LOGO

PC Security: A Universal Guide

April 7, 2011
PC Security: A Universal Guide

Navigating the Digital Landscape: A Guide to PC Security

The online world presents numerous risks. Threats like trojans, worms, phishing attacks, and pharming are prevalent, creating a potentially hazardous environment for users.

Protecting yourself effectively necessitates both appropriate software solutions and a comprehensive awareness of the various threats that exist.

Introducing "HackerProof: Your Guide to PC Security"

“HackerProof: Your Guide to PC Security” serves as an invaluable resource in this regard. Authored by Matt Smith of MakeUseOf, this guide delivers a clear, detailed, and accessible explanation of PC security principles.

The information presented is objective, ensuring a balanced perspective on the subject matter.

Empowering Yourself Through Understanding

Upon completion of this guide, readers will possess a firm grasp of what constitutes PC security.

Crucially, you will learn the specific actions required to maintain the security of your personal computer.

Knowledge is a powerful defense; equip yourself with the information needed to stay safe online!

Understanding the threats is the first step towards a secure digital experience.

Table of Contents

This document provides an overview of personal computer security, covering threats, preventative measures, and recovery strategies.

§1–Intro to PC Security

Maintaining robust PC security is crucial in today’s digital landscape. The increasing sophistication of cyber threats necessitates a proactive approach to safeguarding personal data and systems.

Protecting your computer isn't just about avoiding viruses; it's about preserving your privacy and ensuring the integrity of your digital life.

§2–The Malware Gallery

Malware encompasses a wide range of malicious software, each with distinct characteristics and objectives. Understanding these different types is the first step in effective defense.

Common forms of malware include viruses, worms, Trojan horses, ransomware, and spyware. Each poses unique risks to your system.

  • Viruses: Require a host file to spread.
  • Worms: Self-replicating and can spread without human interaction.
  • Trojan Horses: Disguised as legitimate software.
  • Ransomware: Encrypts files and demands payment for decryption.
  • Spyware: Secretly monitors user activity.

§3–Innocent Civilizations: The Security of Operating Systems

The operating system (OS) forms the foundation of your computer’s security. Regular updates are vital for patching vulnerabilities and maintaining a secure environment.

Modern operating systems, such as Windows, macOS, and Linux, incorporate numerous security features. However, these features are only effective when kept up-to-date.

Enable the automatic update function within your OS to ensure timely installation of security patches.

§4–Good Security Habits

Adopting safe computing practices is paramount to preventing malware infections. Simple habits can significantly reduce your risk.

Avoid clicking on suspicious links in emails or on websites. Be cautious when downloading files from unknown sources.

Use strong, unique passwords for all your online accounts. Consider using a password manager to securely store and manage your credentials.

§5–Methods of Protection

Several layers of protection can be implemented to enhance PC security. A multi-faceted approach is the most effective.

A firewall acts as a barrier between your computer and the internet, blocking unauthorized access. Ensure your firewall is enabled and properly configured.

Antivirus software detects and removes malware. Regular scans are essential for identifying and eliminating threats.

§6–Choosing Security Software

Selecting the right security software is a critical decision. Consider your specific needs and budget.

Numerous antivirus and internet security suites are available, offering varying levels of protection. Research and compare different options before making a choice.

Look for software that provides real-time scanning, web protection, and email filtering.

§7–Prepare for the Worst - and Backup!

Despite preventative measures, malware infections can still occur. Regular data backups are essential for minimizing data loss.

Back up your important files to an external hard drive, cloud storage, or another secure location. Automate the backup process for convenience.

Test your backups periodically to ensure they are functioning correctly and can be restored when needed.

§8–Recovering from Malware

If your computer becomes infected with malware, prompt action is necessary. Disconnect from the internet to prevent further spread.

Run a full system scan with your antivirus software. Follow the software’s instructions to remove any detected threats.

In severe cases, you may need to reinstall your operating system to ensure complete eradication of the malware.

§9–Conclusion

Maintaining PC security is an ongoing process. Staying informed about the latest threats and implementing proactive measures are crucial for protecting your digital assets.

By adopting good security habits, utilizing appropriate software, and regularly backing up your data, you can significantly reduce your risk of becoming a victim of cybercrime.

1. Intro to PC Security

1.1 What is PC Security?

The phrases “PC security” and “computer security” are remarkably broad. They offer limited clarity, much like many generalized terms.

This stems from the incredibly diverse nature of PC security. It encompasses both dedicated researchers and academics striving to identify and resolve security vulnerabilities across various devices. Simultaneously, a community of technically adept enthusiasts – often self-taught and independent – contributes valuable insights.

PC security is intrinsically linked to broader concepts like network security and Internet security. Most threats targeting your computer rely on the Internet for propagation, and some even exploit flaws in high-level server hardware. However, the typical PC user has limited influence over these larger systems.

Consequently, PC security – understood as protecting your personal computer – adopts a defensive posture. It’s your responsibility to safeguard your system against external threats. This is reflected in the terminology used by security software vendors, employing terms like “firewall,” “blocker,” and “shield” in their marketing.

While intended to clarify the purpose of PC security, these terms can sometimes be misleading. Information from companies selling security software may be biased towards their products, adding to the confusion.

This guide aims to provide an unbiased, detailed, and accessible overview of PC security. Upon completion, you will possess a clear understanding of what PC security entails and, crucially, the steps necessary to maintain a secure PC.

1.2 A Brief History of Computer Viruses

Computer viruses haven't consistently posed a significant threat. The earliest viruses, appearing in the 1970s on nascent Internet networks like ARPANET, were often simple programs, sometimes merely displaying messages on computer terminals.

Viruses didn't become a major security concern until the mid and late 1980s. This era marked several milestones in virus development, including the Brain virus, generally recognized as the first IBM PC-compatible virus. It infected the boot sector of MS-DOS computers, causing slowdowns or rendering them unusable.

hackerproof-your-guide-to-pc-security-1.jpg

As these initial forms of malware gained notoriety, the number of viruses rapidly increased. Skilled individuals saw an opportunity to demonstrate their technical abilities through online mischief. Media coverage of viruses became prevalent in the early 90s, culminating in the first major scare surrounding the Michelangelo virus. Similar to countless viruses that followed, Michelangelo triggered widespread panic about potential data loss. While the panic proved unfounded, it brought malware into the public consciousness.

hackerproof-your-guide-to-pc-security-2.jpg

The widespread adoption of email in the late 1990s ushered in a new phase of malware evolution. This common communication method remains a popular vector for malware distribution, as emails are easily sent and attachments can be disguised effectively. The rise of email coincided with another crucial trend: the proliferation of personal computers. Enterprise networks typically benefit from dedicated security teams, while personal computers are often used by individuals lacking specialized training.

The growth of personal computers created a landscape of vulnerable targets, enabling the emergence of threats like worms, trojans, and phishing attacks. These threats would have been far less effective without the abundance of easily compromised personal systems.

The essential step, therefore, is to avoid becoming a target.

2. The Malware Gallery

2.1 The Traditional Virus or Trojan

Throughout much of computing history, malware has typically spread due to actions taken by the user – a user triggering a virus through a specific action. A common illustration of this is opening an email attachment. The virus, often disguised as a common file type like an image, activates when the user opens it.

Opening the file might cause an error, or it could appear normal, deceiving the user into believing no harm was done. Regardless, the virus’s propagation depended on user interaction, not a flaw in program code, but rather through trickery.

In the late 1990s, this type of malware, frequently referred to as a virus, posed the greatest threat. Many individuals were new to email and unaware that opening attachments could compromise their systems. Email services lacked the sophisticated spam filters and automatic antivirus attachment scanning present today.

While advancements have reduced the effectiveness of email-based viruses, millions still lack security software or readily open attachments. Consequently, this remains a viable attack vector.

As awareness of email viruses grew, virus design became more sophisticated. Viruses now conceal themselves within file types considered safe, such as Excel spreadsheets and PDF documents. Infection is even possible through a web browser when visiting a compromised webpage.

Some users believe avoiding viruses is simply a matter of common sense – avoiding unknown downloads and attachments. However, this view is incomplete. New viruses with evolving infection methods are constantly being developed, necessitating more robust protection.

2.2 Trojans

Trojans, differing from viruses in their payload, can utilize the same infection methods described above. While a virus executes malicious code, a Trojan aims to grant third-party access to a computer’s functions.

Trojans can infect systems through various means, mirroring those used by viruses. Often, viruses and Trojans are collectively termed malware, as some threats exhibit characteristics of both.

2.3 Worms

The term “worm” defines a specific method of virus infection and replication, rather than the delivered payload. However, its unique and dangerous nature warrants a separate category.

A worm is malware capable of infecting a computer without any user action, beyond simply powering on the computer and connecting to the internet. Unlike traditional malware hiding within files, worms exploit network vulnerabilities.

Typically, a worm replicates by sending copies of itself to random IP addresses. Each copy contains instructions to exploit a specific network vulnerability. Upon finding a vulnerable PC, the worm gains access and delivers its payload, then uses the infected PC to continue the cycle.

This leads to exponential growth. The SQL Slammer worm, released in January 2003, infected approximately 75,000 computers within 10 minutes of its release. (Source: Wired)

The term “worm” encompasses a wide range of threats. Some worms exploit email security flaws to automatically replicate via email upon infection. Others have highly targeted payloads. Stuxnet, a recent worm, was believed to be designed to attack Iran's nuclear program. (Source: Bruce Schneier)

While Stuxnet infected thousands of computers, its payload activated only when encountering specific network infrastructure – the type used in Iranian uranium production. This demonstrates how a self-replicating worm can infect systems undetected.

2.4 Rootkits

Rootkits are a particularly insidious form of malware, capable of gaining privileged access and evading standard antivirus scans. The term describes a specific type of payload, and rootkits can infect and replicate using various tactics.

Sony faced criticism when security experts discovered rootkits on music CDs that granted administrative access on Windows PCs, bypassed virus scans, and transmitted data remotely – a misguided attempt at copy protection.

Like viruses or Trojans, rootkit payloads can delete files, log keystrokes, or steal passwords. However, rootkits are more effective at concealing their activities. They can subvert the operating system, disguising themselves as critical system files or even writing themselves into those files, making removal difficult without damaging the OS. (Source: Wired)

Fortunately, rootkits are more complex to develop than other malware. Deeper integration into the operating system increases the risk of bugs that could crash the system or disable antivirus software, defeating the purpose of concealment.

2.5 Phishing and Pharming

Malware in the 1990s appears simplistic compared to today’s threats. Early malware was often created by hackers seeking recognition. While damaging, the impact was often limited to infected computers.

Modern malware is frequently a tool for criminals seeking personal information for identity theft and financial fraud. Phishing and Pharming exemplify this criminal aspect of PC security.

These terms are closely related. Pharming redirects users to fraudulent websites, while phishing harvests private information by impersonating trustworthy entities. These techniques often work in tandem: pharming directs a user to a bogus website used for phishing.

A typical attack involves an email appearing to be from your bank, claiming a security breach and requiring a password change. The link leads to a fake website that requests your username, password, and new credentials. You unknowingly provide this information to criminals.

2.6 Malware – The Catch All

While the aforementioned threats are well-defined, the security landscape is diverse and constantly evolving. This is why “malware” is a frequently used catch-all term for anything attempting to harm your computer or use it for malicious purposes.

Understanding these common threats is the first step towards protecting your system. The next step involves examining operating systems and their role in security.

3. Innocent Civilizations: The Security of Operating Systems

The operating system you utilize significantly influences the malware risks you face and the protective measures available. Typically, malware exploits specific vulnerabilities within an operating system. Code designed to leverage a network flaw in Windows, for instance, cannot compromise OS X systems due to their differing network code.

Similarly, a virus attempting to delete driver files on a Windows XP machine will be ineffective on a Linux system, as the drivers are entirely distinct. It’s reasonable to assert that your operating system choice has a greater impact on your PC’s security than any other single factor.

3.1 Windows XP

hackerproof-your-guide-to-pc-security-10.jpg

Launched in 2001, Windows XP rapidly became Microsoft’s most highly regarded operating system. Its relatively straightforward interface, offering improvements while remaining familiar to users of Windows 95, 98, and ME, contributed to its popularity.

It also proved comparatively lightweight for a new Windows release, and continues to function on older hardware unable to support newer versions. Upon release, Windows XP incorporated notable security enhancements over prior Windows iterations, addressing vulnerabilities that previously allowed easy system manipulation through network accounts or certification errors.

The introduction of Windows Security Center in Windows XP Service Pack 2 further bolstered security, simplifying the process for users to verify anti-malware protection and security update installation. However, being a nearly decade-old operating system, Windows XP has been consistently targeted by hackers.

Its widespread use makes it a prime target for malware seeking to infect a large number of computers. Furthermore, Windows XP lacks many of the advanced security features now standard in Windows 7. Consequently, Windows XP represents the least secure commonly used operating system.

3.2 Windows 7

hackerproof-your-guide-to-pc-security-11.jpg

Windows 7, Microsoft’s most recent operating system, refines the features of the previously criticized Windows Vista (the information presented here largely applies to Vista as well). While not as easily run on older hardware as Windows XP, it introduces numerous new features, including those related to security.

User Account Control (UAC), initially introduced in Vista and also present in Windows 7, is a key example. Despite initial media criticism, even including an advertisement from Apple, UAC is vital for security. It prevents programs from gaining elevated system access without explicit user permission, a capability previously exploited by malware.

hackerproof-your-guide-to-pc-security-12.jpg

Microsoft has also improved the way security information is conveyed to users. The Security Center has been rebranded as Windows Action Center, and it now more effectively delivers important updates and alerts users when action is required. Unpatched security exploits represent a vulnerability regardless of the operating system used.

Windows 7 also reflects a more security-conscious approach from Microsoft compared to the development of Windows XP. This is evident in the significantly fewer security vulnerabilities Microsoft had to address during the first year of Vista’s release compared to XP’s. XP required 65 vulnerability corrections, while Vista had only 36.

Despite these improvements, Windows 7 remains a frequent target for malware due to its popularity. As the most widely used operating system, it logically attracts the attention of malware developers. Therefore, Windows 7 users continue to encounter numerous security threats.

3.3 Mac OS X

hackerproof-your-guide-to-pc-security-13.jpg

Mac OS X maintains a modern feel despite being, at its core, a relatively aged operating system. Its initial release in 2001 makes it comparable in age to Windows XP. However, Apple employs a different update strategy than Microsoft.

While Microsoft typically focuses on major releases every five to six years, Apple has updated OS X eight times since its inception. These releases frequently include security updates, and Apple has gained a reputation for superior security. However, this reputation requires closer scrutiny.

Malware targeting OS X does exist, and Apple must patch security flaws with a frequency similar to Microsoft. A 2004 report by Secunia revealed that Mac OS X experienced 36 vulnerabilities in the previous year, only ten fewer than Windows XP, with a higher percentage exploitable via the Internet. (Source: TechWorld)

More recently, Apple has released numerous significant security patches, including one addressing 134 vulnerabilities. (Source: FierceCIO).

hackerproof-your-guide-to-pc-security-14.jpg

This does not imply that Mac OS X is insecure. Drawing from its UNIX heritage, it requires administrator (“root”) login to modify critical files and settings (Windows UAC is an attempt to replicate this). However, many users mistakenly believe OS X is immune to security threats due to its relative obscurity.

While there is some truth to this, security threats for OS X computers do exist and can be as damaging as those targeting Windows. The security of Mac OS X is also limited by the smaller selection of available security suites.

3.4 Linux

hackerproof-your-guide-to-pc-security-15.jpg

Most PC users have never operated a computer running Linux. Nevertheless, Linux is now more accessible than ever. Free distributions like Ubuntu and Jolicloud offer a robust graphical user interface and provide essential functionality, such as email and web browsing.

Like OS X, Linux requires administrator (“root”) login for changes to important files and settings. Linux also benefits from security through obscurity. The Linux user base is small, and users rarely adhere to a single Linux variant. Subtle code variations across distributions, and custom features added by advanced users, make large-scale attacks on Linux users difficult and unproductive.

The niche nature of desktop Linux complicates discussions about its security. Security vulnerabilities do exist, and patches aren’t always deployed as quickly as on Windows. (Source: EWeek) However, Linux systems are generally impacted by security threats less frequently, and the threats are often less severe.

3.5 A Summary – Which is Best?

In general, Mac OS X and Linux demonstrably outperform Windows in terms of security, measured by the frequency with which users are affected by security incidents. This doesn’t suggest Microsoft is complacent. It simply reflects reality.

Windows remains the most popular operating system, making it the primary target for malware. Conversely, Windows computers have access to superior antivirus software, and Windows Action Center in Windows 7 is unmatched in its capabilities. This suggests Windows users may be more likely to be aware of security issues as they arise, though quantifying this is challenging.

Ultimately, the fact remains that Windows users are statistically more likely to be impacted by malware than users of OS X or Linux.

4. Good Security Habits

4.1 Avoiding the Email Inbox of Doom

Email, once the primary vector for malware distribution, presented a simple threat: a malicious attachment disguised as a legitimate file. Opening such an email meant immediate infection.

While these early methods seem rudimentary now, a return to that era of simpler threats would be welcome. Modern spam filters and antivirus software have significantly reduced the effectiveness of email-based malware.

Most users now understand the risk of opening attachments from unknown senders. However, malware has evolved, employing automated methods to appear trustworthy. For instance, an infected parent’s account might send you an email with a seemingly harmless attachment labeled “Photos from a recent vacation.”

If your parent genuinely took a recent trip, you might not suspect a trick. But a cautious approach is vital. Always confirm the attachment’s legitimacy with the sender before opening it, or scan it with your anti-malware software. Remember, no security solution is foolproof.

Currently, phishing represents the most insidious and challenging threat. Be skeptical of unexpected emails claiming to be from your bank, employer, or other institutions. Legitimate organizations will never request your username and password via email links.

Instead of clicking links in emails, access sensitive information directly through the institution’s official website. For example, view your bank statement by logging into your account on the bank’s main page.

4.2 Using Caution for Safe Surfing

Web surfing inherently carries security risks, a fact often overlooked. While avoiding suspicious downloads is crucial, it’s insufficient for complete protection.

Security exploits frequently stem from vulnerabilities in your web browser or plugins like Java or Adobe Flash. These plugins, while enabling rich web experiences, introduce complexity and potential security holes. Java, Flash, and similar tools require constant patching due to discovered flaws, some allowing attackers to gain full control of your PC.

(Source: ESecurityPlanet)

Malicious websites typically avoid top search results, spreading through spam, instant messages, and social media. However, even reputable websites can become compromised and unknowingly distribute malware.

Maintaining up-to-date web browsers and plugins is your strongest defense against these threats, a topic we will explore further.

4.3 Checking Links – Do They Lead Where You Think?

A strict no-click policy for links isn’t always practical, particularly on platforms like Twitter where links are fundamental.

This creates a dilemma: enjoying social networking while increasing your risk. Furthermore, links are often shortened using URL redirection services, obscuring their true destination.

Fortunately, tools like TrueURL reveal the actual URL before you click. Numerous similar services are available through a quick online search.

4.4 Updating Your Software – The Most Important Step

Software vulnerabilities are frequently exploited by security threats. Caution minimizes exposure, but updating your software is essential for comprehensive protection.

Consider this analogy: forgetting to lock your door is a mistake. While unintentional, it leaves your home vulnerable. Similarly, neglecting software updates leaves your PC susceptible to exploitation.

Just as you’d return home to lock the door, promptly install software updates. Ignoring updates is akin to leaving your door unlocked, inviting potential intruders. While precautions like safes and alarms can help, they don’t replace a locked door.

Therefore, consistently updating your software is arguably the most important security habit you can adopt. While no system is entirely immune, timely updates significantly enhance your security posture.

4.5 Use Antivirus Protection

Despite its obviousness, many tech-savvy individuals dismiss anti-malware software, believing they are immune to threats through careful browsing.

However, as previously discussed, a comprehensive security strategy requires more than just avoiding suspicious emails and websites. A layered approach, including anti-malware suites and firewalls, is crucial.

The range of available security software is vast, offering diverse protection against various threats. Let’s examine the options available to safeguard your PC.

5. Methods of Protection

5.1 Anti-Malware Software

As discussed in chapter 2, various types of malware can compromise your computer. Anti-malware software is specifically engineered to intercept and defend against these threats, focusing on the first three categories outlined previously.

