Printer Friendly
The Free Library
22,741,889 articles and books

Staying safe online: there are steps you can take to cut down on spam, viruses and spyware.



If Bill Gates (person) Bill Gates - William Henry Gates III, Chief Executive Officer of Microsoft, which he co-founded in 1975 with Paul Allen. In 1994 Gates is a billionaire, worth $9.35b and Microsoft is worth about $27b.  hasn't found a way to get rid of all his junk e-mail See spam.  yet, chances are you're still receiving unwanted e-mail, too. About 80 percent of all e-mail is estimated to be unsolicited commercial messages called spam. The FTC FTC

See Federal Trade Commission (FTC).
 has estimated that as much as two-thirds of spam is fraudulent. Most computer users now see only a relatively small amount of that spam, because most network administrators and Internet service providers Internet service provider (ISP)

Company that provides Internet connections and services to individuals and organizations. For a monthly fee, ISPs provide computer users with a connection to their site (see data transmission), as well as a log-in name and password.
 (ISPs) use spam filtering programs that are effective in screening it out. But spammers continually are finding new ways to get their messages past filters and to Internet users.

Spam is more than a nuisance; it often carries more serious threats to computer users--viruses, worms, spyware and other kinds of "malware." Viruses can corrupt your computer's programs and files or even destroy all the information on a computer. Worms spread to other computers, often through a user's e-mail address See Internet address.

e-mail address - electronic mail address
 book, and replicate themselves until they slow or shut down system resources (1) In a computer system, system resources are the components that provide its inherent capabilities and contribute to its overall performance. System memory, cache memory, hard disk space, IRQs and DMA channels are examples. . Spyware is software that is downloaded to a computer, often without a user's knowledge. It can track online activities or collect personal information, change settings on computers, or cause advertising messages to pop up on computer screens.

Your legislative computer is tin doubt well protected, but there are steps you can take that will help you cut down on spam, viruses and spyware on your home PC or your personal laptop.

1

Protect your e-mail address. You can reduce the amount of spam you receive by limiting the release and availability of your e-mail address--on Web sites, on subscriber mailing lists, and when purchasing items or subscribing to services.

Legislators' e-mail addresses often are posted on legislative Web sites, personal and campaign Web sites, and in newspaper articles and directories of public officials. But e-mail addresses on Web sites are automatically "harvested" by Web crawlers or spiders--software that spammers use to collect e-mail addresses. You probably want your official e-mail address to be as accessible as possible to constituents, and many legislatures use Web forms for email or apply other techniques to minimize harvesting, but there are additional steps you can take to protect your e-mail address.

Protect your personal e-mail address by not posting it on Web sites or in discussion groups, or set up one or more e-mail addresses and control how you use them. For example, keep one e-mail address to give to family, friends and colleagues only. Set up a separate e-mail address to use just for subscribing to mailing lists, for Web sites that require one for access, or for making online purchases. Change the e-mail address if you begin receiving too much spam.

2

Use spam filtering and anti-spyware software. Your official legislative e-mail account e-mail account ncuenta de correo  almost certainly will have spam filtering software, although it will never stop all spam, in addition, you can choose an Internet service provider that offers spam filtering. Anti-spyware software can identify if spyware has been downloaded to your computer, and may be able to remove keystroke-logging programs or other spyware that may be tracking and recording your online activities. However, some anti-spyware software is fraudulent and actually downloads its own spyware rather than protecting your computer, so be sure to go to legitimate sources, such as PC World magazine or others that review this type of software before installing or purchasing anti-spyware software.

3

Use a firewall and anti-virus software anti-virus software nAntivirensoftware f  and regularly update both. A firewall is hardware or software that blocks unauthorized users and materials from accessing a computer. It is especially important to use a firewall if your home computer has a broadband (high speed) connection to the Internet. Newer operating systems Operating systems can be categorized by technology, ownership, licensing, working state, usage, and by many other characteristics. In practice, many of these groupings may overlap.  and software, such as Windows XP The previous client version of Windows. XP was a major upgrade to the client version of Windows 2000 with numerous changes to the user interface. XP improved support for gaming, digital photography, instant messaging, wireless networking and sharing connections to the Internet.  and AOL's 9.0 Security Edition, come with firewalls, but it is important to be sure the firewalls are activated and set up properly. For older computers, purchase and install firewall software. Anti-virus and virus-detection software scans incoming files and messages for viruses and will warn you if you have accessed a program with a virus. It is estimated that there are hundreds of new viruses and worms each month, so you should update your firewall software frequently to detect the new versions of viruses. Keeping your other software up-to-date by installing patches or regular updates also is important, so check the company's Web site frequently to be sure you have the most recent.

4

Block instant message spam. "Spim"--spam sent via instant message--is sent through your Internet messaging program The Internet Messaging Program or IMP is a popular open-source PHP-based webmail system. IMP is a component of the Horde project.

It is included with cPanel and Plesk installations as a webmail client.
 or via text-messaging on your mobile device or cell phone. The major instant messaging Exchanging text messages in real time between two or more people logged into a particular instant messaging (IM) service. Instant messaging is more interactive than e-mail because messages are sent immediately, whereas e-mail messages can be queued up in a mail server for seconds or  services provide ways to block spim, so it's just a matter of taking the time to identify people you want to hear from via instant message. Another form of spim is "messenger span]" that uses Microsoft's Messenger Service Messenger Service is a network-based system notification service included in some versions of Microsoft Windows. This service, although it has a similar name, is not related in any way to the .  (not to be confused with Microsoft's Instant Messaging software, MSN Messenger Microsoft's instant messaging (IM) service, which provides text messaging and voice calling. Part of the MSN Network, MSN Messenger clients are available for non-XP versions of Windows, Mac, Pocket PC and MSN TV. For Windows XP, the IM client is Windows Messenger. ). Microsoft initially set up Messenger Service to allow network administrators to send administrative messages. However, spammers began using it to send advertising messages or viruses directly to computers, bypassing e-mail. Microsoft's Web site provides information about when and how to disable Messenger Service.

5

Don't click on links in spam messages or in pop-up windows. Spammers often include links in their messages--links that may contain an encoded version of your email address See Internet address. . When you click on the links, you essentially confirm that your e-mail address is valid and that you've read the e-mail. Clicking on links in spam or popups may also infect your computer with spyware or a computer virus. "Phishing" seams use links in e-mail messages that claim to go to one site, but which actually send you to a different site that only appears authentic, but asks for your personal or financial information that might be used to commit identity theft or other crimes.

6

Block images or graphics in e-mail messages. Spammers frequently use Web "bugs" or Web "beacons"--small pieces of html code that are inserted in spam messages. Most Web beacons are so small as to be effectively invisible, but when an end-user opens or even previews an e-mail containing a Web beacon, it sends its signal back to the spammer, indicating that a valid e-mail address has been reached. Web beacons also can he exploited to transmit viruses. To avoid Web beacons, you can configure your e-mail software to view all messages in plain text. Recent and updated versions of Microsoft Outlook For the e-mail and news client bundled with certain versions of Microsoft Windows, see .

Microsoft Outlook or Outlook (full name Microsoft Office Outlook
 and Outlook Express are preset to stop pictures from immediately downloading in e-mail from people who are not in your address book. You can also check privacy options on Web e-mail See Internet e-mail service.  accounts like Yahoo! to opt out of e-mail containing Web beacons.

7

Be cautious of e-mail attachments and offers of free software. This advice is everywhere, but bears repeating. Never open an email attachment from someone you do not know or even from someone you do know if you don't know Don't know (DK, DKed)

"Don't know the trade." A Street expression used whenever one party lacks knowledge of a trade or receives conflicting instructions from the other party.
 who created the attachment. Many viruses are spread through email attachments, and the viruses are often launched when the file attachment is opened. There also are many offers of free software programs and downloads. However, many of these free offers include more than the feature advertised--they can include spyware. Avoid downloading free screensaver software, animated graphics and other software until you're sure it's from a legitimate source. And again, use anti-virus software and keep it updated.

8

Read privacy policies and end-user licensing agreements. Before providing your email address to a Web site or on a contest entry, or before downloading software, read the company's privacy policy or the end-user licensing agreement. If you can't find a privacy policy or if the licensing agreement is difficult to read or understand, hold off on providing your e-mail address or downloading software until you've had time to research the company's policies and reputation.

9

Forward spam to your ISP (1) See in-system programmable.

(2) (Internet Service Provider) An organization that provides access to the Internet. Connection to the user is provided via dial-up, ISDN, cable, DSL and T1/T3 lines.
 and other authorities. Your ISP may ask you to forward spam so that you can help it identify and filter it out from its network. If you receive fraudulent spam or spam that asks for your personal or financial information, forward it to spam@uce.gov.

LEARN THE TERMS

PHISHING

A scam that involves Internet fraudsters who send spam or pop-up messages to obtain personal information (credit card numbers, bank account information, Social Security number, passwords, or other sensitive information) from unsuspecting victims.

SPAM

Unsolicited commercial e-mail, often sent in bulk quantities.

SPYWARE

A software program that may be installed on your computer without your consent to monitor your use, send pop-up ads, redirect your computer to certain Web sites, or record keystrokes, which could lead to identity theft.

TROJANS

Programs that, when installed on your computer, enable unauthorized people to access it and sometimes to send spam from it.

VIRUS

A program that can sneak onto your computer--often through an e-mail attachment-and then make copies of itself, quickly using up all available memory.

WORM

A program that reproduces itself over a network and can use up your computer's resources and possibly shut your system down.

SPAM ZOMBIES Zombies

Companies that continue to operate even though they are insolvent. Also known as living dead.

Notes:
It's advisable to avoid investing in zombies at all costs their life expectancies are highly unpredictable.
 

Home computers that have been taken over by spammers who then use them to send spam in a way that hides the true origin.

Source: Federal Trade Commission, OnGuardOnline.gov, onguardonline.gov/glossary.html.

MORE RESOURCES

Federal Trade Commission, Spam E-mail Web Page, www.ftc.gov/bcp/conline/ edcams/spam/index.html.

United States Computer Emergency Readiness Team The United States Computer Emergency Readiness Team (US-CERT) is part of the National Cyber Security Division of the United States's Department of Homeland Security.  (US-CERT (United States-Computer Emergency Readiness Team) The group charged with protecting the U.S. Internet infrastructure by coordinating defense against and response to cyberattacks. ), Cyber Security Tip, Reducing Spam, www.us-cert.gov/cas/tips/ST04-007.html.

The National Cyber Security Alliance (a public-private partnership of the U.S. Department of Homeland Security Noun 1. Department of Homeland Security - the federal department that administers all matters relating to homeland security
Homeland Security

executive department - a federal department in the executive branch of the government of the United States
, the Federal Trade Commission, and many private-sector corporations and organizations), www.staysafeonline.info.

Pam Greenberg is an NCSL NCSL National Conference of State Legislatures
NCSL National College for School Leadership
NCSL National Conference of Standards Laboratories
NCSL National Council of State Legislators
NCSL National Computer Systems Laboratory (NIST) 
 expert in legislative information technology.
COPYRIGHT 2006 National Conference of State Legislatures
No portion of this article can be reproduced without the express written permission from the copyright holder.
Copyright 2006, Gale Group. All rights reserved. Gale Group is a Thomson Corporation Company.

 Reader Opinion

Title:

Comment:



 

Article Details
Printer friendly Cite/link Email Feedback
Title Annotation:TOOLS OF THE TRADE
Author:Greenberg, Pam
Publication:State Legislatures
Geographic Code:1USA
Date:Feb 1, 2006
Words:1615
Previous Article:Keeping in touch: responding to constituents' requests and concerns is time-consuming but key to representative democracy.
Next Article:As they see it.
Topics:



Related Articles
New blends of email threats. (Security).
Huge increase in virus-infected spam.
BEWARE SPYWARE - INFECTIONS ON RISE.
2004: the security year reviewed, Sophos.
Spyware, spam, and other threats: the six things you need to do now.
EEMA to tackle cyber crime at UK Regional Interest group workshop.
Taking Internet security off the backburner: it's the whole company's job, not just IT.
Spyware--the hidden threat to business security.
Security news and products; on the menu today is Phish and Spam.
Security news and products; over half of Chinese malware aims to steal passwords.

Terms of use | Copyright © 2014 Farlex, Inc. | Feedback | For webmasters