Practice: Safe and Efficient Use of The Internet
Practice: Safe and Efficient Use of The Internet
Practice: Safe and Efficient Use of The Internet
IN BRIEF
There are a number of information security issues that should be taken seriously when
using the Internet.
Anyone using the Internet should follow recommended security procedures, such as
using an up-to-date rewall and software capable of protecting against viruses, worms,
trojans, spyware and adware.
With careful planning and the right mix of hardware/software, it is possible to work
online in an efcient manner and maximise productivity.
P. K. Downes1
A minority of people abuse the freedom of the Internet to the detriment of the vast majority. Many people feel that the
Internet requires more regulation to reduce the burden of hackers, viruses, hoaxes, adverts and spam that continue to
proliferate unabated. Until this ever happens, it is down to the individual person or business to protect themselves against
malicious attacks and to use the Internet in a safe and efcient manner.
2.
3.
Introduction to email
4.
5.
Introduction to the
World Wide Web
6.
7.
Power searching
8.
Dental resources on
the Internet
1General
203: 11-22
DOI: 10.1038/bdj.2007.587
PRACTICE
Fig. 1 It is recommended that any
computer linked to the Internet
should have a rewall in place.
This screenshot shows the popular
ZoneAlarm rewall software
PRACTICE
may read Copy this page twice and put it into
each of your neighbours piles. Check the cal
endar and if the date is Friday 13th, throw all
your papers into the bin!'
It is essential that every computer has an
anti-virus program installed that will period
ically check the system for all-known types
of viruses and then either isolate or delete
the malicious code. Because of the continu
ing need to upgrade the anti-virus program
and its database, most are sold as an annual
or bi-annual subscription service. Popular
anti-virus programs include Symantec Nor
ton,4 Network Associates McAfee,5 Grisoft
AVG,6 Kaspersky Lab7 and Panda.8 Prices for
anti-virus software range from about 20
25 and include 1-2 years of updates. The
major companies also bundle various pack
ages together to create a whole suite of secu
rity tools, eg rewall, anti-virus, anti-spam
and anti-spyware. At the time of writing,
Symantec Norton Internet Security 2007 at
49.99 for a single-user, one-year licence was
winning rave reviews.
Any anti-virus program is only as good as
the index of known viruses. Therefore it is
imperative that the program automatically
checks, downloads and installs any updates
from the company website. One should bear in
mind that the writers of computer viruses are
always one step ahead of the anti-virus indus
try, and because of this, no system of viral
defence can ever be totally foolproof. Since the
introduction of virus construction sets, it is
possible for anyone with minimal knowledge
of operating system and assembly language to
create viruses just for the fun of it.
A macro virus is written in a macro pro
gramming language and can be attached to
a document le (such as Microsoft Word or
Excel). When a document containing the
macro virus is opened, the virus runs, does
its damage and copies itself into other docu
ments. If prompted, always decline the facility
to run macros when opening such a le. Some
companies refuse to accept Word documents
as email attachments and request that the
sender uses the .rtf (rich text format) option
when saving and sending a Word le.
Worms are parasitic computer programs
that replicate, but unlike viruses, do not infect
other computer program les. Worms can cre
ate copies on the same computer, or can send
the copies to other computers via a network.
The Sasser virus that infected the computer
networks of the Coastguard and British Air
ways in May 2004 did not travel by email but
made its way around the Internet unaided.
It infected PCs running Windows 2000 and
Windows XP that were not protected against
a system loophole that it exploited. Anti-virus
software gives varying degrees of protection
against worms.
A trojan horse program is a malicious pro
gram that pretends to be a harmless or even
desirable application (hence the reference to
13
PRACTICE
Spyware is often not stopped by either re
wall or anti-virus software and requires the
use of separate anti-spyware software either as
a stand-alone program or bundled in with an
Internet security suite. Webroot Spy Sweeper,9
Spybot Search & Destroy10 and Lavasoft Ad
aware11 are three stand-alone programs that
are often recommended as being efcient in
detecting changes to the registry, removing
the bad les and restoring the registry to its
original structure.
Symatecs Security Check12 is a popu
lar and useful online service for carrying out
a free Internet security check-up on any PC
connected to the Internet. It probes the exist
ing security measures in place and com
piles a detailed report on the vulnerability of
the connection.
3. Other aspects of safe use of the Internet
Hoaxes
A virus hoax is an annoying message that is
widely circulated by email, warning about the
presence of a non-existent virus. It encour
ages users to pass the warning on to their
friends and acquaintances, thereby causing
massive amounts of unnecessary email.
