วันจันทร์ที่ 12 พฤศจิกายน พ.ศ. 2550

Patching Windows Systems

Applying the latest patches to your Windows 2000 Operating system to prevent viruses and worms
This procedure will help you determine the patched state of your system, detect and remove any viruses and apply updates. This procedure is written for Windows 2000 users. The patches are also available for Windows XP and Windows NT but instructions are not provided for those systems here although the procedures should be similar excluding the application of the service pack. If you have a system that has not been patched within the last few weeks or are not sure and do not know if you have a virus, and do not have current anti-virus software on your system follow all the steps below. Checking for and removing viruses can be skipped for users who are sure they do not have a virus. Skipping the firewall installation can be done if you already have a personal firewall or are behind a corporate firewall. For more information please read our Home Security article at http://www.comptechdoc.org/docs/ctdp/homesec/

Back up your Data

1. Back up your data to another computer, tape, CD-ROM, or at least to another partition on your hard drive. If you store data like most people, it is stored in MyDocuments. Always back up your data on a regular basis.

Install a firewall to help secure the system

2. Install a personal firewall. I use Norton Personal firewall from Symantec, but zonealarm personal firewall has a good reputation and is free for individuals and non profit organizations. It is available at http://www.zonelabs.com/ Please do not violate license laws when using this product. Since antivirus software is also an essential requirement to have a reasonably secure computer a nice convenient package is Norton's Internet security package from Symantec which can be found in many stores. It comes with both antivirus software and a personal firewall. The commercial version of ZoneAlarm's personal firewall also is very well recommended.
3. Configure your firewall before connecting to the internet. Most users should at this point read their documentation or run the provided firewall tutorial. You may get alerts while configuring or in one case I got an alert indicating that a specific program wanted to act as a server on the internet. Before answering the question I used another computer and went to http://www.google.com/ and looked up the name of the program the alert had specified. At this point I realized the computer had a virus. If you are told by the alert that a program wants to act as a server the likely answer to this question should be no, but it is best to look up the program name on Google to be sure.

Check for and remove viruses

4. Install antivirus software on your computer. I use Norton or Symantec Anti-virus software but use the one of your choice. It is wise to read product reviews.
5. Connect to the internet and get your latest virus definitions from your antivirus software manufacturer.
6. Run a full virus scan on your system but configure it to only find viruses. It is best at this point to not attempt to quarantine or delete infected files. This is because the virus may modify some system files and if these files are deleted or quarantined you may not be able to reboot your system after removing the virus. At this point you only want to identify any viruses, trojans or worms on your system.
7. At this point do not worry about connecting to the internet even if you have some viruses since your firewall will help protect you. Once you have identified viruses on your system, go to your virus manufacturers website and look up the information about each virus and print it out. Download any virus removal tool for each virus that they may provide. Use the virus removal tool where possible to remove the virus. If no tool is available, follow the manual virus removal procedures that they provide. You may be able to delete or quaranteen files identified in your scan by right clicking on the files and selecting either delete or quarantine.

Update your system

8. Right click the "My Computer" icon on your desktop and select properties.
9. If under the General tab it does not state that your system is service pack 3 or above, download the service pack from http://www.microsoft.com/windows2000/downloads/servicepacks/sp3/default.asp Once downloaded click on the downloaded file and follow the steps provided in the install package, then reboot your system.
10. Review the critical updates at http://www.microsoft.com/windows2000/downloads/critical/default.asp and install them. Windows 2000 also has an autoupdate utility which can be configured from the control panel which will help get these but you must be careful to only select useful security and critical updates since the auto update facility will not always choose updates best for you.
11. Update your Internet Explorer browser to version 6 or above by using the site at http://www.microsoft.com/windows/ie/downloads/critical/ie6sp1/download.asp You will need to reboot after applying this latest version of Internet Explorer.
12. If you are using Microsoft Office, read the article "Preventing Viruses in Microsoft Office® Products" at http://www.comptechdoc.org/docs/ctdp/Officeupdates/ and apply the Microsoft Office updates as instructed in that article.
13. Download and install any critical or security updates for current threats as you are aware of them or check every couple of weeks on the Microsoft site for new updates.

