Chapter 13. Maintaining Security

In this section

In days of old, only the administrators of large corporate networks had to worry about computer security. These days, with the proliferation of computer viruses, constant connections to the Internet, home networks, and sophisticated hacking techniques used by an ever-growing cadre of snoops and pranksters, everyone should be vigilant. In this section you’ll find valuable information about the ways you can protect your files, your privacy on the Internet, and so on. If other people use your computer, you can protect your sensitive files from prying eyes by restricting user rights, by creating a password that protects the computer from unauthorized access, or by placing sensitive material in a compressed and encrypted folder. You can even lock your computer.

When you visit an Internet site that requests personal information, you can restrict the amount of information you provide by creating a special profile for that purpose. You can also control "cookies," those little files that Web sites use to keep track of your visits and preferences and that compile a lot of personal information about you. We’ll also show you how to configure the Windows Firewall to create a high level of security. If several people use your computer (especially if any are children), you can use Content Advisor to restrict access to Internet sites that contain material you consider inappropriate. If you’re setting up a wireless network, you can add security to prevent unauthorized access to the network. To monitor your overall security, check in periodically with the new Security Center, to verify that your firewall, virus protection, and software updates are working hard to protect you.

Keeping Your Files Private

If other people use your computer, they can normally gain access to any of your files, including those in your My Documents folder. If your computer uses NTFS (the NT file system), however, you can keep your files private so that only you can access them when you log on to the computer.

Keep the My Documents Folder Private

Keep the My Documents Folder Private

Choose My Computer from the Start menu to open the My Computer window.

Right-click your Documents folder (it shows your logon name), and choose Sharing And Security from the shortcut menu.

Keep the My Documents Folder Private

On the Sharing tab, select this check box to keep the folder private.

Click OK.

Keep the My Documents Folder Private

If you’re notified that you don’t have a password, click Yes, and create a password.

See Also

See Also

For information about NTFS, see "Know Your Rights, Know Your Format".

For information about creating a password, see "Setting Your Password".

Caution

Caution

When you keep your My Documents folder private, you’re also keeping all its subfolders private, including the My Music, My Pictures, Desktop, and Favorites subfolders. If you want to share any files from these folders, move them into the Shared Documents folder.

Setting Your Password

Unless you create a password that allows you to gain entry to your user account, anyone can log on to your computer and access your files. If you want to protect the computer from unauthorized access, create a password that’s easy for you to remember and difficult for others to guess.

Create a Password

Create a Password

Choose Control Panel from the Start menu, click the User Accounts category, and click your account to display the User Accounts window.

In the User Accounts window, click Create A Password.

Type your password, and then type it again to confirm that you didn’t make a typing error.

Type a hint that will remind you, but no one else, of your password.

Click Create Password.

Create a Password

If Windows asks you whether you want to make your files private, click Yes, Make Private if you want to prevent access by anyone other than yourself to all the files in the My Documents folder and its subfolders.

Caution

Caution

Passwords are case-sensitive—that is, MyPASSWORD and mypassword are two different passwords. Make sure that you remember and use the correct capitalization. If you have a problem logging on with your password, make sure the Caps Lock feature isn’t turned on.

Tip

Tip

Windows will ask you whether you want to make your files private only if your computer uses NTFS and if you haven’t already made the files private.

See Also

See Also

For information about changing a password, see "Changing Your Password" and "Resetting Your Password".

Changing Your Password

One of the best ways to prevent others from using your account is to change your password occasionally—especially if you’ve given it to someone or you suspect that someone might have guessed it or watched you type it. When you do change your password, create one that can’t be easily guessed (don’t use "password" or your well-known nickname, for example), and try to incorporate both uppercase and lowercase letters as well as one or two numbers. Of course, don’t make the password so complicated that you can’t remember it!

Change Your Password

Change Your Password

Choose Control Panel from the Start menu, click the User Accounts category, and click your account to display the User Accounts window.

Click Change My Password.

Change Your Password

Type your current password.

Type your new password.

