New Computer? Steps to Protect Your Computer Before Connecting to the Internet

Getting a new computer should be an exciting and gratifying experience. After all, you'll be able to do things faster, safer and without having to worry that your old hard drive is so full that one more file will "break the camel's back."

However, there are dangers out there that probably didn't exist when you bought your last computer. And there's the question of what will happen to your old hard drive, with all your personal data on it.

Let's deal with your new computer first. This information applies specifically to Windows XP, although it has broader application as well.

Remember:

  • Many computers' default configurations are insecure.
  • New security vulnerabilities may have been discovered between the time the computer was built and configured by the manufacturer and you setting up the computer for the first time.
  • When upgrading software from commercially packaged media (e.g., CD-ROM, DVD-ROM), new vulnerabilities may have been discovered since the disc was manufactured.
  • Attackers know the common broadband and dial-up IP address ranges, and scan them regularly.
  • Numerous worms are already circulating on the Internet continuously scanning for new computers to exploit.
  • It is estimated that 80% of spam comes from personal computers (known as "Zombies"), like yours, that have been compromised with a trojan or other malware that the owner is completely unaware of. By protecting your computer you are protecting the Internet!
As a result of these hackers' efforts, the average time-to-exploitation for an unprotected computer is measured in minutes.

Standard (wrong) advice to home users has been to download and install software patches as soon as possible after connecting a new computer to the Internet. However, since the background intruder scanning activity is pervasive, it may not be possible for you to complete the download and installation of software patches before the vulnerabilities they are trying to fix are exploited.

This Special Report offers advice on how to protect your computer before connecting it to the Internet so that you can complete the patching process without incident.

We strongly recommend following all the steps when upgrading to a new operating system from disc(s) as well as when connecting a new computer to the Internet for the first time.

  • Perform these steps before connecting to the Internet for the first time.
  • The links in this document are LIVE LINKS, but we recommend that you NOT connect to them through your new computer. Use the live links on a computer that is fully updated, virus protected and firewalled, and download the instructions/programs to a CD or a USB drive, then transfer them to your new computer. A 128 megabyte USB drive costs less than $20, is "plug and play," and can be used over and over.
  • If possible, connect the new computer behind a network (hardware-based) firewall or firewall router.

    A network firewall or firewall router is a hardware device that is installed between the computers on their Local Area Network (LAN) and their broadband device (cable/DSL modem). By blocking inbound access to the computers on the LAN from the Internet a hardware-based firewall can often provide sufficient protection for you to complete the downloading and installation of necessary software patches. A hardware-based firewall provides a high degree of protection for new computers being brought online.

    If you connect to the Internet before you install a firewall, it may be possible for the computer to be exploited before the download and installation of such software is complete.

    XP has a built in firewall that may or may not be enabled. If Microsoft XP has not had Service Pack 2 installed, follow these instructions to turn on the Internet Connection Firewall. If XP is installed WITH Service Pack 2, then your firewall is enabled by default.

    Microsoft has provided both detailed and summarized instructions for enabling the built-in Internet Connection Firewall on Windows XP.

    We strongly recommend that you install a third-party firewall application and THEN turn off the Windows firewall.

    We recommend ZoneAlarm (www.ZoneLabs.com), which is FREE. Zone Alarm is the top rated firewall, and protects both incoming and outgoing data. XP's firewall ONLY protects against incoming data. Zone Alarm's setup file is approximately 7 megabytes, which will easily fit on a CD or USB drive.

  • Disable File and Printsharing if enabled.
  • Go to Start -> Control Panel.
  • Open "Network and Internet Connections".
  • Open "Network Connections".
  • Right-click on the network connection you wish to change (e.g., "Local Area Connection").
  • Select "Properties".
  • Make sure "File and Printer Sharing for Microsoft Networking" is unchecked.

  • Connect to the Internet.

  • Go to windowsupdate.microsoft.com.

    Follow the instructions there to install all Critical Updates. However, if you are going to install Service Pack 2, READ THIS FIRST! Pay particular attention to "Get the latest PC manufacturer updates for SP2, because you may need to update drivers for your PC to work properly.

    Only download software patches from known, trusted sites (i.e., the software vendors' own sites), in order to minimize the possibility of an intruder gaining access through the use of Trojan horse software.

    Staying Secure

    Follow the principle of least privilege - don't enable it if you don't need it.

    Consider using an account with only 'user' privileges instead of an 'administrator' or 'root' level account for everyday tasks. You only need to use administrator level access when installing new software, changing system configurations, and the like. Many vulnerability exploits (e.g., viruses, Trojan horses) are executed with the privileges of the user that runs them - making it far more risky to be logged in as an administrator all the time.