A multitude of anti-malware products are available, each serving the common purpose of detecting and eliminating malware that may have infected your system.

These programs also aim to minimize damage by “quarantining” infected files upon discovery, preventing further spread.

Most anti-malware solutions employ several detection methods. The oldest is signature detection, which scans files for code patterns known to belong to specific malware. While reliable, this method struggles with new threats, as a signature must be added to the software’s database before detection is possible – and a threat is typically unknown until after its release.

“Real time” protection is another popular approach. Instead of relying on signatures, it monitors the behavior of software running on your PC. Unusual activity, such as a program requesting inappropriate permissions or attempting unauthorized file modifications, triggers an alert and intervention.

A newer detection method, found in products like Panda Cloud Antivirus and Norton Internet Security 2010, is cloud protection. This focuses on the origins of malware – specific files and links. When a user encounters a virus, the file name is recorded as a threat, and this information is shared to prevent others from accessing the same malicious content.

Upon threat detection, files are typically “quarantined” to prevent propagation. Removal attempts can then be made, though complete eradication isn’t always guaranteed. However, a quarantined threat generally poses no further risk.

A common criticism of anti-malware software centers on its ability to handle new threats. Malware developers constantly seek ways to circumvent existing defenses, necessitating frequent software updates. Despite this, anti-malware remains valuable, as the number of known threats significantly exceeds those that are unknown.

Careful consideration should be given when selecting anti-malware software, as effectiveness varies considerably. Innovation occurs rapidly, with products like Norton showing substantial improvements over time. For current information and reviews, consult AV-Comparatives (av-comparative.org), a non-profit organization dedicated to objective testing.

5.2 Firewalls

Many serious PC security threats require an active Internet connection to function. While hard drive corruption is problematic, backups can mitigate the damage. However, if sensitive personal information like credit card numbers is compromised, the consequences extend far beyond your PC.

This data theft typically occurs when malware transmits information to third parties via the Internet. A firewall prevents this by monitoring data sent to and from your computer, selectively blocking specific information or, in some cases, completely severing the Internet connection.

Firewalls are crucial for Internet security. Windows includes a built-in firewall, eliminating the need for a third-party solution in many cases. Numerous free options are also available for various operating systems, and Internet Security Suites often incorporate a firewall as part of their package.

Installing and maintaining a firewall is highly recommended. It can limit damage even when anti-malware software fails to detect or stop a threat.

5.3 Rootkit Killers

While anti-malware software aims to detect and quarantine rootkits, their inherent nature often makes detection difficult. Rootkits can embed themselves deeply within critical system files, evading detection and preventing removal.

Dedicated rootkit killers address this challenge. These programs are specifically designed to locate and eliminate rootkits, even those hidden within system files. MalwareBytes Anti-Malware gained prominence for its effectiveness against this type of threat.

Some rootkit killers target specific rootkits, restoring files to default states or carefully deleting malicious code. This is sometimes necessary due to the complexity of certain rootkits and the risk of damaging the operating system.

However, even these solutions aren’t always successful. Some IT professionals prefer a “scorched-earth” approach – reformatting the drive and reinstalling the operating system. This underscores the importance of regular backups, as reinstalling the OS can be faster than attempting rootkit removal.

5.4 Network Monitoring

Home networks offer convenience, enabling quick file transfers and Internet access for various devices.

However, networks are also vulnerable to intrusion, posing both malware and hacking risks. Wireless networks are particularly susceptible, as they broadcast data across the airwaves. Encryption can enhance security, but it’s not foolproof.

Monitoring your network helps identify unauthorized devices. This involves checking the MAC addresses connected to your router against those of your known devices. However, MAC address spoofing is possible, and routers often lack detailed connection logs.

Some Internet security suites provide network monitoring software that maps your network, displays device information, and allows you to control access. This software can restrict new devices or limit access for existing ones.

Network monitoring isn’t essential for everyone. Wired networks and single-computer setups typically don’t require it. However, users with wireless networks or large wired networks may find it beneficial.

5.5 Phishing Protection

As noted in Chapter 2, phishing is a growing and serious security threat. Unlike most previous attacks, phishing targets you directly, using your computer as a tool for criminal activity.

Phishing succeeds due to the high quality of deception employed by scammers. They can create fake online banking portals that closely resemble legitimate sites, potentially tricking users into entering personal information.

While sophisticated, phishing attempts aren’t perfect. Scammers can’t replicate exact email addresses or URLs. Software can quickly identify these discrepancies, which may be difficult for the human eye to detect.

Phishing protection is a relatively new field, with most Internet security suites now including anti-phishing features. Its effectiveness depends on user awareness and technical knowledge. Recognizing subtle differences in URLs or understanding the significance of file extensions like .php requires a certain level of expertise.

If you’re unsure about identifying phishing attempts, consider using free anti-phishing software or investing in an Internet Security Suite with this feature. However, research the software beforehand, as innovation and potential errors are still prevalent in this evolving field.

