Thursday, May 29, 2008

The Absolute Top 10 Security Tips You Need to Know

Just a few simple things can keep all of that sensitive personal information on your laptop away from the prying eyes of others. It really does not take a lot of time or effort and failure to do so is just asking for trouble. Hoping that no one will ever try to access your data will not work, but with some security measures which can be implemented in a matter of minutes you can be far more secure.

1) Your first step should be to set up a firewall. Especially if you use your laptop on the road, doubly so in public WiFi hot spots, you need a firewall installed and running. These access points are not secure, so everyone has to take action to protect themselves.

2) Very important is to disable Ad-hoc mode on your Wi-Fi card. You should use only connections which you have set up using your own, or XP's built in tools. An instant network you've never heard of may very well be bad news. Definitely disable Ad-hoc mode before entering a hot spot, there may be networks present, most of which you do not want to access and you most certainly do not want accessing your computer.

3) Disabling all file and printer sharing when you are not in the home or office is an important security measure. You should get into this habit; otherwise when you're connected in a hot spot, you are leaving your laptop open to all users in the area. It only takes a few seconds to turn off file and printer sharing - you can turn it back on when you need it and this step will keep a lot of potential trouble from ever happening.

4) You can further protect personal information my making the folders which contain them private. This also takes only a moment and gives you an extra layer of security. Your information is still there of course, but is now far more difficult for others to look at.

5) Password protection is another good idea. You can even password protect individual files. There's plenty of software available which can take care of this task. The password can be the same for each file you want to password protect, or each can have a unique password. Again, this is a good security measure to undertake before connecting in a hot spot.

6) You should also take steps to ensure the security of your laptop at home. This entails a security cable to lock your laptop down to a strong, stable surface. Lock up your laptop whenever you are not using it - this will make it quite difficult for anyone to steal it, even if your home is burglarized.

7) Some newer laptops have hardware-level security measures built in, such as encryption. Your data becomes almost impossible for others to gain access to - all of your files are protected by a layer of encryption before any hacker can even get to the operating system. Laptops with this level of security include the newer models of ThinkPad and the Toshiba Protégé. These models also have fingerprint readers, which are stronger than passwords; of course, no one ever forgets their fingerprints.

8) Disable the Guest Account on your system. Windows 2000 and later systems disable this by default, but it is always a good idea to make sure that this account is indeed disabled. You can further protect yourself by assigning a password to this account and restrict it from logging on.

9) Rename your Administrator account. Now this will not necessarily stop a hacker, but will add an extra step. Some hackers may simply move on to an easier target. Don't rename the account to anything with "Admin" in the name, this is far too obvious. Choose a name that sounds less important.

10) You can also create a dummy Administrator account on your system. Give this account a difficult password and give that account no login privileges or access to anything. Enable auditing if you do this so that you can know if and when anyone tries to hack this account.

Bonus) Configure your computer's Crtl+Alt+Del behavior to prevent displaying the username of the last login. This will make things easier for hackers; they have an easier time with any password guessing attack this way.

Bonus) If you have an Infrared Port on your laptop, disable it. It is extremely likely that you need or even use this feature on your computer, but it can be used to access your files by other computers nearby. You can disable this port via the BIOS settings, or failing that, cover it up with a piece of electrical tape.

Bonus) If you are running Windows NT or later (2000, XP), use the far more secure NTFS file system instead of the older FAT32 file system. FAT file systems don't support file-level security, which is like putting out a welcome mat for hackers.

Making certain that your laptop is protected is critical; the reality is that important personal information can be stolen from any computer without precautions. Stealing the information from a laptop is much easier since the computer is moving around and can quickly create a huge disaster.

Best Rated Laptops Security Guide

Laptop security, everything you need to know to protect your property, personal data and identity.

http://www.best-rated-laptops-guide.com/laptop_security.html

Friday, May 23, 2008

Computer Security - How You Can Improve Yours

The objective behind the concept of computer security actually varies quite a bit depending on the use of the computer. Computer security may include the protection of specific information from corruption or theft, for example. In general this can impose specific requirements on computers in addition to most standard system requirements. There are a number of different typical approaches that can be taken when it comes to improving computer security, including the following:

- Physically limiting the access to a computer so that computer security will not be compromised by those who are granted access to use it.

