Masonry Magazine December 2006 Page. 33
Vulnerabilities and Defense
A virus author might target vulnerabilities in a lesser-used software product, but in doing so his or her chance of hitting a large number of targets is smaller. However, if a virus author hits a Microsoft weakness, he or she could potentially threaten billions of computers worldwide and gain infamous notoriety among certain circles.
Therefore, the second line of defense is to maintain the programs that you use by downloading and installing security updates and patches, and to do so on a regular basis. Many software vendors have auto-update elements, and there are third-party programs available that automate the process. For its products, Microsoft offers Automatic Updates, a handy tool that, when downloaded and installed, will notify the computer user of new updates or, just as the name suggests, automatically keep computers up-to-date.
To keep multiple computers updated in a small- to mid-sized company, another option is Sitekeeper from Diskeeper Corporation of Burbank, Calif. (www.executive.com/sitekeeper). Sitekeeper is an easy-to-use, centralized patch and systems management program. Users do not need dedicated hardware or special training, and the program can be installed and running in less than an hour.
Constructing a Barrier
THE THIRD LINE of defense is a firewall. Much like a building's firewall, this computer version helps to contain threats and keep them from reaching vital information or programs. Computer firewalls can be implemented using software, such as with a security software suite, or hardware, as included with many Internet connection routers. Depending on the version or system in place, firewalls can protect individual computers or an entire network.
Firewalls are used to protect points of entry into a computer or network, such as Internet connections and computer ports, and to monitor all inbound and outbound "traffic" for your system. If a hacker tries to break into your computer through an unsecured port or a malware happens to bypass your antivirus software and attempts to launch a program using your Internet connection, your firewall will stop the entry or exit, flag the potentially harmful action, and notify the computer user or network administrator.
The classic, and perhaps better-known, firewall is ZoneAlarm from Zone Labs LLC, Redwood City, Calif. (www.zonelabs.com). And possibly the most maligned firewall is the one built-in with Microsoft Windows XP, Service Pack 2. While ZoneAlarm has earned its accolades, the Microsoft firewall probably hasn't earned its jibes.
Microsoft's Internet Connection Firewall (ICF) was designed to work with personal firewall applications, not to compete with them. ICF is far from perfect as firewalls go. It doesn't block any outbound traffic, which won't pro-
Smart Design = Dry Structures
epro Innovative Engineered Solutions for Commercial and Residential Waterproofing
• Cavity Wall Air Barriers
Below-Grade Waterproofing
Retaining Wall Waterproofing
Masonry Sealers
• Dry Laid Paver Stabilizer
A World of Difference
epro
Waterproofing Systems
epro Services, Inc.
800-882-1896.
www.eproserv.com
Dealer, Installer, and Representative Inquiries Welcomed
CIRCLE 310 ON READER SERVICE CARD
The Voice of the Mason Contractor
December 2006
Masonry 31