Type the new password again to confirm that you didn’t make a typing error.

Type a hint that will remind you, but no one else, of your password.

Click Change Password.

Resetting Your Password

Few things are more maddening than trying repeatedly to log on, only to realize that you’ve forgotten your password! If this happens, you have two choices: You can reset the password (or, if you’re a member of the Limited group, you can ask an Administrator to reset it for you), which means that you’ll lose all your settings and any security credentials and certificates; or you can use your Password Reset disk to log on and reset your password and save all your settings and credentials. The latter is obviously the better choice, so you should create a Password Reset disk while you still remember your password.

Create a Password Reset Disk

Create a Password Reset Disk

Choose Control Panel from the Start menu, click the User Accounts category, and click your account.

Click Prevent A Forgotten Password in the Related Tasks list in the User Accounts window to start the Forgotten Password Wizard.

Step through the wizard, inserting a blank floppy disk in the drive and entering your current password when prompted. When you’ve completed the wizard, remove the disk, label it as your Password Reset disk, and store it in a secure location.

Reset Your Password

Reset Your Password

Click here to see your password hint. Enter the password if the hint did its job.

If you still don’t remember the password, click here, and, in the pop-up box that appears, click Use Your Password Reset Disk.

Reset Your Password

Step through the Password Reset Wizard, inserting your Password Reset disk into the drive. When prompted, type a new password and a new (and better!) password hint.

Reset Your Password

After completing the wizard, type your new password, and press Enter.

Protecting Your Files with a Password

If your files contain sensitive information that you want to protect from prying eyes, place the files in a compressed folder, and create a password. Then, regardless of where those files are located—on your computer, in a shared folder on a network, or on a floppy disk that you lost somewhere—they can be opened and viewed only by you or by someone who knows that password.

Encrypt a Compressed Folder

Encrypt a Compressed Folder

Create and open a new compressed folder. Copy your sensitive files into the folder.

Choose Add A Password from the File menu to display the Add Password dialog box.

Enter a password. (The password is case-sensitive, so remember your combination of uppercase and lowercase letters.)

Reenter the password.

Click OK.

Close the compressed folder.

Encrypt a Compressed Folder

When you want to access the files, double-click the compressed folder to open it, double-click a file, and enter the password when prompted.

See Also

See Also

For information about working with compressed folders, see "Compressing Files".

Tip

Tip

The encryption—that is, the scrambling of text to make it unreadable—of your files can’t be cracked unless you’re a very sophisticated cryptologist, so make sure you don’t forget the password.

Restricting User Rights

One of the surest ways to protect your computer from either malicious or accidental damage is to be extremely cautious when you’re deciding on the select few who are responsible enough to be allowed full access to the computer. If you’re the least bit uncertain, you can always assign people to the Limited group or ask them to log on as Guest users.

Change the Type of Access

Change the Type of Access

Choose Control Panel from the Start menu, click the User Accounts category, and click the account you want to change to display the User Accounts window.

In the User Accounts window, click the Change The Account Type task.

Click the Limited option.

Click Change Account Type.

Close the User Accounts window.

Caution

Caution

Make sure that every member of the Administrators group uses a password to log on. Otherwise, a member of the Limited group could use an Administrators account to make changes (and could even change his or her account to that of an Administrator).

Use the Guest Account

Use the Guest Account

If the Guest account isn’t listed on the Welcome screen when you first log on (or when you choose Switch Users from the Start menu), click the User Accounts category in the Control Panel, and click the Guest account.

Click Turn On The Guest Account.

Close the User Accounts window.

To use the Guest account, click Guest when you log on. (You can’t have a password with the Guest account.)

Locking Your Computer

If you leave your computer unattended for a while, you can lock it so that even though the programs that were running will continue to run, no one can access the computer using your name. Exactly what happens depends on whether or not you have Fast User Switching enabled.

Lock the Computer

Lock the Computer

On your keyboard, press the Windows key + L.

If Fast User Switching is enabled, you’ll see the same window that appears when you choose to switch users, and you or another user can log on or resume working.

Lock the Computer

If Fast User Switching isn’t enabled, the Unlock Computer dialog box appears, and you can log on using your name, or a member of the Administrators group can log on, causing your account to be logged off.

See Also

See Also

For information about securing the computer using a screen saver, see "Using a Screen Saver".

Tip

Tip

Fast User Switching is the tool that allows another user to log on to your computer without your having to log off. To enable or disable Fast User Switching, open the Control Panel, click the User Accounts category, and click the Change The Way Users Log On Or Off task.

Protecting Personal Information on the Internet

Some Web sites that you visit ask you to provide information, such as your name and e-mail address. Others are less direct; they use cookies—little text files that are written by the Web site and stored on your computer—to track your activities. Despite their friendly name, cookies can be insidious invasions of your privacy, often using the material they gather for advertising, demographic data, and so on. You can set up Internet Explorer to limit the amount of information you reveal when you’re on the Internet.

Set Your Profile

Set Your Profile

Start Internet Explorer if it isn’t already running, choose Internet Options from the Tools menu, and then click the Content tab of the Internet Options dialog box.

Click My Profile.

Set Your Profile

In the Address Book dialog box that appears, select the option to create a new entry, and click OK to display the Properties dialog box. Use the different tabs to enter only the information you’re willing to reveal to the Web sites you visit.

Click OK.

Tip

Tip

Many Web sites permit access only when you allow cookies; others might not work properly when cookies are disabled.

See Also

See Also

For information about blocking pop-up windows, see "Controlling Pop-Up Windows".

For information about adjusting general security settings, see "Restricting Internet Access".

Control Those Cookies

Control Those Cookies

Click the Privacy tab of the Internet Options dialog box.

Drag the slider to specify the level of privacy you want. Read the description of the restrictions for that level. If the slider isn’t visible, click the Default button, and then use the slider to set the level you want.

If there are specific sites for which you want to either allow or block cookies, click Sites.

Click Advanced if you want to customize the way cookies are handled, and then click OK in the Advanced Privacy Settings dialog box.

Click OK.

Try connecting to your Web sites. If you’re unable to connect, or if the Web pages don’t open fully, you can then allow cookies for these sites by using the Sites button.

Control Those Cookies

Type or paste the Web site’s address.

Specify whether you want to always allow cookies for this site or always prohibit cookies for this site.

Click OK.

Setting Internet Explorer Security

Although most Web sites pose little security threat to your computer, some sites are designed with malicious intentions. To protect yourself from these sites, as well as to allow access to additional features for sites you know aren’t going cause any harm, in Internet Explorer you can set and customize your own security levels and can add sites to your list of trusted—or restricted—Web sites.

Set Your Security

Set Your Security

In Internet Explorer, choose Internet Options from the Tools menu, and click the Security tab of the Internet Options dialog box.

Click a zone.

Click the Sites button, type or paste an address for a Web site you want to include in that zone, and click Add. Continue adding any other sites you want in that zone, and click OK when you’ve finished. (Note that you can’t add any Web sites to the Internet zone.)

Do either of the following:

  • Use the slider to adjust the level of security. If the slider isn’t visible, click the Default Level button, and then use the slider.

  • Click Custom Level, and select the options you want in the Security Settings dialog box. Click OK.

Repeat steps 2 through 4 for the other zones, and then click OK.

Tip

Tip

The Internet Explorer security settings aren’t the only means by which content can be restricted. The Windows Firewall also restricts the downloading of potentially dangerous material and restricts access to your computer from the Internet.

See Also

See Also

For information about using parental controls for limiting access to certain types of sites, see "Restricting Internet Access" on the facing page.

For information about security settings using the Windows Firewall, see "Configuring the Windows Firewall".

Restricting Internet Access

The Internet provides access to many things—some weird, some wonderful, and some that might not be appropriate for everyone who uses your computer. To restrict access to certain types of sites—those that contain sexually explicit or violent material, for example—you can use Content Advisor.

