Chapter 12: The Computer Zone


Overview

A computer is an awesome tool, but in the wrong hands it can be turned into a weapon and used against you. Computers far more powerful than yours have been networked to harvest your data, observe your behavior, track your whereabouts, and note your demographic preferences. Securing your PC is the first step toward securing your privacy. The default settings on a new computer are aimed at the novice user and the lowest common denominator. They're notoriously insecure ! If you haven't already tweaked your PC, isn't it about time?

Keep in mind that any computer setting that can be disabled can also be enabled, and vice versa! The perfect computer balances usability, stability, performance, and security. Before you customize your PC, answer these questions:

  • What is your computer's primary use?

  • Where is the computer located?

  • How many people have access to the computer?

  • Is the computer a server or on a network?

  • Is the computer stationary or mobile?

  • Who owns the computer?

  • Is the computer for company or personal use?

  • Could spyware or monitoring software already be installed on the machine?

  • What is your computer's risk quotient on a scale of 1 to 10?

  • What are the odds of your computer being compromised, hacked, or physically stolen?

Now follow these steps to set up your computer accordingly .

click to expand
Figure 12.1: Microsoft Knowledge Base Article 293834 ”User Accounts That You Create During Setup Are Administrator Account Types



Invasion of Privacy. Big Brother and the Company Hackers
Invasion of Privacy! Big Brother and the Company Hackers
ISBN: 1592000436
EAN: 2147483647
Year: 2004
Pages: 135
Authors: Michael Weber

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net