Safety


Computers are FUN...ENJOYABLE...INFORMATIVE...PRODUCTIVE

 

Home
Up

If you would like to read information on the following topics, just click the link below

Pop-Ups
Anti Virus
E-Mail Hoaxes and Chain Letters
Eugomics

Pop-Ups

What Is A Pop-Up?

How Do Pop-Ups Work?

Where Do Pop-Ups Come From?

Using Pop-Up Blocking Software

What is a Pop-Up Blocker?

What Are The Limitations of Pop-Up Blockers

Pop-Up Blockers For Free

Determine If a Pop-Up Is Due To Spyware

To Read Another Safety Topics Click Here


Remember when the worst intrusion in your web surfing was a little banner ad at the top of a web page?  those days are long gone.  Internet advertising is big business and like all advertisers.  Internet marketers need to get your attention.  One of the most effective ways to do that is with pop-up ads.

Popup ads take many forms putting advertisiment on top of your browser window or below and appearing when you visit a site or when you exit and generally cause a great deal of annoyance.  Floating ads, which float on top of theweb site in your main browser window, not in a separate window, are one of the newest marketing ploys.

Chick Here To Return to The Top of The Page

What is a pop Up?

A pop up is a window that is opened external to the web page being viewed.  It is presented in front of the active windows.  Pop-Ups need to be minimized, moved or closed in order to continue viewing the original web page.  Pop-Ups are often triggered when navigating to or away from a web page.  A variation of the pop-up is the pop-under.  It is presented behind the active window.

Chick Here To Return to The Top of The Page

How Do Pop-Ups Work?

Most pop-ups are created by a short JavaScript program.  JavaScript is a simple programming language that lets web designers add all kinds of interactive functionality to web sites such as fancy pull-down menus, interactive forms, calculators, cookies and more.  JavaScript shouldn't be confused with Java, which is a full-featured programming language that requires programming expertise to use.  It takes only a few lines of Java Script code added to a web page to create a pop-up.  Java Script allow web designers to specify just what kind of pop-up to display.  They can specify the size of the pop-up window, whether it appears on top of or under your browser window, where on the screen it shows up, and so on.  This open the way for abuse as well.  A window can be created that is too large to fit on the screen, so that there's no obvious way to close it, or a window can be placed off the screen entirely, so it goes unnoticed.

Floating ads can be created using Java Script, often in conjunction with Flash animations and Dynamic Hypertext Mark Up Language.  Using either method, it's simple to create a graphic that floats above your browser window.

Chick Here To Return to The Top of The Page

Where do pop-ups come from?

Many websites use pop-ups to present advertisements.  others use pop-ups as part of the functionality of the site.  For example, a pop-up might ask for a password or other input.  These types of pop-ups through sometimes annoying are presented by the owners of the website and are intentional.  They are largely unavoidable

Another source of pop-ups is a group of software known as Malware.  This group of programs also include Spyware, Adware and Parasiteware.

Chick Here To Return to The Top of The Page

Using Pop-Up Blocking Software

What could be simpler than a pop-up blocker?   It should seamlessly, without any intervention on your part, just block all of the pop-ups ads, right?  Unfortunately, it's not so simple. Pop-up blockers need to distinguish between good pop-ups and bad ones.  Plus, they need to keep pace with advertisers tirelessly scheming to sneak by their blocking.  Understanding how they work and the pitfalls they face will help you use them effectively.

Chick Here To Return to The Top of The Page

What is a Pop-Up Blocker?

A pop-up blocker is a add on utility that works with your web browser.  It monitors your web browsing, preventing a web site you visit from creating a window with a pop-up ad.  It may also go beyond pop-ups and help with other annoyances, like flash based floating ads or banner ads.

Often, a pop-up blocker adds a toolbar to your web browser that lets you control options and settings for the blocker.  Otherwise, it might put an icon in the system tray.  One of the most useful features found in some blockers is the ability to control Flash animations.  They block such animations in general and let you enable them for certain sites.  This is a much better option then uninstalling Flash, since many sites use flash for navigation or offer excellent information using Flash.  Some pop-up blockers also try to block all advertisements, including banner ads.

Chick Here To Return to The Top of The Page

What Are The Limitations of Pop-Up Blockers

As you might expect, pop-up blockers fall far short of perfection.  All pop-ups are not ads, and all obnoxious ads are not pop-ups.  Distinguishing between the two is not always easy.  If the blocker takes a too severe approach, it will produce false positives, blocking pop-ups you want or need to see.  If it's too lenient, ads will get through.

In this way, pop-ups blockers are similar to spam filters.  They need training and guidance to perform well.  Just as you create a white list of people from whom you want to receive e-mail, in the same way, you can specify web sites whose pop-ups you wish to allow.  Often, blockers will make a sound or display an icon to show when a pop-up has been blocked.  You need closely monitor your pop-up blocker's activity to see if it's blocking something you want to see.

Chick Here To Return to The Top of The Page

Pop-Up Blockers For Free  (HYPERLINK THIS TO OTHER SOFTWARE PAGE) see p188

Chick Here To Return to The Top of The Page

Determine If a Pop-Up Is Due To Spyware

If you are feeling overrun by pop-ups, those pop-ups may be due to spyware or adware on your computer.  If you suddenly see a surge in the number of pop-ups you encounter, or if you are seeing pop-ups and advertisements for web sites where you would not expect them, you may have spyware infection

It is often very obvious that pop-ups from these programs are not coming from the web site being viewed.  For example, if a pornographic ad is presented while surfing a news web site, it is most likely be causing by malware and not the site itself.  If pop-up ads keep reappearing even after you close all of the browser windows on your desktop, that's another clue that you are not dealing with normal pop-ups but instead a possible spyware infection.

Chick Here To Return to The Top of The Page


Spyware,Adware,and Parasiteware 

Combine the money-driven sophistication of spam with the insidious danger of viruses and you got yourself a new breed of super treat call spyware.  Spyware is as bad as it sounds.  It monitors everything you do online and reports that information via the internet.  What's the worst part? The vast majority of people with spyware on their systems don't even know it.  the makers of spyware want to manipulate what you see and do online to force you into buying things from them and their advertisers.  They are developing new methods every day to do this more efficiently, including displaying ads that reflect the home pages you visited along with stealing identifying information about you and using it send targeted spam and changing your search engine results to put their advertiser on top.

What is Spyware

Spyware is a small computer program that monitors your online actions.  It is ususally used by marketing firms to gather information about consumers.  Hackers occasionally make use of spyware to gather sensitive information.  In its most extreme form, spyware can be truly harmful.  It can put you under surveillance, logging eveything you do on the computer and every key you press.  So called keyloggers can steal valuable information like passwords and credit cards numbers or trade secrets.  Such spy software is readily available for sale on the internet and it can be easily installed by anyone with physical access to your computer especially if your system isn't password protected.  It is also spread via e-mail, disguised Trojan-horse style as a legitimate program.

Most spyware, however isn't so cloak and dagger.  They spyware makers don't want to steal your information and destroy your life, they just want to make some money and they don't care what methods they use to do it.  That's what makes spyware so lucrative.  The spyware makers get as many people to install their software as possible, using whatever means possible and then selling advertising for their service, that is selling the right to invade people's privacy and annoy them with targeted advertisements.

Do all free software and services contain spyware?

Not all free applications and services include spyware and not all pop up windows pose a treat.  You can check out the legitmacy of free sotware tools and services before you use them.

Beware of the danger of unauthorized pop up windows,

  • Do not automatically click on pop up boxes that warn you of a potential security treat on your computer.  These warnings may be a trick to deceive you into downloading spyware and other unwanted software.

 

  • Ignore pop-ups that tell you that you're a free winner.  Remember the old adage, if it looks too good to be true, it probably is.

 

  • To get rid of a pop-up window, just click the close button or the big X on the top right hand corner of the window.

