Specifications
46
Security Tip -- Password protect network shares. Some viruses are able to search the network and
do damage to shares. This will not protect shares if the machine that accesses then is infected. But
it will prevent damage if another computer on the network gets infected.
Configuration Tip -- Second Copy cannot copy files that are in use. For example the Outlook
mail client is always running, preventing backup of mail files. The Second Copy profile for mail is
setup for manual copy. To backup mail, Outlook is shutdown and the profile activated manually.
19.2 Off Line Backup
There is no substitute for off line backup. It is the best way to recover from virus or physical damage, such
as a fire. If your data consists of a few e-mails or text documents a floppy will suffice. Zip Drives, CD-R,
or tape can be used to create large off line backup.
I chose Zip Disk because it functions as either a backup medium or as a large floppy. Zip Drives come in
100Megabyte and 250Megabyte versions. I chose the 100MB because it is the most common. I grossly
underestimated the size of backup data. Next time I’ll select a larger backup device.
Occasional backup to off line storage allows recovery if the worst happens. For maximum safety the
backup copies should not be stored in the same location at the computer.
20 Safe Computing -- Keeping the Bad Guys Out
It is easy to forget that Internet connectivity is a double edge sword. Being connected gives one access to
the vast resources of the Internet but at the same time makes your computer vulnerable to attack.
Unfortunately a significant number of talented individuals take delight in wreaking havoc on others.
20.1 Firewall
The first line of defense is to control data entering and leaving the LAN. A firewall imposes a set of rules
on data entering the local network. Some, such as ZoneAlarm also control what leaves the network.
Unless you are running some form of public server on your network incoming security is relatively easy,
refuse all incoming connection requests. Our business web and mail server are hosted eternally. Access to
them is polled. This means ALL connection requests that originate outside the SOHO LAN are refused.
One of the benefits of NAT is that by default it prevents connection attempts from remote computers. Only
the IP address of the NAT router is visible to the attacker. If a remote host attempts to connect to the public
IP address the NAT router prevents the connection because it doesn’t know which computer to send the
packet to. Only if explicit mapping rules are created will NAT know how to route the request.
The router allows specific IP addresses/ports to be blocked. This can be used to enforce additional
restrictions on incoming and outgoing traffic. This is especially useful if you have configured the router to
support a public server on the LAN.
20.2 Anti Virus Software
We use Mcafee VirusScan. It checks files stored on the system and verifies e-mail and downloads. New
attacks are constantly being developed, it is important to keep the anti virus program up to date.