Thursday, December 25, 2008

Online Personal Investigation

If you have lost touch with old classmates or work colleagues, you may want to know how to contact them. Maybe you have to search through the phone book and found that many people with the same last name and initials as your friend. Maybe they have been married, you no longer know their names. If this is the case, then you may be pleased to know that you can search online and do a little bit of personal investigation.

Hiring a private detective appears to be a bit serious, all you want to do is find an old friend or companion. You just want to know their name and address please? You do not really want to further their personal life and to find information, will prove uncomfortable, such as criminal records or bankruptcy cases. If you want to find a little information about someone, then hiring a private detective is possible not the best option for you. However, if the person has assumed a new identity, either in a criminal sense or maybe as witness protection, then your investigations may have to delve slightly further. Either way, you do not need to resort to a private detective. Online personal investigation, with a little bit of thought and a little bit of time, will prove effective and cheaper than hiring someone.

At one time, you can only find this kind of personal information you are looking under professional help. However, in today's society, new technology is the future of the daily life. Doing this things are becoming a thing easier, cheaper way. You still have to pay for information finally, but certainly less than to pay someone to do your work. Fortunately, these sites allow you to carry out your own personal on-line survey, that is, you can choose according to your own contributions to the general plan If a site is too expensive, to find another one. If a site does not provide you with enough information, you are looking for, then move on and look forward to another. It will take time to find the best sites, but there is for your needs, but also your budget. All things take time, this is no exception.

Tuesday, December 16, 2008

How to Stop Data Leaks

One of the great things about the Internets is that it provides universal connectivity between your desktop and the world. But that is also a tremendous weakness and security professionals often lose sleep over how easy it is for a rogue employee to email a friend - or even his private Webmail account - their entire customer list or other confidential information. There have been a number of products to try to track or block leaking data, and this week I was testing one of them called TrueDLP from Code Green Networks. The idea is fairly simple: you install their appliance on your network, point out your most sensitive data, and then it watches over your packets and sees what is leaving the premises. It doesn't take that long to setup and install, once you figure out what it is doing and what you are doing.

The tricky part is figuring out exactly what is your most sensitive data, and being able to focus in on it in a way that the product can identify. It comes with dozens of various templates to be able to recognize social security numbers, or names and addresses, or stock symbols, or other kinds of well-formatted data. But the real plus is being able to handle unformatted data, such as a memo about a customer's preferences that is just a Word document, for example. Code Green can connect to a SQL database and directly handle the query syntax to select particular data types, and it can also connect via WebDAV to Sharepoint servers or other document repositories too. Once you find your data, you create protection policies and tell the appliance what to do - whether to just log the violation or actually block the activity.

You also need to make sure that you are matching everything properly, because the last thing you want to have on your hands is a series of false positives that you have to chase down. You can also set up fancier things, such as automatically requiring emails between two places (such as your office and a partner) to go out encrypted. Speaking of encryption, they work with the Blue Coat Web proxies so that even if someone is using SSL connections to talk to their Webmail accounts they can take those packets apart and see what someone is doing. That is pretty spooky, but hey, you have been warned!

There are other things that the product does, such as being able to detect content on removable USB thumb drives, or even block their usage entirely. This is the way of the world: as these drives get beyond 64 GB (yes, gigabytes), they are more of a threat for someone to just literally take an entire database out the door in their pocket. I recently ran up against this when I was in my bank trying to provide documentation for a loan. I had brought a CD, a USB thumb drive, and had saved the documents on my Google account just for good measure. Because of the bank's endpoint security lockdown policies, I was 0 for 3 and had to send them the old fashioned way, by making paper copies, once I got home. At least it was nice to know that they had protected their employee's PCs.

The interesting thing is what happens after customers get their hands on this Code Green product. Lawsuits typically ensue, so to speak, because often the network administrator finds someone is doing something that they aren't supposed to be doing. One of the product managers I was working with told me that this usually happens within the first week of the product being put into production. Given that the basic price of the product is ten grand, I figure that is as close to instant ROI as you are going to get these days, considering the cost of most litigation.

So take a gander over at http://www.WebInformant.tv and watch the four-minute video of the Code Green appliance. It is a very innovative way to detect and prevent data leaks and well worth a closer look.

David Strom is a noted speaker, author, podcaster and consultant who has written two books and thousands of magazine articles for dozens of IT publications such as Computerworld, eWeek, Baseline Magazine, Information Week and Information Security magazine. His blog can be found at http://strominator.com - and he can be reached at david@strom.com

Saturday, November 22, 2008

Are We Still Behind the Hackers?

The recent developments regarding the Large Hadron Collider - a machine built to try and figure out how the Big Bang happened - were overshadowed not long after the experiment started by news that hackers had managed to access one of the computers being used for the experiment to register their distaste at what was going on.

While the experiment itself was unharmed the general public cannot now find out what is going on because the website related to it has been hacked and cannot be accessed.

So in answer to the question posed by the title of this piece, the answer would appear to be that we are still some way behind them.

Hackers act on all kinds of motives, and one of the reasons why they have so many opportunities to hack into websites is that some people think they are only at risk if their site takes payment information from others. That simply isn't the case, because some hackers do what they do simply to compromise internet security, or to make a point of how easy it can be to hack into a facility. There are numerous examples of hackers managing to get past the defences of government websites and those relating to parts of the law, so there is clearly no single reason why websites are continuing to be hacked into and exposed as being insecure as a result.

But there are services out there that use ethical hacking to expose and plug weaknesses in websites, and it is these services that should be used more and more if we are to keep on top of the hackers, rather than it being the other way around.

After all, wouldn't you rather pay the money to get an ethical hacker to try and break through your defences so they can remedy any problems you may have, than wait for someone who isn't so ethical to do it for you? In the latter case you won't get any help to make sure no one else gets through - all you will get is hassle and the problems they leave behind.

Just as people are coming up with new ways to break through systems, so the ethical hacking companies are developing ways to combat them, and if you want your business to be as secure as it can possibly be then you owe it to yourself, your staff and your clients to pay for the best knowledge out there today.

So in reality, it is perfectly true that a lot of companies are still behind the hackers and are running the risk of being hacked into and subjected to a lot of damage every single day. It is those businesses who have essentially invested the money in their future that will remain as secure as it is possible to be, as they have hired the best computer security company they can afford to make sure they are fully protected both now and in the future.

And why try and keep up with all the developments yourself when you can hire the professionals to do it for you?

Pure Hacking helps protect your Internet security by providing world-class penetration testing and ethical hacking risk management services. For a free consultation, please visit Penetration Testing.

Thursday, November 13, 2008

Security on the Internet - KeePass For Your Computer

Hectic schedules and fast-paced lives mean that more and more people are taking advantage of doing their business over the Internet. Everything from paying bills to running online businesses can be done at a person's leisure, when they are ready to get onto their computer. Along with so many trying to make use of the convenience of doing business online are those who want to take advantage of the system.

Computer hackers have been around just as long as the Internet. As soon as more technological advances in computer security are made, there are people who are trying to break through those measures. The one thing that usually keeps the bad guys from getting into a personal account is a password.

There are a lot of people who may use the same pass word for just about every account they have. Though this makes it easier to remember of course, think about what may happen if one of these hackers gets a hold of the "master pass word." Everything from work and bank accounts to social sites can be gotten into, and that type of damage can be almost impossible to control. Once your personal information has been tainted on the web, it can be past difficult to repair.

One solution to that type of problem is to use a different, creative password for every single account or login that a person uses. Most folks would think that is a crazy idea to try to remember a different password for every account, but there is a way to organize and protect personal information like this. That is where a password manager program comes in.

Out of the different password programs that are available, the public open source type would be more secure. One of these that come highly recommended is KeePass which is downloadable from their web site at www.keepass.info. The way that KeePass and other programs like it work is by holding all of the various passwords that a person uses in one database that can be unlocked by one "key" password.

Part of the reason why the KeePass program is a popular choice is because there is no installation required. It is a portable program that can actually be carried on a person via a USB stick. Another major consideration for using this particular program is that it is totally Windows compatible.

Since security is the major draw for using the program, it is good to know that not only the list itself is securely encrypted, but the whole working database is as well. Options of how to access this information is important as well. KeePass gives a couple different options such as burning the "master key" file onto a disc to use for accessing the information. Or, a person can elect to open it with just one main password. For anyone who is interested in very high security, both of these access points can be combined.

Anyone doing serious business over the Internet needs to be able to protect themselves. Being able to manage passwords is a crucial part of this protection. One last bonus of the KeePass program is that it can generate passwords at random. This can be helpful to come up with new passwords for all of a person's logins.

Andrew Green is part of the team behind A-Z Proxies, an attempt to list from A to Z all web proxies. Andy has been actively working in the web proxy field since 2005 and has built up a wealth of knowledge on the subject.

Tuesday, October 21, 2008

Challenges of Internet Security

Have you had your share of challenges of internet security? It has gotten so that NO ONE is safe from virus attacks! Even the head honcho, Microsoft, has been hit a few times!

It wasn't long ago when the only way you could get a virus was if someone gave you a copy of a program or application on a floppy disk and that is what was infected. And because of the slow spread of physically handing disks around and the fact that most people who used computers were adept in how to use them, viruses were quite easily quarantined and eradicated. People knew about the viruses that were out there and made sure that they scanned each disk before they opened any files or activated any programs.

Now-a-days though, it seems that very few people in comparison have this knowledge and most are very impatient. They just want to put the disk in the computer and run it without doing any security checks. Even when they download things off the internet, they should by rights do a scan for viruses, trojans or any other nasties BEFORE starting up or opening the download. Even if it is just a picture!

Viruses now can infiltrate your computer as easily as just visiting a website and can be passed through the entire internet via the addresses in your address book without you even knowing about it!

As technology advances, the challenges of internet security increase. New types of viruses can now pass from computers to mobile devices, making this an ever increasing threat. Also with more and more people using their computers for online shopping and online banking, there is an even greater threat of personal information being compromised.

Protecting Your Computer

Lucky for us, Antivirus software has kept pace with the virus threats being released daily. Antivirus software has become an essential component to the challenges of internet security and your piece of mind. A good antivirus software package is designed to protect you against viruses that can access your computer through email, web browsers, file servers and copied disks. Also, these new antivirus are updatable and are centralized to aid in configuration and manual or automatic scanning any time you want or need.

A computer user should remain diligent and follow a few simple steps to protect against the threat of a virus:

1. Evaluate your current computer security system.

Because of the way that new viruses have been programmed to attack your computer, it has become necessary that we fight back with more than just one way of protection. Our antivirus must have more than one way of stopping these viruses from slipping past our defenses. Your antivirus should have some or all of the following:

  • antivirus,
  • firewall,
  • content filtering,
  • and intrusion detection

2. Only install antivirus software created by a well-known company.

Due to the fact that there are constantly new viruses being released to raise havoc on the internet, you want to make sure that you have an antivirus from a company that has been around for a while. You need to have the ability for your antivirus to update regularly and if you get one from a new company or a company that is not that well known, then you risk that when you need to get that update, they might not be there!

3. Make it a habit to always scan all new programs or files no matter from where they come from.

4. When opening Word, Excel or binary documents from unknown sources, be careful! Scan them before opening!

5. Perform regular backups in case your system is corrupted. It may be the only way to recover your data if infected.

Following these 5 simple steps are a start to making your computer a safer place for your information.

Your computer is not a safe place to keep your valuable information unless you find out more at Antivirus Software Review. Don't wait until it is too late!

Tuesday, October 7, 2008

Essential Tips For Secure Online Trading

The internet has caused a sensational boom in the business world by allowing individuals and businesses to conduct online trading with customers all over the world. The most exciting aspect of doing online trading is that it can be done from the comfort of your home. Unfortunately, just as in real life, unscrupulous minds have soured the fun for everyone by engaging in the criminal activities of internet fraud and theft of sensitive financial information of customers. Doing online business seems like a daunting prospect to the uninitiated who has little or no knowledge of the basics of secure trading. However, things are not as grim as they might seem. It is very easy to protect ourselves from internet fraud by taking care to follow certain precautions when doing business online. One of the first things to do before going ahead with a trade deal on the internet is to perform a background search on the business you will be dealing with. Such information can be gleaned from the various credit agencies and trade institutes. If still in doubt, you can also seek out information from the chambers of commerce.

It's always an excellent idea to ask as many questions as possible. Legitimate traders will be quite eager to answer all your queries pertaining to their business and will even provide references on demand. Since appearances can be very deceptive, don't be fooled by a really attractive website into believing that the company is honest. Be especially wary if the company provides only a fax number and an email with no further contact information. Although scammers are found everywhere, be especially suspicious of companies based in third world countries. Promises that seem too good to be true are usually a sign that the company is very interested in getting their hands on your money. Only go through with the deal after carefully verifying such a company's authenticity from third parties. Scammers usually try to entice buyers by posting items in great demand at ridiculously low prices.

Buyers should request a sample to judge the quality of the product and ensure that it meets their needs. Sellers shouldn't send samples to unknown buyers without asking for a small fee. If a buyer requests to complete the transaction using multiple credit card numbers, it's usually a sure sign that the numbers are stolen. If you suspect that you have become a victim of fraud, try contacting your trading partner through telephone to resolve the situation. Most traders are honest and may inadvertently have given you the wrong information due to language and cultural differences. Beware of traders who want to rush the trade. Legitimate traders are usually very patient and can wait a long time before the deal is finalized. You can use this time to verify the true identity of the trader and ask around to see if anyone has had bad experiences in dealing with this particular trader. If you get defrauded even after following all the aforementioned tips of secure trading, it is best to notify the relevant law enforcement authorities and hope that justice is served.

Liam Derbyshire is the founder of http://www.miraclesformen.com.The site is dedicated to helping individuals to improve their health and fitness. This site is based on Secure Trading.

Sunday, September 28, 2008

Internet Banking Security Now More Enhanced

Guarantees against online fraud are what most consumers look for in internet banking services. As money is a major consideration here, they just want the best protection for their savings and investments. Regardless of whether they're banking in a brick and mortar institution that has gone online or an online-only bank, consumers demand security.

Banks are working hard to convince customers to try internet banking. Security features of internet banking services are now more advanced giving customers every reason to bank through the internet for added convenience and a lot more benefits. With the ever improving internet technology, anybody today can perform all sorts of financial transactions online in the comforts of their home or office. Apart from the security and convenience, internet banking is also cost effective with less or sometimes no fees at all.

Research experts say that while some consumers see no benefit in eliminating paper when doing transactions, going paperless is actually protection in itself. As an example, a bank's website can now allow you to view your bills and statements online in an instant instead of waiting for several weeks. This means that there's no chance that your credit card and telephone statements will be taken from your mailbox or your trash can.

The encryption technology is the most commonly used to secure websites. As data pass through shared systems or networks wherein a large number of people have access to the information, this tool plays a vital role. It is in this light then that confidential information notably passwords needs to be encrypted to prevent them from leaking to other people and from being changed. The use of a digital signature is another security technique that also involves encryption.

While encryption remains to be used, several large banks now use the latest web-based security system known as SiteKey. The tool uses a new kind of authentication process with the main goal of avoiding phishing, an online fraudulent activity. However, only a few are using this technique because of the system's weaknesses.

The use of usernames and passwords as well as personal identification numbers or PINs is among the standard security features provided by most banks. It is, therefore, highly recommended that the confidential information should not be shared with anyone to avoid the so-called identity theft.

Email alert is another safeguard that banks use. With this feature, customers are alerted via email or text message whenever suspicious transactions occur on their account such as withdrawal of large sums, when they get emails from phishers or when someone attempts to access an account with an incorrect password.

