Securing your Computer:
Safe computing is mostly about prudence, preparation, and prevention. NDSU has seen a large number of computers on the network become compromised. The following suggestions are intended to help students, faculty, and staff become more aware of safe computing issues.
The Internet is a powerful resource, but the same features that make it powerful also provide the means for misuse. Your "network neighbors" are world-wide, and, if you are not careful, they may have complete access to your system or you identity. While there really is no "100% secure" Internet-connected computer system, it is possible to take a few simple steps to get close.
Of course, you might say, "I don't have any top secret information on my computer." However, you don't want to lose what you do have, and you don't want to be responsible for illegal activity on your computer. "Infected" computers can
- Infect other systems
- Take down entire businesses or networks
- Be used for illegal activities
- Be used as repositories for copyright protected media or software
- Have information corrupted or deleted
Hundreds of computers can be taken over in seconds. Remember that you, as an owner of an account or computer, are responsible for any and all activity using your access information. You can save yourself a lot of grief by following some basic rules for safe computing.
Create a Secure Login
Creating a secure login is the first and possibly the easiest step to a more secure computer. Here are a few tips on creating a more secure computer simply by creating a secure Login
- Always set up accounts that require good passwords. Do NOT allow a password to be empty or blank. Most password cracking tools that can find these and compromise them in seconds. Don't be an easy target.
- Use GOOD PASSWORDS! Do NOT use words that could be looked up in a dictionary or are simple. Password crackers can "guess" those in seconds. When possible, use special characters, digits, mixed case, etc. NDSU requires that your password should be at least 8 characters long, mixed case, special characters and digits. The website forbes.com recently named the 25 worst passwords of 2012 and number 1 is still "password" <-- Don't use this password!!!
- It is recommended that you remove un-needed accounts from your computer. Removing the guest account will secure your computer. Also, by removing un-needed accounts gives you a way to easily see if rouge accounts have been created if your computer does become compromised.
Update, Update, Update
In 2000, Microsoft released Automatic Updates to try to make sure that Windows computers connected to the Internet were getting the latest patches for their Operating System. This is a practice you should also get into regarding your computers as well.
- On NDSU computer equipment we utilize WSUS ( Windows Server Update Services) to provide the Microsoft based Windows computers their updates.
- For the Macs on campus we suggest that you check for updates on a weekly basis. Simply click the apple in the upper left and select Software Update... to start the update application
- Linux computers use a wide a varied update tool ranging from apt-get, pacman, yum, and many others, we suggest you update your software at least weekly
You should also make sure that your applications you have installed on your computer get updated as well. Most applications now have their own update utility built in and some operating systems have application stores that update those applications as updates become available. Until there are application stores for all operating systems please make sure your editing, viewing, watching and listening software is all up to date.
April 13, 2016
It has been said that cyber-criminals are becoming more and more professional with their crimes. And according to Symantec's annual Internet Security Threat Report, there has also been an increase globally in zero-day vulnerabilities.
Mar 22, 2016
Three factor authentication may not be enough to properly defend online banking against attackers according to experts.
Mar 4, 2016
Privacy: Is it dead of just being renegotiated? There has been ongoing debates as to whether or not personal privacy is completely dead.