|
Our Recommended Security Profile
Because of the massive number of hackings and hijacking of personal computers and browsers,
Mind State Software developing has assembled a security profile.
After a lengthy review of the problems, we have developed a security profile for our
clients that seem to bring enormous relief to these problems.
Plan of Attack
In most cases, attacks have occurred from three different directions. First, many of
our clients are downloading images and emails that contain viruses. As everyone knows, the
types of attacks from these viruses seem to be changing by the month.
Another long existing problem
with all internet users has been the applications containing spy programs. This is simple
function to add to any application, which can detect whether the personal computer is currently
connected to the internet. If so, then the spy function setting on the personal computer can
broadcast messages containing application data to a host, which is another computer connected
to the internet. The two problems caused from spy functions is memory, CPU and internet access speeds
are all being utilized, and people are able to monitor your personal computing information.
As of the latest release
of Microsoft Operating Systems (98, 2000, XP home and XP Pro), hijacking of browsers and other
resident software is eating internet users alive.
Dial-up users have experienced the problems of hours downloading
updates and damaged the operating system because of telephone line disconnects. This
causes more frustration, loss of time and potently lots of money to repair the download damage.
Let Mind State download the security updates while we tune-up you’re PC.
Choose a Weapon!
1). Create a backup of the PC. Even if the backup is on the C: drive, it is still a
backup.
2). We recommend sealing off the perimeter by installing a firewall. Our favorite
product has been Sygate. They have both a personal version which can be downloaded for free and
a professional package for small and medium customers. Important: Make sure you receive and send
emails containing attachments successfully after the firewall is installed.
3). Get the latest security patches from Microsoft. These are release fixes, and many
are related to security, which means they change problem areas that hackers have been gaining
the most success. A word of caution, XP Service Pack 2 (SP2) release has been laden with its\
share of bugs. We are resolving complaints from customers because their printers and modems
suddenly no longer work, since they install SP2.
4). A reasonable spyware for most people will cut down impending hijacks. We have been
recommending Microsoft's Beta Spyware. It is free to download (at the moment), and it seems
to sufficiently clean up spy functions from most personal computers. For the tougher jobs,
we have used Spy Doctor and this product killed more robust hijacks.
5). Remove unnecessary spyware applications. In other words, if you have a spyware and
anti-virus product that your not sure if it has helped, then loose it. Go with a product
that works and save processing power. Two is not always better than one.
6). Load a decent anti-virus detection product. If you have one, great! Otherwise,
we have been suggesting that people use Symantic's Norton Anti-virus. A 90 day trial version
can be loaded for free.
7). Monitor the processor performance and background applications running during the
OS boot. Is their a processor hog that is killing the PC?
8). Review memory needs. Most of our clients have spent good money for the PC, but
because of memory requirements, they tend to believe their computer is not qualified to work
better. It's kind of like buying a superior automobile and driving it on minimal tire quality.
An application like cpu-z can quickly provide the cpu and memory specifications quickly.
9). Install Firefox internet browser. The look and feel is as simple as Microsoft's Internet Explorer. In our experience, the Firefox browser has suffered less hijacks.
|
|