26.11.2012 Views

Protect your PC from spam, spyware and viruses - USD 322

Protect your PC from spam, spyware and viruses - USD 322

Protect your PC from spam, spyware and viruses - USD 322

SHOW MORE
SHOW LESS

Transform your PDFs into Flipbooks and boost your revenue!

Leverage SEO-optimized Flipbooks, powerful backlinks, and multimedia content to professionally showcase your products and significantly increase your reach.

<strong>Protect</strong> <strong>your</strong> <strong>PC</strong> <strong>from</strong> <strong>spam</strong>, <strong>spyware</strong> <strong>and</strong> <strong>viruses</strong><br />

The computer security umbrella covers everything <strong>from</strong> <strong>spam</strong> to <strong>viruses</strong>. You know you need to protect<br />

<strong>your</strong>self, but you may not be sure how. This class for the average computer user will help you<br />

underst<strong>and</strong> which threats you need to protect <strong>your</strong> computer against—namely, <strong>spam</strong>, <strong>spyware</strong> <strong>and</strong><br />

<strong>viruses</strong>—<strong>and</strong> how they work against you. Also learn which tools to use to keep them off <strong>your</strong> computer<br />

for good.<br />

Lessons<br />

1. An overview of <strong>spam</strong>, <strong>spyware</strong> <strong>and</strong> <strong>viruses</strong><br />

Spam, <strong>spyware</strong> <strong>and</strong> <strong>viruses</strong> are real problems for everyone. Some threats can<br />

lead to identity theft; others can crash <strong>your</strong> computer or delete <strong>your</strong> files. This<br />

lesson explores these threats in a practical <strong>and</strong> easy-to-underst<strong>and</strong> manner.<br />

2. <strong>Protect</strong> <strong>your</strong>self with <strong>spam</strong> blockers <strong>and</strong> <strong>spyware</strong> removers<br />

With <strong>spam</strong> clogging <strong>your</strong> email inbox <strong>and</strong> <strong>spyware</strong> watching <strong>your</strong> every mouse<br />

click to send information about you to untrustworthy parties, it's time to take<br />

back control. This lesson shows you how to block <strong>spam</strong> <strong>and</strong> rid <strong>your</strong> <strong>PC</strong> of<br />

<strong>spyware</strong>.<br />

3. Virus protection basics<br />

Without antivirus software installed, you're open to attack <strong>from</strong> a host of threats<br />

that can crash <strong>your</strong> computer in a heartbeat. This lesson will show you how to<br />

protect <strong>your</strong> computer <strong>from</strong> <strong>viruses</strong> <strong>and</strong> keep the software up to date.<br />

An overview of <strong>spam</strong>, <strong>spyware</strong> <strong>and</strong> <strong>viruses</strong><br />

Spam, <strong>spyware</strong> <strong>and</strong> <strong>viruses</strong> are real problems for everyone. Some threats can lead to identity theft; others can<br />

crash <strong>your</strong> computer or delete <strong>your</strong> files. This lesson explores these threats in a practical <strong>and</strong> easy-tounderst<strong>and</strong><br />

manner.<br />

Welcome to <strong>Protect</strong> <strong>your</strong> <strong>PC</strong> <strong>from</strong> <strong>spam</strong>, <strong>spyware</strong> <strong>and</strong> <strong>viruses</strong><br />

Welcome to <strong>Protect</strong> <strong>your</strong> <strong>PC</strong> <strong>from</strong> <strong>spam</strong>, <strong>spyware</strong>, <strong>and</strong> <strong>viruses</strong>. Security is a<br />

big umbrella that covers everything <strong>from</strong> access controls to zero-day exploits.<br />

An important subset of security -- probably the most important for home <strong>and</strong><br />

home office users -- is protecting against malicious software or malware. This<br />

includes <strong>viruses</strong>, worms, Trojans, adware, <strong>and</strong> even <strong>spyware</strong> that tries to<br />

monitor <strong>your</strong> every keystroke. This three-lesson course will help you<br />

underst<strong>and</strong> exactly which malware threats you need to protect <strong>your</strong> computer<br />

<strong>from</strong> <strong>and</strong> what it takes to do it. You'll also get step-by-step instructions for<br />

securing <strong>your</strong> computer to eliminate <strong>spam</strong>, <strong>spyware</strong>, <strong>and</strong> <strong>viruses</strong> <strong>and</strong> keeping<br />

<strong>your</strong> <strong>PC</strong> <strong>and</strong> software up to date.<br />

This course is geared toward individuals who want to protect their personal<br />

computers <strong>from</strong> <strong>spam</strong>, <strong>spyware</strong>, <strong>and</strong> <strong>viruses</strong>.<br />

Here's what to expect in the lessons:<br />

Lesson 1: An overview of <strong>spam</strong>, <strong>spyware</strong>, <strong>and</strong> <strong>viruses</strong> explores general<br />

security threats, <strong>and</strong> then focuses on <strong>spam</strong>, <strong>spyware</strong>, <strong>and</strong> <strong>viruses</strong>.<br />

Lesson 2: <strong>Protect</strong> <strong>your</strong>self with <strong>spam</strong> blockers <strong>and</strong> <strong>spyware</strong> removers shows<br />

you how to use anti<strong>spam</strong> <strong>and</strong> anti<strong>spyware</strong> tools, configure Windows<br />

Firewall, <strong>and</strong> gives you a plethora of tips on safe computing practices.<br />

Lesson 3: Virus protection basics walks you through the basics of antivirus<br />

software. You'll learn how to install <strong>and</strong> update antivirus software, perform a<br />

full system scan, <strong>and</strong> keep <strong>your</strong> system in good health.<br />

» Laptop <strong>and</strong> tablet <strong>PC</strong>s


In addition to the lessons, be sure to complete the assignments <strong>and</strong> quizzes.<br />

When you're finished with those, visit the Message Board. It's the perfect place<br />

to discuss course topics <strong>and</strong> swap questions <strong>and</strong> comments with other<br />

students <strong>and</strong> <strong>your</strong> instructor.<br />

Take a few moments to meet <strong>your</strong> instructor <strong>and</strong> fellow students on the<br />

Message Board -- <strong>your</strong> virtual classroom -- <strong>and</strong> let them know a little about<br />

you.<br />

Now that you know the general layout of the course, let's get started with the<br />

topics in Lesson 1.<br />

Underst<strong>and</strong>ing security threats<br />

How often have you had issues with <strong>your</strong> computer <strong>and</strong> called tech support,<br />

only to be told you have a virus or that <strong>spyware</strong> has been installed on <strong>your</strong><br />

computer? Even people who are careful sometimes end up with malicious<br />

software on their computers. This is due, in part, to the nature of how a<br />

computer communicates.<br />

There are 65,535 available ports, or points of entry, that can be accessed on a<br />

computer <strong>and</strong> many of them have to be open by default to perform normal<br />

Internet communications, such as Web surfing, sending e-mail, <strong>and</strong> using<br />

various programs. Hackers can exploit this to send self-installing malware to<br />

<strong>your</strong> computer through an open port. In addition, unscrupulous people called<br />

"social engineers" <strong>and</strong> "phishers" use various methods to extract information,<br />

such as passwords or personal information, <strong>from</strong> unaware users.<br />

The bulk of this lesson covers malware -- a general term for <strong>spam</strong>, <strong>spyware</strong>,<br />

<strong>viruses</strong>, <strong>and</strong> other malicious software. However, this first section covers some<br />

of the other, less-obvious security threats you might face while using today's<br />

Internet-connected technology devices, such as notebook <strong>and</strong> desktop<br />

computers, PDAs (personal digital assistants) <strong>and</strong> smartphones.<br />

Social engineering<br />

Social engineering -- also called pretexting -- plays on human behavior <strong>and</strong><br />

how people interact with one another. It involves getting information under<br />

false pretenses. Here are some examples of social engineering scams:<br />

The scammer visits <strong>your</strong> office <strong>and</strong> claims to be <strong>from</strong> the IT department. He<br />

says he needs to fix <strong>your</strong> computer, <strong>and</strong> asks for <strong>your</strong> account name <strong>and</strong><br />

password so he can log onto <strong>your</strong> account.<br />

The scammer plays on <strong>your</strong> sympathy, pretending to be a new employee<br />

who has forgotten the code to get into the secure part of the building, <strong>and</strong><br />

says he'll get fired unless you help him out by sharing the code.<br />

The scammer calls, pretending to be one of the "big bosses" in the<br />

company, <strong>and</strong> tries to intimidate you into giving information.<br />

To protect <strong>your</strong>self, never feel that you have to give out sensitive information to<br />

someone you don't know. If someone asks you for these types of information,<br />

there are several pieces of information that you should be gathering instead:<br />

Ask for the correct spelling of the person's name.<br />

Ask for her employee number.<br />

Ask him to tell you <strong>your</strong> account number.<br />

Ask her which transactions have been processed <strong>and</strong> you'll either verify or<br />

deny the transaction.<br />

Who does the person claim he or she is representing?<br />

If the caller is not legitimate, asking these questions will usually let you know.<br />

» Desktop & all-in-one <strong>PC</strong>s


Remember that social engineering plays on human behavior <strong>and</strong> willingness to<br />

help <strong>and</strong> trust others. To protect <strong>your</strong> confidential information, you must not be<br />

so willing <strong>and</strong> trusting.<br />

Phishing<br />

When this type of information gathering is done via e-mail, it's called phishing,<br />

because basically the person is fishing for information.<br />

Here's how it works: You receive an e-mail that appears to be <strong>from</strong> <strong>your</strong> bank<br />

stating that the bank is having some trouble processing some automatic<br />

payments. The e-mail explains that to clear up the problem, you need to click<br />

the provided link <strong>and</strong> log in to the Web site using <strong>your</strong> user name <strong>and</strong><br />

password. If you do, you're directed to a fake Web site where <strong>your</strong> information<br />

is captured.<br />

You can often spot these scams by hovering <strong>your</strong> mouse pointer over the<br />

URL (uniform resource locator) in the e-mail message. Usually, the link that<br />

appears in a pop-up tooltip is different <strong>from</strong> the diplayed link. For example,<br />

the displayed link shows www.xyzbank.com; however, when you hover<br />

<strong>your</strong> mouse pointer over it, something similar to www.badguy.ru/xyzbank<br />

appears in a tooltip. Many of these sites are on foreign servers, as<br />

indicated by .ru (for Russia) as the top level domain.<br />

The fake Web site, which looks exactly like <strong>your</strong> bank's real Web site, has<br />

been set up for the sole purpose of stealing personal information.<br />

Unsuspecting people are often fooled into entering credit card numbers, bank<br />

account numbers, passwords, <strong>and</strong> other details. Approximately 5 percent of email<br />

recipients respond to phishing messages, but that's enough to make it<br />

worthwhile for the phishers because they may be able to clean out those<br />

people's bank accounts or run up credit card bills for thous<strong>and</strong>s of dollars.<br />

