Viruses Spyware and Spam, Oh My!

2,201 views
2,036 views

Published on

Published in: Technology, News & Politics
0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
2,201
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
4
Embeds 0
No embeds

No notes for slide

Viruses Spyware and Spam, Oh My!

  1. 1. Viruses, Spyware and Spam … Oh, My! A Presentation By Joel May
  2. 2. What We’ll Talk About <ul><li>How viruses and spyware get into your computer and what kinds of trouble they can cause </li></ul><ul><li>Where spam comes from and how to get as little as possible. Also, how to deal with the spam you do get </li></ul><ul><li>The things you can do every day to protect your computer </li></ul>
  3. 3. Just What Are These Things?
  4. 4. Just What Are These Things? <ul><li>A virus is a program (or, perhaps, only a small bit of code) that typically attaches itself to some known or trusted program on your system and is executed when the trusted program runs </li></ul>Viruses
  5. 5. Just What Are These Things? <ul><li>A worm is a program or piece of code attached to a trusted program that tries to copy itself over the network and imbed itself into other unsuspecting users’ systems. </li></ul><ul><li>A Trojan Horse is a program that allows a cracker a back door into your system. It has usually been planted in an innocuous place that may be hard to find. </li></ul>Worms and Trojan Horses
  6. 6. Just What Are These Things? <ul><li>Spyware is an analysis and tracking program that has been placed on your computer without your knowledge or (sometimes) through deceit or obfuscation. </li></ul><ul><li>A relatively benign type attempts to report your activities to advertising providers’ web sites for storage and analysis. The advertising providers often sell this information to others </li></ul><ul><li>A much more virulent type may take the form of a keystroke logger, tracking every key stroke on your computer </li></ul>Spyware
  7. 7. Just What Are These Things? <ul><li>Spam is nothing more than unsolicited, unwanted e-mail. At best it is a nuisance; at worst it can introduce viruses, worms, trojan horses and/or spyware into your system </li></ul><ul><li>It may also take the form of “phishing” - a semi-sophisticated form of identity theft – whereby you are asked for personal information by a seemingly respectable source </li></ul>Spam
  8. 8. Where Do They Come From?
  9. 9. Where Do They Come From? <ul><li>Crackers create virus code as a hobby; just to show that they can do it. They seldom benefit personally from the activity </li></ul><ul><li>They embed the code in an e-mail attachment or a file designed to be downloaded from the Internet </li></ul><ul><li>If you open the attachment or execute the downloaded file, your system can (will?) become infected </li></ul>Viruses, Worms and Trojan Horses
  10. 10. Where Do They Come From? <ul><li>Spyware is (most commonly) found embedded in a web page or (less commonly) piggy-backed on downloaded software </li></ul><ul><li>When you visit the web page or install the software, the spyware is automatically downloaded to your computer (much like a cookie) </li></ul><ul><li>There is no way to tell, in advance, which web sites or programs contain spyware </li></ul><ul><li>Spyware can also sneak into your computer if you use file-sharing services such as Kazaa, Morpheus or Grokster </li></ul>Spyware
  11. 11. Where Do They Come From? <ul><li>All spyware are cookies, but not all cookies are spyware </li></ul><ul><li>Thus, there are good cookies and bad cookies </li></ul><ul><li>Good cookies remember things like your reading preferences, what you last bought on the site, etc. </li></ul><ul><li>Bad cookies report your browsing habits back to their owners, etc. These are called “tracking cookies.” They often come from third parties. </li></ul><ul><li>Your spyware programs should identify these and allow you to delete them </li></ul>Spyware vs. Cookies
