Advertising
Advertising

8 Keys to Internet Security

8 Keys to Internet Security

8 Keys to Internet Security

    In a recent post, I recommended Panda’s Cloud Antivirus as a decent free antivirus program. Others have recommended different programs, and that’s fine – in the end, I don’t think there’s much meaningful difference between the various antivirus programs, at least in terms of security.

    Much more important than which antivirus program you use (or anti-spyware, or firewall, or any security software), or even if you use one at all, are the practices that make up your online behavior. People who do risky stuff on the Internet will get a virus, sooner or later, regardless of how good their security software is. On the other hand, many security experts don’t use any antivirus software and still manage to avoid viruses.

    I don’t recommend that you follow in the footsteps of the security experts – the nature of their calling demands a kind of paranoia that few of us can maintain. I recommend a solid package of security software (I run Cloud Antivirus and Windows Defender) but only as a safety net – something to pick up the slack when we make mistakes, not a first line of defense.

    Advertising

    The thing with security, online or anywhere else, is that it’s always a trade-off between protection and convenience. I can tell you how to absolutely avoid any risk of computer virus, spyware, or trojan: stay offline and never install anything or use any removable storage media. That’s 100% perfect protection, but it would severely hinder your computer usage. It’s like securing a house: You could build a door-less, window-less titanium-sheathed reinforced-concrete bunker around your house and be absolutely sure burglars couldn’t get in, but you probably wouldn’t want to live there.

    The tips below are sufficient to account for all but the most determined attacks against your computer. No amount of software or behavioral change can protect you from every possible attack (if the NSA wants to get on your PC, they are probably going to do so) but you can protect yourself from virtually all of the attacks you’re likely to face online.

    I owe thanks for most of these tips to Leo Laporte and Steve Gibson, hosts of the TWiT netcast Security Now. If you’re interested in computer security at a very deep level, this weekly show is your ticket, and I heartily recommend it!

    1. Use a router.

    The very nature of the way routers works acts as an effective hardware firewall, preventing access to computers on your home network from outside the network. Put simply, when you request something from the Internet – say, you click a link, check your email, or enter a URL – the router notes which computer on its network the request came from so it can send the reply to the proper recipient. If a would be intruder attempts to enter your network, the router checks its list of outgoing requests and, if none is found correlating to the attackers’ IP address, it ignores it. It basically doesn’t know which computer to send it to, so it throws it out.

    Advertising

    If you simply cannot use a hardware router, make sure your operating system’s firewall is turned on. This is almost, but not entirely, as good.

    2. Do not open email attachments.

    I know, who doesn’t want to see pictures of Anna Kournikova naked, right? Email attachments are a major vector for infecting computers, because it’s so easy to fake the sender so the email looks like it came from someone you know, and everybody loves opening attachments from people they know. It could be a funny picture of penguins, after all. But bottom line, don’t open attachments. If your email client automatically opens or previews them, turn that feature off. Even if it’s from your mom, and even if your mom says she opened it and it’s fine, still don’t open it. (By the way, next time you’re at mom’s, reinstall Windows. She’s got tons of viruses now.)

    Now, I know that sometimes you have to open attachments, so here’s a simple test to know when it is most likely safe to open an attachment:

    1. You know that the email is from the person it says it’s from. That usually means that either they said they were sending it, or they’ve written a note that only they could have written.
    2. You are expecting an attachment from that person.
    3. You know the person who created the file.
    4. There is a compelling reason to open the attachment. I’m sorry, ma, but a good laugh isn’t enough to get me to risk my computer’s security.

    If you can’t be absolutely, 100% sure on all these counts, trash it. 

    Advertising

    3. Do not download bittorrent files.

    That sucks, I know, but since you’re never absolutely sure where the file comes from, where it’s been, or who might have altered it, bittorrent is risky. Downloading a Linux distribution from Ubuntu is probably ok; downloading it from Pirate’s Bay is a bit dodgy. Downloading Oscar screeners of movies that haven’t been released yet is super-duper dodgy. It’s a real shame to have to forego sticking it to The Man because of practical concerns, but you’re taking a big risk downloading an unknown file from an unknown person about whom the only thing you know is that they don’t feel any compunctions about breaking the law. 

