Multitech RF500S Uživatelský manuál Strana 42

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 49
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 41
38
19.4 Spyware
Companies find every more clever ways to obtain customer information. This has led to a technique called
spyware. Software you install sends information about your usage back to the company. A common method
is HTML email. By embedding a remote link the company can determine the time and date you read the
mail. More worrisome are programs such as Real Jukebox that reports what songs you played.
A typical firewall is ineffective; it is designed to control remote access, not from within. It is possible to
configure the firewall to block access to specific sites. Some personal firewalls, Zone Alarm, being the
most popular example monitors both incoming and outgoing traffic. This allows the user to specify what to
allow and disallow.
Gibson Research created a spyware removal tool called OptOut. That is no longer supported and has been
taken over by Lavasoft Ad-Aware.
19.5 Configuration
To make configuration easier most programs and operating systems use default settings. Check these
carefully to make sure they do not compromise system integrity.
Windows Configuration Tips:
Disable VB scripting
By default each network interface is bound to all services. Make sure any machine that has direct
access to the Internet does not have File and Print Sharing” bound to the interface used to access
the Internet
Change passwords and account names, do not used the defaults.
Write down user names and passwords and store them in a safe and secure location away from the
computer so you have access when you forget them. Don’t worry you will forget them.
Don’t run public servers on your LAN, let the hosting service do it
Don’t allow modems in networked machines. They are a backdoor into your LAN
19.6 Social Engineering
Sad to say many security breaches are not the result of compromising the technical security barriers. They
result from individuals inadvertently giving out privileged information.
Security Tips
No reputable entity will ever ask you for your password. If there is a problem with the password
you may be issued a new one but they will never never never ask you for yours.
Limit the amount of personal information you divulge. You need to disclose enough to conduct
the transaction that is all. Often times you can operate under an alias such as in chat rooms and
forums.
The web makes it easy to download and install software. You have no way of knowing if it is safe.
Just because you are running antivirus software is no guarantee. If this is a new virus or trojan you
may be infected before it is antivirus program is updated.
Don’t advertise what you have. The more the attacker knows about your installation the easier it is
to find a weakness. All systems have weaknesses.
20 Laptop Computing Anywhere
We use a laptop in our home office, in the office and while traveling. This means it needs to connect in
three different environments.
Zobrazit stránku 41
1 2 ... 37 38 39 40 41 42 43 44 45 46 47 48 49

Komentáře k této Příručce

Žádné komentáře