Messenger service box
This is a box that can pop up on your screen
asking you to phone a premium rate number,
apply for a diploma, etc. It could appear any
time you are connected to the Internet; you
do not have to have any particular software
open at the time. It is not a virus but a spam
message that uses the Windows XP (and
2000) Messenger service that runs behind
the scenes. This is a normal part of the oper
ating system that is used by network admin
istrators to send messages to other users on
a company network. To stop this happening
on a computer, go to the Start menu, select
Run and type in services.msc and click OK.
Now a new window will appear with a list of
services on the right hand side. Scroll down
and nd the Messenger service, select it, right
click it and choose Properties. Under Startup
Type select Manual (or Disabled). Then click
on Stop, Apply and OK.
Phishing
Phishing is a scam that uses email spam,
pop-up messages or fraudulent websites to
deceive people into disclosing their credit
card numbers, bank account information,
passwords or other sensitive information. The
message claims to be from a genuine business
or organisation for example, your Inter
net service provider, bank, online payment
service, or even a government body (Fig. 2).
Phishers typically include upsetting or excit
ing (but false) statements in their emails to
get people to react immediately. The email
address will appear to be genuine and it will
probably use the logos from the organisation
it is trying to imitate.
14
PRACTICE
Fig. 2 This shows a typical phishing
email, suposedly from the Halifax
Bank. Notice the poor use of English
and punctuation. Clicking on the
Account Update hyperlink would take
you to a bogus website where the
phishers would capture your account
details and password. Notice that
the ISP has successfully recognised
and labelled this message as being
spam while the email program has
blocked the images within the mes
sage from downloading
Passwords
Hackers may try and break into an account
by using programs that guess passwords by
going through dictionary words in many lan
guages. Always avoid using guessable pass
words such as your login name (in any of
its forms), your rst or last name, your car
number plate, the brand of your car, telephone
numbers, your street name, the name of your
spouse, children or pets, acronyms, sequences
of letters like abcdef or qwerty, place names,
cartoon heroes etc.
A good password is:
Private; only known by you (in 2004, a UK
street survey found that more than 70% of
people would reveal their password for a
bar of chocolate!)
Secret; it does not appear in clear text in
any le or program or on a piece of paper
blue-tacked to your computer screen
Easily remembered, so there is no need to
write it down
At least eight characters long
A mixture of at least three of the follow
ing: upper case letters, lower case letters,
digits and punctuation
Not guessable by any program in a
reasonable time
Changed on a regular basis, ie whenever
you think that it may have been compro
mised and at least once per year
Different for every account, login
and program.
15
PRACTICE
Internet Explorer web browser
When you rst install Internet Explorer (IE),
it puts all websites into a single zone called
the Internet zone. It gives this zone a medium
level of security by default. You can custom
ise the settings to make your browsing more
secure but it may make your browsing more
restrictive as it prevents certain code running.
It is all a balancing act between security and
usability. There are two other zones, Trusted
and Restricted, where you can place desirable
or undesirable website addresses. The secu
rity settings for websites in these zones are
set to lower and higher settings accordingly.
See the Microsoft website for more details. It
is important to keep up-to-date with security
patches for IE to shield the PC from vulnera
bilities as they are discovered. In 2004, Micro
soft released Windows XP SP2, which added
pop-up blocking to IE 6. IE 7 was released in
October 2006 and is intended to defend users
from phishing as well as deceptive or mali
cious software. It also features tabbed brows
ing, a popular feature that has been available
in competitors browsers for many years.
Cookies
Cookies are blocks of text placed in a le
on your computers hard disk. Websites use
cookies to identify users who revisit the site
and may contain login or registration infor
mation, shopping cart information or user
preferences. When a server receives a browser
request that includes a cookie, the server can
use the information stored in the cookie to
customise the website for the user.
16
PRACTICE
Shopping on the Internet
Always do business with known, credible
companies, or companies to whom you have
been recommended by a satised customer.
Submitting your main email address may
result in you being sent spam; consider using
an additional free email account (eg Yahoo!
or Hotmail) for all online purchases. Make
sure to log into the second email account on
a regular basis (say once or twice a month),
just to make sure that you are not missing any
important information.
Consider devoting one credit card to all your
online purchases. This will help to minimise
the potential damage of an attacker gain
ing access to your credit card information.
