Free Republic
Browse · Search
News/Activism
Topics · Post Article

Skip to comments.

Safe Personal Computing
Bruce Schneier BLOG ^ | December 13, 2004 | Bruce Schneier

Posted on 12/17/2004 6:37:05 AM PST by zeugma

Schneier on Security

A weblog covering security and security technology.

December 13, 2004

Safe Personal Computing

I am regularly asked what average Internet users can do to ensure their security. My first answer is usually, "Nothing--you're screwed."

But that's not true, and the reality is more complicated. You're screwed if you do nothing to protect yourself, but there are many things you can do to increase your security on the Internet.

Two years ago, I published a list of PC security recommendations. The idea was to give home users concrete actions they could take to improve security. This is an update of that list: a dozen things you can do to improve your security.

General: Turn off the computer when you're not using it, especially if you have an "always on" Internet connection.

Laptop security: Keep your laptop with you at all times when not at home; treat it as you would a wallet or purse. Regularly purge unneeded data files from your laptop. The same goes for PDAs. People tend to store more personal data--including passwords and PINs--on PDAs than they do on laptops.

Backups: Back up regularly. Back up to disk, tape or CD-ROM. There's a lot you can't defend against; a recent backup will at least let you recover from an attack. Store at least one set of backups off-site (a safe-deposit box is a good place) and at least one set on-site. Remember to destroy old backups. The best way to destroy CD-Rs is to microwave them on high for five seconds. You can also break them in half or run them through better shredders.

Operating systems: If possible, don't use Microsoft Windows. Buy a Macintosh or use Linux. If you must use Windows, set up Automatic Update so that you automatically receive security patches. And delete the files "command.com" and "cmd.exe."

Applications: Limit the number of applications on your machine. If you don't need it, don't install it. If you no longer need it, uninstall it. Look into one of the free office suites as an alternative to Microsoft Office. Regularly check for updates to the applications you use and install them. Keeping your applications patched is important, but don't lose sleep over it.

Browsing: Don't use Microsoft Internet Explorer, period. Limit use of cookies and applets to those few sites that provide services you need. Set your browser to regularly delete cookies. Don't assume a Web site is what it claims to be, unless you've typed in the URL yourself. Make sure the address bar shows the exact address, not a near-miss.

Web sites: Secure Sockets Layer (SSL) encryption does not provide any assurance that the vendor is trustworthy or that its database of customer information is secure.

Think before you do business with a Web site. Limit the financial and personal data you send to Web sites--don't give out information unless you see a value to you. If you don't want to give out personal information, lie. Opt out of marketing notices. If the Web site gives you the option of not storing your information for later use, take it. Use a credit card for online purchases, not a debit card.

Passwords: You can't memorize good enough passwords any more, so don't bother. For high-security Web sites such as banks, create long random passwords and write them down. Guard them as you would your cash: i.e., store them in your wallet, etc.

Never reuse a password for something you care about. (It's fine to have a single password for low-security sites, such as for newspaper archive access.) Assume that all PINs can be easily broken and plan accordingly.

Never type a password you care about, such as for a bank account, into a non-SSL encrypted page. If your bank makes it possible to do that, complain to them. When they tell you that it is OK, don't believe them; they're wrong.

E-mail : Turn off HTML e-mail. Don't automatically assume that any e-mail is from the "From" address.

Delete spam without reading it. Don't open messages with file attachments, unless you know what they contain; immediately delete them. Don't open cartoons, videos and similar "good for a laugh" files forwarded by your well-meaning friends; again, immediately delete them.

Never click links in e-mail unless you're sure about the e-mail; copy and paste the link into your browser instead. Don't use Outlook or Outlook Express. If you must use Microsoft Office, enable macro virus protection; in Office 2000, turn the security level to "high" and don't trust any received files unless you have to. If you're using Windows, turn off the "hide file extensions for known file types" option; it lets Trojan horses masquerade as other types of files. Uninstall the Windows Scripting Host if you can get along without it. If you can't, at least change your file associations, so that script files aren't automatically sent to the Scripting Host if you double-click them.

Antivirus and anti-spyware software : Use it--either a combined program or two separate programs. Download and install the updates, at least weekly and whenever you read about a new virus in the news. Some antivirus products automatically check for updates. Enable that feature and set it to "daily."

Firewall : Spend $50 for a Network Address Translator firewall device; it's likely to be good enough in default mode. On your laptop, use personal firewall software. If you can, hide your IP address. There's no reason to allow any incoming connections from anybody.

Encryption: Install an e-mail and file encryptor (like PGP). Encrypting all your e-mail or your entire hard drive is unrealistic, but some mail is too sensitive to send in the clear. Similarly, some files on your hard drive are too sensitive to leave unencrypted.

None of the measures I've described are foolproof. If the secret police wants to target your data or your communications, no countermeasure on this list will stop them. But these precautions are all good network-hygiene measures, and they'll make you a more difficult target than the computer next door. And even if you only follow a few basic measures, you're unlikely to have any problems.

I'm stuck using Microsoft Windows and Office, but I use Opera for Web browsing and Eudora for e-mail. I use Windows Update to automatically get patches and install other patches when I hear about them. My antivirus software updates itself regularly. I keep my computer relatively clean and delete applications that I don't need. I'm diligent about backing up my data and about storing data files that are no longer needed offline.

I'm suspicious to the point of near-paranoia about e-mail attachments and Web sites. I delete cookies and spyware. I watch URLs to make sure I know where I am, and I don't trust unsolicited e-mails. I don't care about low-security passwords, but try to have good passwords for accounts that involve money. I still don't do Internet banking. I have my firewall set to deny all incoming connections. And I turn my computer off when I'm not using it.

That's basically it. Really, it's not that hard. The hardest part is developing an intuition about e-mail and Web sites. But that just takes experience.


This essay previously appeared on CNet


TOPICS: Business/Economy; Culture/Society
KEYWORDS: computers; computersecurity; exploit; internetexploiter; lookoutexpress; lowqualitycrap; microsoft; patch; safecomputing; securityflaw; trojan; virus; windows; worm
Navigation: use the links below to view more comments.
first 1-2021-4041-6061-70 next last
As always, Bruce has some good thoughts here. A lot of it would seem to be common sense to me, but given the prevalence of spyware, viruses, and such, perhaps I'm just too much of a nerd to notice.

One suggestion I'd add to his list: Install Linux

1 posted on 12/17/2004 6:37:06 AM PST by zeugma
[ Post Reply | Private Reply | View Replies]

To: rdb3; ShadowAce

Tech Ping


2 posted on 12/17/2004 6:37:44 AM PST by zeugma (Come to the Dark Side...... We have cookies!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

bttt


3 posted on 12/17/2004 6:39:47 AM PST by stainlessbanner
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

Don't use windows, don't use explorer, don't use office... I sense a theme here but I can't put my finger on it.


4 posted on 12/17/2004 6:41:04 AM PST by ChadsDad (If there must be trouble, let it be in my day, that my child may have peace.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

Don't use Outlook or Outlook Express....


5 posted on 12/17/2004 6:41:54 AM PST by ChadsDad (If there must be trouble, let it be in my day, that my child may have peace.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma
And delete the files "command.com" and "cmd.exe."

Afterwards, Create them with Notepad but make them read-only

6 posted on 12/17/2004 6:42:41 AM PST by AppyPappy (If You're Not A Part Of The Solution, There's Good Money To Be Made In Prolonging The Problem.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ChadsDad

I have used Outlook for YEARS, and NEVER had a problem.


7 posted on 12/17/2004 6:47:17 AM PST by TexConfederate1861 (Sic Semper Tyrannis!)
[ Post Reply | Private Reply | To 5 | View Replies]

To: rdb3; chance33_98; Calvinist_Dark_Lord; Bush2000; PenguinWry; GodGunsandGuts; CyberCowboy777; ...

Security Ping


8 posted on 12/17/2004 6:48:10 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: TexConfederate1861

yeah, i'd say for the average user you're fine. the big buisness need to keep some of these process in mind. And they are going to have aditional network security to help cut down on hackers and other leaks.

