Computing Made Easy N° 119 - 15/11/2007 - 303

Comments

Transcription

Computing Made Easy N° 119 - 15/11/2007 - 303
N° and issue date : 119 - 15/11/2007
Circulation : Unknown
Frequency : Monthly
CompMadeEasy_119_41_303.pdf
Page : 41
Size : 85 %
111N DEPTH
/
Make Windows XP
safe
100%%
ake'indows
XP 100%% safe
look
ten common security
flaws
Windows XP and show you how
fix them
We take
1.100
IN
DEPTH
..............................
.
IN BRIEF
a
at
in
Everyone has
heard horror
stories about the
internet so you
need
know
how
make
sale place for your
fami
surf
to
,
.....
to
to
.........s..
.
......: a.......l.l.......
.
.
are issues that plague both
computer experts and novices
But just what are these threats what do
they mean and how can they be avoided?
answer these questions
We aim
this
feature providing you with the necessary
information
help keep your computer
and its data safe The majority
threats
the internet
,exist as direct result
because this worldwide network provides
an easy means
distribution There are
few computer users who would be willing
give up their internet connection so
important arm yourself with
the knowledge needed
help
.....
to
.
ly
.
.
,
to
in
,
to
.
of
.......
a
of
.
of
'
.'
The majority'
threats gain
access
.
to
,
.
it'
s
your
system via your
internet connection
provides an
to
to
.
to
identity and avoid potential dangers
Viruses are undoubtedly the
mnct-knn cari irity thraat
tri
-
computers for both the home user
and large companies These malicious
it
easy means
.
,....
,
of
distribution..
-4
result
of
a
of
computer that will not start
fairly rare The most likely
an infection are decreased
system performance as the virus takes up
the machines resources replicating itself
forms
programs can take variety
and the term incorporates number
threats under single banner-including
a
it
.
.
.
to
generally
malware
is
to
of
virus can be spread
variety
ways such as email attachments
deliberate infection by hacker infected
downloads
specially coded websites
The effects
virus differ wildly and
in
a
.
avoiding the risk
virus infection
important only
open email attachments that have been
sent by people you know
that you are
receive Attachments from
expecting
When
,
,
to
or
a
,
,
viruses do not cause
large proportion
its data
any damage
computer
amateur
Many infections are the result
to
of
to
in
to
to
a
ll
,
,
certain the files you do download are
fact what they daim
be
it
to
attached
the same network
attempt
emails
spread itself by attaching itself
Virus infections can
few cases
lead
valuable files being deleted
see key system files altered
such
way that renders them inoperable
entirely possible for virus infection
to
to
or
,
to
.
in
viruses
in
a
,
to
ntec
W
a
P?M
d!
ami
.
,F
.
.
is
it
It
.
,
w
,
to
a
fiMfAY IANbSCF
tlvea<fRpluw
F
a
>
w...
.
.
Tfire.t E>plora
tompnh.ns
letest Mnats nsks.nd
,r.bs rtes.sou
rc
.
for
dt
v
d
Hson
.
*
o:
n.
vsv wnniw
t
.
to
)
)
F
Th
motso
.
.
of
in
,
is
tool not only detects the presence
any
infections that have already made their
also constantly
way onto your system
checks for suspicious activity
help
or
,
.
in
.
An essential tool
the fight against
antivirus software An antivirus
to
,
.
should also ensure that you download only
from trusted websites and that you are
.
to
it'
a
or
of
to
.
be
strange email addresses claiming
free screensaver
something similar are
be far less innocent
likely
reality You
.
to
demonstrate their
programmers keen
the world Once virus
coding skills
has made its way onto one computer
often try
other machines
replicate
is
,
.
or
to
it
,
a
coures
it
of
a
or
a
.
of
.
of
of
is
Messages informing the user that they
have been infected are also common
.
A
a
,
a
trojan horses and worms-but
understood
refer
any type
that has unwanted side effects
in
up but this
side effects
of
a
a.r...
*
,
tiw:
m..d
IY.1.
wk..
.
r
.
LOCAL SECURITY
..............................................................................
.
