Deprecated: mysql_connect(): The mysql extension is deprecated and will be removed in the future: use mysqli or PDO instead in /home/a26f9f83/public_html/articles/includes/config.php on line 159
Keeping Worms Out of Your Network... > NetSparsh - Viral Content you Love & Share

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms.

This worm is a self-replicating (makes a copy of itself, aunt sookie!) program that reproduces itself over a network. It can be hidden in an email attachment from an unknown sender, a movie download from a suspicious website, or an application sent from someone you don't know. Once on your computer it then can replace a single file, like a winsock.dll or many files and send copies of itself along with email or newsgroup messages that you can post.

The following are ways to keep these type of worms out of your network:

a) Never, I said never (for emphasis) connect an unpatched, non updated computer or other Internet related device to the Internet. How do you update and patch a computer without connecting to the Internet? Get a cd from Microsoft with the latest and greatest patches and updates, then connect the device and then check for updates while connected to make sure you have protection.

b) Always, I said always (yes I am being redundant) use a firewall between your network of computers and the Internet. Even if your network of computers is 1 or 2 computers, it is still a network and needs a firewall to protect it, really protect it. A single computer connected to the Internet is now part of a world wide network thru it's Internet connection and is therefore vulnerable without protection. Get a firewall, a real firewall.

c) Educate and train anyone who uses your computer(s) network. Many times an infection is invited by careless users who download infected email, visit infected sites, or bring infected machines (laptop's, pda's) into a network from outside.

d) Patch and update, patch and update, patch and update (redundant, oh yeah). Yes it's a pain, and it requires time to do and verify that it's actually patched and updated. However it's definitely simpler and cheaper than trying to fix an infestation, or explain to everyone why the network is down or their computers won't work because a worm is eating through everything they have worked hard to save and protect.

e) Make sure up-to-date anti-virus software is on every machine, everything connected to the Internet. Anti-virus packages aid in protection and detection against worms.

f) Establish security rules for your network and educate everyone who touches the network. They must be enforced, daily.

g) Frequently check your network for vulnerabilities. Visit vulnerability website's, take advantage of free scanning tools on the Internet to test your machines. New vulnerabilities and new exploits are released constantly, and you can't protect against what you have no idea what is coming your way.

********************************************************

Daviyd Peterson: 10-year consultant, instructor, trainer Helps african american homeschools bridge the digital divide by becoming computer homeschools. Free article on "Computer Homeschooling" and other related articles http://www.homeschoolwireless.com/ho meschoolwireless.htm

*************************************************************

In The News:

This RSS feed URL is deprecated, please update. New URLs can be found in the footers at https://news.google.com/news

The Verge

Google discloses Microsoft Edge security flaw before a patch is ready
The Verge
Microsoft and Google have been bitter rivals for at least a decade, and the pair have had several disagreements over security vulnerability disclosure in recent years. Google is stoking those disagreements again this week by disclosing a Microsoft Edge ...
Edge browser suffers security flaw which Microsoft failed to fix on timeTechRadar

all 12 news articles »

New York Magazine

Kelly Orders Changes to Security Clearance Process at White House
New York Magazine
White House chief of staff John Kelly has approved an overhaul of how the White House handles temporary security clearances after facing bipartisan pressure in the wake of the Rob Porter scandal. Porter, the former White House staff secretary, had been ...
John Kelly overhauls White House security clearancesVox
Chief of Staff Orders an Overhaul for Security ClearancesNew York Times
Chief Of Staff Kelly Wants New White House Security Clearance RulesNPR
CNN -Axios -Washington Post -Washington Post
all 288 news articles »

CBS News

Should we rethink school shootings as a homeland security threat?
CBS News
When a 29-year-old man from Uzbekistan plowed a truck into a crowd of people in Manhattan in October, killing eight, President Trump's response to the attack as a matter of homeland security was swift. Within hours, the president decried the attack and ...

and more »

Bloomberg

Three Things Worrying the Global Security Establishment
Bloomberg
After a year of U.S. President Donald Trump, the trans-Atlantic security establishment seems unsure whether to be relieved that a major war hasn't begun on his watch or alarmed at the scale of emerging risks. Speeches and panel discussions at the ...
The Munich Security Conference is one of the premier global forums, so what's with the malaise?Washington Post
'Do not test Israel's resolve,' Netanyahu tells Iran at Munich Security ConferenceFRANCE 24
Hot Debate Around Iran Nuclear Deal on Final Day of Munich Security ConferenceSputnik International

all 329 news articles »

