to build a FREE Internet Security Suite. A Step by Step Guide to help
you protect your computer and your family while surfing the
net. Page 1 of 4.
There are two kinds of people on the net: Those who do not know about safety
and those who do. The first group is composed mostly
i.e., those new to the net, those who are of the belief that Bill Gates
and his minions will protect
them from evil doers. All they need do, they reason, is to use the very
latest computer operating system available. The second group, seasoned
veterans, wizened netizens, are, mostly,
of the belief that older operating systems are safer and less likely to
be attacked. They also tend to believe that throwing money at a
problem is (usually) not
how you fine tune your computer for safety on the net. Many
believe you need to pick and choose, and set up a
of defenses, a fine tuned security suite, in order to be safe.
piece of software in the suite should be picked to fill a
to watch the back of others in the suite. Only then
can you come close
to being safe. You'll never be 100% safe, but you can come close.
How does one acquire such wisdom? How do you go
knowing to knowing? The best answer is by being burned on-line.
After a few days on-line, with an unprotected computer, it will likely
with viruses, malware, diallers, trojans, etc. Your browser will be
hijacked, and when you go on-line you'll be taken to a porno site or a
viagra ad. Your personal information will be sold to the highest
bidder, and junk mail will be sent to all those in your e-mail address
book, all likely in your
name. All your files may even be deleted and your computer will no
longer boot up.
Once all the above happens, a change occurs, and
you wise up.
will now be in transition, and go from newbie
to wizened netizen.
You will now be smart. Below we will take you, step by step, from
newbie to wizened netizen. Are you ready for the journey?
let's look at a simplified sketch
of your computer, connected to the internet, and define a few
terms. This will be a view of the most basic internet
connection possible, and one you should NOT be
using! If you do not know why
not, we'll explain as we go along!
The Journey Begins
Home of Wondrous Things, Information, and FUN, BUT Danger lurks Everywhere!
Dial-Up, DSL, or Cable Modem.
A simplistic view of
along with a basic
connection to the internet.
marked as Modem
is, usually, one of the 3 types shown above. It's the interface you buy,
or rent, to connect your computer to the net. In terms of speed, the slowest
connection is on the left, and the fastest on the right, with a DSL
connection being somewhere in the middle.
above represents your computer. Let's talk about it:
Drive: The place
where all your software and files are stored.
The software you use to surf the net.
The software you use to
communicate with your friends.
All the letters,
charts, graphic images, and software on the hard drive.
A large file on your hard drive that controls most
on your computer.
everything above is, in reality, stored ON your hard drive.
out these various functions to make your computer and its internet
connection more understandable.
There are MANY
different kinds of computer virus. Each can attack one or more of
what's shown above. An attachment to an E-Mail can be loaded
onto your hard drive and destroy it. Another type of virus, called
a hijacker, can divert your Browser
to somewhere you don't want to go. Many of this type can be
stopped by using a free HOSTS file. If you're not familiar with one,
you'll find complete details on our sister site.
Some viruses are parts of files you
download, like screensavers, or music. They can
your Hard Drive,
and add code to your Registry
that allows them to call home and send hackers and thieves
personal information. Another type of virus can even
off your virus protection.
To be SAFER
on the net, you need to protect
your computer from everything mentioned above, and more!
Here is a partial list of things you want to protect yourself
How do you DO all
a virus to friends via your E-Mail.
computer viruses: Trojans, Malware, Keyloggers, Adware,
Spyware, Worms, etc.
changes to your Registry.
to your HOSTS file made by "re-directors.".
that calls home and gives away your personal information.
evil presently emerging from the ooze of hackerville.
Well, in truth, you can't, but you can
against most of it. Our approach is a multi-level one. We feel
different programs, each covering the others back,
and will make you as secure as possible.
First, we'll show you a simple,
but partial solution.
use it, many
do, but we do not recommend it, and we'll tell you why below.
Dial-Up, DSL, or Cable Modem.
Commercial Software Suite You Can Buy.
A simplistic view of
along with a connection to the internet, that's protected by a
Commercial Security Suite.
Software Security Suites
What we've done above is to buy a commercially available
software Security Suite and load it on to our computer. It
goes on to the Hard Drive,
large number of entries in to the Registry,
and sits, in effect, between your modem and
computer. Some such suitesmay place over 20 running processes in your
start-up folder and sap
the speed of your PC.
This is certainly much better
than a bare bones connection, i.e., the unprotected
connection shown in the first sketch. You will be a lot safer with this; it
is better than nothing.
this way, if you choose,
but here is why we would recommend against it:
First, it costs MONEY, typical Security Suites sell
and $100. Second, and more important, there is an old saying,
known by our elders, that goes: "Jack of all
trades, and Master of None." What this means is:
It's very difficult to do everything
well; you really need
to specialize. Such suite software may be good in a few
areas, but it's weak
in others, and totally useless elsewhere.
Suite software will usually include, as a minimum, ALL of the
E-Mail Scanner. *
E-Mail Scanner. *
In regard e-mail, there are
those who say, in effect: "It is sufficient to have the
anti virus program running in the background to monitor the attempted
opening of or installation of viruses and it is not necessary to have
additional monitoring of e-mails as well. The idea being that
if a virus arrives by e-mail, the AV program should intercept it as
soon as the user attempts to execute the program, so it's not necessary
to look in the e-mail as well."
They also feel that:
"Having the additional
mail scanning slows the system down and can cause conflicts and
problems with the mail client and/or other applications.
In regard the
sentiments of those who follow the above philosophy, and want to help you by
offering it, we can only say that this has to be a personal decision on your part. If in doubt, talk to
knowing friends and investigate.
who use such "Suite" software usually, after being burned,
with a virus), add other
software to improve their protection.
You can usually do
you're patient, and choose wisely. Please click below and
(C) 2004-2010. All Rights Reserved Worldwide.
Page last modified: