Page: 1 2
The World Wide Web is becoming not unlike the real world. It has its share of vandals, criminals, hucksters and hoaxers who prey on the unsuspecting or ill-informed. You can protect yourself while online by following these rules. While they may not come from on high, or be written in stone, these are 10 Commandments for safe and sane connectivity:
- Never click on an executable file sent in e-mail. An executable file has an extension such as EXE, COM or BAT, and runs an actual program when you start it, even if it appears to be just a picture or animation. It’s likely to be a “Trojan horse,” even if it comes from a friend. By contrast, most document files are safe because they’re created to be viewed rather than do anything in your computer. Document file extensions include those for pictures (GIF, JPG, BMP, etc.), sounds (WAV, AU, etc.), text-based messages (TXT) and other passive data. Office-type files that can run macros, especially Microsoft Word DOC files, are another story.
- Protect yourself from Microsoft Office (Word, etc.) macro viruses. Most document files are passive, but some can contain macros, and your colleagues may not know that their system is infected with a macro virus. To protect your system, turn on your built-in anti-macro-virus protection programs in Office 97: In the Tools menu, click Options. On the General tab, check the box marked “Macro virus protection.” From then on, when you start to open a document that has a macro in it, you can choose whether to disable the macro or not. Another way to protect yourself is to open Word files in WordPad and ignore the gobbledygook at the top and bottom. For more antivirus resources, visit www.officeupdate. microsoft.com/Articles/antivirus.htm.
- Don’t take URLs from strangers. When you click a hot link sent in e-mail, your browser goes to that address. You might be sent to a site that exploits vulnerabilities in your browser or truly violates your security. Clicking on links in junk e-mail also encourages spammers to keep sending it because you responded. If the link looks like something of interest from a reputable source, examine the URL carefully to see if the company.com part of it is what you’d expect from the information given, and look closely at the headers on the e-mail you received.
- Always get downloadable programs from the horse’s mouth. Go directly to the vendor’s site or to a large, established shareware site such as Jumbo (www.jumbo.com) or CNET (http://shareware.cnet.com).
- Keep up with alerts, and download and install patches for security holes. Stay on top of problems by checking frequently at these sites: CIAC (www.ciac.org), ICSA.Net (www.icsa.net) and Microsoft (www.microsoft.com/downloads/search.asp?).
- Stop hoaxes and chain letters in their tracks. If a friend forwards you an e-mail that asks you to “forward this letter to everyone you know,” don’t do it. It’s almost guaranteed to be a hoax, and the resulting mail clogs the Internet. Hoaxes like the “modem tax” or “Microsoft will pay you for each person you send this letter
Page: 1 2
Join the Conversation