Internet Security Paper

advertisement
TRI-COUNTY TECHNICAL COLLEGE
COMPUTER SECURITY ON THE INTERNET
Phillip Gilmour
Page
1
LEXICON .................................................................................................................................. 2
2
ANTI-VIRUS SOFTWARE ..................................................................................................... 3
2.1
2.2
3
COMMERCIAL ANTI-VIRUS PROGRAMS ........................................................................... 3
FREE ANTI-VIRUS PROGRAMS ......................................................................................... 3
ANTI-SPYWARE SOFTWARE .............................................................................................. 3
3.1
3.2
3.3
3.4
COMMERCIAL ANTI-SPYWARE PROGRAMS ..................................................................... 3
FREE ANTI-SPYWARE PROGRAMS ................................................................................... 3
ANTI-SPYWARE EVALUATION ......................................................................................... 4
EULA ANALYZER ........................................................................................................... 4
4
ANTI-TROJAN SOFTWARE ................................................................................................. 4
5
REMOVING STUBBORN VIRUS AND SPYWARE FILES ............................................... 4
6
FIREWALLS ............................................................................................................................. 5
6.1
6.2
6.3
7
ALTERNATIVES TO MICROSOFT OFFICE ..................................................................... 6
7.1
7.2
8
OPENOFFICE .................................................................................................................... 6
STAROFFICE .................................................................................................................... 7
BROWSERS .............................................................................................................................. 8
8.1
8.2
9
MICROSOFT XP FIREWALL .............................................................................................. 5
FREE AND COMMERCIAL FIREWALLS .............................................................................. 5
ASSESSING COMPUTER VULNERABILITY TO INTERNET ATTACK ..................................... 6
INTERNET EXPLORER....................................................................................................... 8
ALTERNATIVE BROWSERS ............................................................................................... 8
POP-UP BLOCKERS ............................................................................................................... 9
10 E-MAIL CLIENTS ................................................................................................................... 9
11 SCAMS..................................................................................................................................... 10
11.1 PHISHING ....................................................................................................................... 10
11.2 PHARMING..................................................................................................................... 12
12 PASSWORD GENERATORS AND MANAGERS.............................................................. 13
13 ENCRYPTION ........................................................................................................................ 13
14 ANONYMOUS WEB BROWSING....................................................................................... 13
15 RESOURCES .......................................................................................................................... 14
15.1 GENERAL INFORMATION CONCERNING COMPUTER SECURITY ...................................... 14
15.2 COMPUTER SECURITY INFORMATION FOR THE MORE ADVANCED USER ....................... 14
16 SAFEGUARDS ........................................................................................................................ 14
1
Lexicon
Malware: malicious software. The term includes viruses, worms, Trojan horses, and spyware.
Viruses: usually hide in computer files. A virus has the characteristic of being able to insert copies of
itself into other files and programs and thereby spreading. In this way, a computer virus acts like a
biological virus. Many viruses are capable of destroying computer files and programs.
Macrovirus: among the most common viruses. MS Office programs share a common macro scripting
language. Often, macroviruses are written in the same scripting language to affect Word, Excel, and other
MS Office programs. For instance, a virus can be written as a macro (a miniprogram) and attached to a
Word document. When the document is opened by Word, the virus executes.
E-mail Virus: common mode of virus propagation. Not all anti-virus programs check for e-mail viruses.
Worm: similar to a virus but infects and replicates without targeting specific files. Worms self-propagate
quickly through a network and without manual execution of files. Anti-virus programs generally are not
designed to detect and eradicate worms.
Trojan Horse: (a.k.a. Trojan): programs which contain harmful code in apparently harmless files. Many
Trojans install a keystroke logging program.
Keystroke Logging Program: (a.k.a. Keylogger): program which secretly records keystrokes. If installed
by a Trojan or unauthorized user, the keylogging program will covertly store and send keystroke data to
another computer. In this way, personal information such as credit cards numbers and social security
numbers can be determined.
Spyware (a.k.a. Adware): programs intended to track your Internet surfing and change browser settings.
Signs of spyware include increased number of popup ads, slower computer performance, or changed
homepage settings.
Spam: lots of junk e-mail. The word “spam” originates from the Monty Python’s Flying Circus “Spam
Skit,” where a group of Vikings sings, “Spam, spam, spam, spam, spam, spam, spam, spam, lovely spam!
Wonderful spam!” until they are told to shut-up.
Phishing: scams in which an e-mail falsely claims to be a legitimate organization. Typically, the e-mail
redirects the recipient to visit a website which attempts to obtain personal information such as passwords,
credit card information, bank account numbers, and social security numbers.
Pharming more sophisticated and insidious than phishing. In a pharming scam, a person may type the
legitimate company/organization’s site in the address bar and still be directed to a fraudulent site.
Port Scan: computer hackers use programs to determine the “open doors” of Internet connected
computers. Hackers can break into vulnerable computers in order to steal files, personal information,
install programs that remotely control computers, or to destroy information.
Cookie information that certain web sites place on your computer. A cookie can contain information such
as a user name, shopping cart information, track web sites visited, etc. Cookies are used to increase the
interactivity of a web site and/or to obtain web browsing information. Usually, cookies are considered
innocuous.
2
2
Anti-Virus Software
2.1
Commercial Anti-Virus Programs
Norton and McAfee are the most popular commercial, anti-virus programs. Yet, there are many relatively
unknown anti-virus programs that are highly rated for virus detection and removal, scan speed, and low
drain on system resources. The following is a list of excellent commercial anti-virus programs.
NOD32
http://www.eset.com
NOD32 has the highest virus detection rate among all anti-virus programs (according to the independent
testing organization Virus Bulletin). In addition, it is the fastest anti-virus scanner with minimal drain on
system resources. (30 day trial)
Kaspersky Anti-Virus
http://www.kaspersky.com
(a.k.a. KAV) Kaspersky is an excellent anti-virus and anti-Trojan. KAV takes a significant time for a full
system scan and produces a heavy drain on system resources. (The scan can significantly slow the
computer.) Therefore, perform scans during long periods of computer inactivity. (30 day trial)
AntiVirusKit (a.k.a. AVK)
Dr. Web
Command Antivirus
BitDefender
2.2
http://www.gdata.de/gdc/us_start
http://www.drweb.com
http://www.authentium.com
http://www.bitdefender.com
Free Anti-Virus Programs
Free anti-virus programs do not have the virus detection and removal rates of the best commercial antivirus programs. The following free, anti-virus programs have good detection and removal abilities.
AVG
http://free.grisoft.com
AVAST! 4 Home Edition
http://www.avast.com/eng/avast_4_home.html
AntiVir Personal Edition
http://www.free-av.com
Panda ActiveScan
http://www.pandasoftware.com/products/activescan.htm
TrendMicro
http://housecall.trendmicro.com
Panda and TrendMicro are free, online scanners. Scan times depend on connection speed and disk size.
3
Anti-Spyware Software
Although it is usually suggested to use one anti-virus program and one firewall, one should use many
anti-spyware programs. Some very good anti-spyware programs are free.
3.1
Commercial Anti-Spyware Programs
Spy Sweeper
http://www.webroot.com/consumer/products/spysweeper
Spyware Doctor
http://pctools.com/spyware-doctor
PestPatrol
http://www.pestpatrol.com
CounterSpy
http://www.sunbelt-software.com/counterspy.cfm
3.2
Free Anti-Spyware Programs
Spybot
http://www.safer-networking.org/en/download
Adaware
http://www.lavasoftusa.com/support/download
SpywareBlaster
http://www.javacoolsoftware.com/spywareblaster.html
Spyware Guard
http://www.javacoolsoftware.com/spywareguard.html
Windows Defender
http://www.microsoft.com/athome/security/spyware/software/default.mspx
3
HijackThis
http://www.hijackthis.de
This program is one of the most powerful malware detection and removal tools. Only knowledgeable
users should use HijackThis. The free software examines programs in the running in the registry and lists
legitimate programs along with programs developed by hackers. Only delete the programs that you are
certain are malware.