    4. Do not download warez, porn, or other dubious files.

    First they came for my bittorrents, then they came for my porn! It just gets worse and worse, doesn’t it. But really, think about it – people who distribute illegal copies of illegally hacked software a) are demonstrated lawbreakers, b) are familiar with programming code, and c) had access to the code you’re expecting to install on your computer. As for porn, while I’m sure there are plenty of Good Samaritans out there who distribute free pornography simply out of a desire for greater happiness in the world, some small number of them do it for financial gain. If they’re giving you free porn, they must be making money off you another way, and one of the easiest is to install a bunch of malware on your computer, run whatever code they want on it, and then sell the use of your computer to spammers, phishers, and other unsavory sorts. You want to know how bad these guys are? They don’t even care if they give pornography a bad name!

    5. Do not download *anything* from sites you’re unfamiliar with.

    Again, if you’re intending to install something you’ve downloaded onto your computer, you have to know that only people you trust have had access to it. Adobe, Microsoft, and other software manufacturers are generally trustworthy, as are sites like C|net’s Download.com. “Bob’s Free Software I Like a Whole Bunch” might not be quite as safe a bet.

    6. Turn off Flash, Javascript, and other browser plugins.

    Flash ads have been used to install viruses. So has Javascript code. You don’t have to do anything to get infected this way; you just visit a site with the malicious code on it and *bam*, you’re infected. Because of that, hardcore security folks turn off Javascript and either block or never install Flash. Personally, I think it limits the usefulness of the Internet too much; I’ve decided to risk running Javascript, and use the FlashBlock plugin in Firefox so I can select which Flash objects on a page I want to run (allowing me, for instance, to watch YouTube videos while preventing Flash ads on the same page from loading).

    Advertising

    7. Do not click links in email.

    It’s very easy to hide the real destination of links sent in email by using HTML where the text reads “www.perfectlysafesiteyouknowandtrust.com” but the actual URL is “www.reallybadsiterunbymeanpeoplewithnofriends.net”. This is how phishing scams work – you think you’re going to PayPal or your bank, but really you’re going to a page designed to look just like your bank’s login page but hosted on the mean people’s server. Also, bad guys often put unique tracking IDs into links, so that they know exactly who clicked on a link – which means that they know which email addresses out of the millions they sent spam to are valid, which makes them worth more money to other spammers. Um, yay?

    7a. Do not click shortened URLs.

    I don’t like this one, because I like Twitter and you lose a lot of functionality if you don’t use a service like bit.ly or is.gd to shorten URLs, but these links are scary. When you hover your mouse over a link, the URL appears in the email or browser’s status bar, meaning you can verify that the link heads to where it says it does. When you do the same with a shortened URL, it just says the shortened URL. There are Firefox extensions like UnTiny that will reveal the true destination of shortened URLs, and some Twitter clients do as well, but until a universal solution is standardized, these URLs remain a bit scary, security-wise.

    8. Install all security updates.

    Unless you’re a multi-national mega-corporation running oodles of mission-critical custom-designed software, you need to install security updates as quickly as possible upon release. If remembering to do this isn’t something you think you’d be likely to do, set your computer to automatically download and install updates. Increasingly, we’re seeing “0-day” exploits – viruses and trojans written to make use of security flaws before those flaws are corrected by – or, in some cases, even known to – manufacturers. Keeping up-to-date is essential to keep even marginally safe.

    I know that, the world being what it is, someone will be thinking right about now, “Hey, why don’t you just switch to Mac OS X or Linux?” It’s true, those operating systems get far fewer viruses and other problems than Windows PCs, but most experts seem to agree that this is at least in part because there are so many Windows PCs and so few Mac and Linux PCs. (There are plenty of Linux servers, but those are under professional supervision, which goes a long way towards making up for any security weaknesses Linux has.) Bad guys program for the system that allows the greatest spread of their malware, and right now, that’s Windows.

    But if you’re still not convinced, I’ve got an even better idea for you. Both Mac OS X and Linux have demonstrated security vulnerabilities, and as they become more common are likely to become targets for hackers. So they’re not really safe bets. Instead, try BeOS! It may be riddled with security holes and only run on Pentium 4 and earlier PCs, but I can guarantee you, nobody is writing viruses for it!

    For everyone else, whether you use Windows, Mac, or Linux, make sure to follow the rules above and, chances are, you’ll be just fine.

    More by this author

    How to Take Notes Effectively: Powerful Note-Taking Techniques Becoming Self-Taught (The How-To Guide) The Science of Setting Goals (And How It Affects Your Brain) The Importance of Reminders (And How to Make a Reminder That Works) Building Relationships: 11 Rules for Self-Promotion

    Trending in Featured

    1 How to Take Notes Effectively: Powerful Note-Taking Techniques 2 How to Stop Procrastinating: 11 Practical Ways for Procrastinators 3 How to Master the Art of Prioritization 4 How to Find Your Passion and Live a Fulfilling Life 5 What to Do in Free Time? 20 Productive Ways to Use the Time

    Read Next

    Advertising
    Advertising
    Advertising

    Last Updated on September 18, 2019

    How to Take Notes Effectively: Powerful Note-Taking Techniques

    How to Take Notes Effectively: Powerful Note-Taking Techniques

    Note-taking is one of those skills that rarely gets taught. Almost everyone assumes either that taking good notes comes naturally or, that someone else must have already taught about how to take notes. Then, we sit around and complain that our colleagues don’t know how to take notes.

    I figure it’s about time to do something about that. Whether you’re a student or a mid-level professional, the ability to take effective, meaningful notes is a crucial skill. Not only do good notes help us recall facts and ideas we may have forgotten, the act of writing things down helps many of us to remember them better in the first place.

    One of the reasons people have trouble taking effective notes is that they’re not really sure what notes are for. I think a lot of people, students and professionals alike, attempt to capture a complete record of a lecture, book, or meeting in their notes — to create, in effect, minutes. This is a recipe for failure.

    Trying to get every last fact and figure down like that leaves no room for thinking about what you’re writing and how it fits together. If you have a personal assistant, by all means, ask him or her to write minutes; if you’re on your own, though, your notes have a different purpose to fulfill.

    The purpose of note-taking is simple: to help you work better and more quickly. This means your notes don’t have to contain everything, they have to contain the most important things.

    And if you’re focused on capturing everything, you won’t have the spare mental “cycles” to recognize what’s truly important. Which means that later, when you’re studying for a big test or preparing a term paper, you’ll have to wade through all that extra garbage to uncover the few nuggets of important information?

    What to Write Down

    Your focus while taking notes should be two-fold. First, what’s new to you? There’s no point in writing down facts you already know. If you already know the Declaration of Independence was written and signed in 1776, there’s no reason to write that down. Anything you know you know, you can leave out of your notes.

    Second, what’s relevant? What information is most likely to be of use later, whether on a test, in an essay, or in completing a project? Focus on points that directly relate to or illustrate your reading (which means you’ll have to have actually done the reading…). The kinds of information to pay special attention to are:

    Advertising

    Dates of Events

    Dates allow you to create a chronology, putting things in order according to when they happened, and understand the context of an event.

    For instance, knowing Isaac Newton was born in 1643 allows you to situate his work in relation to that of other physicists who came before and after him, as well as in relation to other trends of the 17th century.

    Names of People

    Being able to associate names with key ideas also helps remember ideas better and, when names come up again, to recognize ties between different ideas whether proposed by the same individuals or by people related in some way.

    Theories or Frameworks

    Any statement of a theory or frameworks should be recorded — they are the main points most of the time.

    Definitions

    Like theories, these are the main points and, unless you are positive you already know the definition of a term, should be written down.

    Keep in mind that many fields use everyday words in ways that are unfamiliar to us.

    Arguments and Debates

    Any list of pros and cons, any critique of a key idea, both sides of any debate or your reading should be recorded.

    This is the stuff that advancement in every discipline emerges from, and will help you understand both how ideas have changed (and why) but also the process of thought and development of the matter of subject.

    Advertising

    Images

    Whenever an image is used to illustrate a point, a few words are in order to record the experience.

