![]() | |
![]() | |
![]() |
Security Information |
|
![]() |
Keeping Worms Out of Your Network...
No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms. This worm is a self-replicating (makes a copy of itself, aunt sookie!) program that reproduces itself over a network. It can be hidden in an email attachment from an unknown sender, a movie download from a suspicious website, or an application sent from someone you don't know.Once on your computer it then can replace a single file, like a winsock.dll or many files and send copies of itself along with email or newsgroup messages that you can post. The following are ways to keep these type of worms out of your network: a) Never, I said never (for emphasis) connect an unpatched, non updated computer or other Internet related device to the Internet. How do you update and patch a computer without connecting to the Internet? Get a cd from Microsoft with the latest and greatest patches and updates, then connect the device and then check for updates while connected to make sure you have protection. b) Always, I said always (yes I am being redundant) use a firewall between your network of computers and the Internet. Even if your network of computers is 1 or 2 computers, it is still a network and needs a firewall to protect it, really protect it. A single computer connected to the Internet is now part of a world wide network thru it's Internet connection and is therefore vulnerable without protection. Get a firewall, a real firewall. c) Educate and train anyone who uses your computer(s) network. Many times an infection is invited by careless users who download infected email, visit infected sites, or bring infected machines (laptop's, pda's) into a network from outside. d) Patch and update, patch and update, patch and update (redundant, oh yeah). Yes it's a pain, and it requires time to do and verify that it's actually patched and updated. However it's definitely simpler and cheaper than trying to fix an infestation, or explain to everyone why the network is down or their computers won't work because a worm is eating through everything they have worked hard to save and protect. e) Make sure up-to-date anti-virus software is on every machine, everything connected to the Internet. Anti-virus packages aid in protection and detection against worms. f) Establish security rules for your network and educate everyone who touches the network. They must be enforced, daily. g) Frequently check your network for vulnerabilities. Visit vulnerability website's, take advantage of free scanning tools on the Internet to test your machines. New vulnerabilities and new exploits are released constantly, and you can't protect against what you have no idea what is coming your way. ******************************************************** Daviyd Peterson: 10-year consultant, instructor, trainerHelps african american homeschools bridge the digitaldivide by becoming computer homeschools. Free articleon "Computer Homeschooling" and other related articleshttp://www.homeschoolwireless.com/homeschoolwireless.htm *************************************************************
MORE RESOURCES: The forgotten Black woman who invented the video home security system The Washington Post Bellingcat Chief Forced to Leave Vienna Following Security Threats The Moscow Times The WordPress Security Guide To Keep Your Site Safe Search Engine Journal Should iPhone users use security keys and Advanced Data Protection? The Washington Post US. Department of Homeland Security and Finnish Ministry of the ... Homeland Security US enterprises hit hard by short-staffed security operations centers Security Magazine Enforcement of Fisheries Rules Will Enhance Maritime Governance ... The Pew Charitable Trusts Israeli startup Gem Security nabs $11m in seed round led by Team8 The Times of Israel Early Edition: February 1, 2023 Just Security What Does Security Lockout Mean on iPhone? The Mac Observer Vanta Names Security Leader David Eckstein as CFO Business Wire Russia is preparing for 'maximum escalation,' top Ukrainian security ... Washington Examiner Woodall: Food security is national security brownfieldagnews.com WebAssembly vs. JavaScript: Security, Speed, Flexibility The New Stack Security dangers of key fobs KSDK.com ABC15 takes a closer look at Phoenix Zoo's security ABC15 Arizona in Phoenix 2 rural Wisconsin utilities receive federal loans for modernization ... Wisconsin Public Radio CNCF to Add Another Security Certification Container Journal Opinion | A Nationwide Ban on TikTok Won’t Make Us More Secure The New York Times Readout of Assistant to the President for National Security Affairs ... Joint Chiefs of Staff Public entry to courthouse in Anderson has security The Herald Bulletin In Hindsight: The Security Council, One Year after Russia's Invasion ... Security Council Report Heights High increases security, limits tickets to basketball games following brawl Cleveland Jewish News ImagineIF hires security guard in response to escalating incidents Daily Inter Lake The Beginning of Airport Security - WSJ The Wall Street Journal Make Change Your Password Day an impetus to boost overall ... Security Magazine Jim Jordan hopes to tackle border security legislation but Democrats doubt he’s up to it cleveland.com Kansas ballot drop boxes need to be more secure, lawmaker says ... Kansas Reflector A first-hand look inside Walmart's robust security operations Cybersecurity Dive Westfield Public Schools to pay veterans to patrol schools, increase security Western Massachusetts News CISA provides guidelines to safeguard K-12 groups from cyber threats Security Magazine Dayton police want access to live video from private security cameras Dayton Daily News TUSD 'taking essential steps' after data security incident Arizona Daily Star A new way to measure the government’s supply chain security ... Federal News Network USENIX Security ’22 – ‘Backporting Security Patches Of Web Applications: A Prototype Design A... Security Boulevard Biden Administration Announces Additional Security Assistance for ... Department of Defense DHS Continues to Prepare for End of Title 42; Announces New ... Homeland Security More Than $3 Billion in Additional Security Assistance for Ukraine Department of Defense FTC Finalizes Order with Online Alcohol Marketplace for Security ... - Federal Trade Commission News FTC Finalizes Order with Online Alcohol Marketplace for Security ... Federal Trade Commission News The Definitive Browser Security Checklist The Hacker News |
