Carry a Big Stick
Lest anyone come away from this story with the idea that you can be safe without a panoply of security products, we'll take this opportunity to remind you: Every PC needs effective and up-to-date antivirus, personal firewall, antispyware, and antispam. You'll find our latest reviews of these security utilities, alone and bundled into suites, plus loads more tips for keeping your computing on the safe side, at http://go.pcmag.com/security .
Give Windows Firewall Its Moment in the Sun
One of the first things you'll want to do with a new system is download updates to the operating system and applications, activate any security software that came with your system, and install any security software that didn't.
Hold on. To do most of this, you'll have to get online—sans adequate security. Windows XP does come with a personal firewall, although it does only half the job. Still, before you even plug in the cable that will connect your PC to the Internet, go to the Control Panel, double-click on Windows Firewall, and switch it on. Later, when you've got a full personal firewall installed and updated—along with the rest of the security canon—you'll want to disable the Windows one and simply use the Security Center to confirm that your security apps are functional and up to date.
Update AutomaticallyReading about a new virus outbreak or Windows security hole every few weeks—or every few days, at times—is worrying. Keeping the operating system patched with the latest security fixes is critical. During setup of Windows XP Service Pack 2, either with a new machine or an update, you're asked whether to turn on automatic updating. If you spazzed and clicked No, find the option in Windows Security Center and make the change
We've said it before, and we're gonna just keep on saying it: Any word in the dictionary is not a strong password, no matter how many syllables it has. A password should consist of at least eight characters, including letters, numbers, and symbols. We urge you to check out our story on password crackers (go.pcmag.com/passwords)—these clever little programs aren't getting any slower. You may also want to consider long, easy-to-remember passphrases instead—see http://go.pcmag.com/passphrase for more on this.
Lock Your Windows
Get in the habit of locking your system before you walk away. It couldn't be easier: Just press the Windows key plus the L key and the system will immediately lock, requiring your log-on password (or an administrator's) to function again.
If your keyboard is missing the Windows key (IBM PCs, for example, lack them), pressing Ctrl-Alt-Del, then Enter, will accomplish the same (although some will hit a snag here; for more details, see this User to User tip).
Use Wpa for Wireless Network Security—Or Make the Best of Wep
We recommend using WPA-ready wireless equipment, but many of us are stuck with WEP-only wireless cards or access points. Neither security protocol is particularly intuitive to set up, but if you leave your wireless connection unsecured, the very least you can expect is a hitchhiker or two on your connection.
We've put together a comprehensive guide to setting up a WPA-encrypted connection; you'll find it at http://go.pcmag.com/wpa .
For those using WEP—which isn't weak, exactly, although it can be broken—make the best of it. As sure as any lock can be picked, someone who's determined enough will get through WEP encryption. But most people aren't determined. You want to bolster your WEP connection with as many of the following steps as your hardware will allow:
Spyware is like the common cold. You didn't do anything risky—it seems as if you must've gotten it by touching a doorknob or something similarly innocuous. Your system starts to drag a little, and then a lot… and then things start getting weird, with loads of pop-ups, maybe a changed browser home page. Of course, your immune system will wipe out your cold eventually, whereas spyware tends to get worse and worse, often inviting its spyware buddies to little parasite parties on your system.
So, how do you pick up spyware? About as easily as a cold—all you have to do is browse the Web for a while. Not all freeware is really free—in some cases, you pay by getting spyware along with it. If you use a peer-to-peer file-sharing program, you almost certainly have spyware, either directly bundled with the sharing program or from an infected fellow file sharer.
There are steps you can take to minimize your risks, but we recommend purchasing a good antispyware utility and keeping it up to date (for reviews of antispyware utilities, visit http://go.pcmag.com/security ) and following safe computing practices: