Document 7181735

Download Report

Transcript Document 7181735

Welcome!!
Computer / Internet
Security Class / Seminar /
Workshop
My Name is: Larry Miller
 I have worked with computers since 1982,
my first computer was an Apple IIc


My Second was an IBM PC (model 5150)
 SOME
FACTS:
◦I am not all knowing
◦I am hoping you will learn
something new here today
SOME FACTS:
◦ The Slammer worm was relentless. In the first
minute of existence, it doubled the number of
machines that it infected every 8.5 seconds. In
just three minutes it was scanning 55 million
targets per second! Within 10-minutes, 90
percent of all unprotected computers in the
world were infected. Luckily that is all that it
did was spread. What a nightmare it would
have been if it carried a payload that actually
damaged computers.
SOME FACTS:
◦ No two computers are the same (even if
you image it)
◦ I tend to ramble, so please stop me if I
do 
◦ I do not plan on reading every word that
you see on this wall
◦ NO QUESTION IS A DUMB QUESTION

With the usage of these products our lives
become more “social” (i.e. Facebook and
Twitter) and more vulnerable

Today I will help you understand how to
keep yourself safe on your computer

Also, we will talk about the best way to
navigate the Internet without getting a
virus’, malware, adware, etc.
TOPICS WE WILL DISCUSSING TODAY
 Securing Your Operating System
◦ Take steps to ensure your system is secure!
◦ Passwords
◦ AntiVirus, Adware, Malware, etc
-----------------------------------------------------
Keeping your system up to date
◦
◦
◦
◦
◦
Windows Updates
MAC OS Software Updates
AntiVirus, Adware, Malware, etc Updates
De-fragmentation
Installing Applications and what the
ramifications are...

Connecting to the Internet
◦ Wired vs. Wireless
 Why and what is the difference
◦ What is the best browser to us (i.e. Internet
Explorer, Chrome, Firefox)
◦ Safe Surfing
◦ Making sure you keep your information safe on
the Internet
◦ EMAIL
 SPAM
 Phishing
 Attachments
◦ Virus', Malware, Adware, etc

Maintaining your computer
◦ Backups
◦ How to keep you computer from getting
"SLOW“
------------------------------------------------------

Questions and Answers (talk and hands
on)

Do you feel this way about your computer
most days?
Securing Your Operating System
First thing to protecting yourself is to become familiar
with what types of attacks there are on the Internet.
 Always Think First, and Ask Questions
When in doubt, DELETE or CLOSE the screen (right
click on the bottom of the screen and choose close)!
 Be careful who you trust and what information you
 provide online.
 Know what data you have, where it is and that it’s
 secured.
 Don’t let your private life become part of the Internet.

Take steps to ensure your
system is secure!
Securing Your Operating System
Good Passwords:

At Least 8 Characters Long

No Dictionary Words - (Forwards OR
Backwards)

May Contain Special Characters (&%_#)

Should Have UPPER and lower Case
Letters and/or Words.
Securing Your Operating System
Good Passwords:

Never Be Written Down or Shared

Should Be Changed Regularly

Do Not Tell ANYONE! Not Me, Not Anyone!

If it is absolutely necessary for maintenance
and/or a trusted repair person you can give them
a temporary password. After they are done,
change it immediately.
Securing Your Operating System
Good Passwords:

Your Password should be a unique combination of
letters, numbers and a special character
(i.e. Y@nkeyD00dle )
Securing Your Operating System
Good Passwords:

Example of BAD passwords:
Securing Your Operating System

It is very important to assign passwords to your user
accounts on your computer – this will keep your
DATA safe and secure

Setting The Windows Administrator’s Password:

Start -> Run -> control userpasswords2
Securing Your Operating System
Highlight “Administrator”
Choose “Reset Password”
Clear the User Name field and
Rename it
Securing Your Operating System
Setting The Mac OS X Root Password:
Root Account DISABLED by Default
•Net Info Manager
•Authenticate
•Enable Root User
•Create Root Password
Securing Your Operating System

What Is A Virus?

"A parasitic program written intentionally to
enter a computer without the user's permission
or knowledge. The word parasitic is used because
a virus attaches to files or boot sectors and
replicates itself, thus continuing to spread.
Though some viruses do little but replicate,
others can cause serious damage or affect
program and system performance. A virus should
never be assumed harmless and left on a
system." -- Symantec
Securing Your Operating System

Types of Computer Viruses
Basic Virus - a piece of software code that is developed to attack computers and network
entities via email or Internet connections. It quickly replicates itself and gradually attaches to files,
programs or the hard drive.
 Trojan Horse - This is a type of benign program, a malicious code that doesn't replicate when
entering a system but can be effectively used to open 'back doors.' Trojan Horses allow hackers to
assume control over a particular system or to steal vital data. As an example, QAZ helped hackers
view the secret source code at Microsoft-owned network.

Worm - this type of virus has the capability to spread itself automatically over the network from
one computer to the next. During a worm attack, users' computers get infected without even having
to click open email attachment or any program, etc. As an example, in the early August of 2003, a
worm by the name of Blaster infected more than 1 million computers worldwide. In similar case,
Welchia, an antidote to Blaster, clogged huge amounts of network computers and caused computers
crashes.

Blended or a Combination Attack - covers innovative strategies to infect and spread various
viruses within computer networks. It involves basic virus, worm, and Trojan Horse techniques where
attackers can use peer-to-peer networks and instant messaging systems to channel such viruses. In
the mid-August of 2003, SoBig, a virus, infected nearly every other email traveling on the Internet at
its peak.

Securing Your Operating System
How They Infect
 Open Ports (Worms, Trojans)

◦ A port is a method on how your computer
connects to the Internet (it is like a room full of
doors and you choose which one to go
through)
Removable Media (Floppy Disk, Memory
Card)
 Downloads (WWW, FTP, P2P)
 Email (Attachments, Scripts)

Securing Your Operating System
Securing Your Operating System

Free AntiVirus, Anti-Malware and AntiSpyware
◦
◦
◦
◦
◦
AVG
Avast
Spybot Search and Destory
AntiVir
Ad-Aware
Let’s hope your computer does not
do this…
QUESTIONS
Keeping your system up to date

Computer Maintenance Checklist
◦ At system setup
 Install a surge suppressor/emergency shutdown power
strip
 Register your software products
 Schedule automated updates
 Read the maintenance section of your manual
 Set up your email to auto-archive older messages (if
you are using that type of email program (i.e. Microsoft
Outlook)
 Install anti virus software
 Install anti-advertising/malware software
 Put your software drivers (does anyone know what a
software driver is??) in a pocket sleeve 3 ring binder
Keeping your system up to date

Weekly
◦ Run a disk scan to check for hard drive issues (demo)
◦ Run a defragmentation program – in Windows Vista and
7 this is done automatically)
◦ Run a clean up to delete unneeded files (demo)
◦ Back up your files to a remote location (I suggest Mozy
Pro)
◦ Empty your recycle bin
◦ Delete your Internet files (demo)
◦ Clear your browsing history (demo)
◦ Delete your cookies (demo)
◦ Update your virus definitions
◦ Run a full virus scan
Keeping your system up to date


Monthly
◦ Check for updates
◦ Delete/uninstall unneeded or unused programs
Quarterly
◦ Clean your keyboard and mouse (alcohol pads and
canned air) ***** I have a story about canned air
◦ Clean your monitor
◦ Clean your peripherals
◦ Rebuild your desktop (this is not an easy task, please
make sure you get a professional to do this or ask a
friend to help or myself) -- MOST IMPORTANT, BACK UP
YOUR DATA
◦ Change all your passwords
Keeping your system up to date

Yearly
◦ Renew your software update and anti virus subscriptions
Keeping your system up to date

Installing Applications
◦ Only install applications that you need
◦ If you install to many applications, your hard
drive will slowly fill up with files and will cause
it to be slow over time (also, even if you think
that uninstalling an application will speed up
your computer, that is not always a truth…
some applications leave behind files and could
cause issues later on)
Keeping your system up to date

Which Operating System is best for me??
◦ It is all about preference (what works best for
me?)
◦ Windows XP?
◦ Windows Vista
◦ Windows 7
◦ MAC OS X
◦ Linux (Ubuntu, Fedora, Red Hat)

No matter which Operating System you choose, always
remember, it can get a virus, you need to keep it up to
date and you need to back up your data
QUESTIONS
NEED A
BREAK???
Connecting to the Internet

Wired vs. Wireless
◦ Some Pros and Cons
 Wired can be more fast (some wired connections
have faster speeds than wireless)
 Wireless allows you to be anywhere in your home
and still connected to the Internet
 Wired connections can be more secure (in some
cases than wireless)
 Wireless connections can be less secure if you
don’t have the proper encryption enabled on your
wireless access point
Connecting to the Internet

Which Internet Browser is best for me
◦ It is all about preference (what works best for me?)
◦ Window’s Internet Explorer
 Integrates really well with Windows OS
 Probably the most targeted (hacked, virus) browser in the world
◦ Mozilla’s Firefox
 It is very extendable (customizable)
◦ Apple’s Safari
 Apple’s answer to browsing
 Not very customizable
◦ Google’s Chrome
 Google’s answer to browsing
 Not very customizable
◦ Opera
 Opera’s answer to browsing
 Not very customizable
Connecting to the Internet
Connecting to the Internet

Safe/Smart Surfing
◦ First rule of smart surfing? Remain as
anonymous as possible. That means keeping
all private information private. Here are some
examples of private information that you
should never give out on the Internet:







full name
home address
phone number
Social Security number
passwords
names of family members
credit card numbers
Connecting to the Internet


Keeping your information safe on the
Internet
◦ The best way is not to put anything out there
◦ No personal information should be shared with
anyone you don’t know
If you use Facebook, MySpace, Linkedin, etc…
understand that everything you say, express and
post (i.e. photos) are available for the world to
see… Also, remember that once something is
“posted” on the Internet it could potentially be
there forever. The all mighty Google may have
already cataloged it.
Connecting to the Internet

If you have children, it might be a good
idea to use some sort of preventative
measures to keep them safe
◦
First thing is talk to them about Internet and let me
know the about the dangers keeping their personal
information safe
◦
If you are worried that they might go to unsafe places
on the Internet you can install programs on to your
computer to help them stay safe (i.e. McGruff
SafeGuard, CYBERSitter and NetNanny). Windows
Vista and Windows 7 have a similar programs built-in
Connecting to the Internet

Downloading Files, Music and Applications from
the Internet
◦ My best advise to you about any of this is…
don’t do any of it
◦ If you have to download something, I suggest
you have updated AntiVirus software and AntiMalware software
◦ For Music, I suggest using iTunes or another
reputable company to download your music.
Stay away from companies like LimeWire and
other “free” music download sites. They
typically have a lot of virus’ associated with
them
Connecting to the Internet

Email
◦ The best way to keep from getting these, is to
only open emails from people you trust
 SPAM (video)
 Phishing
◦ These people are trying to get you to give them
information about personal online accounts (i.e. ebay,
paypal, etc)
 Attachments
◦ Only time you should open email from anyone is if you
trust the person and you are expecting something from
them (next to Phishing, this is the #1 way people get
virus)
Connecting to the Internet

Email
◦ Don’t get fooled by the emails with attachments… like,
“If you forward this email you will receive $100 in 100
days”
◦ Remember if you are going to forward an email to
friends and family, it is important to not include the
previous email addresses from the attached email.
◦ Also, if you have a group of emails that you plan to send
to, it is best to blind carbon copy (BCC) them
Connecting to the Internet
Connecting to the Internet

Malware
◦ Malware, short for malicious software, is software designed to
infiltrate a computer system without the owner's informed
consent. The expression is a general term used by computer
professionals to mean a variety of forms of hostile, intrusive, or
annoying software or program code.[1] The term "computer
virus" is sometimes used as a catch-all phrase to include all
types of malware, including true viruses. - wikipedia

Intrusive-ware (not an official term, that is what
I call it)
◦ It is almost the same as Malware; however, it has all of the
characteristics of a legitimate piece of software. Example, a program
that looks and feels like your AntiVirus program; however, it keeps
telling you that you have virus and the only way to make these popups go away, is to buy their software. Now they may have your
money, your computer and possibly your identity.

Misconceptions about your computer
◦ Upgrading (to the next version of Windows,
Linux or MAC OS X) will not always fix the
issue
◦ Running a virus scan and/or a anti-malware
will not always fix your issue

Keeping yourself from having to call a
technician or repair person
◦ Follow these 4 simple rules
1) Be mindful of where you go on to the
Internet (if you think it is doesn’t look or feel
right, then it isn’t… close your browser and/or
just turn off your computer)
2) Update your computer with your AntiVirus
definitions and Window Updates
3) Back up your data to an external hard or an
external company (i.e. Mozy Pro)
4) Follow the Weekly, Monthly, Quarterly, Yearly
plan (as mentioned above)
QUESTIONS

Cool Websites:
◦
◦
◦
◦
◦
◦
http://www.komando.com/
http://twit.tv/
http://www.cnet.com/buzz-out-loud-podcast/
http://www.crossloop.com/
http://www.mahalo.com/
http://www.petri.co.il/
◦ http://www.connectedgeek.net
◦ Survey:
◦ http://shortlinks.connectedgeek.net/2010-04-Survey

THANK YOU FOR COMING TODAY!
◦ Please fill out the survey form
If you have any questions or need help,
please contact me at:
http://www.connectedgeek.net

[email protected]
or
248-648-1717