540 likes | 820 Views
Right-click any drive icon in Explorer (under My Computer) and choose Properties. ... other portable devices. By design, laptop computers (and other portable computing devices, ...
E N D
Slide 1:XP, Spyware and CounterSpy
Do you know where your computer is when you are working?
Slide 2:Today we will cover
XP Finding my way around, Helpful hints and tips Spyware What is it, How do I get it Security New rules at UCOP Questions ????
Slide 3:What is XP?
Windows XP is the latest version of Microsoft's Windows desktop series of programs. It's the upgrade to the old consumer versions of Windows 95/ 98/Me as well as to the business, server, and power-user versions (Windows NT and 2000). Windows is an operating system (OS), a program that manages your entire computer system, That's including the screen, mouse, keyboard, drives, memory, and central processor (CPU). Windows also provides a graphical user interface, or GUI, which enables you to control your computer by using your mouse, icons, and windows. You can also use Windows keyboard commands. Windows XP is the latest version of Microsoft's Windows desktop series of programs. It's the upgrade to the old consumer versions of Windows 95/ 98/Me as well as to the business, server, and power-user versions (Windows NT and 2000). Windows is an operating system (OS), a program that manages your entire computer system, That's including the screen, mouse, keyboard, drives, memory, and central processor (CPU). Windows also provides a graphical user interface, or GUI, which enables you to control your computer by using your mouse, icons, and windows. You can also use Windows keyboard commands.
Slide 4:Computer
Hard Drive: Holds software and files. Average HD 10-80 Gigabytes Mouse and Keyboards: input communication devices Processor and motherboard: tells you how fast your computer can run. Average speed 1.5 Megahertz- 3.5 Gigahertz. Megabyte 1) When used to describe data storage, 1,048,576 (2 to the 20th power) bytes. Megabyte is frequently abbreviated as M or MB. (2) When used to describe data transfer rates, as in MBps, it refers to one million bytes. Gigabyte: 2 to the 30th power (1,073,741,824) bytes. One gigabyte is equal to 1,024 megabytes. Gigabyte is often abbreviated as G or GB. Monitor and speakers: output communication devices Memory: Holds all open applications, files and processes. Average memory runs from 128 Megabytes – 4 Gigabytes RAM ANR computers run: 3+ GB processors, 512 MB RAM, 80G HD R2
Slide 6:XP What is the Desktop?
The Windows OS uses your screen as a desktop, a work area on which you see your programs. The desktop, contain windows, icons, and the taskbar. Think of the windows, Web pages, and icons that appear on your screen as "sitting" on your desktop, like all the papers, folders and notebooks on your real desktop.
Slide 7:XP What is an Icon?
An icon is a little picture button on your screen. If you double-click the icon, or select the icon using your keyboard and hit ENTER, something happens. Windows uses icons to represent programs, files, and commands. The icons on your desktop that have a curved arrow in a little white box in the lower-left corner of the icon are called shortcuts and represent files or programs on your computer. You may create your own shortcut icons for your programs and files. Show how to make an shortcutShow how to make an shortcut
Slide 8:XP What is the Taskbar?
The taskbar is a row of buttons and icons that usually appears along the bottom of the screen that looks like a bar (you can more it around). You can configure Windows to display the taskbar along the top or side of your screen or the sides. You can also tell Windows to hide the taskbar when you aren't using it.
Slide 9:XP The Several Parts of the Taskbar!
The Start button is usually at the left end of the taskbar. The quick launch, useful for applications you use a lot. One click, instead of two. The task buttons represent each window that is open on the desktop. The notification area contains icons for Windows programs that require your attention, next to the clock. This area used to be called the system tray.
Slide 10:XP What is the Task Buttons?
Task buttons are the buttons on the taskbar that represent each program that is running. If a program displays more than one window, more than one task button may appear. Each task button displays the icon for the program and as much of the program name as can fit. You need to click the window's task button to select that window, that is, how to make the window active. You may also right-click a button to see the system menu, a menu of commands you can give regarding that window, including opening and closing the window. When taskbar gets too full to fit all the task buttons for all the open windows, Windows will groups the buttons together, with one button for each application. The new Windows XP now features locking toolbars, and you can adjust them. You may customize a lot of the Windows XP features such as the Taskbar, Start Menu, and even toolbar icons in Internet Explorer and Outlook Express. Remember your right-click: * Right-click on a toolbar, and then click Lock the Toolbars to remove the check mark. * Right-click on the toolbar again, and then click Customize. You may add or remove toolbar buttons, change text options and icon options. When you've got the toolbar customized, click Close. Now right-click on the toolbar and then click Lock the Toolbars to lock them in place. Hide and unhide icons, enlarge or hide taskbar The new Windows XP now features locking toolbars, and you can adjust them. You may customize a lot of the Windows XP features such as the Taskbar, Start Menu, and even toolbar icons in Internet Explorer and Outlook Express. Remember your right-click: * Right-click on a toolbar, and then click Lock the Toolbars to remove the check mark. * Right-click on the toolbar again, and then click Customize. You may add or remove toolbar buttons, change text options and icon options. When you've got the toolbar customized, click Close. Now right-click on the toolbar and then click Lock the Toolbars to lock them in place. Hide and unhide icons, enlarge or hide taskbar
Slide 11:XP What is the Notification Area?
The notification area appears at the right end of the taskbar and contains the system clock along with a group of tiny icons in it. If you move the mouse pointer to the clock, after a moment the current date also appears.. If you want to find out the name of an icon, you need to move the mouse pointer to the icon, without clicking. You can exit the program or change the settings for that program. You need to right-click or double-click on the icon and then choose the command from the menu that appears. R3 Some Windows programs add icons to the notification areaSome Windows programs add icons to the notification area
Slide 12:XP What Is the Start Menu?
You can also display the Start menu by pressing the WINDOWS key or by pressing CTRL-ESC keys. The Start menu lists most of the programs that you can run on your computer. Windows adds commands for your frequently used programs to the Start menu, as you use your computer. You can right click on an icon, and pin to start menu Show how to pin, delete different parts of the start menuShow how to pin, delete different parts of the start menu
Slide 13:XP What is the Properties?
All object in Windows that's hardware components of your computer, software programs, files, and icons all have "properties", the settings that affect how all object works on your computer. To display the properties, you need to right-click the item and choose Properties from the menu that appears. Tabs - If the object has too many properties to fit in a dialog box, you will see tabs run along the top of the dialog box. You can click a tab to see the settings on that tab. You may change some of the settings, depending on the type of object. R4 Example, to see the properties of the Windows desktop, right-click the desktop in a place where it is not covered by icons or windows. You see the Display Properties dialog box. When you have finished looking at the properties shown and possibly changing some of the properties that can be changed, click OK to save your changes or Cancel to cancel them, and exit the Properties dialog box. Go through different styles, colors, themes, etc. Talk about this slide, about security, where to lock it, so that when you walk away no one can get on. Example, to see the properties of the Windows desktop, right-click the desktop in a place where it is not covered by icons or windows. You see the Display Properties dialog box. When you have finished looking at the properties shown and possibly changing some of the properties that can be changed, click OK to save your changes or Cancel to cancel them, and exit the Properties dialog box. Go through different styles, colors, themes, etc. Talk about this slide, about security, where to lock it, so that when you walk away no one can get on.
Slide 14:XP Hint of the Day
Big Borders: Make window borders easier to grab: Have you ever struggled to position your mouse over a window border juuuust right in an attempt to resize the window? To make resizing easier, right-click the desktop, choose Properties, and click the Appearance tab. (In XP, click the Advanced button.) From the Item drop-down list, choose Active Window Border and increase the value under Size.
Slide 15:XP What is the Control Panel?
Windows, and all of the software you have installed on you computer. All of these programs will help you see and also change the properties of many of the parts of Windows system. To take a look at the Control Panel, you need to click on Start > Control Panel. Windows XP comes with a newly redesigned window with categories of tasks, Windows now calls this a Category View. If you click on a category in the Control Panel, Windows will displays a list of tasks in that category. If you Prefer to used to the "Classic" Windows 98, Me, Control Panel icons, click on the Switch To Classic View option. You will see most of the same old Control Panel icons that had appeared in earlier versions of Windows. You need to double-click on them to run them. All of these icons also appear in the Category View, below the tasks. Windows XP comes with a newly redesigned window with categories of tasks, Windows now calls this a Category View. If you click on a category in the Control Panel, Windows will displays a list of tasks in that category. If you Prefer to used to the "Classic" Windows 98, Me, Control Panel icons, click on the Switch To Classic View option. You will see most of the same old Control Panel icons that had appeared in earlier versions of Windows. You need to double-click on them to run them. All of these icons also appear in the Category View, below the tasks.
Slide 16:XP Using The Mouse Basics
A mouse is a device that you use to manipulate objects in Windows. As you move the mouse on it's pad, the mouse pointer on-screen moves in tandem. The mouse pointer, or simply the pointer is the small symbol (such as a arrow) that moves on the screen when you move your mouse. The other indicator, is the cursor or I-beam, which will usually appears as a blinking vertical line, it will shows when you type in text. ?? When you right-click an object, Windows and many applications display a menu called a context menu, which lists commands that pertain to that object.
Slide 17:XP Scroll Right Through
Master basic moves: With many programs, clicking the wheel once puts you into a panning mode. To start the document window panning upward or downward, nudge the mouse in that direction; continue panning until you either nudge the mouse in the other direction or click one of its buttons. Note that some programs require you to keep the middle button pressed continuously to get this effect. These functions may vary depending on your mouse manufacturer and on the driver you use. Customize increments: If your wheel makes your screen jump too far with each click, or if you have to twirl constantly to scroll the desired amount, try adjusting the wheel's sensitivity. Go to start menu, control panels, Mouse and then click on the tab that says Wheel Click the Wheel tab (it may also be labeled Scrolling or some similar term), and use the controls listed there to adjust how many lines (or how fast) your pages scroll with each wheel click. R6 Most mice have a wheel control between the left and right buttons. The wheel makes scrolling through documents a breeze, but that's just the start of its talents. Follow these steps to wheel yourself around Windows in style. Master basic moves: You probably already know that your mouse wheel doubles as a clickable button in addition to moving the open file up and down in the active window. But with many programs, clicking the wheel once puts you into a panning mode. To start the document window panning upward or downward, nudge the mouse in that direction; continue panning until you either nudge the mouse in the other direction or click one of its buttons. In some applications (such as Notepad with the Word Wrap feature turned off), this technique pans right or left. Note that some programs require you to keep the middle button pressed continuously to get this effect. These functions may vary depending on your mouse manufacturer and on the driver you use. Still, if you're not getting these extras, it doesn't hurt to visit the Web site of your mouse vendor to make certain that your system has the latest mouse software and drivers. Customize increments: If your wheel makes your screen jump too far with each click, or if you have to twirl constantly to scroll the desired amount, try adjusting the wheel's sensitivity. In the Address bar of any Windows Explorer window, type Control Panel\Mouse and press Enter. Click the Wheel tab (it may also be labeled Scrolling or some similar term), and use the controls listed there to adjust how many lines (or how fast) your pages scroll with each wheel click (see FIGURE 1). If you use Mozilla as your Web browser, you can make it scroll one screen at a time while all other apps continue to scroll at a chosen number of lines per click. First, set the number of lines for most applications in the Mouse Properties dialog box, as shown earlier. Then launch Mozilla and choose Edit, Preferences. Double-click Advanced (or click the + sign next to that entry), and choose Mouse Wheel. On the 'No modifier key' tab, select Scroll a page up or a page down (see FIGURE 2). Most mice have a wheel control between the left and right buttons. The wheel makes scrolling through documents a breeze, but that's just the start of its talents. Follow these steps to wheel yourself around Windows in style. Master basic moves: You probably already know that your mouse wheel doubles as a clickable button in addition to moving the open file up and down in the active window. But with many programs, clicking the wheel once puts you into a panning mode. To start the document window panning upward or downward, nudge the mouse in that direction; continue panning until you either nudge the mouse in the other direction or click one of its buttons. In some applications (such as Notepad with the Word Wrap feature turned off), this technique pans right or left. Note that some programs require you to keep the middle button pressed continuously to get this effect. These functions may vary depending on your mouse manufacturer and on the driver you use. Still, if you're not getting these extras, it doesn't hurt to visit the Web site of your mouse vendor to make certain that your system has the latest mouse software and drivers. Customize increments: If your wheel makes your screen jump too far with each click, or if you have to twirl constantly to scroll the desired amount, try adjusting the wheel's sensitivity. In the Address bar of any Windows Explorer window, type Control Panel\Mouse and press Enter. Click the Wheel tab (it may also be labeled Scrolling or some similar term), and use the controls listed there to adjust how many lines (or how fast) your pages scroll with each wheel click (see FIGURE 1). If you use Mozilla as your Web browser, you can make it scroll one screen at a time while all other apps continue to scroll at a chosen number of lines per click. First, set the number of lines for most applications in the Mouse Properties dialog box, as shown earlier. Then launch Mozilla and choose Edit, Preferences. Double-click Advanced (or click the + sign next to that entry), and choose Mouse Wheel. On the 'No modifier key' tab, select Scroll a page up or a page down (see FIGURE 2). Most mice have a wheel control between the left and right buttons. The wheel makes scrolling through documents a breeze, but that's just the start of its talents. Follow these steps to wheel yourself around Windows in style. Master basic moves: You probably already know that your mouse wheel doubles as a clickable button in addition to moving the open file up and down in the active window. But with many programs, clicking the wheel once puts you into a panning mode. To start the document window panning upward or downward, nudge the mouse in that direction; continue panning until you either nudge the mouse in the other direction or click one of its buttons. In some applications (such as Notepad with the Word Wrap feature turned off), this technique pans right or left. Note that some programs require you to keep the middle button pressed continuously to get this effect. These functions may vary depending on your mouse manufacturer and on the driver you use. Still, if you're not getting these extras, it doesn't hurt to visit the Web site of your mouse vendor to make certain that your system has the latest