You should have said you were joking, I of course never knew that and it certainly sounded like you were not since you never replied to my reply or Roger's remark (of "Don't shoot the messenger"). (FYI, for those that don't know what this is about: I post Secunia security alerts when I get the ones that are about popular software, and FireFox is among them quite often. Harold said I was "FireFox bashing" or something like that).
Speaking of SpyWare, I'm going to have to post something shortly. :-) -Clint God Bless Clint Hamilton, Owner http://OrpheusComputing.com ) http://ComputersCustomBuilt.com ----- Original Message ----- From: "Harold B." <[EMAIL PROTECTED]> Hello again, The following advice was taken off the Lockergnome site --- http://lockergnome.com/ What's interesting to me is that he knocks Internet Explorer while it's still the most popular browser being used. I'm posting it only to show that there are experts arguing for both sides. I know that Clint, one of our resident experts for whom I have the greatest respect, took issue with my remark last time (when I was only joking around), and I apologize if I was misunderstood. I'm still going strong with Firefox with few complaints; one of them being I still have to get used to "extensions". "The wild, wild web has gotten wilder since I published my original Seven Steps to System Security last November: Spyware, malware, and junkware are even more stealthy and difficult to remove; spam is worse than ever (so much for can-sp*m; phishing attacks are harder to detect and more frequent. In my job as a systems support engineer for Connective Computing, rarely does a day go by that I don't have to deal with the effects of one or more of these digital diseases; consequently, clients often ask me what they can do to protect themselves against these threats and annoyances. I give them my newly-revised seven-step approach to system security: 1. Dump Internet Explorer. Use Firefox, Mozilla, or Opera to browse the Web. You will still be forced to use IE to update your system, but that is the ONLY thing you should use it for. 2. Patch your system. Install the recommended security updates and patches for ALL software on your system, - especially Microsoft Office - not just the operating system. 3. Run a properly-configured, proven firewall. Don't rely on Windows' Internet Connection Firewall (ICF) - it blocks inbound attacks only. It will not stop back door trojans, adware, spyware, and the like from "phoning home" with your sensitive information. (See this article for more info.) ZoneAlarm and Sygate offer excellent free versions of their products. 4. Run a good antivirus program. Choices abound. I use AntiVir Personal Edition (free); other good ones are Norton Antivirus, Panda Software, and Grisoft's AVG (free). 5. Run multiple anti-spyware/anti-adware programs and keep them updated. I recommend: a. Spyware Blaster. This free program blocks adware and spyware from installing in the first place and is frequently updated; b. Ad-Aware. Scan weekly, more frequently if you are a heavy surfer; c. Spybot S&D. Run it on the same schedule as Ad-Aware; d. Microsoft (formerly Giant) AntiSpyware (Beta) is an excellent product. (See Flexbeta.net test results.) Microsoft intends to keep this program free to consumers. Configure it for real time protection and automatic updates. Go ahead and join the SpyNet spyware reporting community. 6. Run a spam blocker to isolate junk email. Most malware and all phishing attempts rely on spam. You want to isolate this stuff and delete it. (never, I repeat, NEVER click on a link in any email you are not absolutely certain is legitimate.) One of the best programs is Open Field Software's ella for Sp*m Control. It uses wizards to "train" it to your personal specifications. It's free to use with Outlook, but you have to pay for the version that works with Outlook Express. My clients swear by it. Another good program is PC Tools' Spam Monitor. 7. On Windows XP, set up a restricted user account and use that for routine tasks. Only log on with administrative privileges when you need to install or configure software. This will prevent rogue programs from affecting your system - they won't be able to install. You can activate the "run as" feature so you can do administrative tasks while logged in as a restricted user. Microsoft Knowledge Base article Q294676 explains how to activate and use this feature in Win2K and XP. While total immunity is impossible - new infections and variations on existing exploits appear daily - these seven steps will prevent, catch, or clean 98 percent of the junkware out there. As for the other two percent, - or if you are already badly infected - you'll need to hire a [professional]." ============= PCWorks Mailing List ================= Don't see your post? Check our posting guidelines & make sure you've followed proper posting procedures, http://pcworkers.com/rules.htm Contact list owner <[EMAIL PROTECTED]> Unsubscribing and other changes: http://pcworkers.com =====================================================
