special ucs ces 2009 report
Transcription
special ucs ces 2009 report
ISSN 1061-5725 This Month’s Presentation Volume 27, No. 1 January2009 SPECIAL UCS CES 2009 REPORT www.ucs.org This Month’s Meeting: Wednesday 14th at 7 pm Check Out the Introduction to GhostSurf Platinum On Page 4 And The Review on Page 11 Fond Memories: Guess Which Year? Utah’s Award Winning Computer Magazine! ™ By Cliff Millward, Editor [email protected] Old Stuff? I hesitate to write my column this month because at this month’s meeting, members will be telling you the “latest and greatest” about CES. My information may be “old stuff.” However, I will cite a few items. Browser Stats From January to December, last year, the browser market share/usage changed: * IE, down 7.32 percent * Firefox, up 4.36 percent Recent Trends * Safari, up 2.11 percent * Chrome, up 1.04 percent However, don’t depend on these figures. Many users have multiple browsers, so usage counts more than “Marketshare.” What browser(s) do you use? I have not attended any Vegas function since I was denied a press pass. I don’t know why as I am editor of this publication and The Point, the American Federation of Teachers State Publication. Somehow I must be on a “persona non gratis” list. Once you are on one of these lists, it is difficult to get yourself removed. I would love to go to these shows, but I am not young anymore and must rest occasionally. There are almost no places to sit down at the show. However, the press rooms have couches to relax upon, but I am denied entrance to them, so I don’t go anymore. Just My Cups of Tea Seagate Technology improved the storage for disk drives recently by announcing shipments of a drive that features a single-platter 500GB disk. They also announced a 3.5-inch, 7200-rpm drive that packs 1TB of data on two disks. The drive’s Serial ATA interface delivers a data rate Page 2 of up to 160MB per second. The new Barracuda features perpendicular magnetic recording. A one TB single platter should be available in about two years. (I don’t know if I can “drink” that much T.” Obama Hackers President-elect Barack Hussein Obama successfully used the internet in the last election, but it has attracted some unsavory characters. Some hackers are sending out spam claiming to be a video showing an interview with Obama and his advisors. The video is an .exe file (Ed. Note: never click on an .exe file unless you are sure it is “clean”) that is actually a Trojan. Clicking on it downloads the Trojan. Unfortunately, some major anti-virus programs are not detecting it! The Trojan steals online banking credentials, and opens up a backdoor and downloads another piece of code that lets it track what the user does. The Trojan uses “fast flux,” a technology that changes to a new server if the current one is blacklisted. They are usually east to identify because they use very long domain names IBM Looks at Small Things IBM and Stanford University have created a microscope that, with further development, could give 3D images of proteins. The imaging technique can peer below surfaces of cells without damaging organic material, according to IBM. …so much for hiding behind molecules. My DNA can be researched to build clones (that’s good??) Finè Blue Chips Magazine —January 2009 Blue Chips Magazine “Utah’s Award Winning Publication” Magazine Staff Editor — Cliff Millward Review Program Liaison — James Alexander Review Product Editor — Donna Nendell Review Editor/Product Recruiter — Don Nendell Photography — LeRoy Johnson Proof Reader — Larry Lamph, Doug Jackson Advertising Rates Ad costs 2 Page Spread Full Page Half Page Quarter Page Business Card 1 month $150 $100 $50 $25 $15 3 months $400 $275 $130 $70 $30 6 months $700 $500 $250 $130 $60 Charter Member of the Association of PC User Groups 955-9633 250-2269 565-9594 565-9594 12 months $1200 $900 $450 $225 $120 Full page size is 7½ x 10 inches. All other page sizes are based on a 7 x 10 inch page in order to conform to editorial style. Half-page ads may be 7 x 5 inches or 3½ x 10 inches. Quarter-page ads are 3½ x 5 inches. Business card ads are 3½ x 2½ inches. Classified Advertising Utah Blue Chips members may place personal classified ads at no charge. Maximum ad size is 7 lines, 35 characters per line. Submissions Members are encouraged to submit text articles for publication in ASCII text only. Photos in .TIF or .JPG format only. Line graphics, tables, in almost any vector or .TIF format. Do not imbed graphics or tables in text files. All articles must be received by the 15th of the month preceding the month of publication. All articles become the property of the Utah Computer Society and by submitting an article, the author gives permission for the Blue Chips Magazine Staff to edit the submission. The author also gives permission for republication in other users groups’ communications. Officers and Trustees Eve. Phone E-mail President, Stuart Gygi V. Pres., Larry Lamph Secretary, Lowell Kenedy Treasurer, John Witzel Doug Jackson 576-1891 571-2908 278-3035 296-1390 322-2337 [email protected] [email protected] lkenedy@ucs,org witzelj@ucs,orgtt [email protected] Information Persons or companies may join or renew at the meeting, or by sending a check payable to the Utah Computer Society to: Utah Computer Society Membership Secretary 5435 Riley Lane Murray, Utah 84107 Individual memberships are $25/year. Business Memberships are $35.00 a year. Corporate sponsorships are available at two levels. Corporate Sponsors enjoy all benefits of membership including multiple individual membership and prepaid advertising coverage. Contact a Board Member for more information. Other important information: Permission to Copy Permission is granted to other nonprofit PC user groups to reproduce any article published in this newsletter, provided credit is given Blue Chips Magazine and the author (s) of the reproduced materials. Reprinted articles are subject to the terms of their respective copyright holders. Meeting Information Group Business (James Alexander) Magazine (Cliff Millward) Web Site WebMaster Membership (evenings) (Bob) MONTHLY MEETING LOCATION 2nd Wednesday of every month January Renewals Glen Guiver Frank Herriott Larry Lamph University of Utah, Union Building, 7:00 p.m. Page 3 Blue Chips Magazine —January 2009 http://www.ucs.org 250-2269 955-9633 http://www.ucs.org 262-6045 262-6045 Page 4 Blue Chips Magazine —January 2009 Introduction to GhostSurf Platinum Review Security-Related Report By Don Nendell “Happy New Year Everyone!” Prolog I trust that you all have sufficiently recovered from Xmas and the merriment of New Year’s Eve. Donna and I sincerely hope and pray that all of your “Resolutions for 2009” actually do come true for you and yours - this time! A votre santé! Seeing that “bubbly” graphic somehow, and for some strange reason, or other, brought out “long forgotten” memories of my more rowdy USAF flying days, drinking nights, and throwing empty glasses into the Officer’s Club fireplace. As a result, “I’m feel’n my Cheerios,” today. Both of these thoughts are dating me, that’s for