You should never respond to an e-mail asking you to verify any kind of<br />

personal information. Reputable companies don't ask their customers for<br />

passwords or account details in an e-mail or phone call. Even if you think<br />

the e-mail or phone call may be legitimate, don't respond. Instead, contact<br />

the company by phone or by visiting their Web site directly. (The one you<br />

have bookmarked; not the one sent to you via e-mail.)<br />

Identity theft<br />

Identity theft occurs when someone gains access to some or all of <strong>your</strong><br />

personal information -- name, address, Social Security number, driver's license<br />

number, birth date, <strong>and</strong> bank or credit card account numbers -- <strong>and</strong> uses them<br />

without <strong>your</strong> permission. A thief can clean out <strong>your</strong> account, or run up a<br />

balance, within hours without you being aware of it until well after the crime's<br />

been committed.<br />

Identity theft is a serious crime that's punishable by law in most states.<br />

However, it's up to you to minimize the threat of identity theft by keeping <strong>your</strong><br />

confidential information private. If you believe you're a victim of identity theft,<br />

contact <strong>your</strong> bank or credit card company <strong>and</strong> local law enforcement office<br />

immediately to report the crime. You can also get further assistance <strong>from</strong> <strong>your</strong><br />

state's identity theft Web site. Just go online <strong>and</strong> search for identity theft <strong>your</strong><br />

state to find the appropriate Web site <strong>and</strong> phone numbers.<br />

Identity theft can also occur when a thief steals a device that contains personal<br />

information. Notebook computers are easily stolen or lost, along with whatever


data is stored on them. You can -- <strong>and</strong> should -- use file encryption to protect<br />

sensitive data stored on a notebook computer. New technologies, such as the<br />

BitLocker feature in some editions of Windows Vista, can encrypt the entire<br />

drive. You can also buy software that causes <strong>your</strong> stolen notebook to "phone<br />

home" if the thief gets on the Internet without entering the correct passwords.<br />

Today, in addition to a cell phone, many people carry a PDA or full fledged<br />

h<strong>and</strong>held computer. A personal organizer often contains a large amount of<br />

important personal information -- <strong>and</strong> not only <strong>your</strong> own, but also that of other<br />

people in <strong>your</strong> address book.<br />

Minimally, you should require a password to even access the h<strong>and</strong>held device<br />

or PDA. Every device is different, so be sure to read <strong>your</strong> owner's manual to<br />

find out how to password protect <strong>your</strong>s. For better security, some devices now<br />

come with biometric security, so you must swipe <strong>your</strong> fingerprint to start the<br />

device.<br />

Although social engineering, identity theft, <strong>and</strong> theft of portable devices are big<br />

problems, the most common <strong>and</strong> most publicized security threat to any<br />

computer is malicious software, or malware, which includes <strong>viruses</strong>, worms,<br />

Trojan horses, adware <strong>and</strong> <strong>spyware</strong>. These are covered in the next section.<br />

The <strong>spam</strong> that clogs <strong>your</strong> inbox<br />

Just like junk mail clogs <strong>your</strong> regular mailbox, <strong>spam</strong> clogs <strong>your</strong> e-mail inbox.<br />

Spam is a term that refers to the sending of unsolicited commercial e-mail.<br />

Most <strong>spam</strong> is commercial advertising, often for products such as get-rich-quick<br />

schemes, physical enhancements, adult Web sites, <strong>and</strong> cheap medications.<br />

Spam costs the sender very little to send because the actual costs are paid for<br />

by the carriers rather than by the sender.<br />

E-mail <strong>spam</strong> targets individual users with direct e-mail messages. Spammers<br />

create their e-mail lists by scanning newsgroup postings, stealing Internet<br />

mailing lists, or searching Web sites for e-mail addresses. Spammers use<br />

automated tools to subscribe to as many mailing lists as possible so they can<br />

capture the lists of addresses, or use the mailing list as a direct target for their<br />

attacks.<br />

You'll learn more about <strong>spam</strong> <strong>and</strong> how to keep it off <strong>your</strong> system when you get<br />

to Lesson 2. First, read on to get an overview of <strong>spyware</strong>.<br />

Spyware that invades <strong>your</strong> privacy<br />

Spyware is computer software that collects personal information about a<br />

computer user without the user's informed consent. Spyware is often installed<br />

through "drive-by downloads" <strong>from</strong> malicious Web pages running code or along<br />

with another legitimate program you intended to install.<br />

Spyware may also be advertising-supported software, called adware. Adware<br />

enables advertisers to make money <strong>from</strong> a product without directly selling it to<br />

the users. The companies also install additional tracking software on <strong>your</strong><br />

computer, which continuously keeps in contact with the company over <strong>your</strong><br />

Internet connection. It reports data to the company, such as <strong>your</strong> surfing habits<br />

<strong>and</strong> which Web sites you've visited.<br />

Although adware companies state there will be no sensitive or identifying<br />

data collected <strong>from</strong> <strong>your</strong> computer, the fact remains that you have software<br />

on <strong>your</strong> <strong>PC</strong> that's sending information about you <strong>and</strong> <strong>your</strong> surfing habits to<br />

» <strong>PC</strong> Learning center<br />

» <strong>PC</strong> Accessories features<br />

guide


a remote location.<br />

Adware is not an illegal type of software; however, there are certain privacy<br />

issues involved. Legitimate adware companies disclose the nature of data<br />

that's collected <strong>and</strong> transmitted, but there's almost always no way for the user<br />

to actually control which data is being sent. Plus, this technology is capable of<br />

sending more than just banner statistics.<br />

Another type of <strong>spyware</strong> is surveillance software that's designed to collect<br />

much more than just information about what Web sites you visit. Keystroke<br />

loggers, screen capture programs, chat loggers, <strong>and</strong> similar programs can<br />

enable someone else to see every character you've typed or what has<br />

appeared on <strong>your</strong> monitor. This type of <strong>spyware</strong> is used for genuine spying<br />

purposes -- by suspicious spouses, worried parents, private detectives, <strong>and</strong><br />

even government agencies (with a warrant). Although these tools are perfectly<br />

legal in most instances, if they're abused, they can violate <strong>your</strong> privacy. So<br />

what can you do about <strong>spyware</strong>?<br />

How do I know if my computer has <strong>spyware</strong> installed?<br />

Here are some indications <strong>your</strong> computer may contain <strong>spyware</strong>:<br />

The computer is slower than it used to be, especially when browsing the<br />

Internet.<br />

It takes a long time for the Microsoft Windows desktop to come up.<br />

Clicking a link does nothing or goes to a different Web site than expected.<br />

Your browser home page changes <strong>and</strong> you may not be able to reset it.<br />

Web pages are automatically added to <strong>your</strong> Favorites list.<br />

Now that you're well acquainted with the <strong>spyware</strong> <strong>your</strong> computer faces, take a<br />

look at <strong>viruses</strong>, Trojan horses, <strong>and</strong> worms.<br />

Inside <strong>viruses</strong>, Trojan horses, worms <strong>and</strong> other malware<br />

Now that you've learned a bit about social engineering, phishing, <strong>and</strong> how to<br />

watch out for theft, this section covers the malware that causes us so many<br />

headaches. In this section, you'll learn about <strong>viruses</strong>, worms, <strong>and</strong> other types<br />

of malicious software that can infect <strong>your</strong> system <strong>and</strong> affect <strong>your</strong> computing<br />

experience.<br />

Viruses<br />

One of the earliest known forms of malicious code is the computer virus. The<br />

name virus comes <strong>from</strong> the behavior of the code <strong>and</strong> its similarities to<br />

biological <strong>viruses</strong> in the way it reproduces itself <strong>and</strong> spreads to new hosts. A<br />

virus is a program or piece of code that's loaded on to <strong>your</strong> computer without<br />

<strong>your</strong> knowledge. It's designed to attach itself to other code <strong>and</strong> replicate when<br />

an infected file is executed or launched. At this point, it attaches to other files,<br />

adding its code to the application's code <strong>and</strong> continues to spread.<br />

Types of <strong>viruses</strong> that exist include:<br />

Boot sector: Places a virus into the first section of the hard disk, so when the<br />

computer boots up, the virus loads into memory. The boot sector is also<br />

called the master boot record or master boot sector.<br />

Program virus: Infects executable program files, such as .exe, .com, .sys,<br />

<strong>and</strong> so on.<br />

Multipartite: Is a hybrid virus that uses multiple techniques; for example,<br />

combination boot <strong>and</strong> program virus.<br />

Polymorphic: Has the ability to change form each time it's executed; hackers<br />

developed it to avoid antivirus software detection.<br />

» Storage feature guide


Macro: Is inserted into a Microsoft Office document <strong>and</strong> e-mailed to<br />

unsuspecting users.<br />

A virus doesn't execute by itself -- it has to be triggered by some type of action,<br />

such as clicking a link or opening a file. However, since 2000, the majority of<br />

<strong>viruses</strong> released are actually worms, which do replicate without user action.<br />

Virus protection basics are covered in Lesson 3.<br />

A virus hoax uses system resources <strong>and</strong> consumes users' time. Virus hoaxes<br />

are false reports about non-existent <strong>viruses</strong>, usually sent as e-mail. Some<br />

hoaxes are more dangerous; they advise you to delete files on <strong>your</strong> computer<br />

to "clean out the virus," but these are actually important system files that the<br />

computer needs to run. You should always check the validity of these types of<br />

e-mails before you take action, or worse, forward the e-mail, which just helps<br />

propagate the hoax.<br />

The following companies <strong>and</strong> organizations list virus hoaxes on their Web sites<br />

<strong>and</strong> steps to protect you against them:<br />

Symantec<br />

McAfee Security<br />

Sophos<br />

Urban Legends Reference Pages at Snopes.com<br />

There have been a number of <strong>viruses</strong> distributed through e-mails purporting to<br />

be <strong>from</strong> Microsoft or other vendors. As a general rule, Microsoft <strong>and</strong> other<br />

reputable vendors don't distribute antivirus software updates or patches via email.<br />

(They do, however, send alerts <strong>and</strong> update notifications via e-mail, if you<br />

sign up for them at their Web sites.) If there's any doubt as to whether<br />

something is real, check the Web site of the company in question by opening<br />

<strong>your</strong> Web browser <strong>and</strong> entering the company's URL directly or use <strong>your</strong><br />

bookmarked address. Never click a link or open an attachment in a<br />

questionable e-mail.<br />

Trojan horses<br />

A Trojan horse appears to be useful software, such as a screen saver, utility, or<br />

game but there's code hidden inside that attacks <strong>your</strong> computer directly or<br />

enables the system to be compromised by the originator of the code. File<br />

sharing, including music, video, <strong>and</strong> text, is a common transport mechanism.<br />

Trojan horses are often distributed over P2P (peer-to-peer) networks.<br />

Antivirus software is designed to detect Trojan horse software programs;<br />

therefore, the steps to protect a computer <strong>from</strong> Trojan horse programs are the<br />

same as protecting <strong>your</strong> computer <strong>from</strong> virus code, which is discussed in<br />

Lesson 2.<br />

Worms<br />

Worms are similar in function <strong>and</strong> behavior to a general virus or a Trojan horse<br />

with the exception that worms are self-replicating without any user interaction.<br />

A worm is built to take advantage of a security hole in an existing application or<br />

operating system, find other computers running the same software, <strong>and</strong><br />

automatically replicate itself to the new host. After the worm is running on a<br />

computer, it checks for network or Internet connectivity. If a connection exists,<br />

the worm then tries to replicate <strong>from</strong> one system to the next. There are many<br />

variants to each type of worm. Often, they're quite difficult to remove, so<br />

antivirus companies have downloadable tools available to remove them.<br />

Rootkits


A rootkit is a type of malware that hides the tracks of intruders <strong>and</strong> can be<br />

incorporated with other malicious code to take complete control of a system.<br />

Rootkits keep virus scanners <strong>and</strong> other detection software <strong>from</strong> finding them<br />

<strong>and</strong> their related hacker tools. Rootkits generally don't propagate themselves to<br />

systems like <strong>viruses</strong> <strong>and</strong> worms, but worms can install rootkits.<br />

Buffer overflow<br />

A buffer overflow occurs when data is sent to a computer's memory buffer<br />

beyond a fixed length boundary, causing it to overwrite data in adjacent<br />

memory locations. Many times, a buffer overflow is the result of a vulnerability<br />

or program flaw in software.<br />

Criminal hackers take advantage of these known vulnerabilities or flaws by<br />

launching buffer overflow attacks. Buffer overflows are probably the most<br />

common way to cause disruption of service <strong>and</strong> lost data because there's no<br />

way to screen bad requests.<br />

Spoofing<br />

Spoofing refers to a program or person pretending to be another by sending<br />

false information. Spoofing is one of the most common forms of online<br />

concealment. Spoofing makes data appear to come <strong>from</strong> somewhere other<br />

than where it really originated. This is accomplished by modifying the e-mail<br />

address, IP headers or other source of information about the origins of the<br />

data.<br />

Hackers often use this type of attack to get additional information <strong>from</strong><br />

users to carry out a more aggressive plan. Spoofing <strong>and</strong> phishing often go<br />

h<strong>and</strong> in h<strong>and</strong>.<br />

Botnets <strong>and</strong> their zombies<br />

A bot (short for robot) is a software application that performs automated tasks.<br />

Hackers use bots to carry out automated attacks on networks. A botnet is a<br />

collection of bots that run autonomously. The goal of many computer hackers<br />

is to take over as many systems as possible to help them achieve their goals.<br />

They assemble botnets of individual compromised computers (known as<br />

"zombies") that they control remotely, often by using an IRC (Internet Relay<br />

Chat) or IM (instant messaging) server. In addition to obeying whatever<br />

comm<strong>and</strong>s the hacker issues, the zombies also prowl the Internet looking for<br />

additional hosts to infect. After many computers have been infected, the<br />

person controlling the malware uses this covert network of computers -including<br />

<strong>your</strong>s -- as zombies to launch DDoS (distributed denial of service)<br />

attacks against Internet servers. A DDoS attack can quickly shut down a<br />

server.<br />

Moving on<br />

In this lesson, you explored some fundamental security threats, learned about<br />

<strong>viruses</strong>, worms, <strong>and</strong> other malware, <strong>and</strong> also examined the problems of <strong>spam</strong><br />

<strong>and</strong> <strong>spyware</strong>. The remainder of this course discusses protection methods<br />

against all kinds of threats. First, in Lesson 2, you'll learn how to rid <strong>your</strong><br />

computer of <strong>spam</strong> <strong>and</strong> <strong>spyware</strong>. Before you move on, do the assignment <strong>and</strong><br />

take the quiz for this lesson. In addition, be sure to visit the Message Board to<br />

find out what <strong>your</strong> instructor <strong>and</strong> fellow students are up to.


Assignment #1<br />

For this assignment:<br />

1. Locate <strong>and</strong> visit <strong>your</strong> state's identity theft Web site. Go online <strong>and</strong> search for identity theft<br />

<strong>your</strong> state to find the appropriate Web site. Read through the information, <strong>and</strong> then print a<br />

copy of important phone numbers <strong>and</strong> resources, just in case you need them in the future.<br />

2. Using a Web search engine, locate <strong>and</strong> read at least two sources of information on<br />

keystroke loggers.<br />

3. Visit the following Web site, search for hoax in the main Search text box, <strong>and</strong> then browse<br />

the information on virus hoaxes:<br />

Symantec<br />

McAfee Security<br />

Sophos<br />

Urban Legends Reference Pages at Snopes.com<br />

Share any questions or interesting tidbits on the Message Board.<br />

Quiz #1<br />

Question 1:<br />

What's social engineering?<br />

A) Making data appear to come <strong>from</strong> somewhere other than where it really originated<br />

B) The sending of unsolicited commercial e-mail<br />

C) A method of obtaining sensitive information about a person through exploitation of human nature<br />

D) A type of information gathering done by installing surveillance software on a person's computer<br />

Question 2:<br />

Which of the following are types of <strong>viruses</strong>? (Check all that apply.)<br />

A) Phishing<br />

B) Boot sector<br />

C) Polymorphic<br />

D) Multipartite<br />

Question 3:<br />

Which of the following is a way <strong>spyware</strong> gets installed on <strong>your</strong> computer? (Check all that apply.)<br />

A) "Drive-by downloads" <strong>from</strong> Web pages running ActiveX or Java<br />

B) Sent in text e-mail messages<br />

C) Along with another program you intended to install<br />

D) Social engineering<br />

Question 4:<br />

Which type of virus turns <strong>your</strong> computer into a zombie <strong>and</strong> uses it to attack servers on the Internet?<br />

A) Trojan horse<br />

B) Polymorphic<br />

C) Botnet worm<br />

D) Macro virus<br />

<strong>Protect</strong> <strong>your</strong>self with <strong>spam</strong> blockers <strong>and</strong> <strong>spyware</strong> removers


With <strong>spam</strong> clogging <strong>your</strong> email inbox <strong>and</strong> <strong>spyware</strong> watching <strong>your</strong> every mouse click to send information about<br />

you to untrustworthy parties, it's time to take back control. This lesson shows you how to block <strong>spam</strong> <strong>and</strong> rid<br />

<strong>your</strong> <strong>PC</strong> of <strong>spyware</strong>.<br />

Using tools for blocking <strong>spam</strong><br />

Welcome back. Lesson 1 covered a wide variety of security threats <strong>your</strong><br />

computer faces every day. Now it's time to learn how to prevent <strong>your</strong> computer<br />

<strong>from</strong> being affected by threats in the first place. Let's start with <strong>spam</strong>.<br />

Underst<strong>and</strong>ing anti<strong>spam</strong> tools<br />

The old cat <strong>and</strong> mouse, <strong>spam</strong> sender <strong>and</strong> <strong>spam</strong> blocker, game goes on <strong>and</strong><br />

on. Attempts to legislate <strong>spam</strong> out of existence haven't worked, <strong>and</strong> proposals<br />

to completely rework the Internet's e-mail system proved to be too much to be<br />

workable. Nevertheless, you have many capable tools at <strong>your</strong> disposal that<br />

require neither legislation nor overhauling the Internet to do their jobs.<br />

Server <strong>and</strong> e-mail client tools<br />

There are two places where <strong>spam</strong> gets blocked: at the e-mail server <strong>and</strong> at the<br />

e-mail client on <strong>your</strong> <strong>PC</strong>. To clarify, the software you use to read <strong>and</strong> send email<br />

is called an e-mail client.<br />

In this lesson, client refers to e-mail software <strong>and</strong> user refers to the person who<br />

uses client software.<br />

Obviously, finding the <strong>spam</strong>mer's computers <strong>and</strong> smashing them would stop<br />

<strong>spam</strong> too, but that's not easy or legal. Your e-mail server, run by <strong>your</strong> company<br />

or ISP (internet service provider), provides an excellent spot to block <strong>spam</strong> with<br />

broad strokes. ISPs <strong>and</strong> corporate administrators subscribe to services that list<br />

domains known for <strong>spam</strong>ming so they can block all messages <strong>from</strong> those Web<br />

sites, following the black list approach.<br />

The advantages of filtering <strong>spam</strong> at the server include:<br />

Reduced e-mail traffic to users<br />

Less user time spent h<strong>and</strong>ling <strong>spam</strong><br />

The disadvantage is that one <strong>spam</strong> filter doesn't work for everyone because<br />

people define <strong>spam</strong> differently.<br />

For this reason, you should consider server tools as nothing more than the first<br />

line of <strong>spam</strong> control. When a server tool classifies a message as <strong>spam</strong>, it often<br />

tags the message subject line, perhaps adding ***<strong>spam</strong>*** to each suspect<br />

message. This makes it easy for client software to identify <strong>and</strong> separate out<br />

suspect messages.<br />

E-mail clients are the best place to apply finely tuned <strong>spam</strong> controls,<br />

because each user approaches <strong>spam</strong> in his own way, with his own<br />

tolerance level. Heuristic tools under the user's control, applied to<br />

messages already filtered at the server, provide the best <strong>spam</strong> reduction.<br />

Heuristic <strong>spam</strong> filtering<br />

The main tool in the <strong>spam</strong>-filter toolbox is heuristic filtering. Special software<br />

reads the contents of each message <strong>and</strong> compares words in that message<br />

» Laptop <strong>and</strong> tablet <strong>PC</strong>s


against words in typical <strong>spam</strong> messages. If many of the same words <strong>from</strong><br />

<strong>spam</strong> message examples also occur in the message being examined, it's<br />

marked as <strong>spam</strong>.<br />

The software doesn't actually read to underst<strong>and</strong>; instead, it makes a list of the<br />

words in the message. Spam filtering software doesn't assign meaning to those<br />

words; it just tracks <strong>and</strong> compares the words used to the words in its<br />

database.<br />

Black lists <strong>and</strong> white lists<br />

Black lists, historically, are lists of people you don't like, don't want to hear<br />

<strong>from</strong>, or want to go away. Such is the reasoning when calling lists of <strong>spam</strong>mers<br />

<strong>and</strong> their system addresses "black lists." You want them to go away, or at least<br />

you want to block all the messages coming <strong>from</strong> them.<br />

Black lists don't work with zombie <strong>PC</strong>s, however. A large amount of <strong>spam</strong><br />

continues to arrive <strong>from</strong> well-known companies or via service providers<br />

who turn a blind eye toward <strong>spam</strong>mers. Some filtering companies, for<br />

example, automatically block all traffic <strong>from</strong> Romania <strong>and</strong> China -- havens<br />

for <strong>spam</strong>mers. These <strong>and</strong> other third-world countries don't outlaw the<br />

practice of <strong>spam</strong> or don't bother to prosecute <strong>spam</strong>mers.<br />

A white list is exactly the opposite, <strong>and</strong> contains people you do want to hear<br />

<strong>from</strong> without any type of filtering. Companies add all their business partners to<br />

white lists at the company server level <strong>and</strong> at each individual user's computer.<br />

Using white lists becomes important when you configure <strong>spam</strong>-filtering tools to<br />

evaluate the contents of messages <strong>and</strong> decide whether or not content is <strong>spam</strong>.<br />

If you want to get jokes <strong>from</strong> <strong>your</strong> friends, put their addresses in <strong>your</strong> white list.<br />

If senders you thought were safe begin to send you <strong>spam</strong>, you can remove<br />

them <strong>from</strong> <strong>your</strong> white list <strong>and</strong> their messages will no longer get through to <strong>your</strong><br />

inbox.<br />

Microsoft Outlook refers to its white list as the Safe Senders List. The black list<br />

is called the Blocked Senders List.<br />

Enabling <strong>spam</strong> filtering in Outlook<br />

To enable <strong>spam</strong> filtering in <strong>your</strong> Outlook 2003 or 2007 client, select Tools ><br />

Options, click the Preferences tab, <strong>and</strong> then click the Junk E-mail button. The<br />

Junk E-mail Options dialog box opens. Select the High setting, as shown in<br />

Figure 2-1, for maximum <strong>spam</strong> filtering.


Figure 2-1: Select the High option for <strong>spam</strong> filtering.<br />

Enlarge image<br />

Outlook automatically places what it thinks is <strong>spam</strong> e-mail in <strong>your</strong> Junk E-mail<br />

folder.<br />

Setting up white <strong>and</strong> black lists in Outlook<br />

To add senders to <strong>your</strong> black list or white list in Outlook, right-click the<br />

message, select Junk E-mail, <strong>and</strong> then select Add Sender to Blocked Senders<br />

List or Add Sender to Safe Senders List, respectively, as shown in Figure 2-2.<br />

Figure 2-2: Junk E-mail lists.<br />

Enlarge image<br />

You can add an individual sender to either list, or you can add the sender's<br />

entire domain (the part of the address after the @ sign) to the Safe Senders<br />

List. You can also add the recipient to <strong>your</strong> Safe Recipients List. This is useful<br />

if you use Outlook to read e-mail <strong>from</strong> several different e-mail addresses.<br />

If you become overzealous in <strong>your</strong> <strong>spam</strong> filtering, you'll lose some non-<strong>spam</strong>


messages. These fall into a group called false positives, which means <strong>your</strong><br />

software identifies a good message as <strong>spam</strong>. Be sure to tell <strong>your</strong> e-mail<br />

software about false positives as well as <strong>spam</strong>. Every bit of information helps<br />

the filters identify <strong>spam</strong> more accurately <strong>and</strong> avoid false positives.<br />

To correct a false positive in Outlook, right-click the e-mail message in the Junk<br />

E-mail folder, <strong>and</strong> then select Junk E-mail > Mark as Not Junk <strong>from</strong> the<br />

shortcut menu.<br />

You should check <strong>your</strong> <strong>spam</strong> filter folders periodically, at least once per day, to<br />

be sure you aren't missing any real messages. In addition, make sure you<br />

browse subject lines before deleting messages to make sure you don't delete a<br />

good message by mistake.<br />

Using safe e-mail practices to reduce <strong>spam</strong><br />

Other general safety tips for e-mail clients include:<br />

Delete unsolicited e-mail messages if you don't know the sender. Don't open<br />

attachments, because some <strong>spam</strong> messages also contain documents with<br />

<strong>viruses</strong>.<br />

Don't use the preview function of <strong>your</strong> e-mail software. It may automatically<br />

show that you read the message <strong>and</strong> that you have a valid e-mail address.<br />

Use the bcc (blind carbon copy) feature when sending e-mail messages to<br />

multiple people to hide their e-mail addresses. This prevents people <strong>from</strong><br />

seeing the other e-mail addresses <strong>and</strong> collecting them for <strong>spam</strong> purposes.<br />

Now that you've learned some basic ways to reduce <strong>spam</strong>, read on to learn<br />

what to do about <strong>spyware</strong>.<br />

Using anti<strong>spyware</strong> software<br />

Bad news: No one program can catch <strong>and</strong> eliminate all the <strong>spyware</strong> on one<br />

computer. You need a combination of tools -- some for screening <strong>and</strong> cleaning<br />

<strong>and</strong> some for active monitoring to keep <strong>your</strong> computer <strong>spyware</strong>-free.<br />

Many users looking for help turn to Microsoft. The company has a software<br />

package called Windows Defender, shown in Figure 2-3, that comes with<br />

Windows Vista or is available as a free download <strong>from</strong> the Microsoft Web site<br />

for previous Windows versions. Windows Defender rids <strong>your</strong> computer of<br />

<strong>spyware</strong> already installed <strong>and</strong> helps keep it free <strong>from</strong> <strong>spyware</strong> thereafter.<br />

Figure 2-3: Windows Defender comes with Windows Vista.<br />

Enlarge image<br />

You can access Windows Defender <strong>from</strong> the Vista Control Panel, or through<br />

Start > All Programs in Windows Vista or Windows XP. It's free, it works, <strong>and</strong> it<br />

h<strong>and</strong>les automatic updates.<br />

» HP TouchSmart desktop<br />

<strong>PC</strong>s


Other good anti<strong>spyware</strong> software packages include Lavasoft Ad-Aware, Spybot<br />

- S&D (Search & Destroy), <strong>and</strong> Webroot Spy Sweeper. You can find these <strong>and</strong><br />

many more <strong>spyware</strong> applications on Download.com. Most offer free 30-day<br />

trials so you can test drive them before you commit to buying anything. Ad-<br />

Aware <strong>and</strong> Spybot-S&D are available as freeware, which makes them<br />

particularly attractive to security-conscious <strong>PC</strong> users on tight budgets.<br />

Run some type of <strong>spyware</strong> removal software on a regular schedule -- once a<br />

day for maximum protection. Scanning once or twice each week works well for<br />

many people <strong>and</strong> offers a good balance between constantly cleaning <strong>your</strong><br />

computer <strong>and</strong> leaving a <strong>spyware</strong> gate open too long on <strong>your</strong> system.<br />

Most software packages enable you to set up automated scans on a regular<br />

schedule, as shown in Figure 2-4. In this way, you can configure the scan to<br />

run at a time when you aren't likely to be working on <strong>your</strong> computer. In addition,<br />

scheduling ensures the software runs regularly <strong>and</strong> not just when you happen<br />

to remember it.<br />

Figure 2-4: Scheduling Windows Defender to run every day or once a week.<br />

Enlarge image<br />

Some of the tools used to protect <strong>your</strong> system against <strong>spyware</strong> also work<br />

against <strong>viruses</strong>, which you'll learn about in Lesson 3.<br />

A firewall watches outgoing traffic <strong>and</strong> can help identify <strong>spyware</strong>, because it<br />

tracks applications that transmit <strong>your</strong> personal information out over the Internet<br />

to any third parties. You'll learn about firewalls next.<br />

Using a firewall<br />

Always-connected computers, typical with cable <strong>and</strong> DSL (digital subscriber<br />

line) modems, give attackers copious amounts of time to discover <strong>and</strong> exploit<br />

computer vulnerabilities. A firewall is a component placed on computers or<br />

between a computer <strong>and</strong> the Internet to help eliminate undesired access by the<br />

outside world. Hardware firewalls are dedicated appliances that run only<br />

firewall software. Software firewalls install on a regular operating system, such<br />

as Windows, along with other applications.<br />

» <strong>PC</strong> Learning center


Types of firewalls<br />

Firewalls come in two varieties: network firewalls <strong>and</strong> host-based or "personal"<br />

firewalls. Like most other solutions, each has its strengths <strong>and</strong> weaknesses.<br />

Personal firewalls<br />

You install personal firewalls on individual <strong>PC</strong>s. Typically, the first time a<br />

program tries to access the Internet, a personal firewall asks whether it should<br />

allow the communication. Here's a list of the most commonly used personal<br />

firewalls (those marked with an asterisk come in freeware editions):<br />

Windows Firewall*<br />

Sunbelt/Kerio Personal Firewall*<br />

Comodo Personal Firewall*<br />

McAfee Internet Security Suite<br />

Norton Internet Security<br />

Zone Labs ZoneAlarm*<br />

Network firewalls<br />

Network firewalls provide an additional outer layer of defense that can more<br />

effectively hide connected <strong>PC</strong>s. Inexpensive routers move traffic between the<br />

Internet <strong>and</strong> computers on home networks, which hide the IP addresses of<br />

computers so that all outgoing traffic seems to come <strong>from</strong> the same address.<br />

Network firewalls can be hardware or software based. They are installed at the<br />

network edge or perimeter, directly between the Internet <strong>and</strong> <strong>your</strong> LAN (local<br />

area network).<br />

Even a good firewall can't protect <strong>your</strong> computer <strong>and</strong> <strong>your</strong> personal information<br />

if you don't think before you download. A firewall is only one part of a<br />

comprehensive security strategy. Always exercise a proper level of caution. No<br />

system is foolproof, but the right combination of hardware, software, <strong>and</strong> good<br />

habits will make <strong>your</strong> computing environment safer.<br />

Using Windows Firewall<br />

Microsoft Windows Vista <strong>and</strong> Windows XP Service Pack 2 come with a built-in<br />

firewall called Windows Firewall. Be sure it's enabled if you aren't running a<br />

third-party firewall package.<br />

To enable Windows Firewall, select:<br />

Start > Control Panel > Security > Security Center (in Windows Vista,<br />

Category view)<br />

Start > Control Panel > Security (in Windows XP, Category view)<br />

In Security Center, if the Firewall setting indicates OFF, click Windows Firewall<br />

at the bottom or the right side of the window. (In Windows Vista, click Change<br />

settings.) In the Windows Firewall Settings dialog box, select On<br />

(recommended), <strong>and</strong> then click OK. Figure 2-5 shows Windows Firewall<br />

enabled.


