Desktop security: A contrarian view

Monday, 17 November 2003, 7:00 AM EST

My computers may be a public menace. They don't have anti-virus software installed, or outgoing firewalls. They are on all the time and connected to the Internet 24/7. Their auto update feature is turned off permanently. I download anything and everything. But I've only had two viruses since 1988, one each on Mac and Windows. Both came from diskettes. This is all wrong, isn't it? My computers should be infested with noxious code bursting out to every computer within pinging distance.

But they're not. They have no viruses and no trojans because I pay very close attention to all the files and processes on each. All software installs are "custom" if that option is provided. I watch the process list and kill anything that is not familiar until I've identified what program its associated with. The Windows registry entries for "Run" frequently turns up interesting tidbits. And all the really important or sensitive files are located on or backed up to a Linux server set up with Mandrake's "higher" setting.

[ Read more ]




Spotlight

Attackers use reflection techniques for larger DDoS attacks

Posted on 17 April 2014.  |  Instead of using a network of zombie computers, newer DDoS toolkits abuse Internet protocols that are available on open or vulnerable servers and devices. This approach can lead to the Internet becoming a ready-to-use botnet for malicious actors.


Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.
  



Daily digest

Receive a daily digest of the latest security news.
  

DON'T
MISS

Fri, Apr 18th
    COPYRIGHT 1998-2014 BY HELP NET SECURITY.   // READ OUR PRIVACY POLICY // ABOUT US // ADVERTISE //