Computer Security
All computer
software has security vulnerabilities because of careless
computer hardware engineering along with careless software
engineering. They fix vulnerabilities and then add new functions
creating new vulnerabilities! That means the computer you buy
has computer chips that were designed with buffer flaws and
operating system software with default settings that are not
set to the best security.
http://www.google.com/search?num=100&q=%22unchecked+buffer%22
http://www.google.com/search?num=100&q=%22buffer+overflow%22
http://www.google.com/search?num=100&q=%22buffer+overrun%22
http://www.google.com/search?num=100&q=%22integer+overflow%22
http://www.google.com/search?num=100&q=%22stack+overflow%22
http://www.google.com/search?num=100&q=%22heap+overflow%22
Choices of Internet Browsers:
Java, JavaScript, IE Script, ActiveX, Shockwave, Flash, certain plugins and other web enhancements greatly increases your computer security risk but disabling them greatly reduces the risk. Webmasters should take the hint and quit putting so much unnecessary and dangerous junk code into webpages.
Set your
preferences before using any new browser on the Internet! For
best security, uncheck Java, uncheck JavaScript, uncheck Plugins,
check No Images, check No Cookies, No Automatic Updates, No CSS,
No Skins, No Icons or Favicons, No ActiveX, etc. You
can always toggle the preferences to enable them on trusted
websites!
http://www.cert.org/tech_tips/securing_browser/
All browsers
have security vulnerabilites but most have little except Internet
Explorer that has many. Security vulnerabilites are greatly
reduced with the use of strict security procedures such as
firewalls, virus scanners, spyware scanners and high security
settings and preferences on your computer.
http://www.google.com/search?num=100&q=Opera+security+buffer-overflow
http://www.google.com/search?num=100&q=Firefox+security+buffer-overflow
http://www.google.com/search?num=100&q=SeaMonkey+security+buffer-overflow
http://www.google.com/search?num=100&q=Mozilla+security+buffer-overflow
http://www.google.com/search?num=100&q=Netscape+security+buffer-overflow
http://www.google.com/search?num=100&q=Avant+security+buffer-overflow
http://www.google.com/search?num=100&q=Internet-Explorer+security+buffer-overflow
The best tips
and tricks on the Internet for Windows and power users is at:
http://www.mdgx.com/
http://www.mdgx.com/toy.htm#NET FREE 9x/NT/2000/ME/XP/2003
INTERNET BROWSERS
Opera (latest version that is now free
or 8.54 and 5.12 for old computers with Windows 9x)
The fastest and best browser for older computers and the best for
power users after direct editing of opera ini instead setting
preferences using their user interface!
http://www.opera.com/index/
http://www.opera.com/docs/changelogs/
http://www.opera.com/download/index.dml?step=2&opsys=Windows&platform=Windows
http://arc.opera.com/pub/opera/
Note for those using Opera browsers. Edit opera6.ini and add under [User Prefs] EnableLastActiveChildOnDocWindowChange=1 and under [Cache] Check Expiry History=2. This will greatly speedup the loading of long pages using the same tab when going back.
Firefox (latest version - this is Open
Source software)
Fast on newer computers, great for power users, and better with
extensions.
http://www.mozilla.com/firefox/
http://www.mozilla.org/support/- http://www.mozilla.org/support/firefox/
https://addons.mozilla.org/firefox/extensions/
http://ftp.mozilla.org/pub/mozilla.org/firefox/ for .zip
nightly/latest-mozillax.x.x/ or tinderbox-builds/mozxxx-win32-tbox-mozillax.x.x/
SeaMonkey is the updated version of Mozilla
(latest version - this is Open Source software)
http://www.mozilla.org/projects/seamonkey/releases/
Mozilla (old but updated for security
patches - this is Open Source software)
http://www.mozilla.org/releases/
Netscape (latest version)
Older versions had too many software bugs!
http://browser.netscape.com/
http://plugins.netscape.com/ also you can
use plugins in Mozilla products
http://ftp.netscape.com/pub/
Avant
Add on for
Internet Explorer
http://www.avantbrowser.com/
Internet
Explorer (IE
6.0 SP1 was the last one for Windows 98 and IE 5.5 SP2 for
Windows 95)
This browser is not recommended for security reasons because it
is integrated software code into Windows operating system! Use
only for testing purposes or offline.
http://www.microsoft.com/athome/security/update/bulletins/default.mspx
http://www.microsoft.com/windows/ie/downloads/default.mspx
http://www.microsoft.com/technet/downloads/ie.mspx
http://msdn.microsoft.com/ie/downloads/default.aspx
http://www.microsoft.com/downloads/results.aspx?pocId=6&freetext=&DisplayLang=en
http://support.microsoft.com/gp/sp/
http://windowshelp.microsoft.com/Windows/en-US/internet.mspx
Why is Internet
Explorer unsafe?
http://browsehappy.com/why/
http://www.google.com/search?num=100&q=Internet-Explorer+unsafe
http://www.google.com/search?num=100&q=Microsoft+meta-file+back-door
Microsoft
Security Bulletins and Advisories
http://www.microsoft.com/technet/security/
http://www.microsoft.com/athome/security/
http://www.microsoft.com/windowsxp/
http://www.microsoft.com/windows98/ no longer supported
http://www.microsoft.com/windows95/ no longer supported
Microsoft's biggest greedy mistake was no longer supporting their
old software that is still useful today!
The heck with Microsoft,
use open source software!
http://www.msfree.com/
http://www.linux.org/
http://www.debian.org/
http://www.gnu.org/
http://www.google.com/search?num=100&q=Linux
http://www.openbsd.org/
http://www.openoffice.org/
http://www.xiph.org/
http://www.divx-digest.com/software/
http://www.opensource.org/site_index.html
http://directory.google.com/Top/Computers/Open_Source/
http://dir.yahoo.com/Computers_and_Internet/Software/Open_Source/
http://dmoz.org/Computers/Open_Source/Software/
Technology-based terrorist attacks remain a theoretical phenomenon, and businesses should focus instead on protecting themselves from demonstrable threats. Despite the incidence of high-profile digital attacks, cyber terrorism is a phenomenon that has never occurred.
The goal of terrorism is to change society through the use of force or violence, resulting in fear. Cyber terrorism is a theory, it is not a fact. An organisation should do the best it can to protect itself in the first place, whether attacks are coming from criminals or "cyber terrorists".
http://directory.google.com/Top/Computers/Security/
http://dir.yahoo.com/Computers_and_Internet/Security_and_Encryption/
http://dmoz.org/Computers/Security/
http://www.us-cert.gov/
CERT (Computer Emergency Response Team) Coordination Center of
Carnegie Mellon University
http://www.cert.org/
SANS (System Administration, Networking, and Security) Institute
http://www.sans.org/
Network Security
http://www.eeye.com/html/Research/
Virus Bulletins
http://www.virusbtn.com/
Computer Incident Advisory Capability of Lawrence Livermore
National Laboratory
http://ciac.llnl.gov/ciac/
National Security Institute's Security Resource Net
http://www.nsi.org/compsec.html
National Institute of Standards & Technology (NIST) Computer
Security Resource Clearinghouse
http://cs-www.ncsl.nist.gov/topics/welcome.html
Purdue University Computer Science Department's Computer Security
Resource Page
http://www.cerias.purdue.edu/tools_and_resources/
NTBugtraq (mailing list for those interested in Microsoft server
security)
http://www.ntbugtraq.com/
Microsoft Security
http://www.microsoft.com/technet/treeview/default.asp?url=/technet/security/Default.asp
http://www.microsoft.com/security/
Internet Security Systems' Xforce Security Site
http://xforce.iss.net/
InfoWar.Com's Information Security and Information Warfare "Portal"
http://www.infowar.com/forums/
Cisco Security Solutions
http://www.cisco.com/warp/public/cc/so/neso/sqso/
Intel
http://www.intel.com/business/bss/infrastructure/security/index.htm
Network Associates
http://www.networkassociates.com/us/security/resources/sv_home.htm
http://vil.nai.com/VIL/newly-discovered-viruses.asp
Authoratative Virus and Anti-Virus Information Sources
http://www.xtalwind.net/virus.html
Australian Computer Emergency Response Team (CERT)
http://www.auscert.org.au/
International List of Encryption and Computer Security Resources
http://www.cs.auckland.ac.nz/~pgut001/links.html
ICSA Labs Anti-Virus
Certified Products
http://www.icsalabs.com/html/communities/antivirus/certifiedproducts.shtml
West Coast Labs Checkmark
http://www.westcoast.com/checkmark/
http://www.symantec.com/avcenter/security/Advisories.html
http://www.symantec.com/avcenter/vinfodb.html
Expanded threats exist outside of commonly known definitions of
viruses, worms, and Trojan horses that may provide unauthorized
access, threats to system or data security, and other types of
threats or nuisances.
http://www.symantec.com/avcenter/expanded_threats/
http://netsecurity.about.com/
http://zdnet.com.com/2001-1105-0.html News Security
http://www.cigital.com/javasecurity/ Java Security Resources
http://sunsolve.Sun.COM/pub-cgi/show.pl?target=security/sec
http://www.cybercrime.gov/docs.html#doca
http://net-security.org/
http://www.cisecurity.org/
http://csrc.nist.gov/ NIST Computer Security Division
http://www.idefense.com/
http://lcweb.loc.gov/global/internet/security.html
http://www3.gartner.com/research/focus_areas/asset_48267.jsp
http://security1.gartner.com/section.php.id.19.s.1.jsp
http://www.counterpane.com/
http://www.issa-intl.org/ The Information Systems Security
Association
http://www.psycom.net/iwar.1.html Information Warfare
http://www.strategicintel.com/
http://packetstormsecurity.org/
http://www.securityfocus.org/ or http://www.securityfocus.com/
http://lists.insecure.org/
http://www.iwar.org.uk/ IWS - The Information Warfare Site
http://www.antionline.com/
http://www.hackingexposed.com/
http://www.securityportal.com/
http://www.dso.com/
http://www.hackernews.com/
http://www.self-evident.com/
http://www.gocsi.com/
http://www.owasp.org/ Open Web Application Security
Project
http://StaySafeOnline.info/
http://www.us-cert.gov/reading_room/
http://www.secureflorida.net/
http://www.netsys.com/ The Intelligent Hacker's Choice!
http://www.grc.com/SecurityNow.htm podcasts
http://leovilletownsquare.com/ubbthreads/kfihome/index.php KFI's The Tech Guy show
http://www.techtv.com/
http://www.w3w3.com/05.CSecurity.htm Internet Talk Radio
http://www.mitnicksecurity.com/ - Kevin Mitnick's security website
http://www.eff.org
http://www.2600.com/
http://www.defcon.org/
http://hacktivismo.com/
http://www.hackerz.org/
http://www.phrack.org/show.php
http://www.h2k.net/
http://www.wiretapped.net/
http://www.attrition.org/news/
http://www.cultdeadcow.com/main.php3
http://defcon.org/
http://www.phreaknic.info/
http://whitehats.com/
http://www.blackhat.com/
http://Zone-H.org/
http://www.theargon.com/articles/
http://www.phreak.org/html/main.shtml
http://www.totse.com/en/technology/index.html
http://www.ccc.de/
also see No Privacy with New Technologies
Benefits and dangers of using proxy servers click here
Here is what you can do to enhance the security on your Personal Computer (PC).
What to do if you are a
victim of credit card fraud or other kinds of online scams
When you use a credit card, you can be vulnerable to fraud,
whether you pay online, over the phone, or even in person at your
neighborhood grocery store. That is because whenever you pay with
a credit card, companies need to verify your account before they
can provide you with goods and services. Unfortunately, because
this credit information is stored on large computer servers, it
can also be the target of hackers looking for ways to break into
the system and get the information so they can use it to commit
fraud.
If you think you have been the victim of fraud or a scam,
immediately follow these steps. The faster you contact the proper
authorities, the more likely you are to minimize the damage a
scammer can do to your identity, your credit, and your bank
account.
Close any affected accounts
Place a fraud alert on your credit reports
Contact the proper authorities
Record and save everything
Close any affected accounts
Contact the genuine company or organization if you believe you
have given sensitive information to an unknown source
masquerading as that real company or organization. If you contact
the real company immediately, they might be able to lessen the
damage to you and others. Then:
1. Speak with the security or fraud department about any
fraudulently accessed or opened accounts at every bank or
financial institution you deal with, including credit card
companies, utilities, Internet service providers, and other
places where you regularly use your credit card.
2. Follow up with a letter and save a copy for yourself. When you
open new accounts use strong passwords, not passwords such as
your mother's maiden name, along with a new account number.
Change the passwords on all of your online accounts, starting
with any that are related to financial institutions or
information.
Place a fraud alert on your credit reports
In the United States, you can contact these three credit bureaus:
Equifax (800) 525-6285
Experian (888) 397-3742
TransUnion (800) 680-7289
Get a copy of your report (victims of ID theft can receive copies
of their credit reports for free) and ask that no new credit be
granted without your approval.
Make sure your account is flagged with a "fraud alert"
tag and a "victim's statement," and insist that the
alert remain active for the maximum of seven years.
Send these requests in writing and keep copies for yourself. When
you receive your reports, review them carefully. Look for things
like inquiries you did not initiate, accounts you did not open,
and unexplained debts.
Outside of the United States, you can contact your bank or
financial institution, who can direct you to the relevant
organization or agency.
Contact the proper authorities
In the United States, contact the Federal Trade Commission (FTC)
File a complaint. If you are a victim of any type of identity
theft, you can report the theft by calling the FTC's toll-free
Identity Theft Hotline at (877) ID-THEFT or (877) 438-4338.
Counselors will advise you on how to deal with the credit-related
problems that can result from identity theft.
Download and print the FTC's Identity Theft affidavit. Fill it
out and send it to credit card agencies to help minimize your
responsibility for any debts incurred by those who stole your
identity. Your case will be entered in the FTC's nationwide
"Consumer Sentinel" database of ID theft cases, which
helps law enforcement agencies find criminal patterns and catch
the thieves.
File a report with your local police department
Get a copy of the police report to notify your bank, credit card
company, and other creditors that you are a victim of a crime,
not a credit abuser.
Depending on where you live, you might be required to file a
report in the jurisdiction where the crime actually took place.
Record and save everything
As you complete all these steps to clear up the wrongdoing,
always make print copies of documents for yourself-including e-mail
messages, written correspondence, and records of telephone calls-and
file them somewhere safe. For telephone or in-person
conversations, follow up with dated confirmation letters to the
organization, and save a copy for yourself. State in the letter
what was covered in the conversation, and list any follow-up
items that you or the representative have committed to in the
conversation.
Additional resources:
http://www.fraud.org/ the National Fraud Information
Center. Use the online complaint form or call (800) 876-7060.
http://www.usdoj.gov/criminal/fraud/idtheft.html U.S. Department of Justice ID
Theft kit
http://www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm Federal Trade Commission's
document, Take Charge: Fighting Back Against Identity Theft,
which includes sample dispute letters and other recovery
procedures.
http://www.privacyrights.org/identity.htm provides a detailed 17-step plan
to follow if your ID is stolen.
http://www.idtheftcenter.org/index.shtml Identity Theft Resource Center
http://www.consumer.gov/idtheft/
http://www.cfenet.com/resources/fraud.asp
Personal Infrastructure Protection 101:
http://www.google.com/search?num=100&q=identity+theft+site%3A.gov
http://www.google.com/search?num=100&q=identity+theft+site%3A.edu
http://www.google.com/search?num=100&q=identity+theft+site%3A.org
Before you post any
information online:
Be choosy. From the start, limit the amount of personal
information you give to a site. Only share your primary e-mail
address with people you know, and avoid listing any information
in large Internet directories.
When shopping online know your sources. The kinds of vendors who
sell deeply discounted electronics tend to be different than
those selling knitting supplies. Limit your purchasing of
expensive, popular items to prominent companies with clear
privacy policies. And find out what others say about the sellers
and selling sites by reviewing seller and buyer feedback and
checking out comparison sites such as Epinions.com or Bizrate.com.
Read the Web site's privacy statement carefully. This statement
should tell you how and why a business is collecting your
information. If something does not sound right to you, contact
the company with questions before you divulge any personal
information. If the site doesnt post a privacy policy, take
your business elsewhere.
Post your resume only on prominent job sites. Be sure that any
Internet job sites you use have privacy policies that only allow
verified recruiters to scan your information. Do not post your
resume on your own Web site.
Avoid participating in sweepstakes or other such marketing-driven
events, both online and offline.
Get off the lists (and stay off)
Find out where you are currently listed by doing your own online
research. Search for your name in the popular search engines and
in online directories, such as the ones listed in the sidebar on
the right of your screen.
