Another Newbie asking "Which Anti-Virus Sofware is the Best?"

  • Thread starter Thread starter jimrainfordson
  • Start date Start date
Offbreed said:
That sounds like I'd be getting into something I don't have a clue
about. How long does it take to down load (dial up)? Looks like I can't
down load to install off a flash drive.

Firefox extensions are .xpi files.

The Prefbar is an extension you add to Firefox. It is a 124KB download.
You have two choices: either install it right from the prefbar web site,
or download and save the file, and access it via Firefox's menu,
File > Open File ...

Start by creating (if you don't already) a c:\downloads\firefox folder.
Then go to http://prefbar.mozdev.org/installation.html and right-click
on the link at:
" Or install the entire PrefBar package: prefbar3.3.xpi "
Choose "Save Link As" and in the resultant dialog, pick your new
\download\firefox directory. Once it is there, do the Firefox
File > Open File ... and it will install.

Then customize it and set it as you like.
http://k75s.home.att.net/images/prefbar.png

It is not going to harm your computer in any way.
 
Offbreed said:
I get a couple popups a month with Fire Fox. I can live with that,
especially considering how the blasted things would nearly take over my
old IE install. I had to actually pull the phone cord and reboot, once.
I have not figured out how to deal with that blasted thing to the right on
this site, though:
http://seattlepi.nwsource.com/fun/mallard.asp
I call that sort of thing a "house cat", because it sort of lays on top of
what I'm trying to look at.

If you scroll all the way to the bottom of the "house cat", there is an
option to "disable PI". Poof! It's gone...

-jen
 
Offbreed said:
Yes, that's it. (Speaking of popups, Fire fox does not seem to block
that advertising that loads right after imageshack.)

Odd. I see no advertising popup when visiting the link above, even
though the code seems to want to open a window from casalemedia.com.

You might also want to check out this page about blocking ads:
http://www.floppymoose.com/

Place the author's copy of the file: userContent.css
in the following profile folder:
C:\Documents and Settings\<username>\Application
Data\Mozilla\Firefox\Profiles\<random>.default\chrome
 
jen said:
If you scroll all the way to the bottom of the "house cat", there is an
option to "disable PI". Poof! It's gone...

Well, ibedam. Yup. Simplest solution yet. (Read the darn thing.) Thanks.
 
Beauregard said:
Odd. I see no advertising popup when visiting the link above, even
though the code seems to want to open a window from casalemedia.com.

I can't get it to come back, now.
You might also want to check out this page about blocking ads:
http://www.floppymoose.com/

Place the author's copy of the file: userContent.css
in the following profile folder:
C:\Documents and Settings\<username>\Application
Data\Mozilla\Firefox\Profiles\<random>.default\chrome

Bookmarked and downloaded. Thanks. That sounds like some handy tricks,
especially the flash.
 
Offbreed said:
Yes, that's it. (Speaking of popups, Fire fox does not seem to block
that advertising that loads right after imageshack.)

that's weird, i don't see that either... maybe noscript strikes again?
 
I've been overwhelmed by the response here and I'm trying to really
look into these links before responding. I've used Web Washer in the
past. I think I'll make good use out of your host file.

I'm looking into a good router.

Thanks

Jim
 
Thanks for the long reply, Art.

Can you elaborate a little more on what makes online gaming insecure or
is it enough to say that you just can't have a secure system if there
is online gaming going on?

I plan to have XP autoupdate but I don't always do it now becuase with
dial-up it can be a real drag when I don't have time to deal with it.
As for OE, I don't have the preview pane on and I never open any
attachments. I don't know if it's text only, but I'll look into it.
Sometimes I get emails from friends with colors or different font
sizes. I'll look into it. I'm guessing this is about security holes
and spammers calling home via some images.

I will get a external hardware firewall. Sounds like an all around
good idea. But I guess I should also keep using a software based
firewall too. I can't say I've tried many, but I've been happy with
Zone Alarm (free version). Does a hardware firewall require updating
the way a software based on does?

Another thing I need to shed is my ignorance regarding routers and
external firewalls. I guess they are essentially the same thing? The
router, like a software firewall, keeps only certain ports open while
closing or hiding those that aren't needed. I can see the advantage of
a router/firewall, but they do the same thing as a software based one,
right?

I'm heeding your warning about M$ software. My wife doesn't get on as
much and I'm leering of using software that she's unfamiliar with or
that doesn't have all the bells and whistles she expects when browsing.
That said, I do try to keep IE a sort of plain jane. I'm currently
looking into other options.

I like your idea of a back up hard drive as an alternative so an actual
second PC. Might be nice if I could hot swap them somehow. I'll have
to look into that more.

Didn't mean to bad mouth KAV. I wanna say I read it in a review
somewhere that it scans every hour, but that was, at worst, probably
just a feature that could be enabled by choice.

If I download, update and run the top 3 or 4
anti-spyware/anti-trojain/anti-malware type apps and I come up clean,
is it pretty safe to assume that (at least for the time being) I'm free
of malware? Or is there just too much of it outthere that isn't
tracked?

I'm a little confused about the "user" accounts as used by XP. I only
have one user account. Is that different from the administrator
account, if there is such a thing? I know I have full privledges as
the user account so it's never been a functional problem. I've heard
you should set a password for loggging in but would be a real bother to
type it in every time I restart the computer. Other than that, what
are the security issues surrounding user accounts for XP, if any, and
what is considered the wisest approach? One thing I've notice from
anti-spyware scanners is that I'll get tracking cookies that track me
by my user account name. I always wipe them clean, but the next time I
get caught by one I assume they just pick up from where they left off.
Is there a way to change just your user account name in XP while
keeping everything else exactly the same?

Wow, there's so much good information here. I've read through most of
the other posts already and I'm trying to be prompt in my replies but
I'm trying to do a little background on the info and terms so I'm not
wasting everyone's time asking terribly basic questions. I'm very
happy with the hospitality of this group and I really am trying to
respond to other posters as soon as I can but first I'm trying do a
little researching, digesting, and thought gathering.

Thanks again Art.
 
Well, I'm not an internet newbie, but soon I'll be switching to a high
speed connection for the first time. (cable). I've been reading
through old posts in this newsgroup and I'm feeling a bit overwhelmed
as if there's no real way to rest assured my PC is protected.

Sure there is. Common sense is the least expensive anti-virus. Outside
of that, get a decent firewall and a reliable anti-virus. Kaspersky
makes a decent firewall and AV for the money.
 
Thanks for the long reply, Art.

You posed a long set of questions :)
Can you elaborate a little more on what makes online gaming insecure or
is it enough to say that you just can't have a secure system if there
is online gaming going on?

There's no such thing as a secure system. There are just degrees of
security ... "more secure" and "less secure". I was pointing out that
online gaming is "less secure" than if you avoid it. Here's a paste of
something I found on the port forwarding you have to do with a
router in order to do online gaming:
************************************************
Port Forwarding

If you have a server or gaming system on the inside of your network
that needs to be accessible from the internet the router has to be
configured to support this connection. This generally includes
pointing incoming requests to a specific port and IP address of an
internal machine. However, be forewarned that any port forwarding you
configure essentially opens up a small door in your firewall. Assuming
the forwarding is properly configured, the risk is minimal; however,
an inexperienced user could inadvertently open their entire network up
to an attacker.
***********************************************
So it's a matter of assuming higher risk (less security).
As for OE, I don't have the preview pane on and I never open any
attachments. I don't know if it's text only, but I'll look into it.
Sometimes I get emails from friends with colors or different font
sizes. I'll look into it. I'm guessing this is about security holes
Yes.

I will get a external hardware firewall. Sounds like an all around
good idea. But I guess I should also keep using a software based
firewall too. I can't say I've tried many, but I've been happy with
Zone Alarm (free version).

Not sure why you would want to keep on using a sw fw. What would
be your purpose?

One purpose is logging outbound traffic. For that, I sometimes use
the free version of Sygate since it has a terrific traffic log. It's
one of the tools I use to check for undetected spyware and malware
that "calls out".

But it serves no preventative purpose, as such.
Does a hardware firewall require updating
the way a software based on does?

Neither should require updating. In fact, the last free version of
Sygate will never be updated. It may be possible to update the
firmware in some external applicances. I dunno. But it's
certainly not something that requires regular updating.
Another thing I need to shed is my ignorance regarding routers and
external firewalls. I guess they are essentially the same thing?

Inexpensive external router/fw products for the home user market
essentially combine NAT and firewall functions. Unsolicited inbound
attempts are blocked.

