& Woman to Woman Computing
From our Internet Security Specialist
- "Home internet users top targets of
online criminals"- CBC News
Internet users at home are increasingly becoming the targets of online criminal
activity because they tend to lack the security measures that protect
businesses and other more sophisticated users, a new report says. (Read more)
- Executive director, National Cyber Security Alliance, Ron
Teixeira: "There is a major perception gap: Even though most
consumers think they are protected, this study shows the opposite. Far too
many people still lack the three fundamental protections they need to stay safe
online current anti-virus software,
spyware protection, and a secure firewall."
PLEASE NOTE: We recommend the website
download software, but BE CAREFUL to not download "Release Candidate"
or "Beta" versions unless you are very experienced, and have
everything backed up.
You can pick the version to download on the right side of the program page, and
then when at the version you wish, click ONLY on either "Download latest
version" or "Download this version" on the upper right.
DO NOT click on any ads promoting other software.
Below you will find information to help improve your
Contact us at (613) 721-2082 to make it even easier!
- Please protect your own computer and those of your
friends and acquaintances by using antivirus and antispyware programs on your
computer, and keeping it updated. New "malware" (viruses,
spyware, adware, etc.) appear quickly, and spread through unprotected
computers, usually without the knowledge of the computer owner.
- Recent versions forge the "from" line
to one of the addresses in the infected computer, so it appears to be coming
from someone else's computer or even yours. It might also appear to be a
"bounced" message from a postmaster, saying you sent it out, and it
couldn't be delivered. It could also appear to be a message from your Internet
Service Provider, saying there is a problem with your account or your
- Many message sent "from" financial institutions are an
attempt to get your login and password. DO NOT click on links in these
emails. Instead, type the email address of your bank's website into your
browser. These messages are often referred to as "phishing". Few
banks actually email their clients, instead they have messages on their
websites both before login (general) and after (personalized).
- We recommend NEVER opening an attachment unless you have specifically
asked for a file, unless you know what it is and why you are receiving it.
Much of the malware these days spread through the virus sending copies of
itself to everyone in your address book, and are especially directed at
attacking through Outlook or other Microsoft mail programs, as well as some
other email providers, such as Yahoo and AOL. Most people affected have no idea
that their computer is spreading the infections to their friends, who think
it's safe to open an attachment or a link coming from someone they know.
- Please note that few people are aware that spyware is as much a danger
to your computer as viruses. Please see below for information on
- Update your anti-virus program at least daily, and always before
opening your email program, to give you the best protection.
- We recommend the use of an excellent anti-virus program, Avast. This
free (for personal use) program is available from Avast at
www.avast.com/eng/download-avast-home.html - please note
that it requires a registration, which is free, but is required each year (look
for "Register here" on that page to register and/or renew).
- If you wish to use a second program, we recommend the use of the free AVG
antivirus or Antivir by Avira. The AVG program is available at
www.filehippo.com/download_avg_antivirus and Antivir is at
- You can also do an online scan of your computer at
www.antivirus.com/free_tools - this only works when
connected to the Internet, of course. Please don't depend on this as your only
virus defense. We have seen it miss virus infections.
Malware Detectors - "Pest control" for your
- "Malware" is used as a catch-all term for many kinds of
malicious software. Adware programs pop up ads in your face, sometimes even
when you don't have a browser open and may also watch your online activities,
profiling you for targeted advertising or more sinister purposes. Literal
spyware gathers information about you and what you do with the computer,
possibly enabling identity theft. Keyloggers are the ultimate spies, recording
everything you type (including passwords). All of these are lumped under the
- Many people don't realize all the extra "stuff" that ends up on
their computers just by visiting websites. In addition to the Temporary
Internet Files (which should be cleaned out regularly), many websites place
"cookies" on the computer, _most_ of which are harmless, and they
also can put "spyware" programs into your computer as well.
- You can remove the Temporary Internet Files in Internet Explorer by going
to "Tools", then "Internet Options", then on "Delete
Files" to clear what is stored already. Then click on the
"Advanced" tab at the top, and scroll down to the
"Security" section at the bottom of the popup window. Click to put a
check mark beside "Empty Temporary Internet Files folder when browser is
- Beware emails promoting programs that will "clean" your spyware -
these are often programs that remove other companies' spyware, replacing it
with their own!
- Check for problems weekly with MalwareBytes Anti-Malware by double clicking on the
desktop shortcut, first checking for updates. If it tells you to restart the
computer after cleaning, let it do it right away.
- You may also wish to add SuperAntiSpyware.
I run both in my computers, and always run Malwarebytes first, then
- In both cases, install them, update them, and click "Quick scan"
and wait. It will prompt you on the steps at the end to remove if it finds
anything to clean, and when the computer is restarted, it should be fine.
Firewalls - The "keys" to your computer
- Computers connected to the Internet are at risk of attack from unscrupulous
hackers, especially those connected via high speed connections (cable or DSL).
Hackers may attempt to take control of your computer for their own use. In the
worst case, this could include the placing of child porn on your computer for
distribution without your knowledge.
- We recommend the use of the free ZoneAlarm firewall program,
available at www.filehippo.com/download_zonealarm_free
- During installation, it can pre-configure your computer for Internet
access, but you will have to give permission for each program outside the
standard connection. If it is a program you know (your email program or web
browser or antivirus programs), click on "Remember this setting" so
you won't be asked again for that program.
- If you have given permission for a program you don't want, or denied access
to a program you do want, double click on the ZA in the task bar, then when it
opens ZoneAlarm, click on Program Control on the left, then on Programs - it
will show you a list of those allowed (green check mark) and denied (red x).
Blue question marks mean the program asks each time. To change a setting, just
click on either the check mark, x or question mark, then change to what you
Windows 8 computers & tablets (applies also to Vista
- Windows 8 is just another / the newest version of Windows NT, and all the
main software works in Windows 8, just as it does in XP, Vista and 7.
- I recommend turning off the "User Account Control", as it's just
a nuisance that is not necessary, at least for the prime computer user (running
the Administrator account).
- Then install, as a minimum, ERUNT, Avast,
Malwarebytes, and SuperAntispyware (see above)
- Most of your existing software will be fine, but contact us if you
encounter problems, or need help.
Android for Tablets & Phones
- Android tablets and phones are wonderful - I use an Android
phone/tablet, as well as a 7" Android tablet every day.
- However, these wonderful "mini computers" that we can carry
around need protection from many of the same things that are bad for computers.
- I highly recommend that owners of Android systems download from the Google PlayStore:
Avast for antivirus, Lookout for antimalware and phone backup and
locating if lost/stolen, and Advanced Task Killer to free up memory on
your phone or tablet and keep it running better.
- Please do not download software "apps" from non-Google
- A quick tip - if you want to check things out on a larger computer, just
email yourself the link to anything you want to download on your Android tablet
or phone, and it will make it much easier to check it out.
Get a better web browser!
- As well, our advice is to get a better browser! Unfortunately, most people
use Internet Explorer, which is not safe to use in its standard format -
experts advise either turn off some Internet Explorer features by setting all
security zones to "high" or switch to another browser as the best
- It is our opinion that Mozilla's Firefox and Google's Chrome are much
better, faster, and safer web browsers, and are updated far more often.
- Try it - you'll like them!
Mac (Apple) computers