If it weren't for that darned Internet, personal computing would be a lot of fun. After all, it's the Internet that lets all those socially stunted hackers enter our machines, unleashing their viruses, setting up remote hacking tools, feeding us spyware, trying to trick us out of our credit-card numbers , and otherwise making our lives an endless troubleshooting session. It sure would be nice if they'd cultivate some other hobbies. In the meantime, these low-lifes are doing astronomical damage to businesses and individuals around the worldalong the lines of $100 billion a year (the cost to fight viruses, spyware, and spam). A big part of the problem was the design of Windows itself. In the quaint old-fashioned days of 2000, when Windows XP was designed, these sorts of Internet attacks were far less common. Microsoft left open a number of back doors that were intended for convenience (for example, to let system administrators communicate with your PC from across the network) but wound up being exploited by hackers. Microsoft wrote Windows Vista for a lot of reasons: to give Windows a cosmetic makeover, to give it up-to-date music and video features, to overhaul its networking plumbingand, of course, to make money. But Job Number One was making Windows more secure. Evil strangers will still make every attempt to make your life miserable, but one thing is for sure: They'll have a much, much harder time of it. Note: This chapter focuses on Vista's new self-protection featuresall of them. It's only called "Internet Security" because, in fact, virtually all of the infectious unpleasantness that can befall a PC these days comes from the Internet. A PC that never goes online probably won't get infected.So why is Internet Explorer (IE) the most popular hacking target? First, it's by far the most popular browser on the planet. Second, Internet Explorer includes hooks directly into Windows itself, so a hacker can wreak havoc on Windows by using Internet Explorer as a back door. Lots of Vista's security improvements are invisible to you. They're deep in the plumbing, with no buttons or controls to show you. If you're scoring at home, they include features called:
The rest of this chapter describes features that aren't invisible and automaticthe ones that you can control. Note, however, that built-in security tools can't do the whole job of keeping your PC safe; you play a role, too. So keep in mind these basic tips before you or your family go online:
With all that said, you're ready to find out how to keep yourself safe when you go online. |