Tech Security Primer
What do you need to know about technology to be secure? Here's some basic pointers:
The Evil Three
What are the three worst evils on the net?
  spam - like the real-world meat product, spam comes from unknown sources and is of questionable quality. Spam is, in its most basic form, any unsolicited email you receive. Some definitions specify the mail must be from someone you do not know, commercial in nature, and from companies with which you have no relationship. Thus, buy a computer from Dell, and you have a business relationship with them, and so a product advertisements from them would not be considered spam.
 
Trojan horses - like the famed wooden horse of old, a Trojan horse program is one that appears to be one thing (like a screensaver), but which hides something else, like spyware that monitors your internet activities or adware that stores advertisements on your computer and then feeds them to you in popup windows. Trojan horses typically require some trickery to get you to "open the gates and let them in" to your computer.  
 
viruses - working like biological viruses, computer viruses infect your computer, reproduce themselves, and spread to other computers. Some viruses install back doors to your computer, or security holes that allow someone else to take control of your computer and use it without your knowledge. Viruses typically do not require you to do much work to install them; simply opening a virus-infected attachment or running a virus-infected file will do it.  

In the real world, we have vaccines. In the computer world, we have something similar. In addition to antivirus programs, there are people who routinely search software for security holes and develop software to patch the holes. Microsoft bundles patches for Windows security flaws into a single monthly release, so that once per month you can install all recent patches for free at:
     http://v4.windowsupdate.microsoft.com/en/default.asp

Why Are These Kinds of Programs So Bad?
The first thing to understand is that it's all about money. If a spammer gets $100 from a mortgage company for every client he sends them, he can send out 1,000,000 spams about refinancing, practically for free mind you, and if only 100 people (.01%) refinance, then he makes $10,000 dollars for a few hours work. Incidentally, many computer experts advocate charging internet users a penny per email they send. Thus, a spammer paying a penny each to send a million emails, and only earning $10,000 from it, would only break even.

The second thing to understand is that while spam may seem merely annoying, spam is a kind of unsolicited marketing, and is becoming more and more tied to Trojan horses and viruses written by hackers, or people who try to break in to computer systems. While hackers create viruses for antisocial reasons -- it's a thrill to screw up others' computers or a great way get revenge on a former employer -- they also do it for money.

  Viruses let hackers turn infected computers into zombie machines, or computers that mindlessly follow the hacker's instructions. Bill Gates recently spoke in England, and cited British security companies as estimating that there were 800,000 zombie computers in England. They all are sending out spam after spam after spam to English internet users, and the owners of those 800,000 computers don't even know what's happening.

Some hackers write Trojan horses that install adware. If a hacker gets a penny for every add that someone clicks on, adware programs create a payment-per-click income. Alternately, a hacker could distribute adware that serves up advertisements for a specific company's product this month for a flat-fee, and then "resell" the "advertising space" next month.

Some hackers just break into email accounts to send out spam or hide their hacking. My husband uses AOL to access his employer's computer system. Someone hacked into his account by cracking his password ("red1234" is not what we call a strong password) and sent several thousand spam in one day, appearing to be from my husband, before AOL shut down the account.
 
Some hackers do it as part of illegal schemes. The New York Times reported that a stock broker installed a program he thought would organize stock quotes for him, but which actually installed a kind of spyware known as a key logger, which reported every key he typed (and thus his passwords and user names) to the hacker, who used them to transfer money belonging to the broker's clients into his own account.

So What Can You Do?
As you can see, there are a lot of people out to make money, legally or illegally, ethically or unethically. Spam, viruses, and Trojan horses are annoying, sure, but they are also far more than that. Attending to security in your computer habits is a wise idea, sure, but it also help you avoid aiding criminals. So what do you do?
 
One option is to stick your head in the sand and hope none of this happens to you… ripe for the picking as they say.

A second option is to take basic steps to protect yourself:
1) Don't read and for God's sake don't reply to spam - some include "tracking bugs" in them to detect live email addresses, and so just reading them can confirm your email address and encourage a spammer. Don't click the unsubscribe link for the same reason; it just confirms that your email address is a "live" one.

2) Install a good antivirus program (like Norton Antivirus) and run it every week. Keep it up to date too! Check the Microsoft Update site every month and download the "Critical Updates." While other software and drivers are available there, only download the "Critical Updates."

3) Never open email attachments you were not expecting, or that seem to have only a generic explanatory message (like "I wish you would enjoy this" or "that document you wanted"). You might get a program emailed to you that seems to come from Microsoft urging you to run the attached file to patch your system. Never, never run these programs, as they install a virus!

4) Install a firewall (like Zone Alarm) to protect your computer from attacks. Firewalls block hackers from breaking in to your computer, as well as viruses from getting out of your computer. (CSoPP already has a firewall, but your home computer probably doesn't)

5) Download a good spyware program (like Spybot - Search & Destroy) and run it twice a month. Keep it up to date too!

6) Never click on any button in a popup add. Close the popup with the "X" button in the top right corner of the titlebar of the window, or hit Alt-F4 to close it. Clicking anything else (including the "Cancel" button) will most likely install spyware or adware, a practice called drive by downloading. The Googlebar is a neat tool that will give you instant access to the Google search engine, and block most popups as well.

A third option is to learn about spam, spyware, viruses…. and the like.
About Spam How do they make spam
SpamReport
Avoid Spam 1, 2, and 3
About Spyware and Adware Avoid Spyware
11 Signs of Spyware
Escape Spyware
Ways to Fight Malicious Code
Destroy Spyware
Cookies Basic Information
Cookies Manager
CookieCop from PCMagazine
Viruses Free Solutions
Paid Software
Step-by-Step Setup
Safe Downloading Basic Tips 1 and 2
Firewalls ZoneAlarm Review other free software
A few more security issues…. Wireless Security
Safe Passwords
Shopping Online
Banking Online

Some spyware "removal" programs actually detect and delete other people's spyware, while installing and protecting their own. How do you know if a spam/spyware/antivirus program is really what it says it is? Easy! Enter the name of the program into Google and do a search. If it is bogus, chances are someone has posted a report about it and Google has their post indexed.