Adware is a small computer program that presents ads independent of Microsoft Internet Explorer and the website being viewed.  It may also monitor the web page surfed to present targeted advertising.  The ads may even be presented when Microsoft Internet Explorer is closed.  Also adware runs on your computer in the background and ads pulled from the internet.  Often, these ads appear in separate windows on your desktop.  They change over time and can even vary depending on the web sites.  So, if you visit the web site of one rental car company, an ad for a competing company may appear on your screen.

Adware is troublesome for several reasons.  First and foremost, it is annoying.  it constantly bombards you with unwanted advertisements as you surf the web.  If you try to close the advertising window, it will just come back, since the adware program is still running in the background.  Sometimes, the window pop up in the front of your work window, obscuring your view of what you are doing.  Popup ads served by web sites you visit are bad enough, having adware installed is akin to water torture via pop-up.  The really frightening part of adware is that it often customizes the ads you see based on the web sites you vist.  It is tracking what you do on the internet and relaying that information to a server, which then delivers a related ad.  This is a serious invasion of privacy.  That's why these days, adware has become almost synonymous with spyware.

Parasiteware is a small computer program that may also be spyware and adware.  It comes bundled with other software.  users are unaware that the software is being installed.

Some of the symptoms of spyware or other unwanted software on your computer

Your computer may be infected with spyware or have other unwanted software, if you notice any of the following:

  • Your browser home page settings have changed and no matter how many times you adjust them, they change back to the new unwanted settings every time you restart your computer.

 

  • Unusual items show up on your browser, ones that you haven't set or saved.  For all these, you either cannot remove them at all, or you do remove them, but they keep coming back.  These could be any of these,

 

  • An unfamiliar search site instead of your usual one

 

  • An item in your bookmarks list that you did not put there

 

  • Browser toolbars that you don't want and did not install

 

  • Your system is sluggish, running much slower than it did before.  That may be because spyware and other unwanted software, which use your computer's memory resources have been download to your machine.  The programs running in the background slow down your system causing routine tasks to take significantly longer to complete than they may have before.  You may also notice a much higher frequency of program crashes and system failures.

 

  • Pop-up advertisements are happening all the time, even when you are not connected to the internet, or your browser is not running.

 

  • You see hefty charges on your phone bill for calls that you never made

 

  • There is activity on your computer, as though you are sending and receiving information, even when you are downloading files or even attached to the internet

How can I protected myself from these?

Avoiding spyware requires a little caution and a little self control.  When you're considering downloading a file from a web site or clicking yes to an Active X security warning, stop and think about it.  You should install only software you have reason to trust.  Managing your cookies is another important way to protect your privacy online, and avoiding dialers makes common sense.  As the problem of these annoying problems continue to grow we must to continue to take the right and safe method to combat this such as,

  • Don't surf web sites that most commonly install malware.  These include joke sites, cracked software sites and pornographic sites.  Stick to sites you need to do your job.

 

  • Don't open suspicious e-mails attachments.  If you aren't expecting theattachment or you don't know the sender it is best not to open it.

If you know or suspect that your computer may be infected with spyware or other unwanted software, you may want to consider downloading an anti-spyware tool to help you remove it.  While you may know of other helpful sites, you can also download Microsoft's Anti Spyware program.

As with all clean up tools of this nature, they remove the targeted software but do not block your computer from future installations.  updated copies of the tool need to be accessed and run on an ongoing basis, in the same manner as anti-virus software needs continual updates to incorporate the latest anti-virus protection.

Using a spyware utility isn't as straightforward as using an antivirus tool.  If you run a system scan with antivirus software on a random PC, it very well may not show an infection.  If it does show one, there probably won't be any debate about which virus was found and whether it is, in fact a virus.  Whatever the antivirus software finds you will want to delete as quickly as possible.

If you run more than one antispyware utility, you might see a lot of false positives.  That's because an antispyware utility won't delete spyware completely; it will put it in quarantine in case you want to restore it later.  Another antispyware utility may see that quarantines file and view it as a spyware infection.

With a little research and a measured, step by step approach, you should be able to free yourself from spyware problems.  Even if you don't have trouble with spyware, it makes sense to periodically go through your system and remove software you no longer need.  Although spyware can cause pop up ads, many web sites are more than happy to deliver them to you on their own.  Stopping those pop ups is important for keeping your sanity when browsing the web.


