June 10, 2008

Wireless Security

The ability to share an Internet connection is great and the ability to do this wirelessly is even better. Wireless networks are easy to install—you don't have to run cables, and you can roam around a location within the WLAN (wireless local area network), or physical range of wireless connectivity ( here's a way to get started ). These features are what makes wireless networks so popular with both end users, and hackers.

The one problem with wireless networks is the vulnerability of your network. A typical hardwired network has physical security due to limited access to the actual network and one opening to the internet (Gateway) has a firewall or two in place (or it had better). This can stop most unauthorized access to your network. The difficulty in setting up wired networks has discouraged a lot of people from installing networks in the first place.

Then a long came the wireless which, as I stated earlier in the article, made the home networking game more appealing and not as intimidating. Having a wireless network means that the physical security that is inevitable in a wired network is simply not there. Anyone in the range of your wireless network can see your network, and if not secured properly, can gain access. If your wireless access point isn't the router on your network then outsiders can slip in behind your firewall. This used to happen at my college—there was an apartment complex behind a portion of the school, and the other techs would piggyback on some guy's network. He had an unsecured wireless network—no one did anything bad to him (at least to my knowledge)—they just used him for Internet access but he never knew.

There are some practices you can perform to insure that no one is using your connection or trying to get on your personal network. First and foremost you need to get WEP (Wired Equivalent Protection) in place, which is an encryption that stops unauthorized users from accessing your network. There are at least two encryption types in 802.11b (128bit, and 64bit) and should probably be changed every other week or so. WEP encryption used to be completely the user's responsibility, but now I'm seeing hardware out of the box with at least one encryption key configured, forcing the user to configure his PCs in order to connect.

Using WEP is essential to wireless security, but don't rely on it alone, there are other security measures you can put in place as well. With some wireless units you can set a MAC address filters, witch can really beef up your security. A MAC address is an identification number the manufacturer stamps on a network device, and is (or should be) completely unique. If this security is in place then even if someone knows the WEP Key they still cannot get into the network because your wireless access device will deny it.

There buy cheap generic propecia are two other things you might want to do to tighten up your network: The first thing you should do is go through and change all of the default security settings, and passwords. The reason I said this is most Routers and access points usually have a lot of these configuration fields (i.e. username and password or the SSID ) filled out with generic values for ease of setup. The bad thing about this is that people can use these settings against you to gain access into your network. Secondly, with a lot of routers your SSID is set to broadcast by default, this means that it's broadcasting your network's name to the physical reaches of your network. Not good, even if your neighbors don't have the security rights to access your network they will constantly see it every time they boot up one of their wireless PC's.

Through the use of these practices you will not only protect your network, but render it practically invisible, and that's what you want. Just a side note before I go, if one day you boot up your wireless PC and you see a new connection that isn't secure, please take it easy on 'em, it's probably your neighbor. You have to remember not everyone is as informed or prepared as the Worldstart Readers and if your feeling nice go over and warn them to tighten up there network before someone not nice finds it open.

Stay safe out there,

Permalink • Print • Comment

June 9, 2008

Safe Browsing

I always say you shouldn't go to Web sites you don't trust, but what if you're not sure if you can trust a certain site or not? What do you do then? This type of problem is pretty common and in the past, it has left me wondering what to do. Well, today, I have a very easy answer to that question!

The answer is a service by Google called Google Safe Browsing Diagnostic. With this tool, you can type a Web address into your browser's address bar and get a report from Google, telling you whether the site is safe or not.

Here's how you do it:

First, you will need this address: http://www.google.com/safebrowsing/diagnostic?site=www.worldstart.com

The address above is what you can use to get a report. If you copy the exact address from above and paste it into your Web browser, you will get a report about www.worldstart.com that looks like this:

Pretty neat, huh?! Now, that's great for seeing a report about WorldStart, but you already know we're safe, so what about a report for another Web site?

To see a report about any other site, simply use the exact same address as above, but change the end of it. See the part at the end that says “www.worldstart.com?” Just erase that and type in any other Web address. For example, if you changed it to: http://www.google.com/safebrowsing/diagnostic?site=www.aol.com, you would get a report for AOL's safety rating.

The Google Safe Browsing Diagnostic is very nice to use for checking a Web site before you visit it. If you want, you can bookmark it and use it whenever you need it. Until next best price propecia time, stay safe out there, my friends!

Permalink • Print • Comment

Firewall Tests

Another reader asked: I sometimes worry that my firewall isn’t doing all that it should. Do you know of any way I can test it to make sure the wrong things aren’t getting through? Please help!

That is an excellent question! Plus, it’s great that you’re even wondering about this. That means you really care about your computer and what happens to it on a day to day basis. A firewall is one of the most important parts of your computer. It’s your main gateway to the Internet and it helps connect you to everything you need as you go about your business. A firewall monitors the programs you use, keeping you safe from any internal harm.

Firewalls are even more important today, as we are being exposed to more and more threats, viruses, spyware, software vulnerabilities, etc. everyday. A computer’s firewall is the first line of defense when it comes to stopping all of those things from wreaking havoc on your computer. So, with all of that said, it’s very important to keep a close eye on your firewall. And as the person who asked this question stated, yes, there are some ways you can test your firewall to make sure everything is still running properly. Keep reading to learn about your options!

Security researchers have developed what are called leak testers that you can use to test the different capabilities of your firewall. Basically, if the test is able to get through your computer’s security setup, a hacker will be able to as well. Now, there are several different leak testers you can try and each of them test a different part of the firewall. The following list is just a few that any home or advanced user can use. Let’s check them out!

1.) PCFlank Leaktest: This particular utility tests a firewall’s ability to protect your computer from any unauthorized or illegal data transmissions when you’re connected to the Internet. Basically, it acts like another program your firewall has been taught to trust to see what will happen. This is a good test for any programs you use while online. If you’re interested in using the PCFlank Leaktest, you can download it right now, right here.

2.) Breakout: This one is a little more complicated, but it’s still a very good leak test. Breakout is basically used with Internet Explorer and Firefox. It sends a URL to either of the browser’s (whichever you use) address bar and tells it to launch by using the “Send Message” Windows API feature. No code is used during the process, which makes it hard for a firewall to detect anything. If the test goes through successfully, that means your firewall is not set up to check for the messages sent to your application windows. If you want to try Breakout for yourself, you can download it from this link for IE or this link for Firefox.

3.) MBTest: MBTest works by sending data packets directly to your network interface to try and pass over the firewall. The packets are all different sizes, protocols and types. If this test goes through successfully, it means your firewall only tests the high level networks and not the low levels, which it should. You can download MBTest here. (Yes, the first part of that page is in another language, but just click on the link that says “MBTest.exe” to get started).

4.) Atelier Web Firewall Tester: This particular one actually checks your personal firewall with six different tests. Each one uses a different technique to try and gain access to the world outside of your firewall. If your firewall is able to score at least 10 points total, it’s doing a fine job. Download this leak test for yourself right here.

5.) ZABypass: This test was actually designed to work with the ZoneAlarm firewall, but it works with many others today. ZABypass uses a technique called Direct Data Exchange to transfer data between Internet Explorer and the Internet. It then checks your firewall from there. Give it a try for yourself by downloading it from this link.

best generic propecia

6.) FireHole: This leak test works by launching your default browser, inserting its own DLL into it and then trying to establish an Internet connection. You can download FireHole right here.

7.) Thermite: This is the last one in the list and it works by creating an additional malicious thread into a process you’re trying to do. It then injects its code into that process directly. If the test goes through successfully, your firewall is vulnerable to process injection. Download Thermite for yourself by clicking right here. (And yes, you’ll notice a different language on this one as well, but the download will be fine).

There you have it! Seven of the best leak tests available today. Depending on what you want to check within your firewall, one of these is sure to help you out. They are all free downloads, so you don’t have to worry about paying any fees just to get the job done. Again, leak tests are just there for you to test different possible flaws in your firewall. With all the different kinds of threats looming around the Internet today, it’s nice to know there’s a quick test you can use to make sure yours is running properly and giving you adequate protection. I hope you find what you’re looking for!

Permalink • Print • Comment

May 24, 2008

Automatically generate and assign strong passwords in Windows XP

Date: May 21st, 2008

Author: Greg Shultz

Computer users consistently use very simplistic logic when creating passwords. For example, many of us choose meaningful words, personal dates, or a word commonly found in the dictionary because it makes the password easy to remember. These common practices cause us to sacrifice the security that passwords are intended to provide.

If you’re really at a loss when it comes to thinking of a strong password, you can let Windows XP create and assign a random password to your account. To let Windows XP generate your password, follow these steps. (Warning: Before you follow these steps, please be sure that you are paying careful attention and are ready to actually use a password that might not be as memorable as you’re accustomed to! Also, you cannot use this tip on a Windows Server domain.)

  1. Open a Command Prompt window and type:

    net user username /random (username is your login account name)

  2. Press [Enter]. Windows XP will randomly generate a secure password, as well as assign that strong password to your account. Windows XP will also display the strong password so you can remember it.

At your discretion, you may want to create a Password Reset Disk at this point. what does viagra do to men This disk will allow you to gain access to your computer in the event you forget your password. Here’s how to create the disk:

  1. Open the Control Panel and double-click the User Accounts tool.
  2. Click your account icon.
  3. Select Prevent A Forgotten Password under Related Tasks.
  4. Follow the instructions provided by the wizard.

Note: This tip applies to both Windows XP Home and Windows XP Professional systems in either a standalone or peer-to-peer workgroup configuration.

Permalink • Print • Comment

May 1, 2008

Thwart malware attacks by locking out bad sites

Scott Dunn By Scott Dunn

Bolster your antivirus, firewall, and antispyware protection by customizing the IP address manager built into Windows.

Redirect ad servers and other undesirable addresses in Windows’ Hosts file and update your unwanted-address list automatically for free with the HostsMan utility.

Forward undesirable IP addresses to Nowheresville

No single security program is guaranteed to keep you safe. That’s why you need to take a multilayered approach to PC safety. A quick, simple, and free way to strengthen your defenses is by editing Windows’ built-in IP address book, a.k.a. the Hosts file.

This system file converts domain names, such as “www.google.com,” into their corresponding IP addresses. In IPv4, the address is four sets of one-to-three numbers, with each set separated by a period. (For example, the last time I pinged www.google.com, the IP address was 74.14.253.99, though the service has oodles of addresses.)

The Hosts file performs a function similar to that of the DNS (Domain Name System) used by network servers. But unlike DNS, the Hosts file is under your control and overrides any mappings found in the DNS.

For example, when you enter a name such as WindowsSecrets.com in your browser’s address bar, the browser checks the Hosts file to see whether the domain name’s corresponding IP address is listed there. If the address isn’t in the file, the browser looks for it on a DNS server and then makes the connection.

By modifying the Hosts file yourself, you can prevent anyone using the PC without an administrator account from accessing unwanted sites. Prime candidates for blocking via this method are sites that host advertising, which can sometimes be a conduit for malware, as I explained in my Apr. 17 story.

To block a file served by the DoubleClick ad server, for example, you would add this line to your Hosts file:

127.0.0.1 ad.doubleclick.net

That’s because “127.0.0.1” is the local machine’s IP address, so your browser looks in vain on your own computer for files that are supposed to come from DoubleClick.

This technique not only blocks ads from the redirected sites, but also cookies and any other content they attempt to send.

Automate your Hosts-file tweaking

Of course, manually editing the Hosts file to include the hundreds of ad servers and other undesirable sites on the Internet — not to mention keeping it up to date — would be a Herculean chore.

