$+) mixed with letters and numbers at some sites. You can always use mixed upper-and lower-case letters. Putting capitals in random locations throughout a password is effective. You also might consider using punctuation characters mixed with letters and numbers or nonsense words that are easy to pronounce but aren't in any dictionary. Whatever you choose for a password, make sure it has six or more characters.

12 Do not use any of the following for a password: Any part of your name - first, last, or middle – or your initials; your social security number; names of friends, family or pets; birthdays, phone numbers, addresses or any other personal information that could be guessed at; place names. Also, don’t use words from the English dictionary; words from a foreign dictionary; your username or login name; your computer's name; repetition of the same letter; sequences of keyboard keys such as "12345" or "qwerty" or any minor variation of the above, such as spelling backwards or appending a character to the end of your name.

One suggestion: you might use an old home address. For convenience sake don’t make the password too long. Long passwords increase the chance of typing errors. To increase security, consider mixing upper and lower case letters (most sites are case sensitive) and including symbols. Some examples:

 4220walnUt  reA157baD  hOt*tea!

II. Virus Checkers

What is a virus? - A virus is malicious software planted expressly to cause disruption and damage to computers. How does it get into your computer? In the 1980s, viruses were passed on by trading floppy disks. The next trend was the transport of viruses through e-mail attachments of Microsoft Word documents. The newest danger comes from mass-mailing (often called “spam”), which can contain "worms" -- self-replicating, mutating viruses that can penetrate your address book, and thus send themselves, randomly, to multiple recipients.

One should be aware that Microsoft’s Outlook Express (OE) users are much more vulnerable to virus attacks than users of Netscape, Eudora, Mozilla Thunderbird, or even AOL. There are two reasons for this: The most obvious is that OE is the most widely used e-mail program -- it comes with every edition of Windows. The virus problem goes deeper than just being the most popular program. Microsoft tried to make Outlook Express more powerful by integrating it with Microsoft’s Internet Explorer and allowing it to load many types of data and run programs normally confined to Web browsers. As a result, OE can also run dangerous content sent to you by strangers. A survey in late 2004 by AOL and the National Cyber Security Alliance found that the majority of home users think their computers are safe. But in fact, four out of five home computers harbor unwanted spyware, and one out of five is infected with a virus.

13 What is a virus checker? - A virus checker is a program that runs continuously whenever your computer is on. It monitors the contents of e-mail attachments as well as programs that run on your computer. It detects and disarms viruses and prevents damage to your computer before they start trouble.

Why do you need a virus checker? - You need a virus checker program to prevent corruption of your data and software. The program will also catch a virus attached to an e-mail. (If you use a Hotmail e-mail account, it comes with the McAfee virus checker/protector. An AOL account comes with a virus checker.) There are 70 to 100 new threats discovered each day. In any given month, hundreds of viruses are actively floating around – some harmless or simply annoying and others malicious and destructive. Your computer will almost certainly be corrupted sometime if you don’t have a virus protection program, which is updated regularly with new virus definitions. An ounce of prevention is worth a pound of cure.

How do you select and maintain a virus checker? - Virus checkers have an automatic update feature that will keep your virus checker current. Because new viruses are constantly being created, these protection programs use a virus data-reference file that resides on your hard drive. Setting the automatic update feature will enable the virus checker to keep this file up-to-date without your intervention. To select a virus checker program see the recommendations in the Appendix.

Update regularly - Remember, effective virus and Windows System protection depends on your computer being regularly updated. You should set your virus protection software so it calls in every day. One survey found that Windows users were three times more likely to be infected by a virus than Macintosh users.

III. Protecting your computer against program bugs

Bugs are not viruses or invaders but software program errors that often are only discovered after the product has been on the market for awhile. All programs contain bugs. For this reason it is important to remember to regularly update your operating system, web browser, and other key software by using the manufacturer’s update features. As the manufacturers of these programs discover the problems, they often offer updates, patches, hotfixes or service packs that can be downloaded from the manufacturer’s web site.

Microsoft updated Windows XP’s in 2005 with a Security Center (Service Pack 2) which automatically updates Windows. With Windows auto update you need do nothing. Windows will automatically check for updates every so often and download new critical updates as they become available.