sure. Must be the New Year, surely? Segue to Today After seeing the eWeek Magazine The Year in Review (December 15, 2008) issue, I got to thinking - strange as that may seem - that one “critical area” of my previous 57 BCM “Security-Related” Reports and Reviews I haven’t covered to date is “Surfing the Internet Anonymously.” What really brought this front and center, however, was an “unopened” shrink- wrapped box of Ghost Surf Pro that, somehow, was just lying there on my side desk simply crying for me to open up, and slip silently into “action?” Sir Arthur Conan Doyle said, “There is nothing as deceptive as an obvious fact.” With interest definitely piqued, I decided to find out how far Ghost Surf Pro was out of date; yikes vintage 2002. But, it says it works for XP, so all isn’t lost after all, I could still use it on my “main squeeze” PC, Page 5 Blue Chips Magazine —January 2009 Security Report that malicious XP I keep yapping about (HIAWP). With a guilty conscious, I started right away checking out the lineage of Ghost Surf (~) revisions: ~Pro, ~2005, ~2006, ~2007, and ~Platinum. Pretty impressive! OK! I’m only four (4) versions out of date. Not really so bad, but certainly not all that good. Then I started my deep Internet search on a subject that I am familiar with from having previously attended a goodly number of DEFCON’s and Black Hat Briefings, but had no experience using first-, second-, or even, off-hand. Whoa! This is actually turning out to be quite fascinating. I should have done all this way back in 2002 with Ghost Surf Pro. “But better late than never,” I murmured under my breath. And, it most definitely deserves a Review all of its own. Game on! So here come numbers 58 and 59, if I’ve counted correctly? 200 Proof “Security-Related” And now, we come to the only “Security-Related” stretch I’ll be making herein, and hereon, which immediately returns us to my New Year’s greetings above and the alcohol references therein. A 100% “Security-Related” alcohol corollary is 100% pure ethanol; which is actually 200 US proof, and is used strictly for industrial or scientific purposes only. Besides being 100% illegal, if it is ingested it is guaranteed to cause severe side effects. Any recollections I personally have to the term, “100% pure alcohol,” are “past references” to “Torpedo Juice.” F r o m Wikipedia, the free encyclopedia: “‘Torpedo Juice’ is a term used to describe an alcoholic beverage in World War II which was made from the high grain [ethyl] alcohol fuel used in [US Mark 14] torpedo motors. [The origin of this term was from a typical recipe which was two parts ethyl alcohol and three parts pineapple juice]. . . . With the introduction of the electric powered US Mark 18 torpedo, ethyl alcohol was no longer required for torpedoes. . . . [The term “Torpedo Juice,” however, is multi-faceted, and is still widely used to this day]” Which also brings to mind, I vi vi d l y r e member being mesmerized watching the submarine film ‘‘Destination Tokyo” (1943), which starred Cary Grant as the mythical Seadragon’s skipper. It featured a “submarine appendectomy” accomplished about 150 feet below the surface of the South China Sea in 1942 by a 22-year-old pharmacist’s mate and an assistant. The crew sterilized the operating instruments with boiling water and used “Torpedo Juice,” the alcohol that fueled the Seadragon’s torpedoes, to kill germs, and pajamas were substituted for surgical scrubs. During my interim Internet research I found many fascinating references to “Torpedo Juice.” A great one comes from the National Naval Aviation Museum, the largest Naval Aviation museum in the world, and one of the most visited museums in the state of Florida (See graphic bottom left.) “For the happiest life, days should be rigorously planned, nights left open to chance.” - Mignon McLaughlin. BTW That may be true generally speaking, but, it most definitely is not true when it comes to this month’s Security-Related Report subject, which is: Anonymous Surfing “Q. What do nude volleyball and the Web have in common? A. Both offer the same amount of privacy.” - Old Anonymizer.com Web Site Point of Interest. The first Internet anonymizer was Anonymizer. com, developed in 1997 by Lance Cottrell during studies towards a Ph.D. in Astrophysics at the University of California, San Diego. One can immediately understand why he did it? Cottrell is a noted privacy advocate. Considerations of Anonymous Surfing (~): 1) What is ~?; 2) Why would you want to do ~?; 3) Who does ~?; 4) What is the cost of ~?; 5) How is ~ done?; 6) When is ~ done?; and 7) Where is ~ done? 1. What is ~? Definition from WiseGeek <www.wisegeek.com>: “Anonymous surfing allows you to wander the Internet without leaving any track of your computer’s IP (Internet Protocol) address. This is accomplished via a proxy service. “When surfing the Web from the privacy of your living room, den or office, it may seem as if your movements online are completely anonymous. Unfortunately, the opposite is true. Everywhere Page 6 Blue Chips Magazine —January 2009 you go you can be tracked through your IP address. The IP is a numerical value that maps back to your ISP (Internet Service Provider) and ultimately to your specific computer. It is linked to your computer by assignment to your login username and password. “When you request a website by clicking on a link or bookmark, your computer sends its IP address to the website along with the request for the page. The destination server answers by sending the requested page to your return address. Your computer receives the HTML data and the browser turns it into a graphic page you can view. In this way, websites can keep track of every page you view by logging your requests along with your IP [my emphasis here]. “Anonymous Surfing defeats this ability by using a go-between proxy that ‘stands’ between the surfer’s computer and the Web. This intermediate server, or proxy, handles all of your computers requests for you. Your requests go to the proxy, which relays them to the Web. The website sends the requested pages back to the proxy server, which then forwards them to your computer. Websites can only log the proxy’s IP address, not yours. It’s rather like having a valet run all of your errands for you, so that the valet’s face is the only familiar face on the Web.” 2. Why would you want to do ~? There are many reasons why people use web anonymizing services to surf anonymously. They range all the way from: to maximize their privacy, to simple paranoia (protecting personal data), to hiding browsing activities from others (including parents, spouses, or even other organizations), and/or to bypass web blocking applications that would prevent access to Web sites or parts of sites that the user wants to visit. However, it seems that those web anonymizing services have flaws that allow web sites to bypass those anonymizers and retrieve information about the user’s system (See vulnerabilities below). By surfing the Web you are exposed to hackers, bombarded by advertisements and subjected to spyware, malware, malicious Bots, and virtually anything conceivable? Everything you do and download online can be watched. Hackers, Webmasters, any other users of your computer, and even your boss can see your surfing habits. Worst of all, you make your personal and credit card information readily available, which can easily lead to Identity (ID) theft, amongst other chilling thoughts. It’s mostly all about Money, you know? It’s called cybercrime. Bottom line. The obvious purpose to anonymously surf the web is for your own personal privacy, security, and peace of mind. Take a look at what I found out about my own PC before I started all this research, and that’s not all either. FYI You can see some of the wide range of data that web sites can read from your own browser, as well, including your IP address and other identifying information, at the following sites: IP Info <http://www.lawrencegoetz.com/ programs/ipinfo/>; Network-Tools.com <http://network-tools.com/analyze/>; and, 404 Research Lab Supersleuth <http://www.plinko.net/404/supersleuth.asp>. This is pretty scary stuff, folks! 3. Who does ~? Gizmo’s Allan Marillier at <www.techsupportalert. com/best-free-anonymous-surfingservice.htm> says, “The most obvious Page 7 Blue Chips Magazine —January 2009 anonymous browsing application for most people is in internet cafes, on public terminals, using wireless or even wired access points away from home, or in fact, on any PC including your own, where you don’t want to leave traces of your private surfing activities. Some other browsing activity cleaners exist that clear the cache, cookies, history and other traces, [and] some are even available as a standard in most browsers, but anonymous browsing goes a step further. What attracts me is not so much the privacy aspect, but rather the security potential, because all of the anonymizing browser proxy based services create a secure encrypted connection between the PC you are using and the first anonymizing proxy server. [They’d grow old trying to figure that out] “This allows you to safely transmit information without little risk of local interception, making it ideal for surfing on open Wi-Fi networks, or in hotels [, or] while traveling. Previously, secure surfing on such networks required the use of private VPN networks, generally an option only available to corporate employees, those with the available money to pay for it and the technically savvy. . . . Whatever the reasons anyone may have for using anonymizing browsing, commercial services that offer anonymity are doing well, and a number of both free and subscription based browsing applications and services have become available.” Remember the 1998 movie Enemy of the State? Well, you darn well should. If not, hustle out and get it at the closest movie rental store, and then imagine yourself in the place of the lawyer character Will Smith is portraying? It can really happen, and it can happen to you, and definitely on the web, as well! 4 What is the cost of ~? The first consideration for us here probably has to be the “Total Cost of Ownership (TCOO). To fully appreciate the value of anonymity online, consider the basics of web browsing. Pricing for the service runs the gamut from “Free” to $9.95-$13.95/month; and purchased usually in the $30-$40 range with one year of proxy server service. And “Free” is always good, right? But, in this case I’m just not so sure, as are others with a lot more experience in this matter than I. For instance consider these questions: 1) Who exactly pays for the Bandwidth you will use?; 2) The persons controlling the proxies are in a “great” position to exploit you, if they so desire, and then again, how do you know they aren’t?; 3) What services are offered by these proxies, if any, and who provides the Tech Support, if needed?; and, 4) How do you know there isn’t a Trojan Horse, or some such creature, embedded in the software they use? Et cetera. Et cetera. There are many free proxy programs for anonymous surfing, but most rely on using ‘unwilling’ proxy servers. These are private business servers configured incorrectly to leave open ports, which anonymous surfing programs can exploit. Enthusiasts use port scanners to check for unsecured networks, then they post those addresses publicly on a daily basis. When administrators realize the breach, the port is normally closed. Therefore, using manual anonymous surfing programs means constantly perusing the available list of proxy servers, and changing them accordingly. Purists are willing to do this, because they believe it is the safest way to achieve anonymous surfing. FYI Lifehacker at <http://lifehacker.biz/> has some “Free” anonymous surfing sites listed for you to check out - If that’s the way you way to be! ;-} The alternative is to join a Web service that will provide a toolbar to use in place of the standard URL (Universal Resource Locator) in your browser. You can surf normally, using the toolbar address field to enter website addresses. The toolbar calls upon its own server to act as the proxy. Most sites that provide anonymous surfing of this type charge a monthly or yearly fee for the service, while others offer free trials. Certain websites do indeed offer free anonymous surfing, but the client must surf from their website. Moreover, the proxy handles requests from paying clients before handling free proxy requests, which can ultimately make anonymous surfing veerryy sloooww. But then, after all you get what you pay for, don’t you? “Free” isn’t really free; you have to pay the piper someway/somehow (See pitfalls below). 5. How is ~ done? This is where our Review of Ghost Surf Platinum enters the picture (See the Review immediately following this Report). a. The leading web anonymizers are simply web sites that proxy HTTP requests. Caveat. However, some features in the leading browsers allow remote web sites to collect this information about you and your PC “even when a page is accessed using anonymizers.” For example, using JavaScript, a remote site can retrieve the local machine’s IP address and send it to the remote server. Also, using special HTML tags (like the META tag’s REFRESH property) can silently redirect the browser to the “original site,” bypassing the anonymizer (without the user’s knowledge). These issues basically render the anonymizers ineffective, since they do not really hide information from a remote site. b. In the meantime, all users’ identities are verified instantly with Page 8 Blue Chips Magazine —January 2009 servers based on a unique machine fingerprint that each computer has. Caveat. From this point on, all subsequent user activity from their original location can be traced directly back to that location, albeit their home (or office), or even the network that is connecting to any local, or national ISP, on their behalf. c. After typing in the URL of the desired web site, for example, our imaginary <www.somewhere.com>, the anonymizer will retrieve and display the HTML page using the anonymizer’s server instead of the client’s machine. In this case, the remote server knows nothing about the client’s machine, only what’s coming from the anonymizer’s server. d. Ever wonder how web sites seem to know so much about users? Well, without an anonymizer server shielding them, once a user is online, everything they do is recorded and stored in various ways. For example, within moments of logging online, packets of data are dumped back into the user’s cache, cookies are planted, and trails are laid that connect the dots from their starting and ending points online. e. At the end of each browsing session, each and every site they visited has recorded where they had been before they arrived, what they did at that site, how long they stayed, and what they did next. And then, simply because of this record about their surfing activities, the very next time they go online, any previously visited site(s) will know that they’ve returned, and consequently, can tailor their advertisements directly toward the user, or simply bombard them with junk, if they choose to do so. BTW Question. Have you ever wondered how some of those sexually explicit images just up and appear on your browser for no reason, or on the very next time you go surfing? Answer. Well, you probably just accidentally hit that porno web site along the way, then too, or maybe you were directed there without you ever knowing how it happened, right? Well, that’s what this Report is trying to get across to you, “Stuff happens,” you know. Well, that’s what the bumper stickers/license plates tell us, anyway! ;-} My license plate should read: 4MERUTE SBALLCOACH (But THEN that’s too big, isn’t?) FYI. Here’s a Safe Surfing Corollary for you to check out: 10 ZDNet Images and an explanation on “How to run Internet Explorer securely” can be found at: < http://content. zdnet.com/2346-12691_22-87874-1. html?tag=nl.e539 >. Once there one can find the key configuration changes one can make to disable various features and reduce the attack surface in Microsoft’s Internet Explorer. The guide there provides a walk-through of IE 6.0, but applies to the latest IE 7.0 as well. Taking one good example from it that applies specifically for us herein is the Multimedia section under the Internet Explorer Advanced tab (In the Advanced tab, you can find default settings used by all zones). They tell us, “The settings contained in the Multimedia section have features that you can adjust to protect against some potential vulnerabilities. For instance, attackers may be able to track your usage or exploit the software you use to play multimedia data. CERT/CC recommends disabling the options to play sounds and videos by unchecking these boxes” (See graphic). There’s a lot more there. Check it out; “you’ll be very glad you did.” 6. When is ~ done? It’s done all the time. And you’ll be doing it too, after you’ve once read the Ghost Surf Platinum Review, I’m sure. Meanwhile, here’s some sound advice we all should take to heart. It comes from Jim Rjindael. FYI. Our current Encryption standard, the Advanced Encryption Standard (AES) Algorithm (Rjindael), is based upon, and named for this man’s work. “Sit you up and take heed,” as Yoda would implore us to do. “I have worked in IT security for nearly 20 years and have seen how ‘experts’ deal with security. I don’t trust anyone with my information or details. As such I write under the awful but recognisable [sic, he’s English] corruption of the magnificent cipher developed by Joan Daemen and Vincent Rijmen. The Internet is an information gold mine - just make [sure] your personal details aren’t included. Our governments, identity thieves and all sorts of people with different agenda are watching us[,] make sure you stay low key Page 9 Blue Chips Magazine —January 2009 online!” - Jim Rjindael - EzineArticles. com Expert. Note. Jim has written 21 articles on Anonymous Surfing, see them all at: <http://ezinearticles. com/?expert=Jim_Rjindael> Also Note FYI. Information on the AES algorithm (Rjindael) is available, including test values, intellectual property (IP) statements, and specifications. Those who are interested in the AES specification (i.e., the actual standard) should refer to the FIPS 197. You can also do a search for “Jim Rjindael”. A point of reference. My DYCRAV AutoEnc Security Suite Application (See my August 2006 BCM Review 1 ) uses the AES 256-bit Encryption Algorithm (Rjindael) to secure the Drag and Drop (DnD), Dual-layer, Compressed and Encrypted file(s). 7. Where is ~ done? Again we hear from Jim Rjindael. “Real Anonymous Internet Surfing takes some Effort. There are many people out [there working very hard] to trap our data and surfing patterns, [such as] hackers, identity thieves, spammer[s] and even our Governments. Just search- ing for a few free anonymous proxies on the Internet is unlikely to be a great experience. Even if you are lucky enough to avoid the proxies that have been deliberately set up to trap the thrifty anonymous surfer by some Eastern European Identity thieves, you may find one of the servers which has been setup to track your surfing and then send you a deluge of targeted SPAM. “Those who find a clean anonymous proxy[,] which does its job[,] will eventually probably give up using it because it will be incredibly slow. All the time your every visit to every website will be logged and recorded at your local ISP - along with your emails backed up on tape and left there for who knows to see. “If you really want to have anonymous Internet surfing - you need a fast secure anonymous proxy, the facility to switch proxies seamlessly with no effort [and], all your web traffic needs to be encrypted from the client and back again. You will then be completely anonymous online and your ISP logs will be completely secure and unreadable to anyone just like mine!” - Jim Rjindael, Anonymous Internet Surfing - The Art of Surfing in Secret in the current economic downturn. . . . Finally, more than nine out of 10 adults said the Internet has improved at least one aspect of their lives. Within this group, the most popular improvements included staying in touch with friends and family and being able to shop more effectively. “ - Antone Gonsalves, InformationWeek (December 15, 2008) Note. I invite you to pay particular attention to the 2008 series: Encryption -What’s That Report1 (July 2008); Encryption - Why Report1 (August 2008); Security News n Views Part2 Report1 (September 2008); and, Security News n Views Part3 Report1 (November 2008). If what Gonsalves reports can truly be believed, then one can certainly understand why Anonymous web surfing might be high on that 46% group of women’s list of priorities. Makes immanent sense to me, as it allows a user to visit Web sites without allowing anyone to gather information about which sites the user visited. I just have to wonder about their “SAFE surfing” habits though? A. N. Onymous claimed: “Liberals are very broad-minded; they are always willing to give careful consideration to both sides of the same side.” It’s time now to respectfully refer you to the May 2008 BCM Security-Related News and Views 101 Report1, as well as, all the other Security-Related Reports1 in the series I’ve been sharing with you here over the years in BCM. Back to Surfing Basics. Say What? Before we leave the subject of introductory “safe surfing,” with tongue in check, we see that truth is indeed stranger than fiction. Point in fact: U.S. Adults Choosing Internet Over Sex. “Nearly half of the women aged 18 to 44 surveyed, or 46%, said they would rather go without sex for two weeks than give up the Internet for the same amount of time. . . . Some 30% of the male respondents said the same. . . . The November poll, released Monday, found that most adults consider the Internet essential to daily life And, it’s also time to bid you a fond adios/adieu, and point you in the direction of the Ghost Surf Platinum Review, which appears on the very next page. Buena Suerte! Bon Chance! Enjoy! Happy New Year! Bye! Footnotes See the actual Reports/Reviews in the Blue Chips Magazine Archives at <www.ucs.org>. Note. Always choose the .pdf format for its beauty. 