Set the Restrictions

Set the Restrictions

Start Internet Explorer if it isn’t already running, choose Internet Options from the Tools menu, and click the Content tab of the Internet Options dialog box.

Click Enable.

Click OK.

Set the Restrictions

In Content Advisor, click a category.

Move the slider to adjust the acceptable level of material that can be accessed. Repeat to set levels for the other categories.

Set the Restrictions

On the General tab, select or clear check boxes to specify whether unrated sites may be accessed and whether a password may be used to allow access to restricted sites.

Click Create Password, enter and confirm your password, provide a hint for the password, and click OK.

Click OK.

Caution

Caution

You must use a password; otherwise, anyone can disable Content Advisor.

Monitoring Your Security Settings

Monitoring Your Security Settings

Although there are many different high-security settings in Windows, there are three big ones: Windows Firewall, Virus Protection, and Automatic Updates. With the new Security Center, you can easily monitor your settings and can adjust them as needed.

Check Your Primary Settings

Check Your Primary Settings

Choose Control Panel from the Start menu, and click the Security Center category to display the Security Center window.

Check the status of the Windows Firewall, Automatic Updates, and Virus Protection features.

Click the down arrow next to an active feature to see detailed information.

If an item is turned off or is not configured, click the appropriate button, and follow any instructions.

Tip

Tip

The Windows Firewall and the Automatic Updates features are part of Windows XP, but the Virus Protection software is provided by third-party software companies. Make sure you’ve set the anti-virus software to automatically download updated files and to conduct real-time scanning.

See Also

See Also

For information about customizing the Windows Firewall settings, see "Configuring the Windows Firewall".

For information about configuring the way automatic updates are downloaded and installed, see "Installing Critical Fixes".

Check Your Other Settings

Check Your Other Settings

Click an item in the Resources section to

  • Go to the Microsoft Security Web page for the latest security information and downloads.

  • Go to Windows Update to manually download critical updates and check for noncritical updates.

  • Go to the Security Support Center Web page for additional information about security.

  • Open the Help And Support Center window for information about using the Security Center.

  • Open the Alert Settings dialog box to specify which security conditions will trigger an alert.

Click the Automatic Updates icon to display the Automatic Updates dialog box, from which you can configure your download settings.

Click the Windows Firewall icon to display the Windows Firewall dialog box, from which you can configure your settings for the Windows Firewall.

Click the Internet Options icon to display the Internet Properties dialog box. Set the security for each Web content zone, set your use of cookies, prevent pop-up windows from appearing, restrict access to certain types of Web sites, and specify the personal data you’ll permit to be shared with Web sites.

New Feature

New Feature

The Security Center, a feature introduced with Service Pack 2, constantly monitors the status of your security settings. It also provides a central location from which you can adjust your security settings, if necessary.

Configuring the Windows Firewall

Configuring the Windows Firewall

A firewall is a program that’s designed to prevent unauthorized and malicious access to your computer over the Internet. In other words, a firewall is your defense against hackers, viruses, Trojan horses, worms, and all the other horrors out there in cyberspace. Unfortunately, a firewall can also block legitimate traffic, so you might need to tweak your settings a bit.

Configure the Firewall

Configure the Firewall

Choose Control Panel from the Start menu, click the Security Center category, and click the Windows Firewall icon in the Security Center window to display the Windows Firewall dialog box.

On the General tab, verify that the Firewall option is set to On (Recommended). If you’re using a public network (such as a Wi-Fi connection in your favorite coffee shop), select the Don’t Allow Exceptions check box to increase your security.

Configure the Firewall

On the Exceptions tab, select the programs that you want to have full access to your network or to the Internet through the firewall, and clear the check boxes for any programs whose access you want to prevent through the firewall.

If the check box for displaying a notice when a program is blocked isn’t checked, check it.

Configure the Firewall

In the Network Connection Settings section of the Advanced tab, select your network connection, and click Settings to carefully make any changes that a reliable source—a software manufacturer or a Microsoft article, for example—has instructed you to make. Click OK.

