Maintain your old Siemens Hipath system

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms.

This worm is a self-replicating (makes a copy of itself, aunt sookie!) program that reproduces itself over a network. It can be hidden in an email attachment from an unknown sender, a movie download from a suspicious website, or an application sent from someone you don't know. Once on your computer it then can replace a single file, like a winsock.dll or many files and send copies of itself along with email or newsgroup messages that you can post.

The following are ways to keep these type of worms out of your network:

a) Never, I said never (for emphasis) connect an unpatched, non updated computer or other Internet related device to the Internet. How do you update and patch a computer without connecting to the Internet? Get a cd from Microsoft with the latest and greatest patches and updates, then connect the device and then check for updates while connected to make sure you have protection.

b) Always, I said always (yes I am being redundant) use a firewall between your network of computers and the Internet. Even if your network of computers is 1 or 2 computers, it is still a network and needs a firewall to protect it, really protect it. A single computer connected to the Internet is now part of a world wide network thru it's Internet connection and is therefore vulnerable without protection. Get a firewall, a real firewall.

c) Educate and train anyone who uses your computer(s) network. Many times an infection is invited by careless users who download infected email, visit infected sites, or bring infected machines (laptop's, pda's) into a network from outside.

d) Patch and update, patch and update, patch and update (redundant, oh yeah). Yes it's a pain, and it requires time to do and verify that it's actually patched and updated. However it's definitely simpler and cheaper than trying to fix an infestation, or explain to everyone why the network is down or their computers won't work because a worm is eating through everything they have worked hard to save and protect.

e) Make sure up-to-date anti-virus software is on every machine, everything connected to the Internet. Anti-virus packages aid in protection and detection against worms.

f) Establish security rules for your network and educate everyone who touches the network. They must be enforced, daily.

g) Frequently check your network for vulnerabilities. Visit vulnerability website's, take advantage of free scanning tools on the Internet to test your machines. New vulnerabilities and new exploits are released constantly, and you can't protect against what you have no idea what is coming your way.

********************************************************

Daviyd Peterson: 10-year consultant, instructor, trainer Helps african american homeschools bridge the digital divide by becoming computer homeschools. Free article on "Computer Homeschooling" and other related articles http://www.homeschoolwireless.com/ho meschoolwireless.htm

*************************************************************

In The News:

Four children aged between 11 months and 13 years old found alive in jungle - 40 days after deadly plane crash
Sat, 10 Jun 2023 01:20:00 +0100
Four children have been found alive - five weeks after the plane they were travelling in crashed into thick jungle.

Sniffer dogs and half-eaten fruit: How children lost in the jungle after plane crash were found
Sat, 10 Jun 2023 07:35:00 +0100
In the deep depths of a Colombian jungle, four children have been found alive weeks after a deadly plane crash.

Five killed in blast at rocket and explosives factory in Turkey
Sat, 10 Jun 2023 09:34:00 +0100
An explosion at a rocket and explosives factory has killed five workers in Turkey, its defence ministry has said.

British girl stabbed in France knife attack 'able to leave hospital in coming days'
Sat, 10 Jun 2023 07:00:00 +0100
A three-year-old British girl who was stabbed in a knife attack in the French Alps will be able to leave hospital in the coming days, prosecutors have said.

Trump plays golf as indictment unsealed. How worried should he be?
Sat, 10 Jun 2023 00:15:00 +0100
Of all the chapters in the Donald Trump story, and there have been many, this moment is compelling. 



tikatoshop.it

Erfahrungen mit Pallhuber Wein
Agen Bola SBOBET Terpercaya

Travel in comfort and at your leisure with CT Airlink Limousine & Car Service for top quality private transportation and exceptional customer service. We operate Sedans, SUVs & Vans for CT Car Services to covering all Connecticut airports including Car Service from CT to Newark Airport , Mohegan Casino Uncasville CT, Foxwoods Casino Mashantucket CT, Manhattan Cruise Terminal NYC, Brooklyn Cruise Terminal NYC and Bayonne Cruise Terminal NJ. CT Airlink hire licensed and friendly chauffeurs who have in-depth knowledge of the Areas.

5 Simple Steps to Protect your Digital Downloads

A couple of days ago, I was searching for a... Read More

Computer Viruses - How to Remove a Computer Virus from Your Computer

Computer viruses infect millions of computers every day. Viruses can... Read More

Corporate Security for Your Home Business

The words Corporate Security may conjure up images of a... Read More

A New Era of Computer Security

Computer security for most can be described in 2 words,... Read More

Make Money Online - Defend Against The Latest Scam

First, let's do a little recap'. As I stated in... Read More

Do You Know What your Kids Are Doing Online?

It's a sad statistic, but hundreds of unsuspecting kids are... Read More

Internet/Network Security

Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More

Phishing - Learn To Identify It

Phishing: (fish'ing) (n.)This is when someone sends you an email... Read More

Fishing for Fortunes. Scam!

Spelt phishing, but pronounced as above, this despicable act is... Read More

Technology and Techniques Used in Industrial Espionage

Industrial Espionage. These methodologies are being used on a daily... Read More

Email Scams ? Ten Simple Steps To Avoiding Them

According to the Anti-Phishing Working Group (APWG) email scams also... Read More

Lottery Scam, What It is and how to Avoid It?

Internet scams and frauds are on the rise! The quantity... Read More

The Attack of the Advertiser - Spy Mother Spy

The menacing campaigns that drive the corporate spyware and adware... Read More

Anti-Spyware Protection: Behind How-To Tips

There is no doubt that "how-to articles" have become a... Read More

How To Prevent Spyware Attacking Your Computer

Spyware is software or hardware installed on a computer without... Read More

Identity Theft ? Beware of Phishing Attacks!

"Dear Bank of the West customer", the message begins. I've... Read More

A Painless Plagiarism Solution

A crowded marketplace can lead to unethical webmasters using underhand... Read More

Network Security 101

As more people are logging onto the Internet everyday, Network... Read More

Keeping Worms Out of Your Network...

No auntie Sookie, not earth worms, computer virus worms that... Read More

Personal Firewalls for Home Users

What is a Firewall?The term "firewall" illustrates a system that... Read More

Computer Viruses, Worms, and Hoaxes

In recent days, I was one of the unfortunate persons... Read More

Protect Your Little Black Book

The movie Little Black Book features a young woman, Stacy,... Read More

6 Ways To Prevent Identity Theft

These six ways to prevent identity theft offer you valuable... Read More

3 Pervasive Phishing Scams

Scams involving email continue to plague consumers across America, indeed... Read More

Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud... Read More