Showing posts with label SECURITY. Show all posts
Showing posts with label SECURITY. Show all posts

Friday, July 7

SECURITY

You can download

The Adobe Acrobat (PDF) file here.

The document is 211KB. In the document I explain Internet protocols, ports,

setting firewall rules, firewall testing and so on. I also have a comparison

between some of the more popular home firewalls available. I have a comparison

chart summing up my findings. If you want to save the file for future

reference, just click the little stiffy disk icon in the top left of the Adobe

Acrobat toolbar.





If you do not have Adobe Acrobat 4 or later,

you must download Adobe Acrobat here

(8.57MB).



There are three main things that protect

your computer from harmful viruses and hackers:



1. An anti-virus program - to

protect against viruses and harmful code which can "infect" your

computer and corrupt information and/or cause your computer to crash.



2. A firewall - A program or piece

of hardware designed

to prevent hackers from gaining access to your computer to either steal

information, or to use your computer to hack other people. Firewalls also stop

malicious programs called "Trojan horses" from letting hackers take control of

your computer.



3. Common sense - A great deal of

hackers and viruses could be stopped with just a little common sense. Knowing

how viruses and hackers work is the only way to stop them from entering your

computer.



Here are a number of anti-virus

programs that I recommend:



1. Norton Antivirus - This is the

anti-virus program that I personally use. The best feature is that it runs

constantly in the background, thus protecting you against viruses on websites. The software is quite easy to use, and it caters for all levels of

competency. Get a trial version of Norton Antivirus at: http://www.symantec.com/downloads.





2. McAfee Antivirus - I have never

used this program, but I have heard from others that it is just as good as

Norton. You can get a trial version at: http://software.mcafee.com/centers/download/default.asp.



3. Housecall - This is an online

virus and Trojan checker. It is free, but I find it irritating because it is so

slow. Apparently after the first scan it gets quicker though. Get your free virus scan at: http://housecall.antivirus.com/housecall/start_pcc.asp.



4. AVG - This free virus

scanner/remover has received heaps of praise from all round. It is not quite as

good as a full-blown anti-virus that you pay for, but it is the best free

anti-virus that you will find.



Remember: An anti-virus program is only

effective if you keep it up to date by downloading the latest virus definitions.

An out of date virus program is almost as bad as no program at all!







And here are a number of firewalls I

recommend:





1. Norton Firewall - This is the

firewall that I use. It's fairly easy to set up and I haven't had any hassles

with hackers or anybody. I think there is now a trial version available, or

you can buy it from  www.symantec.com.



2. Zone Alarm - This is a very

popular free firewall. It was (as far as I know) the first firewall to pass GRC's

Leak Test (http://grc.com/lt/leaktest.htm).

You can download Zone Alarm at www.zonealarm.com.

I might add that I have set up my Norton Firewall so that it also passes the

leaktest. It is very easy, you just set your firewall to notify you each time a

program accesses the Internet, and to give you the option of accepting or

rejecting the connection. 



Set it to not allow any programs to access the Internet

without your permission. This can be a pain for the first couple of

days, but it's a real reassurance once it's finished bugging you. It helps to immunize you against trojan horses too!

I would strongly recommend paying for Zone Alarm Pro, because it has many

features that make it substantially more secure than the free Zone Alarm.



Note: If you speak in

Yahoo! chat in voice (and in any voice chat program), you may need to

make a firewall rule to allow the voice chat, otherwise people might say that you

are breaking up!







Here are a couple of tips and tricks

to help you defend against viruses, Trojans and hackers:





Security:



1. Go and test how secure your

system is at www.grc.com. There are a number of

tests there to check if you have any security holes. You can also test your

computer in a variety of ways at http://www.pcflank.com/.

This test includes browser security, an exploits test and more. It can take

quite a while though.



2. Adjust your browser security

settings. If you are in Internet Explorer, go to Tools>Internet Options.

Go to the Security tab, and ensure that you change the security settings for ALL of the

domains (Internet, local intranet, trusted sites and restricted sites) mentioned in the little box. DO NOT make the "Restricted Sites" less restricted. That is one easy way to get a virus or other

malicious material!







3. If you are not running a network,

you may wish to delete the networking protocols. These can be easily retrieved

if you ever wish to run a network. Go to Start>Settings>Control Panel and go to

Network. I only

have:



a) Microsoft Family Logon



b) Dial-up adapter



c) TCP/IP



You can delete the other protocols

(56K users only). Also, set Primary Network Logon to Windows

Logon
. Now read my section on Disabling NetBIOS to

complete the job!





If you are using cable modem, or

some other equipment that requires other protocols, refer to your user's

manual. I have a 56K dial-up modem and this configuration works just

fine. It not only improves your security, but it speeds up your Internet too!!









4. Set your firewall so that it does

not allow any programs to access the Internet without prompting you. By doing

this, you can stop many trojan horses, e.g. Netbus from doing any harm, as the

controller of the trojan can't communicate with it. That is really good! I also

use this to prevent many programs from displaying adverts or downloading when I

don't want them to. If your firewall has an option to create firewall rules for

you, make sure you disable it, because it will ruin all your hard work. It can

also prevent some programs from working properly.









Privacy:



1. Want to know just how much people can find

out about you? You'd be VERY surprised. Pop in to www.privacy.net/analyze

to check how much they can tell you about your PC and your browsing habits. They

even tell you your screen resolution!!





2. Once you've done the privacy analysis, go

to their home page www.privacy.net to find

out how to make your browsing habits and computer specifications less

accessible.



3. I'd definitely encourage turning

off the auto-complete feature in Internet Explorer for certain things.



In Internet Explorer, go to

tools>Internet options
. Click on the "content" tab and click

the

"AutoComplete" button. Ensure that AutoComplete for "forms" and

"user names and passwords on forms" is unchecked (i.e. there is no

mark in the box next to them). Also click "Clear Forms" and

"Clear Passwords", to delete any information that may already be on

your computer. Click OK until you have closed all the windows.





The reason for these measures is so

that if somebody gets into your computer, they can't get hold of personal

information, passwords and credit card numbers. If you have a firewall, this is

less likely to happen, but especially with credit card numbers and passwords I'd

be very careful.



4. Make sure that you never

give out your name, address, telephone number or any other private details to a

person on the Internet, no matter how nice he/she appears to be. Just from a

little crumb of information, they can find out everything about you, and some

maniacs on the Internet could even start stalking you in real life!! This is

something that you definitely don't need in your life. Remember, a person on the

Internet can pretend to be whoever or whatever they wish, and you would never

even know it! Stalkers on the Internet almost never appear suspicious or evil,

just like most criminals in real life.



5. Similarly, be careful what

information you give out in online surveys, feedback forms, and registering for

a service or user name. If a service requires your address, telephone number or

something private, unless it's a very reputable company like Yahoo!, never fill

it in. Just work out whether it is more important to you to join, or have your

privacy. Many companies sell your information to other companies, and then you

wonder why you get spam e-mails, telemarketing phone calls, door-to-door

advertisers etc!!



6. As boring as it may be, I

recommend that you read the End User License Agreements (EULA) for all products

you download/install and everything you sign up for on the Internet. Often these

agreements can contain some startling clauses. You don't want to find yourself

in trouble for not following the terms of the agreement!





Anti-Virus:





1. Do not open e-mail attachments

unless you are 100% sure that the person they were sent from would actually send

you such a file. e.g., if you get a file from your mother telling you to check

out these great pics of Anna Kournikova, you can probably be quite sure that all

is not as it seems!



Remember: If in

doubt as to whether the attachment is genuinely from the sender, just send them an e-mail to confirm.



2. Be careful of virus hoaxes that

may be sent to you by e-mail. Visit www.kumite.com/myths

to find out more about hoaxes and myths!



3. Viruses can also be transmitted

through websites! Ensure that your virus scanner scans all files as they are written to the

hard drive, because otherwise you can get infected from a malicious website!