If you decide to use wireless, that opens up another pandora's
box of security considerations and complications. But other than
that, I can say that my LinkSys wreless router/fw has worked out
well for my purposes and situation.
If I download, update and run the top 3 or 4
anti-spyware/anti-trojain/anti-malware type apps and I come up clean,
is it pretty safe to assume that (at least for the time being) I'm free
of malware? Or is there just too much of it outthere that isn't
tracked?

Not even a expert can determine for sure whether or not your PC is
clean. Perfection in this sort of thing simply doesn't exist. You just
do the best you can.

<skip XP accounts questions>

I suggest that you post different questions in different posts.
Keeping on one topic at a time would be of far more benefit to
you and those reading the posts. I think you'd get more thorough
and better responses.

Art
http://home.epix.net/~artnpeg
 
Thanks for taking your time to help me Phil,

I'm sold on getting an external router. I need to do a little more
study, but your brief explanation has helped a lot. So the IP of the
router is the only one seen publically and that IP is the one assigned
by the ISP (dynamically).

I'll be sure and get a router that supports NAT and DHCP, but as you
mention this doesn't stop outgoing transmissions which I'll have to
handle with a a sofware firewall. Can I throw money at it and get a
router that DOES regulate outgoing transmissions? Is there anything
else I should look for in a router? I figure this is one of the things
I'll keep upgrade after upgrade so I'm not afraid to spend some money
on it.

Is the wireless feature and advantage just becuase it's easier to use
or is there more to it than that? Would I be at risk of the next door
neighbor kid hacking in and pulling my data "out of the air" so to
speak?

Unless I hear good reasons not to, I'm planning to say with Zone Alarm
(the free version). I need to put a little more thought into the
anti-virus program. Of course I'd like to use donation based software,
but it doesn't sound like they are up to par. My biggest fear is still
malware that will steal a username or password. I routinely (2 or 3
times a year) wipe clean and reinstall the partition that contains my
OS and applications (using True Image 9). In this way I get a clean
start with any spyware that I may have not seen, but it also means I
have to update everything again. I realize some malware can survive
repartioning and reimaging. Also, I have other partitions (used
mostly for storage, one for running games) that I do not regularly
reformat/reimage.

I have spent some time with "Shiled's UP" particularly when I used to
run win 98. I didn't realize XP had similar open port problems. When
I have time a little later, I'll download and check out the Norton post
probing link you offered. I assume it doesn't raise false alarms like
some websites do. I seem to recall symatec doing that years ago, but I
could be wrong. It's a good link and I check it out. Thanks.


I do use anti-spyware software from time to time. So far no problems
other than tracking cookies.

I have used Web Washer in the past, but I'll check out Super Ad
Blocker. I'm not really willing to pay much or any money for an ad
blocker. I'll update my hosts lists as well. I'm a lot more open to
having extra software running now that I have the bandwidth to handle
it and more importantly, to handle the automated updates.

I'm quite ignorant on the way XP assigns user account and
administrative privledges. All I know is that I have one user account
which I thought I was forced to create, otherwise I would have just
launched XP under one simple account. Chances are I DO have
administrator privledges assigned because I've never had a problem
doing anything locally under the "user account" I always use. I'll do
my homework.

I do use strong passwords but I don't think I can bring myself to type
in a password with every boot. I certainly don't keep social security
or credit card numbers on my hard drive. I guess the only risk would
be some kind of online shopping transaction, but that's done through
encryption.

Caling my financial institution for more info is good advice I'll soon
take up. I don't know how practical it will be separating the gaming
from the non-gaming computer due to the hardware that I'd prefer to
share. If there's just no way to separate the gaming machine from
machine that will be occassionally logging into financial institutions,
then I guess I'll have to just stop doing those kinds of things online.
It's a real shame becuase I love the convenience, but the hassle and
cost of maintaining two seperate PCs just makes it not worth it.

Oh, the email I use here is real, but it's for a throw-away yahoo mail
account that I never check. I've been using Google Groups to post here
and so far I haven't discovered how to make it hide my email addy (or
to do an inline post). I was aware of the issues you raise regarding
spammers and usent and email addys. All good points. I'll probably
get some decent usent software somehwere down the line, but for now my
plate is full with other issues.

I'm very thankful for your help and advice Phil. I've got some
homework to do but I'll be back with more replies when I have time.

Jim
 
If I download, update and run the top 3 or 4
anti-spyware/anti-trojain/anti-malware type apps and I come up clean,
is it pretty safe to assume that (at least for the time being) I'm free
of malware? Or is there just too much of it outthere that isn't
tracked?

As an afterthought, perhaps I should mention that there are quite a
number of utilities available for checking a machine, some of which
are easy enough for average users, and some which aren't. Without
being very specific or supplying urls at this point, the rootkit
detction utils from F-Secure and SysInternals come to mind as easy-to-
use. But the best method for rootkit checks is to do formal av
scanning, which means the use of a alternate operating system while
doing the scan. It seems to me though, that expecting average users
to build something like a Bart CD is a bit much :) The NT based OS
such as Win 2K and XP have made life very difficult in this regard.

Also, many of the other utilities available for general or generic
malware checking aren't suitable for average users. They require
knowledge of what a normal or clean machine "looks like" in certain
details, including portions of the registry.

I don't mean to make too much of this, though, or in any way induce
paranoia. In practice, "safe hex" and some basic prevention knowledge
goes a very long way.

Art
http://home.epix.net/~artnpeg
 
Thanks for the response Ed,

All good advice I plan to take!
On the PCs you will have the usual bunch of anti-virus, anti-spyware
etc. I know it is difficult to move from IE, but I would strongly
recommend going through the pain of swapping to Firefox. It has been
one of the better things that I have done to lessen the chances of
being a browser victim. You *can* secure IE, but just try FF for a
month.

Since this thread started I've been using Mozilla to browse and I
really like it. Not sure how secure it is but I've been using Mozilla
Mail too. I'll try FF eventually.
The bottom line is that without going over the top you can be as secure
as is practical, just watch out for that unpredictable human interface
though ;)

Good advice. Thanks.

Jim
 
I like your idea of a back up hard drive as an alternative so an actual
second PC. Might be nice if I could hot swap them somehow. I'll have
to look into that more.

I've thought about putting something up at my web site concerning the
creation of and use of a bootable cloned backup drive. For the NT
based OS (Win 2K and XP) the freeware util XXCLONE works well for
the purpose of creating a bootable (file system) cloned backup. I've
used it on my Win 2K machines with both FAT32 and NTFS many times
during my evaluation period, and it never missed a beat.

There are several considerations involved with this. First of all,
it's a good idea to maintain just a relatively small partition to
contain only Windows + Program Files. I'll call this the "Main
Partition" and refer to it as MP. It needs to be just a few
gig, so a suitable backup drive can be as small as, say, 6 gig.
Then cloning and restore operations take a small amount
of time ... maybe 10 minutes or so ... and it cuts down on
the cost of the backup drive.

People who collect tons of large multimedia files should keep
them on a separate large partition and back them them up,
if they wish, on CD.

Now, users who continually try out programs (such as freeware
buffs) and accumulate many they want to keep aren't really
suited very well to MP cloning since they are continually
faced with the not-so-easy problem of determining whether
or not their MP is clean before backing up (recloning). The
method is best used by those who wish to maintain a almost
static backup which rarely, if ever, needs recloning. The best
bet is to clone the MP immediately after a fresh install of
Windows followed by a Windows Update to make sure it has
all the service packs, rollups, and critical security patches
installed. You can also install your favorite applications
programs. Providing you did all this while behind your
router/fw the chances are very slim that you will be backing
up malware of any kind.

There are other considerations as well. Some users, such as
my wife, accumulate valuable data they want to keep via
email (tons of stuff from genealogy forums). The way I've
arranged for her to backup this data, is via a separate
"daily backup" hard drive. Hard drives are far more reliable
than CD, and if I ever have to restore her MP it's a simple
matter of swapping the backup drive that's in her removeable
drive tray. Thus, we maintain two kinds of backup ... a static
one for her MP which sits on a shelf, and a dynamic one for
her data which she uses for daily backup. For daily backup,
I use the freeware XXCOPY. While her accumulated data
of various kinds seems like a lot, it only amounts to a few
hundred meg, and again, a small capacity backup drive
is more than sufficient. The key lock on the removeable
drive is also a electrical power switch to the drive which
is considered "hot switchable" ... it's safe to turn it on
and off while the machine is powered up. There is a risk
involved with the daily backup since it would be possible
for destructive malware to attack data during the backup
operation. This is one good place to use a top notch
updated realtime av monitor. But in fact, she doesn't
bother, and we've never had any problems. Safe hex
goes a long way :)

Concerning the hardware arrangement, the backup drive
is connected as a secondary master, which requires a
separate drive cable if your machine doesn't have one.
The BIOS on my machines can be set to boot from that
backup drive by setting the BIOS to try booting from
HDD1 first. Then the backup becomes drive C: and
restoration to HDD0 (which contains the MP) is a
matter of cloning C: to E: (or whatever the MP drive
letter turns out to be on your machine).

