Friday, October 21, 2005

PC Security - October Update

No PC is 100% secure, but you can make it considerably harder for hackers. This is an update to a blog posted in August of this year. What follows is a list of the tools I use (including the Internet links to the web sites for these tools), articles recently available on the web, and some additional information.

A new article from PC Mag.com
Contains a large number of tips, the main page displays a long list of bulleted items, click on the item of interest, read the information and use the print icon to make a copy. Warning, if you click on the next link at the bottom of the bulleted article you could end up viewing some additional and sometimes complex material. The first page of each bulleted item usually provides what you need to known.
www.pcmag.com/article2/0,1895,1838690,00.asp

For users of wireless routers security is the first thing you should look into are freeloaders can not only use your connection but also gain access to what’s on your PC. If you know you are the only user connected to the wireless modem in your house, try the following tip: In Windows XP press the CTRL+ALT+DEL keys to display Windows Task Manager. Next click on the ‘Users’ tab, this will display the number of users connected to your PC, if there is more than one you have a problem. For more information on securing your wireless router read ‘Between the cable modem and my PC is a router’ below.

The following is an updated reprint of the August Article. All links have been checked to verify that they are still good.

Between the cable modem and my PC is a router.
This device allows up to 4 or more computers to connect to the Internet or each other. It isolates my PC’s IP address from the cable modem’s IP address making it a little harder for hackers to see the PC when they go hunting. It’s like using a PO Box instead of your actual street address. There are two basic type of home routers, hardwire (requires a cable between the router and the PC) and wireless (you can place your computer anywhere within about 100 feet of the router). The down side of a wireless router is that you are broadcasting a signal that anyone within range can tap into. If you’re local Internet service provider gives you a wireless router as part of the package they provide, then look into security. Here you do not want to use WEP (too easy too crack) for security but instead choose WPA/WPA2 which is far more secure.www.google.com/search?hl=en&q=router
www.google.com/search?hl=en&q=WPA+security+tips
www.google.com/search?hl=en&q=wpa2&btnG=Google+Search

Install a software firewall.
This controls traffic to and from my PC and closes any unnecessary open or unused ports. Port scanning is another trick used by hackers. Open computer ports are like open windows in your house. Here I use a freeware program named Zone Alarm; the current freeware version is now 60.667.000. Using this tool lets you decide what applications or software can access the Internet and also blocks outsiders from accessing your PC. Zone Alarm also sells Pro version and Anti-Virus software; I have no experience with Pro or their Anti-Virus products. If you don’t not think a firewall is important then you should go to Gibson Research Corporation (http://www.grc.com/default.htm ) and scroll down to the page until you see the ‘Leak Test’ and ShieldsUp’ links, run these test, then you will see why you need a firewall!
www.zonelabs.com/store/content/home.jsp

Use an Anti-Virus package.
Use this to scan and protect your computer and any email you receive. AV software is not a total cure for viruses or worms as it is a defensive software tool and the vendor must be aware that a new virus exist, they must then develop a solution and you must download the update to their software when it becomes available. All this takes time and the delay until a fix is developed and downloaded leaves you at a small but potential risk, but you are at a much greater risk without this software. Three of the more popular tools are Trend Micro, Mcafee and Symantec. These companies also have firewall products sold separately or in combination with their AV software.
www.trendmicro.com/en/home/us/enterprise.htm
http://us.mcafee.com/virusInfo/default.asp
www.symantec.com/index.htm

Adware/Spyware detection products.
Every time you visit a web site harmless cookies and sometimes other unwanted and far more malicious content is placed on your PC (www.sunbelt-software.com/CounterSpy-FAQ.cfm) . To this end I use three products to help me spot and remove it. Two are freeware (Ad-Aware and Spybot Search & Destroy) and the third and best (CounterSpy) is a low cost product which you can try free for a limited time. Microsoft also provides a free AntiSpyware software product, the web page currently unavailable so I have provided a link to their Malicious Software Removal Tool download page. If multiple members of your household use the PC to surf the web then it’s very likely that some form of Spyware is already on your computer.
http://support.microsoft.com/?kbid=890830
http://www.sunbelt-software.com/
www.lavasoftusa.com/software/adaware
www.safer-networking.org/en/index.html

Startup Monitor
This little program develop by Mike Lin will warn you if something has been downloaded from a malicious web site to your PC without your knowledge and will secretly install itself the next time you turn on your PC. The only time you should legitimately see the warning displayed by Startup Monitor is when you are installing new software, performing a software update and occasionally your AV update or Microsoft security update. If this warning is displayed at any other time such as when you open an email message or when jumping from one web site to the next, then you can at your judgment deny the software from installing. Be aware that if you have ‘Automatic Updates’ turned on for any software on your PC this can sometimes cause a false warning. I have all my automatic update options turned off and update on my own terms, but you may want to keep it on so you don’t miss any updates.
www.mlin.net/StartupMonitor.shtml

Rootkits
Rootkits are designed to be completely invisible to Anti-Virus software. Rootkit Revealer available at Sysinternals.com explains in great detail what a rootkit is and how their software is designed to detect the presence of rootkits.
www.sysinternals.com/utilities/rootkitrevealer.html

Other Software that I use
Warning: Some of these utilities require more than a passing knowledge of Windows and if used incorrectly can cause serious problems, however some are reasonably safe to use.
Cookie Viewer: http://www.karenware.com/ View the contents of cookies.
Autoruns: www.sysinternals.com/utilities/autoruns.html Shows what software starts when you turn on your PC.
Process Explorer: www.sysinternals.com/Utilities/ProcessExplorer.html Shows what process are running on your PC and provides a link to Google for any process you are curious about.
Microsoft Baseline Security Analyzer version 2.0:
www.google.com/search?hl=en&q=Baseline+security+analyzer
Microsoft's Security Web Page:
www.microsoft.com/security/default.mspx

Newsletters to help keep you up to date on what happening:
PC Mag Tip of the day: www.pcmag.com/tips
Brian Livingston’s Windows Secrets: http://www.windowssecrets.com/
Langalist: www.langa.com/join_langalist.htm
Scot’s Newsletter: http://www.scotsnewsletter.com/

Now after reading all this you may think I’m paranoid, but there are some computer owners who go even farther than I have to make their pc safe. Yes it takes time and effort on your part, but there are hackers out there with plenty of time and will spare no effort to gain control of or bring your computer to its knees, not to mention identity theft, using your email address list to spread viruses to your friends and other nastiness.

Wednesday, October 19, 2005

Blog Spam

Unfortunately the spammers have now driven their pastime to an all time low, by posting spam to legitimate blog pages. Google has no doubt found out about this, but what they will do about it remains to be seen.

Monday, October 17, 2005

Gas Down, Cholesterol Up

The cost of a gallon of gas is down to $2.45, well below Milk or OJ.
Cholesterol and fat on the other hand have been getting a big push from some fast food chains lately. It wasn’t that long ago fast food was countering the attack on their menu by adding low cal/fat choices.

Now the tide has apparently gone back the other way with the addition of super burgers, lumberjack special breakfast sandwiches and alike. Not only do they cost more than gas but can potentially clog your body’s engine if you fill up your tank to many times.