New Computer? Steps to Protect Your Computer Before Connecting to the Internet

Getting a new computer should be an exciting and gratifying experience. After all, you'll be able to do things faster, safer and without having to worry that your old hard drive is so full that one more file will "break the camel's back."

However, there are dangers out there that probably didn't exist when you bought your last computer. And there's the question of what will happen to your old hard drive, with all your personal data on it.

Let's deal with your new computer first. This information applies specifically to Windows XP, although it has broader application as well.

Remember:

  • Many computers' default configurations are insecure.
  • New security vulnerabilities may have been discovered between the time the computer was built and configured by the manufacturer and you setting up the computer for the first time.
  • When upgrading software from commercially packaged media (e.g., CD-ROM, DVD-ROM), new vulnerabilities may have been discovered since the disc was manufactured.
  • Attackers know the common broadband and dial-up IP address ranges, and scan them regularly.
  • Numerous worms are already circulating on the Internet continuously scanning for new computers to exploit.
  • It is estimated that 80% of spam comes from personal computers (known as "Zombies"), like yours, that have been compromised with a trojan or other malware that the owner is completely unaware of. By protecting your computer you are protecting the Internet!
As a result of these hackers' efforts, the average time-to-exploitation for an unprotected computer is measured in minutes.

Standard (wrong) advice to home users has been to download and install software patches as soon as possible after connecting a new computer to the Internet. However, since the background intruder scanning activity is pervasive, it may not be possible for you to complete the download and installation of software patches before the vulnerabilities they are trying to fix are exploited.

This Special Report offers advice on how to protect your computer before connecting it to the Internet so that you can complete the patching process without incident.

We strongly recommend following all the steps when upgrading to a new operating system from disc(s) as well as when connecting a new computer to the Internet for the first time.

  • Perform these steps before connecting to the Internet for the first time.
  • The links in this document are LIVE LINKS, but we recommend that you NOT connect to them through your new computer. Use the live links on a computer that is fully updated, virus protected and firewalled, and download the instructions/programs to a CD or a USB drive, then transfer them to your new computer. A 128 megabyte USB drive costs less than $20, is "plug and play," and can be used over and over.
  • If possible, connect the new computer behind a network (hardware-based) firewall or firewall router.

    A network firewall or firewall router is a hardware device that is installed between the computers on their Local Area Network (LAN) and their broadband device (cable/DSL modem). By blocking inbound access to the computers on the LAN from the Internet a hardware-based firewall can often provide sufficient protection for you to complete the downloading and installation of necessary software patches. A hardware-based firewall provides a high degree of protection for new computers being brought online.

    If you connect to the Internet before you install a firewall, it may be possible for the computer to be exploited before the download and installation of such software is complete.

    XP has a built in firewall that may or may not be enabled. If Microsoft XP has not had Service Pack 2 installed, follow these instructions to turn on the Internet Connection Firewall. If XP is installed WITH Service Pack 2, then your firewall is enabled by default.

    Microsoft has provided both detailed and summarized instructions for enabling the built-in Internet Connection Firewall on Windows XP.

    We strongly recommend that you install a third-party firewall application and THEN turn off the Windows firewall.

    We recommend ZoneAlarm (www.ZoneLabs.com), which is FREE. Zone Alarm is the top rated firewall, and protects both incoming and outgoing data. XP's firewall ONLY protects against incoming data. Zone Alarm's setup file is approximately 7 megabytes, which will easily fit on a CD or USB drive.

  • Disable File and Printsharing if enabled.
  • Go to Start -> Control Panel.
  • Open "Network and Internet Connections".
  • Open "Network Connections".
  • Right-click on the network connection you wish to change (e.g., "Local Area Connection").
  • Select "Properties".
  • Make sure "File and Printer Sharing for Microsoft Networking" is unchecked.

  • Connect to the Internet.

  • Go to windowsupdate.microsoft.com.

    Follow the instructions there to install all Critical Updates. However, if you are going to install Service Pack 2, READ THIS FIRST! Pay particular attention to "Get the latest PC manufacturer updates for SP2, because you may need to update drivers for your PC to work properly.

    Only download software patches from known, trusted sites (i.e., the software vendors' own sites), in order to minimize the possibility of an intruder gaining access through the use of Trojan horse software.

    Staying Secure

    Follow the principle of least privilege - don't enable it if you don't need it.

    Consider using an account with only 'user' privileges instead of an 'administrator' or 'root' level account for everyday tasks. You only need to use administrator level access when installing new software, changing system configurations, and the like. Many vulnerability exploits (e.g., viruses, Trojan horses) are executed with the privileges of the user that runs them - making it far more risky to be logged in as an administrator all the time.

    Moving Your Applications and Data

    Unless you've never had a computer before, you'll want to move your old data onto your new machine. There are several ways to do this quickly and easily (although there are often a few glitches). The best article on the subject is www.pcworld.com/howto/article/0,aid,115632,00.asp.

    Protecting Your OLD Data

    So, what do you do with your OLD computer? Perhaps someone else can use it, maybe a school or a retirement center?

    One of the biggest mistakes people make is thinking that deleting files using Windows Explorer actually deletes the files! It DOESN'T!

    When you delete files in Windows, all it does is delete the pointers that show where the files are. Any competent computer whiz can easily find a program on the Internet that will rebuild the file pointers, and then they have access to all your files- your emails, your business information and your financial information.

    You can go to any flea market in the country, and chances are you can purchase a used hard drive with the old owner's data still on it! Many professional identity thieves are doing just that!!!!

    What CAN you do?

    Personally, I remove the hard drive from the computer, and I keep it (not in a place that it would be found if a burglar came into my house).

    Another alternative is to use a free disk wiping utility or purchase one.

    To effectively remove data from a hard drive, it must be overwritten completely several times. All of the temporary files, all of the caches, all of the "swap files" that are created as you work may be lurking in some unknown corner of the hard drive.

    Contrary to popular belief, even reformatting the drive does not necessarily make file recovery impossible!

    Consider this ? A recent search of hard drives that had been discarded revealed:

    • A disk that had been owned by an Attorney, with all his case files and confidential information on it.
    • A disk that had been owned by a CPA, with all her clients' tax information on it.
    • A disk that had been owned by a Medical Clinic on it, with hundreds of patients' medical records still on it.

      There are free programs that will do an adequate job of wiping a hard drive clean ? although the data may still be recoverable by professionals with very expensive programs, and there are inexpensive programs that will make the data completely unrecoverable.

      We recommend DBAN (dban.sourceforge.net/)which does 5220.22-M-compliant wiping. 5220.22-M-compliant wiping is the Department of Defense secure delete wiping standard. Be aware, however, properly wiping a hard drive, particularly some of the large ones can take hours, but it is worth it to protect your privacy.

      ? Steve Freedman, Archer Strategic Alliances, 2005 All Rights Reserved

      Steve Freedman
      Author of "Help! Something's Got Hold of My Computer and It Won't Let Go!"
      A PC Security eBook for Newbies, Skilled Users and Wizards
      Archer Strategic Alliances
      http://www.helpprotectmycomputer.com

      ohare limo service Grand Rapids .
      In The News:

      The International Olympic Committee on Friday announced plans to use AI in various Olympic aspects, including athlete identification, training and judging.
      Tech guru Kurt "CyberGuy" Knutsson explains an easy trick to avoid squinting while working or surfing the web by zooming in on your personal computer.
      Streaming giant Roku has recently been targeted by a pair of cyberattacks, and the company confirmed over a half million Roku accounts were compromised.
      The Land Aircraft Carrier combines an all-terrain, six-wheeled vehicle with a two-seat aircraft, which features electric vertical takeoff and landing.
      The European Union has sent TikTok a "request for information" on the video sharing platform's newest app, TikTok Lite, under the Digital Services Act, with the aim to clean up social media.
      Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
      The FBI is warning the public about a recent phishing scam via text that claims its targets owe money in Pennsylvania for unpaid road toll charges.
      Your Apple Music settings may be revealing to your contacts what you're listening to. Kurt "CyberGuy" Knutsson explains the process to change those settings.
      Learn how to secure social media accounts, implement legacy contacts, and create a digital estate plan to protect your online assets from 'ghost hackers' after your death.
      A ported phone number scam is leading to more people having their identities stolen by sophisticated scammers. Kurt “CyberGuy" Knutsson tells you what you need to know.
      The Great Pacific Garbage Patch, a vast marine debris vortex, is being tackled by The Ocean Cleanup’s innovative technologies. Kurt “CyberGuy" Knutsson explains.
      Discover easy solutions to tame autocorrect frustration on iOS and Android devices. Turn off, customize and add personal touches to your typing experience.
      Kurt “CyberGuy" Knutsson reveals the six top things to do right now before it’s too late: Tech and life choices that can keep your safer on and offline.
      Kurt “CyberGuy" Knutsson shows you some simple steps to discreetly hide apps or an entire app page on your iPhone for decluttering or confidentiality.
      The ambient light sensors on smartphones may be turned into cameras, according to researches at MIT. This could pose a threat to people's privacy.
      The Autonomous Road Repair System from tech firm Robotiz3d uses artificial intelligence technology to locate potholes and promptly seal them.
      Scammers have stooped to using artificial intelligence to scan obituary websites to create fake obituary websites to target the grieving.
      Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
      A Mercedes-Benz Manufacturing factory in Hungary is using humanoid robots to help with human staffing shortages on the factory floor.
      Some video games act like unregulated banks, according to CFPB, which has begun monitoring the situation. The agency says children may be most at risk.
      Ascender the robot is capable of climbing stairs with heights up to 8.7 inches, and it can give every corner of your home a deep cleaning.
      Tax-return scams are on the rise, and one tax expert from a cybersecurity firm says filing your taxes on time is one way to avoid tax scams.
      The innovative XPENG Robot Unicorn is inspired by the mythical unicorn, and you may forget the robot is not actually a living creature.
      Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
      The Federal Trade Commission, the federal agency to report scams to, is being impersonated as part of a new sophisticated phone scam.
  • Why Build Your Own Computer System

    Have you ever thought about building your own computer system?... Read More

    If You are the Only User on Your Windows XP Computer, Do You Think One User Account Is Enough?

    I am going to assume that you are running windows... Read More

    Computer Consulting 101 PC Troubleshooting Advice

    While most small businesses really do need to find a... Read More

    Flash Your nVidia Video Cards BIOS

    You will need the following:1. 1.44MB FDD (floppy)2. NVFLASH utility... Read More

    15 Good Programming Habits

    1. Before sitting down for coding, you must have formal... Read More

    Make Windows XP Run Faster!

    A friend told me: "My computer startup seems to be... Read More

    Tips For Finding Great Deals On Computer Accessories & Supplies

    Tip #1. Do a Google search. Don't be to general... Read More

    Setting File Permissions On A Unix Server

    File permissions are one of the strengths that the Unix... Read More

    Passwords and the Human Factor

    Passwords have a strange dual nature. The stronger and safer... Read More

    iPod users get the picture

    iPod users start to get the picture and it's turning... Read More

    2 PC Annoyances and How To Solve Them!

    I have a love-hate relationship with my computer.In fact, often... Read More

    How To Recognize The Telltale Signs Of Spyware

    Spyware is the software that collects information about your online... Read More

    The Benefits of Open Source

    If you are a building a website or a forum,... Read More

    Windows PDA Medical Software Benefits

    PDA Medical BenefitsIf you are concerned about your medical history,... Read More

    Deleting and Destroying Data Forever

    Peoples' private information needs to stay private, even after it... Read More

    Favorite Things To Do With Home Technology

    Save money. Save 10-15% on utility bills per month. Work... Read More

    PC Tools Youd Never Think You Need

    Do you use Windows standard uninstall feature? How do you... Read More

    Troubleshooting Computer Freeze (Lockup) Problems

    How familiar does the following sound? Your computer was working... Read More

    How to Protect your PC from Spyware in the Cyber Age

    Wouldn't you be shocked to find that your personal sensitive... Read More

    Five Simple Steps to Speed up Your Computer

    Most people download and save so much information on their... Read More

    Put Order and Information into File Names

    Unless you place your faith in internal search engine software... Read More

    Computer Geeks and Garden Gnomes

    First and foremost before I begin my ranting it is... Read More

    The Newbies Guide to Personal Computer Maintenance

    When you turn on your computer, does it act like... Read More

    How Does a Palm Pilot Work?

    Just The Facts, Ma'mPalm pilots are all the rage now.... Read More

    How To Become A True CCNA

    I've worked my way from the CCNA to the CCIE,... Read More

    executive chauffeured services Barrington Hills .