[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

AI is exhausting the power grid. Tech firms are seeking a miracle solution.

Rare Van Halen Leicestershire, Donnington Park August 18, 1984 Valerie Bertinelli Cameo

If you need a Good Opening for black, use this.

"Arrogant Hunter Biden has never been held accountable — until now"

How Republicans in Key Senate Races Are Flip-Flopping on Abortion

Idaho bar sparks fury for declaring June 'Heterosexual Awesomeness Month' and giving free beers and 15% discounts to straight men

Son of Buc-ee’s co-owner indicted for filming guests in the shower and having sex. He says the law makes it OK.

South Africa warns US could be liable for ICC prosecution for supporting Israel

Today I turned 50!

San Diego Police officer resigns after getting locked in the backseat with female detainee

Gazan Refugee Warns the World about Hamas

Iranian stabbed for sharing his faith, miraculously made it across the border without a passport!

Protest and Clashes outside Trump's Bronx Rally in Crotona Park

Netanyahu Issues Warning To US Leaders Over ICC Arrest Warrants: 'You're Next'

Will it ever end?

Did Pope Francis Just Call Jesus a Liar?

Climate: The Movie (The Cold Truth) Updated 4K version

There can never be peace on Earth for as long as Islamic Sharia exists

The Victims of Benny Hinn: 30 Years of Spiritual Deception.

Trump Is Planning to Send Kill Teams to Mexico to Take Out Cartel Leaders

The Great Falling Away in the Church is Here | Tim Dilena

How Ridiculous? Blade-Less Swiss Army Knife Debuts As Weapon Laws Tighten

Jewish students beaten with sticks at University of Amsterdam

Terrorists shut down Park Avenue.

Police begin arresting democrats outside Met Gala.

The minute the total solar eclipse appeared over US

Three Types Of People To Mark And Avoid In The Church Today

Are The 4 Horsemen Of The Apocalypse About To Appear?

France sends combat troops to Ukraine battlefront

Facts you may not have heard about Muslims in England.

George Washington University raises the Hamas flag. American Flag has been removed.

Alabama students chant Take A Shower to the Hamas terrorists on campus.

In Day of the Lord, 24 Church Elders with Crowns Join Jesus in His Throne

In Day of the Lord, 24 Church Elders with Crowns Join Jesus in His Throne

Deadly Saltwater and Deadly Fresh Water to Increase

Deadly Cancers to soon Become Thing of the Past?

Plague of deadly New Diseases Continues

[FULL VIDEO] Police release bodycam footage of Monroe County District Attorney Sandra Doorley traffi

Police clash with pro-Palestine protesters on Ohio State University campus

Joe Rogan Experience #2138 - Tucker Carlson

Police Dispersing Student Protesters at USC - Breaking News Coverage (College Protests)

What Passover Means For The New Testament Believer

Are We Closer Than Ever To The Next Pandemic?

War in Ukraine Turns on Russia

what happened during total solar eclipse

Israel Attacks Iran, Report Says - LIVE Breaking News Coverage

Earth is Scorched with Heat

Antiwar Activists Chant ‘Death to America’ at Event Featuring Chicago Alderman

Vibe Shift

A stream that makes the pleasant Rain sound.


Status: Not Logged In; Sign In

Computers-Hacking
See other Computers-Hacking Articles

Title: Kevin Mitnick's Security Advice
Source: Wired
URL Source: http://www.wired.com/news/technology/0,72116-0.html?tw=wn_index_14
Published: Nov 16, 2006
Author: Kevin Mitnick
Post Date: 2006-11-16 07:53:41 by A K A Stone
Keywords: None
Views: 1392
Comments: 2

Editor's note: Ex-hacker Kevin Mitnick came by his security expertise the hard way. In the 1990s, his electronic penetration of some of the biggest companies in the world made him a notorious tech boogieman, and ultimately landed him five years in prison.

Now free and clear, Mitnick has reinvented himself as a computer security consultant and writer. He travels the world teaching organizations how to secure their information in a world of corporate spies and younger versions of himself. He took a break from his jet-setting to share some practical security tips. Clip them and stick them on your parents' refrigerator or your IT administrator's white board.

---

Protecting yourself is very challenging in the hostile environment of the internet. Imagine a global environment where an unscrupulous person from the other side of the planet can probe your computer for weaknesses, and exploit them to gain access to your most sensitive secrets.

They can even use your computer to store data like stolen credit-card numbers or child pornography, or to attack another innocent home user or business from your system.

Here's my Top 10 list of steps you should take to protect your information and your computing resources from the bad boys and girls of cyberspace.

* Back up everything! You are not invulnerable. Catastrophic data loss can happen to you -- one worm or Trojan is all it takes.

* Choose passwords that are reasonably hard to guess -- don't just append a few numbers to a no-brainer. Always change default passwords.

* Use an antivirus product like AVG or Norton, and set it to update daily.

* Update your OS religiously and be vigilant in applying all security patches released by the software manufacturer.

* Avoid hacker-bait apps like Internet Explorer and disable automatic scripting on your e-mail client.

* Use encryption software like PGP (pretty good privacy) when sending sensitive e-mail. You can also use it to protect your entire hard drive.

* Install a spyware detection app -- or even several. Programs that can be set to run frequently, like SpyCop, are ideal.

* Use a personal firewall. Configure it to prevent other computers, networks and sites from connecting to you, and specify which programs are allowed to connect to the net automatically.

* Disable any system services you're not using, especially apps that could give others remote access to your computer (like Remote Desktop, RealVNC and NetBIOS).

* Secure your wireless networks. At home, enable WPA (Wi-Fi protected access) with a password of at least 20 characters. Configure your laptop to connect in Infrastructure mode only, and don't add networks unless they use WPA.

Hackers are becoming more sophisticated in conjuring up new ways to hijack your system by exploiting technical vulnerabilities or human nature. Don't become the next victim of unscrupulous cyberspace intruders.

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: A K A Stone (#0)

IMO,:

Don't leave a computer on line when not in use.

Don't have sensative data on any computer that goes on line.

Do purge a computer of spyware several times a day, even between websites sometimes.

Run "HijackThis" for a list of what's currently runing on a computer.

Get to know everthing that runs on the computer. Easier to spot a trojan.

"If I thought this war was to abolish slavery, I would resign my commission, and offer my sword to the other side." --Ulysses S. Grant

cwrwinger  posted on  2006-11-16   8:24:20 ET  Reply   Trace   Private Reply  


#2. To: A K A Stone (#0)

Use an antivirus product like AVG or Norton, and set it to update daily.

I have never found a virus or trojan on any of my computers using Norton (fully updated).

I find stuff daily using software that is free.

My newest computer, I don't even run Norton. And so far, all I can say is what a waste of money.

"If I thought this war was to abolish slavery, I would resign my commission, and offer my sword to the other side." --Ulysses S. Grant

cwrwinger  posted on  2006-11-16   8:30:56 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest

[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Mail]  [Sign-in]  [Setup]  [Help]  [Register] 

Please report web page problems, questions and comments to webmaster@libertysflame.com