mouse software and drivers. Customize increments: If your wheel makes your screen jump too far with each click, or if you have to twirl constantly to scroll the desired amount, try adjusting the wheel's sensitivity. In the Address bar of any Windows Explorer window, type Control Panel\Mouse and press Enter. Click the Wheel tab (it may also be labeled Scrolling or some similar term), and use the controls listed there to adjust how many lines (or how fast) your pages scroll with each wheel click (see FIGURE 1). If you use Mozilla as your Web browser, you can make it scroll one screen at a time while all other apps continue to scroll at a chosen number of lines per click. First, set the number of lines for most applications in the Mouse Properties dialog box, as shown earlier. Then launch Mozilla and choose Edit, Preferences. Double-click Advanced (or click the + sign next to that entry), and choose Mouse Wheel. On the 'No modifier key' tab, select Scroll a page up or a page down (see FIGURE 2). Most mice have a wheel control between the left and right buttons. The wheel makes scrolling through documents a breeze, but that's just the start of its talents. Follow these steps to wheel yourself around Windows in style. Master basic moves: You probably already know that your mouse wheel doubles as a clickable button in addition to moving the open file up and down in the active window. But with many programs, clicking the wheel once puts you into a panning mode. To start the document window panning upward or downward, nudge the mouse in that direction; continue panning until you either nudge the mouse in the other direction or click one of its buttons. In some applications (such as Notepad with the Word Wrap feature turned off), this technique pans right or left. Note that some programs require you to keep the middle button pressed continuously to get this effect. These functions may vary depending on your mouse manufacturer and on the driver you use. Still, if you're not getting these extras, it doesn't hurt to visit the Web site of your mouse vendor to make certain that your system has the latest mouse software and drivers. Customize increments: If your wheel makes your screen jump too far with each click, or if you have to twirl constantly to scroll the desired amount, try adjusting the wheel's sensitivity. In the Address bar of any Windows Explorer window, type Control Panel\Mouse and press Enter. Click the Wheel tab (it may also be labeled Scrolling or some similar term), and use the controls listed there to adjust how many lines (or how fast) your pages scroll with each wheel click (see FIGURE 1). If you use Mozilla as your Web browser, you can make it scroll one screen at a time while all other apps continue to scroll at a chosen number of lines per click. First, set the number of lines for most applications in the Mouse Properties dialog box, as shown earlier. Then launch Mozilla and choose Edit, Preferences. Double-click Advanced (or click the + sign next to that entry), and choose Mouse Wheel. On the 'No modifier key' tab, select Scroll a page up or a page down (see FIGURE 2).
Slide 18:XP More Scrolling Tips
Zoom in: Many browsers and other applications give you advanced features with your wheel. For example, in Internet Explorer, hold Ctrl and rotate the mouse wheel forward or backward to decrease or increase the size of text in Web pages. If this doesn't work in your copy of IE, choose Tools, Internet Options and click Accessibility on the General tab. Check Ignore font sizes specified on Web pages and click OK twice. To get this effect in Mozilla, choose Edit, Preferences, double-click Advanced (or click the + sign next to it), and then click Mouse Wheel. Select the tab for the key (Alt, Control, Shift) that you want to hold down when adjusting text size, and then click Make the text larger or smaller. Click OK. This trick works even better in recent versions of applications like Microsoft Word, Adobe InDesign CS, and the Opera browser. In these apps, <Ctrl>-wheeling enlarges or reduces the magnification level of your entire page (including graphics) rather than just adjusting the text display size. Go back to a previous page or forward: in Internet Explorer, hold the shift key and rotate the mouse wheel forward or backwards. R6 Zoom in: Many browsers and other applications give you advanced features with your wheel. For example, in Internet Explorer, hold Ctrl and rotate the mouse wheel forward or backward to decrease or increase the size of text in Web pages. If this doesn't work in your copy of IE, choose Tools, Internet Options and click Accessibility on the General tab. Check Ignore font sizes specified on Web pages and click OK twice. To get this effect in Mozilla, choose Edit, Preferences, double-click Advanced (or click the + sign next to it), and then click Mouse Wheel. Select the tab for the key (Alt, Control, Shift, or No modifier key) that you want to hold down when adjusting text size, and then click Make the text larger or smaller. Click OK. This trick works even better in recent versions of applications like Microsoft Word, Adobe InDesign CS, and the Opera browser (free to try, $39 to keep). In these apps, <Ctrl>-wheeling enlarges or reduces the magnification level of your entire page (including graphics) rather than just adjusting the text display size (sweet!). InDesign zooms in on the area under your pointer, letting you magnify a specific spot just by pointing and wheeling. And Opera lets you return your Web page to its default '100%' view by Ctrl-clicking the wheel once. Go back to a previous page or forward: in Internet Explorer, hold the shift key and rotate the mouse wheel forward or backwards Zoom in: Many browsers and other applications give you advanced features with your wheel. For example, in Internet Explorer, hold Ctrl and rotate the mouse wheel forward or backward to decrease or increase the size of text in Web pages. If this doesn't work in your copy of IE, choose Tools, Internet Options and click Accessibility on the General tab. Check Ignore font sizes specified on Web pages and click OK twice. To get this effect in Mozilla, choose Edit, Preferences, double-click Advanced (or click the + sign next to it), and then click Mouse Wheel. Select the tab for the key (Alt, Control, Shift, or No modifier key) that you want to hold down when adjusting text size, and then click Make the text larger or smaller. Click OK. This trick works even better in recent versions of applications like Microsoft Word, Adobe InDesign CS, and the Opera browser (free to try, $39 to keep). In these apps, <Ctrl>-wheeling enlarges or reduces the magnification level of your entire page (including graphics) rather than just adjusting the text display size (sweet!). InDesign zooms in on the area under your pointer, letting you magnify a specific spot just by pointing and wheeling. And Opera lets you return your Web page to its default '100%' view by Ctrl-clicking the wheel once. Go back to a previous page or forward: in Internet Explorer, hold the shift key and rotate the mouse wheel forward or backwards
Slide 19:XP
Copy your error messages: When Windows tells you something's gone haywire, you may want to preserve the error messages to send to a support tech or your local PC guru. To do so, just press Ctrl-C to copy the message to your Clipboard, open a new e-mail to your tech helper, press Ctrl-V to paste the error alert text, and then send the message on its way. Get the big error picture: If you can't copy just the error message's text as described above, press Alt-Print Screen (the name of the latter key may be abbreviated on your keyboard) to capture an image of the error message box. Paste the image into your Eudora or into your Word. R5
Slide 20:XP How to Empty the Recycle Bin
How to empty your Recycle Bin. When you delete old files this serves two purposes: it clears useless files away so you don't confuse them with useful files, and it reclaims the disk space they occupy. The first purpose is served by deleting a file--once it's in the Recycle Bin, you aren't going to open it or work on it by mistake. But all files in the Recycle Bin still takes up hard drive space:The space isn't reclaimed until the Windows Recycle Bin is emptied. How to empty the Recycle your Bin; Right-click the Recycle Bin icon on the desktop. Choose Empty Recycle Bin from the shortcut menu. A dialog box asks you to confirm your choice. then Click Yes. To purge selected files or folders from the Recycle Bin without completely emptying it, Open the Recycle Bin folder and Delete the files in the usual way. Objects deleted from an ordinary folder on a hard drive are sent to the Recycle Bin, but objects deleted from the Recycle Bin are really deleted.
Slide 21:XP Exploring Windows
Slide 22:XP Exploring Windows
Slide 23:XP Exploring Windows
Slide 24:XP Exploring Windows
Slide 25:XP Exploring Windows
Slide 26:XP Exploring Windows
Slide 27:XP Exploring Windows
Bring back the tree: You open a folder, but there's no directory tree on the left. What to do? Just click the Folders icon on or choose View, Explorer Bar, Folders
Slide 28:XP Exploring Windows
Customize Details, part 1: To change the order of the Name, Size, Type, Date Modified, and other columns in the default Details view (click View, Details), just put your pointer over a column head and drag right or left. Customize Details, part 2: Why settle for the default Details columns? Right-click any heading and choose an item with no check mark to add that information, or uncheck to remove it. Choose More on the right-click menu (or View, Choose Columns or View, Choose Details on the main menu) to make these changes via a dialog box. Get the big picture: Whenever you need to see more of a folder or Internet Explorer browser window, simply press F11 to view the window in full-screen mode. Then press F11 again to revert to normal view. Bonus tip: you can add a button to toggle between modes by right-clicking the Standard toolbar and choosing Customize. Click Full Screen under 'Available toolbar buttons', and then choose Add and Close. Make all windows disappear and just have your desktop showing Windows Key (between ctrl and alt.) and M or D.
Slide 29:XP My computer- What is a drive
A Drive- Floppy Drive C Drive – Your computer drive/file cabinet. Only backup is Eudora, bookmarks, My Documents folder: Word, PDF, Excel, etc. .. . Not pictures or music. D Drive- An extra Hard Drive/Partition E Drive- Your CD drive G Drive- Removable drives, ie: zip drives, flash memory. H Drive Home this is a directory that is backed up but only you have access. O Drive Public Drive – Backed up and everyone has access S Drive- Backed up and only you and your dept. has access. Good way to share files. Z Drive is the backup drive R4 It cost about 2,000 a year to backup, that is the price of a backup server, the software to back up and the media to backthings up. How much do we back up as a dept. Show flash memory and how easy it is to work. Floppy hold 1.4 MG, zips 64, 128 megabytes to Gigabytes, flash memory or sticks anywhere from 32-2 gigabytes (Iomega)It cost about 2,000 a year to backup, that is the price of a backup server, the software to back up and the media to backthings up. How much do we back up as a dept. Show flash memory and how easy it is to work. Floppy hold 1.4 MG, zips 64, 128 megabytes to Gigabytes, flash memory or sticks anywhere from 32-2 gigabytes (Iomega)
Slide 30:XP Exploring Windows Search
Go to the Start/Find/Files or Go to a folders, Rt.click “search folder” or Cool shortcut: Windows key and F. Under the Name and Location tab leave the "Name" and the "Containing text" fields blank. Set the "Look in" field to "Local Hard Drives" or "C:". The "Include Subfolders" box should be checked. Click the Date tab. Set the "Find All Files" field to "Last Accessed". Then set the how far back you want to check for files accessed. Click the Find now button. A list of files will appear. Try this technique again with the "Find All Files field set to "Modified".
Slide 31:XP Searching for Files
Want to change character or get rid of him. Balloons bugs you, or you want them……
Slide 32:XP Hint of the Day
Get a new disk view: Wondering how full your disk is getting, or how to clean it up? Right-click any drive icon in Explorer (under My Computer) and choose Properties. You'll see a pie-chart representation of your disk use, a button that launches the Disk Cleanup utility, and a Tools tab that lists other maintenance utilities.
Slide 33:XP Another Hint of the DayType Tip
Character-ize: If your documents need the occasional special typographic character, choose Start, All programs Accessories, System Tools, Character Map, or just press Windows-R, type charmap, and press Enter. (If you don't have the character map installed, ask to have it added.) Set your font, double-click the character you need, click the Copy button, and paste the character into the desired document. In Windows 2000 and XP, you can also drag and drop from the character map's 'Characters to copy' box to WordPad and several other applications. R5
Slide 34:XP-Security
Vocabularies words: Firewalls Virus Spyware adware Drive bys and Hijackings Popups Cookies Pfishing Firewalls have long been a fixture at large companies, which must secure their networks against determined attackers. But the dangerous surge in e-mail- and Web-borne threats--including viruses, worms, hijacks, and increasingly aggressive spyware--means that home PCs require this protection as well. Don't believe me? Consider this. According to the Internet Storm Center, a typical unprotected PC will come under attack within 20 minutes of being connected to the Internet. That is not a misprint. In less time than it takes most people to shower and get dressed in the morning, your PC will probably attract some form of unwelcome advance. Johannes Ullrich, chief technology officer at the Internet Storm Center, says the situation is so bad that a newly connected PC won't have time to download all the Windows patches needed to make it secure before malicious software has found and infected it. The time to attack is even shorter for PCs on high-speed university networks and cable or DSL services. Hackers specifically target these addresses--much the way car thieves target Honda Accords--for their high bandwidth and always-on nature. It's a digital catch-22. The better your connection, the bigger your risk. Firewalls have long been a fixture at large companies, which must secure their networks against determined attackers. But the dangerous surge in e-mail- and Web-borne threats--including viruses, worms, hijacks, and increasingly aggressive spyware--means that home PCs require this protection as well. Don't believe me? Consider this. According to the Internet Storm Center, a typical unprotected PC will come under attack within 20 minutes of being connected to the Internet. That is not a misprint. In less time than it takes most people to shower and get dressed in the morning, your PC will probably attract some form of unwelcome advance. Johannes Ullrich, chief technology officer at the Internet Storm Center, says the situation is so bad that a newly connected PC won't have time to download all the Windows patches needed to make it secure before malicious software has found and infected it. The time to attack is even shorter for PCs on high-speed university networks and cable or DSL services. Hackers specifically target these addresses--much the way car thieves target Honda Accords--for their high bandwidth and always-on nature. It's a digital catch-22. The better your connection, the bigger your risk.
Slide 35:Security
Firewalls actually come in two distinct flavors: software applications that run in the background, and hardware devices that plug in between your modem and one or more PCs. While software applications can be less expensive--Microsoft has improved the firewall software in Windows XP Service Pack 2, and both ZoneAlarm and Sygate Personal Firewall are free for download--a hardware firewall usually does a better job for broadband users. At UCOP and with XP we have software firewalls on individual machines, which you will see it always warns you that you are downloading something that could be potentially dangerous. Our servers have ZoneAlarm, which we get on an average 130 hits a day, trying to break in. At UCOP and with XP we have software firewalls on individual machines, which you will see it always warns you that you are downloading something that could be potentially dangerous. Our servers have ZoneAlarm, which we get on an average 130 hits a day, trying to break in.
Slide 36:Security
If you're networked, you probably haven't bought a separate hardware firewall box. Rather, your wireless access point or network router that links multiple PCs can have firewall capability conveniently included. The $85 Netgear WGT624 108Mbps Wireless Firewall Router is a high-speed 802.11g Wi-Fi access point, router, and firewall that offers excellent protection against and tracking of external threats. Similar Wi-Fi products include the $85 D-Link DI-624 and the $70 to $80 Linksys WRT54G. In the wired arena, firewall-capable routers include the Netgear FVS318NA VPN Firewall router with eight-port switch, about $100, and the Linksys BEFSX41 Instant Broadband EtherFast Cable/DSL Firewall Router, about $70, which provides four ethernet ports.
Slide 37:Security What They Do, What They Don't
Don't make the mistake of buying a firewall and thinking your security problems are solved. Firewalls may be great at stopping unwanted intrusions, but they often do little or nothing to detect virus-laden e-mails or stop intrusive adware and spyware. You'll want separate antivirus and spyware checkers to stymie these threats. What's more, hardware firewalls usually won't manage outbound traffic, which means a piece of spyware can freely send data from your PC to a server on the Internet.
Slide 38:Virus
A virus that replicates itself by resending itself as an e-mail attachment or as part of a network message is known as a worm. Generally, there are three main classes of viruses: File infectors. System or boot-record infectors. Macro viruses. From time to time, you may get an e-mail message warning of a new virus. Unless the warning is from a source you recognize, chances are good that the warning is a virus hoax. The computer virus, of course, gets its name from the biological virus. The word itself comes from a Latin word meaning slimy liquid or poison. n computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are benign or playful in intent and effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your hard disk to require reformatting. A virus that replicates itself by resending itself as an e-mail attachment or as part of a network message is known as a worm. Generally, there are three main classes of viruses: File infectors. Some file infector viruses attach themselves to program files, usually selected .COM or .EXE files. Some can infect any program for which execution is requested, including .SYS, .OVL, .PRG, and .MNU files. When the program is loaded, the virus is loaded as well. Other file infector viruses arrive as wholly-contained programs or scripts sent as an attachment to an e-mail note. System or boot-record infectors. These viruses infect executable code found in certain system areas on a disk. They attach to the DOS boot sector on diskettes or the Master Boot Record on hard disks. A typical scenario (familiar to the author) is to receive a diskette from an innocent source that contains a boot disk virus. When your operating system is running, files on the diskette can be read without triggering the boot disk virus. However, if you leave the diskette in the drive, and then turn the computer off or reload the operating system, the computer will look first in your A drive, find the diskette with its boot disk virus, load it, and make it temporarily impossible to use your hard disk. (Allow several days for recovery.) This is why you should make sure you have a bootable floppy. Macro viruses. These are among the most common viruses, and they tend to do the least damage. Macro viruses infect your Microsoft Word application and typically insert unwanted words or phrases. The best protection against a virus is to know the origin of each program or file you load into your computer or open from your e-mail program. Since this is difficult, you can buy anti-virus software that can screen e-mail attachments and also check all of your files periodically and remove any viruses that are found. From time to time, you may get an e-mail message warning of a new virus. Unless the warning is from a source you recognize, chances are good that the warning is a virus hoax. The computer virus, of course, gets its name from the biological virus. The word itself comes from a Latin word meaning slimy liquid or poison. n computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Viruses can be transmitted as attachments to an e-mail note or in a downloaded file, or be present on a diskette or CD. The immediate source of the e-mail note, downloaded file, or diskette you've received is usually unaware that it contains a virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are benign or playful in intent and effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your hard disk to require reformatting. A virus that replicates itself by resending itself as an e-mail attachment or as part of a network message is known as a worm. Generally, there are three main classes of viruses: File infectors. Some file infector viruses attach themselves to program files, usually selected .COM or .EXE files. Some can infect any program for which execution is requested, including .SYS, .OVL, .PRG, and .MNU files. When the program is loaded, the virus is loaded as well. Other file infector viruses arrive as wholly-contained programs or scripts sent as an attachment to an e-mail note. System or boot-record infectors. These viruses infect executable code found in certain system areas on a disk. They attach to the DOS boot sector on diskettes or the Master Boot Record on hard disks. A typical scenario (familiar to the author) is to receive a diskette from an innocent source that contains a boot disk virus. When your operating system is running, files on the diskette can be read without triggering the boot disk virus. However, if you leave the diskette in the drive, and then turn the computer off or reload the operating system, the computer will look first in your A drive, find the diskette with its boot disk virus, load it, and make it temporarily impossible to use your hard disk. (Allow several days for recovery.) This is why you should make sure you have a bootable floppy. Macro viruses. These are among the most common viruses, and they tend to do the least damage. Macro viruses infect your Microsoft Word application and typically insert unwanted words or phrases. The best protection against a virus is to know the origin of each program or file you load into your computer or open from your e-mail program. Since this is difficult, you can buy anti-virus software that can screen e-mail attachments and also check all of your files periodically and remove any viruses that are found. From time to time, you may get an e-mail message warning of a new virus. Unless the warning is from a source you recognize, chances are good that the warning is a virus hoax. The computer virus, of course, gets its name from the biological virus. The word itself comes from a Latin word meaning slimy liquid or poison.
Slide 39:Spyware
Spyware is any technology that aids in gathering information about a person or organization without their knowledge. Spyware can get in a computer as a software virus or as the result of installing a new program. Spyware is often installed without the user's consent, as a drive-by download, pop-up window. adware, The cookie is a well-known mechanism for storing information about an Internet user on their own computer. However, the existence of cookies and their use is generally not concealed from users, who can also disallow access to cookie information. Nevertheless, to the extent that a Web site stores information about you in a cookie that you don't know about, the cookie mechanism could be considered a form of spyware. Spyware is part of an overall public concern about privacy on the Internet. Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program. Data collecting programs that are installed with the user's knowledge are not, properly speaking, spyware, if the user fully understands what data is being collected and with whom it is being shared. However, spyware is often installed without the user's consent, as a drive-by download, or as the result of clicking some option in a deceptive pop-up window. adware, software designed to serve advertising, can usually be thought of as spyware as well because it almost invariably includes components for tracking and reporting user information. The cookie is a well-known mechanism for storing information about an Internet user on their own computer. However, the existence of cookies and their use is generally not concealed from users, who can also disallow access to cookie information. Nevertheless, to the extent that a Web site stores information about you in a cookie that you don't know about, the cookie mechanism could be considered a form of spyware. Spyware is part of an overall public concern about privacy on the Internet. Spyware is any technology that aids in gathering information about a person or organization without their knowledge. On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program. Data collecting programs that are installed with the user's knowledge are not, properly speaking, spyware, if the user fully understands what data is being collected and with whom it is being shared. However, spyware is often installed without the user's consent, as a drive-by download, or as the result of clicking some option in a deceptive pop-up window. adware, software designed to serve advertising, can usually be thought of as spyware as well because it almost invariably includes components for tracking and reporting user information. The cookie is a well-known mechanism for storing information about an Internet user on their own computer. However, the existence of cookies and their use is generally not concealed from users, who can also disallow access to cookie information. Nevertheless, to the extent that a Web site stores information about you in a cookie that you don't know about, the cookie mechanism could be considered a form of spyware. Spyware is part of an overall public concern about privacy on the Internet.