Many major banks also provide scanned images of canceled checks. The check's image not only shows the front side but the back side as well. This will help a customer in verifying the check number, amount and the payee in case he or she forgets the information.

Banks are committed to providing their clients with the best online security in an effort to protect their hard-earned money. It is not surprising then that internet banking customers are now growing in number.

Learn more about Internet Banking Security by visiting http://www.webinternetbanking.com/internetbankingsecurity.html

Sunday, September 21, 2008

Protect Yourself From Cyber Criminals

Don't you like to protect your money and keep your private information safe? Are you frightened by the possibility an Internet criminal will steal your credit card and do things with your name after stealing your identity? Guess what! You can prevent this mess from happening. Let's go over the steps you can take to prevent identify theft and loss of your money while you are online.

Take precaution with storing information and passwords on any computer you use. You might be thinking, "I am the only one who uses my computer; therefore, I can store the password I use to log into my computer and any accounts I have with different websites." If you believe this and act accordingly, you could be in trouble. Someone might rob you of your laptop or break into your home and steal your computer. Furthermore, you will probably have to recycle or throw away your computer eventually.

Choose passwords wisely. Do not choose a password that has any part of your name or other information that identifies you. Choose an unusual password or a password you think others will have trouble guessing. If you open an online banking account or PayPal account, create a password that contains numbers and capital letters. Never reveal your passwords.

Be careful when reading E-mail messages from PayPal. The real PayPal site only addresses you by your name and it does not provide links for you to click or ask for your password. If you get a "PayPal" or "eBay" message saying you must verify your account to avoid suspension, ignore it. If you are ever tempted to respond, it is safer to copy and paste the link into your browser. If you ever believe an account of yours has been breached, immediately change your password and report the breach to the site holding your account.

Ignore E-mail messages in which you are asked to submit a form to claim a tax refund. The IRS does not actually contact people online unless they are returning a message.

Ignore messages from Microsoft and others that try to get your personal or financial information by claiming you have won the lottery or that you are a beneficiary of a huge sum of money. Also ignore messages in which each letter for the sender or subject line is capitalized.

Take precaution when sending messages online. A cyber criminal gained access to my debit card after I revealed my new debit card number on a web site's contact message form as a result of not being able to get their system to recognize my new debit card.

Handle your social security number with care. Do not provide it when you use a web site or submit a cover letter, resume or other form of communication online.

Be careful when making online purchases. Make sure the site has a padlock symbol that represents a secure purchase. An https site is highly encrypted to prevent others from seeing your credit card.

Use these tips to prevent identify theft and loss of your money!

Todd Hicks owns Skill Development Institute, an enterprise that provides a keyboard typing lesson and academic study guide. To become a great typist or student, visit Skill Development Institute.

http://sdinst.blogspot.com

Thursday, September 11, 2008

Dealing With Distributed Denial of Service Attacks

Distributed denial of service attacks are frustrating -- they're frustrating for the company under attack, and frustrating for the web host. They can also be costly in terms of business and goodwill lost. Fortunately, there are ways to deal with them, if you are willing to prepare for the possibility of a DDoS before it happens. You may not have seen them very much in the news recently, but distributed denial of service attacks (DDoS) have not gone away. If anything, these attacks - or at least their potential - have become scarier over time as malicious hackers have worked on improving their methods. The increase in home-based broadband Internet connections, for example, means that hackers can now more easily infect a larger number of machines with fast, powerful connections to the Internet and make them do their bidding. Let's back up a second and define what we mean by a distributed denial of service attack. A DDoS attack is an attempt to disrupt the service of a computer network and/or company website by overwhelming the processing capacity of the system or by flooding the bandwidth of the business. It is a blatant attempt to consume the system's resources, to the point that genuine, legitimate users (i.e. website visitors) are denied access. Hackers engage in DDoS attacks via a two-step process. First, they infect computers with viruses and Trojans that allow them to control the machines remotely. They will then use these computers, known as "zombies," to overwhelm other systems. These zombie networks can become quite large. In October 2005, Dutch police arrested three people who'd created a zombie network comprising at least 100,000 computers. Some reports estimate the network was more like 1.5 million machines strong. The three who had created the network were using it to extort money from U.S. companies. It must have worked something like a high-tech version of the classic cliché of the mob protection racket: "Nice company website you have there. Be a shame if it crashed and all your customers couldn't get through." Since many commercial websites now rely on a constant Internet presence, this threat carries a real bite behind it. And with that many machines at a hacker's command, even a hardened company such as Microsoft is not immune to a DDoS attack. It's just the thing for the technology wizard with "different" morals who wants to make some money or a political statement. Dealing with the problems raised by DDoS attacks often requires lots of communication between the company being victimized and the ISP. If you're hosting a website that is under attack, that's you; if you're a web hosting reseller, you're still that company's line of communication to the folks who are handling the servers. Needless to say, it helps to know what you're up against.

Cheap Domains ~ Free Hosting ~ Free Artciles

Thursday, September 4, 2008

Which Internet Providers Are Watching You Surf the Internet?

It's one of the first rules of Internet 101: visiting questionable websites leads to viruses, which entices hackers to access your hard drive and monitor your every click. But can someone still be monitoring your web activity even if you're extra careful when selecting online destinations? The answer may just depend on which Internet provider you use.

A few months ago, The U.S. House Committee on Energy and Commerce sent out an open letter to 33 companies inquiring about their online targeting practices, or in other words, the extent to which the web activity of their customers is being monitored.

The letter was sent amidst reports that several Internet service providers, including Charter Communications, were planning to sell the web-surfing data of their customers to an online advertising company called NebuAd. (Source: nytimes.com)

The responses to the letter showed that most ISPs, including Comcast, Verizon and AOL, never monitor the web activity of their customers. Some, however, do have targeting systems in place to monitor the online behavior of their customers when logged on to their own web sites.

AT&T was the only company to give "careful consideration" to monitoring the web activity of their customers on ALL web sites.

Although it seems like a dirty trick to pull on their customers, AT&T promise that their approach will not be so deceptive. The company is promoting an "opt-in" approach to web tracking, which will require customers to affirmatively agree to have their surfing monitored. (Source: arcane.org)

In the past, most companies favored an "opt-out" approach to web tracking, which required customers to decline being monitored. Those who failed to refuse monitoring were assumed to be compliant with the system.

Most people agree that the best thing AT&T can do in this situation is to leave the Internet experience to their customer's eyes only.

http://www.infopackets.com/

Established in 2001 and read by over 250,000 users world-wide, infopackets features the latest in headline news based on technology, trends and the Internet. Sign up today and have infopackets delivered straight to your email inbox -- absolutely FREE!

Tuesday, August 26, 2008

Zombie Networks (aka Botnets) - A Serious Little-Known Threat

What is a zombie computer?
A zombie computer, also known as a bot, is a computer that has been infected by a malware, often a trojan, allowing an attacker to take control of the compromised PC and use it to serve malicious purposes like sending spam, hosting illegal websites or launching DDoS attacks.

DDoS what?
DDoS (Distributed Denial of Service) attacks are launched with the aim of crashing a server by flooding it with packets of data. DDoS attacks are effective and dangerous because the traffic can rise from hundreds of thousands of zombies; users are not even aware that they participate at an attack. Imagine your server being bombarded by so much zombies!

Those who are not worried should reconsider their position: an expert estimated that zombie networks count between one million and two million infected machines! And, each day, this number increases dramatically! Yours could really be in!

Another side effect of zombie networks: SPAM!
Who never received spam in their email box? Did you ever wonder why spammers almost never get arrested? Reasons are numerous; however, remember that they often use stolen resources, such as zombie computers, or get protected by corrupt Internet service providers (ISPs) in some foreign countries. That, and many other tricks to obfuscate their traces, makes it a challenge to catch them.

My personal privacy could be at risk?
In fact, not really. Contrary to popular myth, most of attackers are not interested in your latest secret trip with your boyfriend; what they want is your Internet bandwidth and sensitive data like your passwords to commit their crimes!