4. Disable Windows Scripting Host

(WSH)
. This may well be one of the most important tips on this page! Many, many

viruses are run using the WSH. If you disable it, many viruses cannot run and

can not damage your computer!! More than likely, you will never even need to use

this "feature" in Windows. To disable the WSH, go to start>settings>control

panel
. Go to add/remove programs and click on the windows setup

tab. Click on accessories and click details... at the bottom of

the window. One of the last items on the list should be the WSH. To disable it,

make sure that the box next to WSH in not checked (no tick in the box).

Click OK until all the windows are closed. You will probably need to reboot



your computer after you are finished saving all your work.


5. Show file extensions. Many

viruses, especially those e-mailed, have double-extensions, like virus.txt.exe.

This file is an exe file, not a txt file!! However, if you have Hide

file extensions for known file types
enabled, the file will show as

virus.txt only! This can be very deceiving. To show all file extensions, go to My

computer
, click view, click folder options..., click on the view



tab and make sure that that Hide file extensions for known file types

does not have a check mark (tick) in it. If it does, uncheck (untick) it

and press ok. Now you will be safe from this nasty virus method!


6. Common extensions for viruses

include: exe, js, vbs, pif, com, bat.








Anti-Hacking:

1.

You

can e-mail

me and I'll try to set up a time to give your computer a fairly

comprehensive security scan for free. I have a number of programs that

can test for security issues and open ports etc. I would, naturally, provide

with advice on how to fix any security holes that do exist.

2.

Don't get into arguments with people (especially hackers!) in chat rooms. In

many cases your IP address can be easily obtained and the person you are arguing

with may decide to hack you! If you get into an argument with somebody you

suspect may be a hacker, exit the room immediately and close all the chat windows

and programs.

3. Do not visit

hacking websites. Many of these contain ActiveX controls that can hack your

computer through the website (even if you have a firewall) and can do other

damage.

Remember:

When you visit a website, your IP address is automatically recorded on the web

server log. Visiting hacking websites can lead to you personally being the target of

a group of hackers!

4. If you

have reason to suspect that your are being hacked, e.g. you have lost control of

your computer and somebody is moving around the mouse and opening programs, switch

off your modem!
Nobody can hack you once you have your modem off. If you

have a dial-up modem, your IP address probably changes each time you dial up.

This way, they can't hack you again unless they planted files on your computer

to notify them when you're online and what your IP address is. This is unlikely

however.


5. If you suspect that somebody is

currently snooping: 

Close

down all your programs, press alt-ctrl-del once to close down all background

programs except explorer, systray and your anti-virus and firewall. Go to start>run



and type command. This brings up the MS-DOS prompt. Type in Netstat,

and all connections to your computer will be revealed. If you are not on a

network, and there is anything that shows up when you type netstat, then

somebody is currently connected to your computer. Write down all the information

that comes up on your screen, i.e. protocol, ip number, port etc, and then

switch off your modem.


6. Get Trojan Remover by Simply

Super Software. You can get the program from http://www.simplysup.com/tremover/.

It is shareware, and must be registered after 30 days. This is not a big

problem, however, because in that time you can remove all the trojans currently

on your system. Unfortunately, you will not be protected from new ones after the

30 days. 

When the

program is installed, open it and click on the little ambulance icon on

the toolbar, second icon from the left. This will check your computer for active

trojans. When you're done with that, you can do a full system scan by clicking

on the flashlight icon, third from the left. I must warn you that this

can take a long time if you have many files on your system. My scan took just

over 2½ hours!! 

You

have a choice to delete or rename a trojan, when it is found, and Trojan Remover

provides data about the trojan. If you rename a trojan, it can no longer be run,

so it is harmless. It will still take up space on your hard drive and remains a

potential risk, however. The better option is to delete the trojan, but only do

this if you are sure the file is not legitimate. 






Spyware:

Many people are not aware of

spyware, and that is one of the reasons it is so dangerous. The definition of

spyware is software that works for advertising companies, collecting data to

sell for money. That doesn't sound too bad, does it? Well, it is!

Spyware

products are also called advertising trojans. Have you ever encountered spyware?

Probably. Whenever you download a program like Kazaa, Bearshare, Limewire,

GoZilla! or many other useful programs, you are downloading spyware. It may be

noted that many (even most) file sharing software programs contain spyware.

