Protect your PC from spam, spyware and viruses - USD 322
Protect your PC from spam, spyware and viruses - USD 322
Protect your PC from spam, spyware and viruses - USD 322
Transform your PDFs into Flipbooks and boost your revenue!
Leverage SEO-optimized Flipbooks, powerful backlinks, and multimedia content to professionally showcase your products and significantly increase your reach.
<strong>Protect</strong> <strong>your</strong> <strong>PC</strong> <strong>from</strong> <strong>spam</strong>, <strong>spyware</strong> <strong>and</strong> <strong>viruses</strong><br />
The computer security umbrella covers everything <strong>from</strong> <strong>spam</strong> to <strong>viruses</strong>. You know you need to protect<br />
<strong>your</strong>self, but you may not be sure how. This class for the average computer user will help you<br />
underst<strong>and</strong> which threats you need to protect <strong>your</strong> computer against—namely, <strong>spam</strong>, <strong>spyware</strong> <strong>and</strong><br />
<strong>viruses</strong>—<strong>and</strong> how they work against you. Also learn which tools to use to keep them off <strong>your</strong> computer<br />
for good.<br />
Lessons<br />
1. An overview of <strong>spam</strong>, <strong>spyware</strong> <strong>and</strong> <strong>viruses</strong><br />
Spam, <strong>spyware</strong> <strong>and</strong> <strong>viruses</strong> are real problems for everyone. Some threats can<br />
lead to identity theft; others can crash <strong>your</strong> computer or delete <strong>your</strong> files. This<br />
lesson explores these threats in a practical <strong>and</strong> easy-to-underst<strong>and</strong> manner.<br />
2. <strong>Protect</strong> <strong>your</strong>self with <strong>spam</strong> blockers <strong>and</strong> <strong>spyware</strong> removers<br />
With <strong>spam</strong> clogging <strong>your</strong> email inbox <strong>and</strong> <strong>spyware</strong> watching <strong>your</strong> every mouse<br />
click to send information about you to untrustworthy parties, it's time to take<br />
back control. This lesson shows you how to block <strong>spam</strong> <strong>and</strong> rid <strong>your</strong> <strong>PC</strong> of<br />
<strong>spyware</strong>.<br />
3. Virus protection basics<br />
Without antivirus software installed, you're open to attack <strong>from</strong> a host of threats<br />
that can crash <strong>your</strong> computer in a heartbeat. This lesson will show you how to<br />
protect <strong>your</strong> computer <strong>from</strong> <strong>viruses</strong> <strong>and</strong> keep the software up to date.<br />
An overview of <strong>spam</strong>, <strong>spyware</strong> <strong>and</strong> <strong>viruses</strong><br />
Spam, <strong>spyware</strong> <strong>and</strong> <strong>viruses</strong> are real problems for everyone. Some threats can lead to identity theft; others can<br />
crash <strong>your</strong> computer or delete <strong>your</strong> files. This lesson explores these threats in a practical <strong>and</strong> easy-tounderst<strong>and</strong><br />
manner.<br />
Welcome to <strong>Protect</strong> <strong>your</strong> <strong>PC</strong> <strong>from</strong> <strong>spam</strong>, <strong>spyware</strong> <strong>and</strong> <strong>viruses</strong><br />
Welcome to <strong>Protect</strong> <strong>your</strong> <strong>PC</strong> <strong>from</strong> <strong>spam</strong>, <strong>spyware</strong>, <strong>and</strong> <strong>viruses</strong>. Security is a<br />
big umbrella that covers everything <strong>from</strong> access controls to zero-day exploits.<br />
An important subset of security -- probably the most important for home <strong>and</strong><br />
home office users -- is protecting against malicious software or malware. This<br />
includes <strong>viruses</strong>, worms, Trojans, adware, <strong>and</strong> even <strong>spyware</strong> that tries to<br />
monitor <strong>your</strong> every keystroke. This three-lesson course will help you<br />
underst<strong>and</strong> exactly which malware threats you need to protect <strong>your</strong> computer<br />
<strong>from</strong> <strong>and</strong> what it takes to do it. You'll also get step-by-step instructions for<br />
securing <strong>your</strong> computer to eliminate <strong>spam</strong>, <strong>spyware</strong>, <strong>and</strong> <strong>viruses</strong> <strong>and</strong> keeping<br />
<strong>your</strong> <strong>PC</strong> <strong>and</strong> software up to date.<br />
This course is geared toward individuals who want to protect their personal<br />
computers <strong>from</strong> <strong>spam</strong>, <strong>spyware</strong>, <strong>and</strong> <strong>viruses</strong>.<br />
Here's what to expect in the lessons:<br />
Lesson 1: An overview of <strong>spam</strong>, <strong>spyware</strong>, <strong>and</strong> <strong>viruses</strong> explores general<br />
security threats, <strong>and</strong> then focuses on <strong>spam</strong>, <strong>spyware</strong>, <strong>and</strong> <strong>viruses</strong>.<br />
Lesson 2: <strong>Protect</strong> <strong>your</strong>self with <strong>spam</strong> blockers <strong>and</strong> <strong>spyware</strong> removers shows<br />
you how to use anti<strong>spam</strong> <strong>and</strong> anti<strong>spyware</strong> tools, configure Windows<br />
Firewall, <strong>and</strong> gives you a plethora of tips on safe computing practices.<br />
Lesson 3: Virus protection basics walks you through the basics of antivirus<br />
software. You'll learn how to install <strong>and</strong> update antivirus software, perform a<br />
full system scan, <strong>and</strong> keep <strong>your</strong> system in good health.<br />
» Laptop <strong>and</strong> tablet <strong>PC</strong>s
In addition to the lessons, be sure to complete the assignments <strong>and</strong> quizzes.<br />
When you're finished with those, visit the Message Board. It's the perfect place<br />
to discuss course topics <strong>and</strong> swap questions <strong>and</strong> comments with other<br />
students <strong>and</strong> <strong>your</strong> instructor.<br />
Take a few moments to meet <strong>your</strong> instructor <strong>and</strong> fellow students on the<br />
Message Board -- <strong>your</strong> virtual classroom -- <strong>and</strong> let them know a little about<br />
you.<br />
Now that you know the general layout of the course, let's get started with the<br />
topics in Lesson 1.<br />
Underst<strong>and</strong>ing security threats<br />
How often have you had issues with <strong>your</strong> computer <strong>and</strong> called tech support,<br />
only to be told you have a virus or that <strong>spyware</strong> has been installed on <strong>your</strong><br />
computer? Even people who are careful sometimes end up with malicious<br />
software on their computers. This is due, in part, to the nature of how a<br />
computer communicates.<br />
There are 65,535 available ports, or points of entry, that can be accessed on a<br />
computer <strong>and</strong> many of them have to be open by default to perform normal<br />
Internet communications, such as Web surfing, sending e-mail, <strong>and</strong> using<br />
various programs. Hackers can exploit this to send self-installing malware to<br />
<strong>your</strong> computer through an open port. In addition, unscrupulous people called<br />
"social engineers" <strong>and</strong> "phishers" use various methods to extract information,<br />
such as passwords or personal information, <strong>from</strong> unaware users.<br />
The bulk of this lesson covers malware -- a general term for <strong>spam</strong>, <strong>spyware</strong>,<br />
<strong>viruses</strong>, <strong>and</strong> other malicious software. However, this first section covers some<br />
of the other, less-obvious security threats you might face while using today's<br />
Internet-connected technology devices, such as notebook <strong>and</strong> desktop<br />
computers, PDAs (personal digital assistants) <strong>and</strong> smartphones.<br />
Social engineering<br />
Social engineering -- also called pretexting -- plays on human behavior <strong>and</strong><br />
how people interact with one another. It involves getting information under<br />
false pretenses. Here are some examples of social engineering scams:<br />
The scammer visits <strong>your</strong> office <strong>and</strong> claims to be <strong>from</strong> the IT department. He<br />
says he needs to fix <strong>your</strong> computer, <strong>and</strong> asks for <strong>your</strong> account name <strong>and</strong><br />
password so he can log onto <strong>your</strong> account.<br />
The scammer plays on <strong>your</strong> sympathy, pretending to be a new employee<br />
who has forgotten the code to get into the secure part of the building, <strong>and</strong><br />
says he'll get fired unless you help him out by sharing the code.<br />
The scammer calls, pretending to be one of the "big bosses" in the<br />
company, <strong>and</strong> tries to intimidate you into giving information.<br />
To protect <strong>your</strong>self, never feel that you have to give out sensitive information to<br />
someone you don't know. If someone asks you for these types of information,<br />
there are several pieces of information that you should be gathering instead:<br />
Ask for the correct spelling of the person's name.<br />
Ask for her employee number.<br />
Ask him to tell you <strong>your</strong> account number.<br />
Ask her which transactions have been processed <strong>and</strong> you'll either verify or<br />
deny the transaction.<br />
Who does the person claim he or she is representing?<br />
If the caller is not legitimate, asking these questions will usually let you know.<br />
» Desktop & all-in-one <strong>PC</strong>s
Remember that social engineering plays on human behavior <strong>and</strong> willingness to<br />
help <strong>and</strong> trust others. To protect <strong>your</strong> confidential information, you must not be<br />
so willing <strong>and</strong> trusting.<br />
Phishing<br />
When this type of information gathering is done via e-mail, it's called phishing,<br />
because basically the person is fishing for information.<br />
Here's how it works: You receive an e-mail that appears to be <strong>from</strong> <strong>your</strong> bank<br />
stating that the bank is having some trouble processing some automatic<br />
payments. The e-mail explains that to clear up the problem, you need to click<br />
the provided link <strong>and</strong> log in to the Web site using <strong>your</strong> user name <strong>and</strong><br />
password. If you do, you're directed to a fake Web site where <strong>your</strong> information<br />
is captured.<br />
You can often spot these scams by hovering <strong>your</strong> mouse pointer over the<br />
URL (uniform resource locator) in the e-mail message. Usually, the link that<br />
appears in a pop-up tooltip is different <strong>from</strong> the diplayed link. For example,<br />
the displayed link shows www.xyzbank.com; however, when you hover<br />
<strong>your</strong> mouse pointer over it, something similar to www.badguy.ru/xyzbank<br />
appears in a tooltip. Many of these sites are on foreign servers, as<br />
indicated by .ru (for Russia) as the top level domain.<br />
The fake Web site, which looks exactly like <strong>your</strong> bank's real Web site, has<br />
been set up for the sole purpose of stealing personal information.<br />
Unsuspecting people are often fooled into entering credit card numbers, bank<br />
account numbers, passwords, <strong>and</strong> other details. Approximately 5 percent of email<br />
recipients respond to phishing messages, but that's enough to make it<br />
worthwhile for the phishers because they may be able to clean out those<br />
people's bank accounts or run up credit card bills for thous<strong>and</strong>s of dollars.<br />
You should never respond to an e-mail asking you to verify any kind of<br />
personal information. Reputable companies don't ask their customers for<br />
passwords or account details in an e-mail or phone call. Even if you think<br />
the e-mail or phone call may be legitimate, don't respond. Instead, contact<br />
the company by phone or by visiting their Web site directly. (The one you<br />
have bookmarked; not the one sent to you via e-mail.)<br />
Identity theft<br />
Identity theft occurs when someone gains access to some or all of <strong>your</strong><br />
personal information -- name, address, Social Security number, driver's license<br />
number, birth date, <strong>and</strong> bank or credit card account numbers -- <strong>and</strong> uses them<br />