Maybe you ask yourself: "I have no important accounts and I don't care about my bandwidth being stolen. So, what's the deal?"

Hypocrite and selfish question: on the Internet, what you do affect everyone. And, as you can see, botnets are a major danger poisoning the entire network. Will you let a complete stranger "borrow" your car for a hold-up? No. Same goes for your computer.

My computer is fine; it's not slow at all!
Attackers do not want you to know that your machine fell under their control. Yet, if you are severely infected, you can notice symptoms like unwanted pop-ups, hijacking of your browser, slow-downs, etc.

In all cases, be sure to scan your computer every week with an anti-virus and an anti-spyware. Do not forget a firewall or you will be infected in less than 30 minutes.

It is possible to avoid being infected?
Sure thing! Spend a bit of time to learn how to use a computer; scan emails, web pages, downloads and your hard drive for nasty stuff; resist the temptation to revise your human anatomy on doubtful sites; think before clicking and you should be in business!

If you do not put the effort, you will get infected each time.

Webmaster of DesinfectPC: http://desinfectpc.com
Loves computers, writing and politic.

Friday, August 15, 2008

Free Spyware Removal - Don't Believe the Hype!

Are free spyware removal tools really effective? Do they keep your computer clean and protect you from the constant threat of spyware and adware all of us as Internet users face?

Unfortunately, and contrary to what most people believe - the answer is absolutely not.

Industry experts estimate that over 90% of all Internet users will get infected with spyware while online. Given that fact, it is becoming extremely important that we properly protect ourselves and unfortunately, the reality about free spyware removal tools is that they are not nearly as effective as software that might cost you a mere $30 to download.

Most Internet users unfortunately do not understand the difference between free spyware removal tools and the tools that are not free because if they did, they wouldn't think twice about getting their hands on paid software versus thinking they get enough protection from the freebies. The reason I say this is because there is a very large difference between the scanning methods that free and paid spyware removal tools use.

Free spyware remover tools depend on observing the history of your computer's operating system and registry to find spyware infections. In other words, it scans common locations where spyware installs itself and then examines the files and entries to conclude if any changes have taken place and then analyzes those findings to determine if an infection is present.

The issue with this type of detection is twofold. First, the software often reports false positives - which means that it can report authentic files and registry entries as spyware and in some cases if these files are removed this can cause even more damage to your computer and can even make it unusable.

The second problem is that free spyware removal tools neglect to detect a fairly large number of spyware infections, including much of the newest spyware that has been written primarily because of the ever changing nature of programming and hackers exploiting more and more security glitches in software and applications. This results in many of the most dangerous spyware ignored and left running on your computer. With paid spyware removal tools, you rarely see this at all because the method in which they detect and remove spyware is very different.

Most paid spyware removers are more effective than the free tools because they depend on a database of known spyware programs when scanning your computer. In other words, instead of simply looking for changes in files, the software will compare each file scanned against a database to determine if it is a legitimate file or if it is spyware. This is important because it minimizes the amount of false positives but even more importantly, it significantly increases the accuracy of spyware detected and removed which means a greater level of protection for users.

Another important factor to consider is that paid spyware removal tools reinvest much of the money they take in from sales back into research and development of their spyware database and many of the top vendors update their databases at least a couple of times per week and allow you to download those updates for free so you are always current in being protected from even the newest of spyware programs.

So the next time you have a spyware infection, and you undoubtedly will, you'll want to think about whether it is worth the $30 price tag to get a proven and effective spyware removal tool or just use the free tools. If you choose the second option, be prepared to fight an infinite spyware battle where you'll always be fighting pop-ups, always suffering from a slow computer, and constantly putting yourself at a higher risk for identity theft.

From my perspective, the choice is a no-brainer.

Paul McDonald is a Computer Professional that specializes in teaching people about spyware. Visit his info packed website today, the Best Spyware Removers to get a no holds barred review of the absolute best spyware removers available and download your free report "PC Protection :Keeping Your Computer Clean and Your Identity Safe"

Don't forget to get your free copy of his report "PC Protection" by submitting your email when visiting his site.

Thursday, August 7, 2008

The Importance of Encryption Over Public Networks

Public Wi-Fi networks are everywhere today. The nearest hot-spot in your city is probably only a block away. With so many employees on the road and working out of the office today, IT departments are finding the need to provide external access to network resources. The need to stay productive while out of the office is crucial.

Anytime an end-user is accessing corporate data on a public network, security is a big concern. You never know when your confidential data may be compromised. If your company provides access to data from outside of the corporate environment, you must make sure that you take the necessary steps to ensure that data is secure.

When on a public network, any data that is sent to and from an end-user's laptop is generally visible to anyone else that is on that same public Wi-Fi network. What this means is that those traffic streams are open to what is called a man-in-the-middle attack. A man-in-the-middle attack utilizes a natural security flaw in the Address Resolution Protocol (ARP). The flaw allows an attacker to secretly respond to an ARP request of a computer initiating a connection with another node. The attacker then makes private independent connections with the two nodes. Once this is done then all traffic is relayed through the attackers computer and the end-user will be unaware that this has occurred. If this attack is done between a laptop and an internet gateway, then that attack is able to sniff every packet that the end-user sends out to the internet, including confidential corporate data.

So how do you protect your private data from attacks like these? Encryption is one of your biggest defenses. However you decide to provide access to network resources to employees on the road, whether it be via a VPN or a web portal, encryption is a must. If your company uses VPN software to provide access to the network from outside it, then once the VPN tunnel is negotiated all traffic that is passed between the laptop and the corporate network is encrypted. This means that even if the attacker were to sniff out those packets sent, they will be encrypted and the attacker will find it nearly impossible to gain access to that data without knowing the key used to encrypt it.

If your company uses a secure web portal to provide access to network resources, then there are a few things that should be known. First off, most web portals that are secured using the HTTPS protocol use certificates to authenticate the encryption process. If the attacker is using the right tools, he or she can send a spoof certificate to the end-user. If the end-user accepts this certificate, then they will be opening secure communications with the attacker. The attacker then sends the real certificate request on to the corporate web server and opens secure communication with the web server. Once this is done, then the attacker is able to see all traffic that the end-user sends before it is encrypted and sent on to the corporate web server. To prevent this, it is important that you use certificates that are generated from trusted sources such as Verisign or Geotrust. Then if the end-user receives a certificate that is from an untrusted source, the end-user will be alerted to this.

It goes without saying that any end-user that is going to be accessing corporate data from outside the internal network should be trained on basic security. With the proper security infrastructure in place and users trained, then the IT staff should be able to rest easy knowing that corporate data is safe.

Aaron Guhl is an IT professional that specializes in security. He frequently writes on his blog regarding security issues to help IT professionals get a better understanding of security in their networks. Visit his website at: Security Enabled Network

Friday, August 1, 2008

Poke the Spying Eye - Sanctions Against Spyware

Spyware is one of the biggest problems to ever infest he lives of Internet users in addition to viruses and trojans. And there have been many concerted efforts from many sectors to control and inhibit the effect of this phenomenon that violates user privacy and impairs the surfing experience of thousands of people worldwide.

In criminal law, unauthorized access to a person's computer is illegal under computer crime laws. Since many owners would justifiably claim that they never authorized the installation of spyware, a prima facie of this would suggest that the promulgation of spyware is a criminal act. Law enforcement has gone after many malware developers, especially for viruses but spyware producers are rarely prosecuted. Some lawsuits have been served though. Some US States including Iowa and Washington have passed laws rendering some forms of spyware illegal. And in 2005, United States lawmakers introduced the Internet Spyware Prevention Act, meant to imprison the creators of spyware.

Eliot Spitzer, the former New York state Attorney General and Governor has pursued spyware companies in the past for fraudulent installation of software. The California firm Intermix Media Inc. ended up settling with a payment of US$7.5 million and a promise to never spread spyware again. The hijacking of Web advertisements has also led to a litigation with a big number of web publishers suing Claria for replacing advertisements. A settlement was reached outside of court.

With all these measures in place, it's ironically still not easy to keep your computer free of spyware.

If you'd like to know more about getting rid of the threat known as spyware and other kinds of menaces in your life, be sure to visit: http://www.howtogetridofstuff.com/computer-problems/how-to-get-rid-of-spyware

Friday, July 25, 2008

Things You Should Know About Spyware

Most people who have spyware on their computers and laptops do not even realize it. The spyware lurks in the background doing it deeds within the shadows of their computer's hard drives.

Sadly, most are unaware of what spyware can do, the types of damage it can potentially cause and measures that can be taken to protect yourself from these annoying programs. This article will offer answers that will clarify what spyware is and tips you can use to protect yourself from spyware in the future.

What Exactly Is Spyware?

Spyware are computer programs that exist on your computer's hard drive. They come in a variety of types and flavors. Some spyware simply lurk in the shadows of your hard drive, watching your browser and taking notes of which websites you visit.

Often, it then communicates what it finds to other parties by using your internet access. Other spyware watch and take note of your keystrokes whenever you visit a financial services website.

Knowing as "keyloggers," this type of spyware then sends your sensitive financial information (including your username and passwords) to other parties across the internet.

How Does Spyware Get Installed?

Most often, spyware is downloaded through the internet. Sometimes, the download occurs when a user knowingly downloads another piece of software and the spyware is attached and enjoys a "free ride" on the user's hard drive. Other times, spyware can be downloaded by visiting websites.

Known as "drive by's," these downloads happen automatically without the user's permission once a user has simply visited a particular website.

Is Spyware Dangerous?

While not all spyware is necessarily dangerous, it does represent a risk because of the damage it is capable of doing. For example, the spyware that watches your keystrokes when you visit financial websites and then communicates this data to other unknown parties exposes you and your financial livelihood to risk.

These other parties can then potentially access your bank, investment and loan accounts online without your knowledge or permission, wreaking havoc. Other types of spyware can actually gain control of your computer and distribute that control to other parties. As a result, unknown parties can potentially gain access to any sensitive data on your hard drive.

How Can Your Protect Your Computer From Spyware?

The most effective way to protect you and your computer from spyware is to use a computer program that is designed specifically to identify and get rid of such bugs. Such programs include the well-regarded Spybot - Search and Destroy software. These types of programs are increasingly helpful as spyware creators become more savvy.

Some spyware tries to mask or disguise its presence on your hard drive by appearing as an anti-spyware program. That can make them difficult to identify and remove. Fortunately, dedicated programs like Spybot are constantly updated with the latest version of spyware that are being circulated. This allows it to keep up with new spyware, helping it to easily identify and remove them.

If you have never scanned your system, there is a good chance that you have a spyware program lurking on your hard drive. It could be relatively benign, content to simply exist.

Or, it could be maliciously communicating your sensitive data to outside parties. Use a dedicated spyware removal program such as Spybot - Search and Destroy to get rid of these bugs before they cause any significant damage.

Alojate.com is the premier web hosting company in Mexico, offering a range or services for all business needs.

The people of The Bored IT suffer a lot from lack of excitement because of our Dedicated Server Provider. Find out more in our site.

Thursday, July 17, 2008

Know Everything About Information Security

Information Security means to give protection to the confidential materials of any organization and to restrict the availability of all information, be it the electronic, print or other types.

Everyone will agree to the fact that information assets are critical to any business and paramount to the survival of any organization in today's global market. As there has been a rise in the cyber crimes, such as hacking, data thefts, data losses and virus attacks in the networking and software related jobs, the need of information security is growing by leaps and bounds.

Components of Information Security

Typically information security comprises of five components, such as:

1. Confidentiality

Information security ensures that information is shared only among authorized persons, within or outside the organization. Breaches of confidentiality happen due to improper handling of data through printing, copying, e-mailing or creating documents, etc.

2. Integrity

With proper information security, there is also the assurance of the information being authentic and complete. The term 'integrity' is regarded as the indicators of information security or lack of it. The integrity of data is not just restricted towards the correctness of data but it also verifies whether the data can be trusted and relied upon.

3. Availability

In information security, the person in charge of it makes sure that the systems can be accessed by authorized people whenever needed. It helps in delivering, storing and processing data in a responsible manner.

4. Accountability

Since there are different departments in an organization, confidential information needs to be protected and secured with utmost care. Most organizations build a culture of confidence in their employees, and all employees, particularly in senior and responsible positions understand that internal information and data is not to be shared or divulged to unauthorized persons. Some organizations also have specific departments where the people are entrusted with the responsibility of protecting the assets and confidential data .

5. Audit-ability

This component of information security has got two parts. Firstly, any system must be able to backtrack as that one can determine the positioning of the system during any emergency. Secondly, with auditing it becomes sure that the systems have all the necessary documented requirements.

Role of Information Security in Indian IT market

Over the past few decades, the information technology industry has placed India amongst the fastest growing IT exporters IT-Enabled Services (ITES) providers in the world.

According to a survey conducted by the National Association of Software and Services Company (NASSCOM), the Indian IT software and services sector showed a growth of 31.4 percent during 2005-06, and by 2010, it is believed that the IT and ITES sector will touch US$ 60 billion in exports. Looking at the phenomenal growth in IT jobs, the need of information security and network security experts is growing everyday in India.

According to market estimates, the IT Security market is worth $100 billion today and India itself is facing a shortage of over 1,88,000 security professionals. Recognizing the growing need for information security management, reputed IT training institutions are providing regular and distance learning courses in information security training and network security training

Mandira Kumar is working in a reputed IT firm in India. She is also an amateur writer and his write-ups mainly focus on the importance of information security training and network security training.

Saturday, July 12, 2008

Trojan Vundo Virus Warning

Trojan Vundo is a trojan that allows unwanted advertisements to be displayed on your computer. There are a few ways you can get infected with this, either by email attachment, downloading of this file that was disguised as something else you were looking for...then clicking on the program which is a .exe file. Basically, Trojan. Vundo is a component of an adware program that downloads and displays pop-up advertisements. It is known to be installed by visiting a Web site link contained in a spammed email.

The systems that are affected are Windows 2000, Windows 95, Windows 98, Windows Me, Windows NT, Windows XP.

Symptons of Trojan Vundo can be seen when you turn on Internet Explorer and begin surfing the web. You'll notice that if you have tab browsing feature installed, pop up advertisements will begin opening up new tab browsers automatically.

This program may also download potentially malicious files on to the compromised computer, such as keyloggers that record down your passwords, credit card numbers etc, which will then invite a whole new set of other problems other then adware issues.

Once Trojan Vundo is installed on your computer, you may experience warning messages from Norton or AVG telling you that this trojan is present but unable to be deleted. Doing a scan and reboot also does not help. The best way to remove trojan vundo is to use a focused trojan remover software because there are many variants to this program which allows it to be removed only by an updated database of trojan vundo signatures.

Get the best spyware & trojan remover to permanently protect your PC at http://www.spywaretrojanremover.com

Tuesday, July 1, 2008

Information Security for E-businessmen: Just a Couple of Ideas

If you constantly deal with bank or electronic accounts, it must be your worst nightmare--to wake up and learn that you are a bankrupt. Some crook stole your personal data and all the money you have been sweating blood for years has flown to somebody else's account. Almost everybody must have heard that such a tradegy is called identity theft and millions of people in the USA alone suffer the same every year. Poor consolation for its victims, isn't it?

Unfortunately, businessmen frequently are targets for identity thieves, especially online. Lots of articles on identity theft, "how-to-avoid" tips, and scary stories about the victims circulate through the Web and other media. The authors remind people again and again that they should be cautious when giving anybody their private info as well as care for their PCs' security. But in spite of all their effort identity theft is still the most rapidly growing crime.

