Title: Protecting Your Computer System
1Protecting Your Computer System
Innovative Teaching Center
2Objectives
- After completing this workshop, you will be able
to
- Identify common problems created by viruses,
adware, and spyware.
- Identify software utilities for protecting
computer systems against computer viruses,
adware, spyware, and pop-up windows. -
- Describe how viruses, adware and spyware can
take over a computer and how to prevent
these attacks.
- Identify firewall software and why a personal
firewall is important.
- Describe the two different methods of preventing
unwanted pop-up windows from appearing when
browsing on the web.
- List different methods in which a computer user
can prevent viruses, adware, spyware, and
pop-up windows from infecting a computer.
3Workshop Outline
Spyware Adware
Viruses
Firewalls
Pop-up Blockers
Top 10 Ways to Protect Your Computer
4Introduction
5Before you Connect
According to researchers, an unpatched Windows PC
connected to the Internet will last only 20
minutes before its compromised by Spyware
Adware, Viruses, and worms
6Adware
Adware is any software application in which
advertising banners are displayed while the
program is running.
Source PC Magazine, March 2, 2004
7Signs of Problems
Your browser always comes up to a search
engine (IncrediFind)
A new item appears in your Favorites list
Your system runs noticeably slower
A search tool bar appears in your browser
Pop-upspop-upseven when your not browsing
Homepage changed to a different page
hijacked (Casino Palazzo)
8Windows Task Manager
- Used to quickly determine if you have a problem
- Bring up Windows Task Manager
- (hit Ctrl-Shift-Esc)
- Check process and performance
IncrediFind Search Engine will be tipb.exe
9The Five Critical Ingredients of PC Security
- 1. Operating System Updates
2. Adware Spyware Removal Utilities
3. Antivirus Removal Utility
Layers of Defense
4. Personal Firewall
5. User Caution
10Spyware Adware
11Adware
- Any software application in which advertising
banners are displayed while the program is
running. - Collects information about the user in order to
display advertisements based on user's browsing
patterns.
12Spyware
- Any software that covertly gathers user
information through the user's Internet
connection without his or her knowledge. - Typically bundled as a hidden component of
freeware or shareware programs. - Monitors user activity on the Internet and
transmits that information in the background to
someone else.
13Spyware
- Can collect sensitive data like credit card or
social security numbers - Or capture all your keystrokes
- Scan your hard drive
- Review your Internet cookies
- Change your homepage for your browser
14Differences from viruses/worms
- Spyware is not aimed at doing malicious things
your computer - Spyware can significantly reduce the performance
of your computer--usually manifested by slowing
it down - Written by companies (often outside the U.S.),
not individuals
15What to do?
- Use reputable programs to protect your computer
- Spybot or AdAware
- AdAware (www.lavasoftusa.com)
- Spybot (www.spybot.info)
- These programs reviewed often at cnet.com and
pcworld.com - Use a software firewall like Zonealarmhttp//www.
pcworld.com/howto/article/0,aid,114738,00.asp
16Spybot Download
- Search your hard disk for spyware or adware.
- Removes them
- Homepagehttp//spybot.safer-networking.de/
17Download, install, configure
18Online-Check for updates
19Check results
20Immunize
21Dont underestimate
- this growing threat
- Take action to defend your
- computer and yourself
22Viruses
23What is a Virus?Social diseases of
computersMalicious code written by
malicious people
24Types of Malicious Code
- Virus
- A computer virus attaches itself to a program or
file so it can spread from one computer to
another, leaving infections as it travels. - Can cause mildly annoying effects while others
can damage your HW/SW, or files. Almost all
viruses are attached to an executable file.
Viruses, worms, and Trojan Horses are all
malicious programs that can cause damage to your
computer
Worm Spread from computer to computer, but
unlike a virus, travels without any help from a
person. Consumes system memory causing Web
servers, network servers, and individual
computers to stop responding.
Trojan Horse At first glance will appear to be
useful software but will do damage once
installed. Changing your desktop, adding silly
active desktop icons or deleting files.
25How Does Your Computer Can Catch a Virus?
- Has to be introduced to your system
- Medium in which a virus can be introduced
- Floppy
- Modem
- Network
- E-mail
- File sharing programs
26How Do You Avoid a Virus Problem?
- Backup important files
- Limit trading floppy disks
- File sharing programs
- Avoid .exe, .scr, .Ink, .bat, .abs, .dll, .bin,
anmd .cmd. - Install an Antivirus utility
- Online Scanners
27Antivirus Utilities
See Handout forMore Information
28Words of Advice
- Don't run program files from unknown or
unreliable sources - Keep you operating system and antivirus software
up-to-date (use automatic updates)
WebCT Users
AntiVirus detection should be handled both server
side and client side. Even in WebCT, our server
should refuse to save that file or allow the
next person to Access it if the file is
"possessed." And make lots of backups.
29Firewalls
30What is a Firewall?A firewall isolates your
computer from the Internet using a wall to block
out unwanted visitors.A firewall will
protect you against things that try to break into
your computer, not the things you let in.
31Two Types of Firewalls
- Hardware firewall (typically on Routers)
- Software firewall (sometimes referred to
personal firewall)
32How Do They Work?
- Castle gates
- Option to enable or disable
33Where do I need a Firewall
- Do have a firewall on each machine at home to
communicate with each other - One on the router (WiFi)
- Set to block all non-legitimate traffic
Dont run multiple firewalls on one computer
34Which One is the Best One to Buy?
See Handout forMore Information
35Pop-up Blockers
36Those Annoying Ads
Websites use pop-up windows to make money,
however these ads can be very annoying.
WebCT Users
Beware, these programs often block useful
javascripts, like in WebCT. Idea Make your
WebCT server a trusted" site to their
popup-blockers, rather than telling users to
turn off the popup-blockers.
37Three Methods to Stop Pop-ups
- Opt-out with advertiser
- Software solutions Pop-up stopper utilities
See Handout For List of Opt-outAdvertisers And So
ftware Solutions
38Three Methods to Stop Pop-ups
- Windows XP Service Pack 2 (SP2) Internet Explorer
allows you to prevent most pop-up windows
39Top 10 Ways to Protect YourComputer
40Top 10 Ways to Protect YourComputer
2. Get a personal firewall
3. Run antispyware applications
4. Update your operating systems and browser
version (http//www.microsoft.com/security/b
ulletins/default.mspx)
5. Use a different browser program (Firefox
www.mozilla.org)
6. Dont install something unless you know what
it is, and read the fine print before
loading programs.
7. Update Antivirus applications every time you
go online.
8. Beware of peer-to-peer file sharing (Kazaa and
Grokster.)
9. Dont open unsolicited e-mail
10 Talk to your family about file sharing
41The End