North American Network Operators Group|
Date Prev | Date Next |
Date Index |
Thread Index |
Author Index |
Re: Every incident is an opportunity (was Re: Hackers hit key Internet traffic computers)
- From: Alexander Harrowell
- Date: Sun Feb 11 03:40:24 2007
- Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:cc:in-reply-to:mime-version:content-type:references; b=r+Jh5VMvouMxTt5nL0pVfzuTPNjuyFQM6N7JG3ZGhIO88BjenC1JLmTSJxUxwafukSjs41i5A8NHvdsc0VOThj9cXHwvwLCQfRX8nrM0pPSdhqka4CPYxBt2tTcux8geYp9iHjNW91NOx4Z8poqePo2wxHOO0FoLT3SFkSvRNmM=
3. Even if your computer is secure, miscreants depend on your trust. Be
suspicious of messages, files, software; even if it appears to come from
person or company you trust.
Anti-spam, anti-spyware, anit-virus, anti-phishing tools can help.
don't assume because you are using them, you can click on everything
and still be safe. The miscreants are always finding new ways
It may just be human nature, but people seem to engage in more risky
behavior when they believe they are protected.
4. If your computer is compromised, unplug it until you can get it
Its not going to fix itself, and ignoring the problem is just going
to get worse.
5. Paying for AV software is not a solution, no matter how often it's been on TV. (Norton - the antivirus software one finds on virus-infected computers)