How Safe is Your Success? Part 3 of 8

Written by Bill Hely


"How Safe is Your Success" is a series of eight articles. Each article addresses a different aspect of a universal problem which is of particular importance to those who do business on-line. Most Internet users are at least aware there are dangers "out there", but few appreciaterepparttar real extent of those dangers,repparttar 103500 possible (even likely) consequences, orrepparttar 103501 best, most practical and least expensive means of countering them. This series is intended to at least provide some useful awareness ofrepparttar 103502 situation.

-------------------------

Part 3 - The Anti-Virus Conundrum

One ofrepparttar 103503 most common defenses I hear from clients when I tell them I have discovered that a virus isrepparttar 103504 cause of their "problem" goes like this: "But I'm using an anti-virus. I've always had one! The man inrepparttar 103505 computer shop put it on for me".

The Man In The Computer Shop, by dint ofrepparttar 103506 fact he is "in computers" and speaks all that jargon stuff, is perceived as an Expert Who Can Be Trusted. I mean, do you argue with your plumber about pipe diameters and flow rates? Do you quiz your electrician about safe electrical loads? No. He isrepparttar 103507 expert and you expect him to know.

Warning: Do not carry any ofrepparttar 103508 trust you may place in a qualified specialist tradesperson over torepparttar 103509 computer industry. Look atrepparttar 103510 computer game as being more akin torepparttar 103511 motor trades. You don't expectrepparttar 103512 car salesman to be an expert in tune-ups, orrepparttar 103513 mechanic to repair a tear in your upholstery. Each to his own.

Many computer retail sales people are quite competent when it comes to configuring a PC, but keep in mind that there is no necessity for them to be other than good salespeople. Unless you work in a company that has ready access to a professional IT support person, there is much you will have to do yourself to get your computer safe. There is also much you will have to become aware of for it to stay that way.

My favorite saying with respect to anti-virus protection is this: "An anti-virus program is only as good asrepparttar 103514 day it was made". Expected response: "Huh?", which is OK because then I get to explain.

A virus is just a computer program and, reduced to basics, a computer program is just a special type of document containing alpha-numeric characters – called “code”. The publishers of anti-virus software carefully analyzerepparttar 103515 code of a known virus program and determine a “fingerprint” or “signature” that can be said to be characteristic of that particular virus. That information is added to a database of signatures of other viruses that have also been analyzed.

The anti-virus program compares data onrepparttar 103516 computer’s hard drive (or in memory) withrepparttar 103517 information stored in its database of virus signatures. If a match is found,repparttar 103518 likelihood of a virus is high and an alert is issued, or some other pre-programmed action takes place.

There is also a more complex detection method called heuristics which, rather than looking for specifically defined characteristics, looks for “virus-like behavior". If your anti-virus program offers a heuristics option, do make sure it is enabled. Sometimes anti-virus programs that offer heuristics don't have that option enabled by default.

Now if I tell you that new viruses are being released ontorepparttar 103519 Internet every day ofrepparttar 103520 week, can you see how your anti-virus program will soon become useless against an ever-growing number of viruses for which it will have no characteristics? So my favorite saying becomes: An anti-virus program is only as good asrepparttar 103521 last time it was updated.

If you are to have any chance at all againstrepparttar 103522 flood of virus-type attacks permeatingrepparttar 103523 Internet, you absolutely MUST ensure that your anti-virus installation is always using an up-to-date database.

How Safe is Your Success? Part 7 of 8

Written by Bill Hely


"How Safe is Your Success" is a series of eight articles. Each article addresses a different aspect of a universal problem which is of particular importance to those who do business on-line. Most Internet users are at least aware there are dangers "out there", but few appreciaterepparttar real extent of those dangers,repparttar 103499 possible (even likely) consequences, orrepparttar 103500 best, most practical and least expensive means of countering them. This series is intended to at least provide some useful awareness ofrepparttar 103501 situation.

-------------------------

Part 7 - Firewalls

For most "average" computer users, hearingrepparttar 103502 word "firewall" usually evokes one of two responses. The first is alongrepparttar 103503 lines of "Oh, that's complex big-business stuff – it's not something I need or could afford". The other group, probably due to exposure to advertising, online forum discussions, etc. automatically associates "firewall" with a software brand such asrepparttar 103504 well known ZoneAlarm. The latter group haverepparttar 103505 edge. At least they know that a firewall is (or more correctly, can be) a consumer item they could purchase and install if they were so inclined.

Now,repparttar 103506 nature and purpose of this article dictates that I don't tell all ofrepparttar 103507 story all ofrepparttar 103508 time. For example, I am now telling you there are two types of firewall to consider. In actual factrepparttar 103509 number of "types" depends entirely on how you choose to categorize them. For our purposes a simplistic breakdown is both adequate and legitimate.

The two types we'll discuss are software and hardware firewalls. The latter usually takesrepparttar 103510 form of a small "black box" that plugs into your Internet connectivity device (e.g. cable, ADSL or dial-up modem) and also into your PC or into some network component such as a Hub or Switch. Byrepparttar 103511 way, "black boxes" are almost never black;repparttar 103512 term simply denotes a device whose exact inner workings are irrelevant torepparttar 103513 discussion. It is only what goes in and what comes out that matters.

Frequently called a Personal Firewall because it only protects one PC, a software firewall is, asrepparttar 103514 name suggests, simply a computer program. What software and hardware Firewalls have in common is that they both receive, inspect and make decisions about all incoming data before passing it on to other parts ofrepparttar 103515 system.

A most important difference between software and hardware firewalls is thatrepparttar 103516 hardware Firewall doesn’t control outbound communications to any significant degree. This becomes a real problem once some scumware program that hasrepparttar 103517 capability to communicate back out torepparttar 103518 Internet gets into your hard drive.

Onrepparttar 103519 other hand,repparttar 103520 software Firewall offers strong control over both incoming and outgoing data. You will be justified in wondering why you need to use two different types that both control incoming connections. There are several reasons but, fromrepparttar 103521 point of view of a computer user, as good a reason as any is “much improved usability”.

The software Firewall’s control over incoming connections is quite powerful. Using its programmed “intelligence”, it can analyze incoming data streams. However it cannot make final “block or allow” decisions without your help until you have “taught” it how to respond to different situations. It needs to learn as it goes. In short,repparttar 103522 software type will frequently need to ask you to make decisions on what to do about certain incoming data packets – whether to allow them in or not.

That’s fine, untilrepparttar 103523 frequency ofrepparttar 103524 alarms becomes distracting torepparttar 103525 point of being annoying. While you are trying to concentrate on other things inrepparttar 103526 face of these interruptions, there is a very real risk that you will takerepparttar 103527 easy way out and commandrepparttar 103528 software Firewall to “always allow” or “always deny” such data packets, without giving careful thought torepparttar 103529 consequences — which could be significant either way.

The hardware Firewall, onrepparttar 103530 other hand, enforces a very simple policy on incoming connections: ifrepparttar 103531 connection wasn’t requested by a PC from within its “walls”,repparttar 103532 connection is refused or ignored. In most situations such simplistic decision making is quite OK. If you think about that for a moment, you will see thatrepparttar 103533 stubborn inflexibility ofrepparttar 103534 hardware Firewall makesrepparttar 103535 software Firewall's job much easier. You’ll recall thatrepparttar 103536 hardware device is a “perimeter” Firewall placed between your PC (or your network) andrepparttar 103537 Internet, so it gets first look at any incoming data. The software Firewall is on a local PC and thus insiderepparttar 103538 perimeter, so it only gets to see incoming data that has survivedrepparttar 103539 hardware Firewall. Andrepparttar 103540 only incoming data that does survive is that requested by an internal PC inrepparttar 103541 first place.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use