New Computer? Steps to Protect Your Computer Before Connecting to the Internet

Getting a new computer should be an exciting and gratifying experience. After all, you'll be able to do things faster, safer and without having to worry that your old hard drive is so full that one more file will "break the camel's back."

However, there are dangers out there that probably didn't exist when you bought your last computer. And there's the question of what will happen to your old hard drive, with all your personal data on it.

Let's deal with your new computer first. This information applies specifically to Windows XP, although it has broader application as well.

Remember:

  • Many computers' default configurations are insecure.
  • New security vulnerabilities may have been discovered between the time the computer was built and configured by the manufacturer and you setting up the computer for the first time.
  • When upgrading software from commercially packaged media (e.g., CD-ROM, DVD-ROM), new vulnerabilities may have been discovered since the disc was manufactured.
  • Attackers know the common broadband and dial-up IP address ranges, and scan them regularly.
  • Numerous worms are already circulating on the Internet continuously scanning for new computers to exploit.
  • It is estimated that 80% of spam comes from personal computers (known as "Zombies"), like yours, that have been compromised with a trojan or other malware that the owner is completely unaware of. By protecting your computer you are protecting the Internet!
As a result of these hackers' efforts, the average time-to-exploitation for an unprotected computer is measured in minutes.

Standard (wrong) advice to home users has been to download and install software patches as soon as possible after connecting a new computer to the Internet. However, since the background intruder scanning activity is pervasive, it may not be possible for you to complete the download and installation of software patches before the vulnerabilities they are trying to fix are exploited.

This Special Report offers advice on how to protect your computer before connecting it to the Internet so that you can complete the patching process without incident.

We strongly recommend following all the steps when upgrading to a new operating system from disc(s) as well as when connecting a new computer to the Internet for the first time.

  • Perform these steps before connecting to the Internet for the first time.
  • The links in this document are LIVE LINKS, but we recommend that you NOT connect to them through your new computer. Use the live links on a computer that is fully updated, virus protected and firewalled, and download the instructions/programs to a CD or a USB drive, then transfer them to your new computer. A 128 megabyte USB drive costs less than $20, is "plug and play," and can be used over and over.
  • If possible, connect the new computer behind a network (hardware-based) firewall or firewall router.

    A network firewall or firewall router is a hardware device that is installed between the computers on their Local Area Network (LAN) and their broadband device (cable/DSL modem). By blocking inbound access to the computers on the LAN from the Internet a hardware-based firewall can often provide sufficient protection for you to complete the downloading and installation of necessary software patches. A hardware-based firewall provides a high degree of protection for new computers being brought online.

    If you connect to the Internet before you install a firewall, it may be possible for the computer to be exploited before the download and installation of such software is complete.

    XP has a built in firewall that may or may not be enabled. If Microsoft XP has not had Service Pack 2 installed, follow these instructions to turn on the Internet Connection Firewall. If XP is installed WITH Service Pack 2, then your firewall is enabled by default.

    Microsoft has provided both detailed and summarized instructions for enabling the built-in Internet Connection Firewall on Windows XP.

    We strongly recommend that you install a third-party firewall application and THEN turn off the Windows firewall.

    We recommend ZoneAlarm (www.ZoneLabs.com), which is FREE. Zone Alarm is the top rated firewall, and protects both incoming and outgoing data. XP's firewall ONLY protects against incoming data. Zone Alarm's setup file is approximately 7 megabytes, which will easily fit on a CD or USB drive.

  • Disable File and Printsharing if enabled.
  • Go to Start -> Control Panel.
  • Open "Network and Internet Connections".
  • Open "Network Connections".
  • Right-click on the network connection you wish to change (e.g., "Local Area Connection").
  • Select "Properties".
  • Make sure "File and Printer Sharing for Microsoft Networking" is unchecked.

  • Connect to the Internet.

  • Go to windowsupdate.microsoft.com.

    Follow the instructions there to install all Critical Updates. However, if you are going to install Service Pack 2, READ THIS FIRST! Pay particular attention to "Get the latest PC manufacturer updates for SP2, because you may need to update drivers for your PC to work properly.

    Only download software patches from known, trusted sites (i.e., the software vendors' own sites), in order to minimize the possibility of an intruder gaining access through the use of Trojan horse software.

    Staying Secure

    Follow the principle of least privilege - don't enable it if you don't need it.

    Consider using an account with only 'user' privileges instead of an 'administrator' or 'root' level account for everyday tasks. You only need to use administrator level access when installing new software, changing system configurations, and the like. Many vulnerability exploits (e.g., viruses, Trojan horses) are executed with the privileges of the user that runs them - making it far more risky to be logged in as an administrator all the time.

    Moving Your Applications and Data

    Unless you've never had a computer before, you'll want to move your old data onto your new machine. There are several ways to do this quickly and easily (although there are often a few glitches). The best article on the subject is www.pcworld.com/howto/article/0,aid,115632,00.asp.

    Protecting Your OLD Data

    So, what do you do with your OLD computer? Perhaps someone else can use it, maybe a school or a retirement center?

    One of the biggest mistakes people make is thinking that deleting files using Windows Explorer actually deletes the files! It DOESN'T!

    When you delete files in Windows, all it does is delete the pointers that show where the files are. Any competent computer whiz can easily find a program on the Internet that will rebuild the file pointers, and then they have access to all your files- your emails, your business information and your financial information.

    You can go to any flea market in the country, and chances are you can purchase a used hard drive with the old owner's data still on it! Many professional identity thieves are doing just that!!!!

    What CAN you do?

    Personally, I remove the hard drive from the computer, and I keep it (not in a place that it would be found if a burglar came into my house).

    Another alternative is to use a free disk wiping utility or purchase one.

    To effectively remove data from a hard drive, it must be overwritten completely several times. All of the temporary files, all of the caches, all of the "swap files" that are created as you work may be lurking in some unknown corner of the hard drive.

    Contrary to popular belief, even reformatting the drive does not necessarily make file recovery impossible!

    Consider this ? A recent search of hard drives that had been discarded revealed:

    • A disk that had been owned by an Attorney, with all his case files and confidential information on it.
    • A disk that had been owned by a CPA, with all her clients' tax information on it.
    • A disk that had been owned by a Medical Clinic on it, with hundreds of patients' medical records still on it.

      There are free programs that will do an adequate job of wiping a hard drive clean ? although the data may still be recoverable by professionals with very expensive programs, and there are inexpensive programs that will make the data completely unrecoverable.

      We recommend DBAN (dban.sourceforge.net/)which does 5220.22-M-compliant wiping. 5220.22-M-compliant wiping is the Department of Defense secure delete wiping standard. Be aware, however, properly wiping a hard drive, particularly some of the large ones can take hours, but it is worth it to protect your privacy.

      ? Steve Freedman, Archer Strategic Alliances, 2005 All Rights Reserved

      Steve Freedman
      Author of "Help! Something's Got Hold of My Computer and It Won't Let Go!"
      A PC Security eBook for Newbies, Skilled Users and Wizards
      Archer Strategic Alliances
      http://www.helpprotectmycomputer.com

      executive chauffeured services Bradford .. Madison to Airport car
      In The News:

      Getting virus alerts on your iPhone? Tech expert Kurt “CyberGuy" Knutsson helps you learn how to handle fake scam alerts and boost security.
      Tech expert Kurt “CyberGuy" Knutsson says opening emails is safe, but risks arise from interacting with links, attachments or HTML content.
      Tech expert Kurt “CyberGuy" Knutsson reveals four signs of compromised Social Security numbers and offers five steps to protect yourself.
      Tech expert Kurt “CyberGuy" Knutsson discusses how MAB Robotics' Honey Badger 4.0, a versatile robot, now walks underwater with amphibious skills.
      An updated Android trojan called FakeCall hijacks bank calls. Tech expert Kurt “CyberGuy" Knutsson says Android phone manufacturers and Google need to step up their game on security.
      The Massimo Modular E9 is a sleek, smart and comfy tiny home in 409 square feet. Tech expert Kurt “CyberGuy" Knutsson takes a closer look at what the future of housing might look like.
      Every stock trader should consider a virtual private network to safeguard their trading, according to tech guru Kurt "CyberGuy" Knutsson.
      Apple recently announced its new lineup of Macs and rolled out Apple Intelligence, its latest artificial intelligence-powered feature for its products.
      A Swiss-engineered robot can climb ladders, showing why it's at the cutting edge of autonomous robotic solutions for harsh industrial settings.
      Kurt "CyberGuy" Knutsson presents the cities targeted most by robocalls, why this is happening and what you can do about it to protect your privacy.
      Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
      Kurt "CyberGuy" Knutsson shares tips and suggestions for how to get the best use out of the updated Calendar app available with the latest iOS update.
      Your Social Security number, your unique identifier used for many purposes, has likely been leaked on the Dark Web; here are some steps you can take to protect yourself.
      Researchers have developed a new technology that creates strong, sticky fibers capable of lifting objects and capturing things from a distance.
      Smart rings track the same things that smartwatches do, including steps, sleep and a general overview of your overall health, and they tend have more battery life than smartwatches.
      Researchers have developed a robotic finger that can perform routine medical exams like those conducted by doctors, helping to address the growing shortage of trained professionals.
      Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
      Insurance administrative services company Landmark Admin reported that a data breach from a May cyberattack affected over 800,000 people.
      Sotheby's will auction the first artwork created by Ai-Da, the world's first robot artist created in 2019 by British gallerist Aidan Meller.
      More than 250 million users of the Verizon Messages app will have to switch to another app. Verizon is shutting down Messages in the next month.
      Tech expert Kurt “CyberGuy" Knutsson provides a list of 10 celebrities who are the most targeted by deepfake scams, including Tom Hanks.
      Tech expert Kurt “CyberGuy" Knutsson discusses how Vast's Haven-1, launching in 2025, transforms space living with human-centric design.
      UnitedHealth confirms over 100 million Change Healthcare users had their data stolen. Kurt “CyberGuy" Knutsson reveals what happened and what caused the breach.
      Tech expert Kurt “CyberGuy" Knutsson explains how iOS 18 brings new text formatting and animated effects to the Messages app.
      Whether you're a social media veteran or novice, Facebook friend request scams are common. Kurt the CyberGuy provides tips to keep your account safe.
  • Selecting the Perfect Big Screen TV

    Selecting a TV isn't as easy as it used to... Read More

    How Does My PC Get Hot

    There are many sources of heat that can raise the... Read More

    New Computer? Steps to Protect Your Computer Before Connecting to the Internet

    Getting a new computer should be an exciting and gratifying... Read More

    4 Computer Money-saving Tips

    Tip #1 -- Rebates: A rebate is not always a... Read More

    Cisco CCNA Certification: Five Things To Do DURING The Exam

    There are plenty of articles out there about how to... Read More

    How to Use SQLXML to Retrieve Data from SQL Server Database?

    Using SQL Server 2000 and above versions you can retrieve... Read More

    Back Up, Back Up, Back Up!

    This is not your typical lost data story. I was... Read More

    Maintain Your Computer ? Keep Your Business Running

    Maintaining your computer is extremely important ? especially if you... Read More

    HTML Explained: Part 1

    Want to save money while promoting your web-based business? Of... Read More

    Keeping the Windows Registry Operational

    The registry is where the computer stores information about the... Read More

    A Lesson in HTML

    As the owner of a Country Mall and Top Site... Read More

    Have You Invited A Spy Into Your Computer?

    Yes, it's true. You may have inadvertently invited a spy... Read More

    Learning To Navigate Ciscos Online Documentation

    When studying for your Cisco CCNA, CCNP, or CCIE exam,... Read More

    Bios Term

    BIOS - Basic Input Output SystemThe central processing unit of... Read More

    This Page Cannot Be Displayed ? What to Do When Your Internet Breaks

    The DNS (Domain Name System) servers are what your computer... Read More

    Advantages and Guidelines of Automated Testing

    "Automated Testing" is automating the manual testing process currently in... Read More

    Digital Cameras Ratings Abolish Camera Comparison Guesswork

    Digital cameras ratings are great tools for deciding which camera... Read More

    404 Error Pages: What Are They And How Do You Create One?

    We've all seen them, you've been browsing a website and... Read More

    Wordpress Plugins

    Maybe you always wanted a feature that hasn't been available... Read More

    Basic Problem in a PC

    I have a p3 500MHz PC with 128MB RAM, 10.2... Read More

    SmartCar Memory Stick for LapTop Transfer Data

    With the new technology used to transfer information to from... Read More

    Flash Your nVidia Video Cards BIOS

    You will need the following:1. 1.44MB FDD (floppy)2. NVFLASH utility... Read More

    Lives With Games Tradition and Industry

    The United States Of America citizen feels that games is... Read More

    5 Steps to Removing PC Clutter

    It's hard enough as it is these days to get... Read More

    Your Affiliate Business - Peripherals, Software, Computers

    I have always been interested in computers, but in the... Read More

    O'Hare Chicago prom limo ..