Spam

More than pop ups and in your face graphics, an ever increasing amount of spam is spoiling our internet experience.  Spam is an annoying form of electronic junk mail that is becoming more prevalent and ever more  of a nuisance, as get rich schemes, herbal remedies and graphic images of violence and pornography appear in our inboxes.  Spam is having a major impact on the e-mail systems of organizations by clogging bandwidth and storage.  Plus, it appears to have a negative impact on the productivity and morale of employees

Spam is problematic for many reasons.  Businesses overrun with unsolicited bulk e-mails face enormous costs.  These costs come from a variety of sources.  Employees are forced to spend time deleting messages, mistakenly clicking on spam and tracking down messages mistakenly deleted by spam fiters.  Spam also wastes bandwidth, processing power and disk space.  The shocking nature of this sometimes nasty electronic mail even causes distress in employees.

Spam and Hotmail

Microsoft's free e-mail service, Hotmail is the primary target of spammers a sort of spammers paradise.  within a day of opening a hotmail accouny users begin to receive spam.  Collectively, 110 million hotmail accounts reeceive more than one billion pieces of junk mail each and every day.

Though there has not been much business incentive for hotmail to protect its servers from massive spam attacks, the free e-mail services has taken action.  This past November Hotmail began using Brightmail spam filters.

This free anti-spam technique does not guarantee the complete elimination of spam.  If users want a more powerful filter to defend against spam.  Hotmail offers a service that account holders must pay for.

The Future of Spam

Unfortunately, the end of spam is not in sight.  Spam levels will continue to rise through out 2005.  Unless future legislations deems spam illegal, the technology to stop its proliferation will need to be woven into the fabric of the internet, this is precisely what many anti spam enterprises are trying to do.


Firewalls

Firewalls have a mystique surrounding them.  Not too long ago, only big companies use firewalls to protect their networks.  It wasn't even conceivable that you would have one to protect a small business or a home computer.  Even with the advent of personal software firewalls, many assume that only experts in networking protocols could get one to work on their computer

Forget all of that, although personal firewalls are extremely powerful and configurable, even relative novices can make use of them to add a layer of protection, and control, to their internet connection.  Especially if you have an always on DSL or cable modem connection, leaving your PC open for attack whenever it's turned on a firewall is near necessity to keep your PC secure.

How firewalls work

A firewall is what it sounds like, it stands between your computer against the wild and woodlly internet.  It screens all incoming and outgoing traffic, blocking anything suspicious or harmful.  For example, a firewall can protect you against a hacker trying to break into your system or an internet worm trying to exploit a security vulnerability.

A firewall can be either a hardware or a software solution.  If you have a router for your broadband connection to share the connection or allow wireless access, that router probably has some firewall capabilities.

Limitations of Firewalls

Firewalls can't protect against attacks that don't go through the firewall. Many corporations that connect to the Internet are very concerned about proprietary data leaking out of the company through that route. Unfortunately for those concerned, a magnetic tape, compact disc, DVD, or USB flash drives can just as effectively be used to export data. Many organizations that are terrified (at a management level) of Internet connections have no coherent policy about how dial-in access via modems should be protected. It's silly to build a six-foot thick steel door when you live in a wooden house, but there are a lot of organizations out there buying expensive firewalls and neglecting the numerous other back-doors into their network. For a firewall to work, it must be a part of a consistent overall organizational security architecture. Firewall policies must be realistic and reflect the level of security in the entire network. For example, a site with top secret or classified data doesn't need a firewall at all: they shouldn't be hooking up to the Internet in the first place, or the systems with the really secret data should be isolated from the rest of the corporate network.

Another thing a firewall can't really protect you against is traitors or idiots inside your network. While an industrial spy might export information through your firewall, he's just as likely to export it through a telephone, fax machine, or Compact Disc. CDs are a far more likely means for information to leak from your organization than a firewall. Firewalls also cannot protect you against stupidity. Users who reveal sensitive information over the telephone are good targets for social engineering; an attacker may be able to break into your network by completely bypassing your firewall, if he can find a "helpful'' employee inside who can be fooled into giving access to a modem pool. Before deciding this isn't a problem in your organization, ask yourself how much trouble a contractor has getting logged into the network or how much difficulty a user who forgot his password has getting it reset. If the people on the help desk believe that every call is internal, you have a problem that can't be fixed by tightening controls on the firewalls.

Firewalls can't protect against tunneling over most application protocols to trojaned or poorly written clients. There are no magic bullets and a firewall is not an excuse to not implement software controls on internal networks or ignore host security on servers. Tunneling ``bad'' things over HTTP, SMTP, and other protocols is quite simple and trivially demonstrated. Security isn't ``fire and forget''.

Lastly, firewalls can't protect against bad things being allowed through them. For instance, many Trojan Horses use the Internet Relay Chat (IRC) protocol to allow an attacker to control a compromised internal host from a public IRC server. If you allow any internal system to connect to any external system, then your firewall will provide no protection from this vector of attack.


Anti Virus

Virus Prevention

What Is A Computer Virus

How Is A Virus Activated?

How Do I Know If My Computer Has Contracted A Virus?

Things To Keep In Mind

To Read Another Safety Topics Click Here


Awareness that evey contact between your system and another is an opportunity for virus infections

No antivirus software is enough to prevent virus infections

Think before you open e-mails from unknown sources

Infections cost money and down time, it pays to be cautions

Verify downloads by scanning all files before executing on your pc

Install antivirus software on your home pc

Report all virus incidents to your internet provider

Update your antivirus software regularly

Scan all files that come from outside sources especially the internet

Virus Prevention

Today there are approximately more than 70,000 known computer viruses.  The chance of your Personal Computer, Compact Disk Read Only and Re-writeable and Diskette being infected by a virus is definitely very high.  To avoid being infected, you should always scan any CD's and diskette before using it and you should scan your complete computer at least once a week more often if you are high risk user.

Computer viruses and worms like "Melissa" and "Code Red" receive a lot of media attention because they can spread quickly and wreak havoc on personal computers.

Anti virus software will also protect you from Trojan horses.  Trojan horses are typically sent to computer systems through e-mail.  They are particularly dangerous because they have the potential to allow others to gain control of your computer system remotely, without your knowledge or consent.  These programs can capture and send sensitive information stored on your hard drive to any person who has gained remote access to your computer.

A variety of anti virus software packages are available on the market today.  Many of these products install anti virus updates to your computer automatically, as long as you have the update feature enabled.

Here is the basic prescription for computer virus protection.

 

  • Be very careful whenever you are booting your computer from a floppy diskette because the most common source of virus infection come from here.  Make certain that you are using a write protected system diskette that has been scanned with the latest antivirus scanner.  Never boot your computer from a system disk that has been in someone else's computer and has not been scanned by you.

 

  • If you warm boot your computer by pressing on CTRL-ALT-DEl and if you left a diskette in the diskette drive, the system will attempt to boot from there first.  It is good practice to avoid to this at all cost.

 

  • Know your software source is another important virus avoidance strategy.  Never accept software with doubtful origins and never run a newly copied program on your computer before thoroughly checking it for virus using the anti virus program.

 

  • Here are some other suggestions for preventing virus infections.  Those write protect tabs on each diskette are your most useful tool in the fight against virus.  They should be used on all boot diskette, programs diskette and even data diskette.  It's easy to remember that if the tab is open and you can see through it.

 

  • Do not open any files attached to and e-mail from an unknown, suspicious or untrustworthy source.

 

  • Do not open any files attached to e-mail unless you know what it is, even if it appears to come from a dear friend or someone you know.  Some viruses can replicate themselves and spread through e-mail.  You also need to be cautions from senders you know, however you should use extra caution with those you don't.

 

  • Do not open any files attached to an e-mail if the subject line is questionable or unexpected.  If you really need to look at the message, always save the file to your hard drive before doing so.

 

  • Delete chain e-mails and junk e-mail, do nor forward or reply to any to them.  These types of e-mail are considered spam, which is unsolicited, intrusive mail that clogs up the network.

 

  • Do not download any files from strangers

 

  • Exercise caution when downloading files from the internet.  Ensure that the source is a legitimate and reputable one.  Verify that an anti-virus program checks the files on the download site.  If you're uncertain, don't download the file at all or download the file to a floppy and test it with your own anti virus software

 

  • Update your anti-virus software regularly, over 700 virus are discovered each month, so you'll want to be protected.  These updates should be at the least the products virus signature files.

 

  • Scan all new files before opening, when downloading files and attachments.  This is the same for files copied from disk, shared drives or other removable media.

 

  • Scan your system regularly, after installing anti virus software and keeping it up to date, it is important to scan your whole system on a regular basis.

 

  • Back up your files on a regular basis.  If a virus destroys your files, at least you can replace them with your back-up copy.  You should store your backup copy in a separate location from your work files, one that is preferably not on your computer.

 

  • When in doubt always exercise on the side of caution and do not open, download, or execute any files or e-mail attachments.  Not executing is the more important of these caveats.  Check with your product vendors for updates, which include those for your operating system web browser and e-mail.

Chick Here To Return to The Top of The Page

What Is A Computer Virus

A computer virus is a mischievous or malicious program that attaches itself onto legitimate programs.  Depending on the motives of the virus author, the virus may display a message or images, erase files or alter data.

Chick Here To Return to The Top of The Page

How Is A Virus Activated?

Once a computer is infected, a virus can be triggered by an action such as powering on your computer or executing infected files and or a date or both.  Some virus will lie dormant for months and if you share any of infected programs with others you'll be giving them the virus also.

Chick Here To Return to The Top of The Page

How Do I Know If My Computer Has Contracted A Virus?

Once a computer is infected, a virus may or may not display signs of its presence.  These signs vary greatly depending on the nature of the virus.  Here are some of the more common computer virus signs you should watch out for.

Screen Graphics

Bouncing ball appears on the screen
Characters fall to the bottom of the screen
Moving ambulance at the bottom of the screen

Screen Messages

Disk Killer..
HA,HA,HA, It's April 1st..
Your PC is stoned..

Speaker Sounds

Plays "Yankee Doodle"
Unexpected beeps
Plays music tunes

Apparent Hardware Failures

Error reading Drive A message
Keyboard does not function properly
Computer functions erratically

Chick Here To Return to The Top of The Page

Things To Keep In Mind

No anti virus program is safe enough to prevent all virus infections.  Think before you open e-mails from unknown sources.  Keep you you anti virus software files as up to date as possible.  Scan all files that come from outside sources especially the internet and finally you are the best person to stop virus from spreading.

Chick Here To Return to The Top of The Page


E-Mail Hoaxes and Chain Letters

What Are Internet Hoaxes And Chain Letters?

Recognizing a Chain Letter

How To Spot An E-Mail Hoax

What To Do If This Happens To You

To Read Another Safety Topics Click Here


What Are Internet Hoaxes And Chain Letters?

Internet hoaxes and chain letters are e-mail messages written with one purpose to be sent to everyone you know.  The messages they contain are usually untrue.

Chick Here To Return to The Top of The Page

Recognizing a Chain Letter

Chain letters and most hoax messages all have a similar pattern.  From the older printed letters to the newer electronic kind, they all have three recognizable parts they are

A Hook - First there is a hook to catch your interest and get you to read the rest of the letter
A Threat - When you are hook, you read on to the threat.  Most threats used to warn about the terrible things that will happen if you do not maintain the chain.  However, others plays on greed or sympathy to get you to pass the letter on.  The threat often contain official or technical sounding language to get you to believe it is real.
A Request - Finally, the request to distribute this letter to as many people as possible.  They never mention clogging the Internet or the fact that the message is a bad one, they only want you to pass it on to others.