Click OK, and then close the Security Center.

Allow or Block Program Access

Allow or Block Program Access

Start the program you want to use. If the program is stopped by the firewall, the Windows Security Alert dialog box will appear.

Review the name of the program and its publisher, and decide whether you trust the program and its source.

Click the button for the action you want to take:

  • Keep Blocking to deny the program access through the firewall. The Security Alert dialog box won’t appear again for this program.

  • Unblock to always allow this program access through the firewall. The program will be added to the Exceptions list for the firewall configuration.

  • Ask Me Later to deny the program access through the firewall this time. The next time the program attempts access through the firewall, the Security Alert dialog box will appear again.

Caution

Caution

If you’ve changed the default security settings for the Windows Firewall, the Windows Security Alert dialog box might not be displayed when a program is blocked. Select the Display A Notification When Windows Firewall Blocks A Program check box on the Exceptions tab of the Windows Firewall dialog box if you always want the Windows Security Alert dialog box to be displayed.

See Also

See Also

For information about manually configuring the firewall to permit certain programs or services access through the firewall, see "Creating Custom Access Across the Firewall" and "Using Windows Services Across the Firewall".

Tip

Tip

Some program, especially games, might hide the Security Alert dialog box. If necessary, click the Windows Security Alert button on the Windows taskbar, or minimize the program, to access the Windows Security Alert dialog box.

Tip

Tip

If the Don’t Allow Exceptions check box on the General tab of the Windows Firewall dialog box is checked, access across the firewall will be blocked, and the Windows Security Alert dialog box will not appear.

Creating Custom Access Across the Firewall

Creating Custom Access Across the Firewall

In most cases, when you specify that a program is allowed access to your network or to the Internet through the firewall, the program works perfectly. However, there might be times when a program you’re using doesn’t work well with the firewall. In that case, you’ll need to make some special settings to get the program to work properly, either by manually adding the program to the Exceptions list for the firewall or by adding the port number the program will use.

Tip

Tip

A port is an avenue that the computer uses to connect with the world outside the computer. Many programs don’t have fixed port numbers, so you’ll need to specify the program and let it communicate its port number to the firewall. In some cases, when this communication doesn’t work and the program uses a fixed port, you can specify the port number so that the program can use the port to access the network or the Internet.

Add Program Access

Add Program Access

Choose Control Panel from the Start menu, click the Security Center category, and click the Windows Firewall icon in the Security Center window to display the Windows Firewall dialog box.

On the Exceptions tab, click Add Program to display the Add A Program dialog box.

Select the program that you want to have access to the network or to the Internet.

If the program isn’t listed, click Browse, and, in the Browse dialog box, locate and select the program. Click Open.

Click Change Scope.

Click OK in the Add a Program dialog box, and then click OK in the Windows Firewall dialog box. Close the Security Center, and then use the program to verify that your settings work.

Add Program Access

In the Change Scope dialog box, select the location of the computers that you’ll allow this program to communicate with, or create a custom list of computers by specifying their IP addresses.

Click OK.

Add a Port

Add a Port

Obtain the port number or numbers and the protocol to be used for the program from the program’s documentation, the manufacturer’s Web site, or a Microsoft article.

In the Control Panel, click the Security Center category, and click the Windows Firewall icon in the Security Center window to display the Windows Firewall dialog box.

On the Exceptions tab, click Add Port.

Check the port you added, and then click OK. Close the Security Center, and test the program to see whether you now have access.

Add a Port

In the Add A Port dialog box, type a common name for the port that will help you identify it later.

Enter the port number you want to open.

Select the protocol to be used. In most cases, it will be the TCP protocol.

Click Change Scope if you want to restrict which computers can communicate through this port.

Click OK. Add any additional ports you need for the program.

Tip

Tip

Just in case you were wondering, TCP is the Transmission Control Protocol that’s used in most network configurations, and UDP is the User Datagram Protocol that’s used by a network address translation server.

