Friday, December 31, 2004

Another Firefox Rave

Walter Mossberg of the Wall Street Journal tends to limit his recommendations to mainstream products. But Walt breaks out and highly endorses the upstart Firefox web browser over Microsft's Internet Explorer.

PERSONAL TECHNOLOGY
By WALTER S. MOSSBERG
December 30, 2004

Microsoft's Internet Explorer Web browser is one of the most important, and most often used, programs on the world's personal computers, relied upon by more than 90% of Windows users. But Microsoft hasn't made any important functional improvements in Internet Explorer for years.

The software giant has folded IE into the Windows operating system, and the browser only receives updates as part of the "Windows update" process. In recent years, most upgrades to IE have been under-the-hood patches to plug the many security holes that have made IE a major conduit for hackers, virus writers and spyware purveyors. The only visible feature added to IE recently: a pop-up ad blocker, which arrived long after other browsers had one.

Meanwhile, other people have been building much better browsers, just as Microsoft itself did in the 1990s, when it challenged and eventually bested the then-dominant browser, Netscape Navigator. The most significant of these challengers is Firefox, a free product of an open-source organization called Mozilla, available for download at www.mozilla.org1. Firefox is both more secure and more modern than IE, and it comes packed with user-friendly features the Microsoft browser can't touch.

Firefox still has a tiny market share. But millions of people have downloaded it recently. I've been using it for months, and I recommended back in September that users switch to it from IE as a security measure. It's available in nearly identical versions for Windows, the Apple Macintosh, and the Linux operating system.

There are some other browsers that put IE to shame. Apple's elegant Safari browser, included free on every Mac, is one. But it isn't available for Windows. The Opera browser is loaded with bells and whistles, but I find it pretty complicated. And NetCaptor, my former favorite, is very nice. But since it's based on the IE Web-browsing engine, it's vulnerable to most of IE's security problems.

Firefox, which uses a different underlying browsing engine called "Gecko," also has a couple of close cousins based on the same engine. One is Netscape, now owned by America Online. The other is a browser called Mozilla, from the same group that created Firefox. But Firefox is smaller, sleeker and newer than either of its relatives, although a new Netscape version is in the works.

Firefox isn't totally secure -- no browser can be, especially if it runs on Windows, which has major security problems and is the world's top digital target. But Firefox has better security and privacy than IE. One big reason is that it won't run programs called "ActiveX controls," a Microsoft technology used in IE. These programs are used for many good things, but they have become such powerful tools for criminals and hackers that their potential for harm outweighs their benefits.

Firefox also has easier, quicker and clearer methods than IE does for covering your online tracks, if you so choose. And it has a better built-in pop-up ad blocker than IE.

But my favorite aspect of Firefox is tabbed browsing, a Web-surfing revolution that is shared by all the major new browsers but is absent from IE. With tabbed browsing, you can open many Web pages at once in the same browser window. Each is accessed by a tab.

The benefits of tabbed browsing hit home when you create folders of related bookmarks. For instance, on my computer I have a folder of a dozen technology-news bookmarks and another 20 or so bookmarks pointing to political Web sites. A third folder contains 15 or so bookmarks for sites devoted to the World Champion Boston Red Sox. With one click, I can open the entire contents of these folders in tabs, in the same single window, allowing me to survey entire fields of interest.

And Firefox can recognize and use Web sites that employ a new technology called "RSS" to create and update summaries of their contents. When Firefox encounters an RSS site, it displays a special icon that allows you to create a "live" bookmark to the site. These bookmarks then display updated headlines of stories on the sites.

Firefox also includes a permanent, handy search box that can be used to type in searches on Google, Yahoo, Amazon or other search sites without installing a special toolbar.

And it has a cool feature called "Extensions." These are small add-on modules, easy to download and install, that give the browser new features. Among the extensions I use are one that automatically fills out forms and another that tests the speed of my Web connection. You can also download "themes," which change the browser's looks.