Figure 2-5: Windows Vista Windows Firewall Settings dialog box.<br />

The tools described in this lesson should get you well on <strong>your</strong> way to protecting<br />

<strong>your</strong> computer <strong>from</strong> the various threats on the Internet today. Try them out <strong>and</strong><br />

see which ones work best for you. Next, learn how to reduce <strong>spam</strong> by working<br />

with an ISP.<br />

Working with an ISP to reduce <strong>spam</strong> <strong>and</strong> <strong>spyware</strong><br />

Your ISP doesn't want to send you <strong>spam</strong> -- it costs them b<strong>and</strong>width. ISPs love<br />

to help reduce <strong>your</strong> <strong>spam</strong> load.<br />

The most popular <strong>spam</strong> filtering application for ISPs <strong>and</strong> many companies is<br />

called SpamAssassin. This open source software can be difficult to configure<br />

on servers, but its programmers have improved the general user interface to<br />

make it close-to-acceptable for any computer user.<br />

Black holes <strong>and</strong> <strong>spam</strong> lists<br />

Verify <strong>your</strong> ISP includes some top-level broadcasting controls, such as<br />

SpamAssassin, <strong>and</strong> the various black lists. Some service providers force you to<br />

actively request such service to maintain their server status.<br />

Also ask <strong>your</strong> ISP about dictionary attack protections <strong>and</strong> how it monitors such<br />

attacks. Smart intrusion detection software can chart the source of e-mail<br />

streams, <strong>and</strong> you can search back up the river when necessary. You might not<br />

be able to locate the <strong>spam</strong>mer or the country of origin, but sometimes you get<br />

lucky.<br />

First-pass <strong>spam</strong> filtering<br />

Setting specific <strong>spam</strong> filtering levels -- such as Low, Medium, or High protection<br />

-- on a user's e-mail account should be left to each company or individual, not<br />

the ISP's administrators. Server-based filtering software has rather crude<br />

setting options that enable you to tighten or loosen the restrictions, depending<br />

on how many "real" messages are being tagged as <strong>spam</strong>.<br />

» <strong>PC</strong> Accessories features<br />

guide


Enable virus filtering<br />

Many server-based <strong>spam</strong> products include virus <strong>and</strong> <strong>spyware</strong> filtering. Check<br />

with <strong>your</strong> ISP, <strong>and</strong> if it's available, try it. The more electronic eyes you have<br />

watching the messages, Web pages, <strong>and</strong> files coming into <strong>your</strong> computer, the<br />

better.<br />

Your ISP can be a valuable ally when it comes to protecting <strong>your</strong> inbox <strong>from</strong><br />

<strong>spam</strong>, but there's even more you can do. Read on to learn about some of the<br />

ways you can avoid becoming a <strong>spam</strong> <strong>and</strong> <strong>spyware</strong> target.<br />

Going beyond <strong>spam</strong> <strong>and</strong> <strong>spyware</strong> tools<br />

Besides using anti<strong>spam</strong> <strong>and</strong> anti<strong>spyware</strong> tools, there are other things you can<br />

do to help stop <strong>spam</strong> <strong>and</strong> <strong>spyware</strong>. The following methods give you tips for<br />

changing <strong>your</strong> computing habits <strong>and</strong> making <strong>your</strong> computing environment even<br />

safer.<br />

Use an alternate e-mail address<br />

As an individual, the e-mail address provided by <strong>your</strong> ISP is <strong>your</strong> primary<br />

address. Guard this address by giving it out carefully, <strong>and</strong> keep it hidden when<br />

possible. Many users get a second or third e-mail address to use on<br />

newsgroups, discussion boards, <strong>and</strong> other places where address harvesting<br />

software patrols.<br />

All of the free e-mail services, such as Yahoo! Mail, Hotmail, <strong>and</strong> Gmail, offer<br />

Web-based e-mail software, so you can check <strong>your</strong> e-mail without downloading<br />

the messages <strong>and</strong> possibly getting <strong>spyware</strong> or <strong>viruses</strong>. You can delete <strong>your</strong><br />

Web e-mail account when it becomes overloaded with <strong>spam</strong>.<br />

Avoid using HTML in <strong>your</strong> e-mail client<br />

Set <strong>your</strong> e-mail program not to open or preview e-mail in HTML (Hypertext<br />

Markup Language) format. HTML messages can contain Web beacons, tiny<br />

invisible images that are downloaded <strong>from</strong> the <strong>spam</strong>mer's server when you<br />

view the message, thus letting the <strong>spam</strong>mer know that you opened it <strong>and</strong> that<br />

<strong>your</strong> address is valid.<br />

To prevent Outlook <strong>from</strong> automatically previewing e-mail, go to the Inbox <strong>and</strong><br />

do the following:<br />

Outlook 2007: Select View > Current View > Messages.<br />

Outlook 2003: Select View > Arrange By > Current View > Messages.<br />

To read all e-mail in plain text only:<br />

Outlook 2007: Select Tools > Trust Center, <strong>and</strong> then click E-mail Security in<br />

the left pane. Check the Read all st<strong>and</strong>ard mail in plain text <strong>and</strong> Read all<br />

digitally signed mail in plain text checkboxes, <strong>and</strong> then click OK.<br />

Outlook 2003: Select Tools > Options, click the Preferences tab if it's not<br />

already selected, <strong>and</strong> then click E-mail Options. Check the Read all<br />

st<strong>and</strong>ard mail in plain text <strong>and</strong> Read all digitally signed mail in plain text<br />

checkboxes, <strong>and</strong> then click OK.<br />

If you can't live without fancy fonts in <strong>your</strong> e-mail, at least turn off the automatic<br />

image downloading, because images can also link back to a third party. Here's<br />

how:<br />

» Storage feature guide


Outlook 2007: Select Tools > Trust Center, <strong>and</strong> then click Automatic<br />

Download. Ensure the Don't download pictures automatically in HTML e-mail<br />

messages or RSS items checkbox is checked, <strong>and</strong> then click OK.<br />

Outlook 2003: Select Tools > Options, <strong>and</strong> then click the Security tab. Under<br />

Download Pictures, click Change Automatic Download Settings. Check the<br />

Don't download pictures or other content automatically in HTML e-mail<br />

checkbox. Click OK.<br />

Say no to e-mail offers<br />

Always check the "No" box for future e-mail offers on every form you fill out<br />

online, unless you specifically want a company's newsletter or other materials.<br />

Don't click links in e-mails<br />

Don't click links inside <strong>spam</strong> e-mail messages. That signals to the <strong>spam</strong>mer<br />

<strong>your</strong> address is valid, <strong>and</strong> they'll use it again <strong>and</strong> again. In addition, do not<br />

believe unsolicited e-mails offering free "<strong>spyware</strong> cleaning" Web sites. These<br />

almost always infect systems rather than clean them.<br />

Be careful when opting out<br />

Select the opt-out option only for well-known companies sending you e-mail.<br />

The CAN-SPAM Act of 2003 forces companies to include an opt-out form for<br />

users who do not wish to receive any more e-mail. You reach that form by<br />

clicking a link inside the e-mail message, which is a bad idea on <strong>spam</strong> <strong>from</strong><br />

companies you don't recognize. Large, reputable American companies will<br />

honor <strong>your</strong> request to unsubscribe to their mailing lists. Spammers, on the<br />

other h<strong>and</strong>, will continue to send <strong>spam</strong> because you verified that <strong>your</strong> e-mail<br />

account was active by unsubscribing to the e-mail.<br />

Keep <strong>your</strong> computer updated<br />

Most vendors provide patches that fix vulnerabilities or bugs in their software,<br />

free of charge on their Web sites. After you purchase software, visit the<br />

vendor's Web site to see if <strong>and</strong> how the vendor supplies patches. Some<br />

vendors, such as Microsoft, let you receive patch notices via e-mail by<br />

subscribing to mailing lists on their Web sites or through automatic updates.<br />

Set Windows Update in Control Panel's Security Center to automatically<br />

download <strong>and</strong> install Microsoft Critical Updates, as shown in Figure 2-6.<br />

This is called Automatic Updates.<br />

Figure 2-6: Set Windows Update to install critical updates automatically.


Enlarge image<br />

Microsoft releases its critical patches the second Tuesday of each month. If<br />

you want to get the update immediately, you must run Windows Update<br />

manually or it may take a few days before <strong>your</strong> computer will be scheduled (by<br />

Microsoft) to receive the update. Owing to server limitations, Microsoft can't<br />

deliver the updates to everyone on the same day. It may take up to 7 days to<br />

get the updates automatically.<br />

Use Microsoft Update to get updates for Microsoft applications such as<br />

Microsoft Office programs, as well as operating system updates.<br />

Be careful what you download<br />

Don't download files <strong>from</strong> any but the most trusted Web sites. You should<br />

assume that any files found on peer-to-peer networks or adult content Web<br />

sites will infect <strong>your</strong> system with <strong>spyware</strong> or worse. In addition, don't buy<br />

anything <strong>from</strong> an unsolicited e-mail. This encourages the <strong>spam</strong>mers to <strong>spam</strong><br />

more.<br />

Use a pop-up blocker<br />

Get a Web browser or add-in software that blocks pop-ups. Windows Internet<br />

Explorer 7 has the built-in Pop-up Blocker tool, <strong>and</strong> the Google toolbar blocks<br />

pop-ups for you also. Remember, active code hidden in pop-up ads spreads<br />

<strong>spyware</strong>.<br />

To see how well <strong>your</strong> system blocks pop-ups, visit Popup Check.com <strong>and</strong> take<br />

the pop-up tests available there. You'll also find related software ratings there,<br />

