Tuesday, June 26, 2007

EMAIL

“You Got Mail”! Ah yes, what a great thing – sometimes!!!

If it is from family or friends, you look forward to seeing what they have to say, and what possibly they’ve sent you! BE AWARE – because they may have unintentionally just sent you something you (or they) didn’t expect – a virus embedded in a file!

Well, here’s what I do and if you think it might be worth it, you can do the same.

First of all, I DO NOT use my Windows Outlook Email to receive any email!! I simply open and read my email on my Internet Service Provider’s (ISP) web site. If per chance, you don’t want to use your ISP’s web mail, there’s plenty of ones out there that offer large (2Gig) free email accounts (i.e., Google, Yahoo, etc.).

If you think you need further security with you email correspondence (i.e., anonymity and encryption), there’s services that provide these. One that I’ve used in the past and was happy with their free service was Mailvault from MetroPipe Network Services. You can do a web search and find different providers of these services. Like anything, check them out good before opting to use them!

Back to email, itself! If you don’t recognize who it is from – delete it! No, you didn’t win the UK lottery without even entering it; you can’t help the poor soul from some far off country trying to claim and get to their lost money; nor, help some crooked banker out from so far off land trying to close an unclaimed account!

Also, if you insist on using an email client on your system (i.e., Outlook), DO NOT have the settings to where there is a “preview pane” opened. If you do, you’ve already “let loose” any malicious code contained in the email!

Here are some common extensions for email to pay attention to:

Should Be Allowed: .DOC .PDF .TXT .XLS .ZIP
Should Not Be Allowed: .BAT .COM .EXE .HLP .PIF .SCR

Last, but by no means least, be sure you have your system protected with some good software (see my previous post on this)! BTW, all the web based email providers that I’m aware of, provide this on their site(s).

Thursday, June 21, 2007

USER IDs and PASSWORDs

Obviously, how you generate, use and protect these on the Web is of vital importance! Let’s look at each of these areas, and possible approaches to each one.

Generating userids and passwords – first of all, you could invest in a random generator program, or simply do it yourself. I prefer the latter, seeing it only “costs” a little bit of your time.

The method I use is to open a blank word document. I set it up in a table format using the drop down menu at the top of the page, and the “Insert Table” option. You can use as many columns and rows as you desire.

Next in each cell/square, randomly type a combination of letters, numbers and special characters. Seeing passwords are generally case sensitive, use both upper and lower case letters.

Most password fields on web sites are 10 to 12 characters in length, so create some of each. I usually create about 50 rows of these in the advent that my list is stolen, it would take some effort to determine the right combination for use on any given site.

Next, I use the back ground high lighter tool on the menu bar in MS word to color code a random selection of the cells. I may, or may not, use the ones that I high light. I then take a pocket note book and record what userids and passwords I’m using for what web sites. Obviously, you then need to keep this in a safe and secure place. Here’s an example of what it looks like when completed:

3jicexet38+?

04562wimid

312prwi311

88459qirws

6318g#rjm2i

52me593mid

93mida3929

imide9354

ux4!9204q6e

Now, using a jump/thumb drive, which can be purchased for a few dollars depending on the features and storage capacity, I save my file of userids and passwords to it. I do not keep these on my system’s hard drive for security reasons (i.e., if I’m hacked, the list can’t be comprised very readily). A jump drive is also an easy way to back-up your other important files and documents, and offers great portability! You can now get them with multiple gigabits of storage capacity, and they easily plug into a usb port on your computer.