14 IV. Firewalls

What is a firewall? - A firewall is a digital barrier that shields your computer by examining incoming and outgoing traffic from another computer on your network or from the Internet. The firewall watches for unwanted traffic trying to get into your computer through your Internet connection. A firewall program should also have outbound controls to watch for a Trojan horse or spyware trying to call out from your system. This protection is strongly recommended if you are using a broadband cable modem or a high-speed DSL line (i.e. digital subscriber line -- usually from your phone company). If you are on a local area network a firewall is built into your internet access system (cable or DSL modem or router).

Why do you need a firewall? - The short answer is that a firewall blocks unwanted access to your computer that could corrupt your data and operating system. While the virus checker looks at programs the firewall looks for unwanted traffic/data going from and to your computer. This unwanted traffic usually comes from a location with the intent to compromise your computer by installing a virus or Trojan horse. A Trojan horse is a program that has been installed on your computer without your knowledge. These insidious invaders are used for purposes such as gathering personal data, doing damage to your software and monitoring both your web usage and keystrokes (i. e. keylogging).

How to maintain a firewall? – Firewalls have an automatic update feature which updates a firewall data reference file that resides in your hard drive. Setting the update feature to automatic will keep this file current without your intervention.

Activating Windows firewall

Windows XP comes with a built-in firewall that will block illegal attempts to access your computer. (When you download Microsoft’s Service Pack 2, the firewall will automatically be turned on.) Be warned, however, that this firewall does not offer outgoing controls to block a Trojan horse or spyware from capturing your address book and mailing itself to all your friends. For this reason you are urged to install an alternate firewall rather than depending on Microsoft’s program to protect your computer. You should turn off Microsoft’s firewall to avoid conflicts with your new firewall program. If you need to access the firewall utility here is how you find it:

Steps to accessing the Windows firewall

 Open Start Menu, click Control Panel *  Double click on the Firewall Connection icon

* The first time Windows XP users open the Control Panel you will not see the icons. To display the icons click on the “Switch to Classic View” link at the left of the Control Panel screen. Next open the View dropdown list in the menu bar and select Icons.

15 V. Spyware

Computer interconnectivity has opened a world of possibilities, and our lives are more convenient because of it. One trade-off, however, is that it's now possible for prying eyes to monitor virtually every action you take on your computer. - Laptop Magazine

What is spyware? Spyware was originally, designed not to do mischief, but rather to gather information. More recently, spyware, or ad-ware, has changed into an invader of your privacy. It examines programs and “cookies” on your computer looking for items used to either gain data from your computer or track your Internet use. A spyware checker is a program designed to protect your personal information. The most common type of spyware, more properly termed adware, generates pop-up and other ads. You might harvest dozens of these mini-programs which can bring your computer to a complete halt. According to a study by AOL and the National Cyber Security Alliance, 80 percent of participants have had spyware in their computers.

Spyware is becoming a major tool in the hands of unscrupulous people. With hundreds of thousands of copies of surveillance software currently in use worldwide, there's a good chance your computer may be infected already. It is now surprisingly easy for anyone to install spy programs, called keystroke loggers, on your computer and watch your every move. Identity theft is one of the fastest growing crimes.

Without Spyware protection you could easily become the target of anyone who wants to spy on your computer activity. Even by opening a pop-up window you can launch a spyware program. Spyware can also be acquired by simply clicking on a banner ad or just by web surfing. There is also "hybrid spyware" which disguises itself as an E- Card greeting card. The moment you open it, you're infected. Unfortunately, spyware is so easy to install and use, it can turn any eight year old into a seasoned hacker.

Privacy software expert Steve Gibson of Gibson Research (www.GRC.com) explains: "Spyware is any software that employs a user's Internet connection in the background (the so called 'backchannel') without their knowledge or explicit permission. Silent background use of an Internet 'backchannel' connection must be preceded by a complete and truthful disclosure of proposed backchannel usage, followed by the receipt of explicit, informed consent for such use. Any software communicating across the Internet absent of these elements is guilty of information theft and is properly and rightfully termed: Spyware."

