No auntie Sookie, not earth worms, computer virus worms that can get to you computer and slowly dig deep into your files and eat them away. Put that eggnog down and I'll tell you some more about these new worms.
This worm is a self-replicating (makes a copy of itself, aunt sookie!) program that reproduces itself over a network. It can be hidden in an email attachment from an unknown sender, a movie download from a suspicious website, or an application sent from someone you don't know. Once on your computer it then can replace a single file, like a winsock.dll or many files and send copies of itself along with email or newsgroup messages that you can post.
The following are ways to keep these type of worms out of your network:
a) Never, I said never (for emphasis) connect an unpatched, non updated computer or other Internet related device to the Internet. How do you update and patch a computer without connecting to the Internet? Get a cd from Microsoft with the latest and greatest patches and updates, then connect the device and then check for updates while connected to make sure you have protection.
b) Always, I said always (yes I am being redundant) use a firewall between your network of computers and the Internet. Even if your network of computers is 1 or 2 computers, it is still a network and needs a firewall to protect it, really protect it. A single computer connected to the Internet is now part of a world wide network thru it's Internet connection and is therefore vulnerable without protection. Get a firewall, a real firewall.
c) Educate and train anyone who uses your computer(s) network. Many times an infection is invited by careless users who download infected email, visit infected sites, or bring infected machines (laptop's, pda's) into a network from outside.
d) Patch and update, patch and update, patch and update (redundant, oh yeah). Yes it's a pain, and it requires time to do and verify that it's actually patched and updated. However it's definitely simpler and cheaper than trying to fix an infestation, or explain to everyone why the network is down or their computers won't work because a worm is eating through everything they have worked hard to save and protect.
e) Make sure up-to-date anti-virus software is on every machine, everything connected to the Internet. Anti-virus packages aid in protection and detection against worms.
f) Establish security rules for your network and educate everyone who touches the network. They must be enforced, daily.
g) Frequently check your network for vulnerabilities. Visit vulnerability website's, take advantage of free scanning tools on the Internet to test your machines. New vulnerabilities and new exploits are released constantly, and you can't protect against what you have no idea what is coming your way.
********************************************************
Daviyd Peterson: 10-year consultant, instructor, trainer Helps african american homeschools bridge the digital divide by becoming computer homeschools. Free article on "Computer Homeschooling" and other related articles http://www.homeschoolwireless.com/ho meschoolwireless.htm
*************************************************************
![]() |
|
![]() |
|
![]() |
|
![]() |
It seems that nowadays cybercriminals prefer cash to fun. That... Read More
Spies, spyware, internet parasites are among what they are usually... Read More
Many of us have run into an annoying and time-consuming... Read More
Computer infections can be broken up into 4 main categories... Read More
Electronic Fraud and Identity Theft Human beings are pretty... Read More
Yes, I'm wearing my encryption hat again. Why you may... Read More
You've seen it in the news - 40 million credit... Read More
Phishing in its "classic" variant is relatively well-known. Actually, 43.4... Read More
What is a Firewall?The term "firewall" illustrates a system that... Read More
IPv6, IntroductionThe high rate at wich the internet continualy evolves... Read More
It's late. You've been scouring the web for that perfect... Read More
From: "Paypal Security" Subject: New Security Requirements Date: Tue, 26... Read More
1. Importance of a Virus Scanner: A Antivirus program can... Read More
A couple of years back, I paid my dues the... Read More
Geek SuperheroGeek Superhero watches your computer for changes, immediately notifying... Read More
Chris Simpson, head of Scotland Yard's computer crime unit was... Read More
As you know, this time the virus under the name... Read More
The E-Mail Identity Theft Scam is running Rampant. These E-Mail... Read More
As the number of people using the Internet as an... Read More
To blog or not to blog? Well, why not? Lots... Read More
Abstract Homogeneous symmetries and congestion control have garnered limited interest... Read More
What is computer security? Computer security is the process of... Read More
The words Corporate Security may conjure up images of a... Read More
Computer viruses infect millions of computers every day. Viruses can... Read More
When you signed up for that ultra-fast DSL or Cable... Read More
Spyware is the most troublesome software to appear on the... Read More
Do you know what "phishing" is?No, it doesn't mean you... Read More
According to the Anti-Phishing Working Group (APWG) email scams also... Read More
Internet is the ocean of knowledge. In this ocean you... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
As soon as almost all computer users already got used... Read More
The Threat10 years ago you could probably have run no... Read More
Ok, ok, I know you've seen them. All those pop... Read More
Have you ever got an email asking you to confirm... Read More
Imagine my surprise when I received a phone call from... Read More
High-tech private investigators are becoming the answer for many Internet... Read More
The 1998 Data Protection Act was not an extension to,... Read More
There you are busily typing away on your PC or... Read More
I'm in the Anti-Spyware business, and I'm doing a lot... Read More
It's been with us since 1993, it's gotten more intrusive,... Read More
In recent days, I was one of the unfortunate persons... Read More
When it comes to reporting Internet scams most of us... Read More
You've seen it in the news - 40 million credit... Read More
Glieder (Win32.Glieder.AK), Fantibag (Win32.Fantibag.A) and Mitglieder (Win32.Mitglieder.CT) are not names... Read More
Spyware/adware is a new major concern for PC users everywhere.... Read More
P C. owners are constantly at risk from attacks by... Read More
Can you protect your computer from all possible viruses and... Read More
When it comes to a secure website and passwords it... Read More
Have you ever bought a product or service from the... Read More
Beware of a New Scam Aimed at Bargain-HuntersTrying to buy... Read More
If you are a parent, as am I, I think... Read More
Viruses are, however, not the only malicious software programs out... Read More
Security leaks can be a big problem for any site... Read More
Do you sometimes notice your computer running slower. Is your... Read More
This is the second in a series of articles highlighting... Read More
Today's Internet or World Wide Web is being over regulated.But,... Read More
Identity theft is one of the most common criminal acts... Read More
They're out there. Individuals trying to make a quick buck... Read More
With the advent of the World Wide Web, a whole... Read More
There is no doubt that "how-to articles" have become a... Read More
"Dear Bank of the West customer", the message begins. I've... Read More
Huge number of spyware software applications are available in the... Read More
First, let's do a little recap'. As I stated in... Read More
Shopping for horse gifts or other gift items on the... Read More
Today the internet is a mine field of malicious code... Read More
Blaster, Welchia, Sobig, W32, Backdoor, Trojan, Melissa, Klez, Worm, Loveletter,... Read More
Internet Security |