19.04.2015 Views

Who Works at Home, Why, and How You Can Join Them How ...

Who Works at Home, Why, and How You Can Join Them How ...

Who Works at Home, Why, and How You Can Join Them How ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

GREGG KEIZER<br />

Safe<br />

Computing—<br />

Protecting<br />

<strong>You</strong>r Computer<br />

in the Viral Age<br />

Computers are as susceptible to dis<br />

ease as arc we. Thai's recently been<br />

made clear, as the computer virus<br />

thre<strong>at</strong> has gone from inconsequential to<br />

d<strong>at</strong>a-thre<strong>at</strong>ening.<br />

An electronic virus hides inside a pro<br />

gram, waiting to replic<strong>at</strong>e <strong>and</strong> <strong>at</strong>tach itself to<br />

other programs. Its effect varies, <strong>and</strong> is com<br />

pletely dependent on the insanity of the vir<br />

us's cre<strong>at</strong>or. Perhaps, as in the first reported<br />

Macintosh incident, the virus puts a benign<br />

message on the screen. Or, more insidiously,<br />

the virus reaches into your floppy or hard<br />

disk <strong>and</strong> scrambles files, destroys d<strong>at</strong>a. Al<br />

though there have been similar problems in<br />

the past, all under the broad definition of<br />

Trojan Horses, a virus is different in th<strong>at</strong> it<br />

reproduces. And spreads.<br />

No machine is safe. There have been<br />

viruses reported in Macintoshes. IBM PCs.<br />

<strong>and</strong> Commodore Amigas. The federal gov<br />

ernment reportedly has suffered infections.<br />

There are tales of infected commercial soft<br />

ware. Electronic bulletin boards <strong>and</strong> com<br />

mercial inform<strong>at</strong>ion systems, potentially the<br />

most fertile ground for viral transmission,<br />

have had to take extraordinary steps to en<br />

sure th<strong>at</strong> their offerings are healthy.<br />

Fighting a computer virus isn't easy. <strong>You</strong><br />

can kill it with a vaccine th<strong>at</strong> searches out <strong>and</strong><br />

destroys the code buried deep within your sys<br />

tem software. Trouble is, there are few gener<br />

al-purpose computer vaccines. Each virus can<br />

best be fought by a specific vaccine program.<br />

Virus, vaccine, infection, prevention,<br />

inocul<strong>at</strong>ion—if all this sounds familiar,<br />

an Apple spokeswoman, in a letter to a Mac<br />

intosh weekly concerning her company's antivirus<br />

efforts. Safe computing means backing<br />

up disks <strong>and</strong> hard drives so th<strong>at</strong> if infection<br />

occurs, virus-free forms of programs <strong>and</strong><br />

d<strong>at</strong>a will be available. Write-protecting orig<br />

inal disks is another aspect of safe comput<br />

ing; viruses cannot penetr<strong>at</strong>e physical<br />

barriers such as write-protection. Essential<br />

to safe computing's success, however, is<br />

knowing the source of software. Noncom<br />

mercial software from strangers is most sus<br />

pect, while files from friends are less<br />

dangerous, <strong>at</strong> least in theory. Knowing<br />

where software comes from, or has been, is<br />

going to be increasingly important in these<br />

computer viral times.<br />

Of course, the analogy between AIDS<br />

<strong>and</strong> computer virus infection only works on<br />

the surface. AIDS is a deadly disease th<strong>at</strong><br />

kills people. Computer viruses, for all their<br />

harm, only endanger machines <strong>and</strong> their<br />

d<strong>at</strong>a. One is terribly important, the other<br />

trivial by comparison.<br />

The bottom line? An awareness, first of<br />

all, in the community of computer users.<br />

Few compute in total isol<strong>at</strong>ion. If you're like<br />

most computer users, you share files <strong>and</strong><br />

inform<strong>at</strong>ion, perhaps even programs, with<br />

others. Th<strong>at</strong> doesn't have to change as long<br />

as you keep these things in mind.<br />

Underst<strong>and</strong> th<strong>at</strong> virus cre<strong>at</strong>ors are, in<br />

fact, criminals. Building a virus doesn't il<br />

lustr<strong>at</strong>e a programmer's ingenuity—only his<br />

or her viciousness.<br />

Underst<strong>and</strong> how viruses are transmit<br />

well, it should. It's hard to imagine a more<br />

powerful set of words <strong>and</strong> images than one<br />

th<strong>at</strong> has been bombarding us for years.<br />

AIDS words, the modern Black De<strong>at</strong>h<br />

words, carry a lot of baggage with them. In<br />

troducing them into computer jargon could<br />

have only one effect: instant <strong>at</strong>tention.<br />

The similarities are strangely compel<br />

ling. Infection by a new virus th<strong>at</strong>, once in<br />

side the system (whether the body or the<br />

machine), changes the n<strong>at</strong>ural programming<br />

(whether inside a cell or inside code). Un<br />

knowingly transmitted, the symptoms of its<br />

<strong>at</strong>tack are often disguised in the form of oth<br />

er illnesses (whether pneumonia or r<strong>and</strong>om<br />

system crashes).<br />

One form of prevention has even<br />

crossed the boundary between man <strong>and</strong> ma<br />

chine. Safe sex, as the Surgeon General<br />

keeps stressing, is the best way to avoid<br />

AIDS infection. Now there is safe comput<br />

ted, <strong>and</strong> then avoid potentially dangerous<br />

software. This doesn't mean never again<br />

download a public domain program; it does<br />

mean, however, be careful about using such<br />

software indiscrimin<strong>at</strong>ely. Run an unknown<br />

program on a disk you can lose. Don't in<br />

stall unknown programs on your hard disk<br />

until they've gone through a shaking-out pe<br />

riod on a floppy.<br />

Finally, underst<strong>and</strong> th<strong>at</strong> computer vi<br />

ruses are just th<strong>at</strong>—viruses in a computer. If<br />

a program is lost because of a virus, it's not<br />

the end of the world {or the end of anyone's<br />

life). Keep some perspective.<br />

<strong>You</strong>'ll be hearing about computer vi<br />

ruses for some time. They won't go away<br />

immedi<strong>at</strong>ely. But the next time you read<br />

about one, or run across one yourself, re<br />

member th<strong>at</strong> they're not the end of comput<br />

ing as we know it. Take some commonsense<br />

precautions, th<strong>at</strong>'s all, <strong>and</strong> you'll be<br />

ing, a term recently used by Cynthia Macon, safe. A safe computer user. H<br />

COMPUTE!

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!