Even procrastinators should protect their PCs 08/24/2003 Congratulations if you're among the 99 percent of personal computer users who weren't hit with the Blaster worm or SoBig virus Blaster over the past two weeks. You now have a chance to make your PC safe before the next threat emerges. Most home computers aren't fully protected because most home users don't understand the appropriate steps to take or simply don't want the hassle. So instead of a product review this week, I'll attempt the impossible: Explain in plain English why you need basic security, and suggest painless ways to make your computer safer. The tips here are for users of Windows personal computers. The big picture • Don't panic! The virtual world of the Internet, just like the real world, has its share of criminals and crazies. But the odds of your PC getting hit are low, making it appropriate to be cautious and you won't need to suffer through big alterations in your daily computing habits. In the unfortunate event you're struck, don't give up hope. It's extremely unlikely your computer will sustain any physical damage. Corrupted software and data files can often be restored, although you may have to endure hours or even days of effort. • Protection is a process, not a product. Locking the front door of your house isn't the only home security you need; you may also buy insurance and perhaps even hire an alarm service. Your computer, too, needs more than one type of protection. What's more, the steps you take must be updated as the bad guys come up with new tricks --you can't set up everything one time and then relax. The threats There's more than one kind of "malware,"' the industry term for software created to attack other computers. Among the most common: • Virus. A small computer program that is self-replicating and moves from computer to computer, usually by attaching itself to data files. While a few viruses do nothing but copy themselves, most inflict some sort of damage. Commonly spread through e-mail attachments, viruses usually won't activate unless the user clicks on the infected file. • Trojan horse. A file that looks to be something you want -- a digital picture, perhaps, or a song -- that turns out to be malicious. Unlike viruses, Trojan horses do not copy themselves. • Worm. A type of self-replicating virus that spreads on its own, without having to attach to another file. Worms can slip in by themselves. They often don't require any direct action by the user. The Blaster worm was like this. • Intruders. Individuals who look for unprotected computers that they can control remotely, usually in search of confidential information such as credit-card numbers or bank account information. Some intruders leave behind software that hijacks a computer's resources, without the user realizing what's happening, to search for more unprotected machines or run illegal Web sites. • Spyware. Hidden programs that monitor activity and send information back to their masters. Harmless spyware might watch the Web pages you visit to figure out which banner ads are most appropriate to display; malicious spyware can be the starting point for identity theft. What you can do Step 1: Free and Easy You can start protecting your PC without spending a dime or a lot of time. Among the first steps: • Windows Update. Windows XP will automatically and invisibly retrieve updates, including all-important security patches, whenever your computer is connected to the Internet. All you have to do is turn on a feature called Windows Update. Microsoft distributed a patch to block Blaster in July, protecting regular Windows Update users from the insidious worm. If you haven't already activated Windows Update, you'll find it by going to the Start menu and then clicking on Control Panel. In the Category view, click on "Performance and Maintenance" and then on "System;" in the Classic view, click directly on "System." Click the "Automatic Updates" tab and follow the instructions; you can choose to have Windows notify you before installing updates or have the entire process happen invisibly in the background. Users running older versions of Windows can also get updates, although the process is more cumbersome. For details, check the Windows help files on your computer. • Build a firewall. Anti-virus software won't block all worms or intruders; you also need a program called a firewall that shields your computer from unwelcome outsiders. While the most comprehensive firewall software costs money, there are free alternatives. Windows XP includes a limited firewall; for instructions, go to the Windows help area and search for information on the "Internet Connection Firewall." Zone Labs also offers a free version of its ZoneAlarm software for download from the Web http://www.zonelabs.com/zonealarm • Make a scan. If you suspect malware is hiding in your computer, you can find out for sure with free scanning services offered by the three major vendors of anti-virus software: Symantec Security Check http://security.symantec.com , McAfee FreeScan http://us.mcafee.com/root/mfs and Trend Micro HouseCall http://housecall.trendmicro.com . The free services aren't a substitute for paid anti-virus software, which monitors incoming data, but at least they let you know if trouble has already arrived. • Turn off PCs when not in use. Computers can't be infected by worms, hacked by intruders or hijacked by spyware when they're not running. The most basic form of protection, then, is turning off PCs when not in use. This is especially important if you don't have a firewall and your computer is connected to an "always on" cable modem or DSL phone line. • Deploy common sense. You don't leave your car keys in the ignition with the car doors unlocked; the same kind of common sense applies in the online world. A few obvious points worth repeating: Never open an attached e-mail file unless you're absolutely sure where it came from; never respond to or forward messages that claim to warn of virus attacks and ask you to delete files from your computer; never write down passwords in places others can see them, such as a Post-It note stuck to the side of your monitor. Step 2: Cheap and Easy For a few dollars more, here are two quick ways to increase your margin of safety: • Back up, back up, back up! No data file is truly protected if it's stored in just one place, such as your computer's hard drive. Aside from online threats, the hard drive could crash. Backing up every few weeks needs to become a regular habit. External storage is now so inexpensive that cost is no excuse. If your computer has a CD burner, you can copy your "My Documents" folders to a blank CD-R for as little as 20 cents a pop. Keychain USB flash drives, also called thumb drives, cost $75 or less for 256 megabytes. Even old-fashioned floppy disks will work in a pinch if you've only got a few important files. • Add a router as a firewall. Home routers, also known as gateways, are typically used to share a single broadband cable modem or DSL connection among several computers. Selling for as little as $40, most routers also function as a very effective firewall -- outsiders only see the router, not any computers behind it. So even if your cable or DSL modem is connected to just one computer, sticking a router between the two can be a quick way to gain a firewall. Just be sure to read the router's instruction manual so you can verify that firewall protection is activated. Step 3: Beyond Procrastination Some people will do anything to lose weight -- except diet and exercise. In the same way, your PC isn't completely protected unless you spend the money and take the time to install and keep updated two programs: • Anti-virus software. For about $50 up front, frequently discounted, and an annual update fee of about $35 after the first year, you can pick from a long list of commercial anti-virus software; the best known names are Symantec's Norton Anti-Virus, McAfee's VirusScan and Trend Micro's PC-cillin. Most computers now come from the factory with one of these programs already installed, but new viruses come out so fast that you're not protected unless you set your anti-virus software to update automatically. • Firewall software. While not mandatory for home computer users accessing the Internet through a dial-up phone connection, some kind of firewall is essential for broadband. If you don't have a router acting as a firewall, software options also about $50 before discounts include Symantec's Norton Personal Firewall and Zone Labs' Zone Alarm Pro. Firewalls could be difficult to configure a few years ago, but installation is much easier today. As with anti-virus software, it's essential to get automatic updates and keep paying for them beyond the first year of service included in the purchase price. Contact Mike Langberg at [log in to unmask] or 408-920-5084. Past columns may be read at http://www.langberg.com SOURCE: Contra Costa Times, CA http://www.bayarea.com/mld/cctimes/6606629.htm Reference: F-Secure has Virus Removal Tools http://www.f-secure.com/v-descs/sobig_f.shtml#disinf Sobig.F Virus Slows but New Wave Likely Sun August 24, 2003 07:17 AM ET The virus spreads when unsuspecting computer users open file attachments in e-mails that contain familiar headings like "Thank You!" and "Re: Details." Once the file is opened, Sobig.F resends itself to e-mail addresses from the infected computer and signs the e-mail using a random name and address from the computer's address book. http://reuters.com/newsArticle.jhtml?type=technologyNews&storyID=3327104 * * * ---------------------------------------------------------------------- To sign-off Parkinsn send a message to: mailto:[log in to unmask] In the body of the message put: signoff parkinsn