1 / 89

Internet & Computer Security 101

Internet & Computer Security 101. For Windows-based computer labs. Presenter: Rebecca Shuler. July 28, 2006 . Internet & Computer Security 101.

Download Presentation

Internet & Computer Security 101

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet & Computer Security 101 For Windows-based computer labs Presenter: Rebecca Shuler July 28, 2006

  2. Internet & Computer Security 101 Security is a real problem, and not just for home users. Billions of dollars are spent by people every year on computer security programs and the aftermath of security threats. Don’t believe it can’t happen to you.

  3. Internet & Computer Security 101 What I hope you get by the end: • Increased awareness of free security programs • Increased ability to use these programs • Increased confidence in your abilities to maintain a computer lab without the need for pricey programs or Geek Squad

  4. Internet & Computer Security 101 First things first…… Why should I care about computer security? Time is money, and those are two very limited things for a non-profit. Your entire system might have to be taken offline. Each computer would have to be scanned, possibly multiple times. In a worst case scenario, every computer in your building might have to be reloaded from scratch. It could take hours. It could take days. But you lose productivity in any case.

  5. Internet & Computer Security 101 Why do computers get viruses and spyware? • Windows Updates not done • Virus definitions not updated • Opening e-mail attachments haphazardly • Clicking “free” offers on pop-up windows • Peer-to-peer file sharing • Computer not scanned regularly for viruses or spyware • Lack of firewall

  6. Internet & Computer Security 101 START WITH THE BASICS! Otherwise known as the foundation for a secure computer.

  7. Internet & Computer Security 101 THE BASICS Number One: WINDOWS UPDATES (Repeat this ad nauseam)

  8. Internet & Computer Security 101 THE BASICS Number One: Windows Updates Windows XP is a computer program created by humans. Humans make mistakes. In terms of XP, these little mistakes are called “vulnerabilities.” Vulnerabilities occur when a piece of the code that makes up XP can be altered by an outside program, such as a virus, in a way that makes XP do bad things. Microsoft can discover these vulnerabilities through testing or, unfortunately, when a large number of computers get affected by a virus. To solve the problem, patches are released that fix the hole in the code so it can’t be affected anymore. These patches are called updates, and Microsoft lets you know if any are available with the shield or globe icon, which is located in the system tray. In many cases, these updates are downloaded and installed without your knowledge.

  9. Internet & Computer Security 101 1. Move the mouse over “Start,” then “Control Panel” and click it. 2. If your Control Panel looks like the picture on the left, click on “Switch to Classic View” located on the left panel. How to configure Windows Update: Double-click on “Automatic Updates” 3. If you see the green dot next to “Turn off Automatic Updates” you are going to want to change that. For the sake of easiness, you can just click the circle next to “Automatic (recommended)” and it will do all the work for you. You can choose when to download and install them by clicking on the drop-down button (arrow button) and choosing how often and what time of day. You can also have the updates automatically download but not install until you choose, or have Microsoft notify you when updates are available and download and install them yourself. Click the “OK” button to make changes.

  10. Internet & Computer Security 101 THE BASICS Number One: Windows Updates The Last Word: Service Pack 2 Service Pack 2 is a combination of Service Pack 1 plus every update up until Service Pack 2 was created. It also contains enhanced security features like a pop-up blocker, better support for wireless networking, and an enhanced embedded firewall. Do you need Service Pack 2? The short answer is no, but you had better make sure you check for updates every day (manually install them), have a working firewall, and DON’T USE INTERNET EXPLORER. It’s just a lot easier to use the service pack than to work around it. If you’re concerned that some of your programs may not work after you install it, check their websites for compatibility information.

  11. Internet & Computer Security 101 THE BASICS 1: Windows Updates Number Two: FIREWALL

  12. Internet & Computer Security 101 THE BASICS Number Two: Firewall 1: Windows Updates So what is a firewall? Think of a firewall as a very protective bouncer and your computer as the club. The bouncer controls what comes into the club, but he also controls who leaves as well. You create a list of programs, IP addresses, etc., that are allowed access to your computer. If something isn’t on the list, the firewall will block whatever is requesting access. Depending on the program, the firewall will notify you of what is trying to gain access, and you can either permit it or deny it. If you have Service Pack 2 installed, chances are you have a firewall installed without knowing it. Windows Firewall is good for basics, but doesn’t allow the user to configure many variables. So what can you use other than Windows Firewall? Try out Zone Labs’ Zone Alarm. But first, a little bit of info on Windows Firewall.