Slide 40:adware
Generically, adware (spelled all lower case) is any software application in which advertising banners are displayed while the program is running. Spyware is any software (that) employs a user's Internet connection in the background (the so-called 'backchannel') without their knowledge or explicit permission. CounterSpy is an applications like Norton (anti virus) what we are using to help with this ever growing problem. You may see it’s dialog box, in the lower left hand corner of your computer telling you that you are not allowed or something is blocked. That is helping your computer stay safe. A side note: AdWare is also a registered trademark that belongs to AdWare Systems, Inc. AdWare Systems builds accounting and media buying systems for the advertising industry and has no connection to pop-up advertising, spyware, or other invasive forms of online advertising. 1) Generically, adware (spelled all lower case) is any software application in which advertising banners are displayed while the program is running. The authors of these applications include additional code that delivers the ads, which can be viewed through pop-up windows or through a bar that appears on a computer screen. The justification for adware is that it helps recover programming development cost and helps to hold down the cost for the user. Adware has been criticized because it usually includes code that tracks a user's personal information and passes it on to third parties, without the user's authorization or knowledge. This practice has been dubbed spyware and has prompted an outcry from computer security and privacy advocates, including the Electronic Privacy Information Center. Noted privacy software expert Steve Gibson of Gibson Research explains: "Spyware is any software (that) employs a user's Internet connection in the background (the so-called 'backchannel') without their knowledge or explicit permission. Silent background use of an Internet 'backchannel' connection must be preceded by a complete and truthful disclosure of proposed backchannel usage, followed by the receipt of explicit, informed consent for such use. Any software communicating across the Internet absent of these elements is guilty of information theft and is properly and rightfully termed: Spyware." A number of software applications, including Ad-Aware and OptOut (by Gibson's company), are available as freeware to help computer users search for and remove suspected spyware programs. 2) AdWare is also a registered trademark that belongs to AdWare Systems, Inc. AdWare Systems builds accounting and media buying systems for the advertising industry and has no connection to pop-up advertising, spyware, or other invasive forms of online advertising. 1) Generically, adware (spelled all lower case) is any software application in which advertising banners are displayed while the program is running. The authors of these applications include additional code that delivers the ads, which can be viewed through pop-up windows or through a bar that appears on a computer screen. The justification for adware is that it helps recover programming development cost and helps to hold down the cost for the user. Adware has been criticized because it usually includes code that tracks a user's personal information and passes it on to third parties, without the user's authorization or knowledge. This practice has been dubbed spyware and has prompted an outcry from computer security and privacy advocates, including the Electronic Privacy Information Center. Noted privacy software expert Steve Gibson of Gibson Research explains: "Spyware is any software (that) employs a user's Internet connection in the background (the so-called 'backchannel') without their knowledge or explicit permission. Silent background use of an Internet 'backchannel' connection must be preceded by a complete and truthful disclosure of proposed backchannel usage, followed by the receipt of explicit, informed consent for such use. Any software communicating across the Internet absent of these elements is guilty of information theft and is properly and rightfully termed: Spyware." A number of software applications, including Ad-Aware and OptOut (by Gibson's company), are available as freeware to help computer users search for and remove suspected spyware programs. 2) AdWare is also a registered trademark that belongs to AdWare Systems, Inc. AdWare Systems builds accounting and media buying systems for the advertising industry and has no connection to pop-up advertising, spyware, or other invasive forms of online advertising.
Slide 41: Drive by Downloads
it can be initiated by simply visiting a Web site or viewing an HTML e-mail message. Frequently, a drive-by download is installed along with another application. For example, a file sharing program might include downloads for a spyware program that tracks and reports user information for targeted marketing purposes, and an adware program that generates pop-up advertisements using that information. it may be possible for drive-by downloads to occur without any action on your part. Xupiter, an Internet Explorer toolbar program, is frequently installed as a drive-by download. The program is said to replace the user's home page, change browser settings, and use redirection to take all searches to the Xupiter Web site. In some versions, the program initiates drive-by downloads of other programs. Furthermore, although it comes with an uninstall utility, Xupiter is said to be next to impossible for the average computer user to remove. Drive-by download is a program that is automatically downloaded to your computer, often without your consent or even your knowledge. Unlike a pop-up download, which asks for assent (albeit in a calculated manner likely to lead to a "yes"), a drive-by download is carried out invisibly to the user: it can be initiated by simply visiting a Web site or viewing an HTML e-mail message. Frequently, a drive-by download is installed along with another application. For example, a file sharing program might include downloads for a spyware program that tracks and reports user information for targeted marketing purposes, and an adware program that generates pop-up advertisements using that information. If your computer's security settings are lax, it may be possible for drive-by downloads to occur without any action on your part. Xupiter, an Internet Explorer toolbar program, is frequently installed as a drive-by download. The program is said to replace the user's home page, change browser settings, and use redirection to take all searches to the Xupiter Web site. In some versions, the program initiates drive-by downloads of other programs. Furthermore, although it comes with an uninstall utility, Xupiter is said to be next to impossible for the average computer user to remove. Like adware and spyware, a browser hijacker may be installed as part of freeware installation. In this case, the browser hijacker is probably mentioned in the user agreement -- although, obviously, not identified as a browser hijacker. The problem is that users typically either ignore the fine print or only give it a cursory reading. A browser hijacker may also be installed without user permission, as the result of an infected e-mail, a file share, or a drive-by download. To avoid contamination, experts advise users to read user agreements carefully, and to be cautious about freeware downloads and e-mail messages from unknown sources. In another type of Web site hijack, the perpetrator simply registers a domain name similar enough to a legitimate one that users are likely to type it, either by mistaking the actual name or through a typo. This type of hijack is currently being employed to send many unwary users to a pornographic site instead of the site they requested. Drive-by download is a program that is automatically downloaded to your computer, often without your consent or even your knowledge. Unlike a pop-up download, which asks for assent (albeit in a calculated manner likely to lead to a "yes"), a drive-by download is carried out invisibly to the user: it can be initiated by simply visiting a Web site or viewing an HTML e-mail message. Frequently, a drive-by download is installed along with another application. For example, a file sharing program might include downloads for a spyware program that tracks and reports user information for targeted marketing purposes, and an adware program that generates pop-up advertisements using that information. If your computer's security settings are lax, it may be possible for drive-by downloads to occur without any action on your part. Xupiter, an Internet Explorer toolbar program, is frequently installed as a drive-by download. The program is said to replace the user's home page, change browser settings, and use redirection to take all searches to the Xupiter Web site. In some versions, the program initiates drive-by downloads of other programs. Furthermore, although it comes with an uninstall utility, Xupiter is said to be next to impossible for the average computer user to remove. Like adware and spyware, a browser hijacker may be installed as part of freeware installation. In this case, the browser hijacker is probably mentioned in the user agreement -- although, obviously, not identified as a browser hijacker. The problem is that users typically either ignore the fine print or only give it a cursory reading. A browser hijacker may also be installed without user permission, as the result of an infected e-mail, a file share, or a drive-by download. To avoid contamination, experts advise users to read user agreements carefully, and to be cautious about freeware downloads and e-mail messages from unknown sources. In another type of Web site hijack, the perpetrator simply registers a domain name similar enough to a legitimate one that users are likely to type it, either by mistaking the actual name or through a typo. This type of hijack is currently being employed to send many unwary users to a pornographic site instead of the site they requested.
