Subject: Norton AntiVirus SupportNow! News Bulletin Date: Wed, 27 Dec 2000
The top-ten ways to preserve your data
1. Backup, backup, backup 2. Create Norton Rescue disks 3. Create a Windows startup disk 4. Use current virus definitions and enable Auto-Protect 5. Practice safe computing 6. Detect hackers 7. Never use pirated software 8. Perform regular system maintenance 9. Password-protect your shared files 10. Disable the Windows Scripting Host 11. Feedback _____________________________
1. Backup, backup, backup
If you ask health experts for fitness advice, they will tell you to eat right and exercise. If you ask computer technicians for advice, they will tell you to back up your data often. In spite of the sound advice offered in both cases, reasonable people still fail to act on it.
It is hard to imagine that backing up your data could be any easier than it is today. Windows even includes a backup program and a scheduler to automate the process. Zip, Jaz, and rewriteable CD-ROM drives are all convenient and practical devices for storing large amounts of data.
If you feel that backing up your data is likely to become your first New Year's resolution to crumble, then ask yourself, "When is my data valuable." If your answer is "every day," then you should back up every day.
_____________________________
2. Create Norton Rescue disks
Now that you have backed up your data, the next tool to place in your data toolbox is a set of Norton Rescue disks. Rescue disks enable you to make a backup of crucial system data, making it easier for you to recover from a serious system crash or operating system corruption. Use Norton AntiVirus to create a set of a Basic Rescue or a Zip Rescue disks.
Basic Rescue loads only the files necessary for starting and accessing the computer. It does not load the files necessary for starting and using Windows. Create a Basic Rescue set when you are comfortable using DOS applications and simple DOS commands. With Zip Rescue, you can perform diagnosis and repairs from within a Windows user interface. Normal mouse functions, such as clicking and dragging, work here, and if the damage to your computer is not severe, then you can view the directory structure (files and folders) from Explorer. The Rescue Wizard, available only in Zip Rescue, provides the same functionality as the Basic Rescue set, but guides you through the steps so that you do not need to know how to use DOS commands.
For complete instruction on how to create Rescue disks, visit the following Internet address:
symantec.com
_____________________________
3. Create a Windows Startup disk
Another tool often used in virus repair or during hard drive crashes is the Windows Startup disk. Often this disk can be the only way to start the computer and load your CD-ROM drivers. Using this disk can sometimes help you replace damaged Windows files during an emergency.
To create a Windows Startup disk: 1. Click Start, point to Settings, and then select Control Panel. 2. Double-click Add/Remove programs. 3. Click the Startup disk tab. 4. Place a blank floppy disk in the A drive. 5. Click Create Disk, and then follow the prompts.
_____________________________
4. Use current virus definitions and enable Auto-Protect
The best way to prevent virus infection is to run Auto-Protect in the background with current virus definitions. Typically, new virus definitions are available on a weekly basis. However, sometimes a new virus will be discovered, and an extra set of virus definitions may be available during the week.
For instruction on how to update your virus definitions with LiveUpdate, visit the following Internet address:
symantec.com
For instructions on how to update virus definitions using the Virus Definition Update Installer, visit the following Internet address:
symantec.com
Auto-Protect is a component of Norton AntiVirus, which automatically checks for viruses whenever there is a chance of a virus infection. With Auto-Protect enabled, your computer scans for viruses when a file is created, downloaded, opened, or run. The Bloodhound feature of Auto-Protect checks for virus-like activities, such as changes to a master boot record.
For instructions on how to enable Auto-Protect, visit the following Internet address:
symantec.com
You may hear news about the W32.Kriz virus, which activates on December 25th. Rest assured that Norton AntiVirus, with Auto-Protect enabled, and virus definitions dated September 1, 1999 or later, will detect and clean this virus.
_____________________________
5. Practice safe computing
Safe computing practices can be difficult to practice because what is considered safe today may not be safe tomorrow. However, these guidelines will give you a good starting point:
- Scan floppy disks that have been used on another computer for viruses. - Avoid Web sites catering to hackers. - Do not leave a floppy disk in the floppy disk drive when you shut down or restart the computer. - Write-protect your floppy disks after you have finished writing to them. - Be suspicious of email attachments from all sources. - Verify that the author of the email has sent attachments. Newer viruses can send email messages that appear to be from people you know.
For more information about safe computing practices and malicious code, visit the following Internet address:
symantec.com
_____________________________
6. Detect hackers
Internet communications are done through the network standard called Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP uses ports as part of that communication. A port is a number that the computer uses to correctly sort all TCP/IP information. In this way, a port is not unlike a street address. For example, email programs send mail over port 25 and receive mail over port 110. There are thousands of ports available, and all programs that run over the Internet use at least one or two of them (including malicious Trojan horse programs).
A hacker can write a Trojan to use a specific TCP/IP port. The GirlFriend Trojan, for example, uses port 21554. When the hacker tries to access your computer, he scans your computer to see whether port 21554 responds. If port 21554 is accessible and you do not have the GirlFriend Trojan, then the hacker will try to send it to you. If your computer is not protected, and the GirlFriend Trojan is running, then the hacker can access your computer.
Fortunately, Norton Internet Security can protect your computer, by shutting down all unused ports. Even if you have already been infected with the Trojan, the port is locked down and the hacker cannot use the Trojan to gain access to your computer.
By shutting down unused ports, Norton Internet Security also protects you from port scanners. A port scanner is a tool that methodically goes from IP address to IP address, and scans for ports at that address. Using this, a hacker can scan your IP address and check your computer for any ports that could be used to break into your computer. While using Norton Internet Security, the hacker finds no usable ports and no access.
For more information about Norton Internet Security, visit the following Internet address:
symantec.com
To order Norton Internet Security online, visit the following Internet address:
symantec.com
_____________________________
7. Never use pirated software
Pirated software is not only illegal, it is unsafe. Pirated software can be a major source of virus infections. Also, the original software code can be tampered with to intentionally cause computer failures. Although it may sometimes be tempting to use pirated software, it is in your own best interest to avoid this practice.
_____________________________
8. Perform regular system maintenance
Data loss can occur during computer crashes. You can avoid these crashes by optimizing your computer resources and performing regular system maintenance. One tool to enhance your computer's reliability is Norton System Works.
The utilities includes with Norton System Works enable you to: - Diagnose hardware problems - Check for Windows problems - Optimize your hard drives performance - Diagnose and repair hard drive problems - Recover erased files - Make programs load and run faster - Save a snapshot of your critical computer information - Continuously monitor your computer for problems
For an overview of Norton System Works, visit the following Internet address:
symantec.com
To purchase Norton System Works online, visit the following Internet address:
symantec.com
_____________________________
9. Password-protect your shared files
Some viruses spread across a network through the use of shared files. Windows File Sharing grants the user of another computer the rights to read, write, copy, and move data to and from your computer. You have the ability to grant some or all of these rights. You can also require a password before these rights are granted.
File sharing can be an important way to distribute information to your friends and coworkers. However, password-protecting your shared files is another safe practice that you should adopt.
To password protect your shared files: 1. Double-click My Computer. 2. Right-click the C drive. 3. Click the Sharing tab. 4. If you are using file sharing, then check "Depends on Password" under the "Access Type" section. 5. Type a password that you will remember in the "Read-Only Password" and "Full Access Password" boxes. 6. Click Apply, and then click OK.
_____________________________
10. Disable the Windows Scripting Host
Some viruses rely on the Windows Scripting Host to spread to your computer. While using the Windows Scripting Host, your computer will automatically run scripts it encounters. Virus writers now embed viruses in a script, which will run, for example, when you open an email. With the Windows Scripting Host enabled, the virus will infect your computer as soon as you open the email. To make matters worse, these are typically the types of viruses, or worms, that email themselves to people in your address book. As you can see, these worms have the potential to spread very quickly, and have been known to overload email servers.
For instructions on how to disable the Windows Scripting Host, visit the following Internet address:
symantec.com
_____________________________
11. Feedback
Do you have feedback that can help us provide better products or services? If so, then we want to hear from you. Please visit the Symantec suggestion box at the following Internet address:
symantec.com |