Virus & Security Alert
The Internet is a wonderful place to quickly share information from one part of the
world to another. As the popularity and usage grows, it becomes even more important for
web users to be more aware of the events surrounding them especially when they are online.
The increase in virus distribution is probably the single biggest problem well exceeding
the troubles caused by spam (unsolicitated junk emails), hackers, firewall/router breaches, and
denial-of-service (DOS) attacks on networks, servers, and websites.
The areas of spam, hackers, firewall breaches, and DOS attacks are beyond the scope of this
article, but they all deserve a brief mention.
Rules for Email Usage:
Unsolicited emails can be quite annoying, especially when they consume unnecessary internet
bandwidth, hard drive storage space, and lots of valuable time. The secret to avoiding spam is
simply to follow a few rules when it comes to using your email.
Create more than one email address. Protect one primary email address by using it for certain important
functions, for friends and family, and for people you know well. Create a secondary email address
(such as the FREE emails from Yahoo, Hotmail, MSN, etc), also called "disposable email addresses"
for purposes such as subscribing to newsletters, for communicating with companies, for website URL
submission purposes, and for all other discretionary uses.
Search engines (spider robots or bots) and marketing companies constantly probe the internet
in search of email addresses for email marketing and distribution purposes. Most often
the same email addresses are sold to other marketing companies. Always use your secondary email address
when communicating with companies. Should your secondary email address become
bombarded with spam, you can easily sign up for a new one, and delete the old address. All this time,
your first email address, the one you want to protect, is kept out of the public limelight and away
from unscrupulous marketing agendas. Also important to note is that some email providers, such as Yahoo,
provide online virus scan of all email attachments. Definitely well worth the FREE cost of having a
secondary email address.
Hackers Firewalls DOS Attacks
There is not much an average person can do to avoid hackers from attempting to break into your
computer while you are online. The fact is that "if there is a will there is a way". The advanced
hacker can get into any computer, network, router, server, and website. They can even watch an
unsuspecting user type in passwords into the user's online banking account. Scary it may seem, but
its not something that happens very often to individual users. Hackers are really only interested
in high profile companies, or networks that are challenging and the payload is high. The reward
for breaking into these networks is fame among the hacking community, and the satisfaction of
meeting a rewarding challenge.
So as an individual user, all you need to do is exercise prevention and create safeguards to protect
yourself. There are a variety of software and hardware firewall products that are relatively inexpensive
and quite simple to install. Most firewalls will protect the average user from any average hacker.
A few well reputable firewall software you may want to look into is: ZoneAlarm, Norton Internet Security,
Black Ice, etc. They are all well worth the cost, and simply better than not having any firewall in the first
place. If you are using Windows XP as your operating system, there is a built-in firewall that is enabled by
default. Still better than not having a firewall, but still you should look into a more solid primary
firewall software beyond the Windows XP firewall. The reason being is that Microsoft products (Windows XP and
other operating systems) are prone to having software defects and you definitely don't want to risk it.
There are hardware firewall solutions as well, many of which are built into routers or are standalones.
In any event, you should talk to your local computer store for more information and for specific advice.
If you are looking into a firewall solution for your company, it all depends on the size and scope, and
the number of computers and servers you need to protect. Hardware firewall solutions are often integrated
network routers or servers that are great for protecting the entire office. There are a large number of
different solutions, all having their own set of advantages and disadvantages, and costs of setting up.
Call Wetaskiwin Telephones for more information on firewalls or have us recommend a certain solution.
Its important to note, that firewalls, routers, servers, and networks can be protected like fortresses,
but too much of a good thing can also be bad in that it restricts certain types of activities or it
introduces unknown variables.
Also, the technology of firewalls have been around for many years, some
of which may in fact be out-of-date, prone to outages, create intermittent network problems, internal
cache issues, and all of them potentially making it very easily breached.
Always update your firewall solution, whether its software or hardware, to
the latest and newest technologies. The Internet Security community has found that there are more open
ports on a firewall then they had previously known before. This makes it easy for advanced hackers to go around
the firewall, which by default protects only certain known ports. Hackers can also remotely overload a
network firewall/router and in the process disable the entire protective device. Older software firewalls
also are prone to obsolescence, so keep them up-to-date as well.
DOS attacks are a hackers attempt at bringing down a network, server or a website so that other people are
unable to access them. The DOS attacks can also affect the internet network of your ISP, and all its
upstream and downstream networks and providers. DOS attacks are highly advanced, and questions regarding them are well
beyond the scope of this article. As an individual user and as a company user, there are no protection
against DOS attacks. The only security rests with the individuals own firewall and the company's own network
firewall, preventing further interruptions locally. Anything externally beyond that is fair game, and an uncontrollable
phenomenon when it comes to the entire internet existence. If you cannot control it, then don't worry about it.
As long as you focus on protecting your own local network or your own local computer, then that is all that
is reasonably required. If you feel that your computer or your company network cannot afford to risk even a
miniscule percentage of the information to the outside world, then simply cut the system entirely off from the
internet. In essence, this equates to putting your computer into Fort Knox, thereby cutting all forms of
external communication. But then, if you do this then you might as well close up your business.
The majority of viruses are distributed by emails, more so than in any other methods combined. The best
and only advice on how to avoid getting a computer virus to begin with is prevention and avoidance.
Here are some important virus-prevention tips:
Install a virus-protection software and enable the software's automatic virus update function.
If available, use the virus software's download protection device, and automatic email scanning.
When new viruses come out on the same day that you receive a suspecting email attachment, be aware
that sometimes the virus software provider has yet to be made aware of the new virus. This potentially
means that your virus software may not be able to detect a brand new virus. So always error on the side
of caution, and follow the next few tips below for extra safety.
If you receive an email attachment from someone you DO know, have it scanned for viruses.
If the email attachment is from someone you DO NOT know, have scanned it for viruses or delete it immediately.
Email attachment viruses can come in a variety of file formats (ZIP, PIF, EXE, DOC, etc), but watch
especially for suspiciously written email subject lines, and email body messages as possible clues.
Some email viruses will pose as legitimate email sender addresses, or it may use your friend's email
address. So always be careful and perform a virus scan.
If a friend or associate gives you a floppy disk or CD with a program on it, always ask them
whether they know if the program is virus free and safe. Have they scanned it for viruses?
Do they know anything about where they got the program? In any event, always scan the program anyways as a
Be careful about what you download. Always scan the downloads prior to opening, unzipping, or executing the file.
This is done by first downloading the program onto your computer, then scanning the program for potential viruses,
and deleting it if a virus is detected. Only if the scan result produces No Virus, and you are absolutely sure that
the program is free from virus, then you may proceed to open it.
When you purchase a store bought software, make sure the factory seal is not broken.
When in doubt, proceed on the side of caution and perform a virus scan at all times. Even if you receive
a software program from a friend that claims to be virus free, do yourself a favour and perform a virus scan.
Besides a single file virus scan only takes a few seconds, and it will save you a bundle of potential grief.
Finally, stay informed. As with any virus or security threat, staying informed about computer viruses
is a good defense. Your best source of information about computer viruses is
and right here on Wetaskiwin Telephones' website.
(Written by Anthony Der - April 2004)