    Moving Your Applications and Data

    Unless you've never had a computer before, you'll want to move your old data onto your new machine. There are several ways to do this quickly and easily (although there are often a few glitches). The best article on the subject is www.pcworld.com/howto/article/0,aid,115632,00.asp.

    Protecting Your OLD Data

    So, what do you do with your OLD computer? Perhaps someone else can use it, maybe a school or a retirement center?

    One of the biggest mistakes people make is thinking that deleting files using Windows Explorer actually deletes the files! It DOESN'T!

    When you delete files in Windows, all it does is delete the pointers that show where the files are. Any competent computer whiz can easily find a program on the Internet that will rebuild the file pointers, and then they have access to all your files- your emails, your business information and your financial information.

    You can go to any flea market in the country, and chances are you can purchase a used hard drive with the old owner's data still on it! Many professional identity thieves are doing just that!!!!

    What CAN you do?

    Personally, I remove the hard drive from the computer, and I keep it (not in a place that it would be found if a burglar came into my house).

    Another alternative is to use a free disk wiping utility or purchase one.

    To effectively remove data from a hard drive, it must be overwritten completely several times. All of the temporary files, all of the caches, all of the "swap files" that are created as you work may be lurking in some unknown corner of the hard drive.

    Contrary to popular belief, even reformatting the drive does not necessarily make file recovery impossible!

    Consider this ? A recent search of hard drives that had been discarded revealed:

    • A disk that had been owned by an Attorney, with all his case files and confidential information on it.
    • A disk that had been owned by a CPA, with all her clients' tax information on it.
    • A disk that had been owned by a Medical Clinic on it, with hundreds of patients' medical records still on it.

      There are free programs that will do an adequate job of wiping a hard drive clean ? although the data may still be recoverable by professionals with very expensive programs, and there are inexpensive programs that will make the data completely unrecoverable.

      We recommend DBAN (dban.sourceforge.net/)which does 5220.22-M-compliant wiping. 5220.22-M-compliant wiping is the Department of Defense secure delete wiping standard. Be aware, however, properly wiping a hard drive, particularly some of the large ones can take hours, but it is worth it to protect your privacy.

      ? Steve Freedman, Archer Strategic Alliances, 2005 All Rights Reserved

      Steve Freedman
      Author of "Help! Something's Got Hold of My Computer and It Won't Let Go!"
      A PC Security eBook for Newbies, Skilled Users and Wizards
      Archer Strategic Alliances
      http://www.helpprotectmycomputer.com

      kitchen deep cleaning Deerfield ...
      In The News:

      New research shows Americans increasingly trust AI for wellness guidance over social media, with 63% finding artificial intelligence reliable for health.
      Luxury fashion brand Dior experienced a January 2025 data breach affecting customer personal information, and notifications were sent months after the discovery.
      The commercial Unitree H1 humanoid robot weighs 104 pounds with 365 pound-feet torque per joint and demonstrates dangerous potential when software glitches occur.
      Americans average 10-plus hours online daily, according to recent survey, splitting time between streaming shows on TV and browsing websites on multiple devices.
      Boost your smartphone privacy instantly with these security tweaks for iPhone and Android that limit ad tracking, hide notifications and prevent unauthorized access.
      Platforms like Hoax Tech and JS Click Cloaker help cybercriminals bypass detection systems using machine learning to selectively display scam content to victims.
      A new battery recycling technique transforms old lithium-ion batteries into high-performance components that retain 88% capacity after 500 cycles with minimal waste.
      Google's Android operating system can warn users about earthquakes before the shaking even begins – and there are ways to do it on your iPhone, too.
      Meta's new gesture control wristband might just be the most seamless way to control a computer yet. And no, it doesn't require surgery, a camera, or even a touchscreen. All it needs is your wrist.
      Long-haul trucks are now being upgraded with a surprising twist, thanks to California-based startup Revoy. Their electric boost doesn't replace diesel but works alongside it to cut emissions and fuel costs without major disruption.
      PayPal and Venmo just rolled out something big: AI-powered scam alerts for Friends and Family payments.
      As data centers multiply across the United States, energy demand is increasing at a rapid pace. This has not escaped the notice of large investment firms from Wall Street.
      The Unicode Consortium, the nonprofit organization that maintains the Unicode Standard to ensure emojis work across devices, has announced Unicode 17.0, which includes nine new emojis slated for release this fall, in September 2025.
      OpenAI is one of the world's leading AI research labs. Founded in 2015, it's behind some of today's most talked-about tools, including GPT, DALL·E, and ChatGPT.
      Ever catch your dog staring at the screen during movie night and wonder if they're actually watching? Turns out, they might be. A new scientific study from Auburn University found that many dogs really do engage with television, and not all pups react the same way.
      Stop the scammers from making contact in the first place. They're getting your parents' contact information and much more personal data besides, from somewhere.
      The Walker S2 robot from UBTech autonomously exchanges its batteries in just three minutes, allowing continuous operation in car factories operated by BYD, Nio and Zeekr.
      The FX Super One electric MPV from Faraday Future offers flexible seating, zero-gravity recliners and an AI system that creates a personal connection between driver and vehicle.
      Practical solutions for reducing unwanted charity mail, political texts and email spam by opting out of shared lists, replying "STOP" and using data removal services.
      Delta's new AI pricing system eliminates static airfares for personalized rates based on individual data, raising questions about fairness while promising optimized revenue.
      AI data centers are straining the power grid across 13 states, contributing to a $9 billion increase in electricity costs, and PJM customers face monthly bill increases of $25 or more.
      Artificial intelligence is transforming the music industry as AI-generated bands like The Velvet Sundown earn substantial streaming revenue, prompting lawsuits from major record labels.
      Microsoft phishing scams use fake security alerts and links that redirect to credential-stealing pages with warning signs, including urgent language and unusual senders.
      Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
      Tesla vehicles manufactured since mid-2021 with AMD Ryzen processors can now access Grok 4, xAI's witty conversational assistant designed to make drives more engaging.
  • Portable DVD Players - Things To Know

