SlideShare a Scribd company logo
Jabatan Kesihatan Masyarakat
Cheapskate's Guide to a
Safe PC
Dr Azmi Mohd Tamil
©
Introduction
• http://www.wired.com/news/print/0,
1294,62222,00.html
• MyDoom virus-laden e-mails may no
longer be clogging inboxes, but each
of those infected computers now
contains a backdoor that allows any
malicious hacker with a modicum of
technical skills to remotely access
and control the infected machines.
©
Data Protection
• From Viruses - explorer.zip, SirCam,
Nimda, MyDoom
• From Spyware
• Malicious Intrusion - hackers,
crackers, use of trojan viruses
• Unplanned Disasters - need for
backups
©
Protection From Intrusion
• First up, firewalls. If you're only going to
run one security application, then make it
a firewall, which acts as a sort of
watchdog for your computer, alerting you
to and blocking the entrance or exit of
unwelcome visitors.
• ZoneAlarm is the most popular free
firewall.
• Agnitum's Outpost free firewall is easy to
install and uses plug-in software modules
to add to or enhance its features.
©
Data Protection
• http://www.wired.com/news/print/0,1294,45581,00.html
• In Order to Have Your Advice
• By Jon Rochmis
• 2:00 a.m. July 27, 2001 PDT
• “And, by the way, hats off to the FBI guy who
opened the SirCam virus. His computer
proceeded to send the virus -- and random FBI
documents -- to e-mail addresses stored in his
computer as well as throughout the entire
National Infrastructure Protection Center, which,
it just so happens, was established to protect the
United States' computer networks.”
©
Data Protection
©
Protection From Viruses
• Install a good anti-virus program
• Update it daily if possible, if not
every fortnight
• Update yourself on virus information
ie http://www.wired.com, http://www.cert.org
• Never ever click on an attachment
esp .exe, .bat, .vbs, .lnk, .pif, sent
via e-mail, unless you’re expecting it
©
Anti Virus
• Free antivirus applications are also available, but
brand-new viruses can and do slip past scanners
until companies can analyze the new virus's code
and release an upgrade that will block it. Given
that limitation, antivirus tools are good at
protecting computers against known viruses, but
should never be considered bulletproof.
©
Spy-Ware
• You've checked your computer for viruses but
you're still struggling with application crashes,
slowed performance, slews of pop-up ads even
when you're not browsing the Web, a home or
start page that's been changed to some odd
search site, or other "ghost in the machine" sorts
of mishaps, chances are your computer harbors
spyware, adware or a Trojan Horse.
• All of these programs purport to be some useful
or fun tool, but actually hand over some level of
control over your computer to an outside entity.
©
Anti Spy-Ware
• The best program to handle spyware or
Trojans is Spybot-Search & Destroy.
Spybot effectively and easily removes
virtually every sneaky piece of software in
existence. Run it weekly.
• I myself uses Lavasoft Ad-Aware.
©
Avoid Microsoft
• Last but not least, one of the best all-
around free security tools is Mozilla's
browser and e-mail applications. Since so
many viruses, worms and Internet
exploits are aimed at Microsoft
applications, switching to these open-
source programs can help you avoid
problems.
• The browser also has built-in pop-up
blocking and advanced, configurable
privacy and security tools.
©
Data Protection
©
Disaster Recovery
• Use of data backup software
• Use of data replication software
• If possible, store backups off-site
• Duplicating data (mirroring) using 2
powerful servers, one sited off-site
• “Hot-site” mirroring
©
Data Safekeeping
• Repositories. These are responsible for
holding data and other information assets
and preparing them for reuse.
©
Conclusion
• The use of computers in education
has improved the learning &
education process.
• But without the proper strategies or
precautions, it may impede
education, instead of helping us.
Jabatan Kesihatan Masyarakat
Terima Kasih

More Related Content

What's hot

Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
galaxy201
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
Satyendra Arora
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
JamesBennett15
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
samthking25
 

What's hot (19)

Protecting Against Ransomware
Protecting Against RansomwareProtecting Against Ransomware
Protecting Against Ransomware
 