  13. Internet & Computer Security 101 1. Move the mouse over “Start,” then “Control Panel” and click it. 2. If your Control Panel looks like the picture on the left, click on “Switch to Classic View” located on the left panel. How to configure Windows Firewall: Double-click on “Windows Firewall.” 3. If you have no firewall at all, you should probably turn this on by clicking the circle next to “On (recommended),” even if you plan on putting a different firewall program on the computer. You can always turn Windows Firewall off when the new program is installed. Unlike anti-spyware and anti-virus programs, having too many firewalls is not generally a good thing, because the settings tend to conflict and then you can’t get online at all. If you have a hardware firewall, which looks like a router, you don’t need to have Windows Firewall on.

  14. Internet & Computer Security 101 4. Click the “Exceptions” tab. If you have the firewall turned on, you can use this section to specify programs that are allowed through it. Click “Add Program” to, well, add a program. You can also add a port, a virtual location where data is exchanged, by clicking the “Add Port” button. Ports are sometimes program specific, and if a port is blocked the data can’t get through. Don’t worry about this unless you’ve added a program to the list and it still can’t communicate over the internet. By clicking the “Edit” button, you can change which ports a program is already set up to use. Unless you know what you’re doing, don’t feel the urge to mess with the port settings. You probably won’t need to anyway, and Windows Firewall isn’t the most user friendly when it comes to telling you what things are. Moving along, certain programs can be deleted from the exception list easily by clicking the “Delete” button, which will be grayed out if you can’t delete a program. Finally, if you want Windows Firewall to tell you when a program has been blocked, click the checkbox next to “Display a notification…” How to configure Windows Firewall:

  15. Internet & Computer Security 101 5. Click on the “Advanced” tab. There are a bunch of fun things to mess around with, and they call it advanced for reason. You can change network connection settings, which will allow or disallow services like FTP or HTTP to work. You can change the settings of your security log, which can be used for troubleshooting. You can also change the settings of the Internet Control Message Protocol, which allows computers on a network to share information about errors and status. Lastly, by clicking “Restore Defaults,” you can get Windows Firewall back to the way it was initially. How to configure Windows Firewall:   

  16. Internet & Computer Security 101 THE BASICS Number Two: Firewall 1: Windows Updates Windows Firewall is nice, mostly because it is built in, but unless you know what you’re doing, it’s somewhat difficult to configure. If you don’t have a hardware firewall, you may want to find a different software firewall, one that’s a little more user-friendly. Lucky for us there is Zone Alarm, a free firewall program that is both powerful and user-friendly. And it is much less problematic than the firewall programs that come with Symantec or McAfee products. Plus, it will tell you when the program needs updating.

  17. Website: http://www.zonelabs.com Zone Alarm by Zone Labs

  18. Internet & Computer Security 101 THE BASICS 1: Windows Updates Number Three: ANTI-VIRUS 2: Firewall

  19. Internet & Computer Security 101 THE BASICS Number Three: Anti-Virus 1: Windows Updates Telling you that you need an anti-virus program running on your computer is like telling a surgeon that he needs to wash his hands before entering the operating room: it’s common sense. As long as humanity has a twisted sense of humor, there will be some teenager in Sweden trying to get a Windows-based operating system to do unexpected things, steal your credit card information, shut down the Internet for a few hours, or whatever it takes to get some kicks. Bottom line: you need an anti-virus program running whenever you turn on your computer, not just when you connect to the internet. If you don’t, you probably have no business owning a computer. And if you have one but don’t get the virus definition updates, you’re just as bad. The same is true for a computer lab. 2: Firewall

  20. Internet & Computer Security 101 THE BASICS Number Three: Anti-Virus 1: Windows Updates How to Avoid Viruses 1. Install at least one anti-virus program. 2. Update the virus definitions regularly. 3. Use real time protection (program runs in the background.) 4. Schedule scans at least once a month. 5. Keep up with Windows updates. 6. Don’t open e-mail attachments from senders you don’t know. 2: Firewall 7. Manually scan e-mail for viruses if your program doesn’t do so automatically. 8. Use a firewall. 9. Avoid using peer-to-peer file sharing programs like Kazaa. 10. Avoid clicking on “free offer” pop-up windows. 11. Avoid websites that offer illegal product keys for otherwise expensive programs, like Windows XP or Adobe Photoshop.

  21. Internet & Computer Security 101 THE BASICS Number Three: Anti-Virus 1: Windows Updates When it comes to choosing a program, there are a LOT of options out there, some from companies you haven’t heard of, and some big names like Symantec and McAfee. The problem with big names is big prices and annual subscription fees to the tune of $30 per year per computer. There are alternatives, namely free ones. While they don’t do quite as good a job as the big ones, they do outperform some non-free programs, and offer the cost-conscious an alternative. Three more popular choices are Avast Home Edition by Alwil Software, AVG Anti-Virus by Grisoft, and AntiVir Personal Edition Classic by Avira. 2: Firewall

  22. Website: http://www.avast.com/eng/avast_4_home.html Feaures: • Standard Shield — Real time file protection • IM shield — Instant Messenger protection • P2P shield — P2P protection • Internet Mail — E-mail protection • Outlook/Exchange — Microsoft Outlook/Exchange protection • Web Shield — HTTP protection (localtransparent proxy) • Script blocker — script checker • Network Shield — basic protection against well-known network worms. Acts as a lightweight Intrusion Detection System • Audible alarms — vocal warnings such as "Caution, a virus has been detected!" Scan local drives Scan removable media Avast! 4 Home Edition by Alwil Software Treasure Chest Scan Define test areas Resident scanner sensitivity Update virus database PC WORLD SCORE: 77/100 GOOD http://www.pcworld.com/reviews/article/0,aid,124475,00.asp#

  23. Website: http://free.grisoft.com/doc/2/lng/us/tpl/v5 AVG Anti-Virus 7.1 Free Edition Feaures: • AVG Resident Shield — Real time file protection • Internet Mail — E-mail protection • Scheduler • Update Manager • Shell Extension - Scan objects through Windows explorer PC WORLD SCORE: 73/100 GOOD http://www.pcworld.com/reviews/article/0,aid,124475,00.asp#

  24. Website: http://www.free-av.com/ AntiVir Personal Edition Classic 7 by Avira Feaures: • Real-time File Protection • Internet Mail — E-mail protection • Scheduler • Update Manager PC WORLD SCORE: 78/100 GOOD http://www.pcworld.com/reviews/article/0,aid,124475,00.asp#

  25. Internet & Computer Security 101 THE BASICS Number Three: Anti-Virus 1: Windows Updates The Last Word: Why Paying is Good The biggest problem free programs have is that there is no technical support most people are willing to use. If you don’t mind forums, you can usually find answers to your problems, but many just aren’t willing to put the effort scouring a website. Plus, it is a LOT easier to manage keeping the virus definitions up to date with a server that handles updating all the computers connected to it. If cost is a very big issue, consider getting your software from www.techsoup.org. The folks there have managed to get VERY GOOD rates on Symantec programs. For example, a 50-license copy of Norton AntiVirus Corporate Edition 10.0 costs only $130 (that’s $2.60/license), and the corporate edition doesn’t require one to pay for updates year after year. Plus, you do get much better technical support, even if you pay $30/call. And if you’re set on using Symantec, DON’T use the non-enterprise software. Trust me on that one. 2: Firewall

  26. Internet & Computer Security 101 THE BASICS 1: Windows Updates Number Four: ANTI-SPYWARE 2: Firewall 3: Anti-Virus

  27. Internet & Computer Security 101 THE BASICS Number Four: Anti-Spyware 1: Windows Updates Do you like having your homepage changed without your permission? Do you like porn pop-ups? Do you enjoy having your CPU maxed out at 100% for five minutes? If you answered “Yes!” to any of those questions, you too don’t deserve to have a computer. Spyware is everywhere, in surprising places. Not all spyware is bad. Some just tracks where you go on the internet. Most is not good. Lab computers are especially vulnerable, especially when subjected to new computer users. Younger children are horrible perpetrators of unintended spyware installation, but you can cut them a break because they really think they can get a Playstation 2 for free. Regardless, spyware is a problem than can cripple even the most powerful computers if no action is taken to remove the infection. 2: Firewall 3: Anti-Virus

  28. Internet & Computer Security 101 THE BASICS Number Four: Anti-Spyware 1: Windows Updates How to Avoid Spyware Many of the same rules for avoiding viruses apply for avoiding spyware, but here are some additional things. 1. Install at least one anti-spyware program. 2. Update the program on a regular basis. 3. Scan for spyware once a week. 4. When installing a free program, read carefully. Some free programs require you to install spyware in order to use them. 2: Firewall 3: Anti-Virus 5. Avoid AOL. 6. Install some sort of pop-up blocker (included with Service Pack 2). 7. Don’t believe the pop-up offers. You will not get a free computer, or video game, or whatever they are offering without suffering.

  29. Internet & Computer Security 101 THE BASICS Number Four: Anti-Spyware 1: Windows Updates There are many options available for free anti-spyware programs. Like free anti-virus programs, they don’t offer live technical support. But unlike the anti-virus programs, they offer just as many features and better protection. The problem is that they are a dime a dozen, really. And ironically, if you aren’t careful that program you think is helping you is actually spyware itself. Probably the best trio of free anti-spyware programs consists of Spybot Search & Destroy, Ad-Aware, and Microsoft Defender (formerly Anti-Spyware Beta 1). And yes, you will want to install them all. Unlike anti-virus programs, it’s OK to have more than one anti-spyware program running on your computer. 2: Firewall 3: Anti-Virus

  30. Website: http://www.safer-networking.org/en/index.html Spybot – Search & Destroy 1.4 A free program that offers real-time setting protection, browser tweaking, HOSTS file locking, advanced blocking, and much more.

  31. Website: http://www.lavasoft.de Ad-Aware SE Personal by Lavasoft A free program with an easy-to-use interface.

  32. Website:http://www.microsoft.com/downloads/details.aspx?FamilyID=435bfce7-da2b-4a6a-afa4-f7f14e605a0d&displaylang=enWebsite:http://www.microsoft.com/downloads/details.aspx?FamilyID=435bfce7-da2b-4a6a-afa4-f7f14e605a0d&displaylang=en Windows Defender Beta 2 by Microsoft A free anti-spyware program that offers real-time protection and integrates seamlessly into Windows XP. You must have a validated copy of XP to use this program (through Windows Genuine Advantage).

  33. Internet & Computer Security 101 THE BASICS 1: Windows Updates Number Five: CONFIGURE WINDOWS 2: Firewall 3: Anti-Virus 4: Anti-Spyware

  34. Internet & Computer Security 101 THE BASICS Number Five: Configure Windows 1: Windows Updates No long-winded explanation needed here. In our final bit on the basics, we’ll talk about two components of Windows that are relatively simple to configure but do a decent job for safety and security: user accounts and content advisor. 2: Firewall 3: Anti-Virus 4: Anti-Spyware

  35. Internet & Computer Security 101 THE BASICS Number Five: Configure Windows 1: Windows Updates User Account Rules 1. NEVER EVER make the administrator account, which is default, the main account. Always make at least one different account with administrative rights. 2. Password protect administrator accounts, even the default one, but WRITE EVERYTHING DOWN, especially if you put one on the default account. Only by logging in as the default administrator can you delete passwords without having to know them. 3. If children are going to be using the computers, create an account for them with limited rights. 2: Firewall 3: Anti-Virus 4. Turn off fast user switching and make people log on using CTL+ALT+DEL. 4: Anti-Spyware 5. If you expect to have many different accounts, it is best to let that be handled by a server, and you will be able to specify more advanced rights options.

  36. Internet & Computer Security 101 1. Move the mouse over “Start,” then “Control Panel” and click it. 2. If your Control Panel looks like the picture on the left, click on “Switch to Classic View” located on the left panel. How to configure User Accounts: Double-click on “User Accounts.” 3. If you have no firewall at all, you should probably turn this on by clicking the circle next to “On (recommended),” even if you plan on putting a different firewall program on the computer. You can always turn Windows Firewall off when the new program is installed. Unlike anti-spyware and anti-virus programs, having too many firewalls is not generally a good thing, because the settings tend to conflict and then you can’t get online at all. If you have a hardware firewall, which looks like a router, you don’t need to have Windows Firewall on.

