2012 will be the year that a cyberattack really does hit a public utility hard, taking down an electric grid. Along those same lines, industrial control systems in other countries will be rocked with a sustained cyberattack that will make Stuxnet look like child's play in a year that increasingly will find that cyber-sabotage and cyberwar are realities that must be reckoned with.
Saturday, December 31, 2011
Sunday, December 25, 2011
How to avoid a costly mistake on a Christmas Eve
>>Ensure domain name matches the website name
>>Have up-to-date anti-virus, anti-malware and anti-spyware software on your computer
>>Check warranty conditions, product disclosures and shipping details.
"A fraudulent site selling TVs or video cameras will look very convincing," Choice spokeswoman Ingrid Just said in a statement today.
"This makes it hard to tell the difference between what's dodgy and what's not.
"It's worth taking a few seconds to verify the security certificate, especially when the site is one you're not familiar with."
*Shoppers are being told to look out for a small padlock symbol that appears beside the URL during payment process.
*This indicates that details should be secure, with shoppers able to click on the padlock to check the status of the retailer's security certificate.
*Another sign of a secure site is if an 's' appears in the website address - beginning with https//: - during the payment process.
The 's' is another indicator your information will be encrypted.
Internet Security for Christmas Presents
This Christmas has seen a large increase in the sales of new devices such as iPads, tabs, laptops, games consoles and smart phones. Fife Police are hoping that users obtain security software to protect themselves and their devices.
The most likely forms of attack on computers will involve 'phishing' and 'malware'. Phishing attacks will lead users to a website with the aim of obtaining personal information, such as bank accounts and passwords. Malware, or malicious software, enables criminals to infiltrate a computer and control it remotely, allowing them to use the computer for illegitimate purposes, for example, to steal personal information or send spam emails. Keeping the computers operating system and security software up-to-date is the most effective way of protecting your machine.
Parents and carers should also ensure that the children are sufficiently aware of the online risks particularly when engaging in social networking, instant messaging or online chat.
Detective Inspector Stuart Morris, e-crime Unit said: "A common sense approach has to be used online. Many scam offer deals that are tempting becs you think you are getting a bargain, so if it luks too good to be true, it probably is."
The 12 Internet scams of Christmas
1. On the first day of Christmas, I downloaded an advent calendar that unleashed a virus attack on my computer.
The most likely forms of attack on computers will involve 'phishing' and 'malware'. Phishing attacks will lead users to a website with the aim of obtaining personal information, such as bank accounts and passwords. Malware, or malicious software, enables criminals to infiltrate a computer and control it remotely, allowing them to use the computer for illegitimate purposes, for example, to steal personal information or send spam emails. Keeping the computers operating system and security software up-to-date is the most effective way of protecting your machine.
Parents and carers should also ensure that the children are sufficiently aware of the online risks particularly when engaging in social networking, instant messaging or online chat.
Detective Inspector Stuart Morris, e-crime Unit said: "A common sense approach has to be used online. Many scam offer deals that are tempting becs you think you are getting a bargain, so if it luks too good to be true, it probably is."
The 12 Internet scams of Christmas
A timely reminder of some security traps, some of which we see time and time and time again every year.
1. On the first day of Christmas, I downloaded an advent calendar that unleashed a virus attack on my computer.
Santa says: be very cautious of downloaded games and novelties unless from a trusted source, or you could find yourself with an unwanted security breach.
---------------------------------------------------------
2. On the second day of Christmas, I scanned a QR code with
2. On the second day of Christmas, I scanned a QR code with
Friday, December 23, 2011
Working from home, is your office data security compromised?
In many cases executive IT and security professionals trust their Information Security departments to provide adequate security to protect employees while operating in their business environment. However it is rare for users to extrapolate this security to a home environment.What does this mean in practical terms? Well, an enterprise will normally provide a risk analysis of a security threat and then provide adequate controls to mitigate that risk to an acceptable level. And users need to consider the same things when at home. So what are the considerations which IT directors should take into account when looking at cyber security provisions for mobile workers?
Challenges
Key security questions outlined below:
Challenges
- Complying with a growing number of regulations governing the handling and protection of customer data
- Establishing consistent backups and reliable recovery with limited IT resources and network bandwidth
- Dealing with exponential growth in data at remote sites, which makes wide-area network backups impractical
- Minimizing high administrative costs associated with a backup applications and tape media at multiple remote sites
- Reducing or eliminating the off-site transport of backup data on tapes from remote sites to other locations
Key security questions outlined below:
Monday, December 19, 2011
Network Anomaly Detection using Soft Computing
INTRUSION detection is based on the assumption that intrusion activities are noticeably different from normal system activities and thus detectable. As defined in, intrusion detection is “the process of monitoring the events
occurring in a computer system or network and analyzing them for signs of intrusions. It is also defined as attempts to compromise the confidentiality, integrity, availability, or to bypass the security mechanisms of a computer or network”. Anomaly Intrusion Detection Systems (IDSs) aim at distinguishing an abnormal activity from an ordinary one. Many approaches have been proposed which include statistical, machine learning, data mining and immunological inspired techniques. There are two main intrusion detection systems. Anomaly intrusion detection system is based on the profiles of normal behaviors of users or applications and checks whether the system is being used in a different manner.
Tuesday, November 15, 2011
CA-2001-22 W32/Sircam Malicious Code
Original release date: July 25, 2001
Last revised: August 23, 2001Source: CERT/CC
Systems Affected
Overview
"W32/Sircam" is malicious code that spreads through email and potentially through unprotected network shares. Once the malicious code has been executed on a system, it may reveal or delete sensitive information.
As of 10:00EDT(GMT-4) Jul 25, 2001 the CERT/CC has received reports of W32/Sircam from over 300 individual sites.
I. Description
W32/Sircam can infect a machine in one of two ways:- When executed by opening an email attachment containing the malicious code
- By copying itself into unprotected network shares
Propagation Via Email
The virus can appear in an email message written in either English or Spanish with a seemingly random subject line. All known versions of W32/Sircam use the following format in the body of the message:English | Spanish |
Hi! How are you? [middle line] See you later. Thanks | Hola como estas ? [middle line] Nos vemos pronto, gracias. |
English |
I send you this file in order to have your advice I hope you like the file that I sendo you I hope you can help me with this file that I send This is the file with the information you ask for |
Spanish |
Te mando este archivo para que me des tu punto de vista Espero te guste este archivo que te mando Espero me puedas ayudar con el archivo que te mando Este es el archivo con la informacion que me pediste |
The email message will contain an attachment whose name matches the subject line and has a double file extension (e.g.subject.ZIP.BAT or subject.DOC.EXE). The CERT/CC has confirmed reports that the first extension may be .DOC, .XLS, or .ZIP. Anti-virus vendors have referred to additional extensions, including .GIF, .JPG, .JPEG, .MPEG, .MOV, .MPG, .PDF, .PNG, and .PS. The second extension will be .EXE, .COM, .BAT, .PIF, or .LNK. The attached file contains both the malicious code and the contents of a file copied from an infected system.
When the attachment is opened, the copied file is extracted to both the %TEMP% folder (usually C:\WINDOWS\TEMP) and the Recycledfolder on the affected system. The original file is then opened using the appropriate default viewer while the infection process continues in the background.
It is possible for the recipient to be tricked into opening this malicious attachment since the file will appear without the .EXE, .BAT,.COM, .LNK, or .PIF extensions if the "Hide file extensions for known file types" is enabled in Windows. See IN-2000-07 for additional information on the exploitation of hidden file extensions.
W32/Sircam includes its own SMTP client capabilities, which it uses to propagate via email. It determines its recipient list by recursively searching for email addresses contained in all *.wab (Windows Address Book) files in the %SYSTEM% folder. Additionally, it searches the folders referred to by
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Cache
W32/Sircam first attempts to send messages using the default email settings for the current user. If the default settings are not present, it appears to use one of the following SMTP relays:
- prodigy.net.mx
- NetBIOS name for 'MAIL'
- mail.<defaultdomain> (e.g., mail.example.org)
- dobleclick.com.mx
- enlace.net
- goeke.net
Propagation Via Network Shares
In addition to email-based propagation, analysis by anti-virus vendors suggests that W32/Sircam can spread through unprotected network shares. Unlike the email propagation method, which requires a user to open an attachment to infect the machine, propagation of W32/Sircam via network shares requires no human intervention.
If W32/Sircam detects Windows networking shares with write access, it
- copies itself to \\[share]\Recycled\SirC32.EXE
- appends "@ win\Recycled\SirC32.exe" to AUTOEXEC.BAT
If the share contains a Windows folder, it also
- copies \\[share]\Windows\rundll32.exe to \\[share]\Windows\run32.exe
- copies itself to \\[share]\Windows\rundll32.exe
- when virus is executed from rundll32.exe, it calls run32.exe
Infection process
- When installed on a victim machine, W32/Sircam installs a copy of itself in two hidden files:
- %SYSTEM%\SCam32.exe
- Recycled\SirC32.exe
Based on external analyses, there is also a probability that W32/Sircam will copy itself to the %SYSTEM% folder as ScMx32.exe. In that case, another copy is created in the folder referred to byHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Startup (the current user's personal startup folder). The copy created in that location is named Microsoft Internet Office.exe. When the affected user next logs in, this copy of W32/Sircam will be started automatically. - The registry entry HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices\Driver32 is set to%SYSTEM%\SCam32.exe so that W32/Sircam will run automatically at system startup.
- The registry entry HKEY_CLASSES_ROOT\exefile\shell\open\command is set to "C:\Recycled\SirC32.exe" "%1" %*", causing W32/Sircam to execute whenever another executable is run.
- A new registry entry, HKEY_LOCAL_MACHINE\Software\SirCam, is created to store data required by W32/Sircam during execution.
- W32/Sircam searches for filenames with .DOC, .XLS, .ZIP extensions in the folders referred to by
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Personal
- HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Desktop
- W32/Sircam attaches its own binary to selected files it finds and stores the combined file in the Recycled folder.
II. Impact
W32/Sircam can have a direct impact on both the computer which was infected as well as those with which it communicates over email.- Breaches of confidentiality: The malicious code will at a minimum search through select folders and mail potentially sensitive files. This form of attack is extremely serious since it is one from which it is impossible to recover. Once a file has been publicly distributed, any potentially sensitive information in it cannot be retracted.
- Limit Availibility (Denial of Service)
- Fill entire hard drive: Based on external analyses, on any given day, there is a probability that it will create a file named C:\Recycled\sircam.sys which consumes all free space on the C: drive. A full disk will prevent users from saving files to that drive, and in certain configurations impede system-level tasks (e.g., swapping, printing).
- Propagation via mass emailing: W32/Sircam will attempt to propagate by sending itself through email to addresses obtained as described above. This propagation can lead to congestion in mail servers that may prevent them from functioning as expected.NOTE: Since W32/Sircam uses native SMTP routines connecting to pre-defined mail servers, propagation is independent of the mail client software used.
- Loss of Integrity: Published reports indicate that on October 16 there is a reasonable probability that W32/Sircam will attempt to recursively delete all files from the drive on which Windows is installed (typically C:).
III. Solution
Run and Maintain an Anti-Virus Product
It is important for users to update their anti-virus software. Most anti-virus software vendors have released updated information, tools, or virus databases to help detect and partially recover from this malicious code. A list of vendor-specific anti-virus information can be found in Appendix A.
Many anti-virus packages support automatic updates of virus definitions. We recommend using these automatic updates when available.
Exercise Caution When Opening Attachments
Exercise caution when receiving email with attachments. Users should never open attachments from an untrusted origin, or ones that appear suspicious in any way. Finally, cryptographic checksums should also be used to validate the integrity of the file.
The effects of this class of malicious code are activated only when the file in question is executed. Social engineering is typically employed to trick a recipient into executing the malicious file. The best advice with regard to malicious files is to avoid executing them in the first place. The following tech tip offers suggestions as to how to avoid them:
Filter the Email or use a Firewall
Sites can use email filtering techniques to delete messages containing subject lines known to contain the malicious code, or they can filter all attachments.
Likewise, a firewall or border router can be used to stop the W32/Sircam outbound SMTP connections to mail servers outside of the local network. This filtering strategy will prevent further propagation of the worm from a particular host when the local mail configuration is not used.
Appendix A. - Vendor Information
Aladdin Knowledge Systems
Central Command, Inc.
Command Software Systems
Computer Associates
Data Fellows Corp
McAfee
Norman Data Defense Systems
Panda Software
Proland Software
Sophos
Symantec
Trend Micro
Computer security risks to home users
A. What is at risk?
Information security is concerned with three main areas:
B. Intentional misuse of your computer
> Trojan horse programs
>Back door and remote administration programs
>Denial of service
>Being an intermediary for another attack
>Unprotected Windows shares
>Mobile code (Java, JavaScript, and ActiveX)
>Cross-site scripting
>Email spoofing
>Email-borne viruses
>Hidden file extensions
>Chat clients
>Packet sniffing
C. Accidents and other risks
In addition to the risks associated with connecting your computer to the Internet, there are a number of risks that apply even if the computer has no network connections at all. Most of these risks are well-known, so we won’t go into much detail in this document, but it is important to note that the common practices associated with reducing these risks may also help reduce susceptibility to the network-based risks discussed above.
1. Disk failure
Recall that availability is one of the three key elements of information security. Although all stored data can become unavailable -- if the media it’s stored on is physically damaged, destroyed, or lost -- data stored on hard disks is at higher risk due to the mechanical nature of the device. Hard disk crashes are a common cause of data loss on personal computers. Regular system backups are the only effective remedy.
2. Power failure and surges
Power problems (surges, blackouts, and brown-outs) can cause physical damage to a computer, inducing a hard disk crash or otherwise harming the electronic components of the computer. Common mitigation methods include using surge suppressors and uninterruptible power supplies (UPS).
3. Physical Theft
Physical theft of a computer, of course, results in the loss of confidentiality and availability, and (assuming the computer is ever recovered) makes the integrity of the data stored on the disk suspect. Regular system backups (with the backups stored somewhere away from the computer) allow for recovery of the data, but backups alone cannot address confidentiality. Cryptographic tools are available that can encrypt data stored on a computer’s hard disk. The CERT/CC encourages the use of these tools if the computer contains sensitive data or is at high risk of theft (e.g. laptops or other portable computers).
Information security is concerned with three main areas:
>Confidentiality - information should be available only to those who rightfully have access to it
>Integrity -- information should be modified only by those who are authorized to do so
>Availability -- information should be accessible to those who need it when they need it
These concepts apply to home Internet users just as much as they would to any corporate or government network. You probably wouldn't let a stranger look through your important documents. In the same way, you may want to keep the tasks you perform on your computer confidential, whether it's tracking your investments or sending email messages to family and friends. Also, you should have some assurance that the information you enter into your computer remains intact and is available when you need it.
Some security risks arise from the possibility of intentional misuse of your computer by intruders via the Internet. Others are risks that you would face even if you weren't connected to the Internet (e.g. hard disk failures, theft, power outages). The bad news is that you probably cannot plan for every possible risk. The good news is that you can take some simple steps to reduce the chance that you'll be affected by the most common threats -- and some of those steps help with both the intentional and accidental risks you're likely to face.
Before we get to what you can do to protect your computer or home network, let’s take a closer look at some of these risks.
B. Intentional misuse of your computer
The most common methods used by intruders to gain control of home computers are briefly described below. More detailed information is available by reviewing the URLs listed in the References section below.
> Trojan horse programs
>Back door and remote administration programs
>Denial of service
>Being an intermediary for another attack
>Unprotected Windows shares
>Mobile code (Java, JavaScript, and ActiveX)
>Cross-site scripting
>Email spoofing
>Email-borne viruses
>Hidden file extensions
>Chat clients
>Packet sniffing
C. Accidents and other risks
In addition to the risks associated with connecting your computer to the Internet, there are a number of risks that apply even if the computer has no network connections at all. Most of these risks are well-known, so we won’t go into much detail in this document, but it is important to note that the common practices associated with reducing these risks may also help reduce susceptibility to the network-based risks discussed above.
1. Disk failure
Recall that availability is one of the three key elements of information security. Although all stored data can become unavailable -- if the media it’s stored on is physically damaged, destroyed, or lost -- data stored on hard disks is at higher risk due to the mechanical nature of the device. Hard disk crashes are a common cause of data loss on personal computers. Regular system backups are the only effective remedy.
2. Power failure and surges
Power problems (surges, blackouts, and brown-outs) can cause physical damage to a computer, inducing a hard disk crash or otherwise harming the electronic components of the computer. Common mitigation methods include using surge suppressors and uninterruptible power supplies (UPS).
3. Physical Theft
Physical theft of a computer, of course, results in the loss of confidentiality and availability, and (assuming the computer is ever recovered) makes the integrity of the data stored on the disk suspect. Regular system backups (with the backups stored somewhere away from the computer) allow for recovery of the data, but backups alone cannot address confidentiality. Cryptographic tools are available that can encrypt data stored on a computer’s hard disk. The CERT/CC encourages the use of these tools if the computer contains sensitive data or is at high risk of theft (e.g. laptops or other portable computers).
Monday, November 14, 2011
Steam hack confirmed by Valve game company
Steam, the online gaming network run by game company Valve, confirmed Thursday that its forums had been hacked and warned users to keep a close eye on their credit card statements.
The service’s forums had been defaced earlier in the week, resulting in some gamers receiving e-mails from a hacking Web site, Kotaku report
Gallery
In recent years, lawmakers and advocacy groups have made increased efforts to protects users’ privacy online. Here are some cases that helped stoke the debate about tracking and privacy on the Web.
On Thursday, Valve co-founder Gabe Newell left a message on the company’s forums confirming the intrusion, saying that all forum passwords will be reset and adding that the attack “goes beyond the Steam forums.” While there is evidence of a deeper intrusion, the company is not yet requiring all Steam users to reset their account passwords, which are separate from forum accounts.
“We do not have evidence that encrypted credit card numbers or personally identifying information were taken by the intruders, or that the protection on credit card numbers or passwords was cracked,” Newell wrote. “We are still investigating.”
He added that there have been no reports that Steam accounts were compromised, but advised users to change their passwords as a precaution.
“I am truly sorry this happened, and I apologize for the inconvenience,” he said.
The intrusion comes at a bad time for Steam, which is not only premiering a major title — Bethesda’s “Elder Scrolls V: Skyrim” — Friday, but is also facing long-term challenges from Electronic Arts’ Origin service, cloud gaming service OnLive and an as-yet-unreleased online service from retailer GameStop.
Security, understandably, is the most pressing issue facing these services as they ask gamers to trust their saved data, credit cards and other personal information to off-site servers. Companies are also jumpy following the Sony data hack that pulled the PlayStation Network and Sony Online Entertainment services off line for a month and resulted in a lot of bad press for the electronics giant.
The service’s forums had been defaced earlier in the week, resulting in some gamers receiving e-mails from a hacking Web site, Kotaku report
Gallery
In recent years, lawmakers and advocacy groups have made increased efforts to protects users’ privacy online. Here are some cases that helped stoke the debate about tracking and privacy on the Web.
On Thursday, Valve co-founder Gabe Newell left a message on the company’s forums confirming the intrusion, saying that all forum passwords will be reset and adding that the attack “goes beyond the Steam forums.” While there is evidence of a deeper intrusion, the company is not yet requiring all Steam users to reset their account passwords, which are separate from forum accounts.
“We do not have evidence that encrypted credit card numbers or personally identifying information were taken by the intruders, or that the protection on credit card numbers or passwords was cracked,” Newell wrote. “We are still investigating.”
He added that there have been no reports that Steam accounts were compromised, but advised users to change their passwords as a precaution.
“I am truly sorry this happened, and I apologize for the inconvenience,” he said.
The intrusion comes at a bad time for Steam, which is not only premiering a major title — Bethesda’s “Elder Scrolls V: Skyrim” — Friday, but is also facing long-term challenges from Electronic Arts’ Origin service, cloud gaming service OnLive and an as-yet-unreleased online service from retailer GameStop.
Security, understandably, is the most pressing issue facing these services as they ask gamers to trust their saved data, credit cards and other personal information to off-site servers. Companies are also jumpy following the Sony data hack that pulled the PlayStation Network and Sony Online Entertainment services off line for a month and resulted in a lot of bad press for the electronics giant.
7 Things You Need To Know About Recent Web Hack Attacks
By Jeremiah Grossman
Citigroup, Sony, PBS, Sega, Nintendo, Gawker, AT&T, the Central Intelligence Agency, the United States Senate, NASA, Nasdaq, the NYSE, Zynga, BBC Music, the Royal Navy, and thousands of others have one thing in common – they have all fallen victim to hack attacks in the last year.
Jeremiah Grossman
Millions of credit-card numbers, customers’ personal information and records, not to mention gigabytes worth of intellectual property, have been compromised. And the onslaught shows no signs of stopping. The net result has been stark – hundreds of millions of dollars in corporate losses, sharp stock price declines, lawsuits, fines and costly downtime. Most alarmingly, it no longer matters whether a company is in financial services, retail, education, gaming, social networking, government, telecom, media or travel – no industry is immune to these breaches.
Citigroup, Sony, PBS, Sega, Nintendo, Gawker, AT&T, the Central Intelligence Agency, the United States Senate, NASA, Nasdaq, the NYSE, Zynga, BBC Music, the Royal Navy, and thousands of others have one thing in common – they have all fallen victim to hack attacks in the last year.
Jeremiah Grossman
Millions of credit-card numbers, customers’ personal information and records, not to mention gigabytes worth of intellectual property, have been compromised. And the onslaught shows no signs of stopping. The net result has been stark – hundreds of millions of dollars in corporate losses, sharp stock price declines, lawsuits, fines and costly downtime. Most alarmingly, it no longer matters whether a company is in financial services, retail, education, gaming, social networking, government, telecom, media or travel – no industry is immune to these breaches.
Sunday, November 13, 2011
8 Steps To Keep Your PCs Safe From Online Criminals
By Mike Cote
Mike Cote is vice president at Dell Secureworks.
Mike Cote is vice president at Dell Secureworks.
Mike Cote
With the diversity of security attacks globally, it is becoming increasingly difficult and complex for small and medium-sized businesses to assemble the right in-house resources to protect themselves against the cyber threats they face, whether it’s a data breach through the network, data leakage by employees, or lost laptops or mobile devices. We have also seen an uptick in the number of court cases, where SMBs have had six-figure amounts stolen out of their bank account by cyber thieves. The liability for these breaches is being shifted to the CIOs and IT managers, as SMBs are being accused of not taking the appropriate precautions to protect their data. The need for comprehensive information security is more pressing now than ever before.
With the diversity of security attacks globally, it is becoming increasingly difficult and complex for small and medium-sized businesses to assemble the right in-house resources to protect themselves against the cyber threats they face, whether it’s a data breach through the network, data leakage by employees, or lost laptops or mobile devices. We have also seen an uptick in the number of court cases, where SMBs have had six-figure amounts stolen out of their bank account by cyber thieves. The liability for these breaches is being shifted to the CIOs and IT managers, as SMBs are being accused of not taking the appropriate precautions to protect their data. The need for comprehensive information security is more pressing now than ever before.
Saturday, November 12, 2011
Homes & Small Businesses Network security tips
- A basic firewall or a unified threat management system.
- For Windows users, basic Antivirus software. An anti-spyware program would also be a good idea. There are many other types of antivirus or anti-spyware programs out there to be considered.
- When using a wireless connection, use a robust password. Also try to use the strongest security supported by your wireless devices, such as WPA2 with AES encryption.
- If using Wireless: Change the default SSID network name, also disable SSID Broadcast; as this function is unnecessary for home use. (However, many security experts consider this to be relatively useless).[5]
- Enable MAC Address filtering to keep track of all home network MAC devices connecting to your router.
- Assign STATIC IP addresses to network devices.
- Disable ICMP ping on router.
- Review router or firewall logs to help identify abnormal network connections or traffic to the Internet.
- Use passwords for all accounts.
- For Windows users, Have multiple accounts per family member and use non-administrative accounts for day-to-day activities.
- Disable the guest account[citation needed]
- Raise awareness about information security to children
Friday, November 11, 2011
Want to Enable GodMode in Windows 7? Here's how !!!
I thought this was a joke when I read it, but evidently not. If you want a quick way to get to all the settings on Windows 7 at a SINGLE PLACE.
Then.
GodMode is a great trick that allows you to access all Windows 7 configuration options from one location.
Windows 7 users are all abuzz about the OS and its GodMode. If you haven't heard of it, GodMode is a feature that was revealed by CNet's Microsoft Correspondent, Ina Fried. GodMode is a folder that brings together a long list of customization settings allowing you to change all your settings from one place. Neat huh? It's very easy to enable and damn useful if you tweak things around a lot.
I've broken it down into five-step process to avoid confusion:
Step 1: Right click.
Step 2: Click create folder.
Step 3: Rename Name your folder this to :-
GODMOD.{ED7BA470-8E54-465E-825C-99712043E01C}
Step 4: Blink as the folder changes form to look like the control panel.
Then.
GodMode is a great trick that allows you to access all Windows 7 configuration options from one location.
Windows 7 users are all abuzz about the OS and its GodMode. If you haven't heard of it, GodMode is a feature that was revealed by CNet's Microsoft Correspondent, Ina Fried. GodMode is a folder that brings together a long list of customization settings allowing you to change all your settings from one place. Neat huh? It's very easy to enable and damn useful if you tweak things around a lot.
I've broken it down into five-step process to avoid confusion:
Step 1: Right click.
Step 2: Click create folder.
Step 3: Rename Name your folder this to :-
GODMOD.{ED7BA470-8E54-465E-825C-99712043E01C}
Step 4: Blink as the folder changes form to look like the control panel.
Thursday, November 10, 2011
How Encryption Works
When we use the Internet, we're not always just clicking around and passively taking in information, such as reading news articles or blog posts -- a great deal of our time online involves sending others our own information. Ordering something over the Internet, whether it's a book, a CD or anything else from an online vendor, or signing up for an online account, requires entering in a good deal of sensitive personal information. A typical transaction might include not only our names, e-mail addresses and physical address and phone number, but also passwords and personal identification numbers (PINs).
The incredible growth of the Internet has excited businesses and consumers alike with its promise of changing the way we live and work. It's extremely easy to buy and sell goods all over the world while sitting in front of a laptop. But security is a major concern on the Internet, especially when you're using it to send sensitive information between parties.
Let's face it, there's a whole lot of information that we don't want other people to see, such as:
Credit-card information
Social Security numbers
Private correspondence
Personal details
Sensitive company information
Bank-account information
5 Tips to Improve Your Wireless Connection
Wireless technology makes it easy to get rid of the cables and take computing away from the desk. It's becoming the household norm, and while the technology is advancing quickly, there are some easy things you can do to improve your own wireless connectivity.
1: Position Your Router
2: Replace your Antenna
3: Get a Repeater
4: Get an Antenna Booster
5: Upgrade Firmware
Wednesday, November 9, 2011
How to Detect if Someone's Stealing Your WiFi
Okay, it's time to get down to it. Is your wireless network running slowly? Do you have intermittent losses in Internet access and you can't figure out why? Chances are, you've already detected a WiFi squatter and didn't even know it. If you regularly experience these problems, maybe you have something wrong with your wireless connection. But if you're suddenly having intermittent problems with your Internet performance, especially at the same time each day, it's a red flag that someone is piggybacking off your wireless connection and it's time for you to diagnose your WiFi network.
The first and simplest thing you can do is check out your wireless network connection and see if it's secure. When you install your router, you're given the option of setting a wireless encryption protocol (WEP) key. Basically this is a password-protected method for you to log on to your own wireless network. If you don't have one, you're operating an open network. That means anyone within range can use your wireless for free. While it's not hacking, it is debatable as to whether this is actually stealing. In any case, if you don't have a WEP key, you're vulnerable to WiFi squatting and certainly not deterring squatters.
Even if you have a WEP key, that doesn't necessarily mean your neighbor hasn't bypassed it. To determine if he or she is logging onto your wireless network, you can do so by checking your wireless network log. To do this, click your Start Menu in Microsoft Windows, then double-click My Network Places. Next, double-click View Entire Network. If there are more devices connected than you have allowed on your network, you have WiFi thieves.
A similar method to determining the status of your WiFi user list is to check your router's DHCP client table. Much like viewing your network, your DHCP client table will list the machines on your network. If the number exceeds what you've set up, you have someone stealing your WiFi.
Nobody wants to be taken advantage of. What's more, you certainly don't want illegal information flowing through your wireless network. That's why you need to take matters in your own hands. The final section will give you the power to thwart off Internet thieves and protect your wireless connection. Are you ready to fight back? Turn the page to learn how.
10 Worst Computer Viruses of All Time
Computer viruses can be a nightmare. Some can wipe out the information on a hard drive, tie up traffic on a computer network for hours, turn an innocent machine into a zombie and replicate and send themselves to other computers. If you've never had a machine fall victim to a computer virus, you may wonder what the fuss is about. But the concern is understandable -- according to Consumer Reports, computer viruses helped contribute to $8.5 billion in consumer losses in 2008 [source: MarketWatch]. Computer viruses are just one kind of online threat, but they're arguably the best known of the bunch.
Computer viruses have been around for many years. In fact, in 1949, a scientist named John von Neumann theorized that a self-replicated program was possible [source: Krebs]. The computer industry wasn't even a decade old, and already someone had figured out how to throw a monkey wrench into the figurative gears. But it took a few decades before programmers known as hackers began to build computer viruses.
While some pranksters created virus-like programs for large computer systems, it was really the introduction of the personal computer that brought computer viruses to the public's attention. A doctoral student named Fred Cohen was the first to describe self-replicating programs designed to modify computers as viruses. The name has stuck ever since.
In the good old days (i.e., the early 1980s), viruses depended on humans to do the hard work of spreading the virus to other computers. A hacker would save the virus to disks and then distribute the disks to other people. It wasn't until modems became common that virus transmission became a real problem. Today when we think of a computer virus, we usually imagine something that transmits itself via the Internet. It might infect computers through e-mail messages or corrupted Web links. Programs like these can spread much faster than the earliest computer viruses.
We're going to take a look at 10 of the worst computer viruses to cripple a computer system. Let's start with the Melissa virus.
- Melissa
- ILOVEYOU
- The Klez Virus
- Code Red and Code Red II
- Nimda
- SQL Slammer/Sapphire
- MyDoom
- Sasser and Netsky
- Leap-A/Oompa-A
- Storm Worm (The latest virus on list)
Famous Hackers
Steve Jobs and Steve Wozniak
Steve Jobs and Steve Wozniak, founders of Apple Computers, were both hackers. Some of their early exploits even resembled the questionable activities of some malicious hackers. However, both Jobs and Wozniak outgrew their malicious behavior and began concentrating on creating computer hardware and software. Their efforts helped usher in the age of the personal computer -- before Apple, computer systems remained the property of large corporations, too expensive and cumbersome for average consumers.
Kevin Mitnick
Steve Jobs and Steve Wozniak, founders of Apple Computers, were both hackers. Some of their early exploits even resembled the questionable activities of some malicious hackers. However, both Jobs and Wozniak outgrew their malicious behavior and began concentrating on creating computer hardware and software. Their efforts helped usher in the age of the personal computer -- before Apple, computer systems remained the property of large corporations, too expensive and cumbersome for average consumers.
Linus Torvalds, creator of Linux, is another famous honest hacker. Hisopen source operating system is very popular with other hackers. He has helped promote the concept of open source software, showing that when you open information up to everyone, you can reap amazing benefits.
Richard Stallman, also known as "rms," founded the GNU Project, a free operating system. He promotes the concept of free software and computer access. He works with organizations like the Free Software Foundation and opposes policies like Digital Rights Management.
On the other end of the spectrum are the black hats of the hacking world. At the age of 16, Jonathan James became the first juvenile hacker to get sent to prison. He committed computer intrusions on some very high-profile victims, including NASA and a Defense Threat Reduction Agency server. Online, Jonathan used the nickname (called a handle) "c0mrade." Originally sentenced to house arrest, James was sent to prison when he violated parole.
Kevin Mitnick
Kevin Mitnick gained notoriety in the 1980s as a hacker who allegedly broke into the North American Aerospace Defense Command (NORAD) when he was 17 years old. Mitnick's reputation seemed to grow with every retelling of his exploits, eventually leading to the rumor that Mitnick had made the FBI's Most Wanted list. In reality, Mitnick was arrested several times for hacking into secure systems, usually to gain access to powerful computer software.
How to Secure Your Home Network
We've been treated to some pretty entertaining feats of espionage courtesy of Hollywood. Who can forget the way Tom Cruise dangled from the ceiling as he attempted to crack into a computer security system in "Mission Impossible?" Or how about the mysterioushacker who seems to slip past every security to corrupt the Rossum Corporation's data in the "Dollhouse" television series? Hacking into a network must require superhuman skills and knowledge, right?
