North American Network Operators Group

Date Prev | Date Next | Date Index | Thread Index | Author Index | Historical

Re: Every incident is an opportunity (was Re: Hackers hit key Internet traffic computers)

  • From: Alexander Harrowell
  • Date: Sun Feb 11 03:40:24 2007
  • Domainkey-signature: a=rsa-sha1; c=nofws;; s=beta; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:references; b=r+Jh5VMvouMxTt5nL0pVfzuTPNjuyFQM6N7JG3ZGhIO88BjenC1JLmTSJxUxwafukSjs41i5A8NHvdsc0VOThj9cXHwvwLCQfRX8nrM0pPSdhqka4CPYxBt2tTcux8geYp9iHjNW91NOx4Z8poqePo2wxHOO0FoLT3SFkSvRNmM=

3. Even if your computer is secure, miscreants depend on your trust. Be
suspicious of messages, files, software; even if it appears to come from
person or company you trust.

    Anti-spam, anti-spyware, anit-virus, anti-phishing tools can help.
    don't assume because you are using them, you can click on everything
    and still be safe.  The miscreants are always finding new ways

    It may just be human nature, but people seem to engage in more risky
    behavior when they believe they are protected.

4. If your computer is compromised, unplug it until you can get it

     Its not going to fix itself, and ignoring the problem is just going
     to get worse.

5. Paying for AV software is not a solution, no matter how often it's been on TV. (Norton - the antivirus software one finds on virus-infected computers)