There are luckily "clean" alternatives to most popular spyware

products, so you needn't worry too much about losing out if you dump the

spyware. If you would like to know of a clean alternative to a spyware product

you have, or if you suspect your product might be spyware, you can visit www.spychecker.com

and search their extensive database.

It is useful to note

that some spyware programs give you options to reject the spyware. I am not sure

if they still install the spyware regardless, but it's worth trying. Some names

of popular spyware are Bonzi Buddy, Cygate, Gator and WebHancer. Do not


install these programs no matter how useful or cute

they seem!

To find out if you

are "infected" with spyware, download a program called AdAware.

This program will search for and, if you wish, remove all spyware found in your

computer. A computer I recently "disinfected" had 1700 pieces of

spyware on the hard drive! The computer was part of a network, and after

disinfecting 4 computers, I had totalled over 5000 pieces of spyware on these

computers. They were noticeably faster after they were cleaned!

Do note that some programs like Kazaa won't work after the spyware has

been removed, so make use of AdAware's "backup" feature to be able to

restore any unwanted removals if necessary. The good news is that Kazaa

Lite
has been released (unofficially of course) minus the spyware, so that

you can still enjoy Kazaa.

So

how does this all work? The spyware companies pay the software companies money

to include their spyware in their products (like Kazaa and Go!Zilla), and that

is often how these "free" software programs make a profit and stay

afloat.

Spyware resides in

your registry and your hard drive and invades your privacy. The spyware tracks

where you go on the Internet and what you do there. It then reports back to



"head office" and sends them all the information it has gathered.

Often this includes e-mail addresses and website addresses. They then use this

information to send spam (unsolicited e-mail) and to work out what method of

advertising would be most effective. If you are getting mysterious advertising

e-mails where they call you by your name, then you have probably been hit by

spyware!




How to Disable NetBIOS

This trick took me so long to work

out, that I decided to dedicate an entire section on it. NetBIOS is a service

that is used primarily for file and printer sharing in networks. If you run a

network, do not read this section; you'll probably just mess things up. If you

don't run a network, then this section will get you one step closer to having a

hacker-proof computer. Before you do the following steps, make sure that you

have completed this

First,

to see what I am talking about, go to control panel and then to Network.

Select TCP/IP and click Properties. Click OK when you get the

pop-up message. Now go to the NetBIOS tab. You should see that it says



"I want to enable NetBIOS over TCP/IP". Problem is, that in all

probability that text and the check-box next to it are greyed out! If it's not

greyed out, just untick it, press ok and jump to the next paragraph. Now, how on

earth are you supposed to disable it if it's greyed out? Well, it took quite a

bit of thinking, frankly, but I finally found the solution. Click on the Bindings

tab, and you should see that "Microsoft Family Logon" is in the box

and is ticked. Untick it and click OK at the bottom. If it tells you that you

need your Windows CD, just press cancel because you don't.

Now

you should be prompted to reboot your computer. Reboot and then

everything is finished! If you open up Network again you will be prompted

that "You network is not complete. Do you want to continue?". In true

Microsoft fashion it doesn't make an iota of difference which button you press!

You should notice now that Microsoft Family Logon is no longer listed. Also, if

you go to TCP/IP>NetBIOS again, you'll notice that the box is unticked, and

is no longer greyed out! OK your way out of there, and you're done!

So

you may ask "Well, why don't you just delete the Microsoft Family

Logon?". Truth is I tried that and I could no longer dial up to my ISP

(Internet Service Provider). Don't ask why, that's just what happened. It

disabled NetBIOS, but that's no help if you can't connect to Internet! As soon

as I restored the Family Logon it worked again. My method is, in my opinion, the

simplest solution.

If you're

wondering what made me go insane trying to work this out when I have a firewall

anyway, it's that I am trying to make my computer as secure as possible even



without a firewall running. If somebody manages to bypass your firewall,

you don't want your computer to be easy hunting ground. Paranoid, yes, but well

worth the hassle. GRC now shows all my ports as "closed" when I turn

off the firewall. Previously, my Port 139 (NetBIOS) showed open. That's what

triggered this whole story.




Cookies



I have been meaning to add this

section for a long time, as I feel that cookies are an issue that is widely

misconceived and often leads to a lot of misinterpretation and even paranoia.

Cookies,

quite simply, are text files. People moaning about "receiving cookies in

their inbox" (of their e-mail), having "cookies and other programs

causing havoc" and all other accusations are talking nonsense. A cookie is

a text file placed in your Temporary Internet Files folder in order to help a

website to provide more customized service, or to make your use of the website

easier.

For example, Yahoo. If

you tell Yahoo, or any other similar website, to remember your username and

password when you log in, it places a cookie on your machine so that next time

you access the website it can log you in automatically. If you delete the

cookie, it will not log you in automatically unless you respecify it again when

you next log in manually.

Another

example where cookies are frequently used is forums. On Dr

Boot
, and many other forums, cookies are used so that you can keep track of

which topics you have read, and which you have not. If it were not for cookies,

you would have to check every single topic to see whether or not you have

previously read it. This would obviously waste a lot of time.

If

you have specific preferences on a website, such as colours and designs of

various items, cookies can also keep track of this so that it can



"remember" your preferences when you next visit the website. Ever had

a website say "Welcome back [name]"? This is an example of cookies at

work.

Now, if all that I have

said so far is true, why do people consider cookies to be dangerous privacy

invaders? Well, cookies can keep track of your movements within that specific

website
and see what links you click on and what you do. It cannot see where

else you have been and it cannot track you once you leave the site. The reason

that many websites track your movements, is to see what items customers find

more interesting. Websites can often tell which website (singular) you visited

before you visited their website, but this is hardly anything to worry about

(and it has nothing to do with cookies).

If

you want to see a cookie for yourself, and if this helps to convince you that

they really are quite harmless, navigate to c:\windows\temporary internet files

and open up any one of the text files that you find in that folder. Windows will

warn you that this may be unsafe, but it can't be, so just ignore it.

I

hope you have a better idea of what cookies are now, and can now inform paranoid

friends, family and neighbours that they will not be eaten up by a cookie

monster!

.