Slide 42:Pop-Ups
A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface. Pop-ups can be initiated by a single or double mouse click or rollover (sometimes called a mouseover), and also possibly by voice command or can simply be timed to occur. A pop-up window must be smaller than the background window or interface; otherwise, it's a replacement interface. To close click on the X, do not hit a button in the message to close, cancel or OK. All can potentially download malware on your computer. A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface. Pop-ups can be initiated by a single or double mouse click or rollover (sometimes called a mouseover), and also possibly by voice command or can simply be timed to occur. A pop-up window must be smaller than the background window or interface; otherwise, it's a replacement interface. On the World Wide Web, JavaScript (and less commonly Java applets) are used to create interactive effects including pop-up and full overlay windows. A menu or taskbar pulldown can be considered a form of pop-up. So can the little message box you get when you move your mouse over taskbars in many PC applications.A pop-up is a graphical user interface (GUI) display area, usually a small window, that suddenly appears ("pops up") in the foreground of the visual interface. Pop-ups can be initiated by a single or double mouse click or rollover (sometimes called a mouseover), and also possibly by voice command or can simply be timed to occur. A pop-up window must be smaller than the background window or interface; otherwise, it's a replacement interface. On the World Wide Web, JavaScript (and less commonly Java applets) are used to create interactive effects including pop-up and full overlay windows. A menu or taskbar pulldown can be considered a form of pop-up. So can the little message box you get when you move your mouse over taskbars in many PC applications.
Slide 43:Cookies
A cookie is information that a Web site puts on your hard disk so that it can remember something about you at a later time. Cookies are commonly used to rotate the banner ads that a site sends so that it doesn't keep sending the same ad as it sends you a succession of requested pages. They can also be used to customize pages for you based on your browser type or other information you may have provided the Web site. Web users must agree to let cookies be saved for them, but, in general, it helps Web sites to serve users better. Suppose that you provide this information from a computer at work and the next person to visit that site uses the same computer. That person could, possibly, make purchases on your credit card. Oops. You need to know that this kind of software exists so that if you're concerned about your privacy, you can take steps to protect it. To enhance your online experience, the makers of Web browsers, such as Netscape Communicator and Internet Explorer, have invented a type of special message that enables a Web site to recognize you when you revisit that site. They thoughtfully store this info, called a cookie, on your very own machine to make your next visit to the same site smoother. Usually this info can in fact make your next transaction smoother. When you're using an airline reservation site, for example, the site uses cookies to keep the flights you're reserving separate from the ones other users may be reserving at the same time. On the other hand, suppose that you use your credit card to purchase something on a Web site and the site uses a cookie to remember your credit card number. Suppose that you provide this information from a computer at work and the next person to visit that site uses the same computer. That person could, possibly, make purchases on your credit card. Oops. It may be true that cookies can make your life more convenient. You have to be the judge. Every Web server can offer you cookies. You need to know that this kind of software exists so that if you're concerned about your privacy, you can take steps to protect it. Cookie files usually have the name cookie associated with them — cookies.txt on Windows and MagicCookie on a Mac, for example. You can delete your cookie files — your browser will create a new, empty one. Modern browsers can tell you about cookies and ask you whether to accept them as servers offer them to you. Contrary to rumor, cookie files cannot get other information from your hard disk, give you a bad haircut, or otherwise mess up your life. They collect only information that the browser tells them about. In addition to the cookie file, Internet Explorer keeps a history file of where you've been on the Web. (Look in your Windows folder for a subfolder called History.) If anyone other than you uses the computer you use, you may want to delete its contents after your use, unless you don't care who sees it. Courts have ruled, by the way, that companies own their computers and their contents. You have no "right to privacy" at work, even though most of us find the idea creepy. Companies can eavesdrop on phone calls, read your e-mail (going and coming), and read anything on your computer, including a history file detailing where you've searched. This can be problematic if you've done a little unofficial surfing at lunchtime.To enhance your online experience, the makers of Web browsers, such as Netscape Communicator and Internet Explorer, have invented a type of special message that enables a Web site to recognize you when you revisit that site. They thoughtfully store this info, called a cookie, on your very own machine to make your next visit to the same site smoother. Usually this info can in fact make your next transaction smoother. When you're using an airline reservation site, for example, the site uses cookies to keep the flights you're reserving separate from the ones other users may be reserving at the same time. On the other hand, suppose that you use your credit card to purchase something on a Web site and the site uses a cookie to remember your credit card number. Suppose that you provide this information from a computer at work and the next person to visit that site uses the same computer. That person could, possibly, make purchases on your credit card. Oops. It may be true that cookies can make your life more convenient. You have to be the judge. Every Web server can offer you cookies. You need to know that this kind of software exists so that if you're concerned about your privacy, you can take steps to protect it. Cookie files usually have the name cookie associated with them — cookies.txt on Windows and MagicCookie on a Mac, for example. You can delete your cookie files — your browser will create a new, empty one. Modern browsers can tell you about cookies and ask you whether to accept them as servers offer them to you. Contrary to rumor, cookie files cannot get other information from your hard disk, give you a bad haircut, or otherwise mess up your life. They collect only information that the browser tells them about. In addition to the cookie file, Internet Explorer keeps a history file of where you've been on the Web. (Look in your Windows folder for a subfolder called History.) If anyone other than you uses the computer you use, you may want to delete its contents after your use, unless you don't care who sees it. Courts have ruled, by the way, that companies own their computers and their contents. You have no "right to privacy" at work, even though most of us find the idea creepy. Companies can eavesdrop on phone calls, read your e-mail (going and coming), and read anything on your computer, including a history file detailing where you've searched. This can be problematic if you've done a little unofficial surfing at lunchtime.