Security threats computers do not exist solely the outside world
other people have physical access your computer they could quite
ea.ily steal your personal data and important files One the easiest
ways help avoid this
password-protect your user account
also possible password-protect the BIOS prevent
although
unauthorised access Encryption tools such as Steganos Safe www
steganos.com can be used help protect data
to
in
.
>Mt
If
to
F..d
.-W
.
addeA
OESOYMES
e<
w
.s
<hy
-.Mmbc.
/
.
to
of
is
to
,
it
is
to
to
Symantec Threat Explorer pro vides
information about the latest viruses and
how dangerous they are
s
.
(
to
.
)
39
1/4
Copyright (Computing Made Easy) No reproduction without authorisation
STEGANOS
N° and issue date : 119 - 15/11/2007
Circulation : Unknown
Frequency : Monthly
CompMadeEasy_119_41_303.pdf
SPYWARE AND ADWARE
SI
harvesting ail manner information
this may be personal details typed into
websites info about the way you use
your computer-before transmitting the
results an individual company
Perhaps the most worrying aspect
spyware there no knowing what this
information will be used for As with the
fight against viruses spyware and adware
can be combated with dedicated detection
and removal programs such as Ad-Aware
www.lavasoftusa.com and Spybot Search
Destroy www safer-networking.org
date ensure
Keep this software up
protection against the latest threats
The terms `spyware' and `adware' are
frequently associated with the term
`virus' although they are fact entirely
différent problems Adware
type
malware that manifests itself the form
advertisement window While this
an irritation
generally not danger
More worrying are the forms adware
that include spyware components
bid
deliver targeted advertisements Such
malware may monitor the types website
you tend visit and serve up ads with
similar themes the sites themselves
the case pure spyware malicious
programs run invisibly the background
m
of
-
or
in
,
a
.
of
is
.
or
to
in
of
.
of
is
is
.
is
a
it
is
,
Password-protecting your Windows user
account adds an extra level protection
.
of
of
in
a
,
.
to
future infections There are number
commercial virus protection tools available
including Norton AntiVirus www
.
a
Tl
Page : 42
Size : 90 %
of
of
to
.
symantec.com and McAfee VirusScan
www.mcafee.com but there are also
free alternatives available such as AVG
Anti-Virus http: free.grisoft.com avast!
Home Edition www.avast.com Avira
.
)
(
to
to
In
of
)
,
.
in
,
(
)
(
&
.
to
(
)
,
,
,
(
/
/
)
extremely unlikely any bank would
use emails
verify account details
"
4
,
(
)
www.free-av.com and ClamWin
www.clamwin.com
Classic
(
It'
s
)
.
(
"
)
New viruses appear virtually every
day so
vitally important
keep
date
your antivirus software up
this
Many packages will take care
worth checking the
automatitlly but
ensure they will take
update schedule
sensible time -such as first
place
the morning
thing
Although often closely associated
spam and phishing are not the same The
threat can corne
the form
an email
although phishing websites also exist
Phishing derived from the phrase Iishing
for information; involves tricking victim
into divulging information about their bank
account with view
stealing funds
to
to
it
is
,
to
............
.
its most basic form
.
it'
s
Bevigilant'
with your
'
to
.
in
of
,
.
......
.
their account details Should this step be
completed
likely cash will be withdrawn
from the account and never seen again
into your browser' address bar
to
.
If
a
click on
.
to
link
a
the website
s
the email
in
to
it'
In
PHISHING FILTE
S
,
A
visit
in
.
in
,
to
s
Ski
or
in
,
AIR
to
,
the' bank then enter
of
re
of
in
,
to
INTERNET EXPLORER'
to
.
.
a
a
is
a
.
.
a
It'
.
It
originate from genuine banking
institutions sent on the pretence
that the bank needs
verify few
details The victim will be invited
'
,
,
s
a
verify account details-as such virtually all
emails
this type can be deleted
you'
an email' authenticity
any doubt as
touch with the company
you should get
question directly Do not use links
the email but
contact details provided
be correct
type the address you know
infnrmatinn
Never send Bank
account details
via email...'
,
in
.
of
or
to
personal
.
to
such emails
of
to
.