Advertising companies often try to install additional tracking software on your system, which will then continuously "call home," using your Internet connection to report information about you and your surfing habits to a remote location. While the privacy policies of the companies claim that there will be no

16 sensitive or identifying data collected from your system, the fact remains that without firewall, antivirus and antispyware software programs installed, your PC is sending out information to an anonymous site about you and your surfing habits.

Do I Need Spyware Protection? The answer is “Yes!” A number of software applications are available. (See the appendix for contact and pricing information.) Spybot Search & Destroy and OptOut (by Gibson's company), are available as freeware to help computer users search for and remove suspected spyware programs. Beware that many firewall programs will not stop spyware from getting into you computer. Look for software which specifically targets spyware.

Windows XP users should be aware that Service Pack 2 doesn’t prevent spyware, nor will it detect and remove spyware on your PC. Unfortunately, spyware continues to be one of the most pervasive threats facing Internet users. The use of an antispyware program is essential to reducing your risks from hackers, spyware, worms, Trojan horses, keystroke loggers and more. Besides installing an antispyware program (two programs is even better) you should beware of any offer of free software. Often freeware can be used as an agent to hide spyware downloads into your computer. Also, beware of e-mails offering upgrades from major companies. Don’t click on the links, they are often bogus. Rather go to your browser and type in the address directly.

VI. Phishing (i.e. fishing)

The Phishing scam has become one of the top consumer crimes. A recent report estimated that 1.98 million American were victimized by phishing scams between May 2004 and May 2005. They estimate the phishing scam stole some $2.4 billion from their checking accounts. As of April 2006 the number of phishing sites climbed to a record of 11,121 --four times the number found just a year ago.

Phishing scams are phony e-mails demanding that recipients verify their financial data by clicking on a link which takes one to a website that looks just like the real thing – a bank, broker, Paypal or credit card issuer’s site. You are then asked to “reverify” your credit card number, birth date, social security number, etc. If you get such an e-mail from an institution you deal with asking you to sign onto or reverify your account assume it is a scam. Don’t click on the provided link. Instead, go to the web site in question by typing in its URL address into your browser or call the institution in question to see if it is legit. Most likely it is not legitimate. Financial institutions are aware of phishing and make it a practice not to ask for confidential data via e-mail.

17 VII. Keylogging

The newest criminal activity, “keylogging” is the silent copying of your keystrokes as you type your password and login information into your bank account, brokerage or credit card web sites. Keylogging software exploits security flaws in your computer that allow criminals to see what you are typing. Keylogging programs can be very selective -- only passing back to the intruder keystrokes of selected sites where password information is sought. The use of “crimeware” like keyloggers, while relativity new, has soared. In 2005, iDefense, a computer security tracking company, reported finding over 6,000 keylogger variants. It is estimated that as many as 9.9 million computers may be infected with keyloggers. That translates into as much as $24 billion in bank account assets at risk! The keylogging programs can be hidden inside ordinary software downloads or e- mail attachments. It is estimated by Spohos, a network security firm, that an unprotected computer has a 94 percent chance of being infected by a malicious worm, including a keylogger, within an hour.

What can you do to prevent keylogging? Luckily most major antivirus and antispyware utilities will seek out keylogging. However, you can’t rely on these programs to catch them all. You must also take care not to click on unfamiliar links sent by e-mail and to keep your Windows patches, antivirus and antispyware updates current.

Defenses

Keep abreast of the threats by subscribing to security-focused websites such as F-Secure at www.f-secure.com/webblog, Kaspersky at www.viruslist.com/en/feeds, or Sophos at www.sophos.com.

VIII. A word about “Cookies”

Should I worry about them? Cookies are commonly used to rotate the banner ads that a site sends, so that this site doesn't keep sending the same ad as you view a succession of requested pages. They can also be used to customize pages for you based on your browser type or other information you may have provided the Web site. Web users must agree to let cookies be saved for them, but, in general, it helps Web sites to serve users better. Numerous web sites won't work if you have cookies disabled - including almost all e-shopping sites.

Activating Internet Explorer’s Cookie Control Program

 Open your Internet Explorer browser  Click on Tools in the Menu Bar  Click on the Privacy tab  Use the slide bar to increase or decrease cookie control.

18 Activating Netscape’s Cookie Control Program

 Open your Netscape browser  Click on Edit  In the dropdown menu click on Preferences  Click on Privacy and Security  Click on Cookies

Activating Mozilla Firefox’s Cookie Control Program

 Open you Mozilla Firefox browser  Click on Tools in the Menu Bar  Click on Options  Click on the Privacy tab  Check to two boxes that read “Allow sites to set cookies for the originating site only.”

IX. You’ve Got Spam!

Unwanted e-mail, referred to as “spam,” has become a major problem for everyone using e-mail. You can’t stop spam completely but there are some things you can do to reduce the amount of spam you receive. We offer the following suggestions with our thanks to the September 2004 issue of Consumer Reports Magazine:

Six Ways to Curb Spam

 Don’t buy anything promoted in a spam message. All that does is encourage more spam.  Don’t reply to spam or click on its “unsubscribe” link.  Disable your e-mail preview window so it will not report back that your address is active. (See directions below for Outlook Express users.)  Get two e-mail addresses from your internet service provider (ISP). Use one for family and friends and the other for everyone else (public mail). Use your ISP’s website to check your “public mail” so you don’t download spam to your computer. Or use a free service from Hotmail or Yahoo which does not require you to download mail to your computer. If too much spam is being received, abandon your address and get a new one.  Your ISP should be filtering your e-mail. Check its filtering features with competitors to see if another service will do a better job.  Don’t post your e-mail address on a publicly accessible web page. If you need to put your address on a web page use “at” in place of the “@” so harvesters will not recognize it as an e-mail address.

19 Disabling the Outlook Express Preview Window

There have malicious threats that take advantage of the Outlook Express preview pane. This pane displays the contents of a message without your having to open the e- mail message. Turning off the preview pane will prevent “instant” virus and worm infections from entering your computer.

 Open Outlook Express and select View  Select the Layout option  Uncheck the box next to “Show preview pane.”

For Outlook Express 6.0  Open Outlook Express  Open the Tools menu  Select Options  Click on the Security tab  In this tab you can also block images and attachments that might contain viruses.

# # #

If you need further assistance or have comments on this manual please contact Larry Williams at [email protected] . Put in subject line “Computer Housekeeping.”

My thanks to the following SeniorNet Bethesda, Maryland volunteers for their contributions in the development of this manual:

Editor: Marion Chafetz Research: Barbara Rodes

20 Appendix Sources of Further Information on Security

Fighting “Badware”

A group including Google, Harvard and Oxford universities and Consumer Reports Web- Watch have joined together to help computer users fight spyware and other malicious computer programs. The web site www.stopbadware.org was launched in January, 2006. The group will spotlight firms that make “badware” with the hope of either stopping their bad behavior or launching class action law suits against them. The site catalogues programs that infect unsuspecting users’ computers and lets them know if a program is dangerous before downloading it.

The nonprofit Internet Education Foundation, in a joint effort with Dell Computer has mounted a spyware awareness campaign with a website www.getnetwise.com that provides useful information on Internet security.

Firewalls

There are no recent reviews of stand-alone firewall programs. However, the Aug.15, 2004 issue of the Washington Post recommendation of Zone Alarm is considered the best of the bunch by most experts in the field:

 Zone Lab’s Zone Alarm (http://www.zonealarm.com) Look for the free version or the Pro-version.  Sygate (www.soho.sygate.com)  Outpost Firewall from Agnitum (www.agnitum.com/products/outpost)  Kerio (www.kerio.com/us/kpf_home.html)

Steve Gibson of Gibson Research gives you the latest updates on computer security issues. The site also provides a tool to check the quality of your computer security. The checker is called, appropriately “Shields Up”. See www.grc.com

Antivirus Programs

Many internet service providers are providing antivirus and antispyware programs for a reduced cost to their customers.

For antivirus software Consumer Reports (Sept., 2006) recommends:

 BitDefender Standard (www.bitdefender.com) - $30 plus $20 annual fee  Zone Lab’s Zone Alarm Antivirus (http://www.zonealarm.com) - $30 plus $20 annual fee  Kaspersky Lab (www.kaspersky.com) - $35 plus a $30 annual fee. Good protection that’s free:

21  Alwil 5 – (www.avast.com) provides a full-featured program for free but provides only e-mail support

PC World (March 2006) recommends these three utilities as their top choices.  Bitdefender 9 Standard -- (www.bitdefender.com/) $30, review at: find.pcworld.com/51130.  McAfee Virus Scan 2006 – (McAfee.com) $40, review at: find.pcworld.com/51132. Kaspersky Lab Kaspersky Anti-Virus Personal 5.0 – (usa.kaspersky.com) $40, review at: find.pcworld.com/51134.

