Getting a new computer should be an exciting and gratifying experience. After all, you'll be able to do things faster, safer and without having to worry that your old hard drive is so full that one more file will "break the camel's back."
However, there are dangers out there that probably didn't exist when you bought your last computer. And there's the question of what will happen to your old hard drive, with all your personal data on it.
Let's deal with your new computer first. This information applies specifically to Windows XP, although it has broader application as well.
Remember:
Standard (wrong) advice to home users has been to download and install software patches as soon as possible after connecting a new computer to the Internet. However, since the background intruder scanning activity is pervasive, it may not be possible for you to complete the download and installation of software patches before the vulnerabilities they are trying to fix are exploited.
This Special Report offers advice on how to protect your computer before connecting it to the Internet so that you can complete the patching process without incident.
We strongly recommend following all the steps when upgrading to a new operating system from disc(s) as well as when connecting a new computer to the Internet for the first time.
A network firewall or firewall router is a hardware device that is installed between the computers on their Local Area Network (LAN) and their broadband device (cable/DSL modem). By blocking inbound access to the computers on the LAN from the Internet a hardware-based firewall can often provide sufficient protection for you to complete the downloading and installation of necessary software patches. A hardware-based firewall provides a high degree of protection for new computers being brought online.
If you connect to the Internet before you install a firewall, it may be possible for the computer to be exploited before the download and installation of such software is complete.
XP has a built in firewall that may or may not be enabled. If Microsoft XP has not had Service Pack 2 installed, follow these instructions to turn on the Internet Connection Firewall. If XP is installed WITH Service Pack 2, then your firewall is enabled by default.
Microsoft has provided both detailed and summarized instructions for enabling the built-in Internet Connection Firewall on Windows XP.
We strongly recommend that you install a third-party firewall application and THEN turn off the Windows firewall.
We recommend ZoneAlarm (www.ZoneLabs.com), which is FREE. Zone Alarm is the top rated firewall, and protects both incoming and outgoing data. XP's firewall ONLY protects against incoming data. Zone Alarm's setup file is approximately 7 megabytes, which will easily fit on a CD or USB drive.
Follow the instructions there to install all Critical Updates. However, if you are going to install Service Pack 2, READ THIS FIRST! Pay particular attention to "Get the latest PC manufacturer updates for SP2, because you may need to update drivers for your PC to work properly.
Only download software patches from known, trusted sites (i.e., the software vendors' own sites), in order to minimize the possibility of an intruder gaining access through the use of Trojan horse software.
Staying Secure
Follow the principle of least privilege - don't enable it if you don't need it.
Consider using an account with only 'user' privileges instead of an 'administrator' or 'root' level account for everyday tasks. You only need to use administrator level access when installing new software, changing system configurations, and the like. Many vulnerability exploits (e.g., viruses, Trojan horses) are executed with the privileges of the user that runs them - making it far more risky to be logged in as an administrator all the time.
Moving Your Applications and Data
Unless you've never had a computer before, you'll want to move your old data onto your new machine. There are several ways to do this quickly and easily (although there are often a few glitches). The best article on the subject is www.pcworld.com/howto/article/0,aid,115632,00.asp.
Protecting Your OLD Data
So, what do you do with your OLD computer? Perhaps someone else can use it, maybe a school or a retirement center?
One of the biggest mistakes people make is thinking that deleting files using Windows Explorer actually deletes the files! It DOESN'T!
When you delete files in Windows, all it does is delete the pointers that show where the files are. Any competent computer whiz can easily find a program on the Internet that will rebuild the file pointers, and then they have access to all your files- your emails, your business information and your financial information.
You can go to any flea market in the country, and chances are you can purchase a used hard drive with the old owner's data still on it! Many professional identity thieves are doing just that!!!!
What CAN you do?
Personally, I remove the hard drive from the computer, and I keep it (not in a place that it would be found if a burglar came into my house).
Another alternative is to use a free disk wiping utility or purchase one.
To effectively remove data from a hard drive, it must be overwritten completely several times. All of the temporary files, all of the caches, all of the "swap files" that are created as you work may be lurking in some unknown corner of the hard drive.
Contrary to popular belief, even reformatting the drive does not necessarily make file recovery impossible!
Consider this ? A recent search of hard drives that had been discarded revealed:
There are free programs that will do an adequate job of wiping a hard drive clean ? although the data may still be recoverable by professionals with very expensive programs, and there are inexpensive programs that will make the data completely unrecoverable.
We recommend DBAN (dban.sourceforge.net/)which does 5220.22-M-compliant wiping. 5220.22-M-compliant wiping is the Department of Defense secure delete wiping standard. Be aware, however, properly wiping a hard drive, particularly some of the large ones can take hours, but it is worth it to protect your privacy.
© Steve Freedman, Archer Strategic Alliances, 2005 All Rights Reserved
Steve Freedman
Author of "Help! Something's Got Hold of My Computer and It Won't Let Go!"
A PC Security eBook for Newbies, Skilled Users and Wizards
Archer Strategic Alliances
http://www.HelpProtectMyComputer.com
How can you compare mp3 players to be sure you're... Read More
PDA Medical BenefitsIf you are concerned about your medical history,... Read More
Music lovers have been carrying around radios and other bulky... Read More
HTTP ProtocolThe web is run on port 80. You are... Read More
You use Ctrl+Alt+Del to see what's running on your PC,... Read More
Are you frustrated with your PC?Is it feeling sluggish or... Read More
Computers are everywhere, and vary in specification, brands, sizes, shaped,... Read More
We've all seen them, you've been browsing a website and... Read More
It seems like fast never quite rates fast enough.No matter... Read More
Computers have replaced typewriters, but two-finger, hunt-and-peck typing can never... Read More
IF WE say that it was mainly because of the... Read More
After another security hole recently surfaced in Microsoft's Windows operating... Read More
The best way to get the gaming computer that you... Read More
Google, in their march to stay ahead of the pack... Read More
It's hard enough as it is these days to get... Read More
Do you use Windows standard uninstall feature? How do you... Read More
After reading this good article you will know some important... Read More
When I first started studying for my CCNP, some of... Read More
World War II - Germany decided to attack Poland. Poland... Read More
Many computer users are worried about their computer's performance. After... Read More
Stop Getting LostOne of the greatest uses for a pocket... Read More
Millions have enjoyed recorded music since 1877 when Thomas Edison... Read More
1. Before sitting down for coding, you must have formal... Read More
First and foremost before I begin my ranting it is... Read More
Step 1:Open WinRAR and browse to the folder with your... Read More
There are soooo many choices. With all the styles and... Read More
Your first step in removing dangerous infections from your computer... Read More
In my humble opinion nothing makes a long trip easier... Read More
While most small businesses really do need to find a... Read More
Ad Blocking is getting to be a common sport on... Read More
IntroductionMac OS X is the most technologically advanced operating system... Read More
Most people download and save so much information on their... Read More
Buying Your PCBuying a PC that's right for you and... Read More
BIOS - Basic Input Output SystemThe central processing unit of... Read More
Flow Text Around a GraphicQuestion: I have inserted a photo... Read More
Flash mp3 players come with an exciting array of features,... Read More
Plenty! When we made the decision to be our own... Read More
PDA Medical BenefitsIf you are concerned about your medical history,... Read More
Computers are supposed to speed up our productivity?to help us... Read More
How long do you think DVDs have around? 20 years?... Read More
For many people the computer industry is a seeming unsolvable... Read More
Cameras: still known for taking pictures but assumed as digital... Read More
So I'll start from the very beginning.One day I was... Read More
Here are some tips on how to use screensavers:First of... Read More
The technological horizon has always got something new to offer,... Read More
Plasma and LCD TVs are the latest trend in home... Read More
If you're like me, you occasionally find the ubiquitous mouse... Read More
Have you ever tried to remove Spyware off your PC... Read More
When browsing the internet you are likely to come across... Read More
Microsoft Business Solutions is on the way to popularize it's... Read More
The registry is where the computer stores information about the... Read More
Choose Not To ConformPalm pilots and pdas are constantly growing... Read More
If you utilize a computer at home or work it... Read More
Yes, it's true. You may have inadvertently invited a spy... Read More
Time is money. And when you constantly have to divide... Read More
Music lovers have been carrying around radios and other bulky... Read More
Are you looking for an MP3 player but am not... Read More
I have a p3 500MHz PC with 128MB RAM, 10.2... Read More
Spyware is the software that collects information about your online... Read More
Winter?the official start of the cold and flu season. Though,... Read More
We have just entered the time of year that most... Read More
Sometimes your PC will start acting strange for no apparent... Read More
File permissions are one of the strengths that the Unix... Read More
As the Web grows more crowded and just plain "noisy"... Read More
Computer related terminology could sometimes be daunting to newcomers. These... Read More
The year is 1981. IBM has just released the Personal... Read More
Personal Technology |