SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Pastimes : Computer Learning

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: Junkyardawg who started this subject12/29/2000 7:32:53 PM
From: mr.mark   of 110652
 
Subject: Norton AntiVirus SupportNow! News Bulletin
Date: Wed, 27 Dec 2000

The top-ten ways to preserve your data

1. Backup, backup, backup
2. Create Norton Rescue disks
3. Create a Windows startup disk
4. Use current virus definitions and enable Auto-Protect
5. Practice safe computing
6. Detect hackers
7. Never use pirated software
8. Perform regular system maintenance
9. Password-protect your shared files
10. Disable the Windows Scripting Host
11. Feedback
_____________________________

1. Backup, backup, backup

If you ask health experts for fitness advice, they will tell you to
eat right and exercise. If you ask computer technicians for advice,
they will tell you to back up your data often. In spite of the sound
advice offered in both cases, reasonable people still fail to act on
it.

It is hard to imagine that backing up your data could be any easier
than it is today. Windows even includes a backup program and a
scheduler to automate the process. Zip, Jaz, and rewriteable CD-ROM
drives are all convenient and practical devices for storing large
amounts of data.

If you feel that backing up your data is likely to become your first
New Year's resolution to crumble, then ask yourself, "When is my data
valuable." If your answer is "every day," then you should back up
every day.

_____________________________

2. Create Norton Rescue disks

Now that you have backed up your data, the next tool to place in your
data toolbox is a set of Norton Rescue disks. Rescue disks enable you
to make a backup of crucial system data, making it easier for you to
recover from a serious system crash or operating system corruption.
Use Norton AntiVirus to create a set of a Basic Rescue or a Zip
Rescue disks.

Basic Rescue loads only the files necessary for starting and
accessing the computer. It does not load the files necessary for
starting and using Windows. Create a Basic Rescue set when you are
comfortable using DOS applications and simple DOS commands. With Zip
Rescue, you can perform diagnosis and repairs from within a Windows
user interface. Normal mouse functions, such as clicking and
dragging, work here, and if the damage to your computer is not
severe, then you can view the directory structure (files and folders)
from Explorer. The Rescue Wizard, available only in Zip Rescue,
provides the same functionality as the Basic Rescue set, but guides
you through the steps so that you do not need to know how to use DOS
commands.

For complete instruction on how to create Rescue disks, visit the
following Internet address:

symantec.com

_____________________________

3. Create a Windows Startup disk

Another tool often used in virus repair or during hard drive crashes
is the Windows Startup disk. Often this disk can be the only way to
start the computer and load your CD-ROM drivers. Using this disk can
sometimes help you replace damaged Windows files during an emergency.

To create a Windows Startup disk:
1. Click Start, point to Settings, and then select Control Panel.
2. Double-click Add/Remove programs.
3. Click the Startup disk tab.
4. Place a blank floppy disk in the A drive.
5. Click Create Disk, and then follow the prompts.

_____________________________

4. Use current virus definitions and enable Auto-Protect

The best way to prevent virus infection is to run Auto-Protect in the
background with current virus definitions. Typically, new virus
definitions are available on a weekly basis. However, sometimes a new
virus will be discovered, and an extra set of virus definitions may
be available during the week.

For instruction on how to update your virus definitions with
LiveUpdate, visit the following Internet address:

symantec.com

For instructions on how to update virus definitions using the Virus
Definition Update Installer, visit the following Internet address:

symantec.com

Auto-Protect is a component of Norton AntiVirus, which automatically
checks for viruses whenever there is a chance of a virus infection.
With Auto-Protect enabled, your computer scans for viruses when a
file is created, downloaded, opened, or run. The Bloodhound feature
of Auto-Protect checks for virus-like activities, such as changes to
a master boot record.

For instructions on how to enable Auto-Protect, visit the following
Internet address:

symantec.com

You may hear news about the W32.Kriz virus, which activates on
December 25th. Rest assured that Norton AntiVirus, with Auto-Protect
enabled, and virus definitions dated September 1, 1999 or later, will
detect and clean this virus.

_____________________________

5. Practice safe computing

Safe computing practices can be difficult to practice because what is
considered safe today may not be safe tomorrow. However, these
guidelines will give you a good starting point:

- Scan floppy disks that have been used on another computer for
viruses.
- Avoid Web sites catering to hackers.
- Do not leave a floppy disk in the floppy disk drive when you shut
down or restart the computer.
- Write-protect your floppy disks after you have finished writing
to them.
- Be suspicious of email attachments from all sources.
- Verify that the author of the email has sent attachments. Newer
viruses can send email messages that appear to be from people you
know.