  12. 12. Where Do They Come From? Spam <ul><li>Spam is unwanted or potentially dangerous e-mail </li></ul><ul><li>It arrives in your e-mail programs inbox along with the rest of your e-mail </li></ul><ul><li>Spammers almost always use false names and false e-mail addresses, so it is difficult or impossible to trace the e-mail back to them </li></ul>
  13. 13. Where Do They Come From? <ul><li>Types of Spam (Smart Computing, May 2007) </li></ul><ul><ul><li>Scams (48%) </li></ul></ul><ul><ul><ul><li>Advance Fee Scams </li></ul></ul></ul><ul><ul><ul><li>Body-part Scams </li></ul></ul></ul><ul><ul><ul><li>Other Sex, Health and Hair scams </li></ul></ul></ul><ul><ul><ul><li>Get Rich Quick scams </li></ul></ul></ul><ul><ul><ul><li>Loan Shark scams </li></ul></ul></ul><ul><ul><li>Pornography (35%) </li></ul></ul><ul><ul><li>Gambling and Drugs (12%) </li></ul></ul><ul><ul><li>Viruses (2%) </li></ul></ul><ul><ul><li>Identify Theft (1%) </li></ul></ul><ul><ul><li>Benign (2%) </li></ul></ul>Spam
  14. 14. Where Do They Come From? <ul><li>I tracked the spam I received last yesterday (October 30 th ). During the 24 hour span, I received 122 pieces of spam. </li></ul><ul><li>97 of them were screened out by my email provider, Comcast.net </li></ul><ul><li>22 were identified by my spam filter, Spam Bully </li></ul><ul><li>3 slipped through both screens and had to be removed manually </li></ul>Spam
  15. 18. What Can They Do To You?
  16. 19. What Can They Do To You? <ul><li>Hijack your e-mail address book and send messages containing and (potentially) spreading the virus to people whose names are there </li></ul><ul><li>Cause your system to function erratically (reboot frequently, cause programs to open or close without your intervention, etc.) </li></ul><ul><li>Create bot networks, ad-hoc clusters of several thousands computers that, unbeknownst to the user, are being deployed toward some nefarious end. </li></ul><ul><li>At worst erase some or all of the information on your hard drive (very uncommon) </li></ul>Viruses
  17. 20. What Can They Do To You? <ul><li>Hijack your home page, add sites to your Favorites list, launch unwanted browser windows </li></ul><ul><li>Send personal information about you that is contained in your computer to the advertising provider who planted it </li></ul><ul><li>By logging keystrokes it can accumulate information on your </li></ul><ul><ul><li>Social Security Number </li></ul></ul><ul><ul><li>Credit Card Numbers </li></ul></ul><ul><ul><li>Bank Account Numbers </li></ul></ul><ul><ul><li>Passwords, etc. </li></ul></ul><ul><ul><li>In other words, Identify Theft </li></ul></ul>Spyware
  18. 21. What Can They Do To You? <ul><li>Most spam is not harmful, only annoying </li></ul><ul><li>Some may contain attachments that can carry viruses </li></ul><ul><li>The most dangerous are those that are “phishing” for personal information </li></ul>Spam
  19. 22. <ul><li>----- Original Message ----- </li></ul><ul><li>From: <support@citibank.com> </li></ul><ul><li>To: <joelmay@yahoo.com> </li></ul><ul><li>Sent: Wednesday, March 31, 2004 16:31 </li></ul><ul><li>Subject: Verify your E-mail with Citibank </li></ul><ul><li>Dear Citibank Member, This email was sent by the Citibank server to verify your E-mail address. You must complete this process by clicking on the link below and entering in the small window your Citibank ATM/Debit Card number and PIN that you use on ATM. This is done for your protection - because some of our members no longer have access to their email addresses and we must verify it. To verify your E-mail address and access your bank account, click on the link below: https://web.da-us.citibank.com/signin/citifi/scripts/email_verify.jsp --------------------------------------- Thank you for using Citibank --------------------------------------- </li></ul>
  20. 23. What Can You Do About Them?