Another idea is to open a credit card account
with a minimum credit limit and only use it
for online purchases.
Avoid using debit cards for online pur
chases credit cards usually offer some pro
tection against identity theft and may limit
the monetary amount you will be responsible
for paying. Debit cards do not offer that pro
tection; because the charges are immediately
deducted from your account, any attacker who
obtains your account information may empty
your bank account before you even realise it.
The Ofce of Fair Trading has a useful section
on its Consumer Direct website about online
shopping,16 while the banking industry have
compiled a website with tips on how to stay
safe online.17
Before giving your credit card number or
other nancial information to a business, make
sure that their website is protected and secure.
Look for a lock symbol located somewhere on
the browser, or make sure the URL begins with
https://. This ensures that the information is
encrypted before being transmitted.
Visa has a Veried by Visa service that
is free for Visa card-holders to sign up to. It
is a simple service that ensures that both the
retailer and the customer are genuine. Popu
lar sites such as Dabs.com and Tesco use this
scheme, but look for the Veried by Visa logo
on less well-known sites. MasterCard offer a
similar service called Securecode.
Before buying anything, read the delivery
and return policies that should be on the mer
chants home page. Can faulty items be sent
back? If the items are unsatisfactory, can you
get a refund or a credit note? The merchants
home page should also have information about
delivery arrangements and costs, currencies
they accept and taxes that apply. If you share
your computer, make sure you sign out of the
website after completing any sort of nancial
transaction online and delete your tempo
rary Internet les (Tools, Internet Options,
General tab).
Parental control software
Parental control software is basically a web
lter; it determines where a certain computer
user (eg a child or member of staff!) can go
17
PRACTICE
the ever-increasing number of wireless
hotspots at cafes, hotels and airports
Keyboards now come with extra buttons
that act as shortcuts to such programs as
the web browser or email program
Use a mouse with a wheel to make it easier
to scroll web pages.
Software
Shortkeys21 is an excellent utility program
that enables you to use keyboard shortcuts
to place text into any Windows program.
Its real strength is when used with dental
system software to help with writing up
patients notes, but it is also extremely
useful for lling in forms on web pages.
For example, set up shortcuts such as
ad1, ad2, ad3 for each line of your home
address and ad5, ad6 and ad7 for your
work address
If you want to copy some text from a web
page to put into a Word document, rst
paste it into Notepad to get rid of any for
matting and hyperlinks
Use Notepad to create a to do list. Place
this document into the StartUp folder so
that it opens automatically every time the
computer is switched on. Use the to do list
to record things that you want to search
for on the web, websites that you want
to visit, or list people whom you want to
contact via email
There are certain plug-ins or helper pro
grams that are required to make the most
of the multimedia material available on the
web. These include video players to watch
videos in all their different video formats
(RealPlayer,22 Windows Media Player and
Quicktime23), audio players (all the video
players plus WinAmp24 ), 3D viewers to
enable movement in a virtual 3D environ
ment (Cortona and iPix), interactive plug
ins to show complex animations for
games, puzzles and tutorials (Adobes
Flash and Shockwave players25) and a
document plug-in to make sure that forms,
manuals and articles written in the pdf
format appear and print out exactly as
they were intended (Adobe Reader25). A
link to the downloadable plug-in is nor
mally available on web pages that include
multimedia material
The free RealPlayer plug-in, used to view
video media on the BBC website, has
developed a bad reputation because of the
annoying adware and spyware that gets
installed alongside the free player. Instead,
you could try Real Alternative,26 a free
ware program that is adware/spyware-free
If you want to distribute professional-look
ing documents via the Internet then you
really need to create your own .pdf les, or
convert an existing Word le into a .pdf.
PDF is a universal le format that pre
serves the fonts, images, graphics and lay
out of any source document. You could use
18
PRACTICE
local page will load faster than any page
stored on the web and it also gives you the
opportunity to create your own spring
board page of links to favourite websites
and search engines. If you also host a copy
of this page on your website, it means that
you will have access to these links from
any other computer connected to the
Internet. There are three main ways of cre
ating your own locally-stored start page:
Use a program normally used for creat
ing web pages
Create a table in Word. Use a column
for each category of web links. Type the
name of a website into each cell. Select
the name and then click on Insert,
Hyperlink and either type or copy/paste
the URL for that website (see Fig. 3).
When the document is complete, click on
File, Save As, Web Page
Make an HTML le of your IE favorites
by using the exporting wizard. To run
the wizard, click on File, Import and
export and follow the instructions
To make this HTML le your start page,
open IE, type c: into the address bar, click
on the Go button and then locate and open
the le. Once the page is viewable in IE, click
on Tools, Internet options and from the Gen
eral tab, select Use Current from the Home
Page section.
Printing web pages
IE6 is notoriously bad at printing certain con
gurations of web pages:
Always use the print preview to check
what your printed page will look like. If the
print preview pane shows that the text will
not quite all t on one page, use the mouse
scroll wheel and the Ctrl key to resize the
text on the y. The other option is to select
landscape orientation rather than portrait
Make sure that the option Print back
ground colors and images is dese
lected from the Tools, Internet Options,
Advanced tab, Printing section
Go to File, Page Setup to see the differ
ent options for the amount of information
included in either the header or footer
of the printed page. For example, &w
will print the window title, &d will print
the date and &u will print the page
address (URL)
Consider updating to IE7 or using a differ
ent web browser, such as Opera or Mozilla
Firefox, all of which handle printing in a
more predictable fashion.
Browser toolbars
Installing a free browser toolbar can improve
your efciency in searching the web. The most
popular come from Google31 and Yahoo!32
Each adds a thin strip of tools to the top of
your browser, including a text entry box.
From this box, you can instantly query the
associated search site. Most of them include
19
PRACTICE
Email alerts can be a very useful service.
20
PRACTICE
specic keyword into the subject line or by
creating a lter rule for all the people in
your personal address book
Never open spam, just delete it. Email writ
ten in HTML can have hidden code that
can be used to send a message back to the
spammer to conrm that your address is
live (a web beacon). If you open the mes
sage, you are simply inviting even more
junk email
Hotmail and Yahoo! Mail have developed
a host of anti-spam features, some of
which are only available to their paid
premium service
Check with your ISP to see if they have an
anti-spam policy in place. ISPs have the
ability to block a large proportion of spam
yet few of them bother to implement a
ltering service
The Privacy and Electronic Communica
tions Regulations 200346 regulate the
sending of unsolicited direct marketing
messages from an identiable UK source.
Regulations 22 and 23 cover email, text
(SMS) and any other form of unsolicited
electronic message, which may only be
sent if the individual has asked for it.
There is an exception to this rule, known
as soft opt in. This applies in the
following circumstances:
The organisation obtained the contact
details as the result of a sale or the
negotiations for the sale of a product
or service
The messages are only marketing their
similar products or services, and
The individual is given a simple oppor
tunity to refuse the marketing when
their details are collected and is given
another simple way to do so in every
future message.
Financial considerations
It is still true to say that the Internet can be
a great place for managing your money, nd
ing the best deal for services and online shop
ping bargains. It is possible to access bank
accounts, savings accounts, mortgage, shares
and other nancial services 24 hours a day.
There are many sites from where you can
compare the cost of loans, insurance, home
gas/electricity suppliers, TV subscription and
home/mobile phone tariffs.53
Before you make any signicant high street
purchase, always check the cost of buying
the same item via the web. Comparison shop
ping sites such as Pricerunner,54 Shopping.
com55 and Kelkoo56 are search engines that
are designed to save you time and money by
nding the best online deals for many hun
dreds of thousands of products. Most sites
show consumer reviews about the suppliers,
indicate whether of not the product is in stock
and specify the price of postage.
Cut electricity bills and help the environ
ment by the correct power management of
Organise your PC
Create a directory on your hard disk where
you can place any downloaded les from
the Internet. Just before you transfer the
data, create an aptly named sub-directory
in which you can store the les. Down
loaded les often have obscure lenames
and there is nothing more infuriating than
not being able to remember where you
placed an important le. Carry out a virus
check before running any les
To keep your PC running at peak perform
ance, have it check automatically for Win
dows operating system updates. Companies
that install critical patches within a day
report fewer virus infections than those
Digital photographs
If you want to share your digital photo
graphs with another person, simply email
them the le. However, if you have a lot of
photographs to share and/or a lot of people
to share them with, either upload them to
the free web space provided by your ISP
or store the photos on a free online album
service, such as Photobox.48 From here,
friends can view the photos, enter com
ments in a guest book and even order their
own prints
When sending an image by email as a le
attachment, take into account whether
the recipient uses a dial-up or broadband
service. A 1MB le would take under 20
seconds to download over a broadband
connection, but over three minutes on a
dial-up connection. When sending les
to a dial-up account, try to keep the total
le size to less than 300-400Kb. To reduce
the le size of an image, open it in an
image-editing programme such as Adobe
Photoshop Elements,49 Paint Shop Pro,50
Irfanview51 or Picasa52 and then crop and
resize. Rename the image before saving the
le so that it will be easy to identify at a
later date. When prompted, do not save any
changes to the original le so that none of
the original data is lost.
21
PRACTICE
hardware, both at home and at work. The Brit
ish-designed OneClick Intelliplug57 automati
cally switches off and on attached peripherals
when you power up or down your PC. Con
trary to earlier opinions, it is quite sensible
to switch off the router when you do not
require an Internet connection. Indeed, many
ISPs now recommend switching off and then
reconnecting, particularly as some 8Mbit/
s ADSL services can get stuck at a much
lower bandwidth.
Summary of efcient use of the Internet
To be effective in using the Internet, you
must have the right hardware and software
installed. Find out how to set up and use
your web browser and email programs so that
you get the most out of them. Take proactive
steps to reduce spam email at work/home and
organise your computer so that it is using
the most up-to date software. Find timesav
ing and cost-cutting ways to maximise the
advantages of using the Internet compared to
more traditional services.
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
22
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
28.
29.
30.
31.
32.
33.
34.
35.
36.
37.
38.
39.
40.
41.
42.
43.
44.
45.
46.
47.
48.
49.
50.
51.
52.
53.
54.
55.
56.
57.
http://www.consumerdirect.gov.uk/before_you_buy/
online-shopping/
Stay safe online. http://www.banksafeonline.org.uk/
K9 Web Protection. http://www.k9webprotection.com/
OnSpeed.com. http://web.onspeed.com/en/index.php
ADSLGuide.
http://www.adslguide.org.uk/tools/speedtest.asp
ShortKeys text replacement software.
http://web.shortkeys.com/
RealPlayer. http://uk.real.com/
QuickTime. http://www.apple.com/quicktime/
Winamp. http://www.winamp.com/
Adobe Products. http://www.adobe.com/products/
Real Alternative video player. http://leforum.betanews.
com/detail/1054136293/1
K2pdf.com. http://www.k2pdf.com/
PDFCreator. http://www.pdfforge.org/
Microsoft Word Viewer. http://ofce.microsoft.com/
OpenOfce suite. http://www.openofce.org/
Google toolbar. http://toolbar.google.com/
Yahoo! Toolbar. http://uk.toolbar.yahoo.com/
Copernic Agent Basic. http://www.copernic.com/
NetSnippets. http://www.netsnippets.com/
Mail2web. http://www.mail2web.com/
Web2mail. http://www.web2mail.com/lite/welcome.php
British Dental Journal website. http://www.nature.com/
bdj/index.html
WinZip. http://www.winzip.com/
JustZipIt. http://www.download.com/JustZipIt/3000
2250_4-10222610.html
Yahoo Groups. http://groups.yahoo.com/
GDP-UK mailing list. http://health.groups.yahoo.com/
group/GDP-UK/
Gmail. https://www.google.com/accounts/SmsMailSignup1
IronPort. Spammers continue innovation: IronPort study
shows image-based spam, hit & run, and increased vol
umes latest threat to your inbox. [Press release].
San Bruno: IronPort, 2006. http://www.ironport.com/
company/ironport_pr_2006-06-28.html
Cloudmark 9 Desktop.
http://www.cloudmark.com/homeofce/
Mailwasher anti-spam software.
http://www.mailwasher.net/
The privacy and electronic communications (EC directive)
regulations 2003. Statutory Instrument 2003 No. 2426.
London: HMSO, 2003.
http://www.opsi.gov.uk/si/si2003/20032426.htm
Microsoft Windows and Internet Explorer security
updates. http://update.microsoft.com/
Photobox. http://www.photobox.co.uk/
Adobe Photoshop Elements. http://www.adobe.co.uk/
products/photoshopelwin/main.html
Corel Paint Shop Pro. http://www.corel.com/
Irfanview. http://www.irfanview.com/
Picasa. http://picasa.google.com/
Uswitch website. http://www.uswitch.com/
Pricerunner. http://www.pricerunner.co.uk/
Shopping.com. http://www1.uk.shopping.com/
Kelkoo. http://www.kelkoo.co.uk/
OneClick Intelliplug. http://www.oneclickpower.co.uk/