Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
New Computer? Steps to Protect Your Computer Before Connecting to the Internet > NetSparsh - Viral Content you Love & Share

New Computer? Steps to Protect Your Computer Before Connecting to the Internet

Getting a new computer should be an exciting and gratifying experience. After all, you'll be able to do things faster, safer and without having to worry that your old hard drive is so full that one more file will "break the camel's back."

However, there are dangers out there that probably didn't exist when you bought your last computer. And there's the question of what will happen to your old hard drive, with all your personal data on it.

Let's deal with your new computer first. This information applies specifically to Windows XP, although it has broader application as well.

Remember:

  • Many computers' default configurations are insecure.
  • New security vulnerabilities may have been discovered between the time the computer was built and configured by the manufacturer and you setting up the computer for the first time.
  • When upgrading software from commercially packaged media (e.g., CD-ROM, DVD-ROM), new vulnerabilities may have been discovered since the disc was manufactured.
  • Attackers know the common broadband and dial-up IP address ranges, and scan them regularly.
  • Numerous worms are already circulating on the Internet continuously scanning for new computers to exploit.
  • It is estimated that 80% of spam comes from personal computers (known as "Zombies"), like yours, that have been compromised with a trojan or other malware that the owner is completely unaware of. By protecting your computer you are protecting the Internet!
As a result of these hackers' efforts, the average time-to-exploitation for an unprotected computer is measured in minutes.

Standard (wrong) advice to home users has been to download and install software patches as soon as possible after connecting a new computer to the Internet. However, since the background intruder scanning activity is pervasive, it may not be possible for you to complete the download and installation of software patches before the vulnerabilities they are trying to fix are exploited.

This Special Report offers advice on how to protect your computer before connecting it to the Internet so that you can complete the patching process without incident.

We strongly recommend following all the steps when upgrading to a new operating system from disc(s) as well as when connecting a new computer to the Internet for the first time.

  • Perform these steps before connecting to the Internet for the first time.
  • The links in this document are LIVE LINKS, but we recommend that you NOT connect to them through your new computer. Use the live links on a computer that is fully updated, virus protected and firewalled, and download the instructions/programs to a CD or a USB drive, then transfer them to your new computer. A 128 megabyte USB drive costs less than $20, is "plug and play," and can be used over and over.
  • If possible, connect the new computer behind a network (hardware-based) firewall or firewall router.

    A network firewall or firewall router is a hardware device that is installed between the computers on their Local Area Network (LAN) and their broadband device (cable/DSL modem). By blocking inbound access to the computers on the LAN from the Internet a hardware-based firewall can often provide sufficient protection for you to complete the downloading and installation of necessary software patches. A hardware-based firewall provides a high degree of protection for new computers being brought online.

    If you connect to the Internet before you install a firewall, it may be possible for the computer to be exploited before the download and installation of such software is complete.

    XP has a built in firewall that may or may not be enabled. If Microsoft XP has not had Service Pack 2 installed, follow these instructions to turn on the Internet Connection Firewall. If XP is installed WITH Service Pack 2, then your firewall is enabled by default.

    Microsoft has provided both detailed and summarized instructions for enabling the built-in Internet Connection Firewall on Windows XP.

    We strongly recommend that you install a third-party firewall application and THEN turn off the Windows firewall.

    We recommend ZoneAlarm (www.ZoneLabs.com), which is FREE. Zone Alarm is the top rated firewall, and protects both incoming and outgoing data. XP's firewall ONLY protects against incoming data. Zone Alarm's setup file is approximately 7 megabytes, which will easily fit on a CD or USB drive.

  • Disable File and Printsharing if enabled.
  • Go to Start -> Control Panel.
  • Open "Network and Internet Connections".
  • Open "Network Connections".
  • Right-click on the network connection you wish to change (e.g., "Local Area Connection").
  • Select "Properties".
  • Make sure "File and Printer Sharing for Microsoft Networking" is unchecked.

  • Connect to the Internet.

  • Go to windowsupdate.microsoft.com.

    Follow the instructions there to install all Critical Updates. However, if you are going to install Service Pack 2, READ THIS FIRST! Pay particular attention to "Get the latest PC manufacturer updates for SP2, because you may need to update drivers for your PC to work properly.

    Only download software patches from known, trusted sites (i.e., the software vendors' own sites), in order to minimize the possibility of an intruder gaining access through the use of Trojan horse software.

    Staying Secure

    Follow the principle of least privilege - don't enable it if you don't need it.

    Consider using an account with only 'user' privileges instead of an 'administrator' or 'root' level account for everyday tasks. You only need to use administrator level access when installing new software, changing system configurations, and the like. Many vulnerability exploits (e.g., viruses, Trojan horses) are executed with the privileges of the user that runs them - making it far more risky to be logged in as an administrator all the time.

    Moving Your Applications and Data

    Unless you've never had a computer before, you'll want to move your old data onto your new machine. There are several ways to do this quickly and easily (although there are often a few glitches). The best article on the subject is www.pcworld.com/howto/article/0,aid,115632,00.asp.

    Protecting Your OLD Data

    So, what do you do with your OLD computer? Perhaps someone else can use it, maybe a school or a retirement center?

    One of the biggest mistakes people make is thinking that deleting files using Windows Explorer actually deletes the files! It DOESN'T!

    When you delete files in Windows, all it does is delete the pointers that show where the files are. Any competent computer whiz can easily find a program on the Internet that will rebuild the file pointers, and then they have access to all your files- your emails, your business information and your financial information.

    You can go to any flea market in the country, and chances are you can purchase a used hard drive with the old owner's data still on it! Many professional identity thieves are doing just that!!!!

    What CAN you do?

    Personally, I remove the hard drive from the computer, and I keep it (not in a place that it would be found if a burglar came into my house).

    Another alternative is to use a free disk wiping utility or purchase one.

    To effectively remove data from a hard drive, it must be overwritten completely several times. All of the temporary files, all of the caches, all of the "swap files" that are created as you work may be lurking in some unknown corner of the hard drive.

    Contrary to popular belief, even reformatting the drive does not necessarily make file recovery impossible!

    Consider this ? A recent search of hard drives that had been discarded revealed:

    • A disk that had been owned by an Attorney, with all his case files and confidential information on it.
    • A disk that had been owned by a CPA, with all her clients' tax information on it.
    • A disk that had been owned by a Medical Clinic on it, with hundreds of patients' medical records still on it.

      There are free programs that will do an adequate job of wiping a hard drive clean ? although the data may still be recoverable by professionals with very expensive programs, and there are inexpensive programs that will make the data completely unrecoverable.

      We recommend DBAN (dban.sourceforge.net/)which does 5220.22-M-compliant wiping. 5220.22-M-compliant wiping is the Department of Defense secure delete wiping standard. Be aware, however, properly wiping a hard drive, particularly some of the large ones can take hours, but it is worth it to protect your privacy.

      © Steve Freedman, Archer Strategic Alliances, 2005 All Rights Reserved

      Steve Freedman
      Author of "Help! Something's Got Hold of My Computer and It Won't Let Go!"
      A PC Security eBook for Newbies, Skilled Users and Wizards
      Archer Strategic Alliances
      http://www.HelpProtectMyComputer.com

      In The News:

      This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

      New York Times

      When a Tech Reporter Doesn't Use Much Tech
      New York Times
      How do New York Times journalists use technology in their jobs and in their personal lives? David Streitfeld, a technology reporter in San Francisco, discussed the tech he's using — and not using. For a tech journalist, you don't use a lot of tech ...


      New York Times

      The Benefits (and Limits) of Using Tech to Plan a Wedding
      New York Times
      Because of the deeply personal nature of a wedding, you can't just plan everything with a few taps on a smartphone or by sitting in front of a computer. Eventually you will have to talk to lots of people the old school way: on the phone or in person.


      New York Times

      How to Convert Photo Files in Bulk
      New York Times
      Q. I have hundreds of TIFF-formatted photos. Is there an efficient way to convert these photos to JPG all at once? A. Just as you can rename multiple photos at once through “batch processing,” you can convert a large collection of images from one file ...


      88.9 KETR

      Businesses Need To 'Mind The Gap' Between Office Tech And Personal Tech
      88.9 KETR
      Our personal technology commentator, Jeremy Gamez, comments on a recent article emphasizing that businesses wanting to attract the brightest young employees need to be sure that their office technology is as good as Millennials' personal technology.


      New York Times

      Add Pictures to Android Contacts
      New York Times
      Q. How do I add an Android contact photo for someone who doesn't already have one so I can see something besides initials in a circle? A. Start by opening the Contacts app on your Android device and selecting the contact you'd like to dress up with a ...