  21. 24. What Can You Do About Them? <ul><li>A Firewall (or two) </li></ul><ul><li>An Anti-Virus Utility </li></ul><ul><li>Several Spyware Detectors </li></ul><ul><li>A Spam Filter </li></ul><ul><li>Vigilance </li></ul><ul><li>Common Sense </li></ul>You Need Six Things to Defeat Them
  22. 25. What Can You Do About Them? <ul><li>There are two kinds: </li></ul><ul><ul><li>Hardware (often built into routers used on networks) </li></ul></ul><ul><ul><li>Software </li></ul></ul><ul><ul><ul><li>Zone Alarm (http://zonelabs.com) </li></ul></ul></ul><ul><ul><ul><li>Outpost (http://www.agniturn.com) </li></ul></ul></ul><ul><ul><ul><li>Comodo (http://www.personalfirewall.trustix.com/) </li></ul></ul></ul><ul><ul><ul><li>Windows XP has a built-in one way (inbound only) firewall </li></ul></ul></ul><ul><ul><ul><li>Windows Vista has a built-in one that is quite effective </li></ul></ul></ul>Firewalls
  23. 26. What Can You Do About Them? <ul><li>They provide a “wall” around your computer </li></ul><ul><li>Inbound protection: If a previously unknown remote computer seeks to access yours, the firewall will notify you and ask if you want to allow the access </li></ul><ul><li>Outbound Protection: If a program on your computer wants to access the Internet, it seeks permission </li></ul><ul><ul><li>You can grant permission for one-time only </li></ul></ul><ul><ul><li>You can grant permanent permission </li></ul></ul><ul><ul><li>You can refuse permission for one-time only </li></ul></ul><ul><ul><li>You can refuse permission permanently </li></ul></ul>Firewalls
  24. 27. What Can You Do About Them? <ul><li>In other words, with a full-featured firewall and the necessary vigilance on your part, no information can get into or out of your computer without your express permission </li></ul><ul><li>You can test to see how well your firewall is working at https://grc.com/x/ne.dif?bh0bkyd2 </li></ul>Firewalls
  25. 28. What Can You Do About Them? <ul><li>When a firewall utility notifies you that there is unexpected activity (either in-coming or out-going) </li></ul><ul><ul><li>Carefully read the message on the screen </li></ul></ul><ul><ul><li>If the access requested is something you want to have happen, approve it </li></ul></ul><ul><ul><li>If you don’t want the proposed activity to occur or you don’t understand the message, don’t let the activity continue </li></ul></ul>Firewalls – The Common Sense Dimension
  26. 29. What Can You Do About Them? <ul><li>Use Windows Update </li></ul><ul><li>Watch Startup Processes </li></ul><ul><li>Watch File Extensions </li></ul><ul><li>Use Anti-Virus Software </li></ul><ul><li>Keep Virus Definitions Up-to-date </li></ul><ul><li>Never Open Questionable E-mail Attachments </li></ul><ul><li>Don’t Automatically Preview E-mail </li></ul>Viruses
  27. 30. What Can You Do About Them? <ul><li>Microsoft regularly makes available software updates to the Windows operating systems designed to repair or block security leaks </li></ul><ul><li>You can configure your computer to download these updates automatically </li></ul><ul><ul><li>Control Panel > System > Automatic Updates </li></ul></ul><ul><ul><li>Check “Keep my computer up to date” </li></ul></ul><ul><li>Or you can perform the updates manually </li></ul><ul><ul><li>http://windowsupdate.microsoft.com </li></ul></ul>Viruses – Use Windows Update
  28. 31. What Can You Do About Them? <ul><li>If you use Microsoft Office you should also check </li></ul><ul><ul><li>http://office.microsoft.com/officeupdate/ </li></ul></ul>Viruses – Use Windows Update
