What About Security - Arris Touchstone WBM760 User Manual

Wideband cable modem
Table of Contents

Advertisement

Getting
Safety
Started
USB
Installation
Drivers
Both
If you have two or more computers, you can connect one computer to the Wide-
band Cable Modem's USB port and one or more other computers to the Ethernet
port. To connect two or more computers to the Ethernet port, you will need a hub
or broadband router (available at computer retailers).

What About Security?

Having a high-speed, always-on connection to the Internet requires a certain
amount of responsibility to other Internet users—including the need to maintain a
reasonably secure system. While no system is 100% secure, you can use the fol-
lowing tips to enhance your system's security:
Touchstone WBM760 Wideband Cable Modem User's Guide
Ethernet
Configuration
Usage
Keep your operating system updated with the latest security patches. Run
the system update utility at least weekly.
Keep your email program updated with the latest security patches. In addi-
tion, avoid opening email containing attachments, or opening files sent
through chat rooms, whenever possible.
Install a virus checker and keep it updated.
Avoid providing web or file-sharing services over your Wideband Cable
Modem. Besides certain vulnerability problems, most cable companies pro-
hibit running servers on consumer-level accounts and may suspend your ac-
count for violating your terms of service.
Use the cable company's mail servers for sending email.
Avoid using proxy software unless you are certain that it is not open for
abuse by other Internet users (some are shipped open by default). Crimi-
nals can take advantage of open proxies to hide their identity when break-
ing into other computers or sending spam. If you have an open proxy, your
cable company may suspend your account to protect the rest of the net-
work.
If you connect your Wideband Cable Modem to a wireless LAN, make sure
you enable security and encryption on the wireless hub (for the same rea-
sons that you should run only secured proxies). Consult the documentation
and technical support of the wireless equipment provider for help.
Troubleshooting
Glossary
10

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents