Most Home PC Users Lack Security 349
Ant writes "CNET News.com and MSNBC report that a survey of home personal computer (P.C.) users found 81 percent lacked at least one of three critical types of security. However, the number of consumers using firewalls and updated antivirus software is improving, according to a report released Wednesday. The vast majority of consumers surveyed were found to lack at least one of three types of critical security--a firewall, updated antivirus software or anti-spyware protection, according to a report by America Online and the National Cyber Security Alliance. Of this group, 56 percent had no antivirus software, or had not updated it within a week, while 44 percent did not have a firewall properly configured, according to the report. Meanwhile, 38 percent of survey respondents lacked spyware protection..."
lacking security? (Score:5, Funny)
Re:lacking security? (Score:5, Funny)
Re:lacking security? (Score:5, Funny)
Re:lacking security? (Score:5, Insightful)
Or, they probably mean they just follow what is written here @ this URL below, taking the 1/2 hour to implement its techniques (fully explained):
http://www.avatar.demon.nl/APK.html [demon.nl]
THEN, you get what you stated & it works, on Windows 2000/XP/Server 2003, no questions asked.
Using it, you simply are "closing the doors" to it being possible, or AS POSSIBLE as the default setup of various Win32 OS (specifically NT/2000/XP, since Windows Server 2003 follows much of what is stated in that article) is not as 'strong' as it can be proofing your system vs. various threats online!
(I've been using that setup for years now, & not a single infection because of it - that, & being saavy about opening attachments in emails from folks you know & trust ONLY, & the same with programs you may download also.)
Between good practices, patching your OS + apps (time consuming but worth it) keeping them up-to-date, as well as running antivirus/antispyware that covers email & filesystems AND, not accepting attachments from strangers on networks like IRC) & doing what's in that article step-by-step, you're pretty solid security-wise.
* Keep that all in mind, & you don't get nailed by malware/spyware/virus, etc.- et all, period. Especially patching/updating your apps & libs your apps &/or OS call - they too, in their API's & code, can be vulnerable as well as the core OS files & functions.
By the way - Here @ slashdot not TOO long ago, there was an article stating Windows & Linux security was "neck & neck", see here:
http://linux.slashdot.org/article.pl?sid=05/07/14
APK
P.S.=> By the way, there are more secured versions of Linux available as well, such as SELinux:
http://www.nsa.gov/selinux/ [nsa.gov]
The point it even exists, means that Linux' default installs from other vendors DO present possible avenues of infections/infectors also in their default setup... and, Linux DOES have infectors specific to it as well, see here:
http://linux.slashdot.org/article.pl?sid=05/11/08
"Linux Lupper.Worm In the WIld"
Nuff said! Worms, virus', &/or malware's out there for Linux as well as Win32 OS, period... hence, doubtless part of the "WHY" SELinux exists @ all!
apk
Re:lacking security? (Score:5, Insightful)
Re:lacking security? (Score:5, Informative)
Start right here @ "the horses mouth" for Windows NT-based Os':
http://support.microsoft.com/default.aspx?scid=kb
(That's a starting point for BOTH Tcp & NetBT & that tends to be "NT/2000 centric" but, most of it applies to Windows XP/Server 2003 as well!)
Here are more, & the very ones I used to define & understand the
Microsoft Windows Server 2003 TCP/IP Implementation Details MAIN PAGE:
http://www.microsoft.com/technet/prodtechnol/wind
Microsoft Windows Server 2003 TCP/IP Implementation Details Parameters:
http://www.microsoft.com/technet/prodtechnol/wind
SECURITY CONSIDERATIONS FOR NETWORK ATTACKS:
http://www.microsoft.com/technet/archive/security
TCP Transport Entries (all esoteric/unusual settings found here):
http://support.microsoft.com/kb/q102973/ [microsoft.com]
TCP/IP Exploits and Countermeasures for Windows 2000 Server:
http://www.microsoft.com/technet/security/guidanc
Network Hardening and Security - Packet filtering Udp/Tcp - PortsAllowed + EnableSecurityFilters:
http://www.microsoft.com/technet/security/guidanc
Prevent Session Hijacking
http://www.microsoft.com/technet/technetmag/issue
ADDITIONAL REGISTRY SETTINGS - FOR AFD SETTINGS (ESPECIALLY):
http://www.microsoft.com/technet/security/guidanc
FOR TUNING PARAMETERS FOR SPEED FOR CABLEMODEM/DSL vs. 57.6k/33.6k/28.8k/14.4k DIALUP MODEMS:
http://www.speedguide.net/ [speedguide.net]
* ENJOY! Those will define the settings altered/hardened & also explain EACH in detail as needed for your reference.
APK
P.S.=> What's in my initial URL is years of research since the NT 4.x-2000 days, & still works/applies to XP/Server 2003, & has had any added info. possible for them as well as the older NT-based OS' also... apk
Re:lacking security? (Score:3, Insightful)
I think it might take your average windows user half an hour to understand all the words in the TITLE of each link.
Just because it's easy for you, with years of experience, does not mean it's easy for everyone. No way in hell I could get my parents to do those steps, even if I explained it in very general terms why it was SOOO good for them.
Sometimes making a better choice that is more secure by default means you don't
Bad metric (Score:5, Insightful)
Re:Bad metric (Score:2, Insightful)
They can be efficient at deflecting standard threats, but without the other half of the software protection coin (anti-viral) they are lacking.
When recommending a firewall for home users, try to explicitely push for a hardware layer
Re:Bad metric (Score:2)
Also anti-virus has nothing to do with firewalls, they are for different security threats.
Re:Bad metric (Score:2, Insightful)
If you run a seperate hardware firewall then to change the settings
Re:Bad metric (Score:4, Interesting)
If you run OpenBSD at securelevel 1 or above then even root is not able to modify files who have their system immutable flag set - a category into which pf.conf often falls. If you run at securelevel 2 then no program can modify the NAT or firewall rules. I tend to run at securelevel 2, and it doesn't seem to get in my way other than requiring an extra reboot when I upgrade my kernel (I need to reboot to set the securelevel to -1 before I can modify the kernel).
Re:Bad metric (Score:3, Insightful)
Yes.
If so, doesn't this get tedious, especially if you are using it in an enterprise "Sorry folks, no internet access for 5minutes while we change permissions.
No. At the enterprise level, you tell your users to fark off. There are standard ports and permissions that cover just about everything. All web traffic to the proxy first, then to the world. New web sites are added at the pr
Re:Bad metric (Score:2)
Re:Bad metric (Score:4, Informative)
Re:Bad metric (Score:2)
I like the fact that my hardware firewall/router blocks any unsolicited incoming connection, but I wish I could use it to control which applications get to send data out.
I'm currently using a software firewall for this, however one thing I don't like about it is that it doesn't tell me which ports an application is using. I only know if an application wants to send data across the network or not. I remember I got hit with the MSBLAST worm. I immediately realized I w
Re:Bad metric (Score:2)
Personally, I think ISPs are to blame for the lack of security out there. They are the ones hooking DSL and Cable modems out there directly to machines. They should offer cheap routers to their customers.
Re:Bad metric (Score:5, Insightful)
I don't open attachments, I only install software that I have researched and found to be spyware-free, I don't use Internet Explorer, I keep Windows XP updated, and I stay educated on the latest exploits/threats out there.
I think that for the average user who isn't willing to make a commitment to these things, legalistic use of security tools is necessary, but the study incorrectly assumes that "no antivirus" = "p0wned".
Re:Bad metric (Score:5, Funny)
Re:Bad metric (Score:2)
If it were directly connected to the internet, I would view that machine as hopelessly insecure. Hell, if I checked my email on that machine, I would consider it hopelessly insecure.
But since I don't check my email on that box, and I don't browse the web on that box, and since it's downs
Re:Bad metric (Score:2, Interesting)
The last time I saw my cousin's laptop it was so stuck on something that it wouldn't even manage to
Re:Bad metric (Score:2)
Re:Bad metric (Score:2)
Whenever I tried an anti-virus, they caused performance degradation far worse than any spyware I ever caught and never found any virus so I always uninstall anti-virus software as soon as I am done with my occasional scan - new versions will be out by the time I scan again anyway. As for spyware and the rest, I now usually install and test software on a spare PC before putting it on my laptop and primary desktop - worst case I can simply re-image the spare PC's drive if something n
Auditing Tools Don't Need to Hurt Performance (Score:2)
Real-time scanners can, indeet, hurt performance. Most people wouldn't notice a performance hit in most applications & the scanners can be temporarily suspended for applications which are exceptions. A non-realtime scan can be done at any time when performance doesn't matter & would provide you with some measure of safety.
I would be surprised if the aggressive adware/spyware progr
Re:Bad metric (Score:4, Funny)
Tell me about it.
For security and performance reasons for my car I had to do a number of things. I have replaced the default engine with a more powerful one. I have installed bulletproof glass. I have reinforced the undercarriage and roof and and doors to curtail an assault. I have runflat tires. The air intake extends 6 feet off the ground in case of flooding. I take it weekly back to the 3rd party "fixer upper" guy to make sure everything is still in tact. I always travel in the middle of a six car convoy to buffer myself from the front and behind. And I surely reinforced the firewall between the engine and the interior of the car.
I don't have to wear a bulletproof vest because of these precautions, and I have never been shot that I know of.
I think that for the average driver who isn't willing to make a commitment to these things, legalistic use of armor is necessary, but the study incorrectly assumes that "no armor" = "dead".
Oh, BTW, for security on my computers I just plug my Mac into the wall and either use a wired or wireless network connection. After all I go through traveling from point A to B, why would I screw around with my computer?
Re:Pick one, dammit (Score:3, Funny)
Agreed (Score:5, Insightful)
The only retroactive solution I think is worthwhile these days is spyware scanning your box once a week. And rotate which scanner you use.
On the other hand, there is A LOT you can do not to get spyware and viruses in the first place. First, DON'T USE IE. All the fanboys will cry foul here, but it's true. I don't care if alternative browsers are just as hackable but they aren't being exploited blah blah blah... We'll cross that river when we get to it. For now, using almost anything besides IE will stop the bulk of your spyware. Also, in whatever browser you use, don't allow in browser media to be played. Flash, movies, music, etc etc. Or at the very least, make sure it prompts you first so you have the choice to only do so from websites you trust. Also, don't go to sketch sites. Plain and simple. Let's see... don't use outlook, EVER. In your MUA make sure it it either doesn't display html or prompts you to do so. Don't open attachments. It's stupid. It's so incredibly easy to spoof who you are via email that you can really never fully trust an email. Don't use AIM. There are AIM viruses left and right nowadays. Use an alternative like gaim or trillion and never accept to transfer files.
More than anything, just be smart about where you go and what you do. Understand that the internet really isn't a safe place. Security isn't a product, it's a process. I can't stress this enough. Doing certain things yourself will keep you safer than any anti-virus ever could.
Re:Agreed (Score:2, Interesting)
Who are the people best qualified to research and write viruses? Antivirus writers.
Or, more appropriately (considering chicken vs. egg):
Who are the people best qualified to research and write antivirus software? Virus writers.
Is antivirus software really antivirus software? No. It's really virus tracking software. At some level in these A/V companies these programmers are playing a game of
Re:Agreed (Score:2)
I agree with all of your points and I can suggest one more: don't run in max. privileges mode. In Windows, this means run as a limited user, rather than Administrator. In Linux, this means use a non-root account. The vast majority of Windows problems stem from the fact that all programs have the ability to do anything they please by default, since the default account is at Admin. privileges.
Re:Bad metric (Score:2)
Firewalls are quickly becoming obsolete. Everything tunnels over HTTP anyways today, or spreads via e-mail, etc.
What a firewall is is a safety net. It blocks connections to stuff that shouldn't listen anyways, just in case. A few years from now, the firewall will be gone, so deeply integrated into the TCP/IP stack that it's simply a config option there.
However people will still buy "Firewalls", because the term's evolving. What is sold as a firewall today simply isn't. It's tw
Re:Bad metric (Score:3, Funny)
C. "But I need a firewall!"
U. "No. You have a router."
C. "But I need the Anti-Adware/Spyware/Hacker/Spam/Terra/Flash-Flood protection!"
U. "No. I installed a plain antivirus program and Firefox."
C. "But what if I get worms from my compu-- Hey, how come the start menu opens when I click it now? I usually click it, make a martini, and by the time I come back I my popup blockers
Re:Bad metric (Score:5, Interesting)
Re:Bad metric (Score:4, Insightful)
--
Q
Re:Bad metric (Score:2, Insightful)
Re:Bad metric (Score:3, Funny)
I don't. I just replaced my doorbell with one that plays a nice pretty version of Westminster Chimes. I want to get my money's worth out of it. I don't answer the door in order to get a chance to hear it again several seconds later.
The nice thing about this doorbell is that it's protected from the "Rapid Button Pusher"(tm). It won't respond to a ring attempt again until it's done playing the first tune.
Podcasting (Score:5, Interesting)
Hmmm.... (Score:2, Funny)
Congratulations... (Score:2, Informative)
Re:Congratulations... (Score:2)
Missing security component (Score:3, Insightful)
Re:Missing security component (Score:2)
The funny thing is, I think the security companies are partially inventing a market based on fear-mongering. I ran without a virus scanner for 18 months and d
Re:Missing security component (Score:2)
Aaron Margosis' blog [msdn.com] is a great place to learn tricks for running as limited user. I use his PrivBar so that I can identify which IE and Explorer windows are running with elevated privileges. From his site, I was able to figure o
Re:Missing security component (Score:2)
Re:Missing security component (Score:5, Insightful)
Adware and spyware can still be downloaded in Firefox or Opera.
When someone tells you they just inheritied money and need your help in order to get the cash, your response is browser-independent.
You can even be using a Firefox, anti-virus, firewall, and anti-spyware tools at work - but leave your password on a Post-It on the monitor for anyone to see.
The problem isn't Internet Explorer. It's the people.
How can that be? (Score:4, Funny)
Re:How can that be? (Score:2)
Best Free A/V? (Score:3, Interesting)
xoxo,
boomgopher
Re:Best Free A/V? (Score:5, Informative)
Re:Best Free A/V? (Score:2, Informative)
Re:Best Free A/V? (Score:3, Informative)
AVG is good, but I vote clamwin. [clamwin.com] It seems every bit as effective as the others and it plays real nice [technologynewsdaily.com]with winpooch [sourceforge.net]. Winpooch is a free antispyware detector that checks for hooking (the registry scanning isn't great, but if you have active spyware, winpooch will get it).
As a bonus both of them are open source.
Re:Best Free A/V? (Score:3, Informative)
Re:Best Free A/V? (Score:5, Informative)
Re:Best Free A/V? (Score:2)
The only time I've returned are when husbands (typically) start hitting porn sites
Re:Best Free A/V? (Score:2)
Thanks, (Score:2)
kthxbye,
boomgopher
Doesn't this fall into the.... (Score:2, Insightful)
Patrick
NCSA? (Score:5, Informative)
There is nothing to see here (Score:5, Insightful)
Home computing has evolved just like personal motoring has.
Seat belts and safety features in cars used to be an addon luxury that not many people had or used, now every car comes with them and airbags and strengthening supports as standard.
Spyware protection is a new tact, and should really be dealt with in the same malicious software category viruses fall into - it basically uses the same engine, and its only the AV companies themselves who made a distinguisher between installed with vague permission and none whatsoever.
Re:There is nothing to see here (Score:2)
This is why MS installed it with SP2 (Score:3, Insightful)
Metric choice ? (Score:4, Insightful)
Antivirus, antispyware ? What do you mean ? Is that only in the New Oxford American Dictionary ?
Re:Metric choice ? (Score:2)
What do you mean there isn't anything? How will I protect myself? I don't even have a software firewall switched on?
Help, I'm running about like a headless chicken with only bullshit from politicians and stupid "security" companies to read...... I had better rush off and sign the petition to allow the government to run my life for me. It's
and this will be true as long as it's "optional" (Score:5, Insightful)
You shouldn't need an external firewall to protect your machine from hostile incoming connections -- your machine shouldn't be listening on ports it doesn't need to, and when it does listen, it shouldn't be possible for incoming connections to subvert it. You shouldn't need add-on antivirus software -- your machine should have a basic "immune system" of its own and shouldn't be vulnerable to the effects of running untrusted external code.
It is possible to design operating systems that are inherently secure in these ways. One of the larger crimes committed by the designers of the currently-popular consumer-grade operating systems is to have convinced large swaths of the population, via ubiquitous, crashing mediocrity, that it's somehow an "impossible" problem. It was largely a solved problem 20 years ago, if anyone had listened.
Re:and this will be true as long as it's "optional (Score:2)
- 1 computer running Mac OS X
- 1 computer running Ubuntu Linux
- 1 ISP-provided router/NAT box
I have software update on a weekly (Mac) or daily (Ubuntu) basis. I have two levels of firewalling. I always run as simple user and my passwork is asked whenever I need root/admin privileges.
So yes, I believe that the problem has been solved for the home user !
Re:and this will be true as long as it's "optional (Score:2)
If you're talking about Vaxen et al....those computers sucked.
They didn't have IM, they didn't have IE, they didn't play games over UDP. As far as the modern day consumer is concerned, there was not a single useful application on them.
It simply isn't fair to expect modern machines to hold up to the standards of security that their simpler predecessors did. My pocket calculator is also immune to viruses and trojans (although I'll bet th
Re:and this will be true as long as it's "optional (Score:5, Informative)
The GP wasn't referring to Vax or Unix machines of 20 years ago with regard to their simplicity. It referred to the fact that security was a solved problem on those machines. You yourself go on to say:
The thing really worth noting in your statement is that OS X uses a >20-year-old security system. It's using Unix permissions, straight from the BSD core of the system. The same BSD core used in the NeXTStep operating system a little under 20 years ago (albeit slightly upgraded since then).
Individual software packages, particularly those designed to listen for commands from the network and execute things locally (ssh, etc.) can have the sort of issues you decribe in your last paragraph; As they get more complex, the task of maintaining security does potentially also become more complex. But on an operating system level, there have been sufficient rules in effect for a long long time now. For instance, just saying "this can only be done with root privileges" and "root privileges can only be gained interactively, and on a one-shot basis" will cover a vast amount of potential issues, and is pretty much what OS X does, as you describe (albeit with slight timeouts to root privileges, rather than pure one-shot operation -- although that timeout is user-configurable).
At the end of the day, MS-DOS, QDOS, and such, left that out in the interests of expediency, size, and (maybe) end-user perceived complexity/ease-of-use. It then became a standard. I like to quote my boss on this one:
He tells me that, having worked with Unix/BSD/Vax -level machines in the late seventies, when the IBM PC came out, he and his cohorts were interested to see it. They took one look and put it down as a failure -- a joke, even -- because it lacked so much of what they saw in their current machines. Unfortunately, it became the standard, in the process setting back the state of the art by many years.
Not least is the point that Unix/Vax systems were inherently multi-user systems, and they needed a robust way of preventing one user from destroying another's data. So this was built in from the very start. MS-DOS and QDOS didn't have this capability, so the standard became that any program had full access to just about anything. The only high security implemented was in the CPU itself, where a system trap was needed to get access to 'Ring 0' (privileged) instructions. On top of this, the somewhat limited nature of the system itself led many programmers -- used to working on a more capable OS -- to make modifications to the core system, to help their stuff work. That required privileged access to the system, in order to install hooks, drivers, and so on.
Of course, once this became a standard, it was hard to change that behaviour, and it never was changed because 'backwards compatibility' was the highest goal. So when mutli-user functionality was built into Windows 9x/NT, privileged operation became the norm. People logged in as an administrator, because their programs were designed needing full access to the system, and little or no provision was made for interactive temporary privilege escalation within the OS itself. Unlike Unix/BSD, you couldn't just ask the user for an admin user & pass to get the privs needed to put some file somewhere special, and then lay down those privileges when you were done with them.
As a result, you get the horrible mess we're talking about: An IM program that can corrupt the core operating system and ultimately gain access to privileged-mode CPU cycles? WTF? A game that can modify the system kernel, or the boot sector of the hard disk? They can only do that because the system lets them, or because the system won't let them do some small operation without high privileges, and requires that the entire process runs with those privileges as a result.
-Q
And they shouldn't have to (Score:3, Insightful)
Why should they need a firewall? The OS simply shouldn't have dozens of unneeded services that listen on the network on by default.
The sad fact is that the OS most people are using lacks basic security out of the box. Acting as if it was the users falt won't make this simple fact go away.
Gentoo user is guilty too! (Score:2)
I run Gentoo GNU/Linux and I do not run a firewall, or have virus or spyware protection. But, I have few open ports that can be jacked with, so the firewall is unnecessary. Viruses can't do much. I run my programs (email, browser, etc.) as a regular user so if a malicious program managed to execute it wouldn't be able to do much to the system. Same goes for the system servers that run as 'nobody'. Spyware is not a problem with free software because malicious source code will not easily get into my distribut
These tools are not as important (Score:2)
I really hope that these tools are band-aids that go away in a few years once systems like IE don't have so many vulnera
Metrics slightly skewed (Score:2)
Mac and Linux users obviously should still have a hardware firewall, but anti-virus and anti-malware scanners? Don't need them (yet, anyway).