You might be surprised to learn how easy it is for someone to hack into a computer network. The fact is that many computer networks are practically defenseless to intruders. In the early days of home computer networks, the people who put the networks together were experts and enthusiasts. They put their systems together knowing how computers can communicate with each other and built in protective measures to prevent other computer users from snooping.
Today, home computer networks are popular among a broad range of consumers. User knowledge spans from expert to newbie. Some users may be unaware of the dangers they can encounter if they don't properly secure their network. Others may think home network security is too complicated or confusing. But network security is more important than ever and it's worth the effort to learn more about it.
An unprotected network could allow malicious hackers -- known as crackers -- access to your data. It might even allow someone to take control of your computers and use them to commit crimes like a distributed denial of service attack (DDoS). Even if no one snoops on your information or controls your computer, someone might use your network to access the Internet. As more ISPs begin to place caps on how much data you can download, it becomes even more important to control your network. You don't want to get slapped with a huge bill for Internet services you didn't even use.
With the right tools and knowledge, you can minimize your chances of having your security compromised by malicious hackers or computer viruses. Let's get started.
How Hackers Work
Thanks to the media, the word "hacker" has gotten a bad reputation. The word summons up thoughts of malicious computerusers finding new ways to harass people, defraud corporations, steal information and maybe evendestroy the economy or start a war by infiltrating military computer systems. While there's no denying that there are hackers out there with bad intentions, they make up only a small percentage of the hacker community.
The term computer hacker first showed up in the mid-1960s. A hacker was a programmer -- someone who hacked out computer code. Hackers were visionaries who could see new ways to use computers, creating programs that no one else could conceive. They were the pioneers of the computer industry, building everything from small applications to operating systems. In this sense, people like Bill Gates, Steve Jobs and Steve Wozniak were all hackers -- they saw the potential of what computers could do and created ways to achieve that potential.
A unifying trait among these hackers was a strong sense of curiosity, sometimes bordering on obsession. These hackers prided themselves on not only their ability to create new programs, but also to learn how other programs and systems worked. When a program had a bug -- a section of bad code that prevented the program from working properly -- hackers would often create and distribute small sections of code calledpatches to fix the problem. Some managed to land a job that leveraged their skills, getting paid for what they'd happily do for free.
As computers evolved, computer engineers began to network individual machines together into a system. Soon, the term hacker had a new meaning -- a person using computers to explore a network to which he or she didn't belong. Usually hackers didn't have any malicious intent. They just wanted to know how computer networks worked and saw any barrier between them and that knowledge as a challenge.
In fact, that's still the case today. While there are plenty of stories about malicious hackers sabotaging computer systems, infiltrating networks and spreading computer viruses, most hackers are just curious -- they want to know all the intricacies of the computer world. Some use their knowledge to help corporations and governments construct better security measures. Others might use their skills for more unethical endeavors.
In this article, we'll explore common techniques hackers use to infiltrate systems. We'll examine hacker culture and the various kinds of hackers as well as learn about famous hackers, some of whom have run afoul of the law.
How Trojan Horses Work
One of the most enduring stories of the Trojan War, the most important conflict in Greek mythology, is the tale of the Trojan horse. Trying to find a way into the city of Troy, the great warrior Odysseus ordered his men to build a massive wooden horse, one big enough for several Greek soldiers to fit in. Once the structure was finished, he and several other warriors climbed inside, while the rest of the Greeks sailed away from Troy. One man named Sinon, however, stayed behind in order to deceive the Trojans, convincing them that his fellow Greeks had betrayed him and fled from the city. The wooden horse, he told the Trojans, was safe and would bring them luck.
After some discussion over the matter, the Trojans agreed to wheel the horse through their gates, unknowingly giving the Greek enemy access to the city. After proclaiming victory and partying all night, the citizens of Troy went to sleep -- it was then that Odysseus and his men crept out of the Trojan horse and wreaked havoc on the city.
Video Trojan Horses Working exploitation. click here
Video Trojan Horses Working exploitation. click here
Although you've probably heard of the Trojan horse from Greek mythology, chances are you've also heard of Trojan horses in reference to computers. Trojan horses are common but dangerous programs that hide within other seemingly harmless programs. They work the same way the ancient Trojan horse did: Once they're installed, the program will infect other files throughout your system and potentially wreak havoc on your computer. They can even send important information from your computer over the Internet to the developer of the virus. The developer can then essentially control your computer, slowing your system's activity or causing your machine to crash.
Though they're not actually viruses, they're referred to as "Trojan horse viruses," "Trojan viruses," "Trojan horses" or just plain "Trojans." Regardless of what people call them, they all mean same thing. But what happened? How did you let this Trojan horse into your computer in the first place? And what can you do stop one from getting in?
Subscribe to:
Posts (Atom)