..
can be hard
appearance
but the use
,
a
in
It
a
,
a
a
,
at
completely eliminate the
your inbox
filter
also
spam
helps
important employ little common sense
website
extremely unlikely any bank
with good reputation would use emails
phishi' ng email may
bank account number
and sort code but there are more
sophisticated variations
Some email scams daim
oufi ght for
ask
of
s
.
NET EXPLORER
7'
S
.
BUILT-IN SECU
Free Mortgages
Phishing Fihcr
À
Fvxw
&ntY ,mOO ,QY Ut
E
o
E-bk
gr9n9
o
,j
n
,
,
t
ws.a.
,
,aSd
,
M
,m bruws«
This mn
a
B
,aw.Kauor
1
dphdiq web
fl
Ev
M
dd; tle Tods hAh
1%%#ki3w9 qM
Tv
aUmNk Laedrddq
beeArWartdb
e
adbess
Vmuhdi!
mie Ale
Filer
om2Ez
0
are
n
.
[
tlle
k
K-ft asad.:
b3eve
b
sEe Tae are C%%Mdi9
tidPfthA
+
9
.
Yae
webnte
Fier ad Mm ddkapvt Ths
,
dedUhe
,
WS
ph#Ig Ate
WebATe
k
a
.
.
af
ci
55120
pm3.a
El
iicted
ta
s
y
1
.
Pi
escape
dthe
wxn duxcn9s
E
to
t9oes PheMv Fdt« heb aot«t mes
d&esmanxdt
s
ti
mbo
:
RT
YWre
ttt
,
tI
tEbv
is
greener way
a
.en and
ENABLE THE FILTER
2
Click on Tools then on Phishing Filter>Phishing
Filter Settings Scroll down and
ensure' Turn off
automatic website checking' or' Turn on automatic
website checking' selected before clicking OK
,
.
ta
is
.
-'
Il
donate
CHECK
.
to
t
i5
.
A
bank
wortdwide
SITE
3
With automatic site checking enabled you' be
warned you visit known
reported phishing
site
disabled perform monually by clicking
Tools>Phishing Filter>Check This Website
Il
,
if
a
or
.
If
it'
s
it
,
.
.
REPORTING SUSPECT SITES
users reporting
phishing filter works due
suspicious sites To report site you think unsofe
click Tools>Phishing Filter>Report This Website Tick
the box labelled' think this i-Né phishing website'
The
to
.
a
is
,
.
.
I
40
2/4
Copyright (Computing Made Easy) No reproduction without authorisation
STEGANOS
N° and issue date : 119 - 15/11/2007
Circulation : Unknown
Frequency : Monthly
CompMadeEasy_119_41_303.pdf
V1N DEPTH
/
Make Windows XP
refoxL
Fi
Page : 43
Size : 85 %
safe
100%%
VIDEO HACKING
The increased popularity video download
websites such as YouTube has seen the emergence
new type threat Specially coded videos
that take advantage known security flaws
well-known websites have been used install
trojans as visitors watch videos Once installed the
trojan begins by displaying pornographic adverts
before harvesting personal data from the infected
machine and broadcasting over the internet
similar problem affected MySpace when
worm was posted that exploited JavaScript flaw
Apple QuickTime software To avoid such
problems the same advice applies dealing with
other and virus threats Ensure you have the latest
version any program installed help minimise
the risk there being security holes plus make
installed and up date
sure antivirus softwar
2
The award-winning Web browser
now even ester, more
secure end fully customizable
suit gour ondine lite With
Firefax
we' ve added powerful new entures that make your
anime experience even botter
is
of
(
te
.
,
2
(
,
a
of
.
of
.
in
of
to
.
,
Systam
Othe
,-
"
R
aoeratina
,
maats Relemr NOtu
stems
er
it
Enjoy
j
Firefox
Better Web Experience
a
delwers helpful new features
2
more productive
.
a
A
make your online experience
ta
a
Lr
.
îi;
i
in
s
.
to
,
+
2006
Odabrr
flrtfox
e
lw
7
p
Stay Secure on the Web
e
f
ef.
F
"
,
x
.
Firefox'
Phishing Protection has been added
against spyware viruses and pop-ups
existing protection
to
s
of
,
,
to
of
,
Alternative applications such as Firefox are generally more secure thon the likes Internet
the fact that the more popular programs tend
be targeted
Explorer
only by virtue
à
of
if
of
is
to
.
ta
,
Other scams that work
take long for news
spread and for the
be exploited
vulnerability
order
avoid such problems
similar way
in
a
as' Nigerian email scams'
are known
to
419' emails Such scams advise victim
that they have either won large amount
have been left
money
lottery
will
order
receive these
money
'
.
a
In
,
a
or
,
.
to
funds they must first pay release fee
the prize will never exist so these emails
or
of
,
should be viewed with extreme caution
detect them easily
Most spam filters tend
so few should even make
your inbox
.
it
.
to
not the only form
data
the world
computers
Programs called keyloggers can be planted
on computer where they hide
the
Phishing
is
of
theft that exists
in
of
.
in
a
background monitoring the keys that are
this
pressed and the websites visited
.
In
find out the
way
relatively easy
usernames and passwords used by the
victim
access
secure sites
range
and services Antivirus and anti-spyware
scanners will automatically detect the
overw
ming majority
keyloggers
well-known
Security holes
applications are common means for
malicious users
other
gain access
it
is
to
a
to
to
doesn'
.
,
can learn what type
ta
blocked
traffic should be
reduce the number
of
permitted
confirmation screens displayed
of
or
to
.
à
Update-Windows Internat Explorer
02 Microsoft
,
http: ffupdate.mic
o
oft.comimivosakupdateiv6Jdefa
*
.aspx?In »en-us
_i
M-ft UpdMe
41r
*
mÀM
Customize vour results
Latal Updates
.
usually with the intention
information
)
Select High-Pnority Updates
To help peotect
Plgh
P
,
rity
yow computer agai
e:
ecu ity
th
ea
e
ana
mfo
manne
pob ema
e
s
,
Re ,ew and instal updates
1
(
)
C
]
,
swtwnra
stealing
of
1
(
a
Select by Tyye
opt-d
,
o
(
)
High-priority updates
Hardwm optànal
0
(
)
,
causing damage
Ultimately little can be done
stop the
most determined
hackers but steps can
be taken
make more difficult
access
your computer and the data contains
Microsoft WIndows XP
.
or
sdt by Product
Microsoft .NET Framework
E
1
,1
Service Pack
1
to
ftdcwz
XP(
Sem
of
,
.
it
is
is
to
n
)
Posture Pack
0
)
(
it
to
,
to
it
,
,
to
in
such as Windows and Internet Explorer
are particularly prone
attack As soon
discovered
If
is
is
of
a
.
is
have ail
the
last updates for
Windows installed
help plug
ony security
haies that have
been discovered
,
essentially involves gaining access
another computer without permission
to
security hole
.
to
s
,
of
a
,
confirm the action
the data transfer
best
assume that
unexpected
going on and block
something untoward
the connection Over time the firewall
Ensure that you
,
,
as
,
to
a
is
is
or
,
is
In
is
relevant knowledge generally speaking
only the most popular
programs
that are targeted This means software
it
it
to
of
it
is
.
,
of
.
.
to
re
of
or
)
.
is
plant virus
computers be
browse through the contents
the hard
drive While
possible for virtually
software
include flaws
any piece
that can be exploited by those with the
.
....................
using the very latest version
the program This because
more
likely that known problems will have been
fixed
some cases this may involve
uninstalling your currently installed version
and downloading the latest release but
many software publishers have made
things easier Windows includes Windows
download all
Updates that can be used
the latest fixes for Microsoft operating
system while increasing numbers
companies including Adobe are
incorporating automatic update facilities
into their programs
Hacking often considered as having
links
software vulnerabilities but while
this true
certain extent hacking
also problem
its own right Hacking
ensure you'
,
to
or
a
.
.
of
in
a
to
of
is
,
.
a
it
is
of
*
to
associated with security holes One step
that can be taken with all software
.
(
to
.
of
fixed
.