  29. 32. What Can You Do About Them? <ul><li>A virus may insert a program command into the startup process of your computer so that it runs whenever you turn your computer on or reboot </li></ul><ul><li>Use MSCONFIG (from the RUN dialog on the Start menu), click on the Startup tab and look for unfamiliar entries </li></ul><ul><li>If you don’t know what to do about an entry, check http://www.answersthatwork.com to find out more about it </li></ul>Viruses – Watch Startup Processes
  30. 33. What Can You Do About Them? <ul><li>File Extensions are the two, three or four letter “tags” that appear after the period (.) in the file name </li></ul><ul><li>Why should you care? </li></ul><ul><li>Some types of files are potentially dangerous and some are not </li></ul>Viruses – Watch File Extensions
  31. 34. What Can You Do About Them? Viruses – Watch File Extensions You need to watch out for .exe .com .bat .bas .chm .cm .cpl .pif .reg .scr .hlp .sct .shs .inf .mdb .vb .vbe .vbs .wsf .wsh And some other, less common ones as well
  32. 35. What Can You Do About Them? <ul><li>If your computer doesn’t display these extensions </li></ul><ul><ul><li>In Windows Vista, XP and 2000 </li></ul></ul><ul><ul><ul><li>Run Windows Explorer, open the Tools Menu and choose Folder Options </li></ul></ul></ul><ul><ul><ul><li>Click on the View tab and remove the check mark on “Hide file extensions for known file types” by clicking on it </li></ul></ul></ul><ul><ul><li>In Windows 98 and ME </li></ul></ul><ul><ul><ul><li>You’ll find the Folder Options in the View Menu rather than the Tools Menu </li></ul></ul></ul>Viruses – Watch File Extensions
  33. 36. What Can You Do About Them? Viruses – Watch File Extensions Step 1: Step 2:
  34. 37. What Can You Do About Them? Viruses – Watch File Extensions Step 3: Step 4:
  35. 38. What Can You Do About Them? <ul><li>Some of the most popular are </li></ul><ul><ul><li>Norton Antivirus (http://www.symantec.com) $49.95 </li></ul></ul><ul><ul><li>McAfee Viruscan (http://www.mcafee.com) $34.95 </li></ul></ul><ul><ul><li>Kaspersky Anti-Virus (http://www.kaspersky.com) $49.95 </li></ul></ul>Viruses – Always Use Anti-Virus Software But ONLY ONE <ul><ul><ul><li>AVG 6.0 (http://www.grisoft.com) Free </li></ul></ul></ul><ul><ul><ul><li>AntiVir Personal Edition (http://www.free-av.com) Free </li></ul></ul></ul><ul><ul><ul><li>Avast! Home Edition (http://www.avast.com) Free </li></ul></ul></ul>
  36. 39. What Can You Do About Them? <ul><li>These typically provide for updating of the virus definitions for one year following purchase </li></ul><ul><li>After that, you must renew your subscription or buy a new edition of the software </li></ul>Viruses – Always Use Anti-Virus Software
  37. 40. What Can You Do About Them? <ul><li>The Anti-virus software is typically (by default) set to scan all of your files and all incoming e-mail constantly </li></ul><ul><li>If it detects a virus, it will offer to delete the file containing it or to quarantine the file </li></ul><ul><li>Try deleting first. If that doesn’t work, try quarantining (this instructs the software to attempt to put a barrier between the virus code and the rest of your computer) </li></ul>Viruses – Always Use Anti-Virus Software
  38. 41. What Can You Do About Them? <ul><li>These are like dictionaries of viruses </li></ul><ul><li>If a new virus has been release since the last edition of the dictionary, it will not be recognized by your anti-virus software </li></ul><ul><li>Thus, it is important to keep the definitions up to date </li></ul><ul><li>The software can be configured to do this automatically on a pre-determined schedule, or you can do it manually </li></ul>Viruses – Up to Date Virus Definitions
  39. 42. What Can You Do About Them? <ul><li>Never open e-mail attachments received from someone you know without checking for viruses first </li></ul><ul><li>Never open e-mail attachments received from someone you don’t know under ANY circumstances </li></ul>Viruses – Never Open Questionable E-mail Attachments
