Regardless of your ambitious goals, keeping your computer “healthy” is the decisive first step toward achieving a better security posture. So before you start worrying about high-intensity passwords, communication privacy, and safely deleting files, etc., you need to make sure your computer is not hacked or infected with malware such as viruses and spyware. Otherwise, other safety precautions you take will not be guaranteed. After all, if the thief has been hiding in the downstairs, it will not help you to lock the door again. In the same way, opening the door to the downstairs search will not be of many benefits to you.
Therefore, this chapter Network Experts explains how to maintain your software and how to use tools like Avast and Spybot to protect against ubiquitous malware and hackers . Although the software recommended in this chapter targets Windows operating systems that are particularly vulnerable, GNU/Linux and Apple OSX users are also at risk and should adopt the strategies mentioned below.
WHAT YOU WILL LEARN FROM THIS CHAPTER
- Learn more about the nature of specific threats caused by malware on personal privacy, the integrity of information, the stability of computers, and the reliability of other security tools.
- How to use some recommended tools to protect yourself from such threats.
- How to protect your computer’s security by updating your software frequently.
- Why you should use free software to avoid the hazards of software license expiration or pirated software and use the popular FOSS (free open source software) tools to enhance security whenever possible.
VIRUS PROGRAM
There are many different categorization methods for virus programs, and each categorization method subdivides a large number of categories. Worm, macro viruses, Trojans, and backdoors are some of the more well-known examples. These viruses are spread across the Internet and use email, malicious web pages or other methods to infect unprotected computers. Other viruses spread through mobile storage media, especially U disk and external hard drives that are both readable and writable. A virus can destroy, damage, or infect information on your computer, including data on an external hard drive. They can also control your computer and use it to attack other computers. Fortunately, you can use a variety of anti-virus software to protect yourself and the people who exchange data with you.
ANTI-VIRUS SOFTWARE
There is an excellent free software for Windows called Avast , which is easy to use, regularly updated, and highly recommended by anti-virus experts. It requires you to register every 14 months, but the registration, updates, and the program itself are all free.
Getting started: Check out the Avast guide and get started.
Clam Win is a FOSS (free open source software) that replaces Avast and other well-known commercial anti-virus programs. Although it is a major anti-virus software, it lacks some important features, but Clam Win has the advantage of being able to run on a USB flash drive and can be used to scan computers that you do not have permission to install. It’s very helpful when you can only use a public computer or do sensitive work in an internet cafe.
TIPS FOR EFFECTIVE USE OF ANTI-VIRUS SOFTWARE
- Do not run two anti-virus software at the same time, which may cause your computer to run extremely slowly or even crash. Uninstall another before installing an anti-virus software.
- Make sure your anti-virus program allows you to receive updates. Many commercial software pre-installed on new computers will ask you to register (and purchase) after a period of use, otherwise they will stop receiving updates. All software mentioned here supports free updates.
- Make sure your anti-virus software is automatically updated on a regular basis. New viruses are written and distributed every day, and if you don’t keep your virus database updated, your computer will quickly become vulnerable. Avast will automatically look for updates when you connect to the Internet.
- If your anti-virus software has the “always on” feature, make sure you have this feature enabled. Different software has different names for this, but most of them provide similar functionality. It may be called “real-time protection,” “resident protection,” or a similar name. See Avast guidelines of section 3.2.1 to learn more about the software, “resident scanner.”
- Scan all files on your computer regularly. You don’t have to do this every day (especially if your anti-virus software has the “always on” feature mentioned above), but you should scan from time to time. The frequency can be determined on a case-by-case basis. Have you recently connected your computer to a strange network? Who has your U disk shared with? Do you often receive emails with strange attachments? Have other members in your home or office recently been infected with a virus? See the Avast guide for more information on how to scan files.
PREVENT VIRAL INFECTION
- Be extremely cautious when opening email attachments. It is best not to open any attachments received from unfamiliar sources. If you need to open an attachment, you should first save the attachment to a folder on your local computer and open the appropriate application yourself (for example, Microsoft Word or Adobe Acrobat). If you use the program’s File menu to manually open an attachment instead of double-clicking it or allowing your mail program to open it automatically, you are less likely to get infected.
- Consider possible risks before inserting removable storage media such as CDs, DVDs and USB sticks into your computer. You should first make sure your anti-virus software has the latest updates and that its scanner is running. It’s also a good idea to disable the auto play feature of the operating system, as viruses may use this feature to infect your computer. Under Windows XP, go to My Computer, right click on your CD or DVD drive, select Properties and click the AutoPlay tab. Select the No action or Remind me option for each content category, then click OK.
- You can also help prevent virus infection by using free and open source software, which is often more secure and less likely to be targeted by virus writers.
SPYWARE
Spyware is a type of malware that tracks what you do on your computer and on the Internet and sends it to people who should not be exposed to it. These programs can record the text you type on the keyboard, the actions of your mouse, the pages you have visited, the programs you have run, and more. So they can undermine the security of your computer, revealing your secret information, your activities, and your contacts. Computer infections are similar to spyware, so many of the above suggestions are equally useful when you defend against this second type of malware. Since malicious web pages are the primary source of spyware infection, you should pay special attention to the websites you visit and make sure your browser settings are secure.
ANTI-SPYWARE
You can use anti-spyware to protect your computer from such threats. Spybot is one of them. It is a good way to identify and remove certain malware that is ignored by anti-virus software. As with anti-virus software, updating Spybot’s malware- defining library and regularly scanning it is also critical.
Getting started: Check out the Spybot guide and get started
PREVENT INFECTION SPYWARE
- Be alert when browsing the site. Keep an eye on the browser window that pops up automatically, and read it carefully instead of clicking yes or OK. If you are confused, you should click the X button in the upper right corner to close the pop-up window instead of clicking Cancel. This helps prevent webpages from tricking you into installing malware on your computer.
- Prevent browsers from automatically running potentially dangerous programs embedded in web pages to improve browser security. If you are using Mozilla Firefox, you can follow the instructions in the fourth part of the Firefox guide to install the No Script extension.
FIREWALL
A firewall is the first program on a computer that comes into contact with data from the Internet. It is also the last program to process outflow information. It is like a security guard, standing guard in front of the building, deciding who is going in and out. The firewall receives, checks, and determines all incoming and outgoing data. Protecting against untrusted Internet connections and connecting to the local network is of course crucial for you, as these connections can open the door to hackers and viruses. But in fact, it’s equally important to monitor the connections that are exported from your computer.
A good firewall allows you to set access permissions for every program on your computer. When one of the programs tries to connect to the outside world, the firewall blocks the connection and notifies you unless your firewall recognizes and verifies that the connection has been approved by your firewall. This effectively prevents malware from spreading viruses or inviting hackers to break into your computer. At this point, the firewall provides both a second line of defense and an early warning system to let you know that your computer’s security is being compromised.
FIREWALL SOFTWARE
A recent version of Microsoft Windows includes a built-in firewall that is automatically turned on. Unfortunately, Windows Firewall has a limited role in all aspects, especially since it does not check the output connections, and it’s not very useful.
BLOCK UNTRUSTED NETWORK CONNECTIONS
- Computers used for sensitive work should only install the necessary procedures and make sure that you get them from a reputable source. Uninstall any software you are not using.
- Disconnect from the internet when you are not using your computer. Turn off your computer completely at night.
- Don’t share your Windows password with anyone.
- If you have enabled any “Windows Services”, you should disable them when you are no longer using them. See the extended reading section for details.
- Make sure that every computer in your office network has a firewall installed.
- You should consider installing an additional firewall to protect the local network of the entire office. Many commercial broadband gateways include an easy-to-use firewall that can be turned on to make your network more secure. If you don’t know where to start, you can ask someone who helps you set up your network.
KEEP UPDATING YOUR SOFTWARE
Computer programs are often large and complex. The software you use every day inevitably contains undetected errors, some of which can compromise your computer. However, software developers constantly find these errors and fix them by releasing updates. Therefore, it is important that you update all of the software on your computer, including the operating system. If Windows does not update automatically, you can do so by clicking the Start menu, selecting All Programs, and then clicking Windows Update. Doing so will open Internet Explorer and take you to the Microsoft update page. There you can enable the automatic update feature.
KEEP UPDATING FREE AND FREE OPEN SOURCE SOFTWARE
Proprietary software usually you are required to verify that you are legally purchased before you install the update. For example, if you are using pirated Microsoft Windows, it will not be automatically updated, making you and your information extremely vulnerable. If you don’t have a valid license, you put yourself and others at risk. Relying on pirated software can also introduce non-technical risks. Authorities in a growing number of countries have begun to verify that organizations have legally authorized each software they use. The police will confiscate computers and shut down these organizations on the grounds of “pirated software.” When the authorities of some countries intervene in the work of certain organizations for political reasons, this reason can easily be abused. Fortunately, you don’t need to buy expensive software to protect yourself from this.
We Cyber Security Services in Australia strongly recommend that you try to use free software or free and open source software to replace the proprietary softwareyou are using, especially those that are not authorized. Free software and free open source software are usually written by volunteers and non-profit organizations that publish and update them for free. Especially free and open source software, they are generally considered to be more secure than proprietary software. Because their development process is transparent, allowing different expert groups to check their source code, these experts can identify the problem and provide a solution.
Many free and open source software appear and use very similar to the proprietary software they replace. At the same time, you can use them with proprietary software including the Windows operating system without any problems. Even if your colleagues continue to use the commercial version of a particular program, you can easily exchange files and share information with them. It’s worth mentioning that you can consider using Firefox, Thunderbird and OpenOffice to replace Internet explorer, Outlook / Outlook Express and Microsoft Office respectively.
In fact, you can even abandon the Microsoft Windows operating system and try to use a more secure free and open source software: GNU/ Linux. The best way to know if you are ready to make a change is to try it out. You can download an Ubuntu Linux’s Live CD version, burn it to a CD or DVD, into your computer and then restart. When it finishes loading, your computer will start running GNU/Linux and you can make another decision as appropriate. Please don’t worry, these are not permanent. Once you’ve experienced it, just turn off your computer and remove the Ubuntu Live CD . The next time you start your computer, you’ll be back to Windows, and all your applications, settings, and materials will remain intact. In addition to the overall security benefits of open source software, Ubuntu also has a free and easy-to-use update tool to prevent your operating system and many other software from becoming obsolete and unsafe.