Request that your name be removed from online directories. If it
is not clear how to do this on a Web site, use the "Contact
Us" link or address at the bottom of the directory site.
Get an unlisted phone number or at least have your address
unlisted. Also, instruct your phone and Internet service
providers to remove any existing personal information of yours
from all of their directories.
Set up a special e-mail address solely for online activities such
as shopping and newsgroups. This way you can close it if needed
and start a new one without disrupting your business or personal
e-mail correspondence.
Keep a record any time you give your personal information to a
company so you can ask them to remove it later if necessary.
If you have a laptop
computer with wireless connectivity built-in or through an
inserted wireless network card, you can now surf the Web in some
coffee shops, airports, hotels, and even fast food restaurants
using public wireless networks, or WiFi. Here are quick tips for
enjoying the convenience of WiFi and helping to protect your
privacy.
Use a firewall
A firewall is a protective boundary that monitors and restricts
information that travels between your computer and a network or
the Internet.
Use encryption
You can secure your home wireless network with different types of
encryption with varying effectiveness. If you are using public
WiFi, network encryption is often out of your control. Check the
privacy statement on the network's Web site to learn more about
the type of encryption they use. If they do not have a privacy
statement, you would be better off not using the network.
Tip: If you must enter credit card numbers while using a public
wireless network, make sure you see a locked padlock icon at the
bottom right corner of the browser window, and make sure the Web
address begins with https: ("s" for secure).
Do not type in credit card numbers or passwords
The measures listed above will provide some protection against
casual hackers and identity thieves who prey on wireless networks.
But if the bad guys are determined enough, they will eventually
find a way to get around any security system. If you want to be
safe, avoid typing any sensitive information, such as your credit
card number or any other financial information, into your
computer while using a public wireless network.
Public computers at libraries, Internet cafes, airports, and copy shops are convenient, cheaper than buying your own laptop, and sometimes even free to use. But are they safe? Depends on how you use them.
Do not save your login
information
Always logout of Web sites by pressing logout on the site,
instead of by closing the browser window or by typing in another
address. This will help keep other users from accessing your
information.
Many programs (especially instant messenger programs) include
automatic login features that will save your username and
password. Disable this option so no one accidentally (or on
purpose) logs in as you.
Do not leave the computer unattended with sensitive information
on the screen
If you have to leave the public computer for any amount of time,
logout of all programs and close all windows that may include
sensitive information.
Erase your tracks
When you are done using a public computer you should delete all
the temporary files and your Internet history.
To delete your temporary Internet files and your history
1. In Internet Explorer click Tools and then click Internet
Options.
2. On the General tab, under Temporary Internet files click
Delete Files and then click Delete Cookies.
3. Under History, click Clear History.
Watch for over-the-shoulder snoops
Because there is so much in the news about how hackers can
digitally sneak into your personal files, we sometimes forget
about the old fashioned version of snooping. When you are using a
public computer, be on the look out for thieves who collect your
information by looking over your shoulder or watching as you
enter sensitive passwords.
Do not enter sensitive information into a public computer
The measures listed above will provide some protection against
casual hackers who use a public computer after you have. However,
an industrious thief may have installed sophisticated software on
the public computer that will record every keystroke and then e-mail
that information back to the thief. Then it does not matter if
you have not saved your information or if you have erased your
tracks. They still have access to this information.
If you really want to be safe, avoid typing your credit card
number or any other financial or otherwise sensitive information
into a public computer.
Tips on how to help reduce
risks when selling or discarding computer hardware
If you are ready to replace, sell, or retire your old computer,
it is very important to eradicate personal data stored on its
hard drive before unplugging it for the last time. You should
always remember that even though you manually delete computer
files, an identity thief might still be able to recover them,
possibly putting you or your family at risk.
Remove the files yourself at home using disk-cleaning software.
It is not difficult to do, and many cleaning utilities are free.
Files you should remove before you donate or sell your computer
by using disk-cleaning software to erase them:
E-mail contacts
E-mail messages
All documents
All files in the operating system recycle bin or trash folder
Internet files
External links are provided for research and information only. The external links on this Web site does not constitute endorsement or approval by me. I am not responsible for the contents on any external link referenced from this Web site.