[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

"Why the DemocRATZ Activist Class Couldn’t Celebrate the Cease-Fire They Demanded"

Antifa Calls for CIVIL WAR!

British Police Make an Arrest...of a White Child Fishing in the Thames

"Sanctuary" Horde ASSAULTS Chicago... ELITE Marines SMASH Illegals Without Mercy

Trump hosts roundtable on ANTIFA

What's happening in Britain. Is happening in Ireland. The whole of Western Europe.

"The One About the Illegal Immigrant School Superintendent"

CouldnÂ’t believe he let me pet him at the end (Rhino)

Cops Go HANDS ON For Speaking At Meeting!

POWERFUL: Charlie Kirk's final speech delivered in South Korea 9/6/25

2026 in Bible Prophecy

2.4 Billion exposed to excessive heat

🔴 LIVE CHICAGO PORTLAND ICE IMMIGRATION DETENTION CENTER 24/7 PROTEST 9/28/2025

Young Conservative Proves Leftist Protesters Wrong

England is on the Brink of Civil War!

Charlie Kirk Shocks Florida State University With The TRUTH

IRL Confronting Protesters Outside UN Trump Meeting

The UK Revolution Has Started... Brit's Want Their Country Back

Inside Paris Dangerous ANTIFA Riots

Rioters STORM Chicago ICE HQ... "Deportation Unit" SCRAPES Invaders Off The Sidewalk

She Decoded A Specific Part In The Bible

Muslim College Student DUMBFOUNDED as Charlie Kirk Lists The Facts About Hamas

Charlie Kirk EVISCERATES Black Students After They OPENLY Support “Anti-White Racism” HEATED DEBATE

"Trump Rips U.N. as Useless During General Assembly Address: ‘Empty Words’"

Charlie Kirk VS the Wokies at University of Tennessee

Charlie Kirk Takes on 3 Professors & a Teacher

British leftist student tells Charlie Kirk facts are unfair

The 2 Billion View Video: Charlie Kirk's Most Viewed Clips of 2024

Antifa is now officially a terrorist organization.

The Greatness of Charlie Kirk: An Eyewitness Account of His Life and Martyrdom

Charlie Kirk Takes on Army of Libs at California's UCR

DR. ALVEDA KING: REST IN PEACE CHARLIE KIRK

Steven Bonnell wants to murder Americans he disagrees with

What the fagots LGBTQ really means

I watched Charlie Kirk get assassinated. This is my experience.

Elon Musk Delivers Stunning Remarks At Historic UK March (Tommy Robinson)

"Transcript: Mrs. Erika Kirk Delivers Public Address: ‘His Movement Will Go On’"

"Victor Davis Hanson to Newsmax: Kirk Slaying Crosses Rubicon"

Rest In Peace Charlie Kirk

Charlotte train murder: Graphic video captures random fatal stabbing of young Ukrainian refugee

Berlin in July 1945 - Probably the best restored film material you'll watch from that time!

Ok this is Funny

Walking Through 1980s Los Angeles: The City That Reinvented Cool

THE ZOMBIES OF AMERICA

THE OLDEST PHOTOS OF NEW YORK YOU'VE NEVER SEEN

John Rich – Calling Out P. Diddy, TVA Scandal, and Joel Osteen | SRS #232

Capablanca Teaches Us The ONLY Chess Opening You'll Ever Need

"How Bruce Springsteen Fooled America"

How ancient Rome was excavated in Italy in the 1920s. Unique rare videos and photos.

Reagan JOKE On The Homeless


Status: Not Logged In; Sign In

Computers-Hacking
See other Computers-Hacking Articles

Title: Kevin Mitnick's Security Advice
Source: Wired
URL Source: http://www.wired.com/news/technology/0,72116-0.html?tw=wn_index_14
Published: Nov 16, 2006
Author: Kevin Mitnick
Post Date: 2006-11-16 07:53:41 by A K A Stone
Keywords: None
Views: 1745
Comments: 2

Editor's note: Ex-hacker Kevin Mitnick came by his security expertise the hard way. In the 1990s, his electronic penetration of some of the biggest companies in the world made him a notorious tech boogieman, and ultimately landed him five years in prison.

Now free and clear, Mitnick has reinvented himself as a computer security consultant and writer. He travels the world teaching organizations how to secure their information in a world of corporate spies and younger versions of himself. He took a break from his jet-setting to share some practical security tips. Clip them and stick them on your parents' refrigerator or your IT administrator's white board.

---

Protecting yourself is very challenging in the hostile environment of the internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses, and exploit them to gain access to your most sensitive secrets.

They can even use your computer to store data like stolen credit-card numbers or child pornography, or to attack another innocent home user or business from your system.

Here's my Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace.

* Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes.

* Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords.

* Use an antivirus product like AVG or Norton, and set it to update daily.

* Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer.

* Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client.

* Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive.

* Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal.

* Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.

* Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS).

* Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA.

Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: A K A Stone (#0)

IMO,:

Don't leave a computer on line when not in use.

Don't have sensative data on any computer that goes on line.

Do purge a computer of spyware several times a day, even between websites sometimes.

Run "HijackThis" for a list of what's currently runing on a computer.

Get to know everthing that runs on the computer. Easier to spot a trojan.

"If I thought this war was to abolish slavery, I would resign my commission, and offer my sword to the other side." --Ulysses S. Grant

cwrwinger  posted on  2006-11-16   8:24:20 ET  Reply   Trace   Private Reply  


#2. To: A K A Stone (#0)

Use an antivirus product like AVG or Norton, and set it to update daily.

I have never found a virus or trojan on any of my computers using Norton (fully updated).

I find stuff daily using software that is free.

My newest computer, I don't even run Norton. And so far, all I can say is what a waste of money.

"If I thought this war was to abolish slavery, I would resign my commission, and offer my sword to the other side." --Ulysses S. Grant

cwrwinger  posted on  2006-11-16   8:30:56 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com