Healthy computing

These are some tips about "Healthy computing". The e Book Healthy computing is a must read for every person that spends more than 4 hour in front of the monitor. Healthy computing is for you.

Monday, April 10, 2006

Laptop Security

Healthy computing.

Laptop security measures include taking care of the physical security of the laptop, securing laptop contents from unwanted eyes, and tracking down a stolen laptop. There are several ways to increase laptop security. Below is a short review of the most common ones.
Engraving / Marking – One option is to permanently mark (or engrave) the outer case of the laptop with your name, address and phone. It is also a good idea to engrave or place an adhesive label on the underside of the battery compartment where your identification is not noticed or can be readily removed. Include your name, address and date of birth. Do not use a Social Security number.
Record Keeping - Register the laptop with the manufacturer. This will “flag” your machine in the event that a thief ever sends it in for maintenance, and increases your odds of getting it back. It is also important to write down your laptop’s serial number and store it in a safe place. In the event your laptop is stolen, it is extremely important to have these numbers to give to the police. .
Cable Locks - Cable locks are an inexpensive way to secure the laptop from being stolen. The cable locks function much in the same fashion as bicycle cable locks do. The cable is wrapped to an immovable object (such as a table leg) and the security clip in the laptop. The system is secured with a padlock. While this is a quick and easy security measure, it is still vulnerable, much in the same way as bicycle cable locks. Remember however if you have taken the means to secure your laptop, a thief more than likely will go to the next laptop they find unsecured.
The following links are good resources for laptop physical security devices:
Secure-It: http://www.secure-it.com/products/notebook/laptop_cables_locks.htm
Beach Audio: http://www.beachaudio.com/index.php?cPath=206_236_2568
Alarms - Alarms work much in the same way as car alarms. If the laptop is moved or handled without authorization, the system will give a warning signal that resembles the ones heard in cars (there are other optional ways to make the alarm). There are many different kinds of alarm systems. The simplest ones are integrated into the cable lock, which, if broken, will start the alarm. These alarms can be purchased at office supply stores.
http://www.etravelergear.com/traclapprot.html
Laptop Tracking - Similarly to stolen cars, also stolen laptops can be tracked and recovered. The most advanced of these tracking systems use the cell phone network (or satellite via GPS) to communicate the laptops location with the central tracking computer. This system depends on a piece of hardware, placed inside the laptop.
Another way to increase security of the laptop and track stolen laptops is via a software tracking code placed in the laptop's hard drive. The software, which resides undetected, will communicate periodically with a central system through the Internet. The software communicates the laptop’s location, which will enable recovery of the laptop. Individuals can get more information about laptop tracking and purchase software from these and other companies: CompuTrace, SecureIT, Stealth Signal, and ZTrace.
Your laptop can also be registered with the STOP Program. If you loose your laptop, STOP works with the local police, the FBI, and INTERPOL to track it down. And, once STOP locates it, STOP takes care of returning it to you.
User Identification - The most obvious security measure in this regard is using the BIOS password. More advanced ways to identify the laptop user are smart cards and biometrics, such as voice or fingerprint recognition software and hardware.
Protect your data by locking your PCMCIA cards when not in use. Eject these cards from the laptop bay and lock them in a safe place whenever you are away from the laptop.
Information gathered from LabMice.net and Laptop-guide.com
6 Tips to Help Prevent Laptop Theft
When on the move, keep your belongings in sight and never leave your laptop unattended.
Try not to leave your laptop in a vehicle. If you must, ensure it's in the trunk or covered up - not in plain view.
Don't leave a meeting or class room without your laptop. Take it with you, or it may not be there when you return.
Lock your laptop in your room during off-hours. Or put the laptop in a locked closet or cabinet.
Utilize Kensington style cable and lock for your laptop when left unattended.
Install Computrace on your PC, so if it’s lost or stolen you have a greater chance of getting it back or receive up to $1000.

Removable Storage/ Drive Security
As computer systems such as the laptop become more portable, use of removable storage devices (RSD) also become more convenient. Balancing “security with convenience” is very difficult to achieve. A good example is the convenience of items such as the ever-growing popularity of the “Flash or Jump Drive”, external hard drives and removable drives. Unfortunately, loss or theft of your portable storage devices is easy and presents numerous problems. Not only have you lost potentially valuable data, depending upon the contents of your device you may have opened yourself up to identity theft. Keeping your portable devices secure and accounted for is just as important as keeping your laptop secure. Following are few tips to help balance “convenience and security”.
Always have your RSD in your possession or locked away when not in use. Never leave your laptop and device unattended in the Library or other study areas.
Never place personal identifying information such as Social Security Number, Phone Numbers, Bank / Credit Card numbers, passwords, etc…
Don’t be distracted away from your Laptop with your Flash Drive connected. It only takes a second for someone to unplug your device and walk away undetected.
Consider the use of “Thumb Drives” that require your thumb print be used to access the information on your device. You may also want to use drives that encrypt your information for added security.
Just as important as Flash Drives, you should take the same care to secure date CDs, Floppy Disks, Zip Drives or any type of RSD.
While we often believe bigger is better, it may be more beneficial to have a few 32MB drives than it is to have a 1GB. For certain smaller projects you may want to consider using a CD to store data. This allows you to use your collection of drives or CDs for different purposes or projects. If you loose one you haven’t lost everything. The important habit becomes keeping track of all your discs or drives to ensure their security.
Always back-up your important data and secure your back-up discs/drives. A good practice on campus is to use your “P” drive as a back-up.
As with all computer hardware and information, security is paramount. All your hard work and research is of no use if you have not practiced good security procedures and your information is lost or stolen.

http://www.thepurplegenie.com/healthycomputing.htm
Healthy Computing:
Take advantage of this e book on Healthy Computing that includes all of the tools and tips you need to quickly and easily understand and practice a quality work style with your computer that you will be comfortable and healthy.

Ergonomics

Healthy computing.

Proper ergonomics - design factors intended to maximize productivity by minimizing operator fatigue and discomfort - is very important for maintaining a healthy body while computing. The following are a number of links which contain information on and tools for maintaining proper ergonomics.
Information on Laptop Ergonomics and Useful Products - This article from HealthyComputing.com provides information on the basics of ergonomics as well as suggestions for products which help to increase ergonomical use of laptops.
Five Tips for Ergonomical Laptop Use - Cornell University provides five helpful tips for proper ergonomical use of laptops.
Laptop Ergonomics - Cornell University provides further information on the basics of ergonomics.
Self Assessment Tool - This questionnaire from Key Tools Ergonomics helps you to assess how you use your laptop and provides suggestions for better usage.

How To Work on Your Laptop and Stay Healthy
1. Learn how to maintain a relaxed, neutral posture that reduces stress and strain to your muscles by:
· Schedule mini-breaks every 20 to 30 minutes to avoid repetition and static postures.
· Maintain a comfortable viewing distance from your notebook screen - about 18-30".
· Keep your head and neck in a relaxed posture; avoid excessive neck flexion or rotation.
· Position the keyboard at elbow height and keep your wrists straight while keying.
· Experiment with table and chair height as well as keyboard angle to maintain neutral wrist postures.
· If you have to raise your chair, use a footrest to support your feet. When seated, your hips should be slightly higher than your knees.
· Add an external keyboard and place it on an adjustable keyboard/mouse platform.
· Attach an external mouse instead of using the small constricted touchpad or trackball.
· Tilt the screen so that it is perpendicular to your line of sight, if lighting permits.
· If you are sitting in a side chair or couch, use a pillow to support your arms while keying.
· Clean the screen regularly using appropriate antistatic cleaning fluid.
· Your hands and wrists should be kept in a straight wrist posture when typing and should not be resting on a palm rest, table or lap while typing.
· Did you know: wrist and palm rests are designed to provide support during breaks from typing.
2. Carry your laptop computer ergonomically:
· Remove unneeded baggage from your notebook case, the less weight to carry the better.
· Carry your laptop in a case with padded should straps and handle. Frequently shift shoulders to balance the load.
· Do yourself a favor by buying a wheeled laptop luggage cart that easily transports your laptop and accessories like laptop printer, laptop cables, paper and other utensils.
*Posture tips adapted from Ergo In Demand.

http://www.thepurplegenie.com/healthycomputing.htm
· Healthy Computing:
Take advantage of this e book on Healthy Computing that includes all of the tools and tips you need to quickly and easily understand and practice a quality work style with your computer that you will be comfortable and healthy.

Information Management

Healthy computing.

Information Overload and Distraction

Computer users need to be aware of techniques for handling information in a way that will simplify their lives and sustain better mental health. When managing vast amounts and various types of information, remember to Prioritize, Organize and Sanitize.

Prioritize
When prioritizing information it is important to plan ahead. First, sit down with your computer and decide what you will use it for and how you would like to organize your information. Begin by creating folders and utilizing a priority scale ranging from 1-10.
To further prioritize, try eliminating distractions. If you are getting on your computer to work on a paper, do not turn on instant messaging programs. This will help you to stay focused on the task at hand. It may be helpful to change the settings on your instant messenger so that it does not come on automatically when you turn on the computer.

Organize
Take the time to organize your files; it is important to delete and clean out unnecessary files. It is helpful to keep your files in the permanent Drive.When naming files, use meaningful names and abbreviations that you can recognize later, with no spaces. This will facilitate finding information that may no longer be fresh in your memory. Storing files in folders, labeled by course or project, can help organize them long-term. For larger files, you can burn them onto compact discs to help with storage.

Sanitize
Sanitizing your computer means cleaning out your trash folders, removing unwanted programs, and keeping your files orderly. Review your information periodically. If you don’t access a file within a specified time limit, remove it. Another step in keeping your computer clean is to make sure your virus protection and spy ware are updated.

E-mail Management
E-mail is supposed to accelerate communication – and it does. But the lack of interactivity and real-time communication, added to sheer volume, can also introduce problems. One problem is that you can’t create tone with e-mail, which increases the potential for misinterpretations. Then there is the lack of etiquette and standards, which also leads to communication snafus.
Some suggested guidelines might help you to make your use of e-mail more productive and more enjoyable:
Write the same way that you would for any other form of communication.
Use correct grammar. Bullet points make a message easy to read but sentence fragments do not.
Use the spell check that comes with your e-mail package.
Make e-mails self-contained with one subject and one message.
Unless you’re engaged in an ongoing conversation, include a greeting and closing.
Read messages a couple of times for clarity and tone before hitting the “send” button.
Don’t use your in-box as a catchall folder. Read items once, then answer immediately, delete or move them to subject specific folders.
Send group mail sparingly – use only when useful to all recipients. Use “reply all” with caution.
Ask to be removed from distribution lists you do not need to be on.
Before sending an attachment in a particular format, make sure the recipient can open it.
Respond to your messages as quickly as possible, preferably by the end of the day.
Don’t be a novelist!
Be careful about using smilies. Not every one interprets them the same way.
Don’t flame. You can’t take it back.

http://www.thepurplegenie.com/healthycomputing.htm
Healthy Computing:
Take advantage of this e book on Healthy Computing that includes all of the tools and tips you need to quickly and easily understand and practice a quality work style with your computer that you will be comfortable and healthy.

Computer Security

Healthy computing.

One of the most important steps in healthy computing is keeping your computer and the information on it secure. Doing this will protect your computer, your identity. Here are some basic security tips.

What is computer security?
Computer security refers to the measures taken by individuals like you and organizations to protect technology resources. In recent years, security threats--such as viruses, worms and identity theft-- for individuals and organizations alike have increased greatly due to the fast-changing nature of technology and the internet. Although there is no one solution for ensuring healthy computing, following some basic steps can help reduce your risk of a security attack.

  • Who is responsible for computer security?
    Healthy computing is every user’s responsibility. While there are laws governing a number of technology-related activities and security measures that can protect large groups of computer users at the same time, individuals must protect themselves from the risks created by hackers, viruses, worms, and identity thieves.

    Ten Steps to Safe Computing
  • Fend off computer viruses by using Anti-virus software regularly and using caution when opening email attachments and sharing files.
  • Download operating system (OS) patches and updates.
    Go to Windows Update now.
  • Set up spam filtering on your campus and/or personal email account(s).
  • Consider installing a firewall.
  • Minimize your risk of identity theft by using caution when shopping online, instant messaging or using wireless services.
  • Remove spyware and adware from your computer with anti-spyware and anti-adware.
  • Protect confidential data by running data backups on a regular basis.
  • If your computer or personal information has been compromised in any way, report the security incident to the appropriate authority.
  • Periodically check for security news and alerts.
  • Share this list with friends and family

http://www.thepurplegenie.com/healthycomputing.htm


Healthy Computing:
Take advantage of this e book on Healthy Computing that includes all of the tools and tips you need to quickly and easily understand and practice a quality work style with your computer that you will be comfortable and healthy.