How to ensure your computer is secure. This artical is specific to Virginia Tech’s computers however all computers can benefit from these steps.
to see the original Article go to http://security.vt.edu/lockitdown/vtsecuritynew.html
Think your computer is safe? Think again!
Computer hackers are compromising Windows machines all over the world. Virginia Tech is not immune to these hackers or their attacks. In almost all cases, they are exploiting known security holes that you can close. Here are eight steps you can take to protect your computer.
| 8 Steps to secure a Windows computer: | |
Hundreds of Windows computers on the Virginia Tech campus running Windows 7, Vista, or XP are compromised every year simply because they have Administrator accounts with no password! Or, the file sharing setup allows hackers to connect over the network and make changes to your computer system. If you put your computer on the network with open accounts or other security holes, it can be compromised within hours/minutes. Unlike corporations with tight firewalls, Virginia Tech’s network is open to the entire Internet. This allows easy access to any network service, but also makes it easy for hackers to scan our network for vulnerable computers.
Hackers usually leave a "back-door" program in your computer which allows them to control your computer and attack other computers on the network. If this happens, you will lose your network connection until you "clean-up" your computer. This may mean removing a virus or completely wiping all data from the disk by reformatting and reinstalling Windows, plus any private software packages you own. This is a great waste of your time and the 4Help consultants can not help you reinstall any operating system. Remember, a malicious hacker can wipe out your important documents and e-mail.
One method used to get a "back-door" is a Music Sharing peer-to-peer program like KaZaa, BearShare, LimeWire or Morpheus. Virginia Tech suggests you not run these programs on your computer. See the file sharing section for more information. Other methods, like email attachments and AIM links, also allow "back-doors", DO NOT OPEN either until you know the content.If you use a computer with a network connection, please take these simple steps described below to help secure it against hackers.