without <strong>your</strong> permission. A thief can clean out <strong>your</strong> account, or run up a<br />
balance, within hours without you being aware of it until well after the crime's<br />
been committed.<br />
Identity theft is a serious crime that's punishable by law in most states.<br />
However, it's up to you to minimize the threat of identity theft by keeping <strong>your</strong><br />
confidential information private. If you believe you're a victim of identity theft,<br />
contact <strong>your</strong> bank or credit card company <strong>and</strong> local law enforcement office<br />
immediately to report the crime. You can also get further assistance <strong>from</strong> <strong>your</strong><br />
state's identity theft Web site. Just go online <strong>and</strong> search for identity theft <strong>your</strong><br />
state to find the appropriate Web site <strong>and</strong> phone numbers.<br />
Identity theft can also occur when a thief steals a device that contains personal<br />
information. Notebook computers are easily stolen or lost, along with whatever
data is stored on them. You can -- <strong>and</strong> should -- use file encryption to protect<br />
sensitive data stored on a notebook computer. New technologies, such as the<br />
BitLocker feature in some editions of Windows Vista, can encrypt the entire<br />
drive. You can also buy software that causes <strong>your</strong> stolen notebook to "phone<br />
home" if the thief gets on the Internet without entering the correct passwords.<br />
Today, in addition to a cell phone, many people carry a PDA or full fledged<br />
h<strong>and</strong>held computer. A personal organizer often contains a large amount of<br />
important personal information -- <strong>and</strong> not only <strong>your</strong> own, but also that of other<br />
people in <strong>your</strong> address book.<br />
Minimally, you should require a password to even access the h<strong>and</strong>held device<br />
or PDA. Every device is different, so be sure to read <strong>your</strong> owner's manual to<br />
find out how to password protect <strong>your</strong>s. For better security, some devices now<br />
come with biometric security, so you must swipe <strong>your</strong> fingerprint to start the<br />
device.<br />
Although social engineering, identity theft, <strong>and</strong> theft of portable devices are big<br />
problems, the most common <strong>and</strong> most publicized security threat to any<br />
computer is malicious software, or malware, which includes <strong>viruses</strong>, worms,<br />
Trojan horses, adware <strong>and</strong> <strong>spyware</strong>. These are covered in the next section.<br />
The <strong>spam</strong> that clogs <strong>your</strong> inbox<br />
Just like junk mail clogs <strong>your</strong> regular mailbox, <strong>spam</strong> clogs <strong>your</strong> e-mail inbox.<br />
Spam is a term that refers to the sending of unsolicited commercial e-mail.<br />
Most <strong>spam</strong> is commercial advertising, often for products such as get-rich-quick<br />
schemes, physical enhancements, adult Web sites, <strong>and</strong> cheap medications.<br />
Spam costs the sender very little to send because the actual costs are paid for<br />
by the carriers rather than by the sender.<br />
E-mail <strong>spam</strong> targets individual users with direct e-mail messages. Spammers<br />
create their e-mail lists by scanning newsgroup postings, stealing Internet<br />
mailing lists, or searching Web sites for e-mail addresses. Spammers use<br />
automated tools to subscribe to as many mailing lists as possible so they can<br />
capture the lists of addresses, or use the mailing list as a direct target for their<br />
attacks.<br />
You'll learn more about <strong>spam</strong> <strong>and</strong> how to keep it off <strong>your</strong> system when you get<br />
to Lesson 2. First, read on to get an overview of <strong>spyware</strong>.<br />
Spyware that invades <strong>your</strong> privacy<br />
Spyware is computer software that collects personal information about a<br />
computer user without the user's informed consent. Spyware is often installed<br />
through "drive-by downloads" <strong>from</strong> malicious Web pages running code or along<br />
with another legitimate program you intended to install.<br />
Spyware may also be advertising-supported software, called adware. Adware<br />
enables advertisers to make money <strong>from</strong> a product without directly selling it to<br />
the users. The companies also install additional tracking software on <strong>your</strong><br />
computer, which continuously keeps in contact with the company over <strong>your</strong><br />
Internet connection. It reports data to the company, such as <strong>your</strong> surfing habits<br />
<strong>and</strong> which Web sites you've visited.<br />
Although adware companies state there will be no sensitive or identifying<br />
data collected <strong>from</strong> <strong>your</strong> computer, the fact remains that you have software<br />
on <strong>your</strong> <strong>PC</strong> that's sending information about you <strong>and</strong> <strong>your</strong> surfing habits to<br />
» <strong>PC</strong> Learning center<br />
» <strong>PC</strong> Accessories features<br />
guide
a remote location.<br />
Adware is not an illegal type of software; however, there are certain privacy<br />
issues involved. Legitimate adware companies disclose the nature of data<br />
that's collected <strong>and</strong> transmitted, but there's almost always no way for the user<br />
to actually control which data is being sent. Plus, this technology is capable of<br />
sending more than just banner statistics.<br />
Another type of <strong>spyware</strong> is surveillance software that's designed to collect<br />
much more than just information about what Web sites you visit. Keystroke<br />
loggers, screen capture programs, chat loggers, <strong>and</strong> similar programs can<br />
enable someone else to see every character you've typed or what has<br />
appeared on <strong>your</strong> monitor. This type of <strong>spyware</strong> is used for genuine spying<br />
purposes -- by suspicious spouses, worried parents, private detectives, <strong>and</strong><br />
even government agencies (with a warrant). Although these tools are perfectly<br />
legal in most instances, if they're abused, they can violate <strong>your</strong> privacy. So<br />
what can you do about <strong>spyware</strong>?<br />
How do I know if my computer has <strong>spyware</strong> installed?<br />
Here are some indications <strong>your</strong> computer may contain <strong>spyware</strong>:<br />
The computer is slower than it used to be, especially when browsing the<br />
Internet.<br />
It takes a long time for the Microsoft Windows desktop to come up.<br />
Clicking a link does nothing or goes to a different Web site than expected.<br />
Your browser home page changes <strong>and</strong> you may not be able to reset it.<br />
Web pages are automatically added to <strong>your</strong> Favorites list.<br />
Now that you're well acquainted with the <strong>spyware</strong> <strong>your</strong> computer faces, take a<br />
look at <strong>viruses</strong>, Trojan horses, <strong>and</strong> worms.<br />
Inside <strong>viruses</strong>, Trojan horses, worms <strong>and</strong> other malware<br />
Now that you've learned a bit about social engineering, phishing, <strong>and</strong> how to<br />
watch out for theft, this section covers the malware that causes us so many<br />
headaches. In this section, you'll learn about <strong>viruses</strong>, worms, <strong>and</strong> other types<br />
of malicious software that can infect <strong>your</strong> system <strong>and</strong> affect <strong>your</strong> computing<br />
experience.<br />
Viruses<br />
One of the earliest known forms of malicious code is the computer virus. The<br />
name virus comes <strong>from</strong> the behavior of the code <strong>and</strong> its similarities to<br />
biological <strong>viruses</strong> in the way it reproduces itself <strong>and</strong> spreads to new hosts. A<br />
virus is a program or piece of code that's loaded on to <strong>your</strong> computer without<br />
<strong>your</strong> knowledge. It's designed to attach itself to other code <strong>and</strong> replicate when<br />
an infected file is executed or launched. At this point, it attaches to other files,<br />
adding its code to the application's code <strong>and</strong> continues to spread.<br />
Types of <strong>viruses</strong> that exist include:<br />
Boot sector: Places a virus into the first section of the hard disk, so when the<br />
computer boots up, the virus loads into memory. The boot sector is also<br />
called the master boot record or master boot sector.<br />
Program virus: Infects executable program files, such as .exe, .com, .sys,<br />
<strong>and</strong> so on.<br />
Multipartite: Is a hybrid virus that uses multiple techniques; for example,<br />
combination boot <strong>and</strong> program virus.<br />
Polymorphic: Has the ability to change form each time it's executed; hackers<br />
developed it to avoid antivirus software detection.<br />
» Storage feature guide
Macro: Is inserted into a Microsoft Office document <strong>and</strong> e-mailed to<br />
unsuspecting users.<br />
A virus doesn't execute by itself -- it has to be triggered by some type of action,<br />
such as clicking a link or opening a file. However, since 2000, the majority of<br />
<strong>viruses</strong> released are actually worms, which do replicate without user action.<br />
Virus protection basics are covered in Lesson 3.<br />
A virus hoax uses system resources <strong>and</strong> consumes users' time. Virus hoaxes<br />
are false reports about non-existent <strong>viruses</strong>, usually sent as e-mail. Some<br />
hoaxes are more dangerous; they advise you to delete files on <strong>your</strong> computer<br />
to "clean out the virus," but these are actually important system files that the<br />
computer needs to run. You should always check the validity of these types of<br />
e-mails before you take action, or worse, forward the e-mail, which just helps<br />
propagate the hoax.<br />
The following companies <strong>and</strong> organizations list virus hoaxes on their Web sites<br />
<strong>and</strong> steps to protect you against them:<br />
Symantec<br />
McAfee Security<br />
Sophos<br />
Urban Legends Reference Pages at Snopes.com<br />
There have been a number of <strong>viruses</strong> distributed through e-mails purporting to<br />
be <strong>from</strong> Microsoft or other vendors. As a general rule, Microsoft <strong>and</strong> other<br />
reputable vendors don't distribute antivirus software updates or patches via email.<br />
(They do, however, send alerts <strong>and</strong> update notifications via e-mail, if you<br />
sign up for them at their Web sites.) If there's any doubt as to whether<br />
something is real, check the Web site of the company in question by opening<br />
<strong>your</strong> Web browser <strong>and</strong> entering the company's URL directly or use <strong>your</strong><br />
bookmarked address. Never click a link or open an attachment in a<br />
questionable e-mail.<br />
Trojan horses<br />
A Trojan horse appears to be useful software, such as a screen saver, utility, or<br />
game but there's code hidden inside that attacks <strong>your</strong> computer directly or<br />
enables the system to be compromised by the originator of the code. File<br />
sharing, including music, video, <strong>and</strong> text, is a common transport mechanism.<br />
Trojan horses are often distributed over P2P (peer-to-peer) networks.<br />
Antivirus software is designed to detect Trojan horse software programs;<br />
therefore, the steps to protect a computer <strong>from</strong> Trojan horse programs are the<br />
same as protecting <strong>your</strong> computer <strong>from</strong> virus code, which is discussed in<br />
Lesson 2.<br />
Worms<br />
Worms are similar in function <strong>and</strong> behavior to a general virus or a Trojan horse<br />
with the exception that worms are self-replicating without any user interaction.<br />
A worm is built to take advantage of a security hole in an existing application or<br />
operating system, find other computers running the same software, <strong>and</strong><br />
automatically replicate itself to the new host. After the worm is running on a<br />
computer, it checks for network or Internet connectivity. If a connection exists,<br />
the worm then tries to replicate <strong>from</strong> one system to the next. There are many<br />
variants to each type of worm. Often, they're quite difficult to remove, so<br />
