How PC users can avoid the risks of losing money, time, or reputation.
When you connect your PC to the Internet, you are opening a door which can be exploited by unscrupulous people. The November 2004 government and private sector initiative www.MakeITSecure.ie was set up to make people aware of the risks.
Does your internet browser start up with a different home page than your normal one?
Do you see an increase in advertising pop-ups?
Does your computer seem much slower or prone to crashing than before? (Admittedly this can be due to many causes, not all of them malicious!)
If you call up a list of running tasks (right-click an empty space on the taskbar, and then click Task Manager) have new tasks appeared that you do not recognise?
These tips are intended for home users. If you are working from home ask your company system administrator to check whether the vendor of the security products at work offers free home use of their product. However excellent commercial PC security software is, and I use it myself in my business, a common problem is that too often home users don't renew it once their initial license expires. They have forgotten what it is to be unprotected, and foolishly hope that a one-off purchase will secure them indefinitely.
The purpose of this article is to give you a list of programs that are free for non-commercial use, and say why each is necessary. The reason they are free is that they provide just one feature, and the vendor hopes you will upgrade to the full product. Sometimes two products can interfere with each other. You can decide for yourself if the price of the software is worth the ease of having a "one-stop-shop".
What these programs cannot do is protect you from the consequences of naïve behaviour, so exercise caution when you don't really know who you are dealing with.
There is not room here to discuss detailed setup instructions. You should follow those given on each of the web pages shown below.
A virus is so called because it reproduces itself by using the facilities of the host PC to copy itself to removable media and attach itself to emails, without your knowledge. There are variants which may be technically characterised as worms or Trojans, but you don't want any of these. Most commonly you get one by opening an email attachment or copying (from deceptive software on the Internet or a bootleg CD) a program containing the virus, on to an unprotected PC. They take over the compromised PC and either trash your data or use your PC like a zombie to send hundreds or thousands of emails containing copies of itself, and/or spam, maybe with copies of your confidential data, to everybody in your address book.
There are many virus checking services offered free by the various Anti Virus vendors, such as House Call from Trend Micro:
These checks are only effective during the time that they are run and do not provide continued protection afterwards. You will need to install an Anti-Virus package for continuous protection. It is very important that it is updated regularly, ideally every day. I use AVG version 7:
Another free offering is from Avast
A personal firewall blocks unauthorised network connections from either entering or leaving the computer. This helps protect you either from malware entering your PC, or using it to attack others. I use ZoneAlarm:
Prevx is an alternative:
Windows XP Service Pack 2 includes a personal firewall. It's somewhat irritatingly obtrusive, but if you don't use another firewall, it's a lot better than being like "Oh, hi, you're the new burglar, come on in, here's the keys…"
When you DO install a firewall, you will quickly learn to turn off automatic alerts of attempted intrusions. It is common to find the first probes arriving within minutes of connecting to the internet. That shows you how open you were before installing the firewall!
If you have children you will understand the concerns over unrestricted Internet access. A "Net Nanny" restricts access to certain pages with explicit content, which may also offend charities and the elderly. Businesses will of course want to restrict employee access to non-work-related web sites. Quite apart from the time wasting involved, it may stimulate behaviour that results in harassment lawsuits. We-Blocker is a free tool that doesn't base its restrictions solely on keywords.
"Spyware" is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet, it gathers information such as email addresses, passwords, phone numbers, and credit card numbers, and relays it to advertisers or other interested parties. It is not to be confused with "Cookies" which are small files that contain a record of the last time you visited a web site; many ecommerce sites require their use to recognise returning visitors.
Ad-aware is a free product that will search for Spyware and report items found.
'Hijack This!' is somewhat techy but if you know how to use Task Manager you should be able to cope. It shows you what programs are launched automatically on startup and you can mark them to identify new arrivals:
NetAssure.ie from ICS-SKILLS is a stand-alone, to-the-point training course that focuses on the key aspects of PC security and safe computing. NetAssure equips PC users with the knowhow to choose and operate the right security methods and tools in today's world of malware, spyware and spam. Successful completion of the course leads to the award of the NetAssure Certificate – a qualification valued both by individual recipients and the organisations for which they work. NetAssure requires only a basic level of PC and Internet knowledge that is similar in standard to that certified by the EqualSkills programme.
You can take a sample test on their website and see how you do:
|Test Score||Security Ranking|
|60-79%||Safe and sound|
Thanks to Andy Cuff for his list of free software for home use at
Patrick O'Beirne, B.Sc., M.A., FICS is a computer consultant living in Tara Hill, Gorey. He is currently working on a book on how to develop high-quality spreadsheets, aimed at the ECDL market. Website: Systems Modelling Ltd: http://www.sysmod.com
This article first appeared in the Christmas 2004 issue of Gorey Link magazine