Benscomputer.no-ip.org

Please see the footer for copyright details



Benscomputer.no-ip.org

Patent Free


Benscomputer.no-ip.org Premium Article
Benscomputer.no-ip.org Premium Article


Maintaining PC Health on Home Networks



This article was originally posted on Helium.com


There are a number of steps you must take to ensure the security of both your network, and more crucially, your data.

Before you set up your network, consider whether you wish to use a Wireless network or a cabled network. Wireless is very useful for Laptops and other portable computers, but it does pose an additional attack vector. If your home does not contain a portable node, consider taking the time to lay network cabling and disable the Wireless function until you need it.

First lets focus on the largest threat, the Internet. Ensure that you have a hardwire firewall in place, this is often included with the router but double check.

Review the settings on your router, disable any unnecessary functions. Some allow access to a web interface from the Internet. If you can disable this then do so. Change the default password as lists are available online of the passwords used by manufacturers, and it is trivial to identify the make and model of a router remotely.

Make sure all passwords used are strong, they should be alphanumerical and not based on dictionary words.

Next configure a software firewall on each of the connected computers (Zonealarm Security Suite is recommended), this will monitor which applications are trying to access the network. This should help reduce the likelihood of malware sending your private data out into the wild, and also help prevent a compromised computer from infecting the rest of your network. Never use two software firewalls on the same system, some software will clash and be ineffective.

Run a trusted Anti-Virus and Anti-Spyware suite (again ZoneAlarm Security Suite is recommended), and read customer reviews of the software before you purchasing. Never assume that a big name leads to good software, MCaffee AV has had some serious issues lately. The benefits of a suite changes with each release, so evaluate each one carefully. Once you have selected an AV suite, configure it to update it's definitions regularly and to run regular 'On-Demand Scans'. It is highly recommended that the suite you select supports 'on-Access' scanning as well so that malicious code can be detected before it is actually executed.

Allocate each of your users a separate account, including yourself. Never, ever perform everyday tasks as an Administrator. Running as a privileged user will allow any malicious code full access to that system, whereas a limited account will affect only your files. This holds especially true for children, never give them your Administrator password otherwise they will install everything that they can find.

Now that your computers are prepared, it's time to re-examine how they will connect to your router. Wireless networking extends your network to well outside your building. If you are going to use a Wireless network then turn the transmission power down as low as you can, and use the strongest encryption that the router will allow. Make sure your encryption key is generated from random numbers and letters, but be aware that WEP and WPA-TKIP have both been exploited, and do not offer very much security. It is much preferred that you use WPA2.

Most importantly, never presume that you are safe. There is a common misconception that a firewall will defeat all attacks. This is simply not the case. Undiscovered bugs and pure ingenuity can allow an attacker to pass through. Similarly encryption, no matter how strong, can be broken given enough determination.

Hopefully however, the steps detailed in this article will help protect you from most of the dangers.

This article was originally posted on Helium.com






COMMENTS: If you wish to comment on a story, please use the Contact Me page. Due to the level of comment spam on the net, this has become the easiest way for me to police it. Thanks



This page contains a Benscomputer.no-ip.org Premium Article and is copyright Ben Tasker.

No reproduction, distribution or adaption is permitted without express written authorisation being given in advance.

If you would like to use this article, please use the Article Use option of the Contact Me form to request permission (please ensure you include contact details).

Benscomputer.no-ip.org Premium Article


All Images operate under  a seperate license
Please read this page for more information. The Full Image License can be read here



RIPA NOTICE: NO CONSENT IS GIVEN FOR INTERCEPTION OF PAGE TRANSMISSION



DISCLAIMER:


Note: all views expressed on this site are my own, and do not necessarily represent the views of my friends, family or employer.