antivirus companies have downloadable tools available to remove them.<br />
Rootkits
A rootkit is a type of malware that hides the tracks of intruders <strong>and</strong> can be<br />
incorporated with other malicious code to take complete control of a system.<br />
Rootkits keep virus scanners <strong>and</strong> other detection software <strong>from</strong> finding them<br />
<strong>and</strong> their related hacker tools. Rootkits generally don't propagate themselves to<br />
systems like <strong>viruses</strong> <strong>and</strong> worms, but worms can install rootkits.<br />
Buffer overflow<br />
A buffer overflow occurs when data is sent to a computer's memory buffer<br />
beyond a fixed length boundary, causing it to overwrite data in adjacent<br />
memory locations. Many times, a buffer overflow is the result of a vulnerability<br />
or program flaw in software.<br />
Criminal hackers take advantage of these known vulnerabilities or flaws by<br />
launching buffer overflow attacks. Buffer overflows are probably the most<br />
common way to cause disruption of service <strong>and</strong> lost data because there's no<br />
way to screen bad requests.<br />
Spoofing<br />
Spoofing refers to a program or person pretending to be another by sending<br />
false information. Spoofing is one of the most common forms of online<br />
concealment. Spoofing makes data appear to come <strong>from</strong> somewhere other<br />
than where it really originated. This is accomplished by modifying the e-mail<br />
address, IP headers or other source of information about the origins of the<br />
data.<br />
Hackers often use this type of attack to get additional information <strong>from</strong><br />
users to carry out a more aggressive plan. Spoofing <strong>and</strong> phishing often go<br />
h<strong>and</strong> in h<strong>and</strong>.<br />
Botnets <strong>and</strong> their zombies<br />
A bot (short for robot) is a software application that performs automated tasks.<br />
Hackers use bots to carry out automated attacks on networks. A botnet is a<br />
collection of bots that run autonomously. The goal of many computer hackers<br />
is to take over as many systems as possible to help them achieve their goals.<br />
They assemble botnets of individual compromised computers (known as<br />
"zombies") that they control remotely, often by using an IRC (Internet Relay<br />
Chat) or IM (instant messaging) server. In addition to obeying whatever<br />
comm<strong>and</strong>s the hacker issues, the zombies also prowl the Internet looking for<br />
additional hosts to infect. After many computers have been infected, the<br />
person controlling the malware uses this covert network of computers -including<br />
<strong>your</strong>s -- as zombies to launch DDoS (distributed denial of service)<br />
attacks against Internet servers. A DDoS attack can quickly shut down a<br />
server.<br />
Moving on<br />
In this lesson, you explored some fundamental security threats, learned about<br />
<strong>viruses</strong>, worms, <strong>and</strong> other malware, <strong>and</strong> also examined the problems of <strong>spam</strong><br />
<strong>and</strong> <strong>spyware</strong>. The remainder of this course discusses protection methods<br />
against all kinds of threats. First, in Lesson 2, you'll learn how to rid <strong>your</strong><br />
computer of <strong>spam</strong> <strong>and</strong> <strong>spyware</strong>. Before you move on, do the assignment <strong>and</strong><br />
take the quiz for this lesson. In addition, be sure to visit the Message Board to<br />
find out what <strong>your</strong> instructor <strong>and</strong> fellow students are up to.
Assignment #1<br />
For this assignment:<br />
1. Locate <strong>and</strong> visit <strong>your</strong> state's identity theft Web site. Go online <strong>and</strong> search for identity theft<br />
<strong>your</strong> state to find the appropriate Web site. Read through the information, <strong>and</strong> then print a<br />
copy of important phone numbers <strong>and</strong> resources, just in case you need them in the future.<br />
2. Using a Web search engine, locate <strong>and</strong> read at least two sources of information on<br />
keystroke loggers.<br />
3. Visit the following Web site, search for hoax in the main Search text box, <strong>and</strong> then browse<br />
the information on virus hoaxes:<br />
Symantec<br />
McAfee Security<br />
Sophos<br />
Urban Legends Reference Pages at Snopes.com<br />
Share any questions or interesting tidbits on the Message Board.<br />
Quiz #1<br />
Question 1:<br />
What's social engineering?<br />
A) Making data appear to come <strong>from</strong> somewhere other than where it really originated<br />
B) The sending of unsolicited commercial e-mail<br />
C) A method of obtaining sensitive information about a person through exploitation of human nature<br />
D) A type of information gathering done by installing surveillance software on a person's computer<br />
Question 2:<br />
Which of the following are types of <strong>viruses</strong>? (Check all that apply.)<br />
A) Phishing<br />
B) Boot sector<br />
C) Polymorphic<br />
D) Multipartite<br />
Question 3:<br />
Which of the following is a way <strong>spyware</strong> gets installed on <strong>your</strong> computer? (Check all that apply.)<br />
A) "Drive-by downloads" <strong>from</strong> Web pages running ActiveX or Java<br />
B) Sent in text e-mail messages<br />
C) Along with another program you intended to install<br />
D) Social engineering<br />
Question 4:<br />
Which type of virus turns <strong>your</strong> computer into a zombie <strong>and</strong> uses it to attack servers on the Internet?<br />
A) Trojan horse<br />
B) Polymorphic<br />
C) Botnet worm<br />
D) Macro virus<br />
<strong>Protect</strong> <strong>your</strong>self with <strong>spam</strong> blockers <strong>and</strong> <strong>spyware</strong> removers
With <strong>spam</strong> clogging <strong>your</strong> email inbox <strong>and</strong> <strong>spyware</strong> watching <strong>your</strong> every mouse click to send information about<br />
you to untrustworthy parties, it's time to take back control. This lesson shows you how to block <strong>spam</strong> <strong>and</strong> rid<br />
<strong>your</strong> <strong>PC</strong> of <strong>spyware</strong>.<br />
Using tools for blocking <strong>spam</strong><br />
Welcome back. Lesson 1 covered a wide variety of security threats <strong>your</strong><br />
computer faces every day. Now it's time to learn how to prevent <strong>your</strong> computer<br />
<strong>from</strong> being affected by threats in the first place. Let's start with <strong>spam</strong>.<br />
Underst<strong>and</strong>ing anti<strong>spam</strong> tools<br />
The old cat <strong>and</strong> mouse, <strong>spam</strong> sender <strong>and</strong> <strong>spam</strong> blocker, game goes on <strong>and</strong><br />
on. Attempts to legislate <strong>spam</strong> out of existence haven't worked, <strong>and</strong> proposals<br />
to completely rework the Internet's e-mail system proved to be too much to be<br />
workable. Nevertheless, you have many capable tools at <strong>your</strong> disposal that<br />
require neither legislation nor overhauling the Internet to do their jobs.<br />
Server <strong>and</strong> e-mail client tools<br />
There are two places where <strong>spam</strong> gets blocked: at the e-mail server <strong>and</strong> at the<br />
e-mail client on <strong>your</strong> <strong>PC</strong>. To clarify, the software you use to read <strong>and</strong> send email<br />
is called an e-mail client.<br />
In this lesson, client refers to e-mail software <strong>and</strong> user refers to the person who<br />
uses client software.<br />
Obviously, finding the <strong>spam</strong>mer's computers <strong>and</strong> smashing them would stop<br />
<strong>spam</strong> too, but that's not easy or legal. Your e-mail server, run by <strong>your</strong> company<br />
or ISP (internet service provider), provides an excellent spot to block <strong>spam</strong> with<br />
broad strokes. ISPs <strong>and</strong> corporate administrators subscribe to services that list<br />
domains known for <strong>spam</strong>ming so they can block all messages <strong>from</strong> those Web<br />
sites, following the black list approach.<br />
The advantages of filtering <strong>spam</strong> at the server include:<br />
Reduced e-mail traffic to users<br />
Less user time spent h<strong>and</strong>ling <strong>spam</strong><br />
The disadvantage is that one <strong>spam</strong> filter doesn't work for everyone because<br />
people define <strong>spam</strong> differently.<br />
For this reason, you should consider server tools as nothing more than the first<br />
line of <strong>spam</strong> control. When a server tool classifies a message as <strong>spam</strong>, it often<br />
tags the message subject line, perhaps adding ***<strong>spam</strong>*** to each suspect<br />
message. This makes it easy for client software to identify <strong>and</strong> separate out<br />
suspect messages.<br />
E-mail clients are the best place to apply finely tuned <strong>spam</strong> controls,<br />
because each user approaches <strong>spam</strong> in his own way, with his own<br />
tolerance level. Heuristic tools under the user's control, applied to<br />
messages already filtered at the server, provide the best <strong>spam</strong> reduction.<br />
Heuristic <strong>spam</strong> filtering<br />
The main tool in the <strong>spam</strong>-filter toolbox is heuristic filtering. Special software<br />
reads the contents of each message <strong>and</strong> compares words in that message<br />
» Laptop <strong>and</strong> tablet <strong>PC</strong>s
against words in typical <strong>spam</strong> messages. If many of the same words <strong>from</strong><br />
<strong>spam</strong> message examples also occur in the message being examined, it's<br />
marked as <strong>spam</strong>.<br />
The software doesn't actually read to underst<strong>and</strong>; instead, it makes a list of the<br />
words in the message. Spam filtering software doesn't assign meaning to those<br />
words; it just tracks <strong>and</strong> compares the words used to the words in its<br />
database.<br />
Black lists <strong>and</strong> white lists<br />
Black lists, historically, are lists of people you don't like, don't want to hear<br />
<strong>from</strong>, or want to go away. Such is the reasoning when calling lists of <strong>spam</strong>mers<br />
<strong>and</strong> their system addresses "black lists." You want them to go away, or at least<br />
you want to block all the messages coming <strong>from</strong> them.<br />
Black lists don't work with zombie <strong>PC</strong>s, however. A large amount of <strong>spam</strong><br />
continues to arrive <strong>from</strong> well-known companies or via service providers<br />
who turn a blind eye toward <strong>spam</strong>mers. Some filtering companies, for<br />
example, automatically block all traffic <strong>from</strong> Romania <strong>and</strong> China -- havens<br />
for <strong>spam</strong>mers. These <strong>and</strong> other third-world countries don't outlaw the<br />
practice of <strong>spam</strong> or don't bother to prosecute <strong>spam</strong>mers.<br />
A white list is exactly the opposite, <strong>and</strong> contains people you do want to hear<br />
<strong>from</strong> without any type of filtering. Companies add all their business partners to<br />
white lists at the company server level <strong>and</strong> at each individual user's computer.<br />
Using white lists becomes important when you configure <strong>spam</strong>-filtering tools to<br />
evaluate the contents of messages <strong>and</strong> decide whether or not content is <strong>spam</strong>.<br />
If you want to get jokes <strong>from</strong> <strong>your</strong> friends, put their addresses in <strong>your</strong> white list.<br />
If senders you thought were safe begin to send you <strong>spam</strong>, you can remove<br />
them <strong>from</strong> <strong>your</strong> white list <strong>and</strong> their messages will no longer get through to <strong>your</strong><br />
inbox.<br />
Microsoft Outlook refers to its white list as the Safe Senders List. The black list<br />
is called the Blocked Senders List.<br />
Enabling <strong>spam</strong> filtering in Outlook<br />
To enable <strong>spam</strong> filtering in <strong>your</strong> Outlook 2003 or 2007 client, select Tools ><br />
Options, click the Preferences tab, <strong>and</strong> then click the Junk E-mail button. The<br />
Junk E-mail Options dialog box opens. Select the High setting, as shown in<br />
Figure 2-1, for maximum <strong>spam</strong> filtering.
Figure 2-1: Select the High option for <strong>spam</strong> filtering.<br />
Enlarge image<br />
Outlook automatically places what it thinks is <strong>spam</strong> e-mail in <strong>your</strong> Junk E-mail<br />
folder.<br />
Setting up white <strong>and</strong> black lists in Outlook<br />
To add senders to <strong>your</strong> black list or white list in Outlook, right-click the<br />
message, select Junk E-mail, <strong>and</strong> then select Add Sender to Blocked Senders<br />
List or Add Sender to Safe Senders List, respectively, as shown in Figure 2-2.<br />
Figure 2-2: Junk E-mail lists.<br />
Enlarge image<br />
You can add an individual sender to either list, or you can add the sender's<br />
entire domain (the part of the address after the @ sign) to the Safe Senders<br />
List. You can also add the recipient to <strong>your</strong> Safe Recipients List. This is useful<br />
if you use Outlook to read e-mail <strong>from</strong> several different e-mail addresses.<br />
If you become overzealous in <strong>your</strong> <strong>spam</strong> filtering, you'll lose some non-<strong>spam</strong>
messages. These fall into a group called false positives, which means <strong>your</strong><br />
software identifies a good message as <strong>spam</strong>. Be sure to tell <strong>your</strong> e-mail<br />
software about false positives as well as <strong>spam</strong>. Every bit of information helps<br />
the filters identify <strong>spam</strong> more accurately <strong>and</strong> avoid false positives.<br />
To correct a false positive in Outlook, right-click the e-mail message in the Junk<br />
E-mail folder, <strong>and</strong> then select Junk E-mail > Mark as Not Junk <strong>from</strong> the<br />
shortcut menu.<br />
You should check <strong>your</strong> <strong>spam</strong> filter folders periodically, at least once per day, to<br />
be sure you aren't missing any real messages. In addition, make sure you<br />
browse subject lines before deleting messages to make sure you don't delete a<br />
good message by mistake.<br />
Using safe e-mail practices to reduce <strong>spam</strong><br />
Other general safety tips for e-mail clients include:<br />
Delete unsolicited e-mail messages if you don't know the sender. Don't open<br />
attachments, because some <strong>spam</strong> messages also contain documents with<br />
<strong>viruses</strong>.<br />
Don't use the preview function of <strong>your</strong> e-mail software. It may automatically<br />
show that you read the message <strong>and</strong> that you have a valid e-mail address.<br />
Use the bcc (blind carbon copy) feature when sending e-mail messages to<br />
multiple people to hide their e-mail addresses. This prevents people <strong>from</strong><br />
seeing the other e-mail addresses <strong>and</strong> collecting them for <strong>spam</strong> purposes.<br />
Now that you've learned some basic ways to reduce <strong>spam</strong>, read on to learn<br />
what to do about <strong>spyware</strong>.<br />
Using anti<strong>spyware</strong> software<br />
Bad news: No one program can catch <strong>and</strong> eliminate all the <strong>spyware</strong> on one<br />
computer. You need a combination of tools -- some for screening <strong>and</strong> cleaning<br />
<strong>and</strong> some for active monitoring to keep <strong>your</strong> computer <strong>spyware</strong>-free.<br />
Many users looking for help turn to Microsoft. The company has a software<br />
package called Windows Defender, shown in Figure 2-3, that comes with<br />
Windows Vista or is available as a free download <strong>from</strong> the Microsoft Web site<br />
for previous Windows versions. Windows Defender rids <strong>your</strong> computer of<br />
<strong>spyware</strong> already installed <strong>and</strong> helps keep it free <strong>from</strong> <strong>spyware</strong> thereafter.<br />
Figure 2-3: Windows Defender comes with Windows Vista.<br />
Enlarge image<br />
You can access Windows Defender <strong>from</strong> the Vista Control Panel, or through<br />
Start > All Programs in Windows Vista or Windows XP. It's free, it works, <strong>and</strong> it<br />
h<strong>and</strong>les automatic updates.<br />
» HP TouchSmart desktop<br />
<strong>PC</strong>s
Other good anti<strong>spyware</strong> software packages include Lavasoft Ad-Aware, Spybot<br />
- S&D (Search & Destroy), <strong>and</strong> Webroot Spy Sweeper. You can find these <strong>and</strong><br />
many more <strong>spyware</strong> applications on Download.com. Most offer free 30-day<br />
trials so you can test drive them before you commit to buying anything. Ad-<br />
Aware <strong>and</strong> Spybot-S&D are available as freeware, which makes them<br />
particularly attractive to security-conscious <strong>PC</strong> users on tight budgets.<br />
Run some type of <strong>spyware</strong> removal software on a regular schedule -- once a<br />
day for maximum protection. Scanning once or twice each week works well for<br />
many people <strong>and</strong> offers a good balance between constantly cleaning <strong>your</strong><br />
computer <strong>and</strong> leaving a <strong>spyware</strong> gate open too long on <strong>your</strong> system.<br />
Most software packages enable you to set up automated scans on a regular<br />
schedule, as shown in Figure 2-4. In this way, you can configure the scan to<br />
run at a time when you aren't likely to be working on <strong>your</strong> computer. In addition,<br />
scheduling ensures the software runs regularly <strong>and</strong> not just when you happen<br />
to remember it.<br />
Figure 2-4: Scheduling Windows Defender to run every day or once a week.<br />
Enlarge image<br />
Some of the tools used to protect <strong>your</strong> system against <strong>spyware</strong> also work<br />
against <strong>viruses</strong>, which you'll learn about in Lesson 3.<br />
A firewall watches outgoing traffic <strong>and</strong> can help identify <strong>spyware</strong>, because it<br />
tracks applications that transmit <strong>your</strong> personal information out over the Internet<br />
to any third parties. You'll learn about firewalls next.<br />
Using a firewall<br />
Always-connected computers, typical with cable <strong>and</strong> DSL (digital subscriber<br />
line) modems, give attackers copious amounts of time to discover <strong>and</strong> exploit<br />
computer vulnerabilities. A firewall is a component placed on computers or<br />
between a computer <strong>and</strong> the Internet to help eliminate undesired access by the<br />
outside world. Hardware firewalls are dedicated appliances that run only<br />
firewall software. Software firewalls install on a regular operating system, such<br />
as Windows, along with other applications.<br />
» <strong>PC</strong> Learning center
Types of firewalls<br />
Firewalls come in two varieties: network firewalls <strong>and</strong> host-based or "personal"<br />
firewalls. Like most other solutions, each has its strengths <strong>and</strong> weaknesses.<br />
Personal firewalls<br />
You install personal firewalls on individual <strong>PC</strong>s. Typically, the first time a<br />
program tries to access the Internet, a personal firewall asks whether it should<br />
allow the communication. Here's a list of the most commonly used personal<br />
firewalls (those marked with an asterisk come in freeware editions):<br />
Windows Firewall*<br />
Sunbelt/Kerio Personal Firewall*<br />
Comodo Personal Firewall*<br />
McAfee Internet Security Suite<br />
Norton Internet Security<br />
Zone Labs ZoneAlarm*<br />
Network firewalls<br />
Network firewalls provide an additional outer layer of defense that can more<br />
effectively hide connected <strong>PC</strong>s. Inexpensive routers move traffic between the<br />
Internet <strong>and</strong> computers on home networks, which hide the IP addresses of<br />
computers so that all outgoing traffic seems to come <strong>from</strong> the same address.<br />
Network firewalls can be hardware or software based. They are installed at the<br />
network edge or perimeter, directly between the Internet <strong>and</strong> <strong>your</strong> LAN (local<br />
area network).<br />
Even a good firewall can't protect <strong>your</strong> computer <strong>and</strong> <strong>your</strong> personal information<br />
if you don't think before you download. A firewall is only one part of a<br />
comprehensive security strategy. Always exercise a proper level of caution. No<br />
system is foolproof, but the right combination of hardware, software, <strong>and</strong> good<br />
habits will make <strong>your</strong> computing environment safer.<br />
Using Windows Firewall<br />
Microsoft Windows Vista <strong>and</strong> Windows XP Service Pack 2 come with a built-in<br />
firewall called Windows Firewall. Be sure it's enabled if you aren't running a<br />
third-party firewall package.<br />
To enable Windows Firewall, select:<br />
Start > Control Panel > Security > Security Center (in Windows Vista,<br />
Category view)<br />
Start > Control Panel > Security (in Windows XP, Category view)<br />
In Security Center, if the Firewall setting indicates OFF, click Windows Firewall<br />
at the bottom or the right side of the window. (In Windows Vista, click Change<br />
settings.) In the Windows Firewall Settings dialog box, select On<br />
(recommended), <strong>and</strong> then click OK. Figure 2-5 shows Windows Firewall<br />
enabled.
Figure 2-5: Windows Vista Windows Firewall Settings dialog box.<br />
The tools described in this lesson should get you well on <strong>your</strong> way to protecting<br />
<strong>your</strong> computer <strong>from</strong> the various threats on the Internet today. Try them out <strong>and</strong><br />
see which ones work best for you. Next, learn how to reduce <strong>spam</strong> by working<br />
with an ISP.<br />
Working with an ISP to reduce <strong>spam</strong> <strong>and</strong> <strong>spyware</strong><br />
Your ISP doesn't want to send you <strong>spam</strong> -- it costs them b<strong>and</strong>width. ISPs love<br />
to help reduce <strong>your</strong> <strong>spam</strong> load.<br />
The most popular <strong>spam</strong> filtering application for ISPs <strong>and</strong> many companies is<br />
called SpamAssassin. This open source software can be difficult to configure<br />
on servers, but its programmers have improved the general user interface to<br />
make it close-to-acceptable for any computer user.<br />
Black holes <strong>and</strong> <strong>spam</strong> lists<br />
Verify <strong>your</strong> ISP includes some top-level broadcasting controls, such as<br />
SpamAssassin, <strong>and</strong> the various black lists. Some service providers force you to<br />
actively request such service to maintain their server status.<br />
Also ask <strong>your</strong> ISP about dictionary attack protections <strong>and</strong> how it monitors such<br />
attacks. Smart intrusion detection software can chart the source of e-mail<br />
streams, <strong>and</strong> you can search back up the river when necessary. You might not<br />
be able to locate the <strong>spam</strong>mer or the country of origin, but sometimes you get<br />
lucky.<br />
First-pass <strong>spam</strong> filtering<br />
Setting specific <strong>spam</strong> filtering levels -- such as Low, Medium, or High protection<br />
-- on a user's e-mail account should be left to each company or individual, not<br />
the ISP's administrators. Server-based filtering software has rather crude<br />
setting options that enable you to tighten or loosen the restrictions, depending<br />
on how many "real" messages are being tagged as <strong>spam</strong>.<br />
» <strong>PC</strong> Accessories features<br />
guide
Enable virus filtering<br />
Many server-based <strong>spam</strong> products include virus <strong>and</strong> <strong>spyware</strong> filtering. Check<br />
with <strong>your</strong> ISP, <strong>and</strong> if it's available, try it. The more electronic eyes you have<br />
watching the messages, Web pages, <strong>and</strong> files coming into <strong>your</strong> computer, the<br />
better.<br />
Your ISP can be a valuable ally when it comes to protecting <strong>your</strong> inbox <strong>from</strong><br />
<strong>spam</strong>, but there's even more you can do. Read on to learn about some of the<br />
ways you can avoid becoming a <strong>spam</strong> <strong>and</strong> <strong>spyware</strong> target.<br />
Going beyond <strong>spam</strong> <strong>and</strong> <strong>spyware</strong> tools<br />
Besides using anti<strong>spam</strong> <strong>and</strong> anti<strong>spyware</strong> tools, there are other things you can<br />
do to help stop <strong>spam</strong> <strong>and</strong> <strong>spyware</strong>. The following methods give you tips for<br />
changing <strong>your</strong> computing habits <strong>and</strong> making <strong>your</strong> computing environment even<br />
safer.<br />
Use an alternate e-mail address<br />
As an individual, the e-mail address provided by <strong>your</strong> ISP is <strong>your</strong> primary<br />
address. Guard this address by giving it out carefully, <strong>and</strong> keep it hidden when<br />
possible. Many users get a second or third e-mail address to use on<br />
newsgroups, discussion boards, <strong>and</strong> other places where address harvesting<br />
software patrols.<br />
All of the free e-mail services, such as Yahoo! Mail, Hotmail, <strong>and</strong> Gmail, offer<br />
Web-based e-mail software, so you can check <strong>your</strong> e-mail without downloading<br />
the messages <strong>and</strong> possibly getting <strong>spyware</strong> or <strong>viruses</strong>. You can delete <strong>your</strong><br />
Web e-mail account when it becomes overloaded with <strong>spam</strong>.<br />
Avoid using HTML in <strong>your</strong> e-mail client<br />
Set <strong>your</strong> e-mail program not to open or preview e-mail in HTML (Hypertext<br />
Markup Language) format. HTML messages can contain Web beacons, tiny<br />
invisible images that are downloaded <strong>from</strong> the <strong>spam</strong>mer's server when you<br />
view the message, thus letting the <strong>spam</strong>mer know that you opened it <strong>and</strong> that<br />
<strong>your</strong> address is valid.<br />
To prevent Outlook <strong>from</strong> automatically previewing e-mail, go to the Inbox <strong>and</strong><br />
do the following:<br />
Outlook 2007: Select View > Current View > Messages.<br />
Outlook 2003: Select View > Arrange By > Current View > Messages.<br />
To read all e-mail in plain text only:<br />
Outlook 2007: Select Tools > Trust Center, <strong>and</strong> then click E-mail Security in<br />
the left pane. Check the Read all st<strong>and</strong>ard mail in plain text <strong>and</strong> Read all<br />
digitally signed mail in plain text checkboxes, <strong>and</strong> then click OK.<br />
Outlook 2003: Select Tools > Options, click the Preferences tab if it's not<br />
already selected, <strong>and</strong> then click E-mail Options. Check the Read all<br />
st<strong>and</strong>ard mail in plain text <strong>and</strong> Read all digitally signed mail in plain text<br />
checkboxes, <strong>and</strong> then click OK.<br />
If you can't live without fancy fonts in <strong>your</strong> e-mail, at least turn off the automatic<br />
image downloading, because images can also link back to a third party. Here's<br />
how:<br />
» Storage feature guide
Outlook 2007: Select Tools > Trust Center, <strong>and</strong> then click Automatic<br />
Download. Ensure the Don't download pictures automatically in HTML e-mail<br />
messages or RSS items checkbox is checked, <strong>and</strong> then click OK.<br />
Outlook 2003: Select Tools > Options, <strong>and</strong> then click the Security tab. Under<br />
Download Pictures, click Change Automatic Download Settings. Check the<br />
Don't download pictures or other content automatically in HTML e-mail<br />
checkbox. Click OK.<br />
Say no to e-mail offers<br />
Always check the "No" box for future e-mail offers on every form you fill out<br />
online, unless you specifically want a company's newsletter or other materials.<br />
Don't click links in e-mails<br />
Don't click links inside <strong>spam</strong> e-mail messages. That signals to the <strong>spam</strong>mer<br />
<strong>your</strong> address is valid, <strong>and</strong> they'll use it again <strong>and</strong> again. In addition, do not<br />
believe unsolicited e-mails offering free "<strong>spyware</strong> cleaning" Web sites. These<br />
almost always infect systems rather than clean them.<br />
Be careful when opting out<br />
Select the opt-out option only for well-known companies sending you e-mail.<br />
The CAN-SPAM Act of 2003 forces companies to include an opt-out form for<br />
users who do not wish to receive any more e-mail. You reach that form by<br />
clicking a link inside the e-mail message, which is a bad idea on <strong>spam</strong> <strong>from</strong><br />
companies you don't recognize. Large, reputable American companies will<br />
honor <strong>your</strong> request to unsubscribe to their mailing lists. Spammers, on the<br />
other h<strong>and</strong>, will continue to send <strong>spam</strong> because you verified that <strong>your</strong> e-mail<br />
account was active by unsubscribing to the e-mail.<br />
Keep <strong>your</strong> computer updated<br />
Most vendors provide patches that fix vulnerabilities or bugs in their software,<br />
free of charge on their Web sites. After you purchase software, visit the<br />
vendor's Web site to see if <strong>and</strong> how the vendor supplies patches. Some<br />
vendors, such as Microsoft, let you receive patch notices via e-mail by<br />
subscribing to mailing lists on their Web sites or through automatic updates.<br />
Set Windows Update in Control Panel's Security Center to automatically<br />
download <strong>and</strong> install Microsoft Critical Updates, as shown in Figure 2-6.<br />
This is called Automatic Updates.<br />
Figure 2-6: Set Windows Update to install critical updates automatically.
Enlarge image<br />
Microsoft releases its critical patches the second Tuesday of each month. If<br />
you want to get the update immediately, you must run Windows Update<br />
manually or it may take a few days before <strong>your</strong> computer will be scheduled (by<br />
Microsoft) to receive the update. Owing to server limitations, Microsoft can't<br />
deliver the updates to everyone on the same day. It may take up to 7 days to<br />
get the updates automatically.<br />
Use Microsoft Update to get updates for Microsoft applications such as<br />
Microsoft Office programs, as well as operating system updates.<br />
Be careful what you download<br />
Don't download files <strong>from</strong> any but the most trusted Web sites. You should<br />
assume that any files found on peer-to-peer networks or adult content Web<br />
sites will infect <strong>your</strong> system with <strong>spyware</strong> or worse. In addition, don't buy<br />
anything <strong>from</strong> an unsolicited e-mail. This encourages the <strong>spam</strong>mers to <strong>spam</strong><br />
more.<br />
Use a pop-up blocker<br />
Get a Web browser or add-in software that blocks pop-ups. Windows Internet<br />
Explorer 7 has the built-in Pop-up Blocker tool, <strong>and</strong> the Google toolbar blocks<br />
pop-ups for you also. Remember, active code hidden in pop-up ads spreads<br />
<strong>spyware</strong>.<br />
To see how well <strong>your</strong> system blocks pop-ups, visit Popup Check.com <strong>and</strong> take<br />
the pop-up tests available there. You'll also find related software ratings there,<br />
<strong>and</strong> a "Top 10" list as well.<br />
Moving on<br />
In this lesson, you learned how to eliminate <strong>spam</strong> <strong>and</strong> <strong>spyware</strong> <strong>from</strong> <strong>your</strong><br />
computer. In Lesson 3, you'll learn how to protect <strong>your</strong> <strong>PC</strong> <strong>from</strong> <strong>viruses</strong>. Before<br />
you move on, complete the assignment <strong>and</strong> take the quiz for this lesson, <strong>and</strong><br />
then head over to the Message Board to join the discussion on <strong>spam</strong> <strong>and</strong><br />
<strong>spyware</strong>.<br />
Assignment #2<br />
As you discovered in Lesson 2, it's vital to thwart <strong>spam</strong>, use anti<strong>spyware</strong> software, <strong>and</strong> have a<br />
firewall installed <strong>and</strong> configured on <strong>your</strong> computer. This assignment has three parts pertaining to<br />
<strong>spam</strong> filters, using Windows Defender to search for <strong>and</strong> remove <strong>spyware</strong>, <strong>and</strong> configuring Windows<br />
Firewall to block intruders <strong>from</strong> accessing <strong>your</strong> computer.<br />
Using a <strong>spam</strong> filter<br />
Check <strong>your</strong> e-mail client to determine if you have a <strong>spam</strong> control feature <strong>and</strong> that it's enabled. If you<br />
don't have <strong>spam</strong> control, visit About.com's Top 10 Free Spam Filters for Windows or Download.com<br />
to find a <strong>spam</strong>-filtering program that's right for you. Configure the program of <strong>your</strong> choice to filter<br />
<strong>spam</strong> for one week <strong>and</strong> see how much <strong>your</strong> <strong>spam</strong> is reduced.<br />
When you gain the upper h<strong>and</strong> over the flood of <strong>spam</strong> you get today, you'll know the assignment was<br />
a success.<br />
Using Windows Defender
To use Windows Defender, perform the following steps:<br />
1. If you run Windows XP, download Windows Defender <strong>from</strong> the Microsoft Web site, <strong>and</strong> then<br />
install it on <strong>your</strong> computer. If you run Windows Vista, skip to step 2.<br />
2. Open Windows Defender (select Start > All Programs > Windows Defender, or select Start,<br />
enter Windows Defender in the Vista Start Search text box, <strong>and</strong> then select it <strong>from</strong> the list).<br />
3. Check for new malware definitions. (Click the down-facing arrow at the right end of the<br />
toolbar, <strong>and</strong> then select Check for updates.) Click Continue or enter administrator credentials<br />
in Windows Vista, if prompted.<br />
4. Conduct a quick scan of <strong>your</strong> system (click Scan on the toolbar). Did you find any malware?<br />
5. Click Tools > Options. In the Options screen, configure Windows Defender to run every day at<br />
a time of <strong>your</strong> choice <strong>and</strong> to check for updated definitions before scanning. Save the settings<br />
<strong>and</strong> close Windows Defender.<br />
Using Windows Firewall<br />
Determine whether <strong>your</strong> computer has a third-party personal firewall installed, such as <strong>from</strong> Norton,<br />
McAfee, Zone Labs, Sunbelt, <strong>and</strong> so on. If not, ensure that Windows Firewall is enabled by<br />
performing the following steps:<br />
1. Open Windows Firewall (select Start > Control Panel, find <strong>and</strong> open Security Center, <strong>and</strong> then<br />
click Windows Firewall).<br />
2. If the Windows Firewall is off, click Change settings. Click Continue or enter administrator<br />
credentials in Windows Vista, if prompted.<br />
3. Click the On (recommended) option button. If you plan to connect to unsecure networks <strong>and</strong><br />
want more protection, click the Block all incoming connections checkbox. However, this<br />
prevents some of <strong>your</strong> Internet programs <strong>from</strong> working.<br />
4. Click the Exceptions tab to note which programs are allowed through the firewall. You can add<br />
programs here, if necessary.<br />
5. Apply the settings, close Windows Firewall, <strong>and</strong> then close all open windows.<br />
Stop by the Message Board <strong>and</strong> discuss which firewall you use <strong>and</strong> why. If you've learned about<br />
settings that might help <strong>your</strong> classmates, discuss them <strong>and</strong> how they work.<br />
Quiz #2<br />
Question 1:<br />
True or False: One of the most effective methods for reducing <strong>spam</strong> is through the use of anti<strong>spyware</strong> software.<br />
A) True<br />
B) False<br />
Question 2:<br />
What's a black list?<br />
A) A list of people whose messages should always be blocked before they make it to <strong>your</strong> inbox<br />
B) A list of e-mail that's not marked Urgent<br />
C) A list of people whose messages should always be delivered to you immediately<br />
D) A list of security practices that are followed by every ISP<br />
Question 3:<br />
Which types of software tools do you need to effectively protect <strong>your</strong>self <strong>from</strong> <strong>spyware</strong>? (Check all that apply.)<br />
A) Firewall<br />
B) Image scanner<br />
C) Spyware scanning <strong>and</strong> removal tool<br />
D) Spam blocker<br />
Question 4:<br />
True or False: A firewall is a component placed on computers or between a computer <strong>and</strong> the Internet to help
eliminate undesired access by the outside world.<br />
A) True<br />
B) False<br />
Question 5:<br />
What are some ways you can stop <strong>spam</strong> before it's ever sent to you? (Check all that apply.)<br />
A) Use an alternate e-mail address<br />
B) Subscribe to the Do Not E-mail list<br />
C) Don't click links in <strong>spam</strong> e-mails<br />
D) Be careful about the opt-out links you click<br />
Virus protection basics<br />
Without antivirus software installed, you're open to attack <strong>from</strong> a host of threats that can crash <strong>your</strong> computer in<br />
a heartbeat. This lesson will show you how to protect <strong>your</strong> computer <strong>from</strong> <strong>viruses</strong> <strong>and</strong> keep the software up to<br />
date.<br />
Why you need antivirus software<br />
As you learned in Lessons 1 <strong>and</strong> 2, there's a variety of malware that can affect<br />
<strong>your</strong> computer. If you don't have antivirus software installed on <strong>your</strong> computer,<br />
it's simply a matter of time before it becomes infected with a virus or worm <strong>and</strong><br />
possibly becomes inoperable <strong>and</strong>/or is used to infect other computers. New<br />
<strong>viruses</strong> <strong>and</strong> vulnerabilities surface daily, so you must be prepared to keep <strong>your</strong><br />
computer safe.<br />
A few times each year, a potentially devastating virus surfaces <strong>and</strong> spreads<br />
very quickly, infecting countless computers around the world. To make matters<br />
worse, if <strong>your</strong> computer is spreading a virus, there's the chance that <strong>your</strong> ISP<br />
will disable <strong>your</strong> account <strong>and</strong> not grant you access until <strong>your</strong> computer is<br />
cleaned <strong>and</strong> protected.<br />
If you use <strong>your</strong> home desktop or notebook computer to connect to <strong>your</strong><br />
company's network when working <strong>from</strong> home, it's essential you install<br />
antivirus software to prevent spreading <strong>viruses</strong> to the office network. Some<br />
companies have their firewalls set up to check all computers that try to<br />
connect remotely <strong>and</strong> disallow access to those that don't have updated<br />
antivirus programs running, personal firewall software properly configured,<br />
<strong>and</strong> the latest service packs <strong>and</strong> security updates installed.<br />
How antivirus software works<br />
Virus writers release a virus, it's discovered, <strong>and</strong> then an antivirus company<br />
finds a remedy for it. Once someone has detected <strong>and</strong> analyzed a virus, it's<br />
possible to write programs that look for specific characteristics of the virus,<br />
such as the following:<br />
Scanner software: Searches all files in the boot sector, in memory, <strong>and</strong> on<br />
<strong>your</strong> hard disk for code that uniquely identifies a file as a virus. This is the<br />
most common method of virus detection available, <strong>and</strong> is implemented in all<br />
major antivirus software programs.<br />
Interception software: Also called activity monitoring software, it examines<br />
the computer for virus-like behavior, <strong>and</strong> then warns the user about the<br />
behavior.<br />
Heuristics: In the case of new <strong>viruses</strong> for which no remedy has been<br />
created, scanning software uses heuristics -- a generic method of virus<br />
detection -- that looks for unusual virus-like activity on <strong>your</strong> computer.<br />
Integrity checker: Records integrity information about important files on <strong>your</strong><br />
hard disk, usually by checking for changes in a file. This method creates a<br />
"blueprint" (called a checksum) of the contents of every file on the computer.<br />
» Laptop <strong>and</strong> tablet <strong>PC</strong>s
Each time a file is opened, the virus scanner recomputes the checksum <strong>and</strong><br />
compares to the one it has stored in its database, to see if the file has<br />
changed. This method is also called change detection.<br />
For a virus to be successful, it must replicate its code. The key to antivirus<br />
software is detection. Viruses also have variants or copycat <strong>viruses</strong> that<br />
emerge after the initial outbreak, which make up the bulk of known <strong>viruses</strong>.<br />
After the software detects infected files, you can sometimes repair them. If not,<br />
you can quarantine them so that the viral code won't execute.<br />
Next, learn how to select an antivirus software package.<br />
Selecting an antivirus software program<br />
An antivirus software program may or may not come with <strong>your</strong> home computer.<br />
Sometimes a newly purchased computer might include a trial version or it may<br />
include a subscription for a number of months. Here are some considerations<br />
for evaluating antivirus programs:<br />
Does the software automatically scan a file when you send an e-mail<br />
attachment?<br />
Can you configure the software to update virus signatures automatically?<br />
How often are updates typically made available by the antivirus vendor?<br />
Can the virus checker clean <strong>and</strong> repair a file or does it just quarantine it?<br />
Can you check every file that <strong>your</strong> computer receives?<br />
When selecting an antivirus application, you should evaluate or read up on the<br />
popular programs <strong>and</strong> decide which you think would best suit <strong>your</strong> needs. The<br />
two most popular antivirus software packages are Symantec's Norton AntiVirus<br />
<strong>and</strong> McAfee's VirusScan, which you can purchase as st<strong>and</strong>alone products or<br />
as part of each company's protection suites. The following describes these<br />
packages <strong>and</strong> offerings <strong>from</strong> some of the other major antivirus software<br />