Reuters

Carnival probes security personnel's response to brawl in South Pacific cruise
Reuters
SYDNEY (Reuters) - Carnival Corp (CCL.N), the world's largest cruise operator, said on Monday it was investigating the response of its security personnel to a brawl that broke out on one of its South Pacific cruises that resulted in 23 passengers being ...

and more »

Business Insider

A Secret Service agent tackled a Chinese security official over the nuclear football when Trump visited China
Business Insider
The news website Axios reported on Sunday that a Secret Service member tackled a Chinese security official during President Donald Trump's trip to China in November. The incident reportedly began when the Chinese security detail tried to prevent the ...
Chinese, US security officials scuffled over 'nuclear football' during Trump trip, says reportSouth China Morning Post
John Kelly and Secret Service agent scuffled with Chinese security officials over nuclear 'football' in Beijing ...The Japan Times
US and China reportedly scuffled over nuclear 'football' during Trump's Beijing visitCNBC
Mediaite
all 40 news articles »

Engadget

Air Force security hackathon leads to record payout
Engadget
The US Air Force's second security hackathon has paid dividends... both for the military and the people finding holes in its defenses. HackerOne has revealed the results of the Hack the Air Force 2.0 challenge from the end of 2017, and it led to ...


Los Angeles Times

USC students explore civil rights, national security in university's first history class on WWII internment
Los Angeles Times
USC student Matthew Weisbly has Jewish and Japanese relatives who experienced the Holocaust and internment. (Christina House / Los Angeles Times). USC faculty member Susan Kamei was struck by discomforting moments of deja vu during the 2016 ...


Bloomberg

Electric Vehicles May Raise India's Risk of Cyber-Security Breaches
Bloomberg
India's dependence on imported components for electric vehicles could make the country vulnerable to cyber-security breaches, according to the government's chief policy think-tank. India should manufacture the majority of the parts needed for its ...

and more »

ZDNet

Government agrees to up Medicare card privacy and security controls
ZDNet
The federal government has agreed to the 14 recommendations made by the independent review of health providers' access to Medicare card numbers, touting an individual's privacy and card information security. One recommendation made by the review in ...

and more »
Google News

How To Clean the Spies In Your Computer?

Manual Spy Bot Removal > BookedSpaceBookedSpace is an Internet Explorer... Read More

Criminals are Fishing For Your Identity

What is Phishing? In a typical Phishing attack, a criminal... Read More

Securities

NETWORK SECURITIES: IMPORTANCE OF SECURITIESComputers and securities must form a... Read More

Protecting Your Children On The Internet

If you are a parent, as am I, I think... Read More

File Sharing - What You Need to Know!

File sharing on p2p is soaring despite the music and... Read More

Dont be a Dork ? Protect Yourself

There are folks out there who use their powers for... Read More

Spyware Symptoms

Spyware symptoms happen when your computer gets bogged down with... Read More

How Did This Happen to Me? Top 10 Ways to Get Spyware or Viruses on Your Computer

If you use the internet, you have probably been infected... Read More

Identity Theft Article ? A Phisher Is Trying To Steal Your Identity!

Sooner or later everyone with an email account will receive... Read More

Phishing: An Interesting Twist On A Common Scam

After Two Security Assessments I Must Be Secure, Right? ---------------------------------------... Read More

The Truth About Hiding Your Tracks on the Internet

Ok, ok, I know you've seen them. All those pop... Read More

The Importance of Protecting Your PC from Viruses and Spam

Today the internet is a mine field of malicious code... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Spyware ? Your Web Browser is the Culprit!

My first experience with a spyware BHO based infection was... Read More

With the Rise of Internet Crimes, Users are Turning to High-Tech ?PI?s? for Solutions

High-tech private investigators are becoming the answer for many Internet... Read More

Eliminate Adware and Spyware

Everyone should eliminate spyware and adware from your hard drive... Read More

Phishing

Recently I have received email from my bank/credit Card Company,... Read More

Phishing - A High Tech Identity Theft With A Low Tech Solution

Have you ever got an email asking you to confirm... Read More

What to Look for before You Purchase Spyware Software

Huge number of spyware software applications are available in the... Read More

Dialing Up a Scam: Avoiding the Auto-Dialer Virus

For many, the daily walk to the mailbox evokes mixed... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Is My PC Vulnerable on the Internet?

No longer are viruses the only threat on the internet.... Read More

Road Warrior At Risk: The Dangers Of Ad-Hoc Wireless Networking

Airport Menace: The Wireless Peeping Tom ---------------------------------------- As a network... Read More

Arming Yourself Against Spyware

While clicking from site to site on the internet you... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More