Related Posts with Thumbnails

Labels

...etc) *Big Bang experiment hacked 100 Excellent Free WordPress Themes 100 Keyboard shortcuts (Windows) 117 Run Commands In Windows Xp 12 Sites To Create Cartoon Characters of Yourself 13 Computer keyboards you’ve never seen before 160+ Mega Web Design Tutorial Roundup 17 Useful iPhone Applications You Should Install 20 best ebooks sites 20 Best Websites To Download Free E-Books 25 (Free) 3D Modeling Applications You Should Not Miss 25 Websites To Have Fun With Your Photos 26 Sites That Pay You to Blog 27 Must-Have Starter Kits For Web Designers 30+ New Useful WordPress Tricks 35+ Essential Web Design Resources on Best Practice 40 Creative and Inspiring Website Backgrounds Techniques 42 Free Online Magazines for Designers 50 Amazing Wildlife 50 Best CSS Web Design Resources for Webmasters 50 Greatest Computer Workstation (PC/Mac) Setups 50 Useful New jQuery Techniques and Tutorials 60 Excellent Free 3D Model Websites 60 Most Beautiful Apple (Mac OS X Leopard) Wallpapers 7 Design Resources for iPhone Developers 75 Top Best Design Resources of 2008 9 Alternative Ways To Access Blocked Sites 99 Facts about Guyz(Very True)... A-Z of Free Photoshop Plugins and Filters Activate header in Yahoo/Gmail/Hotmail and find IP information Adding Items to the Start Button Administrator Password Hack Airtel Free Mms AirTel Free tricks airtel hack All Software links Alone (In a Crowded Room Animal Wallpapers Automatic Administrator Login Automatically Kill Programs At Shutdown AVI Best Color Tools For Web Designers Best Way To Lock Your Folder Without Any Programs BIO DATA OF A MODERN GIRL Break into email accounts Bypass windows validation C-C++ projects with source codes Call anyone from any persons number free...... CDMA Phones Secret Codes Cellphone hacks chat with command prompt Cheat codes for default games in windows xp-2 Check Your Mobile -Software / IMEI / SimLock Unlock code Clear BIOS password Convert web site 2 wap site Cool Futuristic/Concept Gadgets That Really Inspire Crack CD protection Create a new fake virus to spoof Antivirus Create a Shortcut to Lock Your Computer Create Multiple Websites Under 1 Shared-Hosting Account d: Disable USB Drives Disabling Drives in My Computer Disabling My Computer Display legal notice on startup DivX DOTNET SITES download any video YOUTUBE GOOGLE VIDEOS PAKREEL METACA download youtube videos to ur computer Downloads and online resources for computer stuff Drop-Down Menu: 30+ Useful Scripts to Enhance Header Navigation Dwnld FREE NOKIA INTERNET RADIO: e: Ebooks Edit ur PC Window setting electronics Fake hacking-spam Free gprs settings for any operator network free SMS Free sms sites FTP: Free Clients and Alternative Connection Methods Giveaway: Free Hosting Accounts Google Hacking Database (GHDB) Google Offices (Googleplex) Around The World [Photos] GPRS GSM Secret Codes Hack [Sify hack using NetBIOS ( hacking someones remote computer) Hack yahoo through tro messenger Hacker tools Hacking computers through telnet Hacking in schools and colleges Hacking internet Cafe Hacking Websites Hacks High Flier Home How To Access Blocked Web Sites How To Become A Hacker How to change ur IP on networks How to convert Tivo How to get ip address of person u r chatting with on msn messenger How to hack through winamp How to Hide the drives(c: How to Lock a Folder Using Notepad How to make keygens How To Shut Down All Pc(s) On the Network How to Solve Access Denied Deleting Files Folders HTML Table Building: 30+ Beautiful Examples and Useful Javascripts Important SITES list Increasing options in add/remove programs Ip address explanation continued ip locator .......find the location of a ip jokes Learn How To Hack | Tutorials On How To Hack | How To Hack LEARN SIMPLE VIRUS PROgRAM USING ...NOTEPAD.... Macro Photography: 50+ Remarkable Bits of Life We Overlook make a fake page of ur own for any website McAfee Total Protection Menu Delays MMS Mobile tricks More in email hacking Motorola Secret Codes MPEG MPEG4 No Shutdown Nokia secret codes Notepad time and date trick Opening a DOS Window to either the Drive or Directory in Explorer Other smart ways to Bypass the Windows genuine advantage Validation Others] Speed Upto 10 MBPS [Beam Cable Hack] Predictions of our world Protect urself.know what hackers do PSP etc RADIO ONLINE RealMedia videos and many more to iPod Recycle Bin Edits Reliance RESUMES Samsung Secret Codes School/cllg server hacking......hack ur school server search engines and mails SEARCH files in RAPIDSHARE.com SECURITY Send SMS to anyone from any persons number Shutdown someones comp over msn and all SITES Sites for free sms (PC to Mobile) SOME USEFULL IP TRICKS N TIPS Sony Ericsson Secret Codes Speed up Mozilla Firefox about 3-30x Faster speed-up-menu-display.html' Speeding Up Share Viewing Spy phishing Start Your Computer in a Second technology TEMPLATES Tips and Techniques To make folder delete protected Top Paying CPM Advertisement Network tricks mobile Tutorial: How to hack a site tutorials Ultimate Guide To Web Optimization (Tips Best Practices) Use any USB stick As Ram Advanced search USEFULL LINKS Vedic Maths Vehicles - sQuba (World's First Swimming Car) Very official love letter Virus Virus made in c++ Want 2Trace Location of Enemies Mobile no.? WANT FREE USERNAME AND PASSWORD OF ANY SITE????? want to see your system hardware information Watch Any Movie In Paint (100%) Working Watch FREE Live Internet TV *** What is neuclear deal???? When I'm with you Windows keyboard shortcuts you never knew existed very helpful Windows Media Player Tricks WMV Xvid Yahoo messenger hack Yahoo webcam hacking (1000% working) You Are My Everything Your Mobile Doesnt Support all Indian Lanuages