Tip

Tip

Sometimes a program in the Exceptions list or a manually opened port won’t be recognized by the firewall until you restart the program. If the program doesn’t work after you’ve made the settings and restarted it, you’ll need to restart the computer and try again.

Using Windows Services Across the Firewall

Your computer can run a variety of services—for example, it can be an FTP server or a mail server. You’ll need to tell the Windows Firewall which services you’re running so that the firewall will allow the information to pass through. Some services—such as the ICMP (Internet Control Messaging Protocol) services that are usually used to diagnose connection problems—are disabled by default because they have been misused in various ways over the Internet. However, you can enable these if you need them.

Designate the Service

Designate the Service

Choose Control Panel from the Start menu, click the Security Center category, and click the Windows Firewall icon in the Security Center window to display the Windows Firewall dialog box.

On the Advanced tab, select a network connection if you have more than one connection.

Click Settings.

Click OK, close the Security Center, and try the service to see whether it works.

Designate the Service

On the Services tab, select the check box for each service on your computer that needs to bypass the restrictions of the firewall.

Designate the Service

Supply the information for each service, and click OK.

Caution

Caution

The services described here are advanced features and, in most cases, few if any of them will be running on a home computer. Don’t change any settings in the dialog boxes shown on these two pages unless you’re absolutely certain that you need these services.

Enable ICMP

Enable ICMP

In the Control Panel, click the Security Center category, and click the Windows Firewall icon in the Security Center window to display the Windows Firewall dialog box.

On the Advanced tab, click Settings in the ICMP section.

Click OK, close the Security Center, and have someone on another computer make a request to see whether that person receives a response from your computer.

Enable ICMP

Select a request that you think might be one you want to enable.

Read the description of the request and its purpose.

If this is a request you want, select the check box for the request.

Repeat steps 3 through 5 for any other requests you want your computer to respond to.

Click OK.

Caution

Caution

ICMP requests have been used by those with evil intentions to locate and spy on computers, and are therefore disabled by default. Enable only those requests that you must have open for troubleshooting or for making improved connections, and be sure to disable any that you’re not currently using.

Installing Critical Fixes

Microsoft continues to issue updates to Windows, fixing problems and vulnerabilities as they’re discovered. To keep your computer running smoothly and to avoid new types of attacks, it’s important that you install any critical updates that Microsoft issues as soon as they’re available. Fortunately, the Automatic Updates feature in Windows can do most of the work for you. You can choose either to have the updates automatically downloaded and installed or to have them downloaded and/or installed only after you’ve given Windows permission to do so.

Configure Your Downloading

Configure Your Downloading

Choose Control Panel from the Start menu, and click the Security Center category to open the Security Center window.

If the Automatic Updates section shows that automatic updating is turned off or that updates aren’t configured to be installed automatically, click Turn On Automatic Updates to enable automatic downloading and installation.

If you want to customize the way updates are downloaded and/or installed, click the Automatic Updates icon, and, in the Automatic Updates dialog box, select one of the following:

  • Automatic (Recommended) to have Windows take care of all the updating automatically. Specify when you want the downloaded files to be installed.

  • Download Updates... to have Windows check for and download any updates, but to wait for your confirmation before installing any files.

  • Notify Me... to have Windows check for updates and to notify you that they’re available for download. When they’re downloaded, Windows will ask your permission to install the updates.

  • Turn Off Automatic Updates to prevent Windows from checking for updates.

Click OK when you’ve finished.

See Also

See Also

For information about manually checking for updates, both critical and noncritical, see "Updating Your System".

For information about determining which service packs are installed, the Windows version and build number you’re using, and which updates you’ve installed, see "Checking the Status of Windows".

Download an Update

Download an Update

If you chose to be notified by Windows to download updates, click the Windows Update icon in the notification area of the Windows taskbar to display the Automatic Updates dialog box.

Click an update if there’s more than one, and read the description of the update.

If you don’t want to download the update, clear its check box.

To download the update, click Download, and wait for the Windows Update icon to reappear.

