Tuesday, September 17, 2013

Tips for safely using e‑mail and the web

Use caution when opening e‑mail attachments. E‑mail attachments (files attached to e‑mail messages) are a primary source of virus infection. Never open an attachment from someone you don't know. If you know the sender but were not expecting an attachment, verify that the sender actually sent the attachment before you open it.

Guard your personal information carefully. If a website asks for a credit card number, bank information, or other personal information, make sure you trust the website and verify that its transaction system is secure.

Be careful when clicking hyperlinks in e‑mail messages. Hyperlinks (links that open websites when you click them) are often used as part of phishing and spyware scams, but they can also transmit viruses. Only click links in e‑mail messages that you trust.

Only install add-ons from websites that you trust. Web browser add-ons allow webpages to display things like toolbars, stock tickers, video, and animation. However, add-ons can also install spyware or other malicious software. If a website asks you to install an add-on, make sure that you trust it before doing so.

Set up a security key for a wireless network

Personal information and files on your wireless network can sometimes be seen by people who pick up your network signal. This can lead to identity theft and other malicious acts. A network security key or passphrase can help protect your wireless network from this type of unauthorized access.

The Set Up a Network wizard will guide you through setting up a security key
We don't recommend using Wired Equivalent Privacy (WEP) as your wireless security method. Wi‑Fi Protected Access (WPA or WPA2) is more secure. If you try WPA or WPA2 and they don't work, we recommend that you upgrade your network adapter to one that works with WPA or WPA2. All of your network devices, computers, routers, and access points must also support WPA or WPA2.

Wi‑Fi Protected Access (WPA and WPA2)
WPA and WPA2 require users to provide a security key to connect. Once the key has been validated, all data sent between the computer or device and the access point is encrypted.

There are two types of WPA authentication: WPA and WPA2. If possible, use WPA2 because it is the most secure. Almost all new wireless adapters support WPA and WPA2, but some older ones don't. In WPA-Personal and WPA2-Personal, each user is given the same passphrase. This is the recommended mode for home networks.

Wired Equivalent Privacy (WEP)
WEP is an older network security method that's still available to support older devices, but it's no longer recommended. When you enable WEP, you set up a network security key. This key encrypts the information that one computer sends to another computer across your network. However, WEP security is relatively easy to crack.

There are two kinds of WEP:
  1. Open system authentication 
  2. Shared key authentication
Neither is very secure, but shared key authentication is the least secure of the two. For most wireless computers and wireless access points, the shared key authentication key is the same as the static WEP encryption key the key that you use to secure your network. A malicious user who captures the messages for a successful shared key authentication can use analysis tools to determine the shared key authentication key, and then determine the static WEP encryption key. After the WEP encryption key has been determined, the malicious user has full access to your network.

If you still want to use WEP shared key authentication, you can do by following these steps:
To manually create a network profile using WEP shared key authentication
  1. Click to open Network and Sharing Center. 
  2. Click Set up a new connection or network.
  3. Click Manually connect to a wireless network, and then click Next.
  4. On the Enter information for the wireless network you want to add page, under Security type, select WEP.
  5. Complete the rest of the page, and then click Next.
  6. Click Change connection settings.
  7. Click the Security tab, and then, under Security type, click Shared.
  8. Click OK, and then click Close.

What is a smart card and how it works?

A smart card is a small plastic card containing a computer chip. People use smart cards along with personal identification numbers (PINs) to log on to a network, a computer, or a device. Using a smart card is more secure than using a password because it's more difficult for someone to steal a smart card and learn your PIN than to learn your password.

Smart cards are generally issued by information technology (IT) departments in large organizations. To use a smart card, you also need a smart card reader a device that’s installed in or connected to your computer and that can read the information stored on a smart card.

To log on to a Windows 7-based computer with a smart card
  1. Connect the smart card reader to your computer or Laptop, if necessary. 
  2. Insert your smart card into the smart card reader. 
  3. Press Ctrl+Alt+Delete. 
  4. At the logon screen, click Switch User. 
  5. Click the smart card icon, type your PIN, and then press Enter.