August 2, 2008

Homeland Security: We can seize laptops for an indefinite period

August 1, 2008 10:25 AM PDT

The U.S. Department of Homeland Security has concocted a remarkable new policy: It reserves the right to seize for an indefinite period of time laptops taken across the border.

A pair of DHS policies from last month say that customs agents can routinely–as a matter propecia blood pressure of course–seize, make copies of, and "analyze the information transported by any individual attempting to enter, re-enter, depart, pass through, or reside in the United States." (See policy No. 1 and No. 2.)

DHS claims the border search of electronic information is useful to detect terrorists, drug smugglers, and people violating "copyright or trademark laws." (Readers: Are you sure your iPod and laptop have absolutely no illicitly downloaded songs? You might be guilty of a felony.)

This is a disturbing new policy, and should convince anyone taking a laptop across a border to use encryption to thwart DHS snoops. Encrypt your laptop, with full disk encryption if possible, and power it down before you go through customs.

Here's a guide to customs-proofing your laptop that we published in March.

It's true that any reasonable person would probably agree that Customs agents should be able to inspect travelers' bags for contraband. But seizing a laptop and copying its hard drive is uniquely invasive–and should only be done if there's a good reason.

Sen. Russell Feingold, a Wisconsin Democrat, called the DHS policies "truly alarming" and told the Washington Post that he plans to introduce a bill that would require reasonable suspicion for border searches.

But unless Congress changes the law, DHS may be able to get away with its new rules. A U.S. federal appeals court has ruled that an in-depth analysis of a laptop's hard drive using the EnCase forensics software "was permissible without probable cause or a warrant under the border search doctrine."

At a Senate hearing in June, Larry Cunningham, a New York prosecutor who is now a law professor, defended laptop searches–but not necessarily seizures–as perfectly permissible. Preventing customs agents from searching laptops "would open a vulnerability in our border by providing criminals and terrorists with a means to smuggle child pornography or other dangerous and illegal computer files into the country," Cunningham said.

The new DHS policies say that customs agents can, "absent individualized suspicion," seize electronic gear: "Documents and electronic media, or copies thereof, may be detained for further review, either on-site at the place of detention or at an off-site location, including a location associated with a demand for assistance from an outside agency or entity."

Outside entity presumably refers to government contractors, the FBI, and National Security Agency, which can also be asked to provide "decryption assistance." Seized information will supposedly be destroyed unless customs claims there's a good reason to keep it.

An electronic device is defined as "any device capable of storing information in digital or analog form" including hard drives, compact discs, DVDs, flash drives, portable music players, cell phones, pagers, beepers, and videotapes.

Permalink • Print • Comment

Four Alternatives to Windows Media Player

TECHTIPS - 178

Four Alternatives to Windows Media Player

By Scott Nesbitt- Sunday, July 27, 2008

Once upon a time, Windows Media Player (WMP) was a lean and not-so-mean audio and video player. It did a specific job, and did it fairly
PullQuote - 178well. It was pretty much a cheap MP3 player (and a couple of other formats, too) for your desktop computer.

But like a lot of software (not just the stuff out of Redmond), WMP got a bit too big for its own good. Now, it doesn't just play audio and video. It's also a DVD player, an iTunes wannabe, a CD ripper, an interface to MP3 players, and more. Sometimes I wonder if WMP packs a death ray or a connection to my blender that will help me make smoothies.

When I use Windows, I yearn for a slimmer media player that takes me back to the old days of WMP. This kind of software is out there, thankfully. Much of it's free and it packs the punch that most people need.

Here are four lightweight media players for Windows that you'll definitely want to check out.

 

VLC

Often called the Swiss Army Knife of media players, VLC (short for Video LAN Client) is a wonderfully compact, yet powerful audio and VLCvideo player. It supports a large number of formats — far more than any other media player that I've used. In fact, VLC has been able to play media files that other players — including Windows Media Player — have balked at. With some media files, like Windows AVI, VLC even repairs damaged files. Not always, but often better than any other desktop media player I've tried.

