Protect Yourself Online In this document, we will discuss some basic steps to better protect your system. We will discuss the following four (4) areas: v Email v Internet v Chat programs v Virus protection1. Email: · Don't open email attachments you receive from someone without checking first, even from your closest friends. · If someone needs to send you a doc file, ask them to convert it to *.rtf or *.txt format and then send. · If you need to open any file with doc extension, you can first use one of those doc file readers available for free online. · Alternatively, you can convert the file extension (doc) to text (txt) and then open it with your text editor and find out what the file is about. · If you decide to open it as a doc file in MS Word make sure the macro security setting is set to HIGH · In your email client turn off the inbox Mail option HTML.2. Internet v Set Explorer to show file extensions. To do this, go to Windows Explorer/My Computers > Tools > Folder Options > View (tab) > and uncheck the "Hide file extension for known file type" box. This will help you avoid clicking on hoaxes. v Don't give out your information online. As you browse the web you will see that there are sites that will ask you for personal information. Don't give out information about yourself and hide information about yourself for as long as possible. v Disable JAVA and Active X. To do this in MS IE, move the default navigation area to High Security in Tools-Internet Options. This disables 90% of MSIE exploits. You don't need to access sites that don't allow you to log in without Java and Active X enabled. Learn to read cookies and observe them closely. Use software like Cookie Crusher and destroy all previously received cookies every time you log in online. If you use IE make sure to run Windows Update at least once a week. v Use personal firewall software. Zone Alarm (ZA) is good, but there are others available and new ones are added every day. Use at least one Intrusion Detection System; Visual Zone is a good product compatible with ZA.3. Chat programs Ø Be careful when using chat programs like IRC, ICQ, Yahoo, etc. When you use these programs, your IP address is exposed leaving room for the other person to scan your computer for ways to enter.
tags