sinner
Posts: 174
Joined: 5/7/2001 From: North Carolina Status: offline
|
As Chanman says, the "airwall" method is good to keep vital Matrix info out of the "bad hackers" way.
For any computer connected from internet having "MS-Internet Information Server" (or "MS-IIS" ) installed, there's a big chance that can be controlled from the internet, gained "Administrator" status and act like that on any computerattached to it.
In fact, for any computer connected to internet, the average time before someone tries to control it, is 45 minutes. So, if you are connected 45 minutes or more, have for sure that someone has tried to enter in your computer.
There are not really secure "operative systems" or "servers". There are only security methods to follow. No guarantee, though. Even Linux can be insecure if poorly managed. Even Windows 98 can be pretty well shielded if managed with extremely care. Yes, you can have a Tiger immobilized out in the open in Normandy '44 or you can have green recruits in a bunker with rough terrain, with all kind of mines, obstacles, HMG support and all that around.
If you decide to go for Linux, I can help. I have plenty of experience in setting up Linux and playing Steel Panthers on Linux.
You all have played Steel Panthers: a King Tiger can blow up. And a green italian infantry can be very lucky.
I'm an IT professional. And I urge you to install an antivirus in your machine. Update it weekly, daily if you have a fast connection. Then, install a "firewall" software: single machines connected only by Modem are known to be "compromissed" (euphemism for "hacked"). "ZoneAlarm" is a pretty good firewall... and you can get the basic version for free from internet http://zonealarm.com
Check the security of your machine with online tools like the "Shields Up" from http://grc.com/default.htm (scroll down for the "Shields Up" section.) You will be surprised.
Remember that DOC, XLS, PPT, HTML documents can have executable code built-in. So they can hide a virus.
Remember that "previewing" a document, means that the mail prorgam is executing the code in the document, so you can be infected. The same goes with WinZip programs and "files preview".
Files ending in JS, VBS, VBA, WSH, EXE, BAT, COM, BIN are executables. So treat them as a ticking bomb!
Please, check that you have turned on the feature "Ask before running VBA macros" . Make sure you have turned off "use Java and JavaScript in mail and newsgroups".
In case you get a suspicious e-mail, do not open it.
What will you do in SPWaW with a suspected enemy location? Exactly, area fire ('Z' key). In computers, "area fire" works like this:
Delete the mail, empty the recycle bin, check your anti-virus, and ask to the sender "did you sent me something?". If they did send it without telling you or without you requesting it in the first place, tell them about what a bad idea this is, and ask for a new e-mail :D
_____________________________
Sinner from the Prairy<br />"Thalassa! Thalassa!"
|