vendors:<br />
avast!: Detects <strong>and</strong> removes known <strong>viruses</strong>, can detect the basic activities of<br />
self-modifying <strong>viruses</strong>, <strong>and</strong> includes a script blocker, IM shield, <strong>and</strong> virus<br />
cleaner. ALWIL Software creates avast!. A free version is available.<br />
AVG: Provides basic antivirus protection free for home <strong>and</strong> non-commercial<br />
use, more comprehensive antivirus, anti<strong>spyware</strong>, anti<strong>spam</strong>, <strong>and</strong> firewall<br />
protection in the paid version. Grisoft created AVG <strong>and</strong> offers AVG AntiVirus<br />
Free Edition, among other products.<br />
F-Secure: Includes a variety of products -- antivirus, <strong>spam</strong>, <strong>and</strong> firewall<br />
protection -- for home users, small businesses, <strong>and</strong> large enterprises. It also<br />
provides Web site-based <strong>and</strong> wireless solutions for mobile workers against<br />
<strong>viruses</strong> <strong>and</strong> malicious code.<br />
McAfee: McAfee offers a family of antivirus <strong>and</strong> <strong>spyware</strong> software for<br />
Windows <strong>and</strong> wireless protection, which includes Internet security software,<br />
personal computer updates, hacker protection, <strong>and</strong> antivirus downloads. It<br />
also offers evaluation versions for business or home users.<br />
Symantec: Symantec offers a variety of software that blocks worms <strong>and</strong><br />
detects <strong>and</strong> removes <strong>viruses</strong>. Its features include automatic virus, worm, <strong>and</strong><br />
Trojan horse removal; IM attachment scanning <strong>and</strong> cleaning; <strong>and</strong> <strong>spyware</strong><br />
<strong>and</strong> keystroke logging program detection. The company also provides a<br />
special version adapted for mobile devices.<br />
P<strong>and</strong>a: P<strong>and</strong>a Security offers protection against <strong>viruses</strong>, <strong>spyware</strong>, hackers,<br />
<strong>and</strong> other threats. It also has the ability to scan <strong>your</strong> computer on dem<strong>and</strong><br />
any time you have Internet access.<br />
<strong>PC</strong>-cillin: From Trend Micro, this software protects <strong>your</strong> <strong>PC</strong> <strong>and</strong> home<br />
network against all types of <strong>viruses</strong>, worms, Trojan horses, <strong>and</strong> blended<br />
threats. It also detects <strong>and</strong> removes <strong>spyware</strong>, filters unwanted content, <strong>and</strong><br />
minimizes <strong>spam</strong>.<br />
Sophos: <strong>Protect</strong>s <strong>your</strong> network, desktop, <strong>and</strong> remote notebook computers<br />
<strong>from</strong> <strong>viruses</strong>, Trojan horses, worms, <strong>and</strong> <strong>spyware</strong>. You can use Sophos on<br />
multiple platforms.<br />
Virus scanning <strong>and</strong> other Internet security protection can also be performed<br />
» HP TouchSmart desktop<br />
<strong>PC</strong>s
y Web-based services such as Microsoft's Windows Live OneCare, which<br />
includes performance tuning <strong>and</strong> backup <strong>and</strong> restore in addition to<br />
antivirus, anti<strong>spyware</strong>, antiphishing, <strong>and</strong> firewall protection.<br />
After you select an antivirus software program, it's time to install <strong>and</strong> run it for<br />
the first time. If you've never used antivirus software on <strong>your</strong> computer, you<br />
need to take some extra steps so that the antivirus software can scan all the<br />
files on <strong>your</strong> hard disk the first time it runs. You'll learn how to prep <strong>your</strong><br />
computer, <strong>and</strong> install <strong>and</strong> run antivirus software, in the next section.<br />
Scanning <strong>and</strong> cleaning <strong>your</strong> computer for the first time<br />
Scanning <strong>and</strong> cleaning <strong>your</strong> computer involves three main steps: installing<br />
antivirus software, updating the software, <strong>and</strong> then scanning <strong>your</strong> computer's<br />
drives. These are described in the following sections.<br />
The installation<br />
This part is easy. Just close all running programs, insert the antivirus software<br />
CD-ROM into <strong>your</strong> computer or double-click the .exe file you downloaded <strong>from</strong><br />
a manufacturer's Web site, <strong>and</strong> follow the prompts.<br />
When you install a program in Windows Vista, the UAC (User Account<br />
Control) feature requires that you type in administrator credentials or click<br />
Continue if you're logged on as an administrator before you can proceed<br />
with the installation.<br />
The software installer extracts all of the files you need <strong>and</strong> runs a wizard that<br />
steps you through the process. When prompted, install <strong>your</strong> antivirus software<br />
to the default location on <strong>your</strong> hard disk or select a different drive if the default<br />
disk doesn't have enough free space. Select to run a brief pre-install system<br />
scan if the installer software suggests it.<br />
For demonstration purposes, this lesson uses Symantec's Norton Internet<br />
Security 2007 software on Windows Vista.<br />
The update<br />
Because <strong>your</strong> software needs to be as current as possible, one of the first<br />
processes <strong>your</strong> antivirus software may perform is to update the virus definition<br />
file. Often, it does this automatically during installation if you have a live Internet<br />
connection. You can also perform this procedure directly after the installation.<br />
Upon opening <strong>your</strong> software, you can update the virus definition file by clicking<br />
Run LiveUpdate in the lower left pane. The LiveUpdate Wizard starts, as shown<br />
in Figure 3-1, displaying a list of components installed on <strong>your</strong> computer. Click<br />
Next to check for updates for the components. On the Options screen, select<br />
which updates you want to apply, <strong>and</strong> then click Next. When the software<br />
confirms that the components are up to date, click Finish. When prompted to<br />
restart <strong>your</strong> computer, click OK.<br />
» <strong>PC</strong> Learning center
Figure 3-1: LiveUpdate Wizard.<br />
The scan<br />
Now it's time to scan <strong>your</strong> computer. To open the antivirus software, select<br />
Start > All Programs > Norton Internet Security > Norton Internet Security. On<br />
the Norton Internet Security screen, click Run a Scan, <strong>and</strong> then click Run Full<br />
System Scan, as shown in Figure 3-2. The software begins scanning all <strong>your</strong><br />
files.<br />
Figure 3-2: A full system scan checks all the files on <strong>your</strong> computer.<br />
Depending on the size of <strong>your</strong> hard disk, scanning <strong>your</strong> system can take<br />
anywhere <strong>from</strong> a few minutes to an hour or more.<br />
After the scan is complete, if any <strong>viruses</strong> are found, the software fixes or<br />
quarantines them. The results of the scan are displayed to you with any<br />
attention required <strong>from</strong> you, as shown in Figure 3-3.<br />
Figure 3-3: Results of a scan.<br />
Enlarge image<br />
After initial installation, the antivirus software runs continuously in the<br />
background to help prevent any infections. However, you should run a manual<br />
antivirus scan weekly, just to make sure nothing slipped through. In Norton
Internet Security, select Configure a Scan > Manage Custom Scans. You can<br />
select only certain drives, folders, or files to scan, reducing the time required for<br />
a full system scan. For best results, select Scan drives, <strong>and</strong> then select the C:<br />
drive.<br />
Now that you know how to install antivirus software, update it initially, <strong>and</strong> then<br />
scan <strong>your</strong> system, read on to learn how to clean <strong>and</strong> troubleshoot an infected<br />
computer.<br />
Cleaning <strong>and</strong> troubleshooting an infected system<br />
If <strong>your</strong> computer is severely infected, the antivirus software might not run. If<br />
that's the case, there are a few options you can try.<br />
Boot into safe mode<br />
Safe mode disables most drivers <strong>and</strong> running programs. To boot in safe mode,<br />
restart <strong>your</strong> computer <strong>and</strong> press the F8 key (after the initial black-<strong>and</strong>-white<br />
screen but before the Windows splash screen) until you get to a boot menu<br />
screen. With Windows Vista, XP, 2000, use <strong>your</strong> arrow keys to select Safe<br />
Mode with Networking Support. After the computer boots, try to run the<br />
antivirus software again. If the antivirus software still won't run after booting into<br />
safe mode, try scanning <strong>your</strong> system using an online tool.<br />
Scan <strong>your</strong> system online<br />
Because the same antivirus software methods are in use all over the world,<br />
virus writers attempt to defeat antivirus protection by creating <strong>viruses</strong> that<br />
disable the software. If this happens <strong>and</strong> you're running Windows, do the<br />
following:<br />
1. Open Microsoft Internet Explorer, <strong>and</strong> then go to the HP Personal<br />
computing security center Web page.<br />
2. Click the Clean <strong>your</strong> <strong>PC</strong> link, <strong>and</strong> then click the Symantec: Security<br />
connection link. The Symantec Your Security Resource Web page<br />
appears. Scroll down <strong>and</strong> click the Symantec Security Check Test<br />
button, as shown in Figure 3-4.<br />
Figure 3-4: The Symantec Security Check Test button.<br />
1.<br />
2.<br />
On the resulting Web page, click the Go button.<br />
The Symantec Security Check Web page appears, a portion of which is<br />
shown in Figure 3-5. Click the Virus Detection Start button.<br />
Cleaning System Restore<br />
Viruses can insert<br />
themselves into <strong>your</strong> restore<br />
directory in Windows XP or<br />
Windows Vista. When you<br />
restore the computer, the<br />
virus is restored as well. If<br />
<strong>your</strong> computer has been<br />
infected with a virus, after it's<br />
removed it's a good idea to<br />
open System Restore <strong>and</strong><br />
delete restore points with<br />
dates that occurred while the<br />
virus was active. This<br />
prevents the computer <strong>from</strong><br />
becoming reinfected when<br />
you use System Restore. To<br />
open System Restore, select<br />
Start > All Programs ><br />
Accessories > System Tools<br />
> System Restore. Follow the<br />
prompts to delete specific<br />
System Restore dates.<br />
» <strong>PC</strong> Accessories features<br />
guide
Figure 3-5: Symantec Security Check Web page.<br />
Enlarge image<br />
1.<br />
Accept the end-user license agreement, click Next, <strong>and</strong> then download<br />
<strong>and</strong> install ActiveX controls if they're not already present.<br />
The service scans <strong>your</strong> hard disk(s) to detect <strong>and</strong> fix any <strong>viruses</strong> you may have<br />
on <strong>your</strong> computer.<br />
Alternately, you can use McAfee FreeScan or Trend Micro HouseCall Free<br />
Scan, which are free online virus scanning tools that support many versions<br />
of Windows.<br />
Use a virus removal tool to clean <strong>your</strong> computer<br />
If the preceding steps indicate <strong>your</strong> computer is infected, using a downloadable<br />
virus removal tool is sometimes more effective than relying on the antivirus<br />
software installed on <strong>your</strong> <strong>PC</strong>. This is because a virus or worm sometimes adds<br />
key to <strong>your</strong> registry, the database that holds valuable information about <strong>your</strong><br />
computer. Even after you quarantine or delete a virus, the virus restarts itself<br />
each time the computer is started because of the registry key. Every time you<br />
run a virus scan, the software continues to find the virus. This ends up in a<br />
vicious cycle. To remove a virus <strong>from</strong> <strong>your</strong> computer, you can use a free virus<br />
removal tool such as those listed on the Symantec Removal Tools Web page.<br />
You can also use the Symantec Spyware & Virus Removal service, for a fee. A<br />
qualified technician performs a system scan <strong>and</strong> removes any malware <strong>from</strong><br />
<strong>your</strong> computer as part of an online service.<br />
Perform manual updates<br />
If <strong>your</strong> antivirus software has become partially unusable because of an<br />
infection, you can manually download the virus definition update. This file can<br />
be found on the manufacturer's Web site. Figure 3-6 shows a portion of<br />
Symantec's download virus definitions Web page.
