Golden Rules of Computing

M11

Does Not Follow Instructions.
Joined
Jun 8, 2004
Messages
2,336
I am compiling a list of rules for computer newbies and even power users to abide by, to maximize productinity and minimize problems. The list is open to suggestions and I hope it will be stickied to prevent repetitive questions, and assist those wishing to protect themselves. The list stands as:


-------------------------------------------------------------------------------
1. Update, update, update. Any system with outdated OS, Anti-Virus, and Anti-Spyware is vulnerable to common, well known exploits. Ensure that you are using Virus and Malware control of excellent strength, to protect you from common computing menaces.

2. Distrust E-Mail attachments. Require non E-Mail confirmation that the attachment is legitimate.

3. Distrust popups. Popups are used by marketers to grab your attention. Do not believe what they say, however serious sounding it is. REmember, if it was legitimate, it wouldn't have to grab you8r attention by popping up and using flashy, animated colors.

4. Do not download free scren savers, games, toolbars, or anything of the like, without careful precaution. Remember that someone spent time and effort creating these, and the usual motive is that of privacy invasion for profit.

5. Do not pirate. Not only is it illegal, but illegitimate file sharing networks are infested with viruses and malware, and the shady characters who create them.

6. Make regular backups. Use of write-once media such as CD-R or DVD+-R protects the integrity of your data from anything that may happen to your PC, or to the media. For most users, offsite or fireproof backup is not needed. Evaluate the difficulty to replace the data and then determine an appropriate backup strategy.

7. Use a strong password. Strong passwords increase security tremendously. Use a combination of letters of both cases, numbers, and punctuation. Avoid names, words, dates, etc. Do not write your password down or give it out, even to seemingly trusted parties. Remember that any legitimate administrator can reset your password, and therefore has no need to ask you for it via the internet or telephone.

8. Do not repeat passwords across services. This ensures that if a password is comprimised, the attacker's access is limited.

9. Protect your identity online. Do not respond to E-Mail with personal data, and shop only at reputable stores using 128 bit SSL encryption. Look for a Verisign or BBB seal confirming identity. Look for the padlock icon in your browser when checking out and before entering your personal data.

10. Do not give out youe E-Mail address, except to trusted sites and known friends. Anything promising you something in exchange for your E-Mail address is to be distrusted.

11. Avoid Internet Explorer. It being the most predominant browser, hackers and marketers devote most of their energy to breaking it. Assuming you use a firewall, your browser is the most exposed part of your system, it makes little sense to run the browser everyone is trying to hack.

12. Be wary of unknown removable media. Media can carry viruses, so always scan them before using. In a professional environment, disable autorun for added protection.

13. Be wary of hyperlinks from unknown persons. Such links can take you to a site which attacks your browser, captures your IP, or displays shocking or pornographic material.

14. Do not respond to spam, even to unsubscribe. Companies using unsolicited bulk E-Mail to drive site traffic are often less than legitimate or ethical, and should be avoided.

15. Do not set up a public server unless you know what you are doing. Too many home users are victimized by hackers due to their own experience while experimenting with server technology. If you don't know how to properly harden a server, keep it on you LAN.
-------------------------------------------------------------------------------

This is the list at this time. Please feel free to post comments, suggestions, and additions, as well as pass this on to those who need it.
 
OK, I'm being pessimistic, I know this. I have also supported too many people to know better. :p

Let me play the role of typical user. (OP asked me to look at this as an end user document).

1. Update, update, update. Any system with outdated OS, Anti-Virus, and Anti-Spyware is vulnerable to common, well known exploits. Ensure that you are using Virus and Malware control of excellent strength, to protect you from common computing menaces.
How do I update? Is there a web site I can go to that updates everything? I have windows, is that outdated? I have anit-virus, but what is spyware or malware? How do I make sure it's strong enough to do the job?

Do you see where I'm going? WAAAY to technical. With end users, remember K.I.S.S. Honestly I don't think a general user will EVER get what your talking about. It's like asking me to give an engine a tune up. What I know about cars can be summed up in 3 letters GTO. End users know about as much with computers.
 
Well, users in a business setting with managed IT need not worry about updates. But a good IT staff will explain that updates are being done to put users concerns at ease.
 
16. If you can't follow rules 1-15, sell your PC and start saving for a Mac. NOW! DO IT TODAY!!! STOP CALLING ME!!!!! [oh sorry. getting a little frustrated here and need to vent]
 
While your intentions are good, I think there's a simpler way to go about this. Create an acceptable use policy. Anything outside what the AUP/contract says is grounds for dismissal. Its straight and to the point. Don't want some user installing a screensaver (and spyware with it)? Then place a paragraph or two in the contract forbidding the installation of non-work approved software. Done.

For things that cannot be governed in such a way, provide a SIMPLE solution. If you want them to backup their data regularly, make it so they have to use a network drive which is automatically backed up for them by the IT staff. It keeps the users doing what they're supposed to be doing: work.

If this isn't in a business setting, then overall I believe the guide is a good start. But I also see the potential for it to open up the floodgates of questions by the non-techy as Pheonix86 has already illustrated. Instead of letting it become the worlds biggest FAQ, you should leave in links for related information. Let the user educate himself. It follows the adage "Give a man a fish and you feed him for a day. Teach a man to fish and you feed him for life."