Chick Here To Return to The Top of The Page

How To Spot An E-Mail Hoax

  • Note whether the text was actually written by the person who sent it to you.
  • Look for telltale phrase like "Forward this to everyone you know."
  • Look for statements like "This is not a hoax" or "This is not an urban legend"  They usually mean the opposite of what they say.
  • Look for the frequent use of uppercase letters and multiple exclamation points.

Chick Here To Return to The Top of The Page

What To Do If This Happens To You

  • Check if you have received any internal hoax or virus advisory
  • Do not forward the message
  • Delete the message if it is from un-trusted source

Chick Here To Return to The Top of The Page


Eugomics

Lighting Lessons

To Read Another Safety Topics Click Here


Lighting Lessons

So you're sitting at your computer working through another headache. Don't be too quick to assume it's the task at hand that's giving you the pain; it could be the way you're lighting it.

Many things about working on a computer are visually demanding. There's the frequent eye motion, the continuous eye focusing and the need to constantly realign your field of vision. This explains why some statistics suggest that as many as 90 per cent of computer users experience symptoms of Computer Vision Syndrome (CVS).

In fact, CVS can be defined as a set of eye and vision difficulties linked to work-related use of the computer. The collection of symptoms includes eye strain, headaches, dry and irritated eyes, blurred vision, and neck and back pain. But setting your workspace up with the proper amount of light — minus the glare — can reduce the likelihood that you and CVS will ever make each other's acquaintance.

"When we look at the computer, we simply do not blink enough," says Suzanne McLaughlin, president of Orientations Nova, an Amos, Que., e-commerce company that sells full spectrum lights online. "That makes our eyes dry out, and can lead to symptoms of Computer Vision Syndrome."

According to the Canadian Centre for Occupational Health and Safety, " 'good' lighting means providing enough illumination so that people can see printed, handwritten or displayed documents clearly, but are not blinded by excessively high light levels."

But the whole enterprise gets tricky when you're talking about simultaneously lighting the documents on your desk as well as the computer. You want a room with general brightness that is not too far off the brightness of the computer monitor itself. "What you're trying to avoid is sharp contrast," says Susan Yearwood, an Ottawa-based occupational therapist and professional. "General lighting should be on par with the level of brightness coming off your screen."

In a typical office environment there are potentially four sources of light: natural light, overhead lighting, task lighting and the light coming off the monitor.

Go Natural

Natural light can be either a blessing or a curse. On the one hand, there's no better light for our eyes. But it can be annoying when it's glaring back at you as a reflection from the computer screen.

Ideally, your office window should be neither behind your back nor behind your computer. If this positioning can't be helped, make sure you've got some serious window blinds on hand.

Anti-glare screens are OK, says Yearwood. However, flat screen monitors already have anti-glare properties.

A good way to check for glare is to turn off your monitor and sit in front of the black screen. That way, you'll distinctly see any flashes of light coming back at you. You should also dust your screen regularly, and watch out for stark white office blotters and desk surfaces: they also reflect bright light.

Review Your Light From Above

Overhead lighting should never be placed right above or behind the screen, since it can bounce into your eyes. McLaughlin says one of the worst offenders for the eyes is the standard incandescent bulbs that people use all over their homes and offices. Another offender is the standard fluorescent tubes used in stores, offices and public buildings. She suggests replacing both of these bulbs with full spectrum compact fluorescent spiral bulbs (for lamps and overhead fixtures) or full spectrum fluorescent tubes — which promote better vision and save energy.

Focus On Task Lighting

If your overhead lighting isn't sufficient, supplement the scene with a task light. Task lights are desk or floor lamps designed to complement an overhead light's illumination of a workspace. Since a monitor is already bright enough, you should pick a desk lamp that can be used to illuminate documents while avoiding excessive light near the monitor.

Tracey Kelly, commercial manager for IKEA of Sweden, suggests "asymmetrical" lighting, which throws a triangular pool of light as opposed to a circle. "This way you can adjust it so you have a stronger light on your keyboard than on your screen."

And while you're at it, don't stick your desk lamp on the right-hand side of your desk if you're right handed — you'll cast your own shadow.

Chick Here To Return to The Top of The Page