Fortunately, a number of sites maintain files listing dangerous addresses with this very purpose in mind, and they make updates available on a regular basis. The most popular of these sites is WinHelp 2002, which orignally focused on blocking ads and banners but has since expanded to guard against many Internet threats.

Other useful sources for prefab Hosts files are Mike’s Ad Blocking Hosts file, Dan Pollock’s Hosts file, and a Hosts file from Bluetack Internet Security Solutions.

Many of the services provide an installer or batch file that can be used to replace your existing Hosts file with their own. If no such installer is included, back up your existing Hosts file and copy the new file in its place. Your Hosts file is located here:

C:\Windows\System32\drivers\etc

Some writers, such as Thomas Hruska, argue that your PC’s performance may be hindered because site blocking in this manner forces your browser to look in vain for a site it cannot find. If you notice a performance hit when you try this technique, you may be better off using special ad-blocking software such as NoScript for Firefox, as mentioned in my Apr. 17 story.

On the other hand, the WinHelp 2002 site argues that “a well-designed Hosts file can speed the loading of Web pages by not having to wait for these ads, annoying banners, hit counters, etc. to load.”

Unfortunately, malware makers are also aware of the power of the Hosts file. Worms and Trojan horses are sometimes crafted to alter your Hosts file to block major antivirus and security sites. This prevents you from receiving the updates you need to stay protected from the dark side.

Other malware modifies the Hosts file so that when you try to visit your bank’s Web site, for example, you’re redirected to a phishing site mimicking the bank’s, where the crooks attempt to trick you into handing over account numbers and passwords.

Just as insidious, a malicious program could modify the Registry, which tells Windows where to look for the Hosts file. If that happens, you may be spending your time protecting the wrong copy of the file. The key is named DataBasePath and is located at:

HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ Parameters

As a result, you also need to make sure both the Registry and your Hosts file are protected.

Start by checking whether your current security software has tools for protecting the Hosts file and monitoring Registry changes. Both the $40 ZoneAlarm Pro firewall and the $50 ZoneAlarm Internet Security Suite from Check Point Software protect the Hosts file from changes and notify you of attempts to do so.

Among free security software, Spybot Search & Destroy has a feature for locking out changes to the Hosts file. The free version of WinPatrol warns you if changes are made to the Hosts file or critical system files and lets you keep the previous version.

You can also keep your Registry and Hosts file protected by logging in to a nonadministrator account in Windows. This prevents any changes to these and all other system files.

Finally, regularly overwriting your Hosts file via one of the third-party updates I mentioned above will delete any changes made by malware.

Keep your Hosts file up to date

You’ll need an easy way to keep your custom Hosts file current. A number of free utilities will automatically download and install updated copies of third-party Hosts files. I tested several tools designed to manage your Hosts file, and my favorite is HostsMan, which includes a button for quickly disabling and enabling your Hosts file. This is useful if your browser is having difficulty contacting a site you’re sure you want to view.

HostsMan’s true talent is in keeping the Hosts file updated. While most Hosts-file fresheners tie you to a specific third-party file or site, HostsMan installs any or all of four popular third-party Hosts files. If none of those files suits you, HostsMan lets you edit the update list to add the URL of your favorite Hosts source.

HostMan's main window Figure 1. HostsMan’s main window includes buttons for toggling, updating, or opening the Hosts file.
__________

The program’s update option (which can be invoked manually at any time) can either merge or overwrite your Hosts file with the updates you’ve chosen. I recommend the overwrite option, in case your file has been compromised by malware. When you install updates from multiple sources, HostsMan deletes duplicate entries automatically.

If your updates add Web sites you’d rather not block, just place those sites’ URLs in HostsMan’s exclusions list to keep them out of your Hosts file permanently.

HostsMan was also the only utility I tested that checked the Registry to find the Hosts file used by Windows. Other applications just keep working with the Hosts file in the default location, even if that location was rendered useless by a changed Registry key.

Unfortunately, HostsMan updates itself to the new Hosts location only when the program starts. If you leave HostsMan (and your computer) running all the time, you may need to restart the program if you think malware has compromised your Registry’s Hosts setting.

If you keep HostsMan running in your system tray, the program automatically updates your Hosts file in the background. The current version gives you no control over these updates, though; automatic updating occurs every 12 hours, whether you want to update or not.

The other Hosts-file updaters I tried were Hosts File Updater, HOSTS Secure, B.I.S.S. Hosts Manager from Bluetack Internet Security Solutions, and hpHosts. All five offer tools for editing, managing, and updating your list of URLs to avoid, although they lack HostsMan’s automaticity and other useful features.

Ad-blocking Hosts files aren’t the be-all and end-all of your malware woes. You still need a full arsenal of antivirus, antispyware, firewall, Flash blocking, and other security tools to keep your computer and your data safe.

Still, an additional layer of free protection is difficult to pass up. And when you have a tool like HostsMan to do the updating work for you, that’s more icing on the security cake.

HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ Parameters

As a result, you also need to make sure both the Registry and your Hosts file are protected.

Start by checking whether your current security software has tools for protecting the Hosts file and monitoring Registry changes. Both the $40 ZoneAlarm Pro firewall and the $50 ZoneAlarm Internet Security Suite from Check Point Software protect the Hosts file from changes and notify you of attempts to do so.

Among free security software, Spybot Search & Destroy has a feature for locking out changes to the Hosts file. The free version of WinPatrol warns you if changes are made to the Hosts file or critical system files and lets you keep the previous version.

You can also keep your Registry and Hosts file protected by logging in to a nonadministrator account in Windows. This prevents any changes to these and all other system files.

Finally, regularly overwriting your Hosts file via one of the third-party updates I mentioned above will delete any changes made by malware.

Keep your Hosts file up to date

You’ll need an easy way to keep your custom Hosts file current. A number of free utilities will automatically download and install updated copies of third-party Hosts files. I tested several tools designed to manage your Hosts file, and my favorite is HostsMan, which includes a button for quickly disabling and enabling your Hosts file. This is useful if your browser is having difficulty contacting a site you’re sure you want to view.

HostsMan’s true talent is in keeping the Hosts file updated. While most Hosts-file fresheners tie you to a specific third-party file or site, HostsMan installs any or all of four popular third-party Hosts files. If none of those files suits you, HostsMan lets you edit the update list to add the URL of your favorite Hosts source.

HostMan's main window Figure 1. HostsMan’s main window includes buttons for toggling, updating, or opening the Hosts file.
__________

The program’s update option (which can be invoked manually at any time) can either merge or overwrite your Hosts file with the updates you’ve chosen. I recommend the overwrite option, in case your file has been compromised by malware. When you install updates from multiple sources, HostsMan deletes duplicate entries automatically.

If your updates add Web sites you’d rather not block, just place those sites’ URLs in HostsMan’s exclusions list to keep them out of your Hosts file permanently.

HostsMan was also the only utility I tested that checked the Registry to find the Hosts file used by Windows. Other applications just keep working with the Hosts file in the default location, even if that location was rendered useless by a changed Registry key.

Unfortunately, HostsMan updates itself to the new Hosts location only when the program starts. If you leave HostsMan (and your computer) running all the time, you may need to restart the program if you think malware has compromised your Registry’s Hosts setting.

If you keep HostsMan running in your system tray, the program automatically updates your Hosts file in the background. The current version gives you no control over these updates, though; automatic updating occurs every 12 hours, whether you want to update or not.

The other Hosts-file updaters I tried were Hosts File Updater, HOSTS Secure, B.I.S.S. Hosts Manager from Bluetack Internet Security Solutions, and hpHosts. All five offer tools for editing, managing, and updating your list of URLs to avoid, although they lack HostsMan’s automaticity and other useful features.

Ad-blocking Hosts files aren’t the be-all and end-all of your malware woes. You still need a full arsenal of antivirus, antispyware, firewall, Flash blocking, and other security tools to keep your computer and your data safe.

Still, an additional layer of free protection is difficult to pass up. And when you have a tool like HostsMan to do the updating work for you, that’s more icing on the security cake.

HKEY_LOCAL_MACHINE \ SYSTEM \ CurrentControlSet \ Services \ Tcpip \ Parameters

As a result, you also need to make sure both the Registry and your Hosts file are protected.

Start by checking whether your current security software has tools for protecting the Hosts file and monitoring Registry changes. Both the $40 ZoneAlarm Pro firewall and the $50 ZoneAlarm Internet Security Suite from Check Point Software protect the Hosts file from changes and notify you of attempts to do so.

Among free security software, Spybot Search & Destroy has a feature for locking out changes to the Hosts file. The free version of viagra hearing loss title=”http://windowssecrets.com/links/casamqr63t9zd/aa1ad8h/?url=www.winpatrol.com%2Fdownload.html”>WinPatrol warns you if changes are made to the Hosts file or critical system files and lets you keep the previous version.

You can also keep your Registry and Hosts file protected by logging in to a nonadministrator account in Windows. This prevents any changes to these and all other system files.

Finally, regularly overwriting your Hosts file via one of the third-party updates I mentioned above will delete any changes made by malware.

Keep your Hosts file up to date

You’ll need an easy way to keep your custom Hosts file current. A number of free utilities will automatically download and install updated copies of third-party Hosts files. I tested several tools designed to manage your Hosts file, and my favorite is HostsMan, which includes a button for quickly disabling and enabling your Hosts file. This is useful if your browser is having difficulty contacting a site you’re sure you want to view.

HostsMan’s true talent is in keeping the Hosts file updated. While most Hosts-file fresheners tie you to a specific third-party file or site, HostsMan installs any or all of four popular third-party Hosts files. If none of those files suits you, HostsMan lets you edit the update list to add the URL of your favorite Hosts source.

HostMan's main window Figure 1. HostsMan’s main window includes buttons for toggling, updating, or opening the Hosts file.
__________

The program’s update option (which can be invoked manually at any time) can either merge or overwrite your Hosts file with the updates you’ve chosen. I recommend the overwrite option, in case your file has been compromised by malware. When you install updates from multiple sources, HostsMan deletes duplicate entries automatically.

If your updates add Web sites you’d rather not block, just place those sites’ URLs in HostsMan’s exclusions list to keep them out of your Hosts file permanently.

HostsMan was also the only utility I tested that checked the Registry to find the Hosts file used by Windows. Other applications just keep working with the Hosts file in the default location, even if that location was rendered useless by a changed Registry key.

Unfortunately, HostsMan updates itself to the new Hosts location only when the program starts. If you leave HostsMan (and your computer) running all the time, you may need to restart the program if you think malware has compromised your Registry’s Hosts setting.

If you keep HostsMan running in your system tray, the program automatically updates your Hosts file in the background. The current version gives you no control over these updates, though; automatic updating occurs every 12 hours, whether you want to update or not.

The other Hosts-file updaters I tried were Hosts File Updater, HOSTS Secure, B.I.S.S. Hosts Manager from Bluetack Internet Security Solutions. All five offer tools for editing, managing, and updating your list of URLs to avoid, although they lack HostsMan’s automaticity and other useful features.

Ad-blocking Hosts files aren’t the be-all and end-all of your malware woes. You still need a full arsenal of antivirus, antispyware, firewall, Flash blocking, and other security tools to keep your computer and your data safe.

Still, an additional layer of free protection is difficult to pass up. And when you have a tool like HostsMan to do the updating work for you, that’s more icing on the security cake.

Permalink • Print • Comment
« Previous PageNext Page »
Made with WordPress and an easy to use WordPress theme • Sky Gold skin by Denis de Bernardy