,
.
is
.
of
to
are more powerful alternatives
available One such program
that available free
charge
ZoneAlarm www.zonealar
another
com Whenever program
communicate with
machine attempts
your computer
your machine attempts
transfer elsewhere you will be asked
of
to
to
of
s
,
/
computer-often an indication
being hacked-but there
will have been:
.
a
-
it'
is
to
to
,
software as
more likely
known problems
,
In
a
firewall that
a
block suspicious
connections
and from your
can be used
up-to-date'
to
to
in
in
,
Use
.
some people turn
using more niche
applications but this does not eliminate
the threat completely and not always
possible
practical From the point
view
the general computer user
little can be done
avoid the problems
a
of
Windows includes
.
to
or
to
to
VI.W Studb zoos
o
(
)
L
it
t
.
41
3/4
Copyright (Computing Made Easy) No reproduction without authorisation
STEGANOS
N° and issue date : 119 - 15/11/2007
Circulation : Unknown
Frequency : Monthly
CompMadeEasy_119_41_303.pdf
Page : 44
Size : 80 %
N
i'*
DEPTH
Windaws Firewalt
a
m
I.......N .......................................
'
E..Pti-
.
.
arn about security
ats and how
oid them
With wireless network
software firewall'
usefui
addition
any security
options offered by your router
Advanced
Y- PCisnpatecte2
_.%%:
fion cnWidows FieweU
a
o
to
,
s
.
Windows Firew
o
from gaining
I
helpt potect your computer by preventn9 unaudwaed mers
cnp
your
a
s
to
throuph the Internez
ar
network
e
.
ta
0
.
0
(
,ecommended
)
E
tartes han
This tetGrq blocks
outide
ccnWvta Wh the exception
al
wireless
The increased popularity
networking products has led
of
With the vast majority
massive
a
Io
equipment supplied with no
security features enabled by default
order
improve ease
set-up many
users never learn about the security
measures available
them
why they
are so important Wireless connection theft
real cause for concern on number
levels
the very least means the
able
person hijacking your connection
access the internet free
charge-it'
be you that' footing the bill Should
not only gain access
somebody manage
your network but also maintain that
connection for long time
possible for
him
her
continually download files
an extent that pushes you over your
allocated monthly bandwidth allowance
homenetworking
the number
home networks
that have been set up While ordinary
wired networks have number
security
issues associated with them the problem
amplified when wireless connections
are added
the equation When setting
the home the
up wireless network
be ensuring that
primary concern tends
the signal reaches
the extremities
the
house
clown
the end
the garden
but this
itself poses problem
the
wireless signal can be accessed by your
own laptop when sitting
the garden
what'
stop your next-door neighbour
someone parked
doing the same
outside your house
car?
boost
in
of
to
is
in
lo
.
,
.
s
.
ipiored
Off not recommended(
(
or
Avoid udng dtie rettng Turnig off 1Vrdovo Fiewat may make
vkuou ard iYruden
computs more vulnerabb
.
.
is
li
.
to
.
to
a
a
in
of
,
to
.
At
This can results
it
charges
in
from your ISP plus sharing
Secure your
connection with another
don'
user will undoubtedly slow
down your own browsing
pay out for
experience However
someone
there are more important
use your
concerns
consider There
bandwidth
no knowing quite what
wireless network hijacker
will use the connection for and
feasible that they could download illegal
content As the data
being transferred
through your connection
your front
door the police will visit first and you may
Rootkits are difficult detect and many
have difficult time proving someone else
antivirus tools have tendency miss
was responsible
them during scans Several companies
Unauthorised use
wireless internet
have released dedicated rootkit detectors
connections
this way against the law
including Microsoft RootkitRevealer
but unless the perpetrator caught
the
http: tinyurl.com 2or78m Sophos
is
to
of
to
,
of
II
or
of
a
network-
s
.
,
in
a
a
Fxewal
,
of
-
.
necl p6lic netwaks leu secure
whenyou
uch es airpods You will flot be nolued when Windows
poçrams Seledions on the Exceptions lab wil be
fit
locations
of
,
to
Select
to
a
a
thit
te
eIl- exceptions
Dont
El
in
.
connectinp
timon selected on ha Exceptons tab
et
,
of
.
If
..........
to
to
t
elle:
.
,
in
a
,
it
.
,
is
,
s
to
or
or
to
to
,
in
a
to
to
.
.
.