![]() |
![]() |
![]() |
RELATED ARTICLES
Computer Viruses, Worms, and Hoaxes In recent days, I was one of the unfortunate persons to receive the "Mydoom" worm emails. Not just one, but at least forty appeared in my popserver mailbox. SPYWARE - Whos Watching Who? I am in the midst of Oscar Wilde's The Picture of Dorian Gray. "The basis of optimism is sheer terror. Consumers: Shop Online and Get Information Safely Do you really have to know how feeds work? Not really. But you do need to understand how they can benefit you as a consumer or as an information seeker. Top Ten Spyware and Adware Threats Identified On December 8, 2004 Webroot, an award winning anti-spyware solution provider, released a press release identifying the ten most significant emerging spyware and adware threats. Most of these you probably haven't heard of and a few may surprise you. Online Shopping: 10 Tips For Safe Online Shopping Have you ever bought a product or service from the internet?Yes? Me too. You're not alone?Some of the reasons why most people are shopping online are: they can buy anything at anytime because Internet shopping is available 24 hours, all the time. Phishing: An Interesting Twist On A Common Scam After Two Security Assessments I Must Be Secure, Right?---------------------------------------Imagine you are the CIO of a national financial institution and you've recently deployed a state of the art online transaction service for your customers. To make sure your company's network perimeter is secure, you executed two external security assessments and penetration tests. Wireless Network Security Working from home has its advantages, including no commute, a more flexible work schedule and fresh coffee and home-cooked meals whenever you want.But working from home while using a wireless local area network (WLAN) may lead to theft of sensitive information and hacker or virus infiltration unless proper measures are taken. Web Browsing - Collected Information You may not realize it, but as you are surfing the web all sorts of details are being left behind about your computer and where you have been. Most of this information is used harmlessly in website statistics, but it could also be used to profile you, or identify you as a vulnerable target for an exploit. Criminals are Fishing For Your Identity What is Phishing? In a typical Phishing attack, a criminal will send you an email which appears to be from a well known company, bank or government agency. The email will direct you to click on a link which directs you to a Website or pop-up box that looks like the company's or organization's legitimate site. A Basic Introduction To Spyware Spyware is the most troublesome software to appear on theInternet in recent times. When spyware infects a computersystem, it may be relatively harmless or it may bedevastating. Why Corporations Need to Worry About Phishing Phishing is a relatively new form of online fraud that focuses on fooling the victim into providing sensitive financial or personal information to a bogus website that bears a significant resemblance to a tried and true online brand. Typically, the victim provides information into a form on the imposter site, which then relays the information to the fraudster. A New Era of Computer Security Computer security for most can be described in 2 words, firewall and antivirus.Until recently could one install a firewall and an antivirus program and feel quite secure. Spyware - Your Web Browser is the Culprit! My first experience with a spyware BHO based infection was several months ago. I had gone through all of the usual steps with the client's machine to clean it. Phishing - Learn To Identify It Phishing: (fish'ing) (n.)This is when someone sends you an email falsely claiming to be a legitimate business - like your bank or credit card company - in an attempt to scam you into giving them your personal, private information that they can use to access your accounts. From Spyware with Love! It's late. You've been scouring the web for that perfect present for your Aunt Bess in Idaho. Is Your Music Player Spying On You? In today's times spyware is a very serious issue and all computer users should be aware of the possible damage it can cause. It is estimated by well known industry insiders that nearly 90% of all computers are infected with some kind of spyware. Clown Internet Scam - An Internet Scam is Currently Targeting Clowns and Other Entertainers I am the victim of an internet scam. It is very hard to write that sentence, but it's necessary in order to warn my fellow clowns, magicians and other entertainers, and to prevent them from being taken for $2,800. How Free Scripts Can Create Security Problems With the Internet entering our lives in such an explosive manner, it was inevitable that Internet security issues would follow as well. While credit card frauds are an offline security problem that has been carried over to the Internet as well, spamming and phishing are uniquely Internet security hazards. IPv6 - Next Step In IP Security IPv6, IntroductionThe high rate at wich the internet continualy evolves forced the Internet Engineering Task Force(IETF) to find IP solutions to handle the grouth. Designed to handle the fast paced growth of the Internet, the IPv6 (Internet Protocol version 6) is the new version that will replace the widely used IPv4(Internet Protocol version 4) which is already obsolete. Protection for Your PC - Painless and Free! Viruses, Bugs, Worms, Dataminers, Spybots, and Trojan horses. The Internet is a veritable minefield of things that can invade your PC and affect it's Security and Performance. ![]() |
home | site map |
© 2006 |