Regional Transportation Identifications

This content shows Simple View

Keeping Your PC Safe From Malware

happycomputerAs computers encompass more and more of our daily lives it is becoming crucial to protect your computer(s) from all the threats that are out there.  Since it’s almost unheard of to have a computer that is not connected to the internet at all (even utilities are now being connected to the internet as “smart” utilities) the risk of infection by malware or virus is always present.

It really doesn’t matter how good of an antivirus program you have–hackers are always working towards making new ways to get to you.  And this is the reality: a never-ending arms race between white hats and black hats.

Despite the challenges it doesn’t hurt to do the most that you can to prevent infection and other problems associated with malware and viruses.  Here are a few “best practices” that you can incorporate as a business, utility, or private individual.

Use Different Passwords

This is a tricky one, but I recently had an experience with this very thing.  If you use the same password for lots of online accounts with a similar username (aka your email) you will be vulnerable.  I personally thought that nobody would ever guess my password but eventually someone did!  I’m not sure how it happened but he had my password and my email – and therefore could technically access several of my accounts.  I am sure he had some sort of spider set up to go to many common logins to try out the password.  I had to frantically change my password to multiple accounts while I was out at dinner with friends.  And even then I wasn’t sure if I had changed every one – I have a lot of accounts!

Password managers such as LastPass make it easy to maintain multiple complex passwords.  I have started using LastPass and the mobile app and it has made all of my online accounts a lot more safe.

Use Security Software

Having an antivirus software tool is a great start, but the problem is that viruses aren’t the only thing that can take you down.  Malware has many variants, such as adware and spyware.  In order to truly protect your computer and get rid of any software that is lurking you should employ the use of antimalware software.  Programs such as Spyhunter 4 and Malwarebytes are great tools for this.  They can sniff out programs that slip by antivirus software because they pose as actual “programs”.  Sometimes you might even unwittingly agree to their installation!  This has happened to myself and a few clients before.

Don’t Frequent Internet “Bad Neighborhoods”

This goes without saying.  It’s quite well known that gambling, adult, and hacking websites and forums are a veritable treasure trove of viruses, malware, and more.  It doesn’t mean it’s the only place you can acquire a baddie, but it certainly raises the odds.

If you simply must frequent these sorts of sites, buy yourself a cheap netbook that is completely separate from any of your personal computer files and accounts.

 



The Beginning Of The Internet – Phone Lines

300px-telrecadapterRemember when the internet was largely conducted over simple phone lines?  Nowadays people don’t even use phone lines for phones.  But the reality was that the early internet relied heavily on the phone companies and the connectivity therein in order to grow and flourish.  Now fiber optic data cables reign supreme, and even wireless data is becoming the norm.

This article is a great look at how the connectivity was very important back in the day:

 

“Try this experiment. Pick up the phone, dial 800-USA-UNIX and ask a question: “Should protocols be inboard or outboard, in hardware or software?”

Then hang up and consider what just happened. You did not know how many independent telephone companies were involved in making your connection, how many switches handled the call, the type of phone equipment at the other end or even the location of the called party.

Nor did you care. You simply wanted an answer to your question, taking the rest for granted. You also assumed the answering party would speak English.

Of course that was a voice connection. But shouldn’t we expect and get the same degree of transparent connectivity in data communications?

Although such service is not universally achieved, it does communicate thousands of messages every day. More than 1,100 networks are connected with Internet Protocol (the IP portion of TCP/IP) to form a network of networks.

While the Defense Data Network (DDN) and Arpanet (Advanced Research Projects Agency Network) are the centerpieces of this community, sponsorship and participation are diverse.

The installed base of TCP/IP users now numbers over 120,000. File transfer and virtual terminal services are in wide use. For example, the Wollongong Group recently used a VT-100 terminal connected to a Digital Equipment Corp. VAX computer in Maryland to communicate over a public data network to a gateway on the West Coast, where it picked up another network to an IBM host on a LAN in southern California.

The TCP/IP implementations in the VAX and the gateway, along with Advanced Computer Communications’ (Santa Barbara, Calif.) implementation in the IBM host, made the terminal in Maryland appear to the IBM in California as a directly connected, full screen 3270-type terminal.

As a practical matter, voice is different from data, because only in certain environments can you type an address on your computer and transparently access a user many networks away.

The reason we get so much more connectivity over the telephone is that the voice network grew up in a regulated environment. Data communications is cutting its teeth in a deregulated environment where open standards are a product of consensus and are slower to develop.

This contrast is apparent in comparing Telenet, Tymnet and other segregated public and private data networks with the interconnected regional Bell operating companies.

Future Data Communications

While the connection in the example above was made as easily and transparently as a long distance phone call, we still have a long road to travel before data interoperability becomes prevalent as it is in the voice world. This road to standardization, with milestones such as TCP/ IP, Open Systems Interconnection (OSI) and Integrated Services Digital Networks (ISDN) along the route, will take us to a larger and more useful internet.

We are traveling in this direction because data users want the same degree of seamless connectivity that telephone users enjoy today. Data usage will surpass voice usage early in the 1990s.

What will bring together a larger internet is data communications standards. Today, the standard is TCP/IP, the first milestone. But TCP/IP provides a graceful transition to the second milestone, the OSI protocol suite devised by the International Standards Organization (ISO).

While OSI often is written about as though it were already here, in fact it is not. Currently, government standards for the OSI protocol suite are experimental. They call for FTAM, X.400 and TP4 to provide feature-packed document creation, file transfer, administration and mailing over a reliable transport protocol.

But what about internetting? ISO solutions for better internet protocol, routing and gateway protocols, all of which are needed, appear far from completion. Also, there is no virtual terminal application to make every user appear (to a computer) to be using the same type of terminal or PC.

According to the current schedule, these OSI protocols will be experimental for about a year to give vendors and users time to try them out. Past experience would indicate that it will be three to five years before we see wide use of these standards.”

Heiden, Heidi B. “Defense networks strive for seamless connectivity.” Government Computer News 5 June 1987: 54+.




top