- Utilizing hardware mechanisms that can create and impose rules for specific computer programs, allowing computer security to be imposed without requiring individual programs to implement it.

- Implementing operating system or OS mechanisms that are capable of creating and imposing rules that avoid having to trust programs on the computer.

- Implementing programming strategies that allow subversion to be resisted and make computer programs more dependable.

In most cases, the security devices that are put into place are dependent upon the application uses the computer is created for. Different computer systems require different levels of security, as the level of privacy or protection needed is going to vary significantly. Computer systems under government control, for example, require a much higher level of security than computers used by students in a university setting. The level of required computer security, then, along with what forms of security are implemented, are going to vary significantly as well.

Implementing it may include creating or utilizing secure operating systems, though much of the science associated with this form of security was developed several decades ago. Security architecture is another option, and involves describing how specific security countermeasures and controls are positioned to protect the information technology. Firewalls are an example of security meant to protect computers from threats that travel via the internet or peer to peer connections. Chain of trust techniques are techniques that are used to ensure that all software on a computer is certified as authentic directly from the designers of the system. Access control is used to ensure the separation of privileges, ensuring that only specified people have the right capabilities on a computer system.

There are also cryptographic techniques which transform information into something that is meant to be indecipherable by anyone but approved persons. Information can also be secured for computer security purposes using backup files which allow important files to be protected by creating copies should they ever become corrupted or destroyed.

Essentially, the primary focus of the computer security field of information technology is to protect the integrity of computers, the data contained within them, and any information that may require restricted access. Some level of computer security is needed by anyone who owns a computer, including student computers in a university setting, computers owned and operated by the government, and even the laptop that you use to check your e-mail at night.

Craig Thornburrow is an acknowledged expert in his field. You can get more free advice on a computer security system and computer security product at http://www.computersecurityclinic.com

Wednesday, May 14, 2008

Haunting Computer Viruses!

There are times these viruses pitch up in the middle of the night just like an old Hitchcock movie when you are doing an all nighter with a deadline for the next day. The mouse pointer on the screen starts to move - you look down and your physical mouse hasn't moved, you put it down to tiredness and wondering if the coffee has now got you on a buzz . There it is again the mouse pointer suddenly moves again. You start to look around and wonder what could be causing this... Your hair on the back of your neck starts to stand up straight and you shiver and there it is again, this time the mouse just goes bizerk!.... Then suddenly the whole computer dies just before your eyes, leaving you in this rather under light room. You are still standing there in shock when the computer lights up with a black screen with the words "your operating system cannot be found!"

Well sooner or later Hitchcock will solve the mystery of the lost operating system... and poor man who is dead in the water with his boss for not completing the project at hand.

This is the case of the computer virus someone has just found - viruses are little programs written by programmers which are malicious hence the word virus. There are programmers who test each others skills and see how many computers they can infect over a 24 hours period. However, I have since heard they are writing virus programs to see how long they can go undetected and basically get under the radar of an anti-virus program... Anti-Virus companies have to work even harder than these malicious programmers to pull off this game of chess to see who wins. This is why it is so important to keep your computers completely updated... as the companies who run anti-virus software are going to work at winning this game as soon as possible as their reputation is at stake. Their job is to deliver and find a way to counter act these malicious viruses.

There are other programmers who target large corporations like Microsoft - someone who just hate something about the company and anything to do with it. In some cases a disgruntled employee.

This is an ongoing affair with programmers who love to out wit each other in their challenge to see who is the best. Unfortunately it is the public that suffers the chance of loosing their jobs in a crucial project, because of a boss who is unwilling to listen. Many of us have to suffer the inconvenience of work lost, time lost, and money spent to repair the damage. My husband is a computer engineer constantly having to repair this sort of damage on a regular basis. It is both costly and time consuming if you want your data back and in some cases if you are lucky enough to get it back.

Only you can stop yourself from being the Man dead in the water with a boss ready to fire you or a company in a boat without a paddle - keep your computers updated and find an Anti-Virus program that helps you ahead of the crowd!

Graduated as a Graphic Artist who worked in many different industries such as advertizing, travel and computers. After many years in the corporate world, she decided to start her own company working as an independent online marketer.

http://vicshe.bezoogle.com/pp/anti-virus/

Thursday, May 8, 2008

PC Security DIY Part I - Malware - The Most Wanted Cyber Criminal

Before we start, I would like to explain a couple of terms to users not familiar with DDoS attacks and botnets. A botnet is a network of software robots controlled remotely by crackers. A software robot in this specific case is a compromised computer (also called a "zombie computer"), infected with specific malware types like Trojan horses and worms. In other words, a botnet is a collection of compromised or "zombie" computers. I am not going into the details of a DDoS attack, but it is basically when a botnet sends thousands, even millions, of communication requests to a web server. This results in a bottleneck of incoming traffic, causing the server to crash, or making it so slow that it cannot serve the website to normal visitors anymore. An attack from a big botnet will therefore have a much larger impact on a web server than an attack from a smaller one. Okay, now that we have the jargon out of the way, lets delve deeper into the impact of malware infections on the Internet as a whole, but also for the individual Internet user.

The Internet is often referred to as the information superhighway. Off course the Internet as we know it today, is much more than just an information superhighway, the Internet has become a digital world where many offline tasks can be done online as well. You can work, play, recruit, date, shop, chat, watch TV, listen radio and do many other things online. But for the sake of this article I will stick to the term information superhighway, because the rules of the road is perfect for what I want to illustrate. According to Wikipedia, it is estimated that up to one quarter of all personal computers connected to the Internet, are part of a botnet. This estimate is not that hard to believe, I will even go so far to say that this figure may even be bigger than a quarter of the Internet's population, especially if you take into account the rate at which malware infections spread through the Internet. Ignorance plays a big role in malware infections, but don't leave negligence out of the equation. If it only stopped at ignorance and negligence, large and influential companies are able to address the problem, but they are unwilling to sacrifice profit for the safety of other Internet users.

Internet Service Providers are in pole position to address the increasing threat of malware infections, the one thing that's making botnets grow larger and larger by the day. Unfortunately they are only interested in making money instead of providing a safe and quality service to their loyal and honest customers. No they would rather keep the clients distributing malware, sending out spam or taking part in Denial of Service attacks, because it means loss of revenue for them if they decide to suspend the services or terminate the accounts of these clients. Most ISPs will state in their Terms of Service that they do not tolerate this kind of behaviour, but it is only done to make them look great on paper, they seldom enforce these terms. John Masters, anti-spam activist and a dedicated supporter of Cyber Top Cops, sent me an e-mail the other day, suggesting that we should roll out penalties against people who use unprotected computers connected to the Internet. Although I realise the difficulty of getting something like this into place, I personally think it is a great idea and I wholeheartedly agree, but before we start to punish the user, start with the ISP for not taking action against the user.

It makes a lot of sense to fine people who use unprotected computers on the Internet. This is why I referred to the information superhighway earlier in this article. The Internet can be compared to a real highway, where several road safety rules apply. Driving on a highway with a vehicle that's not roadworthy does not only put your own safety at risk, but also the safety of other road users. If a traffic officer pulls you off the road and find that your vehicle is not roadworthy, you will most probably receive a fine (unless you bribe the traffic officer). If you continue to drive like this you may end up with a suspended driver's licence. The same principle applies to computer security. If you use an unprotected computer on the Internet you're not only putting your own safety at risk, but the safety of other Internet users as well. If your ISP becomes aware of the fact that you're connecting to the Internet without appropriate, up to date anti-malware software installed on your computer, you are supposed to be fined for putting the safety of all other Internet users at risk. They should suspend your services if you continue to connect to the Internet with an unprotected computer.

Your computer may be distributing malware, spam, phishing e-mails or advance fee fraud scams. It may even be used in Denial of Service attacks. So you end up becoming an accomplice in Internet crime. You unknowingly become a spammer, a scammer or a malware distributor. By using an unprotected computer you contribute to cyber crime instead of fighting it. That's not all, the malware may be monitoring your keystrokes, capturing everything you type, stealing passwords, e-mail addresses, account numbers, social security numbers, credit card numbers, names, telephone numbers, physical addresses... can you see where I'm going with this? These programs are able to compile a complete profile about yourself, this information is then transmitted back to the operator of the malware, who may use it to commit fraud in your name, in other words steal your identity. The perpetrator may even clean out your bank account, open credit cards or take out loans in your name and guess who is going to receive the bills at the end of the month, you!

