ARE WE SAFE AND SECURE? FROM A COMPUTER PERSPECTIVE…

October 1, 2001

Reprinted from Renfrew-Collingwood News,
October/November 2001.

In the wake of the many horrific acts of terror that many of us have witnessed on September 11th, 2001, in the New York City, Washington, and Pennsylvania, many have questioned about the security and safety of our daily well-being.

Most of the security concerns of personal computer users come from two forms-viruses and hackers (or intruders). As more individuals get accustomed to using the Internet and working with computers, the security risks increases. Every year viruses and hackers cost the government, and companies billions of lost dollars to prevent and defend. So what are viruses and hackers and how can we prevent ourselves from being their next victims.

A computer virus is a self-replicating computer program created by mischievous individuals that usually attaches itself either partially or fully to certain files or software applications. Once open these files or applications cause the computer to behave, in most cases, erratic. However, not all computer viruses are bad, some are quite benign and do nothing more than display a message or make funny beeping sounds, others like the most recent nimda (admin spelled backwards) and infamous “I Love You” viruses cause major traffic jams on the Internet causing many to lose Internet and e-mail services.

General Viruses:

  1. Boot Sector. Virus that replaces, changes, or imbeds itself into the boot sector of the hard drive. The “boot sector” of the hard drive is usually accessed first when you first turn on your computer. This kind of virus can cause your computer to “lock up” upon starting your computer, thus preventing it from starting.
  2. File. Virus that infects application programs when it is executed or opened.
  3. Macro. Usually written in Macro programming language of a particular software package such as Microsoft Word or Excel. Virus could activate when a person decides to hit the “Save” file button or “Open” file button.
  4. Multipartite. Virus infects both file and boot sector. This kind of virus may infect your computer a zillion times before you actually catch it.
  5. Polymorphic. Virus mutates whenever it is passed on to another computer or executed, thus making it very difficult for virus-scanning software to detect.
  6. Stealth. Makes infected software seem uninfected, but can not escape a good virus scanning software.

Malicious Code:

  1. Worm Program. Computer code that replicates itself, like a virus, and slithers through the network connections (i.e. Internet) to infect any machine on the network and replicate within it, using up valuable storage and computer resources, thus slowing it down. One good thing out of all of this is that worm programs do not really alter or delete files.
  2. Trojan Horse Program. Unlike the worm program, the computer code does not replicate itself, but it is something nasty disguised as something really nice, like a electronic “Happy Birthday” card. When you execute or play this file or program, the program can capture information about you, passwords, etc and allow hackers to control your machines.
Because most computer users have access to the Internet and share a lot of computer files amongst themselves and fellow workers, the proliferation of computer viruses will continue to become a major security threat to computer users in both the home and at work.

Checklist of Virus Free Computing:

  • Avoid opening unexpected e-mail attachments and downloads from people or websites that are not very reliable.
  • Get a good e-mail client. People using Outlook Express or Outlook should be careful. These products have been notorious in the past for spreading viruses because of the security loop holes that clever hackers are exploiting, Eudora and Pegasus are both free email clients that people can download and use.
  • Get a reliable antivirus scanner. McAfee Antivirus 6.0 and Symantec Norton Antivirus 2002 are the most popular and readily available products out there today.
  • Keep your virus-scanning software up-to-date. Since new viruses are coming out every day, make sure you enable the automatic update features of these products to ensure that the scanning software is up-to-date with the most recent virus definitions (vaccines), so that it will be able to detect the most recent viruses.

Viruses are not just the only threat for computer users, unauthorized intruders may decide to snoop around in your computer when you are online using the Internet. These hackers help themselves by downloading or stealing files from your computer or in extreme cases may cause hardware malfunctions in your computer. You do not necessary have to be online to have people look at your files. People, coworkers, bosses, friends, and family members could be unauthorized people looking through your files.

For individuals that are on an “always on” Internet connection, (i.e. Shaw@Home, or Telus Velocity ADSL service) or on computer network (computers are sharing resources like disk drives, folders, and printers, you should get some kind of a firewall software. When you are either sharing computer resources are have a high speed Internet connection, you are basically opening the door and inviting people to come in. A firewall acts like a door and prevents certain data from coming in and out. The software creates a virtual barrier or “firewall” between your computer and the rest of computers it is connected to or “network”. The “firewall” examines each little package of information that comes to your computer in the form of a “packet”. Based on the preferences and settings that you have given your “firewall” it effectively screens out packets of data that can potentially be harmful to your computer. These software packages allow users to essentially block out intruders; some products also allow parents of young children to set parental controls to prevent children from accessing inappropriate sites.

Checklist to Thwart Cyber Snoopers:

  • If your computer at work or home can be accessed by more than one user other than yourself, you should make sure you have some kind of password protection. This is your first line of defense. Make sure you don’t use something really obvious like your name, birth date, house address or my son or daughter’s name.
  • Get “personal firewall” software if you have an “always on” connection. Go to the following sites to get your “Free” firewall software. Zone Alarm or Tiny Personal Firewall or a product called Surfinguard. For small businesses or companies you may want to setup hardware solutions like proxy servers, or a product like Merilus’ Firecard.

If you have questions, comments, or suggestions, feel free to drop me an e-mail at: gb.technobytes@gmail.com.

See you soon,

~Geekboy.