  37. Internet & Computer Security 101 THE BASICS Number Five: Configure Windows 1: Windows Updates Content Advisor There are a number of web browsers available for use today. Avoiding the ones that come from ISPs (and are S-L-O-O-O-W), there are five popular choices, with Internet Explorer, by proxy of being included with Windows, being the most popular. Now Internet Explorer is known to have a number of vulnerabilities, which have to be patched through Windows Update. Because of this, someone might tell you to use an alternative, such as Mozilla or Firefox, both of which aren’t as popular but are thought to be more secure. They are certainly options, but in a lab-type setting you want to keep what is familiar to most users. The other browser alternatives certainly have advantages and more features, but some have a learning curve. Assuming you aren’t planning on putting a different browser on your lab computers, you can use a tool in Internet Explorer to restrict access to websites and content you don’t want children to see by configuring Content Advisor, which is essentially a free “nanny” program. 2: Firewall 3: Anti-Virus 4: Anti-Spyware

  38. Internet & Computer Security 101 1. Open Internet Explorer. In the main menu, click on the word “Tools,” and then click on the words “Internet Options…” in the drop-down menu. How to configure Content Advisor: 2. Click on the “Content” tab. 3. Click the “Enable…” button.

  39. Internet & Computer Security 101 4. The first tab you’re on will be “Ratings.” This is where you set the level of restrictions for websites. There are four categories: language, nudity, sex, and violence. To change the restriction level for each category, you have to click on the word and it will be highlighted. Below the categories is a slider. By moving the slider to the left or right, you set the restriction level from 0 to 4, with 0 being the MOST restrictive and 4 being the LEAST restrictive. When you move the slider, it will tell you what level you are on and give you a short description of what a person is allowed to see. Remember, on “Level 0,” a person will be able to see pretty much nothing, and on “Level 4” a person will be able to see pretty much everything. How to configure Content Advisor:

  40. Internet & Computer Security 101 How to configure Content Advisor: 5. Click on the “Approved Sites” tab. Here you have the ability to type in websites that a person is always allowed to see or never allowed to see. To do this, type an address in the box under “Allow this Web site:” and the “Always” or “Never” button will become available. To always allow the site, click “Always” and to never allow the site, click “Never.” When you do so, the site will appear in the box under “List of approved and disapproved Web sites:” with a green checkmark (approved) or a red dash (disapproved). To remove a site from the list, click on it and then click the “Remove” button.

  41. Internet & Computer Security 101 6. Click on the “General” tab. There are a number of things you can do on this page. You can allow users to see sites that have no ratings (it is up to each site as to whether or not they want to supply a rating) by clicking the checkbox next to “User can see…” By default, you can allow someone to see restricted content if an administrator types in a password, but if you don’t want that that happen, uncheck “Supervisor can type…” by clicking the checkbox. Click “Create Password” to create a supervisor password. You will be asked to type it twice, and you can create a password hint. You will not be able to use Content Advisor without a password. The last two options are a bit defunct, but you do have the ability to use other rating systems that have the file extension “.rat” if you don’t like the current one. Don’t click the “Find Rating Systems” button as it doesn’t actually help you find a different one. If you search Google and find one that is compatible with Content Advisor, save it somewhere on the computer and click “Rating Systems…” to pick and choose the system you want to use. How to configure Content Advisor:

  42. Internet & Computer Security 101 THE BASICS Number Five: Configure Windows 1: Windows Updates The Last Word: Foolproof? Umm… No! Part of the problem with these tools for configuring Windows is that they can be a bit more hassle than you want, and they don’t exactly do what you expect them to. Creating limited accounts doesn’t restrict a user’s ability to harm a computer as much as you hope. And Content Advisor is at times more restrictive than you want it to be. For example, depending on how low you set the level, you might not be able to see sites that have recipes on them if they call for chicken breasts, and you can probably guess why. Some sites, such as Disney, get blocked because they don’t have a rating system, or at least not one that Content Advisor knows. Lastly, forget surfing the internet if you forgot the password and had all the levels set to zero. The only way to reset a forgotten password in Content Advisor is to edit the registry files, and that’s not something you can do as a limited user (so don’t forget the administrator password either). It can not be said enough, but DON’T LOSE PASSWORDS. Windows passwords are not something that can be e-mailed to you, and are not recovered easily (doing a repair install on Windows XP is not what most people call easy) or cheaply. 2: Firewall 3: Anti-Virus 4: Anti-Spyware

  43. Internet & Computer Security 101 THE BASICS The basics are covered. 1: Windows Updates Now is time for…. The Not-So-Basics 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows

  44. Internet & Computer Security 101 THE NOT-SO-BASICS Before we start counting again,perhaps a definition is in order. What are the “not-so-basics?” These are things that anyone can do, with a little practice, but may not know about unless some research was involved. But when it comes to running a computer lab, they are things that should be known, since you can’t always count on having someone else doing the computer work for you. Some of these have a steeper learning curve than others. 1: Windows Updates 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows

  45. Internet & Computer Security 101 THE NOT-SO-BASICS 1: Windows Updates Number Six: HOSTS FILE & PROXY AUTO CONFIG 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows

  46. Internet & Computer Security 101 THE NOT-SO-BASICS Number Six: HOSTS File & PAC 1: Windows Updates These are the kind of things Average Joe most likely wouldn’t know about unless they had a virus or were searching the internet for a cheap way to block porn sites. Most people probably wouldn’t mess with them, but knowing about them and the role they play when connecting to the internet is actually quite important. 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows

  47. Internet & Computer Security 101 THE NOT-SO-BASICS Number Six: HOSTS File & PAC 1: Windows Updates The HOSTS File Ahhh.. There’s no place like 127.0.0.1! And if you got that joke, then you know what the HOSTS file is, don’t you? If you don’t get it, let’s start with what the HOSTS file is and why it is important. The file is a simple text file that isn’t in an obvious place, and for good reason too. As simple as it is, it plays a very big role in your ability to connect to the internet. Why? Well, the HOSTS file is used by Windows to determine the IP address of the website you type in. It looks at the file first. If the website you type is in the list, it will direct to the IP address in the list. If it isn’t there, it then uses your ISP’s domain name server. Generally, there are no IP addresses in the HOSTS file, except for 127.0.0.1, which loops back to your computer, otherwise known as “home.” If you tell a website to direct itself to your computer it won’t find it. Confused? Let’s take a look at the file. 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows

  48. Internet & Computer Security 101 Before you begin, you will need to be able to view hidden folders and files. To do this, go to “My Computer,” then Tools, Folder Options… and click the “View” tab. Click the circle next to “Show hidden files and folders” if the green dot isn’t already there, and click the checkbox next to “Hide extensions for known file types” so there is no green check in the box. Then click the “Apply” button. 1. Open “My Computer,” then double-click on your hard drive (C:). Open the “Windows” folder, then the “system32” folder, then the “drivers” folder, then the “etc” folder, then open the “hosts” file. How to use the HOSTS file: 2. Your computer might not know what program to open the file with. If it doesn’t a new window will open with a list of programs to choose from. WordPad is the easiest choice. Click the “OK” button to continue.

  49. Internet & Computer Security 101 If you’ve never tweaked the HOSTS file before, then you won’t see much of a list. Some programs, like SpyBot, actually have a list of bad websites that can be written to the file. If you tried to go to a website in this list, you will get the “This page can not be displayed” error because the file is looping those websites back to your computer. Remember, when type an address to go to, your computer checks here first before anything else. People who write viruses know this, and some will add good sites to the list, like Symatec or McAfee, so you would be unable to access the site to download updates or check on how to remove it. It is wise to use a program, like SpyBot, to lock the file so that new entries can’t be added unless you specifically put them there. How to use the HOSTS file:

  50. Internet & Computer Security 101 THE NOT-SO-BASICS Number Six: HOSTS File & PAC 1: Windows Updates Proxy Auto Configuration (PAC) Technical jargon, right? Let’s skip the long winded description. What you need to know about PAC is that it is a file that can be used to block access to websites. It is similar to the HOSTS file in how it blocks access, but the big difference is rather than using the actual website it looks for keywords in the address itself. In a way, this is easier than using the HOSTS file, since you don’t actually have to know the address to block it. The flip side? Configuring a PAC is a little more work, probably a little too much work for the novice computer user. However, with a good HOSTS file and using a PAC (as well as using the content advisor), you can effectively block access to most porn sites as well as sites that can infect your computer with spyware and viruses. 2: Firewall 3: Anti-Virus 4: Anti-Spyware 5: Configure Windows

More Related