Online Safety - Malwares
Online Safety - MalwaresOnline Safety - Malwares
Online Safety - Malwares
 
Spyware powerpoint
Spyware powerpointSpyware powerpoint
Spyware powerpoint
 
OSB120 Beat Ransomware
OSB120 Beat RansomwareOSB120 Beat Ransomware
OSB120 Beat Ransomware
 
Spikes Security Isla Isolation
Spikes Security Isla IsolationSpikes Security Isla Isolation
Spikes Security Isla Isolation
 
Senior Technology Education
Senior Technology EducationSenior Technology Education
Senior Technology Education
 
Wizard Technical Designs One2Three Networking Club Presentation April 2015
Wizard Technical Designs One2Three Networking Club Presentation April 2015Wizard Technical Designs One2Three Networking Club Presentation April 2015
Wizard Technical Designs One2Three Networking Club Presentation April 2015
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
Spywareguide1
Spywareguide1Spywareguide1
Spywareguide1
 
10 Components of Business Cyber Security
10 Components of Business Cyber Security10 Components of Business Cyber Security
10 Components of Business Cyber Security
 
Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)Safe computing (Tips & Tricks)
Safe computing (Tips & Tricks)
 
Malware
MalwareMalware
Malware
 
P7 – Identify Potential Security Risks
P7 – Identify Potential Security RisksP7 – Identify Potential Security Risks
P7 – Identify Potential Security Risks
 
Zero day exploit
Zero day exploitZero day exploit
Zero day exploit
 
Cyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat LandscapeCyber security webinar part 1 - Threat Landscape
Cyber security webinar part 1 - Threat Landscape
 
Identifying potential security risks
Identifying potential security risksIdentifying potential security risks
Identifying potential security risks
 
Get Norton Support From The Norton Experts
Get Norton Support From The Norton ExpertsGet Norton Support From The Norton Experts
Get Norton Support From The Norton Experts
 
Network Security
Network SecurityNetwork Security
Network Security
 
Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3Defending Servers - Cyber security webinar part 3
Defending Servers - Cyber security webinar part 3
 

Similar to Safe computing (circa 2004)

Similar to Safe computing (circa 2004) (20)

Malware ppt final.pptx
Malware ppt final.pptxMalware ppt final.pptx
Malware ppt final.pptx
 
Copy of antiviruse
Copy of antiviruseCopy of antiviruse
Copy of antiviruse
 
Malware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpurMalware program by mohsin ali dahar khairpur
Malware program by mohsin ali dahar khairpur
 
Internet security
Internet securityInternet security
Internet security
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
anti_virus
anti_virusanti_virus
anti_virus
 
information about virus
information about virusinformation about virus
information about virus
 
Preventive measures. Blog. pptx
Preventive measures. Blog. pptxPreventive measures. Blog. pptx
Preventive measures. Blog. pptx
 
What is Network Security?
What is Network Security?What is Network Security?
What is Network Security?
 
How To Protect Your Home PC
How To Protect Your Home PCHow To Protect Your Home PC
How To Protect Your Home PC
 
Firewall
FirewallFirewall
Firewall
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Virus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptxVirus And Antivirus short presentation.pptx
Virus And Antivirus short presentation.pptx
 
Virus and malware presentation
Virus and malware presentationVirus and malware presentation
Virus and malware presentation
 
ANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentationANTIVIRUS AND VIRUS Powerpoint presentation
ANTIVIRUS AND VIRUS Powerpoint presentation
 
Information Security (Malicious Software)
Information Security (Malicious Software)Information Security (Malicious Software)
Information Security (Malicious Software)
 
Spyware
SpywareSpyware
Spyware
 
Malicious
MaliciousMalicious
Malicious
 
Cybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking AboutCybersecurity Concerns You Should be Thinking About
Cybersecurity Concerns You Should be Thinking About
 

More from Azmi Mohd Tamil

More from Azmi Mohd Tamil (20)

Hybrid setup - How to conduct simultaneous face-to-face and online presentati...
Hybrid setup - How to conduct simultaneous face-to-face and online presentati...Hybrid setup - How to conduct simultaneous face-to-face and online presentati...
Hybrid setup - How to conduct simultaneous face-to-face and online presentati...
 
