{"id":1470,"date":"2014-11-23T15:28:10","date_gmt":"2014-11-23T21:28:10","guid":{"rendered":"https:\/\/sodpit.com\/?p=1470"},"modified":"2014-11-23T17:00:04","modified_gmt":"2014-11-23T23:00:04","slug":"safe-computing-best-practices","status":"publish","type":"post","link":"https:\/\/sodpit.com\/?p=1470","title":{"rendered":"Safe Computing: Best Practices"},"content":{"rendered":"<p><a href=\"https:\/\/sodpit.com\/wp-content\/uploads\/2014\/11\/tier_0_servers1.jpg\"><img loading=\"lazy\" decoding=\"async\" title=\"\" style=\"border-top: 0px; border-right: 0px; background-image: none; border-bottom: 0px; padding-top: 0px; padding-left: 0px; border-left: 0px; display: inline; padding-right: 0px\" border=\"0\" alt=\"\" src=\"https:\/\/sodpit.com\/wp-content\/uploads\/2014\/11\/tier_0_servers_thumb1.jpg\" width=\"644\" height=\"430\" \/><\/a><\/p>\n<p>I get asked questions about best practices for safe computing all the time and thought it would be a good idea to outline some policies that you can follow easily to help minimize damage to your computer.<\/p>\n<p><!--more--><\/p>\n<p><strong>Policy #1: Minimize or completely eliminate using Microsoft Internet Explorer<\/strong><\/p>\n<p>Microsoft\u2019s Internet Explorer is a web browser with a sordid history. Microsoft started bundling Internet Explorer with Windows 95 to compete with <a href=\"http:\/\/en.wikipedia.org\/wiki\/Netscape_Navigator\" target=\"_blank\">Netscape Navigator (source: Wikipedia)<\/a> (now discontinued, but lives on to this day as Mozilla Firefox or Seamonkey). Microsoft now includes Internet Explorer with all versions of Windows and for this reason alone, most Windows users also use Internet Explorer for web browsing. My guess here is that most people don\u2019t even know there are free (and safe) alternative web browsers. Internet Explorer is targeted constantly by hackers because it is so vulnerable. You don\u2019t have to believe me, just go look at your Windows Updates for the last year. Almost every month Microsoft has to publish another \u201cfix it\u201d for Internet Explorer.<\/p>\n<p>For this reason alone you should NEVER use Internet Explorer for casual browsing or web searches. EVER. Download and install Google Chrome (<a href=\"http:\/\/www.google.com\/chrome\/eula.html?extra=platform=win&amp;standalone=1&amp;system=true\" target=\"_blank\">system-wide installer<\/a> &#8211; available to all users on the computer, must be installed as a computer administrator), <a href=\"http:\/\/mozilla.com\" target=\"_blank\">Mozilla Firefox<\/a> or any other browser for daily\/normal\/casual browsing. Internet Explorer should only be used for trusted web sites (banks, etc.) and ONLY if you manually type the address you want to access into the address bar \u2013 NOT through searches \u2013 or for sites you have previously bookmarked that you KNOW are 100% safe.<\/p>\n<p>I will add one quick note here. Some sites require Internet Explorer. Even in these rare cases I don\u2019t use Internet Explorer. Instead I use (and trust) IE-tab which is made and distributed by <a href=\"http:\/\/ietab.net\/\" target=\"_blank\">http:\/\/ietab.net\/<\/a>. I cannot recommend or endorse any other IE-tab projects. I will also add that this only comes up with sites I need to access at work. I never need Internet Explorer at home.<\/p>\n<p>Quick history notes\u2026 <a href=\"http:\/\/en.wikipedia.org\/wiki\/Netscape_Communicator\" target=\"_blank\">Netscape Communicator<\/a> later became <a href=\"http:\/\/en.wikipedia.org\/wiki\/Mozilla_Application_Suite\" target=\"_blank\">Mozilla Application Suite<\/a>. <a href=\"http:\/\/en.wikipedia.org\/wiki\/Mozilla_Application_Suite\" target=\"_blank\">Mozilla Application Suite<\/a> later spun off a stand-alone browser <a href=\"http:\/\/en.wikipedia.org\/wiki\/Firefox\" target=\"_blank\">Mozilla Firefox<\/a> and a stand-alone email client <a href=\"http:\/\/en.wikipedia.org\/wiki\/Mozilla_Thunderbird\" target=\"_blank\">Mozilla Thunderbird<\/a> but also kept the entire suite going with a separate project known as <a href=\"http:\/\/en.wikipedia.org\/wiki\/SeaMonkey\" target=\"_blank\">SeaMonkey<\/a>. Long story.<\/p>\n<p><strong>Policy #2: Trust NOTHING. Don\u2019t fall for spam\/phishing\/other messages<\/strong><\/p>\n<p>Don\u2019t trust anything. Only open email messages and attachments IF YOU ARE EXPECTING THEM and ONLY if you TRUST the sender.<\/p>\n<p>Q: I just got an email from someone I know, should I trust it?<\/p>\n<p>A: Email them and ask them if they sent it. If they reply, open it. If they don\u2019t reply, delete it.<\/p>\n<p>Oh, PERIOD. If you aren\u2019t sure, pick up a phone and call them. Or email them. In either case, WAIT.<\/p>\n<p><strong>Policy #3: Force computer users to login to their own user account<\/strong><\/p>\n<p>This policy only applies to computers that are used by multiple people.<\/p>\n<p>Create new user accounts for other users in your house who might need\/want to use your computer. If the user understands and practices safe computing it might be safe to make that person a computer administrator \u2013 just understand that if they get an infection it will be harder for you to fix later. If you aren\u2019t sure if the new user practices safe computing OR if the new user is a child, make the new user account a normal user or a child account. This holds true for any operating system, Linux, Mac\u2026 doesn\u2019t matter.<\/p>\n<p>In the Windows world, Windows 8 and higher \u201cchild accounts\u201d are possible directly from Windows Control Panel. For Windows 7 (or 8) you can use <a href=\"http:\/\/en.wikipedia.org\/wiki\/Microsoft_Family_Safety\" target=\"_blank\">Microsoft Family Safety (source: Wikipedia)<\/a> which is included in <a href=\"http:\/\/g.live.com\/1rewlive5-all\/en\/wlsetup-all.exe\" target=\"_blank\">Windows Essentials 2012 (Windows 7, 8, Server 2008)<\/a>, <a href=\"http:\/\/g.live.com\/1rewlive4-all\/en\/wlsetup-all.exe\" target=\"_blank\">Windows Live Essentials 2011 (Windows 7 or Vista)<\/a> or <a href=\"http:\/\/g.live.com\/1rewlive3\/en\/wlsetup-all.exe\" target=\"_blank\">Windows Live Essentials 2009 (Windows XP)<\/a>.<\/p>\n<p>In Windows new user accounts can be created here: Start &gt; Control Panel &gt; User Accounts. Normal user accounts and child user accounts can still be infected by viruses and baddies\u2026 but only their account is infected. This means that the infection can\u2019t spread to the entire computer \u2013 which will save you countless hours of time when trying to clean up someone else\u2019s mess.<\/p>\n<p><strong>Policy<\/strong><\/font><\/a><strong> #4: Make all users (including yourself) log off when they are done using the computer<\/strong><\/p>\n<p>This policy only applies to computers that are used by multiple people.<\/p>\n<p>If you skip this policy then you might as well completely ignore Policy #2. By logging out you are forcing the next user to log in with their user name and password which then limits them to normal or child access to the computer. If you fail to log out and they start downloading and installing things under your account \u2013 they will be doing this AS YOU with your access level and the ability to infect the entire computer.<\/p>\n<p>More to come\u2026<\/p>\n<p>For Computer Protection advice, click <a href=\"https:\/\/sodpit.com\/2014\/11\/23\/computer-protection\/\" target=\"_blank\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I get asked questions about best practices for safe computing all the time and thought it would be a good idea to outline some policies that you can follow easily to help minimize damage to your computer.<\/p>\n","protected":false},"author":1,"featured_media":1472,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[4],"tags":[10],"class_list":["post-1470","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-main","tag-featured"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/sodpit.com\/wp-content\/uploads\/2014\/11\/tier_0_servers1.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2FmUa-nI","jetpack_likes_enabled":false,"_links":{"self":[{"href":"https:\/\/sodpit.com\/index.php?rest_route=\/wp\/v2\/posts\/1470","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sodpit.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sodpit.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sodpit.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sodpit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1470"}],"version-history":[{"count":6,"href":"https:\/\/sodpit.com\/index.php?rest_route=\/wp\/v2\/posts\/1470\/revisions"}],"predecessor-version":[{"id":1485,"href":"https:\/\/sodpit.com\/index.php?rest_route=\/wp\/v2\/posts\/1470\/revisions\/1485"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sodpit.com\/index.php?rest_route=\/wp\/v2\/media\/1472"}],"wp:attachment":[{"href":"https:\/\/sodpit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1470"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sodpit.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1470"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sodpit.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1470"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}