    Obviously it’s overkill to describe every tiny detail, but a short description of a painting or a short statement about what the class, session or meeting did should be enough to remind you and help reconstruct the experience.

    Other Stuff

    Just about anything a professor writes on a board should probably be written down, unless it’s either self-evident or something you already know. Titles of books, movies, TV series, and other media are usually useful, though they may be irrelevant to the topic at hand.

    I usually put this sort of stuff in the margin to look up later (it’s often useful for research papers, for example). Pay attention to other’s comments, too — try to capture at least the gist of comments that add to your understanding.

    Your Own Questions

    Make sure to record your own questions about the material as they occur to you. This will help you remember to ask the professor or look something up later, as well as prompt you to think through the gaps in your understanding.

    3 Powerful Note-Taking Techniques

    You don’t have to be super-fancy in your note-taking to be effective, but there are a few techniques that seem to work best for most people.

    1. Outlining

    Whether you use Roman numerals or bullet points, outlining is an effective way to capture the hierarchical relationships between ideas and data. For example, in a history class, you might write the name of an important leader, and under it the key events that he or she was involved in. Under each of them, a short description. And so on.

    Outlining is a great way to take notes from books, because the author has usually organized the material in a fairly effective way, and you can go from start to end of a chapter and simply reproduce that structure in your notes.

    Advertising

    For lectures, however, outlining has limitations. The relationship between ideas isn’t always hierarchical, and the instructor might jump around a lot. A point later in the lecture might relate better to information earlier in the lecture, leaving you to either flip back and forth to find where the information goes best (and hope there’s still room to write it in), or risk losing the relationship between what the professor just said and what she said before.

    2. Mind-Mapping

    For lectures, a mind-map might be a more appropriate way of keeping track of the relationships between ideas. Now, I’m not the biggest fan of mind-mapping, but it might just fit the bill.

    Here’s the idea:

    In the center of a blank sheet of paper, you write the lecture’s main topic. As new sub-topics are introduced (the kind of thing you’d create a new heading for in an outline), you draw a branch outward from the center and write the sub-topic along the branch. Then each point under that heading gets its own, smaller branch off the main one. When another new sub-topic is mentioned, you draw a new main branch from the center. And so on.

    The thing is, if a point should go under the first heading but you’re on the fourth heading, you can easily just draw it in on the first branch. Likewise, if a point connects to two different ideas, you can connect it to two different branches.

    If you want to neaten things up later, you can re-draw the map or type it up using a program like FreeMind, a free mind-mapping program (some wikis even have plug-ins for FreeMind mind-maps, in case you’re using a wiki to keep track of your notes).

    You can learn more about mind-mapping here: How to Mind Map: Visualize Your Cluttered Thoughts in 3 Simple Steps

    3. The Cornell System

    The Cornell System is a simple but powerful system for increasing your recall and the usefulness of your notes.

    Advertising

    About a quarter of the way from the bottom of a sheet of paper, draw a line across the width of the page. Draw another line from that line to the top, about 2 inches (5 cm) from the right-hand edge of the sheet.

    You’ve divided your page into three sections. In the largest section, you take notes normally — you can outline or mind-map or whatever. After the lecture, write a series of “cues” into the skinny column on the right, questions about the material you’ve just taken notes on. This will help you process the information from the lecture or reading, as well as providing a handy study tool when exams come along: simply cover the main section and try to answer the questions.

    In the bottom section, you write a short, 2-3 line summary in your own words of the material you’ve covered. Again, this helps you process the information by forcing you to use it in a new way; it also provides a useful reference when you’re trying to find something in your notes later.

    You can download instructions and templates from American Digest, though the beauty of the system is you can dash off a template “on the fly”.

    The Bottom Line

    I’m sure I’m only scratching the surface of the variety of techniques and strategies people have come up with to take good notes. Some people use highlighters or colored pens; others a baroque system of post-it notes.

    I’ve tried to keep it simple and general, but the bottom line is that your system has to reflect the way you think. The problem is, most haven’t given much thought to the way they think, leaving them scattered and at loose ends — and their notes reflect this.

    More About Note-Taking

    Featured photo credit: Kaleidico via unsplash.com

    Read Next