Security
(Things everyone should learn)
VIRUSES AND TROJANS: A virus is a portion of code, that can attach itself to a program, a document file, or anywhere the author decides. Common places are in Executable files (those that end in .EXE) and may also reside in COMMAND files (those that end in .COM). Since no one really likes Mircrosloth, it stands to reason that programs developed by MS are the first to get hit. Favorites are Windows (Windoze); Internet Explorer (IE); Outlook Email reader; and MS Word; Excel; and other MS Office products. Although I have never seen a virus that came with Word Perfect, I am sure they exist, but I see daily arrivals of viruses that attach to MS Word Document files (.DOC). If I get a DOC file in my Email, its easier just to delete it, than take the time and chance to virus scan it (assuming I have a good up-to-date virus scanner)

A virus does not have to be complicated. Something that uses your commands built into your operating system, such as delete and format, could erase your hard drive. Everyone should have heard about the I LOVE YOU and MELISSA virus attachments. (I received the I Love You VBS virus and if I would have taken the attachment, it would have done its damage)

I have a directory (folder) called "DOWN" where I save all attachments (that I wish to keep) and I after about a week, I run my virus scanner on them, before opening, running, or executing anything I place there. By that time, the VBS (Visual Basic Scripting) strains of viruses were already on the NEWS and the updates are out for the Virus Definitions (the part of the virus scanners that gets updated with information about what to scan for)

Some viruses alter the BOOT SECTOR (that first part of your hard drive that contains information where everything is) and simple removal could render your hard drive inaccessable. I won't get into ways to deal with each one, as this is intended to be instructions and information in layperson's language and level.

TOP OF PAGE

The big authorities for Viruses are best consulted on a regular basis. There are various FREE virus scanners available, but remember, that as soon as you install it, it will be out of date. EXAMPLE: You bought McAfee's latest yesterday, and today they discovered the KILLER RESUME virus. How many days was the software you purchased, sitting on the shelf? New viruses come out every day. UPDATE your definition files (get the updates) right away, and get a RECOVERY diskette.
 

TROJANS! These little programs are my biggest concern. How would you feel, leaving a stranger at your computer, with no restrictions, to shop your cache files, see where you have been, read your resumes, read the letters you wrote to pay bills with accound numbers and sensitive information visible? In spite of any secure site for paying bills, every keystroke you make (on and off line) can be recorded. All your passwords, personal ICQ or AIM messages. Do you know, several common trojans, such as SubSeven, Back Orfice, Netbus and more, can let a person access more than  you can.

Here's some of the features of these programs:

- see the serial number of  your Windoze or other software that you can't even find..
- see your dial up provider, username, and password

- read and save your documents such as:
    - your resume (where you work, worked, and experience you have, along with phone number for you,
      your references and close friends
    - your children's school essays and reports, with the child's name, school, classroom, teacher...etc

- save your files
    - your private pictures and images you save on your computer
    - your bookmarks (everywhere you have gone on the Internet)
    - screen captures, just what you see
    - watch you type
    - collect your passwords for things like Hotmail accounts. (Then remail from your account, to your friends)
    - read your business FAXes or record phone numbers from your Call Manager software

- manage your software
    - turn off the programs that might warn you that you are invaded
    - run additional programs from your computer to attack others who will think it is you hacking
    - turn your screen upside down, lock your programs

- manage your hardware
    - access your CDROM, Floppy Disks left in the drive, and multiple computers attached to yours
    - lock your keyboard (preventing CTRL ALT DEL to see what is locking up)
    - control your mouse
    - turn on your camera (and take pictures - next time comb your hair or wear clothes when you are at the computer)
    - turn on your microphone (and record your conversations)

People can find your computer on the Internet, find and open Port and enter your computer. Even if you are not infected with a popular trojan, you may still have ports open. Security holes exist in some versions of Interent Explorer, ICQ, and email polling software. Want to check your system right now?

Take a trip to this link (SHIELDS UP)  https://grc.com/x/ne.dll?bh0bkyd2
(If this link isn't good, go to  https://grc.com/ and look for SHIELDS UP)

FREE RELIABLE SOFTWARE SITES (with virus scanners)
http://www.tucows.com (setup your location, and bookmark that final address)
(look for FREEWARE, or SHAREWARE if you can afford to purchase after you try)

 http://tucows.w3internet.com/virus95.html#tfak95  (Windows 9x Virus Scanner Downloads)

http://tucows.w3internet.com/files2/TFAK3.zip  (Trojan First Aid Kit 3.0) FREE
http://tucows.w3internet.com/files5/nobug1.exe  (No Love Bug 1.06 Cleaner) FREE
Definition Updates for the Virus Scanner you use FREE (if you own the software)
http://www.zonelabs.com/  (Zone Alarm is FREE for personal use)

TOP OF PAGE
 
 
To Rasta's Home Page

Back to the Tips and Tricks start page

Send me EMAIL
 

PLEASE SIGN MY GUESTBOOK WITH YOUR COMMENTS..

Sign Guestbook
View Guestbook