You should have said you were joking, I of course never knew 
that and it certainly sounded like you were not since you never 
replied to my reply or Roger's remark (of "Don't shoot the 
messenger").  (FYI, for those that don't know what this is 
about: I post Secunia security alerts when I get the ones that 
are about popular software, and FireFox is among them quite 
often.  Harold said I was "FireFox bashing" or something like 
that).

Speaking of SpyWare, I'm going to have to post something 
shortly.  :-)
-Clint

God Bless
Clint Hamilton, Owner
http://OrpheusComputing.com )
http://ComputersCustomBuilt.com

----- Original Message ----- 
From: "Harold B." <[EMAIL PROTECTED]>

Hello again,

The following advice was taken off the Lockergnome site ---
http://lockergnome.com/

What's interesting to me is that he knocks Internet Explorer 
while it's
still the most popular browser being used. I'm posting it only 
to show that
there are experts arguing for both sides. I know that Clint, 
one of our
resident experts for whom I have the greatest respect, took 
issue with my
remark last time (when I was only joking around), and I 
apologize if I was
misunderstood. I'm still going strong with Firefox with few 
complaints; one
of them being I still have to get used to "extensions".

"The wild, wild web has gotten wilder since I published my 
original Seven
Steps to System Security last November: Spyware, malware, and 
junkware are
even more stealthy and difficult to remove; spam is worse than 
ever (so much
for can-sp*m; phishing attacks are harder to detect and more 
frequent. In my
job as a systems support engineer for Connective Computing, 
rarely does a
day go by that I don't have to deal with the effects of one or 
more of these
digital diseases; consequently, clients often ask me what they 
can do to
protect themselves against these threats and annoyances. I give 
them my
newly-revised seven-step approach to system security:

1. Dump Internet Explorer. Use Firefox, Mozilla, or Opera to 
browse the Web.
You will still be forced to use IE to update your system, but 
that is the
ONLY thing you should use it for.

2. Patch your system. Install the recommended security updates 
and patches
for ALL software on your system, - especially Microsoft 
Office - not just
the operating system.

3. Run a properly-configured, proven firewall. Don't rely on 
Windows'
Internet Connection Firewall (ICF) - it blocks inbound attacks 
only. It will
not stop back door trojans, adware, spyware, and the like from 
"phoning
home" with your sensitive information. (See this article for 
more info.)
ZoneAlarm and Sygate offer excellent free versions of their 
products.

4. Run a good antivirus program. Choices abound. I use AntiVir 
Personal
Edition (free); other good ones are Norton Antivirus, Panda 
Software, and
Grisoft's AVG (free).

5. Run multiple anti-spyware/anti-adware programs and keep them 
updated. I
recommend: a. Spyware Blaster. This free program blocks adware 
and spyware
from installing in the first place and is frequently updated; 
b. Ad-Aware.
Scan weekly, more frequently if you are a heavy surfer; c. 
Spybot S&D. Run
it on the same schedule as Ad-Aware; d. Microsoft (formerly 
Giant)
AntiSpyware (Beta) is an excellent product. (See Flexbeta.net 
test results.)
Microsoft intends to keep this program free to consumers. 
Configure it for
real time protection and automatic updates. Go ahead and join 
the SpyNet
spyware reporting community.

6. Run a spam blocker to isolate junk email. Most malware and 
all phishing
attempts rely on spam. You want to isolate this stuff and 
delete it. (never,
I repeat, NEVER click on a link in any email you are not 
absolutely certain
is legitimate.) One of the best programs is Open Field 
Software's ella for
Sp*m Control. It uses wizards to "train" it to your personal 
specifications.
It's free to use with Outlook, but you have to pay for the 
version that
works with Outlook Express. My clients swear by it. Another 
good program is
PC Tools' Spam Monitor.

7. On Windows XP, set up a restricted user account and use that 
for routine
tasks. Only log on with administrative privileges when you need 
to install
or configure software. This will prevent rogue programs from 
affecting your
system - they won't be able to install. You can activate the 
"run as"
feature so you can do administrative tasks while logged in as a 
restricted
user. Microsoft Knowledge Base article Q294676 explains how to 
activate and
use this feature in Win2K and XP.

While total immunity is impossible - new infections and 
variations on
existing exploits appear daily - these seven steps will 
prevent, catch, or
clean 98 percent of the junkware out there. As for the other 
two percent, -
or if you are already badly infected - you'll need to hire a
[professional]."
============= PCWorks Mailing List =================
Don't see your post? Check our posting guidelines &
make sure you've followed proper posting procedures,
http://pcworkers.com/rules.htm
Contact list owner <[EMAIL PROTECTED]>
Unsubscribing and other changes: http://pcworkers.com
=====================================================

Reply via email to