Install an Update

Install an Update

Click the Windows Update icon in the notification area of the Windows taskbar to display the Automatic Updates dialog box.

Select one of the following:

  • Express Install (Recommended) to have Windows install all the updates.

  • Custom Install (Advanced) to select only the downloads you want to install.

Click Install, and wait for the updates to be installed. If you’re told that you need to restart the computer, click Restart in the dialog box that appears, or click Close if you have any unsaved information in running programs and you want to save the information before restarting. If you clicked Close, restart your computer after you’ve closed all your programs.

Using a Digital ID for Secure E-Mail Messages

If you’re worried about prying eyes on the Internet, you can protect your e-mail messages by encrypting them so that only people with the correct digital ID can read them. You can also digitally sign your messages to authenticate their origin. You obtain your digital ID from a security provider, and then you exchange digital IDs with your intended recipients. You can’t send an encrypted message without knowing your recipient’s digital ID.

Set Up Your Security

Set Up Your Security

In Outlook Express, choose Options from the Tools menu, and, if you don’t already have a digital ID (also called a certificate), click Get Digital ID on the Security tab of the Options dialog box. Follow the instructions provided to install your digital ID.

Click OK.

Set Up Your Security

Choose Accounts from the Tools menu, and, on the Mail tab, select your mail service, and click Properties to display the Properties dialog box.

On the Security tab, under Signing Certificate, click Select, select the certificate for signing, and click OK.

Under Encrypting Preferences, click Select, select the same or a different certificate for encryption, and click OK.

Click OK to close the Properties dialog box, and click Close to close the Accounts dialog box.

Caution

Caution

Most digital IDs require a POP3 mail service, so you might not be able to send a digital ID using a Web-based e-mail service such as Hotmail.

Tip

Tip

The digital ID you send out is your "public key." A private key is stored on your computer and is used along with the public key to decrypt messages. The private key exists only on your computer, so you can read encrypted messages only on that computer.

Exchange Digital IDs

Exchange Digital IDs

Create a message, click the Sign button, and send the message. Have someone send you a digitally signed message.

Double-click the digitally signed message you’ve received to open it, and, in the header of the message window, click the Digital Signature button.

Exchange Digital IDs

On the Security tab of the message’s Properties dialog box that appears, click View Certificates.

Exchange Digital IDs

In the View Certificates dialog box, click Signing Certificate to see the information about the certificate. Click OK when you’ve finished.

Click Add To Address Book, and click OK. Click OK again to close the message’s Properties dialog box.

Create a message addressed to the person with whom you exchanged digital IDs, click both the Sign and the Encrypt buttons on the Standard Buttons toolbar, and send the message to make sure the transfer of IDs was successful.

Try This

Try This

After you’ve set up your digital ID, choose Options from the Tools menu, and, on the Security tab of the Options dialog box, select the check boxes for encrypting and signing your outgoing messages. Click the Advanced button, and, in the Advanced Security Settings dialog box, select the check boxes for encrypting mail to yourself, for including your ID, and for adding certificates to your address book. Then select the option to check for revoked IDs, and click OK.

Securing Your Wireless Network

Securing Your Wireless Network

Unless your wireless network is properly protected, it can be used by anyone within range of the network. This means that an unscrupulous person could tap into your network to gain access not only to the Internet but to all your personal files! Fortunately, the enhanced security provided by Windows XP with Service Pack 2 can defeat such intrusions by requiring a security key in order to gain access to the network from a wireless computer. You can configure your network security in one of two ways: You can use a USB storage device to transfer the required code to the wireless base station and to each wireless computer and network printer, or you can enter the information manually yourself.

Tip

Tip

In case you were wondering, SSID is Service Set Identifier, WEP is Wired Equivalent Privacy security services, and WPA is Wi-Fi Protected Access security protocol. These features are all part of the IEEE 802.11 standard that’s used in most wireless networks.

