Advertisement

Practicing Safe Computing Can Minimize Chances of Invasion

Share
TIMES STAFF WRITER

Home users can take several easy steps to avoid being infected with the tools used by hackers to launch online attacks.

The first is to get up-to-date antiviral software. The definitions used by the software must be updated frequently via downloads from the manufacturer’s Web site to keep the program effective.

Users should also set up a “firewall” between their computer and the Internet. A firewall monitors the Internet traffic between the computer and the network connection.

Advertisement

Firewalls can be physical devices that plug into the system or software that runs on the computer itself. Many of the antiviral programs on the market also come with a software firewall as well.

Software firewalls are more flexible because they can be configured to allow certain types of traffic through--such as networked computer games. Hardware firewalls, which cost $200 to $100, are less flexible but are thought to be a tiny bit more secure.

After firewall and antiviral software have been installed, the user might find that the computer has already been infested with a virus or Trojan horse. In such cases, the operating system or applications might already have been compromised.

The only safe means of recovery in such instances is to reformat the hard drive--after backing up data--and reinstall the operating system and applications from the original CD to be sure the system hasn’t been modified by intruders.

Assuming the system is secure, it’s just a matter of practicing safe computing to keep things that way. For instance, be sure to download and install security “patches” for the operating system and key applications, such as the Web browsing software.

Users should also avoid opening e-mail attachments. Even if a friend has sent a movie that’s already been opened and examined, such treats can conceal a poison pill. Scan attachments with the antiviral software first.

Advertisement

Computers that aren’t being used should be turned off or disconnected from the Internet to minimize the chances that an attacker can find a security flaw and break through.

More tips on safe computing are available at the CERT Web site, https://www.cert.org/tech_tips/home_networks.html.

More information on firewalls is at https://latimes.com/firewall.

Advertisement