Earl Bockenfeld's Radio Weblog : America's real drug problem, is called television. --Greg Palast
Updated: 9/1/2005; 1:40:14 AM.

 

 
Looking for a Story? Check:
 
 


 
Work:
 
 

Archives:
 
 
 
 
 
 
 
 
 
 
 
 
 

Great Sites:
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 


Subscribe to "Earl Bockenfeld's Radio Weblog" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.

Comments by: YACCS

« chicago blogs »

 
 

Monday, August 15, 2005



New Rules for Paranoid Computing

Recently a fellow told me that he was quitting the Internet! He had enough and didn’t want anymore. No more spam, no more viruses, no more spyware, he just felt it was not worth it. "I'm shutting of my broadband connection. It's become too invasive to my privacy and it seems that one has to have more and more protection and I'm just tired of what is going on with the internet." If this speaks to you, maybe some of  these suggestions could put more fun back improve your internet surfing.

However I'm not because so far I don't really find it that difficult to avoid infections. A few relatively simple things minimize the risk:

1) Use Antivirus software and keep it up to date, Grisoft's AVG is free, effective, and doesn't mess up my machine like some other popular Antiviruses I could name

2) A firewall, some free ones such as Zonealarm or Sygate Personal are also quite

good

3) Use text at the very least to preview email, Chilton Preview for Outlook is very effective

4) Change things like .vbs and .reg files to open with a text editor in Windows by default

5)Don't use Internet Explorer! I've used Opera for years but now use Firefox for almost all my browsing, but occasional tricky site ends up requiring IE for a short time.

6) Disable the Messenger service in XP

7) If it looks weird don't open it! Don't trust your relatives on the internet!

8) Be stealthy, very few internet sites really need your email address, get a webmail account just for the junk mail

Selecting a good password is an important part of password security. The key is to find a password that is easy for you to remember and hard for others to guess.

Create a good (strong) password:

1) Include both uppercase and lowercase letters (case-sensitive).

2) Include both letters and numbers (alpha-numeric).

3) Do not include your login name, a.k.a. username, in any form (as-is, reversed, capitalized, doubled).

4) Avoid words that can be found in a dictionary (including foreign and technical dictionaries).

5) Do not use a password that has been given as an example of a good password.

Create an easy to remember password:

One possible way to pick a good password is to make up your own acronym. Create a phrase that has meaning to you and pick the first letter of each word. Make sure your phase has numbers in the middle. A combination of  numbers and letters is harder to guess or crack with a computer program.

For example:

"I love to shop for sandals in the Spring." (Il2s4sitS)

2) "I'm going to work out 3 times a week." (Ig2wo3taw)

3) "Last summer I caught a 30 inch striped bass." (LsIca30isb)

A similar method is to take out all the vowels from a short phrase.

For example:

1) "I work 8 hours a day." (wrk8hrsdy)

2) "You're once, twice, three times a lady." - Lionel Richie (Yr123tmsLdy)

Protect your Password:

  1)Memorize your password.

2) If you must write down your new password because you are afraid to forget it, then:

2A) Never write your username and your password on the same piece of paper.

2B) Do not place a written copy of your password on the side of your monitor, under your keyboard, etc.

3) Destroy the written copy as soon as you have memorized your password.

4) Do not allow anyone to look over your shoulder while you are entering your password.

5) Change your password often.

6) Change your password immediately if it has been compromised.

One phenomenon that has become quite obvious from the vast numbers of virus victims over the last year is that people click first and ask questions later. Maybe we're inspired by the false belief that firewalls, antivirus software, and anti-spyware programs protect us from all viruses, worms, and intrusive programs. But even the best of these shields can't always protect you from your biggest security threat: yourself.

Don't click e-mail attachments: Most viruses and worms arrive on your PC in the form of e-mail attachments. A few of them exploit security flaws in Windows or in your browser to launch automatically, but if you keep your programs updated, your chances of being infected via this route are slim to none.

Don't believe the return address: Though an e-mail message may claim it's from your bank, your ISP, or even your boss, that doesn't mean it is. Spammers and virus mailers generally spoof the From address field in their messages with a legitimate address that they've stolen. You may even have received spam from yourself as a result of this clever technique.

Of course, not all e-mail is bad. But if a message from a coworker or friend insists that you launch a file attachment, first confirm with the sender what the file is (make a call or send an e-mail asking whether the purported sender in fact e-mailed the file attachment, and whether it is indeed intended for you). If you have any doubts about the legitimacy of the message and its attachment, delete them.

Don't believe the message: To persuade you to launch a virus-laden mail attachment or provide your personal information, virus authors must earn your trust.  They try to accomplish this by composing convincing-looking messages that appear to be sent from Microsoft, your ISP, or some other entity you do business with. The message may even contain links to a counterfeit version of the company's Web site, complete with genuine-looking graphics and corporate logos.

Often the message laments that the company is experiencing technical problems, and that it needs you to click an executable attachment. You don't need to rely on your intuition to determine whether this message is truthful. If the message hasn't been verified by a company representative via phone or in person, it almost certainly contains a virus. Microsoft doesn't e-mail updates to its customers, and neither should your ISP.

Don't believe the link, either: A link in an e-mail message that claims to point to a Citibank Web site may not really go there. Devious phishing scams use the wonders of HTML to snooker you into uploading your Social Security number, PIN, credit card number, password, or other sensitive data to a scammer's Web site. A carefully crafted e-mail message purporting to be from your bank, PayPal, or some other institution (and often also containing links to the real company's Web site) warns that you must update your records there. The biggest tip-off should be this: Banks and ISPs don't lose your information and then send e-mail requests for you to reenter it online. Another tip-off is that the link text and the real underlying URL don't match. Always examine log-in Web pages and their URLs closely. The site sends unsuspecting Citibank customers to a non-Citibank site (which no longer exists, fortunately). If you do get hooked by creeps on a phishing expedition, notify your bank, ISP, or other institution immediately.

Practice abstinence. Resist viewing or replying to messages from questionable sources or opening dubious attachments-- most viruses, worms and Trojans enter computers this way. If the email seems too good to be true, it probably isn't. Many schemes use `social engineering' methods to lure unsuspecting users into revealing personal information or into confirming their email address for use in more schemes or spam.

Make sure your antivirus and personal firewall software is up to date. An updated antivirus program blocks incoming threats from known viruses and worms while an updated personal firewall blocks incoming threats from hackers, identity thieves and even new, unknown viruses and worms. Make sure that your personal firewall provides outbound protection measures, too. Outbound protection is vital in case malicious code does make it onto the PC and starts trying to 'call home' to establish a back door method for hackers to disguise their activities.

Schedule a monthly check-up.  Vulnerability patches and bug fixes are released often, but you don't always hear about them. Take a few minutes one day a month to check for updates on all your software vendors' Web sites.



categories: Security
Other Stories according to Google: Paranoid spouses, rejoice | Computer History Museum - Exhibits - Internet History - 1970's | Introduction For New Computer Science Students On CDF. | TP: The Paranoid Machine | Privacy & Security - Viruses, Hackers, Spyware and more Web | Computer Jokes | Program Manager: Only the paranoid survive: how Short Range Air | Computing .Net - Spammers have my real name an more | The ‘Darknet’ & ‘Trusted Computing ’ | Introduction to Troubleshooting Linux Firewalls

11:19:21 PM    



WHAT BOTHERS A VACATIONING PRESIDENT MOST?

And George Bush is getting the worst of it at Unconfirmed Sources, where Bush is planning a military strike against Sheehan and also where world leaders are finally joining Mr. Bush in condemning Cindy Sheehan's example of free speech. On Spoof Wolfowitz advises Bush to bomb Cindy Sheehan, and Bush claims he sympathizes with Sheehan, claiming he is a mother, too.


You know a story has legs when the comedians get hold of it and won't let go. Andy Borowitz certainly hasn't missed the story.

President George W. Bush said today that he understands and respects the views of those who are calling for him to cut short his summer vacation, but warned that an immediate withdrawal from Crawford, Texas would "send a terrible signal to the enemy."

"The enemy would like nothing better than to see me cut short my vacation and get back to the White House," Mr. Bush told reporters. "They hate my freedom."

While the president said that he would withdraw from Crawford "soon," he refused to set a timetable for his departure from the ranch, saying that much work there still needs to be done.

Mr. Bush, who has been spending much of his vacation clearing brush, said that he is making great progress in training ranch hands to take over that job for him, but cautioned that they are not yet prepared to do the job themselves.

"Once the ranch hands have shown that they are able to clear the brush on their own, I will withdraw from Crawford, but that day has not yet come," the president said.

I have been waiting for Billmon to write about Cindy. Here is the link

But, instead of feasting on Hanoi Jane, the wing nuts are driving themselves nuts trying to figure out how to take down Vacaville Cindy: a woman who looks and sounds like she spends her free time organizing church socials and helping her husband clean out the garage -- that is, when she isn't busy searing George W. Bush's butt with a white hot poker for dragging the country into an unnecessary and failed war in Iraq



Over at the revealingly-named Powerline, General Aldo and the gorillas posted the following dispatch from one of their cheeseburger-eating scouts

The bad guys hang at the Crawford Peace House, a dump of a house that looks like Hippie Central with dozens of cars, vans, SUVs and campers parked on the grass. Add portable toilets for ambience and you get the picture. This is the staging center for protests at the ranch nine miles up Prairie Chapel Road.


The good guys fill with gas and diesel and dine on cheeseburgers at the Coffee Station where the walls are adorned with enlarged snapshots of President Bush working the crowd and dining on a Coffee Station burger. That won’t happen this year, and perhaps never again because of the bad guys.

I would be happy if someone could offer me proof that the Powerline post is a "gag" to bait those of us who feel no sorrow at the prospect that W might never again be seen working the crowd or dining on a cheese burger at the Coffee Station. I may not agree with all that Cindy Sheehan has to say, but she has the right to express her views. It baffles me how someone on one hand can attack Mrs. Sheehan for traveling to Crawford to make a point to the president, while on the other implying admiration for Republicans who traveled to Crawford to give the president a message of their own. This cannot be taken seriously. A "pilgrimage" to the ranch of Dubya Bush? I mean really...



categories: Politics
Other Stories according to Google: The Rittenhouse Review | Findory : The Rittenhouse Review | Gunmen oust Baghdad mayor - | Gunmen oust Baghdad mayor - | Welcome to American Politics Journal | Newswire | Republicans & Conservatives:: What liberal press? | Republicans & Conservatives:: Derelicte | BartCop's most recent rants

5:23:39 PM    


© Copyright 2005 Earl Bockenfeld.



Click here to visit the Radio UserLand website.
 



August 2005
Sun Mon Tue Wed Thu Fri Sat
  1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 31      
Jul   Sep









Top 10 hits for Downing Street Memo on..
Google
1.The secret Downing Street memo - Sunday Times - Times Online
2.The Downing Street Memo :: What is it?
3.Downing Street memo - Wikipedia, the free encyclopedia
4.Downing Street memo - Wikipedia, the free encyclopedia
5.The secret Downing Street memo
6.Democracy For America
7.AfterDowningStreet.org | For a Resolution of Inquiry
8.Why has ' Downing Street memo ' story been a 'dud' in US ...
9.FOXNews.com - Politics - Downing Street Memo Mostly Ignored in US
10.The Downing Street Memo

Help link 9/1/2005; 1:37:21 AM.


Story Categories:

Blogging

Body

Digital Media

Heart

Humor

Internet

Microsoft

Mind

Miscelleous

Politics

Outrages

Security

Software

Soul

Userland

Top 10 hits for spyware adware on..
Google
1.Adware , Spyware and Advertising Trojans - Info & Removal Procedures
2.Ad-Aware SE Personal - Software - Lavasoft
3.NEW! Adware .info - Adware Spyware Software Quick Reference
4.How to Protect Your Computer from Spyware and Adware
5.Spyware / AdWare /Malware FAQ and Removal Guide - Table of Contents ...
6.PC Hell: Spyware and Adware Removal Help
7.Free Spyware Removal - Anti Spyware Remover Software
8.What is spyware ? - A Word Definition From the Webopedia Computer ...
9.Software: Spyware / Adware /Hijackware Tools
10.Free Spyware / Adware / Trojans / Hijackers Detection, Prevention ...

Help link 9/1/2005; 1:37:23 AM.