Figure 3-6: You can manually download virus definitions <strong>from</strong> the vendor's Web<br />
site.<br />
After <strong>your</strong> computer is virus-free, you should create a new System Restore<br />
Point. (See the "Cleaning System Restore" sidebar for more information.) And<br />
then you're well on <strong>your</strong> way to a safer, more secure computing experience.<br />
Now it's time to discuss how to keep <strong>your</strong> computer in this condition.<br />
Ensuring ongoing virus prevention<br />
After you've installed antivirus software, you need to keep it updated. This is<br />
because as new <strong>viruses</strong> are released, new file definitions have to be created to<br />
fix the damage that these <strong>viruses</strong> cause. If you don't update <strong>your</strong> virus<br />
software, you leave <strong>your</strong> computer vulnerable to all newer virus threats.<br />
Enable autoupdate<br />
Antivirus software vendors update their virus lists regularly. Make sure you<br />
enable the autoupdate feature in <strong>your</strong> antivirus software to install updates for<br />
you on a regular basis. This feature is called LiveUpdate in Norton Internet<br />
Security 2007. It checks for updates daily when <strong>your</strong> computer is on. You can<br />
run LiveUpdate at any time by clicking Run LiveUpdate under Quick Tasks in<br />
the left pane of the console.<br />
Schedule regular updates<br />
Some antivirus software packages enable you to schedule the day <strong>and</strong> time<br />
that the update runs. If you use a dial-up modem to access the Internet, set it<br />
for a day <strong>and</strong> time when you know you'll be online. If you use a DSL (digital<br />
subscriber line) or cable modem -- an always-on broadb<strong>and</strong> connection -- set it<br />
for a time when you're not using the computer. Most updates take only a few<br />
minutes to download <strong>and</strong> install.<br />
Schedule regular system scans<br />
As mentioned previously, most antivirus software packages run in the<br />
background <strong>and</strong> constantly monitor <strong>your</strong> computer for problems. However, you<br />
can schedule automatic system scans -- once a day or each week, for example<br />
-- for even better coverage. In Norton Internet Security, select Configure a Scan<br />
» Storage feature guide
Schedule Full System Scans. You can select only certain drives, folders, or<br />
files to The Norton Internet Security Schedule screen is shown in Figure 3-7.<br />
Figure 3-7: You can schedule automatic scans.<br />
Even with antivirus protection set up, you still need to develop safe computing<br />
habits to ensure an even safer online experience. Find out how to start using<br />
these best practices in the next section.<br />
Practicing safe computing<br />
Most current antivirus software is quite effective, but only if it's kept updated<br />
<strong>and</strong> the user practices safe computing habits such as not opening unfamiliar<br />
attachments in the form of documents or programs. Remember that antivirus<br />
software can't always protect against br<strong>and</strong>-new <strong>viruses</strong>, <strong>and</strong> users often don't<br />
take necessary precautions.<br />
In addition, antivirus software can interfere with programs currently installed on<br />
the computer, especially gaming software. Often, users disable the virus<br />
software because a game won't run correctly. Sometimes users disable the<br />
antivirus software because a screen keeps appearing (referred to as a "nag<br />
screen") saying that the software needs to be updated. Disabling the antivirus<br />
software leaves <strong>your</strong> computer at risk.<br />
Here are some safe computing practices that you should follow:<br />
Purchase software <strong>from</strong> a local store you're familiar with or a national chain<br />
with an established reputation.<br />
If you purchase programs over the Web, make sure they're <strong>from</strong> a reputable<br />
company.<br />
Make a boot disk <strong>and</strong> keep it h<strong>and</strong>y in case a virus infects <strong>your</strong> computer so<br />
badly that it won't even boot. Review <strong>your</strong> <strong>PC</strong>'s documentation for details on<br />
how to do this for <strong>your</strong> system.<br />
Use RTF instead of DOC extensions for <strong>your</strong> Word files. Be cautious about<br />
accepting any Word .doc or Excel .xls files <strong>from</strong> anyone.<br />
Be extremely cautious about opening attachments. Don't accept, run, or<br />
open any unsolicited attachments to e-mail.<br />
Keep up with the latest security patches for all the programs you use. If you<br />
run Windows XP or Vista, use the Automatic Updates feature in Security<br />
Center to schedule regular updates. You can also select Tools > Windows<br />
Update in Internet Explorer to manually update <strong>your</strong> computer.<br />
Underst<strong>and</strong> Microsoft<br />
Internet Explorer <strong>Protect</strong>ed<br />
Mode<br />
In Windows Vista, Internet<br />
Explorer 7 runs in <strong>Protect</strong>ed<br />
Mode, which enforces<br />
restricted privileges in<br />
Internet Explorer to help<br />
protect <strong>your</strong> computer <strong>from</strong> a<br />
variety of attacks. <strong>Protect</strong>ed<br />
Mode prevents many attacks<br />
to write, alter, or destroy data<br />
on the user's computer or to<br />
install malicious code.<br />
» Laptop <strong>and</strong> tablet <strong>PC</strong>s
Make frequent backups of <strong>your</strong> data files <strong>and</strong> keep them on removable<br />
media, such as CDs, DVDs, or USB (universal serial bus) drives, in the<br />
event that a virus renders <strong>your</strong> computer completely useless. You can also<br />
use an online storage service, such as MediaMax, Box.net, or Carbonite.<br />
If <strong>your</strong> computer is used by more than one person, be sure that the other<br />
users know the dangers of unsafe computing.<br />
Your antivirus software program prevents some of the problems caused by<br />
downloading programs, opening e-mail attachments, <strong>and</strong> unsafe computing.<br />
However, you need to remember that there's a lag between recognizing a virus<br />
<strong>and</strong> when <strong>your</strong> computer or virus vendor knows about it. The safer you make<br />
<strong>your</strong> computing experience, the more joy you'll get <strong>from</strong> using <strong>your</strong> computer.<br />
Moving on<br />
In this lesson, you explored how <strong>viruses</strong> work, <strong>and</strong> learned about using<br />
antivirus software <strong>and</strong> how to keep it up to date. You also explored some ways<br />
to practice safe computing. Before you move on, do the assignment <strong>and</strong> take<br />
the quiz for this lesson. After that, head over to the Message Board to discuss<br />
malware <strong>and</strong> protection solutions with <strong>your</strong> instructor <strong>and</strong> fellow students.<br />
Good luck in keeping <strong>your</strong> computer in good running condition, <strong>and</strong> have a safe<br />
<strong>and</strong> happy computing experience.<br />
Assignment #3<br />
Perform the following steps to discover whether <strong>your</strong> computer has antivirus software installed:<br />
1. In Windows Vista or Windows XP, select Start, <strong>and</strong> then click Control Panel.<br />
2. Double-click Security Center (in Classic view), or double-click Security > Security Center<br />
(in Category view).<br />
3. Note whether any programs other than Windows Firewall are listed.<br />
4. Check <strong>your</strong> taskbar icons. Most antivirus programs put an icon in the right section<br />
(notification area) of the taskbar.<br />
5. Select Start > All Programs, <strong>and</strong> then check the list of programs installed on <strong>your</strong><br />
computer. Common antivirus programs include: Symantec/Norton, McAfee, P<strong>and</strong>a,<br />
Trend Micro <strong>PC</strong>-cillin, AVG, <strong>and</strong> avast!.<br />
6. If no antivirus software is installed, download <strong>and</strong> install an antivirus program of <strong>your</strong><br />
choice.<br />
7. Update the software to ensure it's using the latest virus definitions. For example, in<br />
Norton Internet Security 2007, run LiveUpdate.<br />
8. Configure <strong>your</strong> antivirus program to update definitions daily, at a time when the computer<br />
<strong>and</strong> Internet connection will be on <strong>and</strong> you're usually not using the computer.<br />
Share any new tips you uncover or problems you run into with <strong>your</strong> classmates on the Message<br />
Board.<br />
Quiz #3<br />
Question 1:<br />
If <strong>your</strong> computer is severely infected, the antivirus software program might not run. Which of the following can<br />
you do to resolve this problem? (Check all that apply.)<br />
A) Nothing, take the computer in for repair.<br />
B) Attempt to do an online scan to detect <strong>and</strong> fix <strong>viruses</strong>, worms, or Trojan horses that you may have on<br />
<strong>your</strong> computer.<br />
C) Boot into safe mode <strong>and</strong> try to run <strong>your</strong> antivirus software program.<br />
D) Disable <strong>your</strong> antivirus program <strong>and</strong> work without it.<br />
Question 2:<br />
Which of the following are types of antivirus detection methods? (Check all that apply.)
A) Quarantine<br />
B) Heuristic detection<br />
C) Integrity checking<br />
D) Interception<br />
Question 3:<br />
True or False: Even if you quarantine or delete a virus on <strong>your</strong> computer, it can still restart if it has stored a key<br />
in <strong>your</strong> system's registry.<br />
A) True<br />
B) False<br />
Question 4:<br />
Which of the following items are considered a part of safe computing? (Check all that apply.)<br />
A) Keep up with the latest security patches for all the programs you use.<br />
B) Purchase software <strong>from</strong> a local store that you're familiar with or a national chain with an established<br />
reputation.<br />
C) Make a boot disk <strong>and</strong> keep it h<strong>and</strong>y in case a virus infects the machine so badly that it won't even boot.<br />
D) Purchase software programs on the Internet <strong>from</strong> any company that clearly states it specializes in<br />
antivirus software.<br />
Question 5:<br />
True or False: If a virus inserts itself into <strong>your</strong> restore directory in Windows XP or Windows Vista, when you<br />
restore the computer using System Restore, the virus is automatically removed.<br />
A) True<br />
B) False<br />
© 2003 - 2010 Powered, Inc.