When accessing a site requiring your userid and password, you have three options for entering them:

- type them in using your regular keyboard (NOT good as a key stroke logger virus may have infected your computer and is recording your strokes);

- “type” them in using window’s virtual keyboard (you can find this by going to the Start menu, click on Programs, then Accessories, then Accessibility and On-screen Keyboard). This option eliminates the key stroke logger threat seeing you just click on the desired letter/number/character on the window’s on screen keyboard; or,

- copy and paste them from the list you’ve created above. I prefer this method as it saves time and eliminates typing mistakes.

o I MUST WARN you though, when copying and pasting, the last thing you have high lighted, right clicked on, and pasted is still in your windows Clipboard!! Be sure and copy something of no importance immediately afterwards so as not to leave sensitive info on the Clipboard, in case your system is hacked! You can also create a short cut to the clip board and go into it and delete any info on it.

In closing out this “tome”, be sure and change your web site(s) password regularly!!!

Wednesday, June 20, 2007

Firewalls

What can be said about firewalls? Ask 10 different people and you’re likely to get 10 different answers to which one is best!

There are many out there, and many are good (especially, if you’re talking to some one that is using the one you’re asking about!). To name just a few, there is Norton, ZoneAlarm, Kerio, Black Ice, OutPost, McAfee, and so on. I use to mainly use Norton, and have to say I had pretty good results with it. I have family and friends that have used some of the others, and of course swore by them!

Some of the forgoing may have a limited free version, or may not. Prices can be found, and write ups galore, by just using a search engine.

For the past year and a half, I’ve been using a totally free one – Avast. I am very pleased with it, and in conjunction with my hardware firewall (a Linksys router), I have had Zero problems!

I really like the fact Avast (btw, I’m not associated with them, other than using their product), offers 7 different types of protection (shields), and they constantly keep their virus package and program updated (using the auto update function eliminates the possibility of forgetting to do it yourself).

As I mentioned above, I also use a router as a hardware firewall, and for the price of approximately $30 dollars US I feel it is well worth it, even if you’re only running one PC in your home. You just plug it into the back of your modem and your PC(s) into it.

For clarification purposes here, I’m referring to a wired router, not a wireless. I’m waiting on security to catch up in the wireless world before I venture there. IMHO, it is to easy for any one with a few skills to tap into your wireless, and then into your network/PC(s)!

Hope you find this of some use and benefit! See you next time!

SECURITY TIPS

SECURITY TIPS
For The Novice (and not so Novice)
Computer User


Hi, and welcome to U-Dont-Know-Jack! If you have now read my Bio., you now know Jack (or know of me)!

First and foremost, I don’t profess to be any sort of “guru” on the topics I’m sharing with you. I simply would like to share with you a few tips that I have learned and use in an attempt to safe guard my computer and personal information on the Internet in order to give you something to think about (and possibly use yourself, if you see fit to).

BTW, if any one tells you that you can make yourself/your computer completely safe on the wild Web (other than disconnecting your computer), I’d like to hear how they do it!

I will provide you some tips/tricks on the following topics that I use, and which so far, have kept me and my data safe and sound:

  • Adware, Spyware, Malware, Etc.
  • Browers
  • Email
  • Userids and Passwords
  • Firewalls
  • Purchasing Online

When it comes to security and ways to safe guard your data/computer, you can go to great extremes (i.e., fingerprint/retina scanning) and expense, or you can find your own comfort level and costs. What I will share with you are some ways to keep the cost at a minimum, and still get a decent level of protection while doing so.

Purchasing Online

Purchasing online, or any other way except cash for that matter, is an opportunity for thieves to steal your identity, empty your credit card/bank account and bring utter chaos into your life. I would like to offer two ways that you can purchase online and limit your exposure to this. They are: virtual and prepaid credit cards.

You can use any of the search engines to find out who offers virtual credit cards. I prefer using a prepaid credit card. It has two distinct advantages over a virtual one. First and most importantly, you don’t have to furnish any personal information to purchase one from a retailer in your local area! Second, you can use it when going on a trip in place of your regular credit card, thereby guarding against the possibility of losing your regular one(s) and going through the hassle of canceling and replacing it. Of course, both have the advantage of the fact that your exposure to loss is limited to the amount you have on the card.

Hope you have found the foregoing of some value and use! Until next time, happy surfing!








Google