[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Coming full circle: Subpoena demands FBI return Hunter Biden laptop to Delaware repair shop owner

Famed Signature Room Restaurant in Chicago’s Hancock Tower Suddenly Closes Citing ‘Economic Hardship’

Pakistan: Politicians fight on live debate after Nawaz Sharif’s party leader calls Imran Khan ‘Jewish agent’ and ‘bootlicker’

FBI arrests Proud Boys member who disappeared days before sentencing over role in Jan. 6

Winklevoss twins secretly withdrew $280M in assets before crypto firm collapsed: sources

Leader in Richmond Democrat Party group ARRESTED after posting bomb threat against Andy Ngo Virginia talk

Riley Gaines shares video of trans male violence in school: ‘You can’t hide …’

Connecticut DCF Invites Children To Report On Non-Affirming Parents

Trans activists force anthropologists to cancel conference panel discussing the identification of male and female skeletons

Taiwan Launches the Island's First Domestically Made Submarine for Testing

Bail bondsman Scott Hall takes plea deal in Georgia election interference case

Supreme Court Returns To Mountain Of Cases From Conservative 5th Circuit

Facing A U.S. Anti-Corruption Push In Ukraine, Burisma Demanded Hunter Biden Call Dad

Investigators Subpoena Bank Records Of Hunter, James Biden After Uncovering $20 Million In Foreign Payments

San Diego declares a crisis as feds release thousands into the cit

Democrats sour on Bidenomics as it fails to move the needle for voters

‘Trust the Experts’: 1,600 Scientists Sign Declaration Denouncing Climate Change Hoax

US Refuses to Acknowledge Systemic Use of Torture by Its Armed Forces in Iraq

At the Brink?

As the FCC Revisits Net Neutrality, Let's Remember the Day the Internet 'Ended'

British intelligence in the dock for CIA torture

The End of the Road for the Dollar

Time to end the Fed and its mismanagement of our economy

Thanks to US Policy, CCP Controls Key Resources for US Weapons

Europa, a Girl From West Asia, Raped Again by an American Bull

Brickbat: Just a 'Regular Person'

FTC’s Amazon Complaint: Perhaps the Greatest Affront to Consumer and Producer Welfare in Antitrust History

Julian Simon: Expressing the Imago Dei in Economic Terms

It’s the Beginning of the End of This Whole Phony Economy

Russia Might Call for Extradition of Ukrainian Nazi Honored in Canada, Trudeau Blames Parliament Speaker

New York National Park Site to House Thousands of Migrants in Tent City

Review: Shiny Happy People Charts the Downfall of the Duggar Family

The Problem with a Chicago Municipal Grocery Store

Ukrainian Whoppers

Former major city police detective reveals 50% of SIDS cases happened within 48 hours post vaccine

August border encounters of more than 322,000 highest monthly total in U.S. history

Trump Accuses Pro-Life Groups of Being a Political Liability That Exist to Make Money

MINISTRY SPOTLIGHT: Women’s Resource Medical Centers of Southern Nevada

Washington’s Strategic Overextension

Trump adviser: GOP should ‘end’ primary debates, focus on Biden

When it Comes to Preventing Abuse, are All Churches Equal?

Methodist Community in Religious Freedom Fight Against NJ Regarding Sunday Beach Access

Imperial Footprints in Africa: The Dismal Role of AFRICOM

Biden warns Trump's MAGA 'extremist movement' is a threat to democracy

‘Quiet Crisis’: Food Banks Are Inundated With Requests For Aid As Inflation Bites

Illegal Immigrant Launches Unhinged Assault, Leaves Cop Missing A Body Part

¡Conquista! Illegals Plant Venezuela's Flag on Texas Soil

Biden’s DHSLet 200,000 Illegal Immigrants Fly Directly Into 43 Cities

Korean War Vet Booted to Street to Make Room for Illegal Immigrants

War of Economic Corridors: the India-Mideast-Europe Ploy


Status: Not Logged In; Sign In

Computers-Hacking
See other Computers-Hacking Articles

Title: Kevin Mitnick's Security Advice
Source: Wired
URL Source: http://www.wired.com/news/technology/0,72116-0.html?tw=wn_index_14
Published: Nov 16, 2006
Author: Kevin Mitnick
Post Date: 2006-11-16 07:53:41 by A K A Stone
Keywords: None
Views: 1310
Comments: 2

Editor's note: Ex-hacker Kevin Mitnick came by his security expertise the hard way. In the 1990s, his electronic penetration of some of the biggest companies in the world made him a notorious tech boogieman, and ultimately landed him five years in prison.

Now free and clear, Mitnick has reinvented himself as a computer security consultant and writer. He travels the world teaching organizations how to secure their information in a world of corporate spies and younger versions of himself. He took a break from his jet-setting to share some practical security tips. Clip them and stick them on your parents' refrigerator or your IT administrator's white board.

---

Protecting yourself is very challenging in the hostile environment of the internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses, and exploit them to gain access to your most sensitive secrets.

They can even use your computer to store data like stolen credit-card numbers or child pornography, or to attack another innocent home user or business from your system.

Here's my Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace.

* Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes.

* Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords.

* Use an antivirus product like AVG or Norton, and set it to update daily.

* Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer.

* Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client.

* Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive.

* Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal.

* Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.

* Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS).

* Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA.

Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: A K A Stone (#0)

IMO,:

Don't leave a computer on line when not in use.

Don't have sensative data on any computer that goes on line.

Do purge a computer of spyware several times a day, even between websites sometimes.

Run "HijackThis" for a list of what's currently runing on a computer.

Get to know everthing that runs on the computer. Easier to spot a trojan.

"If I thought this war was to abolish slavery, I would resign my commission, and offer my sword to the other side." --Ulysses S. Grant

cwrwinger  posted on  2006-11-16   8:24:20 ET  Reply   Trace   Private Reply  


#2. To: A K A Stone (#0)

Use an antivirus product like AVG or Norton, and set it to update daily.

I have never found a virus or trojan on any of my computers using Norton (fully updated).

I find stuff daily using software that is free.

My newest computer, I don't even run Norton. And so far, all I can say is what a waste of money.

"If I thought this war was to abolish slavery, I would resign my commission, and offer my sword to the other side." --Ulysses S. Grant

cwrwinger  posted on  2006-11-16   8:30:56 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com