One of the most famous stories about someone from the dark side molesting your computer while you are signed on the Internet is about the "redialer." The bad guys in question would send you an e-mail note asking you to "CLICK HERE" for whatever reason, just to pick off your Internet address (The IP address, everyone on the net has one). Once you clicked on their "message," they had you. They then sent a series of commands back to your PC, telling your modem to disconnect you from the Web, silence your modem's sound, then redial, without you knowing it, to a strange, exotic land.
Well, I don't know about exotic. but the land is called "Greed." The toll call was exorbitant and fraudulent. And it can be prevented. That is probably the crudest form of attack on your PC. Today's thieves are a lot more subtle than the original "redialers," They want more than an expensive telephone charge; they are after your account numbers and passwords. They want your data.
Several companies have recently announced Home Firewall Programs specifically to protect the home PC user. The Firewall actually acts like a screen between the Internet and your PC. McAfee and Norton have both acquired companies this year that specialize in firewall programs, just to address the consumer PC market. Corporate America has used firewalls, software which actually determines what commands or what data passes from or to your Internet-connected computer, for several years now.
The corporate firewalls are a combination of hardware and software that protect the companies PCs and mainframes from unauthorized access. Programs like "Phoenix," "Raptor," and "Sidewinder" are but a few of the commercial programs available for business use.
The site at: http://www.icsa.net/html/communities/firewalls/certification/vendors/index/shtml allows you to check what is commercially available, while home PC users should check
http://www.10wizard.com/go.shtml?sq=Firewall to see what is current. The home user site also lists prices.
Several Internet services. such as AOL and Compuserve, use "proxy servers." That means they have another system that actually interfaces the Internet, not the system you actually link to when you sign on. Attacks are rarer than through direct access, but not impossible. Another benefit of the proxy server is the instant access to your e-mail. It is already downloaded at the proxy server, and all you have to do is read it when you log on. In the commercial world, the firewalls are an impediment to the normal flow of business. Legitimate file transfer programs (FTPs) often get bogged down or canceled by the ever-watchful firewall programs. But there is no alternative to the security the firewall programs offer.
The average Internet user can not afford to have data stolen or erased. People keep their financial records on Quicken or Microsoft's Money programs, among others. Keeping out the bad guys and girls becomes a more serious issue every day.
George Mindling © 2000