Slide 44:Clean out your Cookies
Internet Explorer: Files, Tools, Internet Options. Netscape: Tools, Cookie Manager R20
Slide 45:Phishing
Phishing because the person perpetrating the scam is throwing a line or net to see who bites. Don't fall for it. The e-mail, which claims to be from a reputable source, such as your bank or credit card company, requests that you click on a link and go to their Web site to make sure that your information is correct. Once on the site, you are asked to provide personal information to verify their records. The information requested is your name, credit card number, expiration date, SSN, DOB, and so on. This technique is calledThe e-mail, which claims to be from a reputable source, such as your bank or credit card company, requests that you click on a link and go to their Web site to make sure that your information is correct. Once on the site, you are asked to provide personal information to verify their records. The information requested is your name, credit card number, expiration date, SSN, DOB, and so on. This technique is called
Slide 46:Pharming
Pharming - A New Twist on and Old Threat(Source: Digital Insight Security Bulletin - May 10, 2005)Reports surfaced at the beginning of the year that hackers were hitting servers to redirect visitors of legitimate websites to phishing sites, according to a Network World report. Reports have continued, and even penetrated the mainstream media. The Albuquerque Journal newspaper reported on April 14, “A different Internet scam called ‘pharming’ may eventually replace phishing. While phishing scams have to persuade victims to click on links to transport them to fake websites, pharming automatically directs users to phony sites by hijacking their Internet browsers. Though pharming attacks are currently not as commonplace as phishing scams, they are in some ways more alarming because they are harder to detect.” You probably have heard the new term pharming. Similar to phishing, pharming is a means for criminals to fraudulently gain access to your personal information. While phishing requires the victim, in some fashion, to voluntarily come to the criminal’s website, pharming is more insidious. As you may know, phishing is a means to trick the user to come to a fraudulent website, usually by sending links to the fake site in emails purporting to be from the victim’s financial institution. Pharming, however, redirects the victim to the fraudulent website without assistance, often regardless whether the victim is security-conscious. Pharming works by subverting a basic service of the Internet known as the ‘Domain Name Service,’ or ‘DNS.’ Each machine connected to the Internet knows the location of one or more DNS servers. Usually this is provided by your ISP and is part of your network settings. This is often invisible to the computer user. This service translates the human, easily understood URL name into an IP address. For example, http://digitalinsight.com would be translated to 208.2.188.3 and the connection made for the user. To perform a pharming exploit, the criminal first must gain access to the DNS server that is used by many people, such as the DNS server of an ISP. Once access is gained, the suspect will replace the IP number for the bank’s URL with the IP number of his or her fraudulent website. When this happens any person using that DNS server will be redirected, silently, to the fraudulent website. For example, the suspect with a pharming website arranged as http:// badcriminal.net at IP address 10.10.1.2 exploits the DNS server at smallisp.com and replaces the valid IP address of mybank.com with his or her own IP address. For example: any customer of smallisp.com who tries to use their browser to visit mybank.com will instead be sent to badcriminal.net. There will be no notification to the user. The browser address bar will still point to “http://www.my bank.com”, but the page being displayed is really from badcriminal.net. The good news is pharming requires either an unpatched software/server vulnerability to exist on the DNS server itself, or the criminal needs to convince or bribe an insider at the ISP or financial institution to make unauthorized changes to the DNS server for them. This is an extremely rare occurrence. Practically all major ISPs and financial institutions, Digital Insight included, are actively safeguarded against pharming attacks. The primary exploits used against DNS servers are well known and protections have been established for quite some time. All known pharming attacks have been against small ISPs whose DNS servers have not been properly configured or maintained. To date we know of no successful pharming attack which has used a major ISP or financial institution’s DNS server. Therefore pharming, though effective, is extremely rare as it requires the successful penetration of a typically well-protected network resource. Any reputable ISP or financial institution will manage and update their DNS server’s software to maintain a high level of security. While Digital Insight cannot control ISP’s DNS servers, we maintain the highest standards for our own. Digital Insight and all the customers whose websites we host are protected from pharming that would result from a compromise of the DNS servers that we host.
Slide 47:UCOP New Security Policies
III. Policy Each member of the UCOP community is responsible for the security and protection of electronic information resources over which he or she has control (see Security is Everyone's Responsibility: http://www.ucop.edu/irc/itsec/ ) Each UCOP employee who accesses and uses UCOP electronic information resources must be informed about applicable University information protection policies: http://www.ucop.edu/irc/itsec/infoprotect.html Protect the electronic information resources under his or her control, such as using appropriate passwords and minimizing the exposure of sensitive data to unauthorized personnel (see Guidelines for Protecting Information Assets http://www.ucop.edu/irc/itsec/guidelines.html), and Report suspicion or detection of a compromised computer. Shared resources are vulnerable to a variety of attacks; consequently, damage to any resource connected to the UCOP data network could result in broad impact across UCOP. Resources to be protected include the data network, computers, software, and data. For the PDF version of the full report, “Business & Finance Bulletin IS-3 Electronic Information Security written: February 8, 2005 http://www.ucop.edu/ucophome/policies/bfb/is3.pdf
Slide 48:UCOP New Security Policies
Set good passwordsMake sure all accounts on your computer, including the computer administrator's account, have strong passwords. Follow the minimum password requirements: Immediately change any new or default password assigned to you. Choose passwords at least 6 characters in length with a mix of numbers and upper and lower case letters. Avoid words found in any dictionary and in any language, whether spelled forwards or backwards. Avoid names of people or places, or information about you that may be well known or easy to find, such as your address, birthday, or hobbies. Avoid common keyboard sequences, such as "qwerty89" or "abc123. Do not share your personal passwords with anyone. Use phrases, with upper and lower case and subsitute numbers and symbols whenever possible. Example: My#1D0(zero)g61f – my number one dog Bif Ur2smART4mE^99%
Slide 49:UCOP New Security Policies
Instructions for Changing PasswordsInstructions for changing passwords for some commonly used systems are provided below. If you need assistance with changing passwords for other systems, please contact David or I. Eudora: From the "Special" menu select "Change Password" and follow the directions Corporate Time: From the "Options" menu select "Change Password" and follow the directions Windows: Press CTL-ALT-DEL, click "Change Password," and follow the directions Change your password immediately if you suspect someone else may have guessed it.
Slide 50:UCOP New Security Policies
Be careful opening e-mail attachmentsMany viruses are transmitted through e-mail, often as attachments. Never open an attachment unless you are sure who sent it and what it contains. Always use your antivirus software to scan attachments for viruses before opening them by clicking on your Symantec Norton Antivirus icon and selecting Scan. Turn your computer off when you leave for the dayYour computer cannot be infected or invaded when it is not connected to the network. Turn it off when you are done for the day. This is particularly important if you will be away from your system longer than a few days. If you haven't turned on your computer in a few days, be sure to check for updates for software and antivirus files (see steps 2 and 3 above) before you do anything else.
Slide 51:UCOP New Security Policies
Install screen-saver passwords on your systemIn addition to logging into your Windows system with your system userid and password, you should utilize a screen saver and enable its password feature. That way, if you leave your computer without turning it off, the screen saver will activate (after a pre-determined period of time) and you'll need to enter a password to resume your Windows session. http://www.ucop.edu/irc/itsec/securecomp.html
Slide 52:UCOP New Security Policies
Take extra precautions with your laptop or other portable devicesBy design, laptop computers (and other portable computing devices, PDAs, for example) are carried from place to place and thus are exposed to risks less prevalent in stationary environments where desktops are protected by firewalls, automated scheduled virus scanners, and automated critical updates and patch installations. To protect the UCOP network and the devices connected to it, all laptops must be updated with the latest Microsoft critical updates and patches and scanned using the latest virus definition files before they are brought into a UCOP facility and connected to the UCOP network. Also, invest in a laptop or PDA lockdown cable to deter easy theft of your portable device, and lock your office (where applicable) when you leave it.
Slide 53:UCOP New Security Policies
Changes that will affect you as a user. No more administrator rights – Restricted Users accounts only. Must call Cyndi or Dave to install software Forced password locked screensaver This will be implemented late April early May 2005