Category: Network Security

avast! blog » Can you Trust Free Anti-Virus?

avast! blog » Can you Trust Free Anti-Virus? – Link to blog on Avast site

My comments on the issue concerning free anti-virus software

I always prefer that every computer has a reputable anti-virus software program running on it and, through this blog, I have always recommended AVG or avast free anti-virus solutions for home users and students. I would also consider the paid-for versions of these programs for users that don’t fit the mould provided for the free versions.

From my experience, these programs and their paid-for equivalents from the same suppliers, can do their job without placing too much stress on the computer. This is compared to the likes of the “big majors” (Trend Micro, Symantec, etc) who supply the computers sold in chain stores with trialware anti-virus solutions that can place a dent on the computer’s performance with their dominant graphics.

As well, the free programs and their paid-for equivalents work tightly with the operating system rather than take over the operating system. This is more so with the latest incarnations of Windows because of the designed-in security functionality that these operating systems have like Windows Firewall. Here, you can do most of your configuring through Windows and your default browser rather than through weird panels that take up a large part of the screen. The programs are as regularly updated as the majors and are even updated to include protection from newer infection vectors like instant messaging.

One thing that AVG, avast and the like could do is “offer” a trade-in deal where if a person who is subscribing to a “major” anti-virus solution like Norton or Trend Micro can switch over to the “professional” versions of these free anti-virus solutions for a cheaper price or for free. If the “professional” solution is sold on a subscription basis, they could offer a longer subscription deal like a “2 years for 1 year” package or a “first year is on us” deal.

This could allow the user to save money on their anti-virus solutions without forfeiting the security level that they are benefiting from..

CAPTCHA in the home-network router

 D-Link First to Add CAPTCHA to Its Home Routers to Help Prevent Against Attacks

D-Link’s CAPTCHA in action | DigitalMediaPhile (Barb Bowman)

My comments on this feature

A lot of blogs, comment pages / forums, social-network sites and Webmail services use a CAPTCHA as part of verifying what kind of user is signing up or adding comments to the blog or forum. Infact, users who wish to contact me via the blog’s contact form will be using CAPTCHA as part of proving who they are. This method, which typically requires a user to transcribe letters or numbers from a purposefully-distorted machine-generated graphic, has worked for a long time as a way to keep spambots from these sites.

By the way, a CAPTCHA-based verification system is a feature that I would like to see as part of adding comments to a blog post like this one or others on my blog. It would make life a lot easier for blog authors like myself when it comes to sorting out genuine comments from irrelevant comment spam.

This technique has been added as part of a firmware upgrade to most current-issue D-Link routers in response to recent security attacks against this class of equipment. These threats, typically in the form of Trojan Horses, take advantage of home-network equipment that is ran at “out-of-the-box” settings because most home users may not know how to configure the devices properly.

What will typically happen with these routers is that if the user wishes to change configuration or set up / modify an administrator account, they have to transcribe characters from the machine-generated graphic in a similar way to authenticating themselves with a blog or Webmail service on signup.

But this kind of security will not replace common-sense network security practices like setting the SSID of your wireless network away from the default and using a strong password on the device’s administrator account. It will augment these measures and more home-network equipment should be equipped with these features. Other practices that can be implemented for best security could include devices working on “least privilege” all of the time with the option of password and CAPTCHA verification for serious configuration tasks. This is similar to how Windows Vista and Windows 7 operate; and how a properly-setup building alarm system operates. For example, the network status page on a router could be available “without login” but you have to log in to change status.

At least this is one step being made towards a secure home and small-business network.

Personal and amateur photos on Web sites – need for improved security

Facebook scam: Ferrari man’s true identity revealed – BizTech – Technology

The recent Facebook scam with the image of a man standing beside a Ferrari had involved images lifted from a holiday album that was published on Picasa although intended to be private.

One of the main thrusts in this scam involved the photographer’s pictures being used without knowledge or permission of the album’s owner and a possible privacy and reputation threat for both the album’s owner and the Ferrari’s owner (if the Ferrari had front number plates).