Also, AntiVir Personal Edition Classic 6.32 (www.free-av.com), reviewed at: find.pcworld.com/51140. AntiVir ranked seventh on their list of top 10 antivirus programs – but it is free!

In addition, PC World did not evaluate Zone Lab’s ZoneAlarm Anti-Virus -- (www.zonelabs.com/store) $30 – for technical reasons but it was their “World Class winner” in 2005.

(Warning: if you are installing new antivirus software be sure to uninstall the old software first. Serious computer problems can develop with two antivirus programs running at the same time.)

For information on the latest virus threats and description of viruses, see http://www.symantec.com/avcenter/.

For information on virus hoaxes, see

 http://www.vmyths.com  http://www.symantec.com/avcenter/hoax.html

Antispyware

The creation of so-called “Trojan horses” (i.e. spyware hidden in a seemingly innocuous attachment such as an e-greetings card) is big business. Criminals earn several dollars for every Trojan horse secretly installed on a PC. They can make thousands of dollars each month. It is recommended that you use two antispyware programs (one free such as Spybot) to provided extra protection.

For antispy software Consumer Reports (Sept., 2006) recommends:

 F-Secure Anti-Spyware 2006 (www.f-secure.com) - $60 plus $50 annual fee.  Webroot Spy Sweeper 4.5 (www.webroot.com) offers a free Spy Audit program that will scan your PC for unwanted visitors. $25 plus a $20 annual fee  PC Tools Spyware Doctor 3.8 (www.pctools.com) - $30 plus $20 annual fee A free complement to your main antispyware:  Spybot Search & Destroy 1.4 (www.spybot.info) Free.

22 PC World (November, 2005) gave high ratings to the following stand-alone programs:

 Spy Sweeper by Webroot Software (www.webroot.com) - – Tests by PC World found that it removed 90 percent of spy ware attacks. $30 (For further information see: www.find.pcworld.com/48344.)  AntiSpyware 2006 by McAfee (www.mcafee.com) -- Removed 79% of spyware components. (See: www.findpcworld.com/49378)

Note: Microsoft Windows Defender antispyware Beta 2 got a strong rating as one of three “free stand-alone programs” by PC World but noted that the program only removed 66 percent of active spyware components. Microsoft has stated that it will remain free and will be integrated into the new Windows Vista operating system.

For Product Reviews, check out these sources. Use the “Search Box” on home pages to find specific information.

 http://www.pcmag.com  http://www.pcworld.com  http://www.zdnet.com

To search in the Microsoft Knowledge Base, see: http://support.microsoft.com/

All-in One Security Utilities

All-in-one security packages have not been considered a good alternative to downloading three separate programs to protect your computer (i.e. antivirusware, antispyware and a firewall). However, PC World magazine evaluated Kaspersky’s Internet Security 6.0 in their August 2006 issue. They found that this suite scored well above its competitors, but at a price of $80 retail. (For a full discussion of this test go to: find.pcworld.com/53744.) Consumer Reports (Sept. 2006) gave ZoneAlarm their thumbs up for “best all-around protection.” In July 2006 PC World magazine evaluated 10 other security suites (A full discussion of their test results can be found at: find.pcworld.com/53488.) Here are their findings:

 Kaspersky’s Internet Security 6.0 – the best of the bunch -- $80 retail, $70 download, $60 renewal.  Symantec Norton Internet Security 2006 – very good rating -- $70 ($35 renewal).  McAfee Internet Security Suite 2006 – very good rating -- $70 (35 renewal)  Panda Platinum 2006 Internet Security – very good rating -- $80 ($60 renewal)  Zone Labs ZoneAlarm Internet Security Suite – rated 6th with only a good rating because of its weak antispyware component. One to watch, however, because of its excellent firewall. Their antispyware feature has been upgraded since this test -- $70 ($25 renewal).  Microsoft Windows Live OneCare -- good rating – rated 7th place -- $50 (allows the installation on three PC and no renewal charge)

23 Antispam Programs

The Mozilla Thunderbird e-mail program (www.mozilla.com/thunderbird) has a junk- mail filter, and the software is free. It will import you Outlook data and screen your mail for you. A guide to using Mozilla Thurderbird can be found at: www.opensourcearticles. com/thunderbird_15/english/part_06. There are also programs available that filter Spam. Here are three:

 Spam Eater Pro ($25 – www.hms.com)  Spanfire ($40 – www.matterform.com)  Qurb ($30 – www.qurb.com)

Consumer Reports rated antispam programs in Sept. 2006. The antispam program built into the newer versions of Outlook Express got a high rating from CR and it’s free. For add-on programs their highest ratings went to the following:

 Trend Micro Anti-Spam Pilot (stand alone version) (www.trendmicro.com) – Free

If you use an e-mail program other than Outlook or Outlook Express:  Allume Systems SpamCatcher (www.allume.com) - $30 with a $10 annual fee

For news, commentary and tips for fighting junk faxes, visit Steve Kirsch’s Web site at: www.junkfax.org. The Federal Communications Commission’s consumer primer on fighting junk faxes is at www.fcc.gov/cgb/consumerfacts/unwantedfaxes.html.

Phishing

 For more information on phishing scams, visit Anti-Phishing Working Group’s web site at www.antiphishing.org/phishing_archive.html.  Also check out the Federal Trade Commission’s Consumer Alert, “How Not to Get Hooked by a ‘Phishing’ Scam.” The site offers tips on avoiding phishing scams at www.ftc.gov/bcp/conline/pubs/alerts/phishingalrt.htm.  You also might try the NetCraft toolbar (toolbar.netcraft.com) which can warn you of suspicious sites.  PayPal gives tips to safeguard your account at its Security Center site at: www.paypal.com/cgi-bin/webscr?cmd=_security-center-outside.  FraudWatch International is a valuable online site in Britain that tracks phishing attacks at: [email protected].  Also check out another helpful British antiphishing resource which is updated daily: www.millersmiles.co.uk.

24 Alternative Browsers

Alternative browsers to Microsoft’s Internet Explorer are available that are far less susceptible to virus and spyware attacks. (If you load Firefox and Mozilla all you bookmarks and e-mail addresses will automatically moved to your new browser and e- mail program.) They are free except where noted.

 Firefox (www.mozilla.com) (Note: If you switch to Firefox you will need to reinstall Adobe Reader (www.Adobe.com).)  Mozilla adds an e-mail program and a web-page designing tool to the Firefox browser.  Opera (www.opera.com) Claims to be the fastest browser ($39). They offer a free version with advertising.

CERT Coordination Center at Carnegie Mellon University in Pittsburgh (www.cert.org/tech_tips/securing_browser/) has posted ways to tweak various Web browsers to help prevent hidden code on Web pages from invading your computer – a common tactic used by purveyors of keyloggers and others.

Backup Utilities

PC World Magazine reviewed 5 backup utilities in their August 2006 issue. Here are their findings in order of their performance:

 NovaStor Nova Backup 7.3 -- $50 – Best Buy, Very good rating. See find.pcworld.com/53610  Roxio BackUp MyPC, Deluxe 2006 -- $50 – Very Good. See find.pcworld.com/53612  Genie-Soft Genie Backup Manager Pro 7.0 -- $70 – Good. See find.pcworld.com/53614  EMC Retrospect 7.5, Professional -- $119 – Good. See find.pcworld.com/53624  Uniblue WinBack 2.0, Standard -- $50 – Good. See find.pcworld.com/53616

Backup Drives

Consumer Reports (Sept. 2006) recommends purchasing an external hard drive, or for smaller requirements a flash memory drive. Both plug into your computer’s USB port. Their external hard drive recommendations are:

 Iomega Triple Interface Black Series 33090, 250 GB (www.iomega.com) $220  Seagate Pushbutton Backup ST3300601CB, 300 GB (www.seagate.com) $260

25

Recommended publications