There is only one significant downside to Firefox. Some Web sites, especially financial ones, have chosen to tailor themselves specifically for Internet Explorer. They rely on features only present in IE, and either won't work or work poorly in Firefox and other browsers.

Luckily, even if you switch to Firefox, you can still keep IE around to view just these incompatible sites. (In fact, Microsoft makes it impossible to fully uninstall IE.) There's even an extension for Firefox that adds an option called "View This Page in IE."

So Firefox is my current choice of a Windows Web browser. It is to IE in 2004 what IE was to Netscape in 1996 -- the upstart that does a better job.


Thursday, December 30, 2004

How Fast Is Your Internet Connection?

See if you are getting the connection speed that your Internet Service Provider promised. I really like the University of Michigan Speedtest. More tests casn also be found at Broadband Reports.

An Account of Spyware Removal

This is how one woman solved her spyware problem...she did a clean reinstall of Windows XP. A lighthearted account of this (sometimes necessary) process.

December 30, 2004

Terminating Spyware With Extreme Prejudice

By RACHEL DODES

THE end of the year is a time when people sit down, rethink their priorities and sometimes change their ways. Some quit smoking. Others join a gym. I chose to erase my hard drive and reinstall my operating system.

Sure, it was a drastic move, but my two-year-old I.B.M. ThinkPad - equipped with a 1,000-megahertz Pentium III processor, a high-speed Internet connection and 256 megabytes of memory - was running about as fast as the Apple IIE I used in the mid-80's.

After six months engaged in mortal combat with spyware - parasitic software that tracks your browsing habits, sends out pop-up ads and can even send your private information to an organized crime ring in Guam - I had two options: shell out $1,200 for a new ThinkPad, or wipe my hard drive and start from scratch - a huge production with potentially cataclysmic results.

Since I enjoy new challenges (and more important, since I lack the funds to buy a new laptop), I decided to shoot for the moon and delete, delete, delete.

It did not have to be this way. I can trace the decline of my computer's performance to an ill-advised download over the summer. In a pop-music-induced frenzy, I am embarrassed to admit, I went to www.kazaa.com, downloaded and installed the free file-sharing service, then proceeded to download (a k a steal) Britney Spears's and Madonna's collaborative effort, "Me Against the Music."

I was about to get my karmic retribution.

In downloading Kazaa, I had inadvertently opened the floodgates to all manner of spyware. By the end of the summer, even after I had deleted Kazaa and installed Norton AntiVirus 2004 - which took care of the virus-related part of the problem - I was unable to open Internet Explorer without being deluged with pop-ups enticing me to buy everything from herbal weight-loss pills to obscure business publications.

My home page would mysteriously try to redirect itself to a site called badgurl.grandstreetinteractive.com. Little gray dialog boxes would pop up in the center of my screen to inform me, shockingly, that my computer might be infected with spyware. Then it would crash.

Spyware is "definitely the most annoying problem," said Tim Lordan, staff director of the nonprofit Internet Education Foundation, which joined with Dell Computer this year to mount a spyware awareness campaign (www.getnetwise.com). Spyware is also ubiquitous: in October, a study by America Online and the nonprofit National Cyber Security Alliance found that 80 percent of computers were infected with it.

As my frustration mounted, I sought the advice of fellow spyware sufferers. My friend Jesse, a lawyer at a large New York firm, told me he was forced to wipe his hard drive when his Dell Latitude laptop transmogrified into a purveyor of pornography advertisements. He sheepishly confessed that against his better judgment, he had downloaded a virus- and spyware-addled copy of the Paris Hilton sex video.

"I contracted a sexually transmitted computer virus from Paris Hilton," said Jesse, who requested that his last name not be printed. (He feared his law firm - and his wife - would not be too happy about the download.) "It was chronic."

Downloading dubious files is a surefire way to get spyware, but it can also be transmitted through seemingly innocuous e-mail, by clicking on a banner ad, or from wholesome Web surfing. The programs install themselves in several places on your computer, making it difficult to find and delete them.

What's worse, even if you do delete them, many are programmed to reinstall themselves automatically when the computer is rebooted.

What really distinguishes spyware from other computer security threats (viruses, worms and Trojans) is that it often seems to defy the products meant to exorcise it. McAfee introduced an anti-spyware program - aptly called McAfee AntiSpyware - in February, but it has met with mixed reviews.

Symantec, the maker of Norton security software, will release its first anti-spyware product early in the new year. (Norton AntiVirus can detect some forms of spyware, but cannot get rid of it.) Microsoft also announced that it would release new anti-spyware software by the end of January.

For now, though, computing experts recommend what they call a "multilayered approach" - translation: ad hoc, complicated and largely ineffective.

I tried everything the experts suggested. I switched my default browser from Internet Explorer - the target of most spyware programmers - to Mozilla Firefox (available free at www.mozilla.org) and downloaded and ran free expert-sanctioned software with all sorts of renegade names (CWShredder, Spyware Search & Destroy, AdAware and HijackThis).

I submitted my "HijackThis log" - a three-page list of potentially dubious files - to a reputable online help forum and, following the experts' advice, manually performed a perilous bit of surgery on my computer's vital organs, deleting several keys from its Windows registry.

The pop-ups continued unabated. A Norton AntiVirus scan informed me that despite my efforts, 77 spyware programs were still lurking on my hard drive. (Before this daylong production, I had more than 100 pieces of spyware on my computer, so indeed, it was an improvement.)

Erasing my hard drive, long considered a last-ditch measure, was becoming more and more appealing with each passing virus scan. My friend the bankruptcy lawyer finally convinced me: "The catharsis cannot be understated."

He recommended I talk to his friend Larry Wagner, an independent technology consultant who has become a self-styled sherpa in hard-drive erasure. At last count, he had helped six other people (including his in-laws, his parents, a colleague from work and my friend) deal with spyware problems. Mr. Wagner is particularly enthusiastic about deleting - and upon hearing my sordid tale, requested that I wipe my hard drive under his auspices.

"It's like a baptism for your computer," Mr. Wagner said. "You cannot truly live a good life until you've taken that first step."

I arrived at Mr. Wagner's Upper West Side apartment on a December evening with my laptop, a list of my computer's components, my original Windows XP Pro installation discs, a 20-gigabyte iPod and a bottle of Cabernet.

It is important to note that some computers, including my own, contain a hidden, manufacturer-installed hard drive "partition," which houses operating system software that can be deployed in an emergency. But since not all computers have this feature, I chose to use the XP installation disks instead. (Some people will want to upgrade their operating system in the process - from Windows 2000 to Windows XP, for example - which requires installation disks anyway.)

The first thing Mr. Wagner and I did, since my computer lacked a CD or DVD burner, was to save everything to an external hard drive. (You can buy a plug-and-play keychain drive for $20 to $250, depending on how much storage you want, but an MP3 player also doubles as a nice portable hard drive.) I decided to use my iPod, which was only half full.

I simply plugged it into my laptop (it shows up as an "E" drive under My Computer), and copied onto it all of the files contained in My Documents, My Pictures and My Music. I then transferred the contents of my iPod to Mr. Wagner's desktop, on which we created a folder called Backup. The process took about 90 minutes.

Then, using Mr. Wagner's DVD burner, I saved the entire Backup folder onto a five-gigabyte DVD. (If you are not so lucky as to know someone with a DVD burner, you can do the same thing using a regular CD burner and several CD's, which typically hold about 700 megabytes each, or many, many Zip disks, which hold 250 megabytes each.) I could have simply kept my files on the iPod or another external hard drive and transferred them back to my pristine hard drive after the procedure was over, but it would have been riskier, and I would have ended up with no backup discs.

Now I had a backup of everything. Make that two: Mr. Wagner believes in what he refers to as "Noah's archiving," saving two copies of everything, just in case.

Then I took a deep breath, toasted the New Year, and inserted the XP Pro CD-ROM installation disks into my own computer. My computer asked me if I wanted to reformat my hard drive (yes), and warned me that if I continued all files would be deleted (good). It took about an hour for XP to reformat my hard drive and install itself, and I just sat back and watched while the screens became progressively more colorful.

When my computer rebooted, it had total amnesia. It was like the Kate Winslet character in "Eternal Sunshine of the Spotless Mind," who has brain surgery to erase the memories of a painful relationship. My computer asked me to enter my time zone, country and type of Internet connection I would be using (LAN, dialup, etc.). It thanked me for buying an I.B.M. and asked if I wanted to register my product. (I said I would do it later.)

Now that I had a clean slate, I went online and downloaded all of the XP patches and updates from Microsoft's Web site (windowsupdate.microsoft.com). I made sure I connected to the Internet using an external router with a built-in firewall - after all this, I did not want spyware to sully my pristine hard drive.

I plugged my computer into Mr. Wagner's network, and downloaded all of the necessary Microsoft updates, including Service Pack 2, and restarted my computer. This step took about 40 minutes. Now it was 12:30 a.m., so I thanked Mr. Wagner for his help and went home.

The following morning, I was ready to reinstall all of my software. In keeping with the hypervigilant theme, I started with Norton AntiVirus. After installing it, restarting, and scanning my computer, I was elated to discover I had a clean bill of health. Not a rogue program in sight!

Emboldened by this development, I reinstalled all of my programs - Microsoft Office, iTunes, FinalDraft - and all of my external components, like my printer, camera, CD burner and iPod. Fortunately, I had all of my software discs and their necessary registration codes in a file cabinet next to my desk. The drivers for the external components were not even needed because XP can recognize just about anything and procure the necessary driver online.

The software installations took about eight hours over the course of two days, and involved downloading certain things, like Adobe Reader and Mozilla Firefox, from the Web. Between each installation, I restarted my computer, which made this process annoying and time-consuming. (For those who have tons of software, the prospect of reinstalling everything might be worse than the idea of peacefully coexisting with spyware.)

Finally, it was time to upload all of my saved files. I plugged in my iPod, and just for good measure, deleted "Me Against the Music" from my music library before putting my songs back on iTunes. After all, it's almost 2005, and I did not want any ill-gotten gains to taint my perfect computer.

Two weeks later, still no spyware. Yes, it was a huge production, but after struggling with spyware for the last six months, I have to say it was well worth it.


Copyright 2004 The New York Times Company

Wednesday, December 29, 2004

Amazon Customer Support Telephone Number

Amazon.com refuses to put it's customer support telephone number on it's website. This link contains the number.

Tuesday, December 28, 2004

Monday, December 27, 2004

Clean Software

This site hosts links to many categories of no cost software that are supposedly free of adware, spyware etc. Cleansoftware.org

Monday, December 20, 2004

DVD Player / Recorder Buying Gude

Tech Buying Guide: DVD Players and Recorders
Washington Post
Tuesday, December 7, 2004; 3:31 PM

DVD players: Buying a DVD player shouldn't be a problem these days, but understanding all the features crammed into it may be.

Almost all the under-$100 models you'll see in stores pack in former top-of-the-line extras such as progressive-scan output -- plug the player into a high-definition television with the right cables and you'll get a notably sharper picture -- and MP3 compatibility, meaning they can play MP3 files that you've burned to CD with a computer (many DVD players also support Microsoft's Windows Media Audio format). Photo support is almost as widespread; look for a "JPEG" label on the front, short for the Joint Photographic Experts Group standard that defines digital pictures, and you'll know that the player will display photo files on data CDs—handy for the next time you want to show off vacation pictures to friends.

If you're an audiophile or suspect you might become one, look for three different higher-fi standards. HDCD (High Definition Compact Disc) support brings out some extra details in compatible CDs. SACD (Super Audio Compact Disc) is a would-be-successor to the CD format; if you've bought a remastered Rolling Stones album lately, you already own an SACD (those discs include an SACD layer and a regular CD layer for existing players). Last, and least relevant, there's DVD-Audio, which allegedly offers the same ultra-high-fidelity sound as SACD, but which has had a slower start. (Both SACD and DVD-Audio have gone approximately nowhere in the non-audiophile market, which is why these details aren't worth losing sleep over.)

DVD recorders: Some DVD players can also record. This year, prices of DVD recorders plummeted through the $300 barrier, but this particular market remains in the grip of one of the most senseless format wars ever. There are still three largely incompatible rewriteable formats around: DVD-RW, DVD-RAM and DVD+RW.

I'm puzzled as to why. Two of the three formats suffer major defects: DVD-RAM offers the most flexible recording options (almost like a disc-based version of TiVo), but can't be played on almost all existing DVD players, while DVD-RW doesn't allow easy editing or erasing of discs (unless you select a special recording mode that makes them about as unplayable on older DVD hardware as DVD-RAM). DVD+RW isn't perfect, but it does let you erase one recording among others on a disc without wiping the entire disc, and it should work in almost all DVD players made since 2000 or so. (If you don't need to re-record on a disc, there are only two standards to choose from; both DVD-R and DVD+R should work quite well.)

Bonus features to look for on a DVD recorder: A hard disk drive for short-term time-shifting, and an "IR blaster" that mimics the remote control units for your cable and satellite boxes, allowing you to program recordings.

Sunday, December 19, 2004

Another Guide To Safer Computing

New Computer? Six Steps to Safer Surfing

By Rob Pegoraro
Washington Post
Sunday, December 19, 2004;

To see the e-mail I get every day from readers about security issues is to develop a deep discomfort with the state of computing today. Keeping a Windows PC safe can demand a high degree of vigilance -- if cars needed the same constant care and feeding, the Beltway would revert to a country byway.

And yet all these attacks by viruses, worms, spyware and browser hijackers could have been prevented with some initial effort. It's completely feasible to put a computer on the Internet -- even one running Windows, the most attacked, least secure operating system around -- and never suffer a single successful attack.

Here's what to do to make that possible, starting -- as many people will this week -- when you take it out of the box and plug it in. Most of these steps apply only to Windows, but some pertain to Mac OS X as well.

Step one is to barricade your Internet connection with a firewall. Without this, network worms such as Blaster can try to sneak onto your computer the instant it goes online, even if you don't run a single Internet program.

On any Windows XP machine running Microsoft's Service Pack 2 update, a firewall should be on already. (If a new Windows computer doesn't have SP2, as evidenced by a Security Center control panel, take it back to the store -- there's no excuse for that not to be preinstalled.) On an older Windows machine, open the Network Connections control panel, right-click the icon for your connection, click the Advanced tab and click the checkbox under Internet Connection Firewall.

On a Mac, the built-in firewall must be switched on: Open the System Preferences window, select the Sharing category and then click the Firewall tab.

Step two is to download and install every security patch available. Don't do anything else online until the process concludes. In Windows, select Windows Update from the Start Menu's All Programs listing; in Mac OS X, select Software Update from the Apple-icon menu. Then set your computer to download future fixes automatically (you should need to do this only in pre-SP2 versions of Windows XP, where you'd open the System control panel and click the Automatic Updates tab).

The next three steps apply only to Windows; Mac users can skip ahead.

Step three is to activate and update the antivirus software on your computer. Most new PCs include only 90 days of updates, after which your protection will evaporate -- without a rap sheet on the latest viruses, your antivirus software can't identify them. Find out when your free coverage will end, then make a note in your calendar to renew your subscription before then. (If paying $20 or so for a year of virus protection bugs you, try repairing an infection.)

Step four is to update three core Internet programs, since older versions can suffer from security flaws. Get the latest versions of Microsoft's Windows Media Player (www.microsoft.com/windowsmedia/), RealNetworks' RealPlayer (www.real.com) and Sun Microsystems' Java software (www.java.com).

Step five is a big one: Download the free Mozilla Firefox Web browser (www.mozilla.org) and use that instead of Microsoft's Internet Explorer whenever possible. Firefox is not only simpler and more convenient than Internet Explorer, it's also much more secure -- since it's not hooked so tightly into Windows, it can't act as a transmission belt for viruses. And by not running Microsoft's ActiveX software, Firefox blocks a common route for spyware.

One thing you don't need to worry about on the Web -- contrary to what some security programs suggest -- is browser cookies. These small, inert text files are placed on your computer by most Web sites to customize your use of them; for example, The Post's site uses cookies to store registration info. These site-specific cookies are harmless.

Other, "third-party" cookies are set by ad networks to track ad viewership across multiple sites. They also pose no security threat. They do raise some privacy issues, but they can be easily blocked by any new browser without impeding your Web use. In either case, fretting over the nonexistent threat of cookies is a pointless distraction.

The sixth and last step is to use the most effective security mechanism ever invented, the human brain. In two words, be skeptical. Don't open unexpected e-mail attachments -- even if they come from a friend's e-mail address, since viruses scour infected PCs for e-mail addresses to impersonate. If you get an e-mail allegedly from your bank, ignore any links in it; log in by typing the bank's address into your browser yourself.

Most important, think twice about adding new, unknown software. What makes a program trustworthy? If a computer-savvy friend or a trusted publication says it's safe, that helps. If the program is available as "open source," meaning its programming code is free for anyone to inspect, that's another selling point.

If, after all these precautions, a malicious program does find its way onto your computer, Windows users can try using the System Restore utility to reset the computer to an older configuration (go to the Start Menu, select All Programs, then scroll up to the Accessories folder, then select its System Tools sub-folder). You can also limit the ability of other people to install software by giving them separate user accounts with limited access rights (select the Users system-preferences pane on a Mac, the User Accounts control panel on Windows).

But there is no replacement, on any computer, for common-sense caution, the same thing that keeps people safe in the face of far worse dangers in the real world

Wednesday, December 15, 2004

A Guide To Safe Computing

In this CNET article Bruce Schneir provides some excellent suggestions for keeping your computer safe.

Who says safe computing must remain a pipe dream?

By Bruce Schneier


I am regularly asked what average Internet users can do to ensure their security. My first answer is usually, "Nothing--you're screwed."

But that's not true, and the reality is more complicated. You're screwed if you do nothing to protect yourself, but there are many things you can do to increase your security on the Internet.

Two years ago, I published a list of PC security recommendations. The idea was to give home users concrete actions they could take to improve security. This is an update of that list: a dozen things you can do to improve your security.

General
Turn off the computer when you're not using it, especially if you have an "always on" Internet connection.

Laptop security
Keep your laptop with you at all times when not at home; treat it as you would a wallet or purse. Regularly purge unneeded data files from your laptop. The same goes for PDAs. People tend to store more personal data--including passwords and PINs--on PDAs than they do on laptops.

Backups
Back up regularly. Back up to disk, tape or CD-ROM. There's a lot you can't defend against; a recent backup will at least let you recover from an attack. Store at least one set of backups off-site (a safe-deposit box is a good place) and at least one set on-site. Remember to destroy old backups. The best way to destroy CD-Rs is to microwave them on high for five seconds. You can also break them in half or run them through better shredders.

Operating systems
If possible, don't use Microsoft Windows. Buy a Macintosh or use Linux. If you must use Windows, set up Automatic Update so that you automatically receive security patches. And delete the files "command.com" and "cmd.exe."

Applications
Limit the number of applications on your machine. If you don't need it, don't install it. If you no longer need it, uninstall it. Look into one of the free office suites as an alternative to Microsoft Office. Regularly check for updates to the applications you use and install them. Keeping your applications patched is important, but don't lose sleep over it.

Browsing
Don't use Microsoft Internet Explorer, period. Limit use of cookies and applets to those few sites that provide services you need. Set your browser to regularly delete cookies. Don't assume a Web site is what it claims to be, unless you've typed in the URL yourself. Make sure the address bar shows the exact address, not a near-miss.

Web sites
Secure Sockets Layer (SSL) encryption does not provide any assurance that the vendor is trustworthy or that its database of customer information is secure.

Think before you do business with a Web site. Limit the financial and personal data you send to Web sites--don't give out information unless you see a value to you. If you don't want to give out personal information, lie. Opt out of marketing notices. If the Web site gives you the option of not storing your information for later use, take it. Use a credit card for online purchases, not a debit card.

Passwords
You can't memorize good enough passwords any more, so don't bother. For high-security Web sites such as banks, create long random passwords and write them down. Guard them as you would your cash: i.e., store them in your wallet, etc.

I'm suspicious to the point of near-paranoia about e-mail attachments and Web sites.

Never reuse a password for something you care about. (It's fine to have a single password for low-security sites, such as for newspaper archive access.) Assume that all PINs can be easily broken and plan accordingly.

Never type a password you care about, such as for a bank account, into a non-SSL encrypted page. If your bank makes it possible to do that, complain to them. When they tell you that it is OK, don't believe them; they're wrong.

E-mail
Turn off HTML e-mail. Don't automatically assume that any e-mail is from the "From" address.

Delete spam without reading it. Don't open messages with file attachments, unless you know what they contain; immediately delete them. Don't open cartoons, videos and similar "good for a laugh" files forwarded by your well-meaning friends; again, immediately delete them.

Never click links in e-mail unless you're sure about the e-mail; copy and paste the link into your browser instead. Don't use Outlook or Outlook Express. If you must use Microsoft Office, enable macro virus protection; in Office 2000, turn the security level to "high" and don't trust any received files unless you have to. If you're using Windows, turn off the "hide file extensions for known file types" option; it lets Trojan horses masquerade as other types of files. Uninstall the Windows Scripting Host if you can get along without it. If you can't, at least change your file associations, so that script files aren't automatically sent to the Scripting Host if you double-click them.

Antivirus and anti-spyware software
Use it--either a combined program or two separate programs. Download and install the updates, at least weekly and whenever you read about a new virus in the news. Some antivirus products automatically check for updates. Enable that feature and set it to "daily."

Firewall
Spend $50 for a Network Address Translator firewall device; it's likely to be good enough in default mode. On your laptop, use personal firewall software. If you can, hide your IP address. There's no reason to allow any incoming connections from anybody.

Encryption
Install an e-mail and file encryptor (like PGP). Encrypting all your e-mail or your entire hard drive is unrealistic, but some mail is too sensitive to send in the clear. Similarly, some files on your hard drive are too sensitive to leave unencrypted.

If the secret police wants to target your data or your communications, no countermeasure on this list will stop them.
None of the measures I've described are foolproof. If the secret police wants to target your data or your communications, no countermeasure on this list will stop them. But these precautions are all good network-hygiene measures, and they'll make you a more difficult target than the computer next door. And even if you only follow a few basic measures, you're unlikely to have any problems.

I'm stuck using Microsoft Windows and Office, but I use Opera for Web browsing and Eudora for e-mail. I use Windows Update to automatically get patches and install other patches when I hear about them. My antivirus software updates itself regularly. I keep my computer relatively clean and delete applications that I don't need. I'm diligent about backing up my data and about storing data files that are no longer needed offline.

I'm suspicious to the point of near-paranoia about e-mail attachments and Web sites. I delete cookies and spyware. I watch URLs to make sure I know where I am, and I don't trust unsolicited e-mails. I don't care about low-security passwords, but try to have good passwords for accounts that involve money. I still don't do Internet banking. I have my firewall set to deny all incoming connections. And I turn my computer off when I'm not using it.

That's basically it. Really, it's not that hard. The hardest part is developing an intuition about e-mail and Web sites. But that just takes experience.


Copyright ©1995-2004 CNET Networks, Inc. All rights reserved.