    In my humble opinion nothing makes a long trip easier... Read More

    What Has A Portable MP3 Player Have To Do With Your Business

    Plenty! When we made the decision to be our own... Read More

    This Page Cannot Be Displayed ? What to Do When Your Internet Breaks

    The DNS (Domain Name System) servers are what your computer... Read More

    The Benefits of the New Firefox Browser

    You probably heard of the new Firefox browser version 1.0... Read More

    Mail-merging: The Principles

    About mail-mergingMail-merging is the process of merging variable data and... Read More

    Buying A PC Flat Screen Monitor

    For six years, my Samsung PC 13.8 inch SyncMaster conventional... Read More

    The Newbies Guide to Personal Computer Maintenance

    When you turn on your computer, does it act like... Read More

    How to Switch to Firefox and Why You should

    First things first, what is Firefox? Well, it's a browser.... Read More

    Dynamite Comes in Small Packages - Tiny Personal Audio MP3 Players Pack Powerful Music Enjoyment

    MP3 players are Hot! Playing music has come a long... Read More

    Keeping Passwords Secure

    As the web has evolved, so have the methods of... Read More

    Enhanced Web Browsing With Toolbars

    As the Web grows more crowded and just plain "noisy"... Read More

    The Many Benefits of Owning a DVR

    Has This Ever Happened To You? OK.. it's Friday night,... Read More

    Top 9 Ways To Speed Up Your Surfing & Computing

    It seems like fast never quite rates fast enough.No matter... Read More

    Gain Control Over Your Screensavers With These Simple Steps

    We all enjoy our favorite screensavers but in the same... Read More

    Cisco Certification: Building Your Own Home Lab, Part I

    CCNAs and CCNA candidates hear it all the time: ???Get... Read More

    Occupational Therapy and PDAs

    Occupational Therapy Made EasierMedical downloads for the pda have improved... Read More

    SOBIG.F Virus Promises Ill Be Back

    On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More

    What Are You Looking For In A Cheap MP3 Player?

    Are you stymied by the vast offerings in cheap mp3... Read More

    How To Become A True CCNA

    I've worked my way from the CCNA to the CCIE,... Read More

    Best PC Pocket GPS

    Stop Getting LostOne of the greatest uses for a pocket... Read More

    Reliable File and Folder Sharing in Windows Xp

    This tip is on sharing files and folders on a... Read More

    Make Windows XP Run Faster!

    A friend told me: "My computer startup seems to be... Read More

    SmartCar Memory Stick for LapTop Transfer Data

    With the new technology used to transfer information to from... Read More

    Digital Cameras + Photo Printers = Quality Instant Photographs

    In the 1950's and 1960's Polaroid's instant cameras were all... Read More

    Password Nightmares

    Good Morning Mr. Sampson. Please type in you Personal Identification... Read More

    licensed cleaning services Park Ridge ...