  40. 43. What Can You Do About Them? <ul><li>Some recent viruses can infect your system when you simply look at the contents of the e-mail message </li></ul><ul><li>To turn off the Preview screen in Outlook Express </li></ul><ul><ul><li>Open the View menu and choose Layout </li></ul></ul><ul><ul><li>In the lower half of the dialog box, click on “Show Preview Pane” to remove the check mark </li></ul></ul><ul><li>NOTE: You can’t do this in AOL </li></ul>Viruses – Don’t Automatically Preview E-mail
  41. 44. What Can You Do About Them? <ul><li>Viruses always come from outside your computer, either by </li></ul>Viruses – The Common Sense Dimension <ul><li>- An infected e-mail (most common) </li></ul><ul><ul><li>- An infected file (sometimes) </li></ul></ul><ul><ul><li>- An incursion by a cracker (rarely) </li></ul></ul>. Thus you should be extremely careful and continually aware of the traffic between your computer and the outside world (e-mail and web browsing)
  42. 45. What Can You Do About Them? <ul><li>Never open a file or an e-mail attachment unless you are ABSOLUTELY SURE it does not contain a virus </li></ul><ul><li>Always run a virus check before opening it </li></ul>Viruses – The Common Sense Dimension
  43. 46. What Can You Do About Them? <ul><li>There is really very little you can do to prevent your computer from being infected with spyware </li></ul><ul><li>Practice Safe Browsing </li></ul><ul><ul><li>Use real-time spyware blockers (only partially effective) </li></ul></ul><ul><ul><li>Avoid free file-sharing programs (Kazaa, Grokster, Morpheus) </li></ul></ul><ul><ul><li>Many spyware programs are hidden in pop-up ads. Either block them or don’t click on them </li></ul></ul>Spyware
  44. 47. What Can You Do About Them? <ul><li>Before you download any program, browser tool bar, or an ActiveX application, enter its name in your favorite search engine (or go to http://find.pcworld.com/42942) to find out if it’s spyware </li></ul>Spyware
  45. 48. What Can You Do About Them? <ul><li>Anti-Spyware Software </li></ul><ul><ul><li>Ad-Aware (http://www.lavasoftuse.com) Free; Plus version $26.95 </li></ul></ul><ul><ul><li>Spybot Search and Destroy (http://www.safer-networking.com) Donation </li></ul></ul><ul><ul><li>Spy Sweeper (http://www.webroot.com) $29.95 </li></ul></ul><ul><ul><li>McAfee Internet Security 2004 (http://www.mcafee.com) $69.95 </li></ul></ul><ul><ul><li>Norton Internet Security Tool (http://www.symantec.com) $69.95 </li></ul></ul>Spyware
  46. 49. What Can You Do About Them? <ul><li>As with Anti-Virus software, these programs can only detect spyware that they know about </li></ul><ul><li>So it is important to keep the definition files up-to-date (weekly?) </li></ul>Spyware
  47. 50. What Can You Do About Them? <ul><li>Deletion or Quarantine </li></ul><ul><ul><li>When a spyware program is discovered, try deleting it first. If this is not possible, try to quarantine it </li></ul></ul>Spyware
  48. 51. What Can You Do About Them? <ul><li>Some spyware programs embed themselves so deeply in your computer (files and registry) that none of the anti-spyware programs can remove them </li></ul><ul><li>(or, the program reports that they are removed, but when you reboot, they reappear) </li></ul><ul><li>Key-loggers are the most notorious in this respect </li></ul><ul><li>If this happens to you, you can try CWShredder (http://www.spywareinfo.com) </li></ul>Spyware
  49. 52. What Can You Do About Them? <ul><li>Be aware of where you are surfing </li></ul><ul><li>Don’t click on pop-ups </li></ul><ul><li>Run anti-spyware software on a regular basis and keep the definition files updated </li></ul>Spyware – The Common Sense Dimension
  50. 53. What Can You Do About Them? <ul><li>Many ISPs provide spam-blocking services, but they are notorious for being too arbitrary </li></ul><ul><li>Legislation has been proposed (and adopted in CA and UT) which uses a sort of “caller-ID” approach, requiring spammers to give their true addresses </li></ul>Spam
  51. 54. What Can You Do About Them? <ul><li>If you are receiving lots of spam at your current email address, you have little choice but to change addresses. </li></ul><ul><ul><li>Gmail (mail.google.com) </li></ul></ul><ul><ul><li>Yahoo (overview.mail.yahoo.com) </li></ul></ul><ul><ul><li>Hotmail (get.live.com/mail/overview) </li></ul></ul>Spam
  52. 55. What Can You Do About Them? <ul><li>Prevention: </li></ul><ul><ul><li>Don’t give your e-mail address to anyone you don’t want to hear from again </li></ul></ul><ul><ul><li>Use a false or self-destructing e-mail address when registering on web sites </li></ul></ul><ul><ul><ul><li>Spam Gourmet (http://www.spamgourmet.com) free </li></ul></ul></ul>Spam
  53. 56. What Can You Do About Them? <ul><li>Prevention (Contd): </li></ul><ul><ul><li>Watch out for those checkboxes </li></ul></ul><ul><ul><li>Don’t post your e-mail address on a web site </li></ul></ul><ul><ul><ul><li>www.spam-proof-email-generator.com </li></ul></ul></ul><ul><ul><li>Don’t ever unsubscribe from spam </li></ul></ul><ul><ul><li>Use a spam filter </li></ul></ul>Spam
  54. 57. What Can You Do About Them? <ul><li>There are many software programs available for blocking spam at the level of the individual user: </li></ul>Spam <ul><li>Black-lists (create a list of addresses you don’t want to hear from and lets through addresses not on the list) </li></ul><ul><li>White-lists (create a list of addresses you do want to hear from and block all addresses not on the list) </li></ul>
  55. 58. What Can You Do About Them? <ul><li>There are many software programs available for blocking spam at the level of the individual user: </li></ul>Spam <ul><li>Challenge/Response (creates both a black list and a white list. When an e-mail from an address not on either list arrives, a “challenge e-mail” is returned to the sender. If she/he responds, the e-mail is passed through and the address is added to the white-list) </li></ul>
  56. 59. What Can You Do About Them? <ul><li>There are many software programs available for blocking spam at the level of the individual user: </li></ul>Spam <ul><li>Beyesian (uses a probability theory approach to analyze the address, subject and text of an in-coming e-mail in order to classify it as good or not. Learns from experience) </li></ul>
  57. 60. What Can You Do About Them? <ul><li>Spam Filtering Software: </li></ul><ul><ul><li>Spam Inspector (http://www.giantcompany.com) $29.95 </li></ul></ul><ul><ul><li>Spam Eater (http://www.regnow.com) $24.95 </li></ul></ul><ul><ul><li>Qurb (http://www.qurb.com) $29.95 </li></ul></ul><ul><ul><li>EmailProtect (http://www.contentwatch.com) $29.99 </li></ul></ul><ul><ul><li>MailFrontier (http://wwwmailfrontier.com) $29.95 </li></ul></ul><ul><ul><li>ChoiceMail One (http://www.digiportal.com) $39.95 </li></ul></ul><ul><ul><li>Spam Bully (http://www.spambully.com) $29.95 </li></ul></ul><ul><ul><li>Mailwasher (http://www.mailwasher.net) Donation; Pro version $37.00 </li></ul></ul>Spam
  58. 61. What Can You Do About Them? <ul><ul><li>Don’t give your e-mail address to anyone you don’t want to hear from again </li></ul></ul><ul><ul><li>Delete all questionable messages without reading them or opening attachments </li></ul></ul><ul><ul><li>Remember that AOL, eBay, your bank or credit card company and other web sites related to your money will NEVER send out requests for passwords, PINs, or other sensitive information via e-mail </li></ul></ul>Spam – The Common Sense Dimension
  59. 62. What Do I Do About Them?