<strong>and</strong> a "Top 10" list as well.<br />

Moving on<br />

In this lesson, you learned how to eliminate <strong>spam</strong> <strong>and</strong> <strong>spyware</strong> <strong>from</strong> <strong>your</strong><br />

computer. In Lesson 3, you'll learn how to protect <strong>your</strong> <strong>PC</strong> <strong>from</strong> <strong>viruses</strong>. Before<br />

you move on, complete the assignment <strong>and</strong> take the quiz for this lesson, <strong>and</strong><br />

then head over to the Message Board to join the discussion on <strong>spam</strong> <strong>and</strong><br />

<strong>spyware</strong>.<br />

Assignment #2<br />

As you discovered in Lesson 2, it's vital to thwart <strong>spam</strong>, use anti<strong>spyware</strong> software, <strong>and</strong> have a<br />

firewall installed <strong>and</strong> configured on <strong>your</strong> computer. This assignment has three parts pertaining to<br />

<strong>spam</strong> filters, using Windows Defender to search for <strong>and</strong> remove <strong>spyware</strong>, <strong>and</strong> configuring Windows<br />

Firewall to block intruders <strong>from</strong> accessing <strong>your</strong> computer.<br />

Using a <strong>spam</strong> filter<br />

Check <strong>your</strong> e-mail client to determine if you have a <strong>spam</strong> control feature <strong>and</strong> that it's enabled. If you<br />

don't have <strong>spam</strong> control, visit About.com's Top 10 Free Spam Filters for Windows or Download.com<br />

to find a <strong>spam</strong>-filtering program that's right for you. Configure the program of <strong>your</strong> choice to filter<br />

<strong>spam</strong> for one week <strong>and</strong> see how much <strong>your</strong> <strong>spam</strong> is reduced.<br />

When you gain the upper h<strong>and</strong> over the flood of <strong>spam</strong> you get today, you'll know the assignment was<br />

a success.<br />

Using Windows Defender


To use Windows Defender, perform the following steps:<br />

1. If you run Windows XP, download Windows Defender <strong>from</strong> the Microsoft Web site, <strong>and</strong> then<br />

install it on <strong>your</strong> computer. If you run Windows Vista, skip to step 2.<br />

2. Open Windows Defender (select Start > All Programs > Windows Defender, or select Start,<br />

enter Windows Defender in the Vista Start Search text box, <strong>and</strong> then select it <strong>from</strong> the list).<br />

3. Check for new malware definitions. (Click the down-facing arrow at the right end of the<br />

toolbar, <strong>and</strong> then select Check for updates.) Click Continue or enter administrator credentials<br />

in Windows Vista, if prompted.<br />

4. Conduct a quick scan of <strong>your</strong> system (click Scan on the toolbar). Did you find any malware?<br />

5. Click Tools > Options. In the Options screen, configure Windows Defender to run every day at<br />

a time of <strong>your</strong> choice <strong>and</strong> to check for updated definitions before scanning. Save the settings<br />

<strong>and</strong> close Windows Defender.<br />

Using Windows Firewall<br />

Determine whether <strong>your</strong> computer has a third-party personal firewall installed, such as <strong>from</strong> Norton,<br />

McAfee, Zone Labs, Sunbelt, <strong>and</strong> so on. If not, ensure that Windows Firewall is enabled by<br />

performing the following steps:<br />

1. Open Windows Firewall (select Start > Control Panel, find <strong>and</strong> open Security Center, <strong>and</strong> then<br />

click Windows Firewall).<br />

2. If the Windows Firewall is off, click Change settings. Click Continue or enter administrator<br />

credentials in Windows Vista, if prompted.<br />

3. Click the On (recommended) option button. If you plan to connect to unsecure networks <strong>and</strong><br />

want more protection, click the Block all incoming connections checkbox. However, this<br />

prevents some of <strong>your</strong> Internet programs <strong>from</strong> working.<br />

4. Click the Exceptions tab to note which programs are allowed through the firewall. You can add<br />

programs here, if necessary.<br />

5. Apply the settings, close Windows Firewall, <strong>and</strong> then close all open windows.<br />

Stop by the Message Board <strong>and</strong> discuss which firewall you use <strong>and</strong> why. If you've learned about<br />

settings that might help <strong>your</strong> classmates, discuss them <strong>and</strong> how they work.<br />

Quiz #2<br />

Question 1:<br />

True or False: One of the most effective methods for reducing <strong>spam</strong> is through the use of anti<strong>spyware</strong> software.<br />

A) True<br />

B) False<br />

Question 2:<br />

What's a black list?<br />

A) A list of people whose messages should always be blocked before they make it to <strong>your</strong> inbox<br />

B) A list of e-mail that's not marked Urgent<br />

C) A list of people whose messages should always be delivered to you immediately<br />

D) A list of security practices that are followed by every ISP<br />

Question 3:<br />

Which types of software tools do you need to effectively protect <strong>your</strong>self <strong>from</strong> <strong>spyware</strong>? (Check all that apply.)<br />

A) Firewall<br />

B) Image scanner<br />

C) Spyware scanning <strong>and</strong> removal tool<br />

D) Spam blocker<br />

Question 4:<br />

True or False: A firewall is a component placed on computers or between a computer <strong>and</strong> the Internet to help


eliminate undesired access by the outside world.<br />

A) True<br />

B) False<br />

Question 5:<br />

What are some ways you can stop <strong>spam</strong> before it's ever sent to you? (Check all that apply.)<br />

A) Use an alternate e-mail address<br />

B) Subscribe to the Do Not E-mail list<br />

C) Don't click links in <strong>spam</strong> e-mails<br />

D) Be careful about the opt-out links you click<br />

Virus protection basics<br />

Without antivirus software installed, you're open to attack <strong>from</strong> a host of threats that can crash <strong>your</strong> computer in<br />

a heartbeat. This lesson will show you how to protect <strong>your</strong> computer <strong>from</strong> <strong>viruses</strong> <strong>and</strong> keep the software up to<br />

date.<br />

Why you need antivirus software<br />

As you learned in Lessons 1 <strong>and</strong> 2, there's a variety of malware that can affect<br />

<strong>your</strong> computer. If you don't have antivirus software installed on <strong>your</strong> computer,<br />

it's simply a matter of time before it becomes infected with a virus or worm <strong>and</strong><br />

possibly becomes inoperable <strong>and</strong>/or is used to infect other computers. New<br />

<strong>viruses</strong> <strong>and</strong> vulnerabilities surface daily, so you must be prepared to keep <strong>your</strong><br />

computer safe.<br />

A few times each year, a potentially devastating virus surfaces <strong>and</strong> spreads<br />

very quickly, infecting countless computers around the world. To make matters<br />

worse, if <strong>your</strong> computer is spreading a virus, there's the chance that <strong>your</strong> ISP<br />

will disable <strong>your</strong> account <strong>and</strong> not grant you access until <strong>your</strong> computer is<br />

cleaned <strong>and</strong> protected.<br />

If you use <strong>your</strong> home desktop or notebook computer to connect to <strong>your</strong><br />

company's network when working <strong>from</strong> home, it's essential you install<br />

antivirus software to prevent spreading <strong>viruses</strong> to the office network. Some<br />

companies have their firewalls set up to check all computers that try to<br />

connect remotely <strong>and</strong> disallow access to those that don't have updated<br />

antivirus programs running, personal firewall software properly configured,<br />

<strong>and</strong> the latest service packs <strong>and</strong> security updates installed.<br />

How antivirus software works<br />

Virus writers release a virus, it's discovered, <strong>and</strong> then an antivirus company<br />

finds a remedy for it. Once someone has detected <strong>and</strong> analyzed a virus, it's<br />

possible to write programs that look for specific characteristics of the virus,<br />

such as the following:<br />

Scanner software: Searches all files in the boot sector, in memory, <strong>and</strong> on<br />

<strong>your</strong> hard disk for code that uniquely identifies a file as a virus. This is the<br />

most common method of virus detection available, <strong>and</strong> is implemented in all<br />

major antivirus software programs.<br />

Interception software: Also called activity monitoring software, it examines<br />

the computer for virus-like behavior, <strong>and</strong> then warns the user about the<br />

behavior.<br />

Heuristics: In the case of new <strong>viruses</strong> for which no remedy has been<br />

created, scanning software uses heuristics -- a generic method of virus<br />

detection -- that looks for unusual virus-like activity on <strong>your</strong> computer.<br />

Integrity checker: Records integrity information about important files on <strong>your</strong><br />

hard disk, usually by checking for changes in a file. This method creates a<br />

"blueprint" (called a checksum) of the contents of every file on the computer.<br />

» Laptop <strong>and</strong> tablet <strong>PC</strong>s


Each time a file is opened, the virus scanner recomputes the checksum <strong>and</strong><br />

compares to the one it has stored in its database, to see if the file has<br />

changed. This method is also called change detection.<br />

For a virus to be successful, it must replicate its code. The key to antivirus<br />

software is detection. Viruses also have variants or copycat <strong>viruses</strong> that<br />

emerge after the initial outbreak, which make up the bulk of known <strong>viruses</strong>.<br />

After the software detects infected files, you can sometimes repair them. If not,<br />

you can quarantine them so that the viral code won't execute.<br />

Next, learn how to select an antivirus software package.<br />

Selecting an antivirus software program<br />

An antivirus software program may or may not come with <strong>your</strong> home computer.<br />

Sometimes a newly purchased computer might include a trial version or it may<br />

include a subscription for a number of months. Here are some considerations<br />

for evaluating antivirus programs:<br />

Does the software automatically scan a file when you send an e-mail<br />

attachment?<br />

Can you configure the software to update virus signatures automatically?<br />

How often are updates typically made available by the antivirus vendor?<br />

Can the virus checker clean <strong>and</strong> repair a file or does it just quarantine it?<br />

Can you check every file that <strong>your</strong> computer receives?<br />

When selecting an antivirus application, you should evaluate or read up on the<br />

popular programs <strong>and</strong> decide which you think would best suit <strong>your</strong> needs. The<br />

two most popular antivirus software packages are Symantec's Norton AntiVirus<br />

<strong>and</strong> McAfee's VirusScan, which you can purchase as st<strong>and</strong>alone products or<br />

as part of each company's protection suites. The following describes these<br />

packages <strong>and</strong> offerings <strong>from</strong> some of the other major antivirus software<br />

vendors:<br />

avast!: Detects <strong>and</strong> removes known <strong>viruses</strong>, can detect the basic activities of<br />

self-modifying <strong>viruses</strong>, <strong>and</strong> includes a script blocker, IM shield, <strong>and</strong> virus<br />

cleaner. ALWIL Software creates avast!. A free version is available.<br />

AVG: Provides basic antivirus protection free for home <strong>and</strong> non-commercial<br />

use, more comprehensive antivirus, anti<strong>spyware</strong>, anti<strong>spam</strong>, <strong>and</strong> firewall<br />

protection in the paid version. Grisoft created AVG <strong>and</strong> offers AVG AntiVirus<br />