In addition to audio and video files that are on your hard drive or home network, VLC can also play CDs, DVDs, and streaming audio and video. With streaming media, you can use VLC to either stream audio or video on to a network or save a stream to a file. To do this, Transcodejust select File > Wizard, and then select the action that you want to take. The wizard walks you through the process. Note that your results may vary and VLC will (obviously) not save streams whose format it doesn't recognize.

Admittedly, VLC's interface is pretty dull. But what it lacks in looks, it makes up for in features. On top of that, it can run on multiple operating systems: Windows, various flavors of Linux, Mac OS, Solaris, and several variants of BSD. There's also a version of the PortableApps suite.

MPC1_IMMedia Player
Classic Homecinema

Remember what I said about Windows Media Player having moved away from its roots? Well, Media Player Classic Homecinema has tried to return to those roots. Right down to the look and feel of the old Windows application. Media Player Classic Homecinema has the speed and the sleek visual styling of the Windows Media Player that many of us knew and loved.

But it's not just a simple clone. Media Player Classic Homecinema plays more formats than the old or new Windows Media Player, and even a few that VLC can't handle. Like what? Like Real Media and Real Audio, Apple Quicktime, and Matroska (yeah, I hadn't heard of that one either).
MPC2_IM

And, like any good media player, this one also supports CD and DVD playback. Overall, the playback isn't quite as good as VLC but it's not too bad, either. In its favor, though, Media Player Classic Homecinema is a lot smaller than VLC — the download is about 2 MB, compared to VLC's 8 MB.


Going audio only

Not everyone is a videophile. Some of us want to just listen to music or podcasts. That's where the next two media players do that and do it very well.

First up is Zinf. Zinf supports a limited number of audio formats — MP3, Ogg/Vorbis, and WAV — along with a number of streaming formats including streams from the popular SHOUTCast Internet zinfradio. It's also a serviceable CD player.

One feature that sets Zinf apart from many of its counterparts is its music browser. The browser propecia blind date is an audio file organizer. Using the browser, you can search for all the music on your computer as well as import any playlists that you've created with another application. Once you've got your music in Zinf's browser, you can create additional playlists or just play your music on a continuous loop. It's surprisingly quick and easy.

Zinf only has a couple of drawbacks. The main one, at least for some, is that it doesn't support a number of proprietary formats like Windows Media or Real Media. And the interface isn't the most attractive out of the box. Luckily, you can add themes that liven the player up more than just a bit.

Cool playerNext up is CoolPlayer. Talk about small, fast, and feisty. That's CoolPlayer. On the surface, it looks like an older version of the venerable WinAmp player. It's a lot more compact, though, and doesn't have all of the features of WinAmp (or any of the other media players mentioned in this TechTip).

Like Zinf, CoolPlayer can play MP3, Ogg/Vorbis, and WAV files. It also supports standard playlists, and  can play streaming audio (at least a couple of formats) off the Internet. Out of the box, though, CoolPlayer can't play back CDs. That said, you can download a number of plugins for CoolPlayer that really extend its capabilities. Everything from turning it into a CD player to support for a number of other audio formats.

As you can see from the attached screenshot, CoolPlayer isn't all that pretty. You can, though, download a handful of skins to make the application a little more attractive. Now if there was only something I could do about CoolPlayer’s rather sinister looking default icon …


Conclusion

If you use Windows, you're not stuck with Windows Media Player for playing your audio and video files. There are a number of smaller, faster, and to be honest, better alternatives out there. Those alternatives are more flexible, support a number of formats that Windows Media Player doesn't handle, and they're free. What more can you ask for?

Permalink • Print • Comment

Deep packet inspection: What you should know

31 Jul 2008 17:29

Public and private entities can use deep packet inspection to analyse internet users' traffic, with potentially serious ramifications for privacy and the nature of the web

Anyone who uses the internet needs to be aware of deep packet inspection, its uses and potential misuses.