Art
http://home.epix.net/~artnpeg
 
Tahnk again for the help... I'll try to wind things down.

There's no such thing as a secure system. There are just degrees of
security ... "more secure" and "less secure". I was pointing out that
online gaming is "less secure" than if you avoid it. Here's a paste of
something I found on the port forwarding you have to do with a
router in order to do online gaming:
************************************************
Port Forwarding

If you have a server or gaming system on the inside of your network
that needs to be accessible from the internet the router has to be
configured to support this connection. This generally includes
pointing incoming requests to a specific port and IP address of an
internal machine. However, be forewarned that any port forwarding you
configure essentially opens up a small door in your firewall. Assuming
the forwarding is properly configured, the risk is minimal; however,
an inexperienced user could inadvertently open their entire network up
to an attacker.
***********************************************
So it's a matter of assuming higher risk (less security).

I understand where you're coming from. Does the above comment just
apply to hosting an online game or do you have the same problems simply
by logging into a public server? Just by playing the game there is
constant uploading and downloading going on.

Functionally, I'd be happy with FF, OE or even modzilla's integrated
email. I'll look into it more. It would be nice to get something
that can automatically patch itself. The kind of securities holes we
are talking about are, by their nature, generally immune to the
firewall, right?
Not sure why you would want to keep on using a sw fw. What would
be your purpose?

One purpose is logging outbound traffic. For that, I sometimes use
the free version of Sygate since it has a terrific traffic log. It's
one of the tools I use to check for undetected spyware and malware
that "calls out".

As you say a sw fw would be good for watching what's going out. With
ZA I get a pop up anytime anything new wants internet access. It also
keeps a log of who's pinging or probing my ports. Not sure how useful
this is but I suppose I'd never see that information anymore unless the
hw fw has a way of reporting it.
But it serves no preventative purpose, as such.


Neither should require updating. In fact, the last free version of
Sygate will never be updated. It may be possible to update the
firmware in some external applicances. I dunno. But it's
certainly not something that requires regular updating.

I thought perhaps a sw ff might have a bug or some other issue that
could be exploited if not updated. If software runs a hw fw in anyway,
I was thinking this might also be possible.
Inexpensive external router/fw products for the home user market
essentially combine NAT and firewall functions. Unsolicited inbound
attempts are blocked.
understood.


If you decide to use wireless, that opens up another pandora's
box of security considerations and complications. But other than
that, I can say that my LinkSys wreless router/fw has worked out
well for my purposes and situation.

Well, what is the range on a wireless router/fw? In terms of your
typical wireless, unless someone is sitting just outside my house with
a lap top are they really close enough to tap into my transmissions?
Not even a expert can determine for sure whether or not your PC is
clean. Perfection in this sort of thing simply doesn't exist. You just
do the best you can.

understood. I sure appreicate your frank no BS answers.
<skip XP accounts questions>

I suggest that you post different questions in different posts.
Keeping on one topic at a time would be of far more benefit to
you and those reading the posts. I think you'd get more thorough
and better responses.

I'm sure that's true. I need to do a little homework first anyway.


Thanks!
 
Thanks art. That does sound a little overwhelming for me at this
point, but I'd rather know the options. I'll look into the roolkit
stuff and safe hex too.

Jim
 
Regarding your MP idea I've been doing exactly that. If I ever get to
a point that I want to backup my OS, I reboot my last backup, make the
new changes (and updates) and save the image.

As for the rest, I've saved and filed your post. I like your
solutions, particularly the hot swappable option. I'm gonna have to
take another look at everything and reconsider my options.

BTW Art, what do you use for browser, email client, and usenet? (I
figured KAP as your fw)

Jim
 
'Jim' wrote, in part:
| I'm sold on getting an external router. I need to do a little more
| study, but your brief explanation has helped a lot. So the IP of the
| router is the only one seen publically and that IP is the one assigned
| by the ISP (dynamically).
_____

Yes, a router with Network Address Translation (NAT) hides the IP addresses
of the LAN (Local Area Network, home) side and blocks transmissions from the
WAN (Wide Area Network, Internet) that can't be paired with a request from
the LAN side.

