PC Security Handbook 2nd edition.pdf

(3403 KB) Pobierz
PC Security Handbook
Defensive Computing Techniques to Help You
Avoid Malware and Data Loss
PC Security
Robinson
2
nd
Edition — Windows Guides —
http://mintywhite.com
Rich
Handbook
— Microsoft MVP — http://mintywhite.com
i
© 2010 Windows Guides | mintywhite.com. All rights reserved.
PC Security Handbook v2
If this guide is distributed it is furnished under license and may be used or copied only in accordance with
the terms of such license. Except as permitted by any such license, no part of this guide may be
reproduced. This guide may be stored in a retrieval system, or transmitted, in any form or by any means,
electronic, mechanical, recording, or otherwise. Please note that the content in this guide is protected
under copyright law.
Mintywhite will not be responsible for damages to your computer, software, or data resulting from use of
information contained in this document.
The content of this guide is furnished for informational use only, is subject to change without notice, and
should not be construed as a commitment by Windows Guides. Windows Guides and Microsoft Corp
assume no responsibility or liability for any errors or inaccuracies that may appear in the informational
content contained in this guide or for any damages resulting from use of the information contained herein.
Please remember that existing artwork or images that you may want to include in your project may be
protected under copyright law. The unauthorized incorporation of such material into your new work could
be a violation of the rights of the copyright owner. Please be sure to obtain any permission required from
the copyright owner.
Mintywhite, Windows Guides, and the Windows Guides logo are trademarks of mintywhite.com
Microsoft, Windows and Office are trademarks of Microsoft Corporation. All other trademarks are the
property of their respective owners.
Contents
Introduction .............................................................................2
Notational Conventions ............................................................ 2
Security 101 ............................................................................2
Defensive Computing............................................................... 5
How to Avoid Malware .......................................................... 5
Keep Your Operating System up to Date ............................ 5
Keep Your Browser and Flash up to Date ............................ 6
Keep Installed Software up to Date .................................... 8
Keep Security Software up to Date ..................................... 9
About the Author
Rich Robinson is the author and creator of Windows Guides,
Windows Forums, and MyWindowsPC. Rich is a
Microsoft MVP
in
the Desktop Experience category and authored Windows 7 –The
Pocket Guide, Windows Vista – The Pocket Guide, Windows
Vista – Customization Manual, and the PC Maintenance
Handbook. He also co-authored the Windows 7 Media Center
Customization Handbook. His hobbies include spending time
with family, road biking, web design, programming, running,
soccer, skiing, and swimming.
See
more books Rich authored.
Download free Software Only from Sites You Know and
Trust ...............................................................................22
How to Protect Your Data .................................................... 27
Prevent Unauthorized Access to Your Computer .............. 27
Protect Your Data from Hardware Failure/Data Corruption
.......................................................................................29
Test Suspicious Software in a Virtual Environment ........... 24
Install Good Antimalware ................................................. 12
What Next? ............................................................................35
About this Handbook ............................................................. 35
PC Security Handbook 2
nd
Edition — Windows Guides —
http://mintywhite.com
1
Introduction
This handbook is designed to help you find ways to protect
your Windows XP/Vista/7 PC and ensure your data is safe. I get
countless emails from site visitors who ask about the best anti-
virus software, firewall program, backup utilities etc. and there
are often questions like this in the
forums.
I set up PCs for companies, friends, and family; the advice I
give in this manual is what I use when building any PC. My tips
are tried and tested and have left hundreds of people satisfied
with the way their computer works. I hope you too can follow
these instructions and enjoy an error-free, spyware-free, and
speedy PC.
In this second edition of the book, a lot more detail is given on
keeping your computer up to date, avoiding malware, and
protecting your data. For full details on what’s new, go
here.
The purpose of this book is not to define the ultimate solution;
its purpose is to give you simple, unbiased advice on what I’ve
found to be the best options out there. In this handbook, I only
give advice and share programs that I’ve used for at least a
year. Some programs seem good when you first use them, but
quickly annoy you or slow down your PC.
If you have any questions about PC security or PCs in general,
you can head to
Windows Forums
where you’ll find friendly,
knowledgeable members who are happy to assist in your
learning. If you disagree with anything in this handbook, please
join us also and share your solutions.
Notational Conventions
In this handbook, I have used these notational conventions:
Italic:
Text from the current dialogue you are working with.
Bold:
the name of a keyboard key.
Italic bold:
something you type as shown, e.g.,
regedit
. Unless
otherwise specified, you can use uppercase or lowercase letter.
Click: move the cursor to the referenced item and press the left
mouse button.
Press: push on a keyboard key.
Select: choose from a list.
Blue Links:
Links to external websites.
Teal Links:
Links to Windows Guides and Windows Forums.
Green Links:
Links to other sections within this book.
Security 101
Many terms in this handbook may be new to you; I make every
effort to explain things in a simple manner that is easy to
digest. Before we begin with solutions, I present some key
terms and phrases that will assist you as you work your way
through the rest of this handbook. These phrases are
commonly thrown out in conversation and in online discussion
forums, but it’s hard to know exactly what they mean.
Adware
– Like spyware, adware is software that may track
visited websites and act as a key logger. Adware tracks this
PC Security Handbook 2
nd
Edition — Windows Guides —
http://mintywhite.com
2
information to automatically display downloaded or installed
adverts to a user. You may wonder why you are being offered
“PC Super Anti Spyware 2011” when using your PC; this is
adware at work. AIM, FlashGet, Deamon Tools, and RealPlayer
are all examples of adware.
Firewall
– A firewall both permits and blocks access to a
network or PC. Firewalls are included with popular security
software (e.g. ESET Smart Security) and a basic firewall comes
bundled with Windows XP, Vista, and 7. Firewalls limit
communication between your PC and devices that are not
authorized to communicate with you.
Key logger
– Key loggers are used to monitor keyboard activity
on a PC. These can be software-based (bundled with Trojan
horses, adware, and spyware) or hardware-based (between the
keyboard cable and the PC, acoustic etc.) Usually this
information is retrieved across a local network, the internet, or
from the physical device connected to the keyboard.
Identity Theft
– The act of someone pretending to be someone
else by using another person’s identity. Usually identity theft is
used to obtain credit or other benefits in another person’s
name. Identity theft is a big problem online as so much
information is readily available.
Malware
– The generic term used for all forms of software
designed with malicious intent. Viruses, worms, spyware etc.
are all forms of malware. The term
virus
is often used when
malware should really be used as it describes all forms of
malicious software.
Privacy-invasive software
– A formal term used to describe
software that invades your privacy. This software comes in
different forms including spyware and adware.
Real-time Scanning
– Good antimalware programs scan files in
real time; as you download, copy, and install files on to your
computer, your antimalware program will scan these files for
infections and malicious code. You should only have one real-
time scanner installed at any time—otherwise they will conflict
as they compete to scan the same files.
Antimalware / Antivirus / Antispyware
- Software designed
to remove or block malware (e.g. AVG Internet Security and
ESET Smart Security.)
Backdoor
- A backdoor is a point of access to a computer that
does not require authentication. An unlocked house back door
gives access to an otherwise secure home; a computer
backdoor allows access to your PC without your knowledge or
permission.
Crimeware
– This is a class of malware used to facilitate
cybercrime by using social engineering etc. to aid in identity
theft. This type of malware steals private data, which is used to
defraud a person of their personal belongings. Examples of
crimeware are: key loggers, used to collect sensitive data,
password stealers, and browser redirects to pages that look
like banking, social networking etc. pages that send login
information to identity thieves.
Cybercrime
– Also known as
computer crime
, cybercrime refers
to any crime that involves a networked (e.g. connected to the
internet) computer. An example of cybercrime is the use of
crimeware to steal personal information for identity theft.
Defensive Computing
– Reducing security risks when using
your computer by taking precautions to avoid security attacks
and avoid data loss. This book is a tool to help you practice
defensive computing.
PC Security Handbook 2
nd
Edition — Windows Guides —
http://mintywhite.com
3
Rootkit
– Can be either hardware or software used to gain
administrative (root) control over a computer without detection.
Rootkits target the BIOS, hypervisor, kernel, or boot loader. A
rootkit is used to provide a hacker will full access, via a
backdoor, to a machine. They are also used in legitimate
software for emulation and security to add functionality or
protect themselves from being closed while running your
operating system.
Social Engineering
– Do you ever get chain emails asking you
things like: what’s your favorite color? What’s your mother’s
maiden name? What school did you go to? In what city were you
born? Most of us have sent these emails out and, for the most
part, they are harmless. However, social engineering is just
this: getting people to divulge confidential information. Giving
out your town of birth may not seem that confidential, but what
if that’s the security question on your email account? What if
your email account contains a welcome email, with your
password, from a social networking site? What if you used the
same password for your online bank? Social engineering can
also be used on the phone, which is outside the scope of this
book. Just remember, never give out personal information
unless you initiate the conversation and even then – be careful.
Spam
– The use of electronic messaging (e.g. email, instant
messaging, spam blogs, forum spam etc.) to send unsolicited
messages. Spam is solicitation without prior consent. Spam can
lead to fraud, identity theft, and more.
Spyware
– Spyware tracks a user’s activity by monitoring
browsing habits and keyboard activity and can even take
screenshots while you use your PC. This information is sent
back to the creator or beneficiary of the spyware. Signs of
spyware include: modified browser homepages, slow internet,
and suspicious looking sites in place of legitimate sites (for
example: banking sites.)
Trojan horse (Trojan)
- A Trojan horse is a seemingly
harmless program that looks to provide value. However, just as
in Greek mythology, a Trojan horse has a secret agenda and
acts as a backdoor to your computer. This backdoor can be
accessed by a hacker to compromise your PC. Trojan horses are
not self-replicating and spread due to users installing them
manually on their PC.
Virus
– A computer virus acts very much like a human virus.
Human viruses are spread, via thumb drives, floppy discs,
network connections etc., to other PCs. Viruses need a host
(like a free screensaver program) to spread. By pure definition:
a virus has the ability to spread itself, via a host, to other
computers.
Virus Hoax
– A virus hoax is a message (e.g. email, forum
post) that alerts the reader of a non-existent virus and usually
contains outrageous claims like “if you don’t send this on, a
kitten will cry every time you hear the word ‘oblong’” (okay, I
made that one up.) Often, these claims are falsely backed up by
CNN, Microsoft etc. If CNN really broadcast this message, it
wouldn’t be in email form. Please don’t forward these emails
and do encourage others to do the same.
These hoaxes can do great harm and have been known to
advise you to search for important system files and delete
them.
Windows Firewall
– Comes bundled with Windows XP, Vista,
and 7. This is a great solution; however, due to a lack of
comprehensive definition updates, Windows Firewall is not
completely effective in blocking threats and allowing safe
connections.
PC Security Handbook 2
nd
Edition — Windows Guides —
http://mintywhite.com
4
Zgłoś jeśli naruszono regulamin