Free Edition, among other products.<br />

F-Secure: Includes a variety of products -- antivirus, <strong>spam</strong>, <strong>and</strong> firewall<br />

protection -- for home users, small businesses, <strong>and</strong> large enterprises. It also<br />

provides Web site-based <strong>and</strong> wireless solutions for mobile workers against<br />

<strong>viruses</strong> <strong>and</strong> malicious code.<br />

McAfee: McAfee offers a family of antivirus <strong>and</strong> <strong>spyware</strong> software for<br />

Windows <strong>and</strong> wireless protection, which includes Internet security software,<br />

personal computer updates, hacker protection, <strong>and</strong> antivirus downloads. It<br />

also offers evaluation versions for business or home users.<br />

Symantec: Symantec offers a variety of software that blocks worms <strong>and</strong><br />

detects <strong>and</strong> removes <strong>viruses</strong>. Its features include automatic virus, worm, <strong>and</strong><br />

Trojan horse removal; IM attachment scanning <strong>and</strong> cleaning; <strong>and</strong> <strong>spyware</strong><br />

<strong>and</strong> keystroke logging program detection. The company also provides a<br />

special version adapted for mobile devices.<br />

P<strong>and</strong>a: P<strong>and</strong>a Security offers protection against <strong>viruses</strong>, <strong>spyware</strong>, hackers,<br />

<strong>and</strong> other threats. It also has the ability to scan <strong>your</strong> computer on dem<strong>and</strong><br />

any time you have Internet access.<br />

<strong>PC</strong>-cillin: From Trend Micro, this software protects <strong>your</strong> <strong>PC</strong> <strong>and</strong> home<br />

network against all types of <strong>viruses</strong>, worms, Trojan horses, <strong>and</strong> blended<br />

threats. It also detects <strong>and</strong> removes <strong>spyware</strong>, filters unwanted content, <strong>and</strong><br />

minimizes <strong>spam</strong>.<br />

Sophos: <strong>Protect</strong>s <strong>your</strong> network, desktop, <strong>and</strong> remote notebook computers<br />

<strong>from</strong> <strong>viruses</strong>, Trojan horses, worms, <strong>and</strong> <strong>spyware</strong>. You can use Sophos on<br />

multiple platforms.<br />

Virus scanning <strong>and</strong> other Internet security protection can also be performed<br />

» HP TouchSmart desktop<br />

<strong>PC</strong>s


y Web-based services such as Microsoft's Windows Live OneCare, which<br />

includes performance tuning <strong>and</strong> backup <strong>and</strong> restore in addition to<br />

antivirus, anti<strong>spyware</strong>, antiphishing, <strong>and</strong> firewall protection.<br />

After you select an antivirus software program, it's time to install <strong>and</strong> run it for<br />

the first time. If you've never used antivirus software on <strong>your</strong> computer, you<br />

need to take some extra steps so that the antivirus software can scan all the<br />

files on <strong>your</strong> hard disk the first time it runs. You'll learn how to prep <strong>your</strong><br />

computer, <strong>and</strong> install <strong>and</strong> run antivirus software, in the next section.<br />

Scanning <strong>and</strong> cleaning <strong>your</strong> computer for the first time<br />

Scanning <strong>and</strong> cleaning <strong>your</strong> computer involves three main steps: installing<br />

antivirus software, updating the software, <strong>and</strong> then scanning <strong>your</strong> computer's<br />

drives. These are described in the following sections.<br />

The installation<br />

This part is easy. Just close all running programs, insert the antivirus software<br />

CD-ROM into <strong>your</strong> computer or double-click the .exe file you downloaded <strong>from</strong><br />

a manufacturer's Web site, <strong>and</strong> follow the prompts.<br />

When you install a program in Windows Vista, the UAC (User Account<br />

Control) feature requires that you type in administrator credentials or click<br />

Continue if you're logged on as an administrator before you can proceed<br />

with the installation.<br />

The software installer extracts all of the files you need <strong>and</strong> runs a wizard that<br />

steps you through the process. When prompted, install <strong>your</strong> antivirus software<br />

to the default location on <strong>your</strong> hard disk or select a different drive if the default<br />

disk doesn't have enough free space. Select to run a brief pre-install system<br />

scan if the installer software suggests it.<br />

For demonstration purposes, this lesson uses Symantec's Norton Internet<br />

Security 2007 software on Windows Vista.<br />

The update<br />

Because <strong>your</strong> software needs to be as current as possible, one of the first<br />

processes <strong>your</strong> antivirus software may perform is to update the virus definition<br />

file. Often, it does this automatically during installation if you have a live Internet<br />

connection. You can also perform this procedure directly after the installation.<br />

Upon opening <strong>your</strong> software, you can update the virus definition file by clicking<br />

Run LiveUpdate in the lower left pane. The LiveUpdate Wizard starts, as shown<br />

in Figure 3-1, displaying a list of components installed on <strong>your</strong> computer. Click<br />

Next to check for updates for the components. On the Options screen, select<br />

which updates you want to apply, <strong>and</strong> then click Next. When the software<br />

confirms that the components are up to date, click Finish. When prompted to<br />

restart <strong>your</strong> computer, click OK.<br />

» <strong>PC</strong> Learning center


Figure 3-1: LiveUpdate Wizard.<br />

The scan<br />

Now it's time to scan <strong>your</strong> computer. To open the antivirus software, select<br />

Start > All Programs > Norton Internet Security > Norton Internet Security. On<br />

the Norton Internet Security screen, click Run a Scan, <strong>and</strong> then click Run Full<br />

System Scan, as shown in Figure 3-2. The software begins scanning all <strong>your</strong><br />

files.<br />

Figure 3-2: A full system scan checks all the files on <strong>your</strong> computer.<br />

Depending on the size of <strong>your</strong> hard disk, scanning <strong>your</strong> system can take<br />

anywhere <strong>from</strong> a few minutes to an hour or more.<br />

After the scan is complete, if any <strong>viruses</strong> are found, the software fixes or<br />

quarantines them. The results of the scan are displayed to you with any<br />

attention required <strong>from</strong> you, as shown in Figure 3-3.<br />

Figure 3-3: Results of a scan.<br />

Enlarge image<br />

After initial installation, the antivirus software runs continuously in the<br />

background to help prevent any infections. However, you should run a manual<br />

antivirus scan weekly, just to make sure nothing slipped through. In Norton


Internet Security, select Configure a Scan > Manage Custom Scans. You can<br />

select only certain drives, folders, or files to scan, reducing the time required for<br />

a full system scan. For best results, select Scan drives, <strong>and</strong> then select the C:<br />

drive.<br />

Now that you know how to install antivirus software, update it initially, <strong>and</strong> then<br />

scan <strong>your</strong> system, read on to learn how to clean <strong>and</strong> troubleshoot an infected<br />

computer.<br />

Cleaning <strong>and</strong> troubleshooting an infected system<br />

If <strong>your</strong> computer is severely infected, the antivirus software might not run. If<br />

that's the case, there are a few options you can try.<br />

Boot into safe mode<br />

Safe mode disables most drivers <strong>and</strong> running programs. To boot in safe mode,<br />

restart <strong>your</strong> computer <strong>and</strong> press the F8 key (after the initial black-<strong>and</strong>-white<br />

screen but before the Windows splash screen) until you get to a boot menu<br />

screen. With Windows Vista, XP, 2000, use <strong>your</strong> arrow keys to select Safe<br />

Mode with Networking Support. After the computer boots, try to run the<br />

antivirus software again. If the antivirus software still won't run after booting into<br />

safe mode, try scanning <strong>your</strong> system using an online tool.<br />

Scan <strong>your</strong> system online<br />

Because the same antivirus software methods are in use all over the world,<br />

virus writers attempt to defeat antivirus protection by creating <strong>viruses</strong> that<br />

disable the software. If this happens <strong>and</strong> you're running Windows, do the<br />

following:<br />

1. Open Microsoft Internet Explorer, <strong>and</strong> then go to the HP Personal<br />

computing security center Web page.<br />

2. Click the Clean <strong>your</strong> <strong>PC</strong> link, <strong>and</strong> then click the Symantec: Security<br />

connection link. The Symantec Your Security Resource Web page<br />

appears. Scroll down <strong>and</strong> click the Symantec Security Check Test<br />

button, as shown in Figure 3-4.<br />

Figure 3-4: The Symantec Security Check Test button.<br />

1.<br />

2.<br />

On the resulting Web page, click the Go button.<br />

The Symantec Security Check Web page appears, a portion of which is<br />

shown in Figure 3-5. Click the Virus Detection Start button.<br />

Cleaning System Restore<br />

Viruses can insert<br />

themselves into <strong>your</strong> restore<br />

directory in Windows XP or<br />

Windows Vista. When you<br />

restore the computer, the<br />

virus is restored as well. If<br />

<strong>your</strong> computer has been<br />

infected with a virus, after it's<br />

removed it's a good idea to<br />

open System Restore <strong>and</strong><br />

delete restore points with<br />

dates that occurred while the<br />

virus was active. This<br />

prevents the computer <strong>from</strong><br />

becoming reinfected when<br />

you use System Restore. To<br />

open System Restore, select<br />

Start > All Programs ><br />

Accessories > System Tools<br />

> System Restore. Follow the<br />

prompts to delete specific<br />

System Restore dates.<br />

» <strong>PC</strong> Accessories features<br />

guide


Figure 3-5: Symantec Security Check Web page.<br />

Enlarge image<br />

1.<br />

Accept the end-user license agreement, click Next, <strong>and</strong> then download<br />

<strong>and</strong> install ActiveX controls if they're not already present.<br />

The service scans <strong>your</strong> hard disk(s) to detect <strong>and</strong> fix any <strong>viruses</strong> you may have<br />

on <strong>your</strong> computer.<br />

Alternately, you can use McAfee FreeScan or Trend Micro HouseCall Free<br />

Scan, which are free online virus scanning tools that support many versions<br />

of Windows.<br />

Use a virus removal tool to clean <strong>your</strong> computer<br />

If the preceding steps indicate <strong>your</strong> computer is infected, using a downloadable<br />

virus removal tool is sometimes more effective than relying on the antivirus<br />

software installed on <strong>your</strong> <strong>PC</strong>. This is because a virus or worm sometimes adds<br />

key to <strong>your</strong> registry, the database that holds valuable information about <strong>your</strong><br />

computer. Even after you quarantine or delete a virus, the virus restarts itself<br />

each time the computer is started because of the registry key. Every time you<br />

run a virus scan, the software continues to find the virus. This ends up in a<br />

vicious cycle. To remove a virus <strong>from</strong> <strong>your</strong> computer, you can use a free virus<br />

removal tool such as those listed on the Symantec Removal Tools Web page.<br />

You can also use the Symantec Spyware & Virus Removal service, for a fee. A<br />

qualified technician performs a system scan <strong>and</strong> removes any malware <strong>from</strong><br />

<strong>your</strong> computer as part of an online service.<br />

Perform manual updates<br />

If <strong>your</strong> antivirus software has become partially unusable because of an<br />

infection, you can manually download the virus definition update. This file can<br />

be found on the manufacturer's Web site. Figure 3-6 shows a portion of<br />

Symantec's download virus definitions Web page.