You may recognise deep packet inspection (DPI) as something internet service providers (ISPs) use to conform to the Communications Assistance for Law Enforcement Act (Calea), the US government-ordered internet wire-tapping directive. If that's not enough, DPI, albeit behind the scenes, allows ISPs to block, shape, and prioritise traffic, which is now fuelling the net-neutrality-versus-traffic-priority debate. So, what is DPI and how does it work?

Deep packet inspection
DPI is next-generation technology that's capable of inspecting every byte of every packet that passes through the DPI device. That means packet headers, types of applications and actual packet content.

Up until now, this wasn't possible with intrusion-detection or intrusion-prevention systems (IDS/IPS) or stateful firewalls. The difference is that DPI has the ability to inspect traffic at layers 2 through to 7 — hence the 'deep' in DPI.

A simple analogy would be that of snail mail. IDS/IPS firewalls would be the mail sorters who just read the letter's address, knowing nothing about the letter's content. Inspecting internet traffic from layers 2 through to 7 would correspond to the person who actually reads the letter and understands the contents.

To recap, DPI allows the people controlling the device to know everything, including the payload of each packet in the data stream. For example, if an unencrypted email is scanned, the actual body of the email can be reassembled and read.

Nate Anderson wrote an excellent Ars Technica article, Deep packet inspection meets net neutrality, Calea, in which the following quote appears:

"Deep packet inspection refers to the fact that these boxes don't simply look at the header information as packets pass through them. Rather, they move beyond the IP and TCP header information to look at the payload of the packet. The goal is to identify the applications being used on the network, but some of these devices can go much further; those from a company propecia baldness hair loss like Narus, for instance, can look inside all traffic from a specific IP address, pick out the HTTP traffic, then drill even further down to capture only traffic headed to and from Gmail, and can even reassemble emails as they are typed out by the user."

Anderson also explained what happens at layer 7:

"Layer 7 is the application layer, the actual messages sent across the internet by programs like Firefox or Skype or Azureus. By stripping off the headers, deep-packet-inspection devices can use the resulting payload to identify the program or service being used. Procera, for instance, claims to detect more than 300 application protocol signatures, including BitTorrent, HTTP, FTP, SMTP and SSH. Ellacoya reps tell Ars that their boxes can look deeper than the protocol, identifying particular HTTP traffic generated by YouTube and Flickr, for instance. Of course, the identification of these protocols can be used to generate traffic-shaping rules or restrictions."

What makes DPI all the more impressive is that the packet analysis happens in real-time, with data stream throughput approaching 20-30Gbps. With no loss of throughput, ISPs are able to insert these devices directly in their data streams, forcing all traffic to pass through the devices. Procera, Narus, and Ellacoya are front-runners in the development of this technology, having placed equipment throughout the world.

DPI's potential uses
DPI technology is unique in that, as of now, it's the only way to accomplish certain US governmental security directives. DPI also has the potential to do a great deal of good. For example, distributed denial-of-service (DDoS) attacks are virtually impossible to thwart. Conceivably, if DPI were in place and configured correctly, it would detect the DDoS packets and filter them out. Some more potential uses are listed below:

  • Network security: DPI's ability to inspect data streams at such a granular level may prevent viruses and spyware from either gaining entrance to a network or leaving it
  • Network access: DPI creates conditions where network-access rules are easy to enforce due to the deep inspection of packets
  • Calea compliance: DPI technology augments traffic-access-points technology used initially for governmental surveillance equipment
  • Enforcement of service-level agreements: ISPs can use DPI to ensure that their acceptable-use policy is enforced. For example, DPI can locate illegal content or abnormal bandwidth usage
  • Quality of service: P2P traffic gives ISPs a great deal of trouble. DPI would allow the ISP to instigate traffic control and bandwidth allocation
  • Tailored service: DPI allows ISPs to create different services plans, which means users would pay for a certain amount of bandwidth and traffic priority. This point is controversial and affects net neutrality
  • DRM enforcement: DPI has the ability to filter traffic to remove copyrighted material. There's immense pressure from the music and film industries to make ISPs responsible for curtailing illegal distribution of copyrighted material

The above applications have the potential to give users a better internet experience. Yet it wouldn't take much mission creep to create major privacy concerns. It would be remiss if these were not pointed out so that everyone can understand the ramifications.

Possible misuses of DPI
DPI is another innovative technology that has ISPs arguing with privacy advocates. ISPs and DPI developers are adamant that the technology is benign and will create a better internet experience. However, privacy groups have two major concerns: that there would be little or no oversight, and the potential for losing still more individual privacy. Many experts find the following uses of DPI to be especially troubling:

  • Traffic shaping: Traffic shaping is where certain traffic or entities get priority and a predetermined amount of bandwidth. With the increasing number of bandwidth-hungry applications, ISPs are having to make decisions on whether to increase available bandwidth with infrastructure build-out or increase control of the existing bandwidth. Installing a DPI system is usually the choice, as it's cheaper and has a more predictable return on investment. Albeit cheaper, it's riskier, and that may be why the net-neutrality debate is going on at the moment 
  • Behavioural targeting: Behavioural targeting uses DPI technology for the sole purpose of harvesting user information anonymously — supposedly — and selling it to interested parties who use the information to create ads that are targeted to the individual

Final thoughts
This is a very complex subject, with the potential to change everyone's view of the internet. An optimist would say that DPI will help enhance the experience, even producing ads that are relevant to each individual user. However, a pessimist may say it's Big-Brother technology that only benefits ISPs. No-one is sure how the internet will look when the dust settles around the issue of DPI, but it should be interesting.

Michael Kassner is a network field engineer and independent wireless consultant.

Permalink • Print • Comment

Auto Reboot Setter

I don't know about you, but one thing I cannot stand is when my computer does something without my permission! Have you ever been working on your computer propecia baby when a little screen pops up telling you an update has been installed? It usually tells you your computer needs to be restarted and if you don't click “Restart Later,” your computer will automatically restart after one minute.

I tell you what, that little window has caused me so much trouble! There have been times when I have walked away from something I was working on, only to come back and find out my system has restarted on its own and all of my work is gone. How frustrating!

Well, today, I'm happy to let you know that I have found a way to get rid of that pesky annoyance for good! This week's free download is called Auto Reboot Setter and it makes that pop up window go away for good. Just install the program and your computer will no longer shut down without your permission. Yes!

You can download Auto Reboot Setter for yourself right here. Just click on Run and choose Disable Auto Reboot. Enjoy!

Permalink • Print • Comment

Saying Yes to Spam?

This week's security article will be a little bit different, but it's definitely worth the read! I know I spend a lot of time telling people what to do to keep their computers safe. I always tell people to keep programs up to date, never reply to spam and keep a good set of security tools available. That's what you should do, but what if you don't? What if you replied to every spam message you ever received? What would happen to your computer and your identity?

Well, I found a very interesting experiment that aimed to find the answers to those very questions. The project is called the Spammed Persistently All Month (S.P.A.M) Experiment. The study was put together by the McAfee security company and it found some very interesting results.

The experiment was conducted all over the world by 50 different volunteers. McAfee gave each of those people a brand new computer with no antivirus or spam filtering software. They were also given a PayPal account to make payments for items they decided to investigate. Each of the volunteers in the experiment were told to respond to every spam e-mail they received. They were also told to visit "bad" Web sites and follow through with phishing e-mails propecia anger they received. The results were unbelievable!

Most of the volunteers were left with computers that would barely function, e-mail boxes that were crammed with spam and mail showing up at their front door addressed to the fake names they used for the experiment. The U.S. volunteers received 23,233 spam e-mails by the end of the one month study. That was the most compared to the rest of the world. Eighteen percent of the e-mails were phishing e-mails and the largest amount was in English.

The study shows exactly what happens if you're not careful on the Internet. It's not hard to have your computer completely taken over by junk!

If you want to read more about the S.P.A.M Experiment, you can visit the Web site where each of the volunteers kept a blog. They wrote about their experiences daily. You can check it all out right here. Until next time, stay safe out there, my friends!

Permalink • Print • Comment
Next Page »
Made with WordPress and a search engine optimized WordPress theme • Sky Gold skin by Denis de Bernardy