Wednesday, September 27, 2006

Home Computer Protection Architecture

If you buy a computer, never load any additional programs on it or connect it to the Internet (through a modem or broadband), then this article is not for you.

Without sounding paranoid, there are other computer users who want to do damage to you. Safety begins with understanding every interaction with your computer, from the keyboard, to software installation, to network activity.




Understanding your Vulnerabilities

References

Tip: Home Network Vulnerabilities
1. Spam
2. Cookies
3. Pop-Ups
4. Spyware/Adware
5. Additional Scams
6. How to Build It: Preventing Network Vulnerabilities
7. Turn on Spam Blocking at Your Service Provider
8. Set Up Spam Blocking on Your Home Computers
9. Avoid Phishing Scams
10. Set Up Spyware and Adware Blocking on Your Home Computers
11. Set Up Pop-Up Blocking on Home Computers
12. Where to Go for More Info




Protecting your Operating System

Protecting your File System: Anti-Virus

References

Free Software

Free Online Virus Scanners

Protecting your Personal Information: Anti-Spyware


References

Free Software

Tip: How to Avoid Spyware
1. antispyware software.
2. antispyware backup: firewalls
3. Limit peer-to-peer file-sharing services.
4. Remove cookies for unknown sites.
5. e-mail best practices.
6. know what you are installing and from whom
7. web browser best practices.
8. Read magazines/web sites to keep up to date on spyware.







Protecting Network Ports: Firewall
image from skullbox.net
What is a firewall?
"A firewall is a hardware device or software program that stands between your computer and the internet so that it, not your computer, is directly exposed to the network. Like its namesake the cinderblock wall, it takes the heat when trouble comes. Firewalls differ in how they work and what they specifically do, but they all shield you. The best ones make you invisible to the internet while still leaving it accessible to you...All firewalls monitor network traffic across these ports. How and how well they do this defines the quality and usefulness of a given firewall."

References
  • TBD

Free Software

Tip: Hardware-based Firewall
Note that hardware-based routers, such as a wireless router used in your home, offer built-in firewall protection at the source of your internet connection.



Protecting your Wireless Connection

Tip: Securing your WLAN
Countermeasure 1: Change Your Default Settings
Countermeasure 2: Upgrade Your Firmware, and maybe Hardware
Countermeasure 3: Disable SSID broadcast
Countermeasure 4: Turn it off!
Countermeasure 5: MAC Address Filtering
Countermeasure 6: Lower the transmit power
Countermeasure 7: Encryption
Countermeasure 8: Add Authentication
Countermeasure 9: Implement general LAN security



Security Tests: see how secure you actually are

References



Recommendation: Buy an "all-in-one" Software Security Product


Optimize performance on your system and minimize your cost: buy a suite of security products from the same vendor. Every program/background process running on your computer diminishes the overall processing power of your computer. Look for best performance and lowest cost.

References

Free Software

Low-Cost Software
  • Tek-Tips
  • Microsoft Antispyware (free)
  • On demand scanners are Ewido (free)


Tip: 10 Tips for Running Security Suites
1. Trash your old security software
2. Check your hard drive's health
3. Freshen up Windows
4. Make an ID card
5. Run an extra antispyware app
6. Stay networked
7. Handle printing and file sharing
8. Document your woes
9. Send away your bad stuff
10. Keep your subscription current