One thing that needs to be looked at regarding photos published on Web sites like social networking and photo sharing sites is a secure way of publishing these pictures. Some would say that the most secure way is not to use these services at all, but to send pictures using removeable media (optical disk or USB memory key) via at least “snail mail”, preferably certified mail or courier service.  But many people want to still use these services due to the ability to quickly share large numbers of pictures with people over long distances.

Issues that can be looked at could include a watermarking system for personal images so that users can detect improper use of their images; and improved security practices for online services that handle personal and amateur pictures. The watermark system could use a machine-readable watermark and the option of a visible watermark and could be provided by an ISP, enterprise, Web-hosting facility or a photo-sharing / social-network service. The machine-readable watermark should be able to be detected in thumbnails and low-resolution images; synthesised images such as “photoshopped” images and collages; as wel as high-resolution images. This can work in hand with users, ISPs and hosting services using agents that can scour for improper use and let the users know.

Other practices could include a limit on how the picture is seen by untrusted users, such as “low-resolution only” viewing or inability to download, copy (Ctrl-C / Command-C), print or zoom into the actual picture. As well, the systems that host these sites could be checked regularly for hack attempts.

What needs to happen is for action to be taken concerning misuse of amateur and personal images that have been put to the Web, This could be achieved through codes of practice and / or technology implementations.

Comments about the Intel vPro Anti-Theft Technology

Intel Demonstration video of vPro Anti-Theft technology in action

Linked through from the IntelChannel YouTube channel

My comments in relation to small businesses and home setups

The Intel vPro anti-theft technology as presented in the above YouTube video is promoted for use by larger companies or schools who have a fleet of notebook computers and people in their regular hire who manage their IT needs. This is typically represented by the segment where the user is working at a software or Web-based “console” to administer the “poison pill”.

This kind of facility may not be available to households or small organisations who manage their own IT needs unless the remote management functionality is available as a cost-effective service. Such a service could be offered by security firms who sell their services to residential and small-business customers and these firms could integrate the “secure notebook” as part of their business-security packages or as a stand-alone service.

The end of McColo – OXYGEN 3 (E-bulletin on IT security)

 The end of McColo – OXYGEN 3 (E-bulletin on IT security)

My Comments

Some governments, most notably the UK government, are implementing crack-house or disorderly-premises close-down procedures where they can close down premises which are used for crime or disorder.

This incident where McColo, an ISP frequented by malware distributors and spammers, has been closed down because of the malware and spam that has emanated from that domain means that someone is looking towards using this kind of action in cyberspace. This would be similar to the effect on a neighbourhood whenever a crack house or a bar frequented by criminals is closed down, whether through official mandate or not.

If this kind of thing happens frequently with the Internet, through the watchfulness of the netizens, this could lead towards a safer Internet environment with fewer malware existing and mailboxes free of “fly-by-night” spam.

Merry Christmas from Simon Mackay

I am wishing you all a very merry Christmas and a happy new year.

There are some important issues to think of during this gift-giving season, especially when you open those computer-related gifts on Christmas Day.

1: When you set up that new router, make sure that you set it up in a secure manner. The wireless network segment must be secured to WPA-PSK standards and using an SSID unique to the premises as described in the “Making Sure Your Home Wireless Network Is Secure” article.

2. Make sure that the administration front-end for the router is secured with a good password rather than the default “admin” password that the manufacturer sets it to. This should also be set up for any other network devices like network-attached storage boxes that are able to be managed from the Web browser.

3. When you set up a new computer, make sure it is running the latest version of an anti-malware program and that there is a desktop firewall in place. A good anti-malware program that I would recommend for home use would be the free AVG program (http://free.avg.com) or the Avast Home Edition (http://www.avast.com/). Also make sure that Apple Macintosh computers are running anti-malware programs because of the latest crop of malware that is now targeting this platform.

It is worth knowing that the recent crop of anti-malware programs integrate “sure-surf” functionality that warns you if you are heading to dangerous websites or if an item in a Google search list is a trap Website.

4. Make sure that operating systems are set to obtain update files automatically. This can be achieved by going to the “Live Update” menu in Windows or going to the “Software Update” under the Apple menu in MacOS X.

5. Don’t think that the Webcam is just for weirdos. Think of it now as a tool for communicating with distant relatives and allowing them to be part of your life. Consider them being on Skype or Windows Live Messenger and you could easily save heaps on the phone bills.

6. Enjoy a safe and happy New Year

With regards,

Simon Mackay

Feature Article: Making Sure Your Home Wireless Network Is Secure

This Christmas, you may have received a new wireless Internet router as a Christmas present and are eager to dabble in the joys of wireless “hot and cold running Internet”. You will need to make sure that this network is operating in a secure manner in order to stop unknown and unaccounted use of your bandwidth allowance and to stop others from raiding your household’s private data. This is as essential as making sure that your home is physically secure through your use of deadlocks and intruder alarm systems.

Most likely, you will have implemented computer security measures like installing and using a desktop firewall and desktop virus-control and spyware-control utilities. You will also have deployed a spam-control utility on your e-mail inbox or signed up to a spam-filter service provided by your ISP.

Getting started on making your wireless network secure

Use the “Getting Started” leaflet for your router to identify how to configure it. You may have to run the CD that was supplied with your router and will need to connect your computer to it using the Ethernet cable that should have been supplied with it.

Windows Vista

Those of you with Windows Vista who have routers marked with a “Certified for Windows Vista” logo may find this job easier because the operating system will discover the router and put up a prompt at the right hand side of your screen upon power-up. You may have to click on “Control Panel”, then “Network and Internet”, then click on “Connect to a network”.

Next click “Set up a wireless router or access point” and click “Next” twice. Windows will interrogate your router and if it can’t be configured through Windows Vista, you will see a window which offers two options – “Configure the device manually” and “Create wireless network settings and save to USB drive”. Click on the first option to open the wireless router’s configuration page. If you just unwrapped it, you will need to use the default password printed in the router’s documentation.

Also, click on the second option to prepare a configuration set for your router. With this wizard, you will need to create an SSID and WPA network security key. Work through the wizard and choose a network name (SSID) that is peculiar to your premises and transcribe this SSID. Then click “Next” and accurately transcribe the passphrase written in the wizard.

Put a USB memory key in the computer then click Next. When the screen darkens, click “Allow”. Choose the situation appropriate to your network. If your network is already established, select the “Custom settings” option and click “Next”. Then click “Close”. You have created a master configuration set for your wireless network and that is now stored on your USB key.

Go back to the wireless router configuration page that you opened before in the second paragraph and go to the Wireless Network option. Copy the SSID into the “SSID” or “Wireless Network Name” box. Then go to the Wireless Security box and set your router to WPA-Personal and copy the WPA network security key into the passphrase box. At this point, go to the administrator password option and change the administrator password to something that you remember but is secure.

Windows XP SP2

If you don’t have the “Getting Started” leaflet on hand, connect to the router as described before and type “cmd.exe” in to the Run prompt. This is accessible by pressing [Windows| and R together on the keyboard. Then type “ipconfig” in to the command prompt. Look for the “gateway address” and note it down. Then use your Web browser to log in to the router.

Opan Control Panel and click on Wireless Network Setup option. Enter an SSID (wireless network name) that is peculiar to your premises and select “Automatically assign a network key”. Tick Use WPA encryption instead of WEP and click “Next”. Select “Use a USB flash drive” and click Next to copy the details to a USB memory key which you have inserted in your computer. Select the drive letter that corresponds to the USB memory key. Click “Next” to copy the details to your USB memory key.

Windows Vista, Windows XP SP2

“Dip” the USB memory key into the USB port on any Windows XP SP2 or Windows Vista computer with a wireless network ability that is part of your network and select the Wireless Network Setup Wizard option on the AutoPlay dialog box.

Apple MacOS X, UNIX (Linux)

Put the USB memory key in to the computer and open the SMRTNTKY folder. Open the WSETTING.TXT file and copy the SSID and WPA network key in to your wireless network configuration utility. In the case of the MacOS X, make sure that it is part of your “keyring”. Then dismount and remove the USB memory key.

All operating systems

Then put the USB memory key in to a computer attached to a printer and click on the “Open Folder to view files” option  Open the SMRTNTKY folder and click on WSETTING text document (WSETTING.TXT) . Print this document out and keep it in your files. This is of importance for when you connect up newer wireless network devices.