41
E-Mail Attachments
Never run a program received as an attachment to an E-mail message unless the program is known to be
safe. A program from an unknown source can delete all the files on the computer’s hard disk or install a
“back door” software application that lets people on the Internet gain access to the computer without
permission.
Internet Browsers
Always exit the Internet browser (Internet Explorer or Mozilla Firefox, for example). Never “minimize” the
browser or leave it open in the background. Breaking into a computer is easier when an Internet browser is
running.
Network Applications
Network applications (such as software programs) that allow remote access to the computer also make the
computer vulnerable to access from other people on the Internet. If using a network application that allows
remote access, consider installing a firewall.
107 Appendix c Computer Security
Electronic Security
Here are two methods to secure your computer electronically.
Network Address Translation
If a local area network and a
PPP
connection to the
ISP
using dynamic IP addresses through a
DHCP
server
are being used, Network Address Translation (
NAT
) is being used.
NAT
provides a very basic level of
security.
Firewalls
The safest way to prevent attacks on the computer is through a firewall – a hardware device or software
program that protects the computer from unauthorized access by controlling who can access your computer
and by monitoring the transmissions between the computer and the Internet
Windows
XP
has a built-in firewall. For more information, select
Help and Support Center
from the Help
menu. Search for
Internet Connection Firewall
.
If Windows 98
SE
, Me,
NT
4.0, or 2000 is running on the computer, consider installing a firewall.
Hardware and software firewall products are changing rapidly as more homes and businesses establish
high-speed digital connections between their local area networks and the Internet.
108 Actiontec 54 Mbps Wireless DSL Gateway User Manual
This page left intentionally blank.