For more information about safe computing practices and malicious
code, visit the following Internet address:

symantec.com

_____________________________

6. Detect hackers

Internet communications are done through the network standard called
Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP uses
ports as part of that communication. A port is a number that the
computer uses to correctly sort all TCP/IP information. In this way,
a port is not unlike a street address. For example, email programs
send mail over port 25 and receive mail over port 110. There are
thousands of ports available, and all programs that run over the
Internet use at least one or two of them (including malicious Trojan
horse programs).

A hacker can write a Trojan to use a specific TCP/IP port. The
GirlFriend Trojan, for example, uses port 21554. When the hacker
tries to access your computer, he scans your computer to see whether
port 21554 responds. If port 21554 is accessible and you do not have
the GirlFriend Trojan, then the hacker will try to send it to you. If
your computer is not protected, and the GirlFriend Trojan is running,
then the hacker can access your computer.

Fortunately, Norton Internet Security can protect your computer, by
shutting down all unused ports. Even if you have already been
infected with the Trojan, the port is locked down and the hacker
cannot use the Trojan to gain access to your computer.

By shutting down unused ports, Norton Internet Security also protects
you from port scanners. A port scanner is a tool that methodically
goes from IP address to IP address, and scans for ports at that
address. Using this, a hacker can scan your IP address and check your
computer for any ports that could be used to break into your
computer. While using Norton Internet Security, the hacker finds no
usable ports and no access.

For more information about Norton Internet Security, visit the
following Internet address:

symantec.com

To order Norton Internet Security online, visit the following
Internet address:

symantec.com

_____________________________

7. Never use pirated software

Pirated software is not only illegal, it is unsafe. Pirated software
can be a major source of virus infections. Also, the original
software code can be tampered with to intentionally cause computer
failures. Although it may sometimes be tempting to use pirated
software, it is in your own best interest to avoid this practice.

_____________________________

8. Perform regular system maintenance

Data loss can occur during computer crashes. You can avoid these
crashes by optimizing your computer resources and performing regular
system maintenance. One tool to enhance your computer's reliability
is Norton System Works.

The utilities includes with Norton System Works enable you to:
- Diagnose hardware problems
- Check for Windows problems
- Optimize your hard drives performance
- Diagnose and repair hard drive problems
- Recover erased files
- Make programs load and run faster
- Save a snapshot of your critical computer information
- Continuously monitor your computer for problems

For an overview of Norton System Works, visit the following Internet
address:

symantec.com

To purchase Norton System Works online, visit the following Internet
address:

symantec.com

_____________________________

9. Password-protect your shared files

Some viruses spread across a network through the use of shared files.
Windows File Sharing grants the user of another computer the rights
to read, write, copy, and move data to and from your computer. You
have the ability to grant some or all of these rights. You can also
require a password before these rights are granted.

File sharing can be an important way to distribute information to
your friends and coworkers. However, password-protecting your shared
files is another safe practice that you should adopt.

To password protect your shared files:
1. Double-click My Computer.
2. Right-click the C drive.
3. Click the Sharing tab.
4. If you are using file sharing, then check "Depends on
Password" under the "Access Type" section.
5. Type a password that you will remember in the "Read-Only
Password" and "Full Access Password" boxes.
6. Click Apply, and then click OK.

_____________________________

10. Disable the Windows Scripting Host

Some viruses rely on the Windows Scripting Host to spread to your
computer. While using the Windows Scripting Host, your computer will
automatically run scripts it encounters. Virus writers now embed
viruses in a script, which will run, for example, when you open an
email. With the Windows Scripting Host enabled, the virus will infect
your computer as soon as you open the email. To make matters worse,
these are typically the types of viruses, or worms, that email
themselves to people in your address book. As you can see, these
worms have the potential to spread very quickly, and have been known
to overload email servers.

For instructions on how to disable the Windows Scripting Host, visit
the following Internet address:

symantec.com

_____________________________

11. Feedback

Do you have feedback that can help us provide better products or
services? If so, then we want to hear from you. Please visit the
Symantec suggestion box at the following Internet address:

symantec.com
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext