|
|||||||||||
Published October 2006
Computer
Security 101: Hello, everybody, and welcome to your new computer column by Will and Sven. This month, we’ll talk about computer security. But since we were told to cut the thousand-page book down to 500 words, we’ll keep it simple. First word in security: router. The router is a many-splendored thing. It will allow you to connect a whole bunch of machines to the Internet or to each other in a network. Now, if you are thinking, “But I only have one computer,” then keep reading. The second and most valuable thing that a router will do is protect you from the outside world. Any decent router will have a firewall built into it. That means that if somebody is trying to get into your machine from the outside, or, if that somebody has created a malicious program to do the job, then the person or the program has to fight through your router to get to your stuff. Most hackers and the programs they write aren’t smart enough to do this.
Some of you also may be thinking, “I don’t need one of these, I don’t go online that much.” But this is where they can get you. If you have cable/DSL/satellite Internet, then any time your computer is turned on, it’s online and vulnerable. Little Johnny from across the street could be grabbing your diary or that list of important passwords you keep any time he wants. If you read the first paragraph and said, “I already have a router, and it’s wireless, too!” then the most important question for you is “Is your encryption turned on?” If you have no idea what we’re talking about and have never typed in a 26-digit code that nobody could possibly know, then the answer is no, and this means that anyone with a functional laptop could be standing outside your house or business browsing your files right now. If you want to know more, visit our blog at www.twogeeksblog.com or call one of the numbers below. Even if the encryption is enabled, you should consider the following: If the information on your computer has value to thieves, then a wireless network is never truly secure, and further steps need to be taken. And even if all you keep is barbecue recipes from Uncle Joe, you should still change your code at least once a month. Now for the bad news: A router is a first best line of defense, but it isn’t a magic bullet. If you get an infected e-mail, then a router won’t help much. Once your machine has become infected, it will send out whatever it can to whomever it can, and you will be none the wiser. If you have questions or ideas for future columns, visit www.twogeeksblog.com and let us know! Sven Mogelgaard is the owner of Mill Creek-based Byte Slaves Inc. and can be reached by calling 425-482-9529. Will Rutherford is the owner of Bothell-based Computer Concepts and can be reached by calling 425-481-3666. |
|
||||||||||
©
2006 The Daily Herald Co., Everett, WA
|
|||||||||||
|