The cost of a 'firewall appliance' can be as little as a few hundreds of
dollars US. A 'firewall appliance) will likely include the functions of a
router. For your purposes go for the 'firewall appliance' that is the
easiest and quickest to setup, rather than for the highest possible
protection. A properly set up simple 'firewall appliance' is superior to a
poorly set up complex 'firewall appliance'. A 'firewall appliance' is a
computer with a CPU, ROM and flash memory for the operating system and
applications, RAM, and Ethernet I/O. The operating system is likely to be a
flavor of Linux. It is setup and modified through your web browser. You
may not really benefit from a 'firewall appliance' because some of your
programs may not work (on-line gaming, for example) through the more
protective 'firewall appliances'.

One of the flavors of 'Vista', the next Windows operating system, may
include security features that are more suited to your needs than a
'firewall appliance', though certainly a 'firewall appliance' couldn't
hurt - you can always allow on-line gaming programs, for example, to bypass
the 'firewall appliance'.

I can think of only three advantages to a wireless LAN;
* no wiring required
* protection from lightning induced surges on phone lines or cable
service
* mobile operation within your home, workplace, etc.
A wireless LAN does put data 'over the air' and those signals can be
received over short distances (not more than perhaps 100 feet.) Within that
distance the signals can be received by anyone with a computer with a
wireless LAN card in a notebook (or desktop.) HOWEVER, the signal can and
should be encrypted. WEP (Wired Equivalent Privacy) offers complete
protection against casual scanning. BUT, with technical knowledge, easily
available programs, and lots of patience the encryption key can be
discovered over a few days of constant monitoring. If you don't have WEP
enabled, within the distance limit your data can be received and casual
users can join your LAN and use your Internet connection. Thus, distance is
absolute protection; WEP is good against all but determined attacks, and
newer wireless LAN hardware devices offer even more security than WEP. Most
wireless capable routers also have wired connections.

Finally, NO malware can survive reformatting and restoring a drive image
UNLESS the malware had already infected the system before the last image was
saved.
Do NOT make security a bigger hill than it is. If you make the security
hill steeper than is necessary, you will not climb it. Pick the basic
protections and put them in place. Don't worry about the more complex
procedures - that's for folks with long experience with computers and
networks, or with IT support available.

DO NOW what you can do now.

* Purchase and install a good antivirus program with automatic updates. Set
it to always be active, and do a complete scan once a month.
* Use several free anti-malware applications to backstop the antivirus
solution:
- SpyBot Search&Destroy
- Ad Aware SE by LavaSoft
* Use a method to view email in text only mode ( I use Magic Mail Monitor to
download email headers to cull spam, and to view suspicious email before
using my email program, Outlook. Any spam I identify, along with suspicious
email I delete directly from the ISP mail server without ever downloading.)
* Install a router with NAT.

Consider your exposure, risk, and consequences to evaluate cost/benefit
ratio of protection. Count your time as part of the cost of protection.

Consider that the vast majority of Identity thefts do not involve malware or
the target's use of personal computers.

Phil Weldon


| Thanks for taking your time to help me Phil,
|
| I'm sold on getting an external router. I need to do a little more
| study, but your brief explanation has helped a lot. So the IP of the
| router is the only one seen publically and that IP is the one assigned
| by the ISP (dynamically).
|
| I'll be sure and get a router that supports NAT and DHCP, but as you
| mention this doesn't stop outgoing transmissions which I'll have to
| handle with a a sofware firewall. Can I throw money at it and get a
| router that DOES regulate outgoing transmissions? Is there anything
| else I should look for in a router? I figure this is one of the things
| I'll keep upgrade after upgrade so I'm not afraid to spend some money
| on it.
|
| Is the wireless feature and advantage just becuase it's easier to use
| or is there more to it than that? Would I be at risk of the next door
| neighbor kid hacking in and pulling my data "out of the air" so to
| speak?
|
| Unless I hear good reasons not to, I'm planning to say with Zone Alarm
| (the free version). I need to put a little more thought into the
| anti-virus program. Of course I'd like to use donation based software,
| but it doesn't sound like they are up to par. My biggest fear is still
| malware that will steal a username or password. I routinely (2 or 3
| times a year) wipe clean and reinstall the partition that contains my
| OS and applications (using True Image 9). In this way I get a clean
| start with any spyware that I may have not seen, but it also means I
| have to update everything again. I realize some malware can survive
| repartioning and reimaging. Also, I have other partitions (used
| mostly for storage, one for running games) that I do not regularly
| reformat/reimage.
|
| I have spent some time with "Shiled's UP" particularly when I used to
| run win 98. I didn't realize XP had similar open port problems. When
| I have time a little later, I'll download and check out the Norton post
| probing link you offered. I assume it doesn't raise false alarms like
| some websites do. I seem to recall symatec doing that years ago, but I
| could be wrong. It's a good link and I check it out. Thanks.
|
|
| I do use anti-spyware software from time to time. So far no problems
| other than tracking cookies.
|
| I have used Web Washer in the past, but I'll check out Super Ad
| Blocker. I'm not really willing to pay much or any money for an ad
| blocker. I'll update my hosts lists as well. I'm a lot more open to
| having extra software running now that I have the bandwidth to handle
| it and more importantly, to handle the automated updates.
|
| I'm quite ignorant on the way XP assigns user account and
| administrative privledges. All I know is that I have one user account
| which I thought I was forced to create, otherwise I would have just
| launched XP under one simple account. Chances are I DO have
| administrator privledges assigned because I've never had a problem
| doing anything locally under the "user account" I always use. I'll do
| my homework.
|
| I do use strong passwords but I don't think I can bring myself to type
| in a password with every boot. I certainly don't keep social security
| or credit card numbers on my hard drive. I guess the only risk would
| be some kind of online shopping transaction, but that's done through
| encryption.
|
| Caling my financial institution for more info is good advice I'll soon
| take up. I don't know how practical it will be separating the gaming
| from the non-gaming computer due to the hardware that I'd prefer to
| share. If there's just no way to separate the gaming machine from
| machine that will be occassionally logging into financial institutions,
| then I guess I'll have to just stop doing those kinds of things online.
| It's a real shame becuase I love the convenience, but the hassle and
| cost of maintaining two seperate PCs just makes it not worth it.
|
| Oh, the email I use here is real, but it's for a throw-away yahoo mail
| account that I never check. I've been using Google Groups to post here
| and so far I haven't discovered how to make it hide my email addy (or
| to do an inline post). I was aware of the issues you raise regarding
| spammers and usent and email addys. All good points. I'll probably
| get some decent usent software somehwere down the line, but for now my
| plate is full with other issues.
|
| I'm very thankful for your help and advice Phil. I've got some
| homework to do but I'll be back with more replies when I have time.
|
| Jim
|
 
BTW Art, what do you use for browser, email client, and usenet? (I
figured KAP as your fw)

Favorite browser of the moment is Opera. I've never used anything
but Free Agent for newsgroups. Email is Thunderbird. I already
mentioned that I only use Sygate fw once in awhile since I don't
need a fw with my wireless router.

Art
http://home.epix.net/~artnpeg
 
I understand where you're coming from. Does the above comment just
apply to hosting an online game or do you have the same problems simply
by logging into a public server? Just by playing the game there is
constant uploading and downloading going on.

You are putting your trust in the game server, which is not a wise
thing to do. Remember, It can download malware as well as
games.
Functionally, I'd be happy with FF, OE or even modzilla's integrated
email. I'll look into it more. It would be nice to get something
that can automatically patch itself.

Forget that. Just update to the latest versions.
The kind of securities holes we
are talking about are, by their nature, generally immune to the
firewall, right?

Yes, they are a different kind of consideration. We're talking
software vulnerabilites such as buffer overruns which the bad
guys exploit.
Well, what is the range on a wireless router/fw? In terms of your
typical wireless, unless someone is sitting just outside my house with
a lap top are they really close enough to tap into my transmissions?

I've read that hackers using portable high gain antennas can work up
to 4 miles away. Be aware that the usual 128 bit WEP encryption can
be cracked in minutes by hackers. That means they can monitor your
internet traffic and cause disruptions of it. They can also spy. So
anyone interested in high security internet for say, finanacial
transactions, should either use cable connections or forms of high
security wireless. And no, I know little about the latter so please
don't ask me :)

Art
http://home.epix.net/~artnpeg
 
Back
Top