For those that would rather ignore the stop sign and blow through the intersection, so to speak, well, I don't mind charging them for cleaning up their messes. In fact it can pay pretty damn well.
 
jmroberts70 said:
16. If you can't follow rules 1-15, sell your PC and start saving for a Mac. NOW! DO IT TODAY!!! STOP CALLING ME!!!!! [oh sorry. getting a little frustrated here and need to vent]
This doesn't hold true anymore as Apple just patched some critical flaws themselves. If you ignore warnings to keep your system up-to-date it doesn't make a difference what OS you are using.
 
Just as a follow up, do you really want to be explaning these rules to users like this?
 
BobSutan said:
Just as a follow up, do you really want to be explaning these rules to users like this?
Well, gotta start somewhere. A little bit of education can avert the majority of computer problems in the world.
 
^ LOL!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! OMG hahahah man... that was a nice laugh..
 
Thats getting posted at work tomorrow!!! Funniest thing ive read all day!

i wish i was in a situation where i could force users to do updates. Instead we have to revert to threats of $20 virus charges and informational videos (Granted, we got some great outtakes from our current batch im editing). The joys of working a residence hall network on campus :D
 
Also, please bear in mind that a large portion of average PC users are under the impression that a firewall will block all viruses ... I get that all the time here at work. I list the viruses that they got, and they say "but I have a firewall" (usually Norton Internet Security or ZoneAlarm) ...
 
I'm working on some stuff to help provide some standard operating procedures. I'll see if I can come up with some stuff to add or simplify some of these.

And Phoenix:
How do I update? Is there a web site I can go to that updates everything? I have windows, is that outdated? I have anit-virus, but what is spyware or malware? How do I make sure it's strong enough to do the job?
I'm working on a good article-like essay for that currently, too. Obviously, some things won't be answered definitively (because of the ever-changing status), but a lot of the mystery can be taken out of it for both the general end-user and even the enthusiast.

I'll try to toss in some info when I get it compiled and put into better wording.
 
<------------ Will be here to punch holes in it. :)

I have to write end user docs at work from time to time, so I get the follow up questions. Just remember, who your audience is. That's soooo important, an end user will not read 10 pages of technical jargon in 8pt font with no pics.

PICS!

;)
 
Yeah, pics make a huge difference. I used six pages of 640x480 snapshots to walk a client through getting images from a camera to the hard drive via a USB card reader.

<------------ Will be here to punch holes in it. :)
I'm counting on it.
 
rampant paranoia 101


a personal checklist
---------------------------------------------------------------
install Service Pack and hotfixes
close the vulnerable NetBIOS ports and cleanup bindings
Cofigure IPSec
Retrict access to LSA info

disable unecessary services

disable Guest account
setup my user account
rename Administrator account
create fake Administrator account (disabled)
enable network lockout of the true Administrator account
Limit the number of logon accounts
Remove the "Everyone" group and replace with "Authenticated Users" shares

disable HTML in e-mail
disable ActiveX
rename shscrap.dll to shscrapold;
Unhide File extensions, protected files, all files and folders
disable default shares
Enable Encrypted File System
Encrypt the Temp Directory
setup to clear the paging file at shutdown
lockdown the registry
disabling or limiting WHS\VB\Java\Java Scripts (install HTAstop, Script Defender)
disable dumpfile creation
remove insecure subsystems (OS/2 and POSIX)
protect or remove: arp.exe \ at.exe \ cacls.exe \ cmd.exe \ Command.com \ cscript.exe \ debug.exe \ edit.com \ edlin.exe \ finger.exe \ ftp.exe \ pconfig.exe \ Issync.exe \ nbtstat.exe \ net.exe \ Net1.exe \ netstat.exe \ netsh.exe \ nslookup.exe \ ping.exe \ posix.exe \ qbasic.exe \ rcp.exe \ regedit.exe \ regedt32.exe \ regini.exe \ rexec.exe \ rsh.exe \ route.exe \ Runas.exe \ runonce.exe \ telnet.exe \ tftp.exe \ tracert.exe \ Tlntsvr.exe \ wscript.exe \ xcopy.exe
remove the .reg file association from the registry editor

Install and schedual trojan scanner, anti virus and intrusion detection
Install and configure Worm Guard and WHS Anti Polymorphisim patch

configure security policy control
enable auditing (logon, object, privilege, account management, policy, system)
set permissions on the security event log
set account lockout policy
assign user rights
set security options
configure firewall

Test
Run Baseline Security Analyzer (freeware)
> connect to the internet
Run NessusWX (freeware)

Do a remote Port Scan
--------------------------------------------------------------------------------------------------------------------------------

of course this is the perfect opportunity for GreNME
to address exactly what might consitute an unessasary service
and or NETBIOS port :p ;)


while its very rare I actually complete all of these on any one machine
I consider them all ;)
 
I'll be putting one together, Czar, but I have to get more info and put it together in a reasonably readable chunk, but I need more info from a few individuals and I need to do some more research myself as well.

The only thing slowing me down right now is my being 1200 miles away from home on vacation. Sorry for the delay. ;)
 
Back
Top