Family Security (Score:5, Informative)
Lack of Anti-Virus
Most of the time I tried to hammer it into thier heads that spending $40 now would save them a ton of heartache later. If I was EXTREMLY lucky, I could persuade them to go out and buy the software from Staples, bring it back to us, and we'd install it on thier new machine before it ever left our store and it's own defenses. Most of the time however I'd install the trial version of norton or mcafee, inform them that THEY MUST get the full version before the trial period is over, and STILL see the goddamn thing within two months, loaded with enough viruses to call it the PC version of Typhoid Mary.
The part that sucked was that inspite of a verbal warning, a piece of paper taped to the computer and the monitor warning them that they NEED anti-virus programs, they still came to me with "Well why the @#$% didn't you tell me about this?"
Firewall
Actually this is no longer as much of a problem as it used to be now that we're seeing broadband and multiple computers in a house becoming the norm. We used to sell Linksys routers and that became a strong defense. Myself personally I run Norton Internet Security behind my Symantec Firewall/VPN appliance for a two pronged defense and so far I've yet to be broken into (although I've logged a ton of port sniffing attack attempts).
The third problem is Spyware.
At least this one is easy to fix. I usually install Spyware Doctor on the system that came into my shop and clean out the system (then uninstalling it unless the customer wanted to buy a license from PC Tools), then I'd install the free programs out there (Ad-Aware and Spybot Search and Destroy) to protect them in the future.
Spyware has never been too much of an issue for my customers because I could install a free program and if they ever had a problem I could talk them through the programs over the phone. For the most part that was all they needed so it wasn't too bad of a problem.
It's nice to see that more and more people are getting concerned about security. Just a little effort and a small investment and your computer can be safe with a minimum of fuss.
Re:Family Security (Score:2)
Who was surveyed? (Score:3, Insightful)
Amazing... now who was surveyed? Are Linux and Mac users concerned by the survey? Or they aren't worthy of the title "home PC users"? That's like 10% of the home PC userbase that would probably answer "no" to all three types of security. But wait, the report is carried by MSNBC ? Ah, all makes sense now.
Bah, methinks the whole article is shameless self-promotion, marketing bullsh*t if you will:
The improvements were attributed to the default firewall that is installed with Windows XP Service Pack 2, according to the survey.
Re:Who was surveyed? (Score:2, Funny)
Amazing... now who was surveyed? Are Linux and Mac users concerned by the survey? Or they aren't worthy of the title "home PC users"?
Everyone knows that "PC" == "Windows". Duh.
PCs should contain Defenses (Score:5, Informative)
For those who need some free help:
http://free.grisoft.com/doc/2/lng/us/tpl/v5 [grisoft.com] (AVG anti virus)
http://www.zonelabs.com/store/content/company/pro
http://www.lavasoftusa.com/software/adaware/ [lavasoftusa.com] (Ad-Aware adware/spyware detection)
http://www.safer-networking.org/en/download/ [safer-networking.org] (SpyBot S&D adware/spyware detection)
http://www.microsoft.com/downloads/details.aspx?F
I can't say I'm surprised... (Score:2)
The machines run like dogs, slower than the 300Mhz machine I have which happily
Re:I can't say I'm surprised... (Score:2)
-R
I guess that's me, too (Score:2)
But I don't use ant
What about Norton? (Score:2, Funny)
No security???? (Score:2, Funny)
In other news (Score:2, Funny)
Re:In other news (Score:2)
Ahem, "I for one welcome are new home pc security overlords"
"In soviet Russia, security software installs YOU"
Who are the worst of getting it to be worse? (Score:2)
Because It Is a Mess (Score:2)
Why are these things optional? Very few use the exploits found all over XP in constructive way so why ask "Do you want to do this?" Why are warnings obscure and scary? A user doesn't like a little yellow flashing shield in their window. They will like i
stringent metric biases report (Score:4, Interesting)
I don't have this crap I have something better (Score:2)
I would fail the test, but still never be a victim, like most of the people with the crap installed. I have installed common sense in the user of the machine (myself), and it is the best defence, and it even works against most zer0-day exploits.
Most Slashdot Articles Rehashing the Obvious (Score:5, Insightful)
Bug writes "CNN and Al Jazerra reported in a joint statement that a survey of slashdot articles found that 81% of them lacked at least on of the three critical contents of a newsworthy report. However, the number of dupes has been recently improving, according to a report released yesterday."
Ok, really. Everyone with even the slightest interest in computer security knows that there's not much that's easier than taking over a dozen or so home PCs. Why else, do you think, do prices for botnets range in the cents-per-machine range? Because it takes maybe one cent of effort to break into the average home machine, otherwise those selling the botnets wouldn't be turning a profit. It's probably more expensive keeping other botnet harvesters out than getting in in the first place.
How to support your friends and family (Score:2)
Like I'm sure many other people on Slashdot, I get asked by friends and family (and even friends of friends or family) to help fix problems on their computers. I was happy to do this for a while, but it started getting annoying when people would phone me up during the middle of the working day with problems, or wouldn't take my advice but still expected me to help them when things went wrong.
But now I have a solution - move to Apple Mac, and then tell people you can't support them unless they use Mac becaus
Wow, I am shocked... (Score:2)
Keeps me in business (Score:3, Interesting)
Anyway, I'd say 95% of my PC clients have problems with spyware. They have no clue what it is or what to do about it. I think these ISPs should do a better job of educating these people when they sign up. They should also install spyware/virus firewalls. Hell, we have no problems at my office with that kind of thing.
Cheap pr0n! [videobox.com]
Insecure by design (Score:2)
That's me! (Score:2)
These people do not know security! (Score:2)
For MS-Win users, the real issue is _NOT_ presence or lack of these additional software products. The first and most important step is privilige isolation: STOP RUNNING WITH ADMIN PRIVS! Second comes understanding your sw and not using it dangerously. For MS-IE or MS-Outlook, that means not using it at all. Third, is keeping your system patched. MS-WIndows Update d
No shit. (Score:2, Funny)
How does antivirus software make you secure? (Score:2)
So, with such crappy options, I just don't run any anti-virus. But that doesn't make my PC insecure -- it's probably safer that 95% of all PCs out there that are running Norton/McAffee/whatever.
If y
In this Post 9/11 World. . . (Score:3, Insightful)
When the Fear mechanism is activated, particularly when there is no actual critical event occurring, (like running from a tiger), for which the fear drug pumping through our veins is preparing us to deal with. . , when we buy into the fear and there is no release, we end up in a perpetual state where we are much more open to certain suggestions which lack rational grounding.
"We're going to take your rights away and allow police searches in your living room. Okay? Terrorists! Viruses! Crackheads with guns!"
As has been pointed out, it's interesting that this story comes from MSNBC.
As an aside. . . My computer runs clean and sweet with just a simple little fire-wall. (And what an overly dramatic name is 'Firewall' for a program which asks me if I want to allow things access to my modem). I don't need any of that other junk; Virus scanners are for people who run Windows 2K and up and who open email attachments, which I don't. And Anti-Spyware is for people who run Kazaa and Google tool bars and other nonsense programs.
I mean, come on.
The Voice of Authority telling us that we home users need to run around like panicking headless chickens looking for 'security' on our writing desks?
Silly.
-FL
I blame the ISP's (Score:2, Insightful)
At least here in the UK there is a trend for ISP's to bundle USB DSL Adapters with their packages. These devices require that the computer they connect to use the public IP address instead of allowing the host computer to run from a private NAT address. Exposing the computers real public IP address puts the responsibility on the user to install and maintain firewall software. Needless to say many don't know how to do this or simply allow their se
Most don't know any better (Score:3, Informative)
The users had no idea that they were supposed to be doing this. They don't read the instructions, they just see an antivirus program running, and figure they're protected.
Re:WiFi (Score:2)
Re:How is greater use of anti-virus software good? (Score:2)
Or perhaps it would mean less people writing malicious scripts for Windows. With the number of under-educated people using computers, there is bound to be at least one person to open up an email attachment from someone they don't know. The fact this user is running Windows is simply due to the fact that Windows is on the majority of home PCs.
I would call you a fool if you were to try to convince me that the la