Now if you started writing articles about how to secure your computer i have a funyn feeling you might single yourself out for an attack to test your theories ;)


9 posted on 12/17/2004 6:49:48 AM PST by tfecw (dolphins are the spawn of evil)
[ Post Reply | Private Reply | To 7 | View Replies]

To: zeugma
Install Linux

I do believe he mentioned that.

10 posted on 12/17/2004 6:50:08 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 1 | View Replies]

To: ChadsDad
Don't use Outlook or Outlook Express....

Thunderbird is go!


11 posted on 12/17/2004 6:52:28 AM PST by Bloody Sam Roberts (All I ask from livin' is to have no chains on me. All I ask from dyin' is to go naturally.)
[ Post Reply | Private Reply | To 5 | View Replies]

To: zeugma
I am regularly asked what average Internet users can do to ensure their security. My first answer is usually, "Nothing--you're screwed."

I'm grateful every time that I am.

12 posted on 12/17/2004 6:53:58 AM PST by Lazamataz ("Stay well - Stay safe - Stay armed - Yorktown" -- harpseal)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma
There's one problem with leaving Windows: hardware support can get iffy very fast in the Linux environment, especially with today's modern multimedia hardware.

If you do continue to run Windows, you should do the following:

1. Make sure Windows is properly patched up to current levels. Check Windows Update at least 3-4 times a week for the latest updates.

2. Run a good firewall, whether hardware based or software based. For software firewalls, the current version of ZoneAlarm (5.5.062.004) is probably one of the best out there.

3. Have a good antivirus program constantly running. There are several good commercial antivirus programs, and there are also free antivirus programs out there, too. Don't forget to look for virus definition updates at least once a day.

4. Run a spyware remover at least three times a week. Programs such as Ad-Aware SE and SpyBot do excellent work, as does the new Yahoo! Toolbar for IE with its built-in spyware remover. Don't forget to get the latest definition updates for spyware removal at least every 3-4 days.

13 posted on 12/17/2004 6:56:02 AM PST by RayChuang88
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

It is possible to memorize high-strength passwords, so that doesn't hold, and DON'T WRITE YOUR PASSWORDS DOWN, especially if you plan to carry them in your wallet! All it takes is you losing your wallet, and not only does the finder have your credit cards and ATM, now they have your passwords too! And don't delete cmd.exe. That's the command-line interface for Windows. You need that now and then.


14 posted on 12/17/2004 6:57:04 AM PST by Little Pig (Is it time for "Cowboys and Muslims" yet?)
[ Post Reply | Private Reply | To 1 | View Replies]

To: zeugma

btt


15 posted on 12/17/2004 7:03:00 AM PST by lilmsdangrus
[ Post Reply | Private Reply | To 1 | View Replies]

FREE PC PROTECTION:
(Not an exhaustive list. Your results may vary. Void where prohibited. For entertainment purposes only. No wagering, please. Whattayawantfernuthin'.)
(Thanks, but "Buy a Mac" doesn't qualify as "FREE PC protection")

16 posted on 12/17/2004 7:04:32 AM PST by martin_fierro (Let's Droll!)
[ Post Reply | Private Reply | To 1 | View Replies]

To: Little Pig
And don't delete cmd.exe. That's the command-line interface for Windows. You need that now and then.

Rename it to something that can't be guessed.

17 posted on 12/17/2004 7:05:54 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 14 | View Replies]

To: martin_fierro
Check out Outpost as a free firewall as well.

You may want to add that to your list.

18 posted on 12/17/2004 7:07:13 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 16 | View Replies]

To: ShadowAce

It only appears to be free for 30 days.


19 posted on 12/17/2004 7:09:23 AM PST by martin_fierro (Let's Droll!)
[ Post Reply | Private Reply | To 18 | View Replies]

To: martin_fierro

No--you can download the previous version totally free.


20 posted on 12/17/2004 7:11:27 AM PST by ShadowAce (Linux -- The Ultimate Windows Service Pack)
[ Post Reply | Private Reply | To 19 | View Replies]


Navigation: use the links below to view more comments.
first 1-2021-4041-6061-70 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
News/Activism
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson