Logo

 

 

Class 10

Computer Security

When we talk about Computer Security, we could be talking about several entirely different things:

Keeping the computer safe from theft, damage or loss
Keeping the computer protected against hacking
Keeping data on the computer safe from theft, damage or loss
Keeping data on the computer protected against hacking
Keeping data on the computer safe from hardware failure!

When push comes to shove; it is the DATA we are trying to protect, not the computer. Computers are replaceable, DATA is not! At least not without a lot of work.

Back in Class 7, we discussed backups. They are still the first and best line of defense. With the proper backups, you are able to replace both the computer software and your data.

This class is to help you protect your computer, its software and your data while connected to the Internet. Additionally, it will give you some basic computer maintenance suggestions.

Class 10 synopsis:

  1. External computer protections
    a. Primary protection
    b. Service scams
    c. Malware and viruses
    d. Hardware protections

  2. Internal computer protections
  3. Basic computer maintenance
  4. Some included Microsoft applications

Keeping your Computer safe on the Internet

1) External computer protections

Primary protection
One of the most important protectors of a computer is its human! We are the most likely reason our computer gets infected with malware (Malicious software) to begin with.

All of the bad stuff is called malware...Malicious software. The best known are viruses and Trojans. Like a human virus, they can be innocuous or knock your computer out for days. A Trojan (as in Troy) hides itself until an event occurs, such as time of day or a specific day of the year or even a computer reboot. At that time, the Trojan activates and does what it was designed to do, which usually is not good. Check the Internet to learn more about viruses and malware.

(Return to Synopsis)

Service scams
Telephone scams targeting your computer are on the rise. What person that owns a computer doesn’t think they are having problems with it? Scammers depend on people having mindsets like this. When you actually have time to think, reason takes over. For instance, how would anyone other than the computer manufacturer with whom you may have registered your new computer, or Microsoft with whom you may have registered you new Windows 10 operating system, know you even have a computer?

So many people in the United States have computers, that it is reasonable (to the scammer) that (perhaps 80% of homes called in the US have computers) randomly placing calls to US phones will net them HUGE profits. If the scammer would connect with only 10% of the millions of homes with computers, that would still be a huge profit. From the number of calls we get at our home, there must be hundreds of scammers' computers dialing phones!

MOST IMPORTANT THING TO REMEMBER! No legitimate computer service organization will call YOU to either ask if you are having a problem, or to tell you you have a problem!!! If you actually have a problem you need fixed, you need to call for help yourself!

(Return to Synopsis)

Malware and viruses
We are the main reason our computers get infected with viruses and such. (See Vampires and other fantasies, below).

A feature of your browser is the ability to download a file you find on the Internet, to your computer. Scammers have found ways to use this feature to their advantage. They can store a file on a web site computer, such that when you access the web site, you get a pop-up on your computer screen. The pop-up can say anything they want it to. One typical version may say “We have detected malware on your computer. Click here to fix it!”. DON’T 'CLICK HERE'! That would tell your browser to download the malware and run it. Browsers protect you from pop-ups like this by updating their security features frequently, but you must LET them do the update!

Email links and pop-ups, however, do NOT have this protection! Most of the bad things that can happen to your computer get in via email. For your own protection: do NOT click on a link you get in email. Rather, copy the link and paste it into your browser address text box. When you poke enter, your browser will check the link BEFORE it tries to open the file.

If, after selecting an email link, your computer acts strangely, SHUT IT DOWN! This is the perfect time to press and hold the power button for at least 5 seconds! Then contact someone to check it before you turn it on again. One helpful thing that can be done would be to use a different computer to download a rescue disc, and instructions for use, from a anti-virus/anti-malware provider. They provide rescue discs in 'iso' format, which requires it be 'burned' to a CD or DVD. If you don't know how to do this, find someone that does, or search the Internet for instructions.

The website: hoaxbusters.org (no www) is an Abby Stokes (author of 'Is This Thing ON?') recommended site to check out scams and hoaxes!

Vampires and other fantasies
For the most part, the malware is like the vampire fantasy...you must invite it in. If you click on a button because a pop-up told you to, expect problems!!!

If you read carefully, and click only on buttons or links that you expect and believe to be safe, you shouldn't have a problem. If it doesn't look like something you would expect...DON'T DO IT! As an example, a Website cannot see what is on your computer (REMEMBER: you are just browsing; reading files on someone else's computer!). Too many people believe the website knows what is on their computer 'because it said so'. Therefore, when a website pops up a window that explains it found some 'bad stuff' on the computer and just 'click here' to fix it, those people will...usually with dire results.

Another fantasy is the possibility of someone hacking into your personal computer from the Internet. Experts with direct access to a computer system can hack into it, but without the direct access, even the most experienced experts would have an extremely difficult time hacking into the simplest personal computer.

At this time, hacking into a personal computer or webcam (without direct access) makes for very entertaining movies and TV shows, but has little basis in fact.