Audiovisual and technicalities from preparation to retrieval how to enhance m...
Audiovisual and technicalities from preparation to retrieval how to enhance m...Audiovisual and technicalities from preparation to retrieval how to enhance m...
Audiovisual and technicalities from preparation to retrieval how to enhance m...
 
Broadcast quality online teaching at zero budget
Broadcast quality online teaching at zero budgetBroadcast quality online teaching at zero budget
Broadcast quality online teaching at zero budget
 
Video for Teaching & Learning: OBS
Video for Teaching & Learning: OBSVideo for Teaching & Learning: OBS
Video for Teaching & Learning: OBS
 
Bengkel 21-12-2020 - Etika atas Talian & Alat Minima
Bengkel 21-12-2020 - Etika atas Talian & Alat MinimaBengkel 21-12-2020 - Etika atas Talian & Alat Minima
Bengkel 21-12-2020 - Etika atas Talian & Alat Minima
 
GIS & History of Mapping in Malaya (lecture notes circa 2009)
GIS & History of Mapping in Malaya (lecture notes circa 2009)GIS & History of Mapping in Malaya (lecture notes circa 2009)
GIS & History of Mapping in Malaya (lecture notes circa 2009)
 
Blended e-learning in UKMFolio
Blended e-learning in UKMFolioBlended e-learning in UKMFolio
Blended e-learning in UKMFolio
 
How to Compute & Recode SPSS Data
How to Compute & Recode SPSS DataHow to Compute & Recode SPSS Data
How to Compute & Recode SPSS Data
 
Introduction to Data Analysis With R and R Studio
Introduction to Data Analysis With R and R StudioIntroduction to Data Analysis With R and R Studio
Introduction to Data Analysis With R and R Studio
 
Hack#38 - How to Stream Zoom to Facebook & YouTube Without Using An Encoder o...
Hack#38 - How to Stream Zoom to Facebook & YouTube Without Using An Encoder o...Hack#38 - How to Stream Zoom to Facebook & YouTube Without Using An Encoder o...
Hack#38 - How to Stream Zoom to Facebook & YouTube Without Using An Encoder o...
 
Hack#37 - How to simultaneously live stream to 4 sites using a single hardwar...
Hack#37 - How to simultaneously live stream to 4 sites using a single hardwar...Hack#37 - How to simultaneously live stream to 4 sites using a single hardwar...
Hack#37 - How to simultaneously live stream to 4 sites using a single hardwar...
 
Cochran Mantel Haenszel Test with Breslow-Day Test & Quadratic Equation
Cochran Mantel Haenszel Test with Breslow-Day Test & Quadratic EquationCochran Mantel Haenszel Test with Breslow-Day Test & Quadratic Equation
Cochran Mantel Haenszel Test with Breslow-Day Test & Quadratic Equation
 
New Emerging And Reemerging Infections circa 2006
New Emerging And Reemerging Infections circa 2006New Emerging And Reemerging Infections circa 2006
New Emerging And Reemerging Infections circa 2006
 
Hacks#36 -Raspberry Pi 4 Mini Computer
Hacks#36 -Raspberry Pi 4 Mini ComputerHacks#36 -Raspberry Pi 4 Mini Computer
Hacks#36 -Raspberry Pi 4 Mini Computer
 
Hack#35 How to FB Live using a Video Encoder
Hack#35 How to FB Live using a Video EncoderHack#35 How to FB Live using a Video Encoder
Hack#35 How to FB Live using a Video Encoder
 
Hack#34 - Online Teaching with Microsoft Teams
Hack#34 - Online Teaching with Microsoft TeamsHack#34 - Online Teaching with Microsoft Teams
Hack#34 - Online Teaching with Microsoft Teams
 
Hack#33 How To FB-Live
Hack#33 How To FB-LiveHack#33 How To FB-Live
Hack#33 How To FB-Live
 
Skype for Business for UKM
Skype for Business for UKM Skype for Business for UKM
Skype for Business for UKM
 