      New York Times

      How the 52 Places Traveler Stays Charged While Chronicling the World
      New York Times
      How do New York Times journalists use technology in their jobs and in their personal lives? Jada Yuan, who is crisscrossing the globe as The Times's 52 Places Traveler, discussed the tech she's using. You are endlessly traveling, and you must have to ...


      New York Times

      How to Go Back to the Old Gmail
      New York Times
      Q. I tried to get used to the new Gmail web design, but I just don't like it. Can I go back to the old one? A. For the time being, Google is keeping around the previous version of Gmail on the web, and you can revert to the old look from the inbox ...


      New York Times

      What Europe's Google Fine Means for Android Users
      New York Times
      American government officials have expressed interest in taking a tougher stance on regulating tech companies, but Europe has largely acted by itself in its regulatory actions against Silicon Valley titans. So other than Google's having to pay a big ...
      Google quietly working on a replacement for Android, called Fuchsia, that's causing some fierce internal squabblingFinancial Post

      all 515 news articles »

      New York Times

      Emergency Charging Options on the Road
      New York Times
      Likewise, the Federal Trade Commission has previously warned travelers about directly connecting phones to the USB jacks for the infotainment systems in rental cars because the phone could share personal data with the car's system, but a dedicated ...

      and more »

      New York Times

      I Used Apple's New Controls to Limit a Teenager's iPhone Time (and ...
      New York Times
      Apple's new parental controls cut a teenager's iPhone use in half. It wasn't as effective on our personal tech columnist.

      and more »
      Google News

  • What Has A Portable MP3 Player Have To Do With Your Business

    Plenty! When we made the decision to be our own... Read More

    Computer Geeks and Garden Gnomes

    First and foremost before I begin my ranting it is... Read More

    How To Search Your PC With Google Desktop

    In this era of Internet, most people are frequent users... Read More

    Is Online DVD Rental or Pay-Per-View the Best Way to Get Your Movies?

    With renting methods such as online DVD rental and pay-per-view,... Read More

    D2X Digital SLRCoolpix 8800 Actually Refers to Two Nikon Cameras

    Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More

    Bluetooth Technology: Tips for Buying Headsets or Headphones

    The technological horizon has always got something new to offer,... Read More

    7 Reasons NOT to Take Your Laptop on Holiday!

    Heading off on vacation soon?Then perhaps you're tempted to take... Read More

    Be Prepared in the Event Computer Disaster Strikes

    ComputersBusinesses and individuals alike have all grown to rely on... Read More

    4 Easy Ways to Speed Up A Sluggish PC

    Computers are supposed to speed up our productivity?to help us... Read More

    Improve PC Performance - 6 Tips You Must Know

    Are you frustrated with your PC?Is it feeling sluggish or... Read More

    Digital Cameras: How Many Pixels Do I Need?

    With the bewildering number of digital cameras on the market,... Read More

    Be Your Own IT Department

    If you use a computer, you need to know more... Read More

    How To Have Two (Multiple) Copies Of Windows

    Having two operating systems is not as difficult as many... Read More

    Repairing A Corrupt .RAR/.ZIP Archive

    Step 1:Open WinRAR and browse to the folder with your... Read More

    Registry Tools Demystified

    Not sure what Windows registry is or how it works?... Read More

    Lives With Games Tradition and Industry

    The United States Of America citizen feels that games is... Read More

    Troubleshooting Computer Freeze (Lockup) Problems

    How familiar does the following sound? Your computer was working... Read More

    Portable DVD Players - Things To Know

    In my humble opinion nothing makes a long trip easier... Read More

    Windows Task Manager in English

    You use Ctrl+Alt+Del to see what's running on your PC,... Read More

    HTML Explained: Part 2

    Get started creating web pages using text files and HTML... Read More

    HTML Explained: Part 1

    Want to save money while promoting your web-based business? Of... Read More

    Internet Explorer Shortcuts for Mouse-o-phobes

    If you're like me, you occasionally find the ubiquitous mouse... Read More

    Password Nightmares

    Good Morning Mr. Sampson. Please type in you Personal Identification... Read More

    Deleting and Destroying Data Forever

    Peoples' private information needs to stay private, even after it... Read More

    What Does That Error Message Really Mean?

    Surf the 'Net for about 10 minutes and chances rate... Read More