(Return to Synopsis)

Hardware protections
Every hardware device that is connected to a network (such as the Internet), has a built in, non-changeable, address that is unique to the device. There are trillions of such devices. The address is called the Media Access Control (MAC) address. The website “https://techterms.com/definition/macaddress” defines a MAC address as:

A MAC address is a hardware identification number that uniquely identifies each device on a network. The MAC address is manufactured into every network card, such as an Ethernet card or Wi-Fi card, and therefore cannot be changed.


NOTE:
You do NOT need to know anything about MAC addresses other than they are there for YOUR protection! I give this and the following information to you in the hope you will realize just how difficult it would be to hack into your computer from the Internet!

First hardware protection
The first MAC address important to you and your connection to the Internet will be for your modem. Anyone that subscribes to Internet service receives a box known as a modem. This is the unit that converts telephone or cable communication signals into signals the computer can understand. It is similar to your TV cable box, which converts the cable communication signals into signals your TV can understand. The modem has its own MAC address.

Second hardware protection
The number of Internet enabled devices we buy for ourselves or our family is growing by the proverbial leaps and bounds! So many, in fact, that the Internet service providers now build routers and Wifi into the box with the modem. A router is a device that will route computer network signals between the Internet and specific devices on your home network. If Wifi is included with the modem/router, it will also have its own MAC address, and will route the network to the Wifi radio channel, so all your wireless devices (each with their own MAC address) can receive Internet as well.

Third hardware protection
When any router broadcasts Wifi, it also assigns a Wifi radio channel network name and password to help secure the wireless communication. The network name (SSID) and the password (sometimes called key) for each wireless router can be found on its label. If you own the wireless router, upon installation, you must follow instructions to give it your own SSID (Wifi radio ‘station’ ‘call letters’ (network name)) and password, instead of the one on the label that other people could read.

Fourth hardware protection
On your computer, you have either/both Ethernet (hard wired connection) or Wifi (wireless radio connection) network devices, each with their own MAC address. To connect wirelessly, you must select the proper network name for your modem/router (or the modem/router for any hotspot you find yourself in), and enter the password when requested. If your computer has a wireless radio channel, look at your computers’ status bar, near the clock. You will find an icon that looks like radio waves emanating from a point. Click on this icon to see what radio signals are available for you to select from. Select the signal you know is correct, then enter the password for the signal. If you wish to have the computer automatically connect to this signal when you are near the ‘radio station’, check the appropriate box. This is usually a one time thing. Then whenever you bring your device into wifi range of the router, the computer will automatically connect.

Yet another hardware protection
The router has a built-in firewall. The firewall is designed to block undesirable or unauthorized signals from getting into your network or getting out! (See the firewall description in the next section).

(Return to Synopsis)

2) Internal Computer Protections

Computer based protections
Microsoft now (Windows 10) provides normal protection software in Windows Defender; Firewall, Anti-Virus and Anti-Malware software.

If you choose your own favorite anti-virus software (or one supplied with your new computer), Windows Defender will be disabled, because with anti-virus software, you should only run ONE (really! ONLY ONE)! Multiple anti-virus programs (apps) will slow down your computer, possibly to the point of uselessness!

If software is specified as Anti-Malware, you may have more than one. This is the type of software, at least in the free versions, that you must choose to scan manually if you are experiencing problems or wish to prevent problems. Examples would be: Malwarebytes and Spybot: Search and Destroy.

There are many other security applications you can obtain that will help protect you from malware. None of them detect 100% of the malware, and most detect 90% or less. There are both pay for and free applications to help you stay safe. Don't let sales people goad you into purchasing their favorite! (Windows 10 has one built in!) Your best bet is to research (on the net) anything BEFORE you buy. Check out reviews for any of the software you think you want. Make sure you check reviews from websites OTHER THAN the manufacturers website. There is nothing more helpful than a couple of thousand (real) users of a product commenting on it.

A Firewall on your computer behaves a bit like a firewall in your automobile; in the event of 'bad stuff trying to get in', such as an engine fire in your car, the firewall keeps it out until you can get help. ALWAYS enable the firewall in your operating system!

(Return to Synopsis)

3) Basic Computer Maintenance

When it comes to downloading from the Internet, there is some confusion about automatic downloads. A good question would be; do I allow automatic downloads of updates and upgrades?

Generally, updates and upgrades are two entirely different things.

Take a look at your kitchen window. The wooden window frame still looks good, but the curtains! Good grief! They still look like the 1970’s! Perhaps you would consider updating them to the 21st century. On the other hand, if the wood needs paint, or is otherwise tacky and is letting in water or wind; you may consider upgrading them to vinyl or other synthetics (much more $$).

You want to keep protection software up to date. You upgrade software when you need additional features. Example: My free anti-virus software seems to do an excellent job, and automatically updates its virus database. My third party anti-malware does a quick scan whenever I tell it to, but I worry that I don’t do it often enough. I would like to have it do a ‘deep’ scan every night. To do that, it tells me I have to upgrade it from the free version to the next level (pay for version). Of course, it also means I have to leave the computer on all night!

The Windows 10 operating system will generally download any updates automatically. You may also choose to automatically download updates to any additional Microsoft apps you may have installed. If you are running Windows 7, and would like all the new features of Windows 10, you will need to purchase the upgrade to Windows 10 (or a new computer!).

Poke the Windows logo key on your keyboard, then select the gear icon just above the power icon on the start screen. In the settings window, select Updates & security. Explore the Updates section.

Downloading Drivers on the Internet
Although Microsoft has been diligent about including a special form of app called a driver for most current external devices, such as printers; it is possible that a manufacturer of such a device may make changes to drivers for its devices after the initial release to Microsoft.

If you are having ANY difficulty using an older device, such as a printer, you may need to update the drivers for it. This is usually true if you have been using the device for years with no problems, but recently (new computer or software upgrade perhaps?) it doesn't always work the way you expect.

Instead of paying someone $$ to check it out for you, simply look at the device manufacturers' website for a solution. Don't use a search engine for drivers, you will get MANY results, almost all of which are NOT the manufacturer, and usually will cost $$. Instead; search for the manufacturer and USA, such as Canon USA. Then, in the search results, you can find support links directly to Canon. Nearly all websites for devices have a support link on their web page. Check support for drivers and downloads. You can even find manuals for the device. You may have to enter your device name and model, so have them available. Once in a great while you may need a serial number. Always look for, and download the install instructions for the new driver.

Additional maintenance applications I can recommend
The following list is free software I usually have on my own computer and recommend to my friends and relatives:

REVO Uninstaller - A very good uninstaller

IObit Uninstaller - Another very good uninstaller (annoying popups in the free version!)

Malwarebytes - A very good anti-malware application

Ccleaner - Clean temporary files off the computer, and check the registry for errors

Eusing Free Registry Cleaner - An app for 'deep' cleaning of the registry

The last two items assist in keeping the registry free of references that no longer apply. Consider them garbage collectors that remove leftovers (you know…leftovers; the stuff in your fridge that no one wants to touch!) from regular computer usage. They keep the computer perking right along.

Now for one (or two) of my 'soapboxes':
The only software REQUIRED to run the Microsoft Windows operating system is Windows itself! Computer manufacturers will often supply their own 'add-ons', intended to 'simplify' the operation of the computer. They are NOT required; and many times NOT desired! Nor are they part of any computer courses. HP is one of the biggest offenders. Applications (search the Internet) have been written to remove all of the 'excess baggage' found on many computers when you purchase one. To further muddy the waters, third party anti-virus in the form of Internet suites are usually provided 'free' for a month or two (even permanently from your Internet service provider!). At the end of the 'subscription' time, they will announce your subscription has expired and it is time to re-purchase. These third parties PAY the computer manufacturer to put the product on the computer. IT IS NOT REQUIRED BY WINDOWS! Also, the store you buy your computer from may attempt to sell you additional anti-virus or Internet suites. THEY ARE NOT REQUIRED BY WINDOWS! You must determine for yourself whether or not you have significant reason to 'protect' your computer beyond the protection provided by the operating system itself.

If, while the computer is running, and running well; you make the recommended system disc image (Class 7), and subsequent backups, you will be able to restore your system back to 'like new' no matter what kind of malware you could potentially get. The only money required is the initial outlay for an external hard drive, which you need for backups anyway. That outlay may actually be less than a one year subscription to an Internet suite.

(Return to Synopsis)

4) Some included Microsoft Apps

There are several Windows built-in apps that you should be taking advantage of. We used them in class, but probably didn't write them down:

Control Panel - Change the computer's behavior to work the way YOU want to work, esp. the mouse. This one should be put on your start screen and/or task bar.

WordPad - Notice it is a single word. This is the very capable word processor application in ALL the Windows versions. Another good one for your start screen and/or task bar.

Paint - A drawing application that also serves to save 'screen grabs', whether you capture the full screen (Print Screen) or just a window (ALT+Print Screen). Paste the screen grab into the Paint application in order to name it, and save it where you want it.

Paint 3D - One of Microsofts’ new universal apps. They are designed to be run on touch screens, especially small tablets and smart phones. As such, they behave very differently than the traditional window based applications. They respond to pointing devices as well as touch screens.

Calculator - You don't need to run for wherever you last used your small digital calculator, it's built into the computer. You can find it in all apps.

Task Manager - Try it if you are interested in finding out what is taking so much time and resources on your computer (help find malware). Quick start it using the menu click on an unused area of the task bar, then select Task Manager. To use it, choose ‘More details’ in the lower left corner.

Photo - A photo viewing and modification app. One of Microsofts’ new universal apps. They are designed to be run on touch screens, especially small tablets and smart phones. As such, they behave very differently than the traditional window based applications. They respond to pointing devices as well as touch screens.

(Return to Synopsis)