Misplaced Pages

Internet security: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 07:03, 4 July 2007 editDraicone (talk | contribs)2,734 edits Nominated for deletion: see Misplaced Pages:Articles for deletion/Internet security← Previous edit Revision as of 11:38, 4 July 2007 edit undoCarlosguitar (talk | contribs)Administrators8,917 editsm Added HOWTO and rewrite tagsNext edit →
Line 2: Line 2:
{{AfDM|page=Internet security|date=2007 July 4|substed=yes}} {{AfDM|page=Internet security|date=2007 July 4|substed=yes}}
<!-- End of AfD message, feel free to edit beyond this point --> <!-- End of AfD message, feel free to edit beyond this point -->
{{howto}}

{{rewrite}}


This article provides tips on how to make sure you can be safe on the ] and how to keep ]es, ], and other unwanted software off your computer. This article provides tips on how to make sure you can be safe on the ] and how to keep ]es, ], and other unwanted software off your computer.

Revision as of 11:38, 4 July 2007

An editor has nominated this article for deletion.
You are welcome to participate in the deletion discussion, which will decide whether or not to retain it.Feel free to improve the article, but do not remove this notice before the discussion is closed. For more information, see the guide to deletion.
Find sources: "Internet security" – news · newspapers · books · scholar · JSTOR%5B%5BWikipedia%3AArticles+for+deletion%2FInternet+security%5D%5DAFD
This article contains instructions, advice, or how-to content. Please help rewrite the content so that it is more encyclopedic or move it to Wikiversity, Wikibooks, or Wikivoyage.
This article may need to be rewritten to comply with Misplaced Pages's quality standards. You can help. The talk page may contain suggestions.

This article provides tips on how to make sure you can be safe on the Internet and how to keep computer viruses, malware, and other unwanted software off your computer.

Basics

Routers

Further information: router

Network Address Translation (NAT) typically has the effect of preventing connections from being established inbound into a computer, whilst permitting connections out. Getting a router in your home improves the security of a home LAN; some people consider that they don't need a firewall if they have a router. However, for a small home network, software NAT can be used on the computer with the internet connection, providing similar behaviour to a router, and similar levels of security but for a lower cost and lower complexity.

Firewalls

Further information: firewall

A firewall blocks all traffic except through authorized ports on your computer, thus restricting unfettered access. A stateful firewall is a more secure form of firewall, and system administrators often combine a proxy firewall with a packet-filtering firewall to create a highly secure system; this would be overkill for a home system, but is more common in business. Most home users would use a software firewall, while some high risk servers and computers might need a hardware firewall.

Anti-virus

Further information: malware

Some bad people or companies write programs like computer viruses, worms, trojan horses and spyware. These programs are all characterised as being unwanted software that install themselves on your computer through deception.

Trojan horses are simply programs that conceal their true purpose or include a hidden functionality that a user would not want.

Worms are characterised by having the ability to replicate themselves and viruses are similar except that they achieve this by adding their code onto third party software. Once a virus or worm has infected a computer, it would typically infect other programs (in the case of viruses) and other computers.

Viruses also slow down system performance and cause strange system behavior and in many cases do serious harm to computers, either as deliberate, malicious damage or as unintentional side effects. In order to prevent damage by viruses and worms, you need either to completely isolate your computer from dangers (impractical for many people or networks) or install antivirus software, which typically runs in the background on your computer, detecting any suspicious software and preventing it from running.

Some malware that can be classified as trojans with a limited payload are not detected by most antivirus software and may require the use of other software designed to detect other classes of malware, including spyware.

Generally anti-virus software may be also be used to scan all of the files on a computer occasionally for extra peace of mind. Because of the continuing increase in the number of viruses and worms being identified, all good anti-virus software includes a facility to regularly update the data that is used to identify viruses. As well as the commercial antivirus programs, which generally require an annual subscription, there are free antivirus programs available, but the best commercial programs appear to be a little more reliable at present. Several companies provide a comparison of the performance of different antivirus programs which should be useful in making a decision as to which to use.

Anti-spyware

Further information: malware

There are several kinds of threats:

  • Spyware is software that runs on a computer without the explicit permission of its user. It often gathers private information from a users computer and sends this data over the Internet back to the software manufacturer.
  • Adware is software that runs on a computer without the owner's consent, much like spyware. However, instead of taking information, it typically runs in the background and displays random or targeted pop-up advertisements. In many cases, this slows the computer down and may also cause software conflicts.

Browser choice

Internet Explorer is currently the most widely used web browser in the world , making it the prime target for phishing and many other possible attacks. This has caused some users to switch to different browsers, such as Mozilla Firefox, Opera, and Netscape.

See also

External links

  • Windows XP Security Software Microsoft's Security at Home - Free Downloads & Trials for Windows XP systems
  • What are keystroke loggers? - detailed advice and information on keystroke loggers, and trojan horses, and how to remove them
  • Security4web - detailed advice and information on Internet security for individuals and families
  • SecurityBay - security news, articles and vulnerability database for security-aware Internet users

Sources of security-related software free for personal use

Firewalls

Spyware blocking, detection and removal

Antivirus

Browser Add-on

  • PwdHash is a Firefox & IE browser extension that transparently converts a user's password into a domain-specific password.
  • Firefox Privacy/Security FoxyProxy, Password Hasher, Torbutton
Category: