How to Avoid Virus Attacks and Security Threats

A simple set of precautions can go a long way in keeping your computer healthy, virus free and safe against hacker attack.

  • E-mails are primary source of virus infection Install an anti-virus software with e-mail scanning facility immediately. 
  • Keep the anti-virus software up-to-date. Update virus definition every week. All anti-virus software provides for on-line updating through Net. 
  • Never, never open a file attachment unless you are absolutely sure of its content.
  • Do not execute software that is downloaded from the Internet unless it has been scanned for viruses.
  • Simply visiting a compromised Web site can cause infection if certain browser vulnerabilities are not patched. Always use latest browser software.
  • Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP client, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
  • Set a maximum size for e-mails you receive in your browser (e.g. 35 Kb). All mails exceeding that size will remain at server, not reach your computer. You will instead receive a notification from mail administrator - with an option to download the over-sized e-mail. Most virus-carrying e-mails are bulky (because of the file attachments) and get filtered out automatically. You can selectively download the e-mails you know genuine for sure - and delete the rest from server. PLEASE DO NOT FORGET TO DELETE THE UNWANTED MAILS FROM SERVER EVERYDAY OR ELSE YOUR MAILBOX GETS FULL AND STARTS BOUNCING ALL INCOMING E-MAILS

HACKING - A REAL DANGER

  • Anti-Virus software with latest updates can keep you safe from virus but not hackers. Unscrupulous fellows, perverted minds and plain cheats - generally known as 'Hacker' can steal confidential information from your computer and even damage your databases and important files. They can even use your computer as pawn to attack large systems (e.g. Yahoo, Microfsoft etc.).
  • If you store important information in your computer that is connected with Internet (directly or through LAN) and/or you use Internet for long hours - hackers may target you.
  • Turn off and remove unneeded services. By default, many operating systems install auxiliary services that are not critical, such as an FTP client, telnet, and a Web server. These services are avenues of attack. If they are removed, blended threats have less avenues of attack and you have fewer services to maintain through patch updates.
  • Consider a Personal firewall. There are many free and paid Firewalls available in the Net. We have listed a few below.

SYSTEM MAINTENANCE

Regular maintenance can keep your system fast and efficient.

  • Defrag and Optimize your hard disk frequently
  • If possible, add more RAM
  • Remove unnecessary programs from Start-Up
  • Keep enough free space at C: drive
  • Take regular back-ups. You may consider CD-RW as back-up option - it is fast, convenient and comparatively affordable.

Personal Firewall Software

Following is a list of well-known personal firewall software. There are many good ones outside this list, we obviously can not list all in limited space.

  1. Zone Labs - Zone Alarm http://www.zonelabs.com/ (free version available) 
  2. Aladdin - eSafe Personal Firewall http://www.ealaddin.com/home/csrt/update.asp (Free version available)
  3. Norton Personal Firewall http://www.symantec.com Price - USD 49.95
  4. Network Ice - Black Ice Defender http://www.networkice.com/ Price - USD 39.95
  5. McAfee Personal Firewall http://www.mcafee.com PriceUSD39.95

Related Links:

Source: FAIDA - Newsletter on Business Opportunties from India and Abroad Vol: 3, Issue 5 May 2' 2002

Author : Dr. Amit K. Chatterjee
(Amit worked in blue-chip Indian and MNCs for 15 years in various capacities like Research and Information Analysis, Market Development, MIS, R&D Information Systems etc. before starting his e-commerce venture in 1997. The views expressed in this columns are of his own. He may be reached at amit@infobanc.com )


Copyright
� All Rights Reserved. Limited permission is granted to publish this article in a web-site or printed in a journal/ newspaper/ magazine provided the publisher takes prior permission from author, do not make any change in the article (i.e. keep it exactly same as displayed above) and cite the Source of this article as The Great Indian Bazaar with a link to this page.