Thursday, April 27, 2006

Layers of protection

You have to view your computer like any important real asset, and protect it with layers of protection. This list is far from comprehensive, but it's a start. I welcome input and comments:

  • Virus protection. While there is a thread of discontent on the Web, claiming that the virus protection software companies are part of the problem as well as part of the solution, there's no question that you have to have virus protection. We'll explore this in greater detail in later posts.
  • Firewall. With the free version of Zone Alarm as effective as it is, there is no excuse for not having a firewall. Yes, it requires some learning and attention; but it's worth it.
  • Reliable, regular backup. No excuses. I use an external USB drive and an amazing piece of software called MirrorFolders (Google it; I'm not sellling you anything here.)
  • Periodic scans with software you don't regularly use, just to get a different slant on your state of "cleanliness."
  • Hardware. If you use a router, especially wireless, turn on password protection.

Tuesday, March 28, 2006

AdAware

I've been using the free version of AdAware se for some time. It seems to work well. A friend's computer got infested to the point of being inoperable; I managed to get AdAware running on it, and that cleaned it up. The company is Lavasoft; the site is http://www.adaware.com.

Tuesday, March 21, 2006

The Scourge of Spyware

The World-Wide Web is a new frontier, full of limitless opportunity. The parallels with California in the 19th century are many and striking. It's another Gold Rush - and much, much bigger!

But there's another parallel to that time and place: Lawlessness. Since the Internet doesn't really "live" anywhere, it is in many ways not subject to the law of the land - ANY land.

One of the most common "bad-guy" tools is spyware - software that is loaded into your computer without your knowledge or consent. Some of it is simply malicious; but much of it is designed to steal.

What does spyware steal? Passwords; money; secrets; your identity; your computer resources; and that's just for starters. It is invasive, destructive, larcenous, and sneaky.

This blog is devoted to discussing the challenges posed by spyware - and the approaches that are available for dealing with it.