Basic Computer Security – Part 1

Welcome to the Fast-Air Tech Talk newsletter. The Tech Talk newsletter is a free service for all Fast-Air customers. Please feel encouraged to suggest newsletter topics.

Within the circle of computer security experts, there is statement that is generally accepted as a truism — computer security is hard. Upcoming issues of the Fast-Air Tech Talk are going to address the topic of computer security in a variety of ways.

Despite computer security being hard, ignoring the issue is opening the door to all kinds of grief.

Security is hard because there is no simple one-click solution. Computer security involves layers. Computer security is a process.

There is an old joke that describes many problems in life, including a majority of computer related security issues.

A medical patient says, “Doctor, my arm hurts when I do this.”

The doctor replies, “Then don’t do that!”

A significant cause of computer security related problems is through social engineering. In other words, bad habits. Lazy habits. Many people do not stop to think about their actions and then willingly allow computer security problems.

Stop doing that.

The first layer of computer security is the user. To quote an old Pogo comic, “We have met the enemy and he is us.”

The challenges of computer security and avoiding malware are going to get a lot worse in the upcoming years. Not learning some basics about computers is merely oil on the fire.

How to stop doing that?

Be skeptical. At times the web is a very hostile place.

Do not trust strangers. This applies to the world wide web just as much as daily face-to-face encounters.

Never presume popular web sites are designed protect you. Remember the classic poem, “Will you walk into my parlour?” said the Spider to the Fly. The owners of these popular web sites are in the surveillance business. These sites are designed to data mine you. The owners have their profits to protect, not your safety.

Certain people such as bureaucrats, bankers, and attorneys never make first contact through email or web browsers. Do not reply to such notices.

If you purchase merchandise online, always always think twice about emails that seem related to online purchases. Malware writers are very good at fooling people into clicking links in emails. Just because such an email contains personal information such as name, mailing addresses, and phone numbers does not mean the mail is legitimate. Much of that kind of personal information is now, sadly, easily available online. Pay attention to the actual links.

Use a secure web browser.

Never respond to web browser notices that malware has been detected on your computer system. Never, ever.

Never respond to web browser notices that drivers or other software are outdated on your computer system. Never, ever.

Think twice before opening email attachments. Watch status bars when hovering the mouse pointer over any email attachment link. Be sure the link is valid. Be sure the email is really from who you think.

Enable displaying file extensions, which helps detect when links are actually executable files and most likely malware.

Disable auto-play for removable media. An extra mouse click or two to open those media is far safer than the convenience of auto-play.

Relying solely on anti-virus software for protection is an illusion. Anti-virus software is mostly closing doors after the animals escape the barn.

Think twice before installing software.

Read, read, read installation instructions before installing software. Install only the software you want and not bundleware.

Install software only from known safe repositories.

Do not blindly trust anybody handing you a USB flash drive or optical disk.

Think twice about pretending to need to watch the latest dancing pigs video.

Learn how to use white lists in web browsers.

The number one cause of computer security related problems?

That would be the person reading this article. Learn some basics about computer security.

Do not be gullible. You have a pretty good baloney detector. Why do you turn off that detector when using a computer?

There really is no way to improve computer security without first addressing the PEBKAC problem. PEBKAC is an acronym that means Problem Exists Between Keyboard And Chair. More light-hearted ways of describing such problems caused by the user are Carbon Based Error (humans are fundamentally carbon based organisms, while computer chips are based on silicon), Biological Interface errors, defective keyboard controller, and for those more mechanically inclined, a loose nut between the steering wheel and the seat.

Computer security starts with looking in the mirror. Measure twice, cut once. Look both ways before crossing a street. Failing to plan is planning to fail. Fool me once, shame on you. Fool me twice shame on me.

While computers arguably are one of the most complex tools ever invented by humans, a majority of computer security problems can be avoided by being a responsible and thoughtful user. The computer is not a toy or a simple bread toaster appliance.

Remember, only you can prevent forest fires.

Technical trivia: One of the most widely used calculating devices is more than 4,500 years old — the abacus.

Next issue: Computer security – Part 2.

A video that went viral only days after posting.

Video

Latest posts by Backwoods Geek (see all)