260 likes | 367 Views
CS 6 Lecture 10 – Defense Against the Dark Arts. Spring 2014. Notes!. Quiz this Thursday (May 8) Tables <table>, < tr >, <td>, < th > Should you use the border attribute? Table borders with CSS CSS Cascading Style Sheets Inline vs. Internal vs. External Good & Bad of the Internet
E N D
CS 6 Lecture 10– Defense Against the Dark Arts Spring 2014
Notes! • Quiz this Thursday (May 8) • Tables • <table>, <tr>, <td>, <th> • Should you use the border attribute? • Table borders with CSS • CSS • Cascading Style Sheets • Inline vs. Internal vs. External • Good & Bad of the Internet • Internet Fundamentals • Difference between cache and history? • TCP/IP • DSL vs. Cable vs. FIOS vs. Satellite • Problem with current IP address system? • Search • Joe Friday Question vs. Voyager Question vs. Deep Thought Question
First, Backup If you hear nothing else this quarter, BACK UP YOUR DATA!!
Backing up on Windows • Start All Programs Accessories System Tools Backup • Run backup on your ‘My Documents’ folder and your settings. • Burn a disk! Place it away from your computer. For important stuff, take it to your mom’s!
Backing up on OSX • Buy an external HDD • Same size or larger than your current machine • Make sure it is formatted correctly • MS-DOS (FAT) so that it can also be used on a PC • Run Time Machine • Select Disk (your external HDD) • All files back up to your HDD • Every time your computer is turned on • Or on a schedule
Backup Drives • HDD Prices have dropped considerably • 2004: ~$1 per GB ($100 for 100GB) • 2014: ~$1.20 per 30 GB ($120 for 3TB) • Big HDD names • Maxtor • Western Digital • Seagate • SSD (Solid State Drive) • More stable flash memory • 2014: ~$1 per GB
The Cloud • Google • Amazon E3 • Dropbox • Etc.
Because you never know • Virus • Failed software install • Power spike • Disk crash • Accidental Deletion • Water/Tea/Soda spills
Vocabulary • Virus: come as files, in email, that you download, etc. Hurt your computer. • Worms: Self-propagating over networks, usually hurt networks. • Trojans: come hidden inside of other, apparently desirable software. • Spyware: collects personal information about users without their consent.
Zombies!! • Zombie Computers: • When your computer is operated remotely, without your knowledge, to do bad things.
What do I need to do? Ok, don’t throw away your computer…
What do I need? • Virusesneed antivirus software. • AVG • Free edition available • Very good • NOD 32 • Not Free • Light weight • Very verygood • McAfee • ehh • Norton • Double ehhhh
Antivirus Software • Antivirusis only as good as it’s latest virus definitions. If you don’t want to pay, switch to AVG. • ONLY RUN ONE ANTIVIRUS AT A TIME! For example, uninstall Norton, then install AVG. • Backup before you uninstall a big antivirus suite! They have been known to eat computers as revenge.
What do I need? • Worms need a firewall/router
Firewalls • A firewall is a barrier that watches any attempts to enter or exit your computer. Usually, these attempts are blocked, unless you give permission. • Windows now comes with a firewall installed • only one-way – only stops incoming connections. • Zone Alarm • free version • blocks both incoming and outgoing connections
Routers • Routers: the network hub and the gateway to the outside internet. • Routers by themselves absorb many attacks that are meant for real computers.
What do I need? • Trojans need firewall / spyware checker • Spyware anti-spyware
Anti-Spyware • Popular ones • SpybotSearch and Destroy • Adaware • Both are available for free. Good to use. • Also – Don’t download from obscure websites, be sure the website is authentic, and scan any file you download before install! • Don’t open files in email unless you were expecting them! Even from friends!
Automation is Policy • Things that should happen automatically: • Retrieving and installing program updates. • Scanning any current downloads. • Scheduled computer scans nightly. • Scheduled backups nightly.
Obscurity is Your Friend • ~70% of the world uses Windows • Most Windows users use Outlook or Outlook Express for their email client • Now ~53% of the world uses Chrome • If you were going to hack a computer system, which one would you target?
Passwords • Have levels of passwords: • ‘Throwaway’ password for sites of no security value. • More complex passwords for important sites. • A VERY secure password for a very FEW financial and ultra-important sites.
Don’t Share Your Password • There is NEVER any reason to share your account, password, or pin • Administrators or Security Experts got it! • Don’t be “Socially Engineered” • Information is valuable & dangerous • Don’t let a sweet-talker get you to say more than you should
Securing Your Home Network • If you have a router not provided by you service provider • Google your router name, find instructions • Log into your router. (e.g. http://192.168.0.1) • Change default password on admin account and any user accounts • Update your firmware (if available) • Good routers are not expensive - upgrade!
Securing Your Home Network • Turn on the encryption! • WPA (WPA-PSK) • WEP IS EASILY CRACKED! • Allows you to set a password for your wireless network. • Your network password should be strong! Remember wardriving (stealing open WiFi)
Securing Your Home Network • The SSID is the network name your router broadcasts. • Disable broadcast? Maybe. • Vague, non-default name? Yes! • RenRen (my fish’s name) • Snoopy (Peanut’s dog’s name) • Riverside Police Network (not really….) • NOT your last name • NOT your address
Securing Your Home Network • Extra steps (advanced users only!) • MAC address filtering - enabling only the computers you allow on the router. • Start -> run -> cmd -> ipconfig -all • Turning off DHCP • Dynamic Host Configuration Protocol • DHCP automatically assigns your computers their internal IP addresses. Instead, hard-code them yourself.