,
is
.
a
it
is
,
ROOTKITS
.
is
it'
s
,
Despite having separate title rootkits
are reallyjust an advanced form trojan
rootkit can be used take full control
computer by successfully hiding any
actions
performing such as making
the registry establishing
changes
connections other computers and
running malicious code Rootkits can work
variety ways and
theory there
no limit what they are able achieve
driver rootkit can
By taking the form
disguise itself and its activities as those
also
legitimate piece hardware and
possible fora rootkit completely change
the way certain portions operating
system code are run
a
,
to
of
a
.
A
a
to
of
.
a
it
of
is
in
,
,
in
/
/
,
/
(
Anti-Rootkit http: tinyurl.com jcqyp
and UnHackMe www.greatis.com
unhackme There' no particular
technique that can be employed avoid
the threat rootkits and their removal can
often be hampered by the fact that changes
are made important system code
many cases the easiest way completely
remove ail traces
malicious rootkit
perform complete reinstallation
/
act proving guilt virtually impossible
Thankfully there are number
steps
secure wireless
that can be taken
connection and details can be found
the walkthrough below
important
remember that someone has free
access
your wireless connection they
the contents
potentially have access
mind
well
your hard drive With this
worth spending little time ensuring that
the connection
as secure as possible
is
/
/
)
a
/
of
in
is
a
to
.
,
/
,
s
)
to
to
.
in
to
a
a
is
.
of
,
,
a
of
it
is
to
In
.
of
a
,
of
in
.
to
is
.
if
to
to
,
of
It
to
to
to
of
,
(
a
.
,
(
.
of
)
,
to
of
is
is
to
in
to
.
it
is
,
a
a
.
is
a
.
WI-FI LOCKDOWN
rire
n
.
*
_
Y
NM1eee
B.aic Seninga
r
?
.
ffu
WI-FI CON
SECURE YOUR
_
U
wttk
M
.
xorelers
urity
Europe
igs
Channel'
AUTO
ock Sites
Mod
Uptu270Mbp
g
NETGEAR
S
Mur
Narre 9910
ADSL Settinge
q
.
,
(
Wlreine Settingo
wky
Redlon
Loge
)
:
.
F
Block Site
e
X11
nru
SeMce
WYeWS Accaas PaS
.
Enable Wirelsa
.
:
Accne Point
.
:
Sehedul
Nbw B..dC
.
C
E
-s'
cffo
-il
Mairnenan
o
S
ONan
P.sword
C
Bi.gne.Bu
Reuter Bpgr.d
t
ofName 9810
Mlow Broadcast afName ESID
D
(
rvices
hedule
W6eless Station Access List
)
mail
StJlw
A-
LM
rr1r
Y'
C
ntenance
r
Sectoib cVions
Juter Statua
None
tached Devices
WPA-PSK TKIPJ
(
,
WP1
ickup Settings
WPA2-P8
at
WPA-PSI( Seau
Password
rc
.
.
PROTECT SETTINGS
2
Ensure the contrai interface for your modem
router password-protected Use the defouit
or
is
.
usernome and password
choose
a
new password
.
ta
log on with then
,
.
RIDE SSID
3
After ossigning on SSID nome
your wireless
network you should consider disobling its broadcast
detect
helps make more difficult for others
it
to
,
is
needed
to
establish
a
connection
.
..dr.lCw
.
/
9
R2 rNeCACto
GN
R
ENABLE ENCRYPTION
the wireless security section
the configuration
enable either WEP
screen opt
WPA encryption
before choosing possword This will need
be
entered
connect
your network wirelessly
of
)
It
.
.
In
to
(a
as the SSID
ctyufioI
E
tb
.
1
1
WPA2-PSK JAESJ
+
[
,
WP4PBK[
)
Wireless isolation
0
(
.yop«
.
B.ckup Seninga
+
.
.
AR.chad Beeie.
.
Parsless isolation
M.k.
,n
Router Statu
Set
EnableWrelessAccess Point
E
rewall Rules
.
.
Firew.Il Roi.
+
Wreless Access Poid
.
ta
or
,
.
ta
a
.
.
ta
ta
42
4/4
Copyright (Computing Made Easy) No reproduction without authorisation
STEGANOS

Similar documents