Source By : http://www.comptechdoc.org/

Removing Viruses

By : No Name

Removing viruses can be risky to your operating system and may cause you to need to re-install your operating system. If you do not feel comfortable with the instructions in this section, you should get a computer professional to do the job. For more information read Applying the latest patches to your Windows 2000 Operating system to prevent viruses and worms. It contains information about how to remove viruses along with other useful information.

Virus Removal Procedure
  1. Be sure you have good backups of your data along with an emergency boot disk for your system.
  2. Determine what viruses you have on your system.
    - Install a virus scanning program if you do not have one already installed. Use the product of your choice. It is wise to read product reviews.
    - Be sure your virus definitions are up to date. Connect to the internet and download the latest virus definitions from the company that created your anti-virus software.
    - Configure your virus scanner not to remove any viruses but only detect them. You do not want to remove the virus(es) immediately since some viruses may infect files that your system requires to run. If these files cannot be cleaned by the anti-virus program, they may be deleted or quaranteened. If this happens you may not be able to run your system again.
    - Scan for viruses but do not remove them. Note: Some viruses will stop your virus scanner from operating. If this is the case you will probably need the help of a computer professional. If you have a virus that stops your virus scanner then you will need to either share the drive across a network and scan it from another computer or remove your hard drive and place it into another computer as a second hard drive, then scan your hard drive.
  3. Learn about the viruses you have and how to remove them. - Go to the web site of the organization that created your anti-virus software. The Symantec security response site is a good site to find information about specific viruses and they provide virus removal tools.
  4. Remove the viruses.
    - Many viruses have a removal tool which can be used to remove the virus. If there is a removal tool, download it and use it to remove the virus.
    - If there is no removal tool, you will need to follow the manual removal instructions. You may need to manually delete virus files and edit your system registry. The removal instructions will tell you how to do this, but some people may not feel comfortable doing this without the help of a computer professional.
    - If the manual instructions indicate that you should let your virus scanner remove the virus, then remove all viruses that you can with virus removal tools then run the virus scanner with it configured to remove all viruses.

Source By : http://www.comptechdoc.org

E-Mail Virus Spreading

By : No Name

This article briefly explains how email viruses are spread and shows how it causes some people to receive one of:

  • Non-delivery notices for e-mail that you did not send.
  • A notice that an e-mail you supposedly sent contained a virus.

Just because you received an e-mail like this does not mean that you have a virus. The best thing to do is simply delete the e-mail unless your system is performing strangely or erratically in which case you should scan for and remove any viruses. See the page about removing viruses at http://www.comptechdoc.org/basic/basictut/removevirus.html for more information.

How people that are not infected receive these types of messages is explained below in this description of how viruses spread. The below picture shows how a virus begins to spread.

In the lower left corner of the above picture the process of what happens when the virus is sent from the infected computer is shown. It is as follows:

  1. The virus infected computer sends the virus to the intended recipient.
  2. The e-mail server that the recipient is connecting to (or another server) may do one of the following:
    - It may recognize that the e-mail contains a virus. If inproperly configured, the e-mail server will then notify the faked sender of the e-mail, not the real sender, that they sent a message with a virus.
    - It may not recognize that the e-mail contains a virus but may try to deliver the e-mail and find that the address of the recipient does not exist.
  3. The e-mail server may notify the faked recipient that their e-mail could not be delivered or the e-mail they sent contained a virus.
    - If in the above step the e-mail server did not recognize a virus in the e-mail and the e-mail address of the intended recipient does not exist, the faked sender is notified that the recipient address of the e-mail that they sent was invalid and the e-mail they sent could not be delivered (in spite of the fact that the faked sender never sent an e-mail to that recipient and usually they will not even know the person)
    - If the e-mail server found a virus in the message, the faked sender may be notified that they sent an e-mail containing a virus.
  4. The e-mail may be delivered to the recipient depending on whether the e-mail server recoginzed the virus in the e-mail and whether it was configured to delete any e-mail that contains a virus.

The person whose sending e-mail address was faked by the virus above will therefore receive notifications that e-mails that they never send contained a virus or an e-mail that they sent (but actually never sent) was undeliverable.

My recomendation to e-mail server administrators is not to notify senders of e-mails that any messages they send do not contain viruses since most viruses today fake the sender of the e-mail. This will cut down on the confusion added by these messages.

Source By : http://www.comptechdoc.org/


วันเสาร์ที่ 10 พฤศจิกายน พ.ศ. 2550

Basic Computer Concepts.

By : No Name

This document includes a brief overview of basic computing concepts. It is the first in a series of three self-instruction Internet tutorials produced by the Bedford Public Library.

You can scroll through the document or jump to any of the topics listed below. You can also print the entire document by printing this page.

What is a Computer?
Computers are not very intelligent devices, but they handle instructions flawlessly and fast. They must follow explicit directions from both the user and computer programmer. Computers are really nothing more than a very powerful calculator with some great accessories. Applications like word processing and games are just a very complex math problem.

Software and Hardware
If you use a player piano as an analogy, the piano can be thought of as the hardware and the roll of music as the software.

The software a series of very simple computer instructions carefully organized to complete complex tasks. These instructions are written in programming languages (like BASIC, PASCAL, C...) to help simplify the development of applications.

The hardware is what sits on your desk and executes the software instructions. The player piano is useless unless the roll of music has been written correctly.

Hardware Components

Input Devices -- "How to tell it what to do"
- A keyboard and mouse are the standard way to interact with the computer. Other devices include joysticks and game pads used primarly for games.

Output Devices -- "How it shows you what it is doing"
- The monitor (the screen) is how the computer sends information back to you, whether it be surfing the web or writing a memo. A printer is also an output device.

Storage Devices -- "How it saves data and programs"
- Hard disk drives are an internal, higher capacity drive which also stores the operating system which runs when you power on the computer.- "Floppy" disk drives allow you to save work on small disks and take the data with you.

Memory -- "How the processor stores and uses immediate data"
- When you use a program, the computer loads a portion of the program from the hard drive to the much faster memory (RAM). When you "save" your work or quit the program, the data gets written back to the hard drive.

Microprocessors -- "The brain of the computer"
- PCs primarily use microprocessors (sometimes called the chip) manufactured by Intel. The older Intel versions include the 386, 486 and now the Pentium line.
- Macintoshes use PowerPC processors by Motorola.
- Megahertz (MHz) is the internal processor speed in which computer instructions are performed. The MHz speed does not always indicate the power of the microprocessor. Newer processors can execute more instructions at the same or slower MHz. For example, an Intel 486 @100MHz is less powerful than a Pentium @75 MHz (but the MHz is "faster").

Hardware Accessories

Modems
- Modems allow you to communicate with other computers using a phone line. Modem speeds are in bits per second (14.4, 28.8 and 56 thousand bits per second are standard).

CD-ROM Drives
- A CD-ROM drive is a high capacity storage device which lets you read data from the disk, but not write data back. The speed of the drive (how fast the CD platter spins) is measured in multiples from the first generation drives. New drives are up to 24X (or 24 times the first drives), but while the CD spins faster, it is not really 24 times faster in actual output.

Printers
- There are different types of printers (laser, ink jet, dot matrix) with differing quality of output. They are measured in dpi (dots per inch) and ppm (pages per minute), the higher the better.

Scanners
- Scanners "digitize" printed material (like photos and graphics) and save it to a graphic file format (like .GIF or .JPG) for display on the computer.

Operating System Software
Operating system software provides a "user interface" for users to manage files, start programs, customize computer settings, and other tasks. The operating system also provides the fundamental core computer functionality for programmers.

Intel based PCs use Microsoft Windows version 3.1 (older) or Windows 95 as the operating system. Macintoshes use the Macintosh operating system.

Software Applications
Application software uses the operating system software and provides the real functionality of a computer. Applications include:

- Word Processing (MS Word, WordPerfect, Ami...)
- Spreadsheets (Lotus 123, MS Excel...)
- Database (DBase, Fox Pro, Oracle...)
- Presentation (MS PowerPoint, Persuasion...)
- Internet Browsers (Netscape Navigator, MS Internet Explorer)
- Games

Source By : http://www.bedford.lib.nh.us/