Print

Print


Even procrastinators should protect their PCs
08/24/2003

Congratulations if you're among the 99 percent of personal computer users who weren't hit with the Blaster worm or
SoBig virus Blaster over the past two weeks. You now have a chance to make your PC safe before the next threat emerges.

Most home computers aren't fully protected because most home users don't understand the appropriate steps to take or
simply don't want the hassle.

So instead of a product review this week, I'll attempt the impossible: Explain in plain English why you need basic
security, and suggest painless ways to make your computer safer. The tips here are for users of Windows personal
computers.

The big picture

• Don't panic! The virtual world of the Internet, just like the real world, has its share of criminals and crazies. But
the odds of your PC getting hit are low, making it appropriate to be cautious and you won't need to suffer through big
alterations in your daily computing habits. In the unfortunate event you're struck, don't give up hope. It's extremely
unlikely your computer will sustain any physical damage. Corrupted software and data files can often be restored,
although you may have to endure hours or even days of effort.

• Protection is a process, not a product. Locking the front door of your house isn't the only home security you need;
you may also buy insurance and perhaps even hire an alarm service. Your computer, too, needs more than one type of
protection. What's more, the steps you take must be updated as the bad guys come up with new tricks --you can't set up
everything one time and then relax.

The threats

There's more than one kind of "malware,"' the industry term for software created to attack other computers. Among the
most common:

• Virus. A small computer program that is self-replicating and moves from computer to computer, usually by attaching
itself to data files. While a few viruses do nothing but copy themselves, most inflict some sort of damage. Commonly
spread through e-mail attachments, viruses usually won't activate unless the user clicks on the infected file.

• Trojan horse. A file that looks to be something you want -- a digital picture, perhaps, or a song -- that turns out
to be malicious. Unlike viruses, Trojan horses do not copy themselves.

• Worm. A type of self-replicating virus that spreads on its own, without having to attach to another file. Worms can
slip in by themselves. They often don't require any direct action by the user. The Blaster worm was like this.

• Intruders. Individuals who look for unprotected computers that they can control remotely, usually in search of
confidential information such as credit-card numbers or bank account information. Some intruders leave behind software
that hijacks a computer's resources, without the user realizing what's happening, to search for more unprotected
machines or run illegal Web sites.

• Spyware. Hidden programs that monitor activity and send information back to their masters. Harmless spyware might
watch the Web pages you visit to figure out which banner ads are most appropriate to display; malicious spyware can be
the starting point for identity theft.

What you can do

Step 1: Free and Easy

You can start protecting your PC without spending a dime or a lot of time. Among the first steps:

• Windows Update. Windows XP will automatically and invisibly retrieve updates, including all-important security
patches, whenever your computer is connected to the Internet. All you have to do is turn on a feature called Windows
Update. Microsoft distributed a patch to block Blaster in July, protecting regular Windows Update users from the
insidious worm.

If you haven't already activated Windows Update, you'll find it by going to the Start menu and then clicking on Control
Panel. In the Category view, click on "Performance and Maintenance" and then on "System;" in the Classic view, click
directly on "System." Click the "Automatic Updates" tab and follow the instructions; you can choose to have Windows
notify you before installing updates or have the entire process happen invisibly in the background.

Users running older versions of Windows can also get updates, although the process is more cumbersome. For details,
check the Windows help files on your computer.

• Build a firewall. Anti-virus software won't block all worms or intruders; you also need a program called a firewall
that shields your computer from unwelcome outsiders. While the most comprehensive firewall software costs money, there
are free alternatives.

Windows XP includes a limited firewall; for instructions, go to the Windows help area and search for information on the
"Internet Connection Firewall." Zone Labs also offers a free version of its ZoneAlarm software for download from the
Web http://www.zonelabs.com/zonealarm

• Make a scan. If you suspect malware is hiding in your computer, you can find out for sure with free scanning services
offered by the three major vendors of anti-virus software: Symantec Security Check http://security.symantec.com ,
McAfee FreeScan http://us.mcafee.com/root/mfs and Trend Micro HouseCall http://housecall.trendmicro.com . The free
services aren't a substitute for paid anti-virus software, which monitors incoming data, but at least they let you know
if trouble has already arrived.

• Turn off PCs when not in use. Computers can't be infected by worms, hacked by intruders or hijacked by spyware when
they're not running. The most basic form of protection, then, is turning off PCs when not in use. This is especially
important if you don't have a firewall and your computer is connected to an "always on" cable modem or DSL phone line.

• Deploy common sense. You don't leave your car keys in the ignition with the car doors unlocked; the same kind of
common sense applies in the online world. A few obvious points worth repeating: Never open an attached e-mail file
unless you're absolutely sure where it came from; never respond to or forward messages that claim to warn of virus
attacks and ask you to delete files from your computer; never write down passwords in places others can see them, such
as a Post-It note stuck to the side of your monitor.

Step 2: Cheap and Easy

For a few dollars more, here are two quick ways to increase your margin of safety:

• Back up, back up, back up! No data file is truly protected if it's stored in just one place, such as your computer's
hard drive. Aside from online threats, the hard drive could crash. Backing up every few weeks needs to become a regular
habit.

External storage is now so inexpensive that cost is no excuse. If your computer has a CD burner, you can copy your "My
Documents" folders to a blank CD-R for as little as 20 cents a pop. Keychain USB flash drives, also called thumb
drives, cost $75 or less for 256 megabytes. Even old-fashioned floppy disks will work in a pinch if you've only got a
few important files.

• Add a router as a firewall. Home routers, also known as gateways, are typically used to share a single broadband
cable modem or DSL connection among several computers. Selling for as little as $40, most routers also function as a
very effective firewall -- outsiders only see the router, not any computers behind it. So even if your cable or DSL
modem is connected to just one computer, sticking a router between the two can be a quick way to gain a firewall. Just
be sure to read the router's instruction manual so you can verify that firewall protection is activated.

Step 3: Beyond Procrastination

Some people will do anything to lose weight -- except diet and exercise. In the same way, your PC isn't completely
protected unless you spend the money and take the time to install and keep updated two programs:

• Anti-virus software. For about $50 up front, frequently discounted, and an annual update fee of about $35 after the
first year, you can pick from a long list of commercial anti-virus software; the best known names are Symantec's Norton
Anti-Virus, McAfee's VirusScan and Trend Micro's PC-cillin. Most computers now come from the factory with one of these
programs already installed, but new viruses come out so fast that you're not protected unless you set your anti-virus
software to update automatically.

• Firewall software. While not mandatory for home computer users accessing the Internet through a dial-up phone
connection, some kind of firewall is essential for broadband. If you don't have a router acting as a firewall, software
options also about $50 before discounts include Symantec's Norton Personal Firewall and Zone Labs' Zone Alarm Pro.
Firewalls could be difficult to configure a few years ago, but installation is much easier today. As with anti-virus
software, it's essential to get automatic updates and keep paying for them beyond the first year of service included in
the purchase price.

Contact Mike Langberg at [log in to unmask] or 408-920-5084. Past columns may be read at http://www.langberg.com

SOURCE: Contra Costa Times, CA
http://www.bayarea.com/mld/cctimes/6606629.htm

Reference:

F-Secure has Virus Removal Tools
http://www.f-secure.com/v-descs/sobig_f.shtml#disinf


Sobig.F Virus Slows but New Wave Likely
Sun August 24, 2003 07:17 AM ET

The virus spreads when unsuspecting computer users open file attachments in e-mails that contain familiar headings like
"Thank You!" and "Re: Details."

Once the file is opened, Sobig.F resends itself to e-mail addresses from the infected computer and signs the e-mail
using a random name and address from the computer's address book.

http://reuters.com/newsArticle.jhtml?type=technologyNews&storyID=3327104

* * *

----------------------------------------------------------------------
To sign-off Parkinsn send a message to: mailto:[log in to unmask]
In the body of the message put: signoff parkinsn