Figure 3-6: You can manually download virus definitions <strong>from</strong> the vendor's Web<br />

site.<br />

After <strong>your</strong> computer is virus-free, you should create a new System Restore<br />

Point. (See the "Cleaning System Restore" sidebar for more information.) And<br />

then you're well on <strong>your</strong> way to a safer, more secure computing experience.<br />

Now it's time to discuss how to keep <strong>your</strong> computer in this condition.<br />

Ensuring ongoing virus prevention<br />

After you've installed antivirus software, you need to keep it updated. This is<br />

because as new <strong>viruses</strong> are released, new file definitions have to be created to<br />

fix the damage that these <strong>viruses</strong> cause. If you don't update <strong>your</strong> virus<br />

software, you leave <strong>your</strong> computer vulnerable to all newer virus threats.<br />

Enable autoupdate<br />

Antivirus software vendors update their virus lists regularly. Make sure you<br />

enable the autoupdate feature in <strong>your</strong> antivirus software to install updates for<br />

you on a regular basis. This feature is called LiveUpdate in Norton Internet<br />

Security 2007. It checks for updates daily when <strong>your</strong> computer is on. You can<br />

run LiveUpdate at any time by clicking Run LiveUpdate under Quick Tasks in<br />

the left pane of the console.<br />

Schedule regular updates<br />

Some antivirus software packages enable you to schedule the day <strong>and</strong> time<br />

that the update runs. If you use a dial-up modem to access the Internet, set it<br />

for a day <strong>and</strong> time when you know you'll be online. If you use a DSL (digital<br />

subscriber line) or cable modem -- an always-on broadb<strong>and</strong> connection -- set it<br />

for a time when you're not using the computer. Most updates take only a few<br />

minutes to download <strong>and</strong> install.<br />

Schedule regular system scans<br />

As mentioned previously, most antivirus software packages run in the<br />

background <strong>and</strong> constantly monitor <strong>your</strong> computer for problems. However, you<br />

can schedule automatic system scans -- once a day or each week, for example<br />

-- for even better coverage. In Norton Internet Security, select Configure a Scan<br />

» Storage feature guide


Schedule Full System Scans. You can select only certain drives, folders, or<br />

files to The Norton Internet Security Schedule screen is shown in Figure 3-7.<br />

Figure 3-7: You can schedule automatic scans.<br />

Even with antivirus protection set up, you still need to develop safe computing<br />

habits to ensure an even safer online experience. Find out how to start using<br />

these best practices in the next section.<br />

Practicing safe computing<br />

Most current antivirus software is quite effective, but only if it's kept updated<br />

<strong>and</strong> the user practices safe computing habits such as not opening unfamiliar<br />

attachments in the form of documents or programs. Remember that antivirus<br />

software can't always protect against br<strong>and</strong>-new <strong>viruses</strong>, <strong>and</strong> users often don't<br />

take necessary precautions.<br />

In addition, antivirus software can interfere with programs currently installed on<br />

the computer, especially gaming software. Often, users disable the virus<br />

software because a game won't run correctly. Sometimes users disable the<br />

antivirus software because a screen keeps appearing (referred to as a "nag<br />

screen") saying that the software needs to be updated. Disabling the antivirus<br />

software leaves <strong>your</strong> computer at risk.<br />

Here are some safe computing practices that you should follow:<br />

Purchase software <strong>from</strong> a local store you're familiar with or a national chain<br />

with an established reputation.<br />

If you purchase programs over the Web, make sure they're <strong>from</strong> a reputable<br />

company.<br />

Make a boot disk <strong>and</strong> keep it h<strong>and</strong>y in case a virus infects <strong>your</strong> computer so<br />

badly that it won't even boot. Review <strong>your</strong> <strong>PC</strong>'s documentation for details on<br />

how to do this for <strong>your</strong> system.<br />

Use RTF instead of DOC extensions for <strong>your</strong> Word files. Be cautious about<br />

accepting any Word .doc or Excel .xls files <strong>from</strong> anyone.<br />

Be extremely cautious about opening attachments. Don't accept, run, or<br />

open any unsolicited attachments to e-mail.<br />

Keep up with the latest security patches for all the programs you use. If you<br />

run Windows XP or Vista, use the Automatic Updates feature in Security<br />

Center to schedule regular updates. You can also select Tools > Windows<br />

Update in Internet Explorer to manually update <strong>your</strong> computer.<br />

Underst<strong>and</strong> Microsoft<br />

Internet Explorer <strong>Protect</strong>ed<br />

Mode<br />

In Windows Vista, Internet<br />

Explorer 7 runs in <strong>Protect</strong>ed<br />

Mode, which enforces<br />

restricted privileges in<br />

Internet Explorer to help<br />

protect <strong>your</strong> computer <strong>from</strong> a<br />

variety of attacks. <strong>Protect</strong>ed<br />

Mode prevents many attacks<br />

to write, alter, or destroy data<br />

on the user's computer or to<br />

install malicious code.<br />

» Laptop <strong>and</strong> tablet <strong>PC</strong>s


Make frequent backups of <strong>your</strong> data files <strong>and</strong> keep them on removable<br />

media, such as CDs, DVDs, or USB (universal serial bus) drives, in the<br />

event that a virus renders <strong>your</strong> computer completely useless. You can also<br />

use an online storage service, such as MediaMax, Box.net, or Carbonite.<br />

If <strong>your</strong> computer is used by more than one person, be sure that the other<br />

users know the dangers of unsafe computing.<br />

Your antivirus software program prevents some of the problems caused by<br />

downloading programs, opening e-mail attachments, <strong>and</strong> unsafe computing.<br />

However, you need to remember that there's a lag between recognizing a virus<br />

<strong>and</strong> when <strong>your</strong> computer or virus vendor knows about it. The safer you make<br />

<strong>your</strong> computing experience, the more joy you'll get <strong>from</strong> using <strong>your</strong> computer.<br />

Moving on<br />

In this lesson, you explored how <strong>viruses</strong> work, <strong>and</strong> learned about using<br />

antivirus software <strong>and</strong> how to keep it up to date. You also explored some ways<br />

to practice safe computing. Before you move on, do the assignment <strong>and</strong> take<br />

the quiz for this lesson. After that, head over to the Message Board to discuss<br />

malware <strong>and</strong> protection solutions with <strong>your</strong> instructor <strong>and</strong> fellow students.<br />

Good luck in keeping <strong>your</strong> computer in good running condition, <strong>and</strong> have a safe<br />

<strong>and</strong> happy computing experience.<br />

Assignment #3<br />

Perform the following steps to discover whether <strong>your</strong> computer has antivirus software installed:<br />

1. In Windows Vista or Windows XP, select Start, <strong>and</strong> then click Control Panel.<br />

2. Double-click Security Center (in Classic view), or double-click Security > Security Center<br />

(in Category view).<br />

3. Note whether any programs other than Windows Firewall are listed.<br />

4. Check <strong>your</strong> taskbar icons. Most antivirus programs put an icon in the right section<br />

(notification area) of the taskbar.<br />

5. Select Start > All Programs, <strong>and</strong> then check the list of programs installed on <strong>your</strong><br />

computer. Common antivirus programs include: Symantec/Norton, McAfee, P<strong>and</strong>a,<br />

Trend Micro <strong>PC</strong>-cillin, AVG, <strong>and</strong> avast!.<br />

6. If no antivirus software is installed, download <strong>and</strong> install an antivirus program of <strong>your</strong><br />

choice.<br />

7. Update the software to ensure it's using the latest virus definitions. For example, in<br />

Norton Internet Security 2007, run LiveUpdate.<br />

8. Configure <strong>your</strong> antivirus program to update definitions daily, at a time when the computer<br />

<strong>and</strong> Internet connection will be on <strong>and</strong> you're usually not using the computer.<br />

Share any new tips you uncover or problems you run into with <strong>your</strong> classmates on the Message<br />

Board.<br />

Quiz #3<br />

Question 1:<br />

If <strong>your</strong> computer is severely infected, the antivirus software program might not run. Which of the following can<br />

you do to resolve this problem? (Check all that apply.)<br />

A) Nothing, take the computer in for repair.<br />

B) Attempt to do an online scan to detect <strong>and</strong> fix <strong>viruses</strong>, worms, or Trojan horses that you may have on<br />

<strong>your</strong> computer.<br />

C) Boot into safe mode <strong>and</strong> try to run <strong>your</strong> antivirus software program.<br />

D) Disable <strong>your</strong> antivirus program <strong>and</strong> work without it.<br />

Question 2:<br />

Which of the following are types of antivirus detection methods? (Check all that apply.)


A) Quarantine<br />

B) Heuristic detection<br />

C) Integrity checking<br />

D) Interception<br />

Question 3:<br />

True or False: Even if you quarantine or delete a virus on <strong>your</strong> computer, it can still restart if it has stored a key<br />

in <strong>your</strong> system's registry.<br />

A) True<br />

B) False<br />

Question 4:<br />

Which of the following items are considered a part of safe computing? (Check all that apply.)<br />

A) Keep up with the latest security patches for all the programs you use.<br />

B) Purchase software <strong>from</strong> a local store that you're familiar with or a national chain with an established<br />

reputation.<br />

C) Make a boot disk <strong>and</strong> keep it h<strong>and</strong>y in case a virus infects the machine so badly that it won't even boot.<br />

D) Purchase software programs on the Internet <strong>from</strong> any company that clearly states it specializes in<br />

antivirus software.<br />

Question 5:<br />

True or False: If a virus inserts itself into <strong>your</strong> restore directory in Windows XP or Windows Vista, when you<br />

restore the computer using System Restore, the virus is automatically removed.<br />

A) True<br />

B) False<br />

© 2003 - 2010 Powered, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!