Introduction to Structural Equation Modeling
Introduction to Structural Equation ModelingIntroduction to Structural Equation Modeling
Introduction to Structural Equation Modeling
 
Introduction to 20 Classroom Hacks For Education 4.0 (updated)
Introduction to 20 Classroom Hacks For Education 4.0 (updated)Introduction to 20 Classroom Hacks For Education 4.0 (updated)
Introduction to 20 Classroom Hacks For Education 4.0 (updated)
 

Recently uploaded

Recently uploaded (20)

Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
Exploring UiPath Orchestrator API: updates and limits in 2024 🚀
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 

Safe computing (circa 2004)

  • 1. Jabatan Kesihatan Masyarakat Cheapskate's Guide to a Safe PC Dr Azmi Mohd Tamil
  • 2. © Introduction • http://www.wired.com/news/print/0, 1294,62222,00.html • MyDoom virus-laden e-mails may no longer be clogging inboxes, but each of those infected computers now contains a backdoor that allows any malicious hacker with a modicum of technical skills to remotely access and control the infected machines.
  • 3. © Data Protection • From Viruses - explorer.zip, SirCam, Nimda, MyDoom • From Spyware • Malicious Intrusion - hackers, crackers, use of trojan viruses • Unplanned Disasters - need for backups
  • 4. © Protection From Intrusion • First up, firewalls. If you're only going to run one security application, then make it a firewall, which acts as a sort of watchdog for your computer, alerting you to and blocking the entrance or exit of unwelcome visitors. • ZoneAlarm is the most popular free firewall. • Agnitum's Outpost free firewall is easy to install and uses plug-in software modules to add to or enhance its features.
  • 5. © Data Protection • http://www.wired.com/news/print/0,1294,45581,00.html • In Order to Have Your Advice • By Jon Rochmis • 2:00 a.m. July 27, 2001 PDT • “And, by the way, hats off to the FBI guy who opened the SirCam virus. His computer proceeded to send the virus -- and random FBI documents -- to e-mail addresses stored in his computer as well as throughout the entire National Infrastructure Protection Center, which, it just so happens, was established to protect the United States' computer networks.”
  • 7. © Protection From Viruses • Install a good anti-virus program • Update it daily if possible, if not every fortnight • Update yourself on virus information ie http://www.wired.com, http://www.cert.org • Never ever click on an attachment esp .exe, .bat, .vbs, .lnk, .pif, sent via e-mail, unless you’re expecting it
  • 8. © Anti Virus • Free antivirus applications are also available, but brand-new viruses can and do slip past scanners until companies can analyze the new virus's code and release an upgrade that will block it. Given that limitation, antivirus tools are good at protecting computers against known viruses, but should never be considered bulletproof.
  • 9. © Spy-Ware • You've checked your computer for viruses but you're still struggling with application crashes, slowed performance, slews of pop-up ads even when you're not browsing the Web, a home or start page that's been changed to some odd search site, or other "ghost in the machine" sorts of mishaps, chances are your computer harbors spyware, adware or a Trojan Horse. • All of these programs purport to be some useful or fun tool, but actually hand over some level of control over your computer to an outside entity.
  • 10. © Anti Spy-Ware • The best program to handle spyware or Trojans is Spybot-Search & Destroy. Spybot effectively and easily removes virtually every sneaky piece of software in existence. Run it weekly. • I myself uses Lavasoft Ad-Aware.
  • 11. © Avoid Microsoft • Last but not least, one of the best all- around free security tools is Mozilla's browser and e-mail applications. Since so many viruses, worms and Internet exploits are aimed at Microsoft applications, switching to these open- source programs can help you avoid problems. • The browser also has built-in pop-up blocking and advanced, configurable privacy and security tools.
  • 13. © Disaster Recovery • Use of data backup software • Use of data replication software • If possible, store backups off-site • Duplicating data (mirroring) using 2 powerful servers, one sited off-site • “Hot-site” mirroring
  • 14. © Data Safekeeping • Repositories. These are responsible for holding data and other information assets and preparing them for reuse.
  • 15. © Conclusion • The use of computers in education has improved the learning & education process. • But without the proper strategies or precautions, it may impede education, instead of helping us.