  60. 63. What Do I Do About Them? <ul><li>In Real Time: </li></ul><ul><ul><li>Sygate Firewall ( www.sygate.com ) Free </li></ul></ul><ul><ul><li>Hardware Firewall (router on home network) </li></ul></ul><ul><ul><li>AVG Anti Virus ( www.grisoft.com ) Free </li></ul></ul><ul><ul><li>Spyware Doctor ( www.pctools.com ) $29.95/year </li></ul></ul><ul><ul><li>WinPatrol ( www.winpatrol.com ) $29.95 </li></ul></ul><ul><ul><li>McAfee Site Advisor ( www.siteadvisor.jp ) Free </li></ul></ul><ul><ul><li>Windows Update </li></ul></ul><ul><ul><li>(start>control panel>security center>updates: ON) </li></ul></ul>
  61. 64. What Do I Do About Them? <ul><li>Daily: </li></ul><ul><ul><li>Advanced WindowsCare ( www.iobit.com ) Free </li></ul></ul><ul><ul><li>Acronis True Image Backup ( www.acronis.com ) $49.99 </li></ul></ul>
  62. 65. What Do I Do About Them? <ul><li>Weekly: </li></ul><ul><ul><li>CCleaner ( www.ccleaner.com ) Free </li></ul></ul><ul><ul><li>PCP Optimize ( www.pcpitstop.com ) Free </li></ul></ul><ul><ul><li>Spybot Search and Destroy </li></ul></ul><ul><ul><li> ( www.safer-networking.com ) Donation </li></ul></ul><ul><ul><li>AdAware ( www.lavasoftusa.com ) Free </li></ul></ul><ul><ul><li>Spyware Doctor ( www.pctools.com ) $29.95/year </li></ul></ul><ul><ul><li>AVG Anti Virus ( www.grisoft.com ) Free </li></ul></ul><ul><ul><li>Registry Mechanic ( www.pctolls.com ) $29.95 </li></ul></ul><ul><ul><li>Chkdsk (start>run>type “cmd”>type “chkdsk c: /f) </li></ul></ul>
  63. 66. What Do I Do About Them? <ul><li>Monthly: </li></ul><ul><ul><li>Disk Defragmenter </li></ul></ul><ul><ul><li> (Start>All Programs>Accessories>System Tools>Defrag) </li></ul></ul><ul><ul><li>Secunia Software Inspector </li></ul></ul><ul><ul><li> (Secunia.com/soft_inspector/) Free </li></ul></ul><ul><li>Annually: </li></ul><ul><ul><li>Open the case </li></ul></ul><ul><ul><li>Vacuum out the dust </li></ul></ul><ul><ul><li>Check the cables </li></ul></ul>
  64. 67. What Can You Do About Them? <ul><li>Keep Windows up to date </li></ul><ul><li>Check start-up processes </li></ul><ul><li>Use anti-virus and anti–spyware security programs </li></ul><ul><li>Keep all security programs up to date </li></ul><ul><li>Surf safely </li></ul><ul><li>Don’t give out your address indiscriminately </li></ul><ul><li>Be wary of attachments </li></ul><ul><li>Don’t answer spam </li></ul>Summary
  65. 68. Google and AARP to the Rescue <ul><li>Google has teamed up with AARP to launch a new video series that provides helpful, easy-to-understand tips on how to stay safe online </li></ul><ul><li>It includes pointers on how to set privacy controls in online photo-sharing sites, configure firewalls to protect your computer, select safe and secure passwords for your online accounts, shop safely online, and avoid phishing scams. </li></ul><ul><li>http:// snipurl.com/aarptips </li></ul>
  66. 69. While the people retain their virtue and vigilance, no agent, by any extreme of wickedness or folly, can very seriously injure. - Abraham Lincoln
  67. 70. The End

×