Software developers are doing their best, too. They can't be of much help if somebody plainly looks over your shoulder and writes your credit card number down. It's for you to take care and never reveal your personal info to anybody who asks for it. What they can do is to create new solutions to the urgent problems like data stealing. Keylogging spyware--the very programs that make lots of such crime possible--are pretty much written about lately. These programs secretly monitor everything users do on their PCs.

Keyloggers are used--by themselves or as a part of a virus or a Trojan -- much more widely than PC users think; it is an open secret that the lion's share of identity theft that happens online is because of keylogging spyware. The losses caused by stealing PINs, logins, and other valuable data, are well comparable with the damage from viruses. Actually, if a virus or a Trojan contains a built-in key logger module (and it often does), the end user finds himself in a pretty tough situation. The problem is that most anti-keylogging programs warn users when it is too late. The data have already been captured and
sent. Why does it happen?

Almost all anti-spy software existing at the present moment works using the same scheme: spy program is detected and then blocked or eliminated. Detecting viruses or spy software is the crucial step of the whole process--all the protection depends on whether the anti-spy software is able to detect as many spies as possible. Signature bases which all these products depend on, is actually the "list" of signatures – small pieces of spy programs' codes. Anti-virus or anti-spy program actually scans the system and compares its codes with those in signature bases. So, in this case only the spies whose signatures already are in the base will be detected and eventually "caught". As long as anti-spy software is regularly updated and the system doesn't come across some unknown spyware product, everything is all right.

The problem is that lots of programs which could be used for stealing data are not included into signature bases right now. Some of them will never be.

There is good deal of people capable of creating something brand-new spy, unknown to anti-spyware developers. The period of time when a new spy already exists, but the updates have not been released yet, is the very time when hackers make their biggest profits.

Spy programs can be created for the specific purpose, such as industrial espionage, so they will never be represented in the base. Moreover, some monitoring programs can be used as spy programs as well, though they are not always included into signature bases. As we can see, a signature base is the weak spot of anti-spy protection; it is, so to speak, a joint in the armor. Information thieves also know about it.

Fortunately, software developers are constantly looking for new solutions. One of the new trends in anti-spyware developing is not to use signature bases as means of detecting spyware. There is three basic advantages in such an approach. First, the product gets rid of its the least reliable part; second, there is no so urgent need for updates anymore; and last, but certainly not least-–the product becomes capable of blocking the destructive activity of even unknown spyware. To read more about this new approach follow the link in the signature.

When products of such a kind become widespread, there would be much more problems for hackers in future. However, there is no guarantee that no innovative spy software appears in response.

Whether we like it or not, all malware "evolves" very quickly; new schemes are being developed, and new software which online criminals create and utilize becomes more and more malicious and "selective". New keyloggers as well as keylogger-containing viruses and Trojans, appear all the time; the losses these programs may cause to a business are enormous. That is why in some businesses there is an acute need for separate anti-keylogging protection.

Alexandra Gamanenko currently works at the Raytown Corporation, LLC -- an innovative software developing company company. visit its website at http://www.anti-keyloggers.com

Tuesday, June 17, 2008

Protecting the Privacy of Data During Computer Recycling

Save precious data before equipment is recycled

It's important to save the precious data stored on computer hard drives before the equipment is recycled. Data should be completely removed from the hard drives before the equipment is sold or recycled.

All drives should be formatted (erased) in order to remove any data. All computers contain valuable private and financial data. Should this data fall into the wrong hands, it can have disastrous consequences for the owner. Identity theft is growing and to protect yourself, you should erase any data before giving the computer away or sending it to the recycler.

Methods to destroy data effectively

Wipe off any media before it's given away. One of the ways is to physically destroy the drive. This includes all the disk drives, zip drives, tapes etc and all other storage media. Physical destruction destroys the storage media and the data along with it. This means that the storage devices can't be exploited for unauthorized future use.

The second method is known as degaussing. This is where a magnetic device is used for removing the data from the hard disks. This method isn't 100% foolproof and sometimes the data (or some parts of the data) might not be removed or destroyed.

With recovery software readily available on the market, malicious people may recover parts of your data if it is not removed. This can be very damaging to the previous owner of the storage devices and the computers.

The third method is overwriting the data. There are many programs that can help to overwrite the data. Programs are readily available online. However, for the highest level of data security, ensure that you choose from a program that meets or exceeds the US Department of Defense standards for data destruction.

Obtain certifications from companies that recycle computers and electronic equipment

When approaching a recycler, ask about their policies about computer recycling and especially about their computer privacy program. The recycler should be able to provide written certification that the data on the storage media has been destroyed.

A certification detailing the removal method should also be provided. This ensures that your data has been protected. Computer owners should also take many precautions before they hand over the computer for recycling. The storage media should be completely overwritten to ensure that the data cannot be recovered.

Recyclers should be able to provide conclusive certification that all data was destroyed during computer recycling. When approaching an agency, there are a few questions that should be asked:

• The first question asked should pertain to the management policies that the recycling company adheres to. They should be able to provide conclusive evidence that their facility takes every-possible step to destroy any data remaining on computer storage media.

• Ask the recycler about the environmental management certification that his company has in place. There are various certification programs such as ISO 14001 Environmental management certification and certification by organizations such as International Association of Electronics Recyclers (IAER) or the Institute of Scrap Recycling Industries (ISRI).

• If the recycler isn't certified, then it's important to ask whether they follow any recognized environmental management guidelines such as the EPA's Plug-in to E-Cycling Guidelines.
Conclusion

Thee questions above should give you insight into the operations of any company that does computer recycling.

Saman Rashid is an experienced writer.She has been writing articles and web copies since 3 years.To contact her, kindly visit http://www.mscopywriters.com

Wednesday, June 11, 2008

Gone Phishing

If you have used email in the last few years you have without a doubt seen phishing attempts first hand. Maybe it was an email that appeared to be from PayPal asking you to confirm some information about your account to prevent immediate suspension. Or perhaps it was one of the infamous Fifth Third Bank emails asking you to confirm your account. Either way, I am sure you have seen your fair share of similar messages, I know I have.

In the last year the number of phishing sites plaguing our Internet has increased over 700 percent, now over 37,000 sites. Garner estimates over over 2.8 billion dollars lost to phishing attacks in 2006 alone. 3.5 million Americans lost an average of $800 last year in phishing scams.

Blacklisting is the most common defense against phishing threats. The practice of making a list of known phishing sites and blocking them by brute force. Although this strategy is very effective against known and documented phishing sites, it quickly becomes inadequate against the speed in which new phishing sites emerge.

The most effective defense against phishing scam has been around for many years. Avoid clicking links inside email, and when you do click a link inside an email, always try to hover the mouse over the link for a few moments until the hover tool tip shows up with the real link (if your mail client supports this). When surfing the web, use a strong anti-virus like Kaspersky and a good tool such as Site Advisor from McAfee. Although Kaspersky Anti-Virus is not free, McAfee Site Advisor is. Together they are a very effective defense against the ever increasing phishing threat. As always, try to type the website address you want to go to in the address bar directly instead of using links in your email.

Get a free copy of Kaspersky Internet Security

Christopher is an Information Security Consultant for Lexan Systems L.L.C. and founder of MX Police - Spam Blocker service. You are welcome to reproduce this article on Computer Security related web site, as long as you reproduce the article in full, including this resource box and links to our websites.

Thursday, May 29, 2008

The Absolute Top 10 Security Tips You Need to Know

Just a few simple things can keep all of that sensitive personal information on your laptop away from the prying eyes of others. It really does not take a lot of time or effort and failure to do so is just asking for trouble. Hoping that no one will ever try to access your data will not work, but with some security measures which can be implemented in a matter of minutes you can be far more secure.

1) Your first step should be to set up a firewall. Especially if you use your laptop on the road, doubly so in public WiFi hot spots, you need a firewall installed and running. These access points are not secure, so everyone has to take action to protect themselves.

2) Very important is to disable Ad-hoc mode on your Wi-Fi card. You should use only connections which you have set up using your own, or XP's built in tools. An instant network you've never heard of may very well be bad news. Definitely disable Ad-hoc mode before entering a hot spot, there may be networks present, most of which you do not want to access and you most certainly do not want accessing your computer.

3) Disabling all file and printer sharing when you are not in the home or office is an important security measure. You should get into this habit; otherwise when you're connected in a hot spot, you are leaving your laptop open to all users in the area. It only takes a few seconds to turn off file and printer sharing - you can turn it back on when you need it and this step will keep a lot of potential trouble from ever happening.

4) You can further protect personal information my making the folders which contain them private. This also takes only a moment and gives you an extra layer of security. Your information is still there of course, but is now far more difficult for others to look at.

5) Password protection is another good idea. You can even password protect individual files. There's plenty of software available which can take care of this task. The password can be the same for each file you want to password protect, or each can have a unique password. Again, this is a good security measure to undertake before connecting in a hot spot.

6) You should also take steps to ensure the security of your laptop at home. This entails a security cable to lock your laptop down to a strong, stable surface. Lock up your laptop whenever you are not using it - this will make it quite difficult for anyone to steal it, even if your home is burglarized.

7) Some newer laptops have hardware-level security measures built in, such as encryption. Your data becomes almost impossible for others to gain access to - all of your files are protected by a layer of encryption before any hacker can even get to the operating system. Laptops with this level of security include the newer models of ThinkPad and the Toshiba Protégé. These models also have fingerprint readers, which are stronger than passwords; of course, no one ever forgets their fingerprints.

8) Disable the Guest Account on your system. Windows 2000 and later systems disable this by default, but it is always a good idea to make sure that this account is indeed disabled. You can further protect yourself by assigning a password to this account and restrict it from logging on.

9) Rename your Administrator account. Now this will not necessarily stop a hacker, but will add an extra step. Some hackers may simply move on to an easier target. Don't rename the account to anything with "Admin" in the name, this is far too obvious. Choose a name that sounds less important.

10) You can also create a dummy Administrator account on your system. Give this account a difficult password and give that account no login privileges or access to anything. Enable auditing if you do this so that you can know if and when anyone tries to hack this account.

Bonus) Configure your computer's Crtl+Alt+Del behavior to prevent displaying the username of the last login. This will make things easier for hackers; they have an easier time with any password guessing attack this way.

Bonus) If you have an Infrared Port on your laptop, disable it. It is extremely likely that you need or even use this feature on your computer, but it can be used to access your files by other computers nearby. You can disable this port via the BIOS settings, or failing that, cover it up with a piece of electrical tape.

Bonus) If you are running Windows NT or later (2000, XP), use the far more secure NTFS file system instead of the older FAT32 file system. FAT file systems don't support file-level security, which is like putting out a welcome mat for hackers.

Making certain that your laptop is protected is critical; the reality is that important personal information can be stolen from any computer without precautions. Stealing the information from a laptop is much easier since the computer is moving around and can quickly create a huge disaster.

Best Rated Laptops Security Guide

Laptop security, everything you need to know to protect your property, personal data and identity.

http://www.best-rated-laptops-guide.com/laptop_security.html

Friday, May 23, 2008

Computer Security - How You Can Improve Yours

The objective behind the concept of computer security actually varies quite a bit depending on the use of the computer. Computer security may include the protection of specific information from corruption or theft, for example. In general this can impose specific requirements on computers in addition to most standard system requirements. There are a number of different typical approaches that can be taken when it comes to improving computer security, including the following:

- Physically limiting the access to a computer so that computer security will not be compromised by those who are granted access to use it.

- Utilizing hardware mechanisms that can create and impose rules for specific computer programs, allowing computer security to be imposed without requiring individual programs to implement it.

- Implementing operating system or OS mechanisms that are capable of creating and imposing rules that avoid having to trust programs on the computer.

- Implementing programming strategies that allow subversion to be resisted and make computer programs more dependable.

In most cases, the security devices that are put into place are dependent upon the application uses the computer is created for. Different computer systems require different levels of security, as the level of privacy or protection needed is going to vary significantly. Computer systems under government control, for example, require a much higher level of security than computers used by students in a university setting. The level of required computer security, then, along with what forms of security are implemented, are going to vary significantly as well.

Implementing it may include creating or utilizing secure operating systems, though much of the science associated with this form of security was developed several decades ago. Security architecture is another option, and involves describing how specific security countermeasures and controls are positioned to protect the information technology. Firewalls are an example of security meant to protect computers from threats that travel via the internet or peer to peer connections. Chain of trust techniques are techniques that are used to ensure that all software on a computer is certified as authentic directly from the designers of the system. Access control is used to ensure the separation of privileges, ensuring that only specified people have the right capabilities on a computer system.

There are also cryptographic techniques which transform information into something that is meant to be indecipherable by anyone but approved persons. Information can also be secured for computer security purposes using backup files which allow important files to be protected by creating copies should they ever become corrupted or destroyed.

Essentially, the primary focus of the computer security field of information technology is to protect the integrity of computers, the data contained within them, and any information that may require restricted access. Some level of computer security is needed by anyone who owns a computer, including student computers in a university setting, computers owned and operated by the government, and even the laptop that you use to check your e-mail at night.

Craig Thornburrow is an acknowledged expert in his field. You can get more free advice on a computer security system and computer security product at http://www.computersecurityclinic.com

Wednesday, May 14, 2008

Haunting Computer Viruses!

There are times these viruses pitch up in the middle of the night just like an old Hitchcock movie when you are doing an all nighter with a deadline for the next day. The mouse pointer on the screen starts to move - you look down and your physical mouse hasn't moved, you put it down to tiredness and wondering if the coffee has now got you on a buzz . There it is again the mouse pointer suddenly moves again. You start to look around and wonder what could be causing this... Your hair on the back of your neck starts to stand up straight and you shiver and there it is again, this time the mouse just goes bizerk!.... Then suddenly the whole computer dies just before your eyes, leaving you in this rather under light room. You are still standing there in shock when the computer lights up with a black screen with the words "your operating system cannot be found!"

Well sooner or later Hitchcock will solve the mystery of the lost operating system... and poor man who is dead in the water with his boss for not completing the project at hand.

This is the case of the computer virus someone has just found - viruses are little programs written by programmers which are malicious hence the word virus. There are programmers who test each others skills and see how many computers they can infect over a 24 hours period. However, I have since heard they are writing virus programs to see how long they can go undetected and basically get under the radar of an anti-virus program... Anti-Virus companies have to work even harder than these malicious programmers to pull off this game of chess to see who wins. This is why it is so important to keep your computers completely updated... as the companies who run anti-virus software are going to work at winning this game as soon as possible as their reputation is at stake. Their job is to deliver and find a way to counter act these malicious viruses.

There are other programmers who target large corporations like Microsoft - someone who just hate something about the company and anything to do with it. In some cases a disgruntled employee.

This is an ongoing affair with programmers who love to out wit each other in their challenge to see who is the best. Unfortunately it is the public that suffers the chance of loosing their jobs in a crucial project, because of a boss who is unwilling to listen. Many of us have to suffer the inconvenience of work lost, time lost, and money spent to repair the damage. My husband is a computer engineer constantly having to repair this sort of damage on a regular basis. It is both costly and time consuming if you want your data back and in some cases if you are lucky enough to get it back.

Only you can stop yourself from being the Man dead in the water with a boss ready to fire you or a company in a boat without a paddle - keep your computers updated and find an Anti-Virus program that helps you ahead of the crowd!

