Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Comments

top

A Security Guide For Non-Technical Users?

kin_korn_karn Re:Why should log off in your own home? (274 comments)

e thing you need to protect from is your computer being compromised from the outside by someone intent on using it for a botnet. That's really the only value that your PC has outside of physically stealing it. That means using anti-virus software, getting email filtered for viruses, keeping up on windows updates, using firefox instead of IE, and implenting WPA security . None of those things really interfere with anyones usage of the computer, so they shouldn't have any objections.

That's exactly what I worry about with them. Leaving it logged in like they do leaves it open to exploits. And I'm not talking about logging out every time you go to the bathroom or eat dinner - They leave it logged in literally all the time and leave it on 24/7. It's just asking for trouble.

Some asshole above said something about me being paranoid about "ninjas breaking in and stealing their data." Not hardly. But having an admin user logged into a machine 24/7 is, by default, a security hole, that needs to be fixed.

Even a lot of their non-security issues would be solved by separate user accounts, so that they could have individual bookmarks, email client configs, etc.

more than 7 years ago

Submissions

top

kin_korn_karn kin_korn_karn writes  |  more than 7 years ago

kin_korn_karn writes "Like many of you, I am the family IT department. I cannot convince my parents to follow proper PC security procedures. I'm not talking about enterprise-level things such as card swipes and fingerprint scanners, just simple measures like logging off of the PC when it's not in use. They, like many people of their generation, seem to be willing to sacrifice security for convenience, as long as their real data isn't being impacted. I can't seem to get it through to them that it's only a matter of time until they are.

Since my own arguments aren't working, I need documented proof to back it up.

Does anyone know of a guide to IT security that:

a) Is written for a non-technical audience, but is neither condescending nor overly "soft."

b) Defines the various terminology (trojan, virus, zombie, etc.) clearly

c) Explains what threats each security measure protects the user from

d) Uses cases and examples to demonstrate the before and after scenarios. i.e. "Jane's credit card number was intercepted via a non-encrypted connection. She started looking for the padlock symbol on her browser's status bar. Now, her credit card number looks like this: @*#(!@($)." (That's just an example, by the way.)

This can be either an online document or a print book.

Thanks."

Journals

kin_korn_karn has no journal entries.

Slashdot Login

Need an Account?

Forgot your password?