Yet Another Quick Tip for Windows Users

[And a bonus tip at the end.]

Every now and then, a scan with the Microsoft Baseline Security Analyzer is just a Good Thing to do.

My most recent scan with the tool on the lil lappy I’m using to post this turned up two “problems”–one of which wasn’t, for me. Apparently, an update of M$Office 2010 had failed and for some reason Windows Update had borked on its responsibility to clue me in on the fact. Bad Windows Update, bad! *heh* Fixed that, even though I rarely use M$Office 2010 (I prefer LibreOffice–horse races and all that). The other problem? My login password for Windows hasn’t been changed in a while. Notaproblem for me. My Login password for this user account is one of the very, very few passwords I’ve deliberately elected to NOT change regularly, for reasons of my own.

All-in-all, an encouraging scan. But do keep in mind: the tool is a BASELINE scanner. Generally, the things it scans for should form a foundation of your security steps.

See more here on basic computer security: Gizmo’s Freeware Security Wizard Walk through the Wizard to get more recommendations for your own Windows computer use.

From the landing page after running Gizmo’s Security Wizard:

The Most Important Security Advice of all

The task of protecting your PC from infection is similar to crossing a busy road unharmed.

There are two, very different ways of crossing that road:

The first way is to be very careful about where you cross and to be watchful and aware of the dangers. In other words, make sure you don’t get hit.

The other approach is to protect yourself with something like an army tank and cross anywhere, anytime. If you get hit, you rely on the tank to protect you.

Now no sensible person would adopt the latter approach to crossing a road, yet when it comes to computer security that’s exactly what many folks do.

If you want real computer security, you need to adopt safe computing practices rather than rely totally on security products to protect you. No security product or combination of products can or ever will, provide perfect PC security just like no car can provide you with perfect road safety. With both cars and PCs you need to be careful in your own behavior.

Like the rules of road safety we teach our kids, the rules for safe computing are simple and well known:

1. Be very careful where you surf. To help you stay away from bad sites install a website rating browser plug-in like WOT and make sure you only visit websites rated “Green” by the plug-in.

2. Never click on email attachments from unknown sources however tempting and attractive such attachments may seem.

3. Only download files from trusted sources. These include:
Files hosted on reputable download sites such as download.com, snapfilescom, softpedia.com, majorgeeks.com and other similar sites.
Files mentioned in the editorial sections of major computer websites and publications such as PC World, CNet, Lifehacker and of course, Gizmo’s Freeware.
Open source software hosted on sourceforge.net, Mozilla.org and similar large open source sites.
Files available for download from Microsoft, Google, HP, Dell and other reputable vendors.

4. Never install programs obtained from P2P networks including BitTorrent, eMule, LimeWire and others as many of these files are infected with malicious programs. Some of these malicious programs are so powerful they are capable of overwhelming all your security defenses.

5. Never install programs that friends give you on removable media unless you have verified that they are clean by submitting them to free web based file scanning services such as Jotti or Virus Total.

6. Never accept free toolbars, media players or other unsolicited software offered to you by a website.

7. If you are not using Internet Explorer 8 then we recommend you upgrade to this version or better still, switch to an alternate browser such as Mozilla Firefox, Opera or Google Chrome. All these have a track record for better security than Internet Explorer and are arguably superior browsers as well.

8. Seriously consider using a Windows limited user account (LUA) ) rather than a normal account with full administrator privileges. LUA will block the majority of malware. More details here.

9. You should seriously consider creating a fresh installation of Windows and then back up your PC using a drive imaging program. Then if in the future, your PC ever becomes infected you can use the drive image to restore it to a pristine, infection free condition. If you are using the Business or Ultimate versions of Vista/Windows 7 you already have drive imaging capabilities built into Windows. See here for details. If you’re using other versions of Vista/Windows 7 you can find a number of free drive imaging programs here.

By following these simple rules the chances of your PC becoming infected will be dramatically reduced. Combine these practices with the security software suggested above and you are well on the way to safe, secure, infection-free computing.

2 Replies to “Yet Another Quick Tip for Windows Users”

Leave a Reply

Your email address will not be published. Required fields are marked *