6. Choosing Security Software

6.1 What Products Offer What Protection?

The preceding chapter outlined crucial protection measures. However, identifying what you require is distinct from locating suitable solutions. The complex marketing surrounding PC security often creates confusion, as companies frequently employ differing terminology for identical features.

hackerproof-your-guide-to-pc-security-28.jpg

Generally, the most fundamental PC security software available is termed antivirus. These products are commonly branded with the company name alongside “Antivirus,” such as Norton Antivirus or AVG Antivirus. Antivirus programs typically align with the anti-malware definition established earlier, targeting viruses, Trojans, rootkits, and similar threats. A firewall, network monitoring, or phishing protection are not usually included with basic antivirus.

An upgrade from basic antivirus is the Internet security suite. Like antivirus software, these suites are often marketed using the company’s name combined with “Internet Security.” These suites generally incorporate a firewall and anti-phishing capabilities, sometimes referred to as identity protection. Some also feature network monitoring. Internet security suites may also offer enhanced anti-malware features, like automatic virus scanning of email attachments.

The highest level of protection is available under various names. Trend Micro utilizes “Maximum Security,” while Symantec brands its offering as “Norton 360.” Products in this tier typically add features lacking in Internet security suites, such as anti-phishing or network monitoring. They also often include advanced backup features to mitigate damage from operating system attacks.

Determining the best option is challenging due to feature variations between companies. Nevertheless, the average user is likely best served by an Internet security suite. Always consult a company’s website to verify the specific features included in each product.

6.2 Free vs. Paid Security

hackerproof-your-guide-to-pc-security-29.jpg

The necessity of purchasing antivirus software is often debated. Antivirus solutions are relatively affordable, especially during sales. Retail stores frequently offer antivirus software, sometimes with a mail-in rebate, and occasionally without. Even with a free initial copy, a yearly subscription fee is typically required, often matching the product’s retail price.

While $40 annually may seem insignificant, it represents a potentially avoidable expense. Effective free antivirus and firewall solutions exist. For instance, Avast! Free Antivirus has undergone testing by AV-Comparatives. Although it never achieved first place, it consistently performed competitively with paid alternatives. In one on-demand test, it detected fewer malware samples than software from Symantec, Trend Micro, and Kaspersky. (Source: AV Comparatives)

hackerproof-your-guide-to-pc-security-30.jpg

Free firewalls are also readily available. Zone Alarm firewall has maintained popularity over time and remains a viable option. Alternatives are offered by companies like PC Tools and Comodo. Free phishing protection and network monitoring solutions are also accessible.

Providing adequate PC protection without cost is achievable, offering obvious financial benefits. However, assembling a combination of free antivirus, firewall, and network monitoring tools may not appeal to everyone. Free security software is often less comprehensive than paid options, sometimes by deliberate design, as companies offering free versions also provide paid upgrades. Avast! Free Antivirus, for example, detects and removes viruses, while the Pro version offers enhanced web threat protection.

6.3 The Ideal Free Internet Security Suite

A comprehensive review of all paid PC security options is beyond the scope of this guide. Readers are encouraged to consult AV-Comparatives for the latest anti-malware effectiveness data. PCMag.com and CNET are also reliable sources for security software reviews.

Information regarding free security software can be more difficult to find, and its lower price point often impacts overall quality. Some free options are not recommended, and caution is advised when downloading from search engines, as some programs may be disguised malware. Beware of pop-up ads claiming virus detections, as the promoted software is often malicious.

To simplify the selection process, I recommend three free programs for comprehensive PC protection.

Avast! Free Antivirus or Microsoft Security Essentials

Several free antivirus programs are available, but Avast! Free Antivirus stands out. It has been tested by AV-Comparatives, achieving an Advanced+ rating in the latest On-Demand test and an Advanced rating in the Proactive test. These ratings are impressive for free software. Avast! Free Antivirus is also relatively user-friendly.

While Avast performs well, its interface could be improved. Microsoft Security Essentials offers a more intuitive experience. It doesn’t rank as highly as Avast in AV-Comparatives testing, but its Advanced rating is comparable to many paid antivirus solutions.

ZoneAlarm Free Firewall

ZoneAlarm gained prominence when it first launched, as many users were unfamiliar with firewalls. Numerous competing free firewalls have since emerged, but ZoneAlarm remains a popular and robust option. Its easy-to-understand interface is a key benefit. The outbound protection it provides is particularly important, preventing malware from transmitting data to third parties.

BitDefender Anti-Phishing

If you prefer not to use the anti-phishing toolbar included with ZoneAlarm, consider BitDefender’s offering. This toolbar, compatible with Internet Explorer and Firefox, provides real-time protection against phishing websites and malicious links in MSN or Yahoo instant messengers.

7. Prepare for the Worst – and Backup!

7.1 The Importance of Backups

While robust PC security measures will shield you from the majority of online dangers, complete protection isn't guaranteed. Malware and security breaches often target specific vulnerabilities, which can be addressed with appropriate countermeasures. However, sophisticated hackers or zero-day exploits – previously unknown threats – can sometimes circumvent even the strongest defenses.

Therefore, maintaining a backup of your crucial data is essential. A backup represents a duplicated copy of your important information, stored in a separate digital or physical location. For instance, copying family photos to a secondary hard drive on your computer constitutes a backup. Similarly, saving those photos onto a CD-ROM and storing it securely in a bank safe deposit box is another form of data backup.

These two examples illustrate a spectrum of approaches. One prioritizes ease of use but offers limited security, while the other emphasizes security at the cost of convenience. Numerous options exist between these two extremes.

7.2 Backup Options

Fundamentally, backing up data involves creating a copy and storing it outside the original location. Utilizing a folder on a secondary internal hard drive is the simplest method. However, this approach isn’t particularly secure, as malware could potentially infect the secondary drive and corrupt files. It also offers no protection against data access via a Trojan horse.

To enhance protection against viruses, isolation from your primary computer is key. The greater the isolation of your backup, the lower the risk of malware compromising it. Considering this, several backup options are particularly noteworthy.

External Hard Drives

An external hard drive, or a USB flash drive for smaller file sizes, provides a straightforward backup solution, provided the drive isn’t constantly connected to your computer. External drives offer rapid data transfer speeds and substantial storage capacity. Many can now replicate the entire contents of an internal hard drive, simplifying the recovery process.

The primary drawback of external hard drives is their plug-and-play functionality. Connecting a drive instantly establishes a connection, potentially allowing malware transfer. If you use an external drive for backups, it’s prudent to scan your PC for malware beforehand.

Optical Formats

Despite being considered somewhat outdated, CD and DVD-ROM discs remain a highly secure backup option. Creating a disc as read-only prevents unauthorized data modification, safeguarding against malware. While requiring a new disc for each backup, CD/DVD-ROMs are readily available and affordable.

Storage capacity is a limitation. Standard CDs hold approximately 650 megabytes, while DVDs offer nearly 5 gigabytes. Blu-Ray discs, the latest common format, can store up to 50 gigabytes on a dual-layer disc, though individual discs are more expensive.

Online Backup

Numerous online backup services, such as Carbonite and Mozy, have emerged in recent years. Even online synchronization services, like Dropbox, can be utilized for online backups. These services provide a secure, off-site location for data storage, offering a high level of security against local malware infections.

However, online backup services are vulnerable to attacks targeting your login credentials. If someone gains access to your username and password, they can access your data. Most services offer limited data restoration capabilities, preventing permanent data loss, but unauthorized access remains a risk.

The cost of online backup can accumulate over time. Carbonite plans start at $54.95 annually, while Dropbox charges $10 per month for 50 gigabytes of storage.

I recommend a combined strategy: an external hard drive or online backup service paired with DVD-ROM discs. The discs should contain your most critical data, such as essential business records.

7.3 Securing Files with Encryption

Encryption is another crucial safeguard for backing up and protecting data. It involves scrambling a file using a specific algorithm, rendering it unreadable without the correct password for decryption. Encrypted files, even if deleted, remain unreadable and are generally secure even when transferred to a third party’s computer.

Encryption’s effectiveness against malware varies. Some malware targets specific file formats and may modify their contents. Encryption can prevent such modifications. However, encryption doesn’t prevent complete file deletion.

If an external hard drive provides backup against data loss, encryption offers protection against data theft. Implementing encryption is relatively straightforward. Windows 7 Ultimate includes BitLocker, and TrueCrypt is a powerful, free encryption program.

Not all users require file encryption. Someone who only uses their computer for simple tasks like solitaire and email may not need it. Encryption is recommended for users who store sensitive data for extended periods, such as past tax records.

7.4 How Often Should I Backup?

Acquiring a backup solution is only the first step; consistent backups are equally important. Many users perform a single backup and then neglect to repeat the process, rendering the recovered data outdated and irrelevant after a security incident.

Backup frequency depends on your computer usage. A family computer used for non-critical files can often suffice with monthly backups. A home office computer handling sensitive client information benefits from weekly or even daily backups.

If you’re employing the two-step strategy outlined earlier, regular backups should be easy to manage. Most external hard drives and online backup services offer user-friendly instructions for quick and painless backups. Weekly to monthly backups are recommended with these solutions.

Don’t overlook optical backups for your most important data, though. These can be performed less frequently – perhaps monthly or less. A family computer might only require yearly backups, such as after completing tax season.

Remember – an outdated backup is a useless backup. These schedules are general guidelines. Exercise your best judgment and consider the consequences of losing access to your files. If you’ve created a new, irreplaceable file, it’s time to back it up.

8. Recovering from Malware

Malware infections are a reality. Despite diligent security practices and a measure of good fortune, you might encounter malware compromising your PC or damaging your files. When prevention fails, transitioning into recovery mode – addressing the aftermath of a malware incident – becomes essential.

8.1 Restoring Your PC

The impact of a malware attack can differ significantly. Some malware may simply attempt to install unwanted software or modify system configurations, while others can render a PC unusable. The extent of the damage will naturally determine the appropriate course of action.

Should you suspect or confirm a malware infection, but your PC remains functional, attempting removal with anti-malware software is a viable first step. Malware often tries to obstruct the installation of removal tools, but this approach is worth pursuing. Security software, like malware itself, isn't infallible; it may fail to respond to removal attempts or struggle with recently updated anti-malware programs.

Manual malware removal is also an option, though increasingly challenging due to evolving malware sophistication. This requires pinpointing the malware's location. Anti-malware software can assist, or you can identify it by examining running processes using a task manager. Once located, delete the offending file. Often, this necessitates booting into a diagnostic mode, such as Windows Safe Mode, and even then, complete deletion can be difficult.

For severe malware damage, a complete system reset is often the most effective solution. Reformatting the hard drive, reinstalling the operating system, and restoring files from a backup, while time-consuming, is often faster and more secure than attempting a complex cleanup. Even successful malware removal doesn't guarantee complete eradication, as malicious code can hide within system files or masquerade as legitimate executables.

8.2 Safeguarding Your Identity

It’s important to remember that not all security threats directly target your PC. Phishing attacks can inflict substantial damage without ever affecting your hardware, and a successful malware infection significantly increases the risk of personal information being compromised.

If your computer has been infected, promptly reset all your passwords from a clean device. This includes accounts for online banking, email, and social media platforms. Malware can log keystrokes, and compromised accounts can have far-reaching consequences, potentially endangering personal relationships or facilitating further malware distribution through your social network.

Following password resets, initiate a credit fraud alert. The three major credit bureaus – Equifax, Experian, and Transunion – can place a security alert or freeze on your credit report, preventing unauthorized access to your credit information. Contact the fraud prevention departments of any credit card used online, as many offer services to temporarily block card usage. If a debit card is involved, contact your bank immediately.

Additionally, if you suspect your Social Security number has been compromised, contact the Social Security Administration. These guidelines are specific to the United States; individuals in other countries should contact the relevant organizations in their respective nations.

Should identity theft occur, swift action is crucial. Contact the affected company or bank, requesting to speak with their fraud prevention department. Document all communication in writing to ensure proper handling of your case.

Filing a police report is also advisable, even if the chances of apprehension are slim. A police report can aid in disputing fraudulent charges on your credit report or card. If one agency is unhelpful, consider contacting another law enforcement jurisdiction.

8.3 Preventing Recurrence

After removing malware, reinstalling your operating system, and securing your personal information, preventing future incidents is paramount.

This typically involves identifying and addressing vulnerabilities in your PC security. This guide should provide a solid foundation for understanding necessary protections. Here’s a quick review:

  • Install anti-malware software
  • Implement a firewall
  • Utilize anti-phishing software
  • Deploy a network monitor
  • Keep all software, including your operating system, updated
  • Regularly back up your important data

Sometimes, infection occurs despite best efforts, due to sophisticated malware or targeted attacks. This doesn't negate the value of prevention; it simply acknowledges that luck plays a role. Continuous vigilance and proactive security measures remain essential.

9. Conclusion

9.1 A Summary of the Issues

Throughout this guide, we’ve covered a significant amount of information regarding PC security. Topics included malware, scams, necessary anti-malware software, and viable freeware options.

It’s crucial to prioritize the security of your personal computer. Despite some users believing “common sense” is sufficient protection, this is demonstrably untrue. Malware can infect systems without user interaction, and phishing attempts are becoming increasingly sophisticated.

Complete protection against all security threats is unattainable. While anti-malware software, firewalls, and other safeguards reduce risk, they don’t guarantee immunity. Therefore, maintaining a current backup of your important data is essential.

Investing in PC security software isn’t always necessary, but a quality paid product often simplifies the process. However, careful consideration is needed when choosing paid software; reading reviews beforehand is vital. The sheer volume of security solutions can be overwhelming, so ensure you fully understand any software you choose.

Ideally, PC security would be straightforward, but this isn’t the case. The complexities surrounding PC protection are likely to increase over time. Malicious actors will continually develop more advanced techniques to compromise systems. Staying informed about current security trends and regularly backing up data remains paramount.

9.2 A Note About Mobile Threats

This guide primarily addresses PC security, defining PCs as desktops, laptops, and netbooks. However, the emergence of devices like iPhones and Android smartphones is reshaping the security landscape.

Currently, security threats targeting these mobile devices are relatively limited. Nevertheless, vulnerabilities exist, and their widespread popularity makes them potential targets for malware.

Threats affecting these devices can also compromise your PC if you connect them, as many users do. Research into mobile device protection is still evolving, and the effectiveness of available anti-malware programs remains uncertain. Treating mobile devices with the same caution as a PC is therefore advisable.

Exercise caution with unexpected communications. For example, if you receive an unsolicited email from your bank, avoid opening it on your mobile device until you can review it with your PC’s anti-phishing tools. Avoid downloading unfamiliar files and visiting untrusted websites.

9.3 Additional Reading

  • 2 Apps To Easily Create Network Firewall Rules For Ubuntu
  • 2 Free Antivirus Programs For Mac OS X
  • 3 Free Firewalls For Windows
  • 3 Smart Tips To Keep Your PC Secure When Downloading Files Online
  • 3 Tools to Test Run Your Antivirus/Spyware Program
  • 4 Elements Of Computer Security That Antivirus Apps Don't Protect
  • 7 Essential Security Downloads You MUST Have Installed
  • 7 Top Firewall Programs To Consider For Your Computer's Safety
  • 10 Must Downloaded Free Security AND PC Care Programs
  • BitDefender Rescue CD Removes Viruses When All Else Fails
  • Manage The Windows Firewall Better With Windows 7 Firewall Control
  • Public Computers Made Safe – Security Tools and Tips

Guide Published: April 2011

#PC security#computer security#cybersecurity#data protection#online safety#security guide