Tip

Tip

In the Wireless Network Setup Wizard, select the Use WPA Encryption check box if you need to use the less powerful WPA encription instead of WEP encryption for compatibility with network components.

Configure Your Security

Configure Your Security

With your wireless network already set up and working, choose Wireless Network Setup Wizard from the Communications submenu of the Start menu, and click Next to start the wizard.

Enter a name for your network.

Specify which way you want to set up your network security key:

  • Automatically Assign A Network Key (Recommended) to automatically create and assign a key

  • Manually Assign A Network Key to create your own key or to use a key that has already been assigned to components on this network

Configure Your Security

Click Next. If you chose to manually assign a network key, enter the key, and then click Next.

Specify whether you want to save the network settings on a USB storage device for automatic configuration, or whether you want to print out the settings and manually configure each device.

Click Next, follow the directions to configure your network security, and complete the wizard.

Configure Your Network

Configure Your Network

If you previously completed the Wireless Network Setup Wizard but you don’t have the security settings printed out or saved on your USB storage device, start the wizard again from the Communications submenu of the Start menu. Step through the wizard, and choose to add new computers to your network. Click Next, and choose either to use a USB storage device or to configure each item manually.

If you’re using a USB storage device, complete the following steps:

  1. Insert the USB device into the computer, and download the settings from the wizard to the device.

  2. Insert the USB device into the wireless base station, and wait for the network key to be downloaded.

  3. Insert the USB device into each computer that will be on the wireless network, and choose to run the Wireless Network Setup Wizard. When prompted, choose Yes to add the computer to the network.

  4. Reinsert the USB device into the first computer on which you ran the wizard, click Next, and review the computers that you’ve added to the network. Print your network settings for safekeeping, and then click Finish.

If you chose to manually configure the network, complete the following steps:

  1. Choose to print the settings, and, from the Notepad window that appears, print the Wireless Network Settings document.

  2. Run the wireless base-station management software from the computer that’s connected to the base station. In the wireless security part of the software, enter—and if necessary reenter—the network key, as shown in the Wireless Network Settings document you printed.

  3. On each computer, run the Wireless Network Setup Wizard, choose to set up a new wireless network, enter the name of the network, choose to manually assign the network key, and enter and then reenter the network key.

Caution

Caution

If your wireless network has already been configured, it might currently have a network key in use for security. Use the base-station management software to check the security settings. If a key is already in use, any modifications you make to the security could disable access to the network for some computers.

Tip

Tip

The network key is used for security only for the wireless connections on a network that uses a mix of wireless and wired connections.

See Also

See Also

For information about accessing public wireless networks, see "Connecting to a Wireless Network".

Foiling E-Mail Viruses

Foiling E-Mail Viruses

E-mail is your computer’s gateway to the rest of the world, and this gateway is what makes your e-mail one of the prime vectors for the distribution of computer viruses and many other evils. Fortunately, Outlook Express now comes with options that can help you detect and prevent the introduction of viruses onto your computer.

Protect Yourself and Others

Protect Yourself and Others

In Outlook Express, choose Options from the Tools menu, and click the Security tab of the Options dialog box.

Select the Restricted Sites Zone (More Secure) option if it isn’t already selected.

Select this check box, if it isn’t already selected, to enable protection from programs already on your computer that want to use your e-mail to infect other computers.

Select this check box, if it isn’t already selected, to enable inspection of the file type of an attachment and to block any attachment that could be a potential virus.

Select this check box, if it isn’t already selected, to stop your message from requesting additional material from an external server.

Protect Yourself and Others

On the Read tab, select this check box if you want to prevent any hidden code in HTML-formatted messages from gaining access to your computer, provided you don’t mind losing the formatting of any HTML-formatted message.

Click OK.

Tip

Tip

If you choose to read your messages in plain text, you might lose more than just formatting—you could lose some of the message’s content. To view a trusted message in HTML format, with the message open, choose Message In HTML from the View menu.

See Also

See Also

For information about displaying pictures that have been blocked, see "Limiting E-Mail Snooping".

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
52.15.179.139