Graduated as a Graphic Artist who worked in many different industries such as advertizing, travel and computers. After many years in the corporate world, she decided to start her own company working as an independent online marketer.

http://vicshe.bezoogle.com/pp/anti-virus/

Thursday, May 8, 2008

PC Security DIY Part I - Malware - The Most Wanted Cyber Criminal

Before we start, I would like to explain a couple of terms to users not familiar with DDoS attacks and botnets. A botnet is a network of software robots controlled remotely by crackers. A software robot in this specific case is a compromised computer (also called a "zombie computer"), infected with specific malware types like Trojan horses and worms. In other words, a botnet is a collection of compromised or "zombie" computers. I am not going into the details of a DDoS attack, but it is basically when a botnet sends thousands, even millions, of communication requests to a web server. This results in a bottleneck of incoming traffic, causing the server to crash, or making it so slow that it cannot serve the website to normal visitors anymore. An attack from a big botnet will therefore have a much larger impact on a web server than an attack from a smaller one. Okay, now that we have the jargon out of the way, lets delve deeper into the impact of malware infections on the Internet as a whole, but also for the individual Internet user.

The Internet is often referred to as the information superhighway. Off course the Internet as we know it today, is much more than just an information superhighway, the Internet has become a digital world where many offline tasks can be done online as well. You can work, play, recruit, date, shop, chat, watch TV, listen radio and do many other things online. But for the sake of this article I will stick to the term information superhighway, because the rules of the road is perfect for what I want to illustrate. According to Wikipedia, it is estimated that up to one quarter of all personal computers connected to the Internet, are part of a botnet. This estimate is not that hard to believe, I will even go so far to say that this figure may even be bigger than a quarter of the Internet's population, especially if you take into account the rate at which malware infections spread through the Internet. Ignorance plays a big role in malware infections, but don't leave negligence out of the equation. If it only stopped at ignorance and negligence, large and influential companies are able to address the problem, but they are unwilling to sacrifice profit for the safety of other Internet users.

Internet Service Providers are in pole position to address the increasing threat of malware infections, the one thing that's making botnets grow larger and larger by the day. Unfortunately they are only interested in making money instead of providing a safe and quality service to their loyal and honest customers. No they would rather keep the clients distributing malware, sending out spam or taking part in Denial of Service attacks, because it means loss of revenue for them if they decide to suspend the services or terminate the accounts of these clients. Most ISPs will state in their Terms of Service that they do not tolerate this kind of behaviour, but it is only done to make them look great on paper, they seldom enforce these terms. John Masters, anti-spam activist and a dedicated supporter of Cyber Top Cops, sent me an e-mail the other day, suggesting that we should roll out penalties against people who use unprotected computers connected to the Internet. Although I realise the difficulty of getting something like this into place, I personally think it is a great idea and I wholeheartedly agree, but before we start to punish the user, start with the ISP for not taking action against the user.

It makes a lot of sense to fine people who use unprotected computers on the Internet. This is why I referred to the information superhighway earlier in this article. The Internet can be compared to a real highway, where several road safety rules apply. Driving on a highway with a vehicle that's not roadworthy does not only put your own safety at risk, but also the safety of other road users. If a traffic officer pulls you off the road and find that your vehicle is not roadworthy, you will most probably receive a fine (unless you bribe the traffic officer). If you continue to drive like this you may end up with a suspended driver's licence. The same principle applies to computer security. If you use an unprotected computer on the Internet you're not only putting your own safety at risk, but the safety of other Internet users as well. If your ISP becomes aware of the fact that you're connecting to the Internet without appropriate, up to date anti-malware software installed on your computer, you are supposed to be fined for putting the safety of all other Internet users at risk. They should suspend your services if you continue to connect to the Internet with an unprotected computer.

Your computer may be distributing malware, spam, phishing e-mails or advance fee fraud scams. It may even be used in Denial of Service attacks. So you end up becoming an accomplice in Internet crime. You unknowingly become a spammer, a scammer or a malware distributor. By using an unprotected computer you contribute to cyber crime instead of fighting it. That's not all, the malware may be monitoring your keystrokes, capturing everything you type, stealing passwords, e-mail addresses, account numbers, social security numbers, credit card numbers, names, telephone numbers, physical addresses... can you see where I'm going with this? These programs are able to compile a complete profile about yourself, this information is then transmitted back to the operator of the malware, who may use it to commit fraud in your name, in other words steal your identity. The perpetrator may even clean out your bank account, open credit cards or take out loans in your name and guess who is going to receive the bills at the end of the month, you!

What are the practical implications of implementing a penalty system for reckless Internet users? First of all, the ISP needs to have solid evidence, proving that the guilty party was really using an unprotected computer. Secondly, if the user had anti-malware software installed on his/her computer, they need to prove that the software was outdated. Finally, if the user had up to date anti-malware software installed, they need to prove that the software was not appropriate for preventing malware infections. This means that anti-malware software needs to comply with certain safety standards before they can be accepted as approved anti-malware solutions. This will effectively force all anti-malware developers to put their software through specific tests, conducted by a computer security standards authority. It will also cause anti-malware application prices to rise, which may pull the plug on the development of free anti-malware solutions, unless the developers certify these free applications as well. ISPs should use special software to check whether these approved anti-malware applications are installed on the client's computer. The software should send out several warnings to the clients who do not comply with these standards, giving them a reasonable amount of time to attend to the problems and providing detailed instructions on how to resolve them. Access to the Internet should only be terminated if the user fails to respond to these warnings.

Many people might ask, how should I update my anti-malware application if my Internet access is terminated? Access should only be terminated if you fail to respond to the warning notifications sent to you. If you end up with a terminated account, it means you ignored the notifications and you should have thought about the implications of your actions before you decided to ignore them. Others may claim that they are computer illiterate and cannot install software or keep them up to date. Most anti-malware applications update themselves and it does not take a rocket scientist to install them. With most of these installations you simply need to click on the "Next" button until you see a "Finish" button. If you can surf the Internet, then I'm sure you know how to click a button. I understand that not every Internet user is a computer expert, so if you find it difficult to install software, join an online forum like BleepingComputer.com, GeeksToGo.com or TechGuy.org and ask for assistance. It is extremely important to secure your computer before it gets infected with malware.

I just painted a pretty grim picture, didn't I? The burden placed on Internet Service Providers to check up on clients, to prove that clients are using unprotected computers, to penalise those who disobey the rules and to close down the accounts of regular offenders. Then there is the problem of high anti-malware prices and no more free anti-malware solutions for the people who cannot afford expensive anti-malware protection. But this is where the Internet is heading if we do not take action now. Online fraud is causing consumers to loose confidence in Internet shopping. Phishing scams are making users afraid of signing up for Internet banking services. People are weary of online payment and trading services like PayPal and eBay, no matter how safe they claim to be. Spammers are stealing bandwidth and the Internet user have to cough up for the costs. Expensive hardware and software is needed to fend off Denial of Service attacks. Malware is at the root of all these problems. It is the biggest contributor to cyber crime and eliminating malware is like removing a species from the food chain. This will be a big blow to spam and bot networks, resulting in less spam and phishing scams, fewer DDoS attacks and fewer stolen identities, passwords and credit card numbers. All the money saved through proper prevention of malware and malware related problems, can be utilised to build better anti-malware protection and assist companies to continue the development of free anti-malware solutions for home users.

So what is the bottom line? Internet Service Providers need to take responsibility for their networks. Customers are paying for Internet access, free from spam and malware attacks. It is the responsibility of the service provider to keep spam and malware infections within acceptable limits. Proper legislation needs to be put into place and governments need to take action against service providers if they allow these threats to rise beyond acceptable limits. How can they keep these threats within acceptable limits? Listen to the complaints sent through to your abuse departments, stop ignoring them, terminate the services of regular offenders and publish these actions for everyone to see. Make examples of those who do not want to listen and soon enough you will have people sticking to the rules. People will continue to do what they want if they know there is no punishment for their wrongdoing.

About the Author
Coenraad is webmaster and founder of Cyber Top Cops, providers of free malware removal assistance and helpful Internet security tips for the novice user. In the next installment of the PC Security DIY article series, we will look at the foundation of Internet Security, using a secure browser and e-mail client and getting into safe browsing and e-mail reading habits.