How Early Viruses Spread from Computer to Computer

In the mid-to-late 1980s, data was most often transferred from computer to computer by using floppy disks and so-called bulletin board systems (BBSs), managed online locations that were the forerunners of today’s Web sites. Stowing away on floppy disks Even without using the Internet, people in offices where PCs were used traded and circulated programs, … Read more

Using Public Computers

Public libraries, Internet cafes, and other customer-serving establishments have their own computers that customers may use to access the Internet. Are these computers safe for you to use? Tales abound of public-access computers infected with viruses, spyware, and even key loggers, many deliberately planted there in order to elicit information from unsuspecting users. I recall … Read more

Blocking Spyware

Spyware is a wide-reaching term that describes software used to monitor your Internet usage patterns, as well as software that can attempt to change your Internet browser configuration, or even record keystrokes (Virginia, the hackers want your bank account and other online passwords). Most spyware is not malicious in the same way that viruses are, … Read more

Avoiding Spam

Spam is the common name used to describe junk e-mail, or unsolicited commercial e-mail (UCE). Spam is, at the same time, big business for those who create and distribute it and a growing nuisance for its recipients. By being careful how and where you share your e-mail address, you can help to keep your e-mail … Read more

Adding Parental Internet Blockers

These blockers prevent persons from visiting (deliberately or otherwise) Web sites containing particular content, such as violence, hatred, casino gaming, and Barry Manilow. (Kidding there. I think.) The main purpose of these products is to protect children from accidentally or deliberately viewing content intended only for adults. They also prevent you from accidentally bumping into … Read more

Keeping Alternate E-Mail Accounts

It’s more or less inevitable: Over a period of time, many organ-izations are going to collect your e-mail address. And, sooner or later, after signing up for something and providing your e-mail address to this Web site or that Web site, your e-mail address is going to leak to or be purchased by a mass … Read more

Backing Up Your Data

Bad things happen to all people, not just good people. One of the bad things that happens is data loss — one important file, several files, or everything can disappear into cyber-limbo. Here are some common ways it happens: You can simply make some mistake — accidentally deleting data that you can’t get back because … Read more

Hardware firewalls

If you have an “always on” Internet connection, then consider using a hardware firewall. A hardware firewall protects all of the computers and other devices on your network, eliminating the need to install a software firewall on each one. If you’re not convinced that you need a firewall, then consider this: fully one third of … Read more

Protecting Your Computer with a Firewall

Windows computers can be attacked in many ways — and not just with viruses, worms, or Trojan horses. Another popular way to attack a Windows computer is to attempt to communicate to it over any of the network “ports” found on Windows computers. These ports are kind of like TV channels or radio frequencies: Computers … Read more