1 Page 10 Blue Chips Magazine —January 2009 GhostSurf Platinum Windows Review Invisibility on the Internet Reviewed by Don Nendell Manufacturer: Process Software 959 Concord Street Framingham, MA 01701 Phone: (800) 722-7770 (508) 879-6994 FAX: (508) 879-0042 e-mail: [email protected] Tech Support: Hours of operation: 8:30 A.m. to 7:00 P.M. EST Phone Support is available for purchase. If you purchase phone support, the support phone number will be in your confirmation e-mail. E-mail support is available 24/7. You can use their support web page to send your question to Tenebril’s customer service representatives. You will receive a response ASAP by e-mail. Supported Operating Systems: Windows 2000 SP4/XP SP2/Vista (32 bit only) Minimum System Requirements: CPU: 300 MHz or better 256 MB RAM 80 MB hard disk space Internet Explorer 6.0 or higher Internet connection (for automatic updates) Simple Description: Anonymous Internet connections that allow you to “Surf the Internet Invisibly” Where to purchase: GhostSurf Platinum is available immediately on the Internet at <www.tenebril.com>, as well as from the extensive network of Tenebril Authorized Resellers. GhostSurf Platinum is also sold through all major electronics retailers. Pricing: GhostSurf Platinum with 1-Year Updates $49.95; 1-Year Renewals $24.95 GhostSurf Platinum with 2-Year Updates $99.90 $54.90 (save $45); 2-Year Renewals $39.95 GhostSurf Platinum Volume Licensing (1-Year Updates): 2-user: $79.95, 5-user: $189.95, 10user: $349.95 15-day “Free” trial (25.7 MB download from) Tenebril (web site) Benefits: Save on New GhostSurf Platinum 5.1 (See 2-year Updates pricing above) Encrypts your Internet connection Erases all traces of your Web surfing Removes aggressive spyware Prevents identity theft and credit card fraud Secures confidential files Eliminates online ads About Tenebril Tenebril, Inc. is a leading security and privacy technology company creating innovative, award-winning solutions for home and enterprise customers. Unlike traditional approaches to the growing spyware problem, the patent-pending Tenebril Spyware Profiling Engine™ is uniquely capable of defeating quickly-mutating spyware to provide zero-day protection. Led by a seasoned team of software industry veterans, the company’s product lines are distributed worldwide via multiple channels including e-commerce, retail, security experts, and a direct sales force. Tenebril was founded in 1998 and was acquired by Process Software, a unit of HALO Technology Holdings, Inc. (OTCBB: HALO) in August 2006. Process Software (www.process. com) is a premier provider of communications software to mission critical environments. With over 20 years in business, Process Software serves thousands of customers, including many Global 2000 and Fortune 1000 companies. Prolog Red Skelton, famed comedian (July 18, 1913 - September 17, 1997), said, “All men make mistakes, but married men find out about them sooner.” Ergo, CYA Disclaimer: No matter how this looks to all of you, I am not, repeat NOT, in the habit of reading any “Advice to the Troubled/Lovelorn” columns. But, this particular piece was just sitting there on the Salt Lake Tribune Comic Section right next to my JUMBLE PUZZLE, as “Big As Life,” and, needless to say, I just couldn’t pass it up, you see? Anyway, being very apropos to our Review subject herein, plus it being a real first for me, as well, here it is FYI. “While I’m away, readers give the advice” - Carolyn Hax, Salt Lake Tribune Advice Column Writer, Salt Lake Tribune, 12/26/08, p.E14. Page 11 Blue Chips Magazine —January 2009 “‘Privacy is dead in the electronic world. On spying on teenagers. The sooner that children learn that electronic communications are not private, the better they will be. Teenagers, and for that matter, many adults, seem to think that their electronic communications can remain private. Messages (and photos) on Facebook, MySpace, e-mail, iChat and cell phones are not private. They are easily retrieved, by those who are not particularly technologically savvy and by those who may not have your children’s best interests at heart. Online messages may easily be viewed by people other than the intended recipient. These messages can live forever in cyberspace. . . . There is no such thing as respecting electronic boundaries. The newspaper is filled with stories of people who went to jail because they failed to realize that electronic communications are almost impossible to erase completely.’ - A Mother Who Is Weary of Fighting This Battle, Among Others. . .” The Concern Is? There are many, and varied, good reasons people have for wanting to surf anonymously. They run the gamut. They range from outright simple paranoia of protecting personal data, to hiding Internet browsing activities from anyone and everyone, which may include parents, spouses, or other persons and/ or organizations. Simply stated, they want anonymity, which is defined as follows: Wordnet: The noun has one meaning: Meaning #1: the state of being anonymous Synonym: namelessness Wikipedia: Anonymity is derived from a Greek word meaning “without a name” or “namelessness”. In colloquial use, the term typically refers to a person, and often means that the personal identity, or personally identifiable information of that person is not known. Noun. anonymity (countable and uncountable; plural anonymities) 1. (uncountable) The quality or state of being anonymous; anonymousness. 2. (countable) That which is anonymous. Verb. to anonymize (third-person singular; simple present anonymizes; present participle anonymizing; simple past and past participle anonymized) 1. (transitive) To render anonymous. Adjective. anonymous 1. Wanting a name; not named and determined, as an animal not assigned to any species. 2. Without any name acknowledged, as that of author, contributor, or the like: as an anonymous pamphlet; an anonymous benefactor; an anonymous subscription. 3. Of unknown name; whose name is withheld: as, an anonymous author. Synonyms. nameless, unidentified, unknown, unnamed Note. Like the Utah Utes football team— is was nationally (including KSL TV) before they upset the vaunted Alabama Crimson Tide in the 2009 Sugar Bowl 31-17. So, What’s It All About, Alfie? By surfing the Web you are exposed to hackers, bombarded by advertisements and subjected to spyware, mal- Page 12 Blue Chips Magazine —January 2009 ware, Trojans, BOTS, and a whole host of other nefarious “Bad Guys!” Everything you do and download while you are surfing the Internet, can be watched. Hackers, Webmasters, and even your boss, whomever that may be, plus others who might access your computer, can easily see your surfing habits. Worst case scenario. Your personal data (albeit medical, financial, credit card information, et al.), is most definitely easily readable. To which Tenebril responds, “Since anti-virus and firewall programs do not adequately address these issues, the obvious answer has to be GhostSurf Platinum (GSP). GhostSurf Platinum provides a secure surfing experience by protecting your privacy and preventing damaging Internet threats from infecting your PC. GhostSurf ensures your safety online with an anonymous, encrypted Internet connection. It stops sophisticated spyware, eliminates ads, encrypts data stored on your PC, and erases your tracks - all which can help prevent identity theft and credit card fraud. . . . [It can accomplish this because] GhostSurf provides not only the ability for anonymous surfing through anonymous proxy[,] but gives you the option to surf anonymously with [an] encrypted internet connection. . . . With GhostSurf, you’re invisible and in control online.” OK! OK! Before GSP This is really fascinating stuff. As mentioned above, it is a very simple matter for website operators, ISP’s, spammers, hackers, and others to determine your IP address, your ISP location, and lots, lots more. 1. As a good example, here’s what I got thrown back at me from the Internet, before I installed GhostSurf Platinum (GSP): “Your IP Address: 71.199.7.60(*) Your ISP: c-71-199-7-60(*). hsd1.ut.comcast.net [(*) Note. The Data has been changed for obvious reasons, Duh!] Using such information, a hacker could attempt to break into your computer, websites could keep records of your visits, and tracking software could map a path to your geographic location. Some bulletin board type websites even display your IP address for public view when you post a message.” (Source: IP Address Changer) 2. And, this one was the most eye-opening of the bunch. It comes from Are you Surfing Anonymously? Posted on Audit My PC <www.auditmypc.com/anonymous-surfing.asp>. Here’s what they reported on my PC when I visited them: “Below is information that you are giving away right now as you visit sites. Anonymous surfing is easy if you know what type of information to block. The end goal is to give away as little information about yourself as possible. . . . We are not doing anything special here, we are simply reading the information your computer is providing about you and displaying that back in a form you can understand. To surf anonymously, you need to first understand exactly what you are giving away Your computer is connecting to the internet at West Jordan, UT, in the US, with an IP of 71.199.7.60(*) Your UserAgent is being reported as: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.9.0.5) Gecko/2008120122 Firefox/3.0.5 Your Referrer is being reported as: [This was a first time visit, therefore, no ‘referrer’] Your IP Address is 71.199.7.60(*) Your Host Name is c-71-199-760(*).hsd1.ut.comcast.net” [(*) Note. The Data has been changed again for obvious reasons!] 3. And finally, About.com:Web Search at: <http://websearch.about.com/od/ searchingtheweb/a/anonymous.htm> has an article, Anonymous Surfing 101: Free Anonymous Web Surfing - What is it? By Wendy Boswell, About.com. In the article there is a link to Leader (when security matters) at: <http://leader.ru/secure/who.html>, which gave me pretty much essentially the same information about my PC as I got from Audit My PC above. They even had the Referrer: http://websearch. about.com right. The only thing missing; however, they didn’t have a map, like Audit My PC did. Oh! BTW As an aside, About.com had a fabulous ad with a female talking head from Site Pal that followed my mouse pointer all over the graphic. Well, a man has to have a little fun while “Surfing,” doesn’t he? Anyway, I’ve seen enough now to really make a believer out of me! May I respectfully suggest that at this juncture you refer to my previous Introduction to GhostSurf Platinum Report (See pg. 5 of this BCM issue) for a more complete rundown on Anonymous Web surfing. But, as a quick refresher, it goes something like this: 1) Services that provide anonymity disable pop-up windows and cookies and conceal the visitor’s IP address; 2) These services typically use a proxy server to process each HTTP request; 3) When the user requests a Web page by clicking a hyperlink or typing a URL into their browser, the service retrieves and displays the information using its own server; and, 4) The remote server (where the requested Web page resides) receives information Page 13 Blue Chips Magazine —January 2009 about the anonymous Web surfing service in place of the user’s information. Which brings us to. . . . GhostSurf Platinum, Front and Center! Sir, Yes Sir! Report! Sir! GhostSurf Platinum (GSP) is the industry’s most comprehensive Internet privacy product making users virtually invisible on the Internet and ensuring a secure surfing experience. GhostSurf Platinum is the first privacy solution that protects users from identity theft and fraud, and with the 5.0 version introduced on April 1, 2008 it added new anti-spyware technology, a full version of the new SpyCatcher 5.0 release (a $29.95 value), plus Windows Vista support. SpyCatcher’s enhanced Profiling Engine offers proactive protection by monitoring a user’s PC for any suspicious activity that is typical of spyware. It stops any action from taking effect before a PC is put at risk. SpyCatcher also provides a wealth of information on what applications are running. Users can decide to allow, or block, and remove any applications based on this information. Sir! With over half a million customers, GSP has been a market leader in Internet Privacy technology for more than six years. GhostSurf Platinum 5.0 integrated a number of state-of-the-art technologies to create unmatched privacy protection. GSP: 1) Routes online activity through private anonymous hubs; 2) Encrypts Internet connec- tions; 3) Erases traces of surfing using Department of Defense standards for data destruction; 4) Enables novice PC users to remove and block the most aggressive spyware with SpyCatcher 5.0; 5) Provides a secure location to store confidential files with an encrypted and password-protected digital lockbox; 6) Enables even novice PC users to erase all traces of their online activity, encrypt their Internet connection and remove aggressive spyware automatically. and 7) Eliminates online ads. Sir! Brian McDonald, Process Software President and CEO said, “Spyware continues to pose a serious risk to online consumers as spyware vendors use more complex methods to steal information. We have upgraded GhostSurf Platinum Internet privacy security suite to include a new full version of SpyCatcher 5.0 which includes a more powerful technology to protect users.” According to the National Cyber Security Alliance, spyware infests more than 90 percent of all PCs. This fast-growing Internet threat is also one that is least apparent; spyware silently bypasses firewalls and anti-virus software, affecting computer performance and introducing security risks, often without a user’s knowledge. “Advances in spyware programming require a solution that is designed specifically to meet the growing threat. SpyCatcher is the only antispyware that uses multiple layers of technology including advanced behavioral detection to stay ahead of spyware attacks. SpyCatcher enables users of all technical abilities to remove even the most aggressive spyware automatically”. Sir! What’s New in GhostSurf Platinum 5.1 1) Updated user-friendly interface; and, 2) A new SpyCatcher version with improved proactive spyware protection: a) Profiling Engine™ includes real-time advanced behavioral-based detection; b) DeepDefense prevents the installation of rootkits, keyboard loggers, and other malicious programs safely. It intercepts all API calls, which blocks the installation of aggressive spyware; c) Vendor Tracking provides users with a list of certified vendors that have applications running on their PCs. Users can set policies by vendor; d) ClearView Application Control provides a detailed list and description of the applications running on your PC. Users can set application policies from this information; e) Installation Tracking provides you with a wealth of information on potentially unwanted applications. You can allow, or block, and remove applications more thoroughly so that no traces remain which could potentially harm your system; and, f) No-risk Spyware Removal (with SpyCatcher) enables users to recover all removed files and programs that were previously blocked from running. FYI According to the National Cyber Security Alliance, spyware infests more than 90 percent of all PCs. This fastgrowing Internet threat is also one that is least apparent; spyware silently bypasses firewalls and anti-virus software, affecting computer performance and introducing security risks, often without a user’s knowledge. Advances in spyware programming require a solution that is designed specifically to meet the growing threat. SpyCatcher is the only antispyware that uses multiple layers of technology including advanced behavioral detection to stay ahead of spyware attacks. SpyCatcher enables users of all technical abilities to remove even the most aggressive spyware automatically. Sir! Andrew Garcia, on eWeek.com, (January 9, 2006), wrote in his article, Fighting Spyware Is Never-Ending Battle, “Early blocking technologies using real-time scans that instigate Page 14 Blue Chips Magazine —January 2009 scanning and cleaning as files are written to disk have proved insufficient against the latest hardened threats, but newer technologies seen from vendors [such as] . . . Tenebril, Inc. . . are increasingly using kernel-level drivers to identify threats before they are installed.” Sir! How GhostSurf Platinum Works GhostSurf Platinum ensures that users are invisible and in control online by: 1) routing their online activity through private anonymous hubs; 2) encrypting their Internet connection; 3) erasing traces of their surfing using Department of Defense standards for data destruction; 4) enabling novice PC users to remove and block even the most aggressive spyware with SpyCatcher; 5) providing a secure location to store confidential files; and, 6) eliminating online ads. Sir! Installation GhostSurf Platinum installed flawlessly, near seamlessly (See my explanation Note below), and with an absolute minimum of effort. By way of explanation, when you install GhostSurf, or AdArmor, the installer will ask you if you want to anonymize or block ads all the time. If you left this item selected, the proxy was configured to start whenever your computer starts. If not, you can tell the proxy to start automatically by right-clicking its menu in your system tray and choosing “Run on Startup.” If this item does not appear, the proxy is already configured to run on startup. Note. As mentioned above, the whole installation process would have been absolutely “seamless” if, repeat if, every type of browser’s proxy would have been configured automatically, not just Internet Explorer’s browser. A small price to pay, I guess, as I was able to configure my Firefox 3’s proxy settings all by my lonesome - naturally with the help of GhostSurf’s Help file. Page 15 Blue Chips Magazine —January 2009 Page 16 Blue Chips Magazine —January 2009 Page 17 Blue Chips Magazine —January 2009 Page 18 Blue Chips Magazine —January 2009 Page 19 Blue Chips Magazine —January 2009 Page 20 Blue Chips Magazine —January 2009 Proxy Information This is what you pay your money for. GhostSurf’s proxy ferries data between your Internetenabled applications and the Internet. As data passes through it removes personally-identifying information and may reroute the data to hide your location and encrypt it to prevent others from seeing where you’re surfing. Repeat Note. It’s important to run the proxy whenever you’re using the Internet. When the proxy is running, all your GhostSurf settings (from ad blocking to privacy protection) are enforced. GhostSurf’s Proxy (Now see the CBC2 graphics again) GhostSurf’s proxy manages ad-blocking and privacy protection for AdArmor and Privacy Control Center, respectively. When you’re surfing the Internet, the proxy intercepts data before it leaves your computer and filters out personal information (if this is the setting you’ve chosen in the Privacy Control Center). It will also reroute your data through Tenebril’s anonymous hubs to prevent websites’ tracing you, and will encrypt your data if you are surfing in secure mode. When data comes back from the Internet, the proxy will remove cookies, pop-ups, ads and other nuisances. Caveat. Because the proxy does the work for the Privacy Control Center and AdArmor, it must be running while you’re surfing, or you will not, repeat, will not enjoy the benefits of GhostSurf. More about the proxy When GhostSurf’s proxy is running, you’ll see GhostSurf’s icon in your system tray. As you surf, the icon will blink orange. This indicates that the proxy is receiving data from your web browser and is anonymizing it, or that the proxy has received data from the Internet and is passing it to your browser. You can move your mouse over the proxy’s icon to get statistics on its work. Plus you can right-click the proxy’s icon and choose “Proxy Information” from the menu that appears to get more information on your settings. If you’re surfing in secure mode, you’ll also see a lock icon next to the proxy icon. Moving the mouse over the lock will show you some information about the proxy’s security strength. With that, please refer again to the CBC2 graphics to see how GSP works graphically: Graphic 1 Main Window The GhostSurf Platinum main window provides easy access to all features. GhostSurf Platinum protects your privacy and prevents Internet pests from spoiling your online experience. Graphic 2 Advanced Anonymous Surfing Tools State-of-the-art surfing tools in GhostSurf Platinum encrypt your Internet connection and route your surfing through private anonymous hubs. It makes users virtually invisible on the Internet and ensures a secure surfing experience. Graphic 3 Includes SpyCatcher v5.1 Page 21 Blue Chips Magazine —January 2009 GSP includes SpyCatcher v5.1 which runs completely separate from GSP. Note. SpyCatcher (when sold separately, costs $29.95 for 1-year with updates). Benefits: 1) Allows novice PC users to remove aggressive spyware; 2) Stops next-generation, mutating spyware; 3) Blocks reinstallation of aggressive spyware; 4) Prevents identity theft; and, 5) Removes spyware safely and automatically. Features: 1) Continuous Protection constantly secures computers from known and unknown spyware - even hyper-mutating and customcoded attacks. Eliminating the window of vulnerability for infection that signature-based solutions inadvertently give unknown spyware; 2) Real-Time Detection immediately identifies emerging spyware before it can attack, eliminating the delayed response typical of signature-based anti-spyware and the false positives of behavior-based solutions. Detects spyware deeply embedded in the operating system and scans system memory, registry files, hard disks, network drives, and other devices for spyware; and, 3) Safe Remediation automates and simplifies the spyware removal process and assures that only damaging spyware programs - not legitimate programs that serve a purpose - are removed. Graphic 4 Realtime Spyware Behavioral Monitoring When SpyCatcher detects potential spyware behavior from an unrecognized application, it prompts you to set a policy for the application that is causing the behavior, and (if applicable) the vendor that launched the application. A behavior is a specific action or combination of potentially undesirable actions performed by an application (or its components). Graphic 5 Unparalleled Tracks Cleaning and File Deletion Items stored on your PC such as Web history, cache, clipboard, cookies and more create a complete trail of your online activity. Protect your privacy and wipe these files away to Dept. of Defense standards for data destruction. GhostSurf Platinum is powerful enough to prevent undelete tools and aggressive hardware recovery systems from retrieving these deleted files and can even go as far as to remove residuals left on your computer by previously deleted files. Graphic 6 Total Control Over What’s on Your Screen AdArmor enables you to eliminate all types of advertisements, including pop-ups, in-page and paid search engine ads, as well as ActiveX, flashing text, animated images and more. You can even block access to Web sites you deem inappropriate. Graphic 7 Encrypt Confidential Files and Documents Control access to important data by creating an encrypted, password protected location to store sensitive information. GhostSurf Platinum is the most comprehensive Internet privacy product available. Note. It is this “Encryption” capability that intrigues me most. See “On the positive side” below for the way (Tao) to distribute those “Encrypted” Files and Documents securely and “Anonymously.” In Conclusion What if? I wonder, would we even have that old fable to share with our children if Little Red Riding Hood would have been invisible to the “Big Bad Wolf” by being shielded with a GhostSurf Platinum-like “Ghillie suit?” Well, it’s a thought? I leave you with yet another reason why GhostSurf Platinum with SpyCatcher is so important to everyone. This just hot off the presses, dated January 2, 2009 from Processor Magazine News, Page 9, Sophos Report Reveals Increase In Cybercrime. Last year proved to be a monumental year for the expansion of global crime on the Web. The Sophos annual security threat report has disclosed that Sophos detected a newly infected Web site every 4.5 seconds for every hour of the day, each day of the year. . . . Graham Cluley, senior security consultant at Sophos (www.sophos.com), states that a layered defense plan is paramount, because today’s criminals primarily use the Web as their method of infection. Now, we can add surfing anonymously to our layered defense plan; GhostSurf Platinum, to be precise. On the negative side. The only drawback I can see is having to pay for phone Technical Support. I’ve mentioned that “fine point” to the Tenebril representative, and they are addressing that possibility, as we speak. This would give them a truly great product and service all the way around. On the bright side. I have also suggested to their representative that all Tenebril needs to complete their wonderful “anonymity” package is to have the capability of checking the “anonymity of any PC on their web site,” like Audit My PC has. Note. Go to <www.auditmypc. com> and click on the “anonymous test” tab and surprise (scare?) yourself. On the positive side. What a fabulous capability I now possess: 1) I can surf anonymously with GhostSurf Platinum; 2) Have SpyCatcher watching my back during my Internet soirees; and, 3) Be able to exchange “secure (“Secret”) documents” with my DYCRAVTM AutoEncTM Suite (See my 2006 BCM Review1). “Now that’s anonymity,” as Crocodile Dundee would say. I can only sinPage 22 Blue Chips Magazine —January 2009 cerely hope that you avail yourself of all these same capabilities and relieve some of the daily stresses and strains induced by simply “Surfing the Internet!” On the fabulous side. HIAWP2, especially an invisible one running GhostSurf Platinum. Get it today. You’ll be ever thankful for the advise, and be greatly relieved when you do. Amen! “If some day you’re not feeling well, you should remember some little thing I have said or done and if it brings a smile to your face or a chuckle to your heart then my purpose as a clown has been fulfilled.” - Red Skelton. Happy Surfing! Here’s wishing you and yours a Happy, Abundant, Safe, Healthful and Successful New Year! Ciao! Footnotes See the actual Reports/Reviews in the Blue Chips Magazine Archives at <www.ucs.org>. Note. Always choose the .pdf format for its beauty. 2 Happiness Is A Working PC my hard-earned by-line. 1 Don’s Political Statement! Page 23 Blue Chips Magazine —January 2009 Utah Blue Chips Calendar January 2009, February 2009 UBC General Meeting U of U 7:00 p.m. CES Magazine Deadline U of U 7:00pm UCS Board of Trustees C&C Bldg. Room N3005 6:30 p.m. UBC General Meeting U of U 7:00 p.m. TBA Magazine Deadline Blue Chips — Utah’s Computer Guide in the 21st Century
Similar documents
GhostSurf 6
download [plus, also tracks your iPhone GPS location for up to a year]. Few in the world realize it but Apple is one of the world’s largest repositories of credit card information. Every iPad, iPod...
More information