What are the practical implications of implementing a penalty system for reckless Internet users? First of all, the ISP needs to have solid evidence, proving that the guilty party was really using an unprotected computer. Secondly, if the user had anti-malware software installed on his/her computer, they need to prove that the software was outdated. Finally, if the user had up to date anti-malware software installed, they need to prove that the software was not appropriate for preventing malware infections. This means that anti-malware software needs to comply with certain safety standards before they can be accepted as approved anti-malware solutions. This will effectively force all anti-malware developers to put their software through specific tests, conducted by a computer security standards authority. It will also cause anti-malware application prices to rise, which may pull the plug on the development of free anti-malware solutions, unless the developers certify these free applications as well. ISPs should use special software to check whether these approved anti-malware applications are installed on the client's computer. The software should send out several warnings to the clients who do not comply with these standards, giving them a reasonable amount of time to attend to the problems and providing detailed instructions on how to resolve them. Access to the Internet should only be terminated if the user fails to respond to these warnings.

Many people might ask, how should I update my anti-malware application if my Internet access is terminated? Access should only be terminated if you fail to respond to the warning notifications sent to you. If you end up with a terminated account, it means you ignored the notifications and you should have thought about the implications of your actions before you decided to ignore them. Others may claim that they are computer illiterate and cannot install software or keep them up to date. Most anti-malware applications update themselves and it does not take a rocket scientist to install them. With most of these installations you simply need to click on the "Next" button until you see a "Finish" button. If you can surf the Internet, then I'm sure you know how to click a button. I understand that not every Internet user is a computer expert, so if you find it difficult to install software, join an online forum like BleepingComputer.com, GeeksToGo.com or TechGuy.org and ask for assistance. It is extremely important to secure your computer before it gets infected with malware.

I just painted a pretty grim picture, didn't I? The burden placed on Internet Service Providers to check up on clients, to prove that clients are using unprotected computers, to penalise those who disobey the rules and to close down the accounts of regular offenders. Then there is the problem of high anti-malware prices and no more free anti-malware solutions for the people who cannot afford expensive anti-malware protection. But this is where the Internet is heading if we do not take action now. Online fraud is causing consumers to loose confidence in Internet shopping. Phishing scams are making users afraid of signing up for Internet banking services. People are weary of online payment and trading services like PayPal and eBay, no matter how safe they claim to be. Spammers are stealing bandwidth and the Internet user have to cough up for the costs. Expensive hardware and software is needed to fend off Denial of Service attacks. Malware is at the root of all these problems. It is the biggest contributor to cyber crime and eliminating malware is like removing a species from the food chain. This will be a big blow to spam and bot networks, resulting in less spam and phishing scams, fewer DDoS attacks and fewer stolen identities, passwords and credit card numbers. All the money saved through proper prevention of malware and malware related problems, can be utilised to build better anti-malware protection and assist companies to continue the development of free anti-malware solutions for home users.

So what is the bottom line? Internet Service Providers need to take responsibility for their networks. Customers are paying for Internet access, free from spam and malware attacks. It is the responsibility of the service provider to keep spam and malware infections within acceptable limits. Proper legislation needs to be put into place and governments need to take action against service providers if they allow these threats to rise beyond acceptable limits. How can they keep these threats within acceptable limits? Listen to the complaints sent through to your abuse departments, stop ignoring them, terminate the services of regular offenders and publish these actions for everyone to see. Make examples of those who do not want to listen and soon enough you will have people sticking to the rules. People will continue to do what they want if they know there is no punishment for their wrongdoing.

About the Author
Coenraad is webmaster and founder of Cyber Top Cops, providers of free malware removal assistance and helpful Internet security tips for the novice user. In the next installment of the PC Security DIY article series, we will look at the foundation of Internet Security, using a secure browser and e-mail client and getting into safe browsing and e-mail reading habits.