3.3
Anti-Spyware Evaluation
U. of Toledo Anti-Spyware Tests
http://www.ascc.utoledo.edu/pp4web/spyware_study.pps
The University of Toledo examined free and commercial anti-spyware programs. It was found that some
of the commercial programs performed poorly compared to freeware.
3.4
EULA Analyzer
EULAlyzer
http://www.javacoolsoftware.com/eulalyzerdl.html
Instead of reading the “End User Licensing Agreement” fine print when installing programs, use
EULAlyzer to analyze the EULA. The free program searches for specific phrases and indicates if pop-up
windows and tracking software will be installed (spyware) or sharing information with third parties will
be performed.
4
Anti-Trojan Software
What was considered the most advanced anti-Trojan, TDS-3, has been discontinued. However, there are
other good anti-Trojan software programs.
BoClean
Trojan Hunter
TrojanScan
TrojanScan is a free online scan.
5
http://www.nsclean.com
http://www.trojanhunter.com
http://windowssecurity.com/trojanscan
Removing Stubborn Virus and Spyware Files
System Restore allows a user to revert critical operating systems back to a previously recorded state (a
restore point). Sometimes, viruses and spyware infect the System Restore so that they can re-infect the
computer if deleted in another area of the drive. To delete viruses in the System Restore, the System
Restore must temporarily be disabled. Disabling System Restore will eliminate all restore points. To
disable System Restore, Click the Start button. Right click My Computer and then click Properties.
On the System Restore tab, check Turn off System Restore. Then, run the anti-virus and anti-spyware.
Remember to enable System Restore after the scan.
Occasionally, a virus or spyware detection program can detect malware but cannot remove it. One
explanation for this behavior stems from Windows running the program. A possible way to remove the
file is to restart the computer in the safe-mode configuration where minimal Windows programs run. To
run in safe mode, restart the computer. Immediately when the computer is turned on, keep tapping the F8
key until a menu appears to select the safe-mode. Select safe mode and run the anti-virus or anti-spyware
program.
If the software will not remove the malware in the safe mode, note the malware filename that cannot be
removed. (If you suspect that there are spyware files that are not detected, run a PestPatrol online scan.
This will not remove the files but will identify many spyware programs that may not be detected. Go to
the following link for the free, online scan: http://www.pestpatrol.com/prescan.htm). Perform a
4
Google search with the name of the malware file. You may find a company or organization that has
developed a program to remove the specific virus or spyware program.
If the anti-virus or anti-spyware program fails to remove the malware file, remove the program with DOS
command lines. If you are unfamiliar with command lines, the procedure is automated with the free
program MoveOnBoot.
MoveOnBoot
http://www.gibinsoft.net/gipoutils/fileutil/index.htm
The virus or spyware could become attached to and damage a file that makes the computer boot. To
restore the damaged, essential files use the System File Checker. To run the System File Checker, open
My Computer, and select the local disk you want to check. On the File menu, click Properties. Click
the Tools tab. Under Error-checking, click Check Now. Under Check disk options, select Scan for
and attempt recovery of bad sectors.
It is much easier to prevent malware from being installed on your computer than to remove malware.
Furthermore, malware on your computer can damage essential files. Therefore, make sure that your antivirus, anti-spyware programs are up-to-date along with an updated operating system to prevent malware
infestations.
6
Firewalls
Firewalls prevent unauthorized access to your computer from another computer. Also, firewalls prevent
unauthorized programs (e.g. Trojans and keyloggers) from sending data from your computer to another
computer. According to Honynet.org, an unprotected computer using a Windows operating system will
be compromised by some form of malware within minutes of connecting to the Internet. A router is
hardware which plugs-in between the modem and pc. The router will act as an effective and difficult to
breach firewall. A software firewall is a program which is installed on a computer. This section will only
discuss software firewalls. To determine whether a software or hardware firewall is best for you, please
see the following links.
Networking Tutorials
Firewall Paper by Uzi Paz
6.1
http://www.networkingtutorials.net/Firewall.html
http://www.geocities.com/uzipaz/eng/pfnt.html
Microsoft XP Firewall
The Microsoft Office firewall (installed on many computers running Windows) is considered to be an
inferior firewall. The Windows firewall should be uninstalled and replaced with a capable firewall. To
deactivate the Windows XP firewall, follow the instructions at the following website:
Deactivation of the XP Firewall
6.2
http://support.microsoft.com/kb/283673
Free and Commercial Firewalls
Most firewalls must be trained. That is, if a program, such as Microsoft Outlook, is accessing the Internet
or accessing your computer from the Internet, permission must be granted. (Figure 1) Once access is
allowed or denied, the firewall will remember the action and will not ask for permission in the future.
(One caveat: certain web sites use cookies to access banking or e-mail accounts or for other functions. If
you experience problems with the functionality of certain web sites, give permission for the firewall to
accept all cookies. To accept cookies in ZoneAlarm, bring up the ZoneAlarm window. On the left hand
menu, click Privacy. Then slide the Cookie Control to Off.)
5
ZoneAlarm
http://www.zonealarm.com
The free version, along with the commercial ZoneAlarm, is considered to be an excellent firewall.
Jetico
http://www.jetico.com
Jetico is a free firewall. Considered by many reviewers to be effective and highly configurable, the
current version is geared toward more advanced users.
Figure 1
Zone Alarm Firewall
Asking Permission for a
Program to Access the
Internet
6.3
Assessing Computer Vulnerability to Internet Attack
ShieldsUP!!
http://grc.com
Computer security guru Steve Gibson created ShieldsUP!! to assess firewall effectiveness. To see if your
computer is vulnerable to hacks (with or without a firewall) run ShieldsUP!!. A protected computer
should attain a perfect score while in a stealth mode. (This indicates your computer is “invisible” to other
computers on the Internet. Thus, your chance of being subjected to an Internet attack is greatly reduced.)
7
Alternatives to Microsoft Office
To greatly reduce the chance of a macrovirus attack, use the following free or inexpensive programs.
7.1
OpenOffice
http://www.openoffice.org
A free, open-source suite that is similar in structure to MS Office. A remarkable feature is an option to
export as a read-only pdf file. The recently released build of OpenOffice, OpenOffice 2.0 is very
compatible with Microsoft Word. However, OpenOffice does not support Office macros or Excel pivot
tables. There may be some small glitches when Microsoft PowerPoint or Excel reads corresponding files
written in OpenOffice. Since Microsoft Office does not recognize Open Office files, you may wish to
save files in Microsoft Office format. To create a default setting for loading and saving as Office files,
open any OpenOffice program. Click Tools in the menu and select Options. Double click Load/Save.
Click Microsoft Office. Then check every box to Load [L] and Save [S] in Microsoft Office format.
6
OpenOffice 2.0 Reviews
OpenOffice is a Great Alternative to Microsoft Office
http://www.suntimes.com/output/worktech/cst-fin-andy22.html
Why OpenOffice.org 2.0 is Your Best Choice
http://www.eweek.com/article2/0,1895,1874157,00.asp
7.2
StarOffice
http://www.sun.com/software/star/staroffice/index.jsp
Sun Microsystem’s version of OpenOffice. The current price for StarOffice is $69.95 and includes online
support. Compared to OpenOffice, StarOffice has a somewhat more polished interface and includes more
fonts. Like OpenOffice, StarOffice files can be exported as PDF files. In addition, StarOffice supports
Office macros and Excel pivot tables; while compatibility between StarOffice 8 and Microsoft Office
documents has been greatly improved from previous versions. (Sun allows free use of StarOffice for
educational institutions. The University of Toronto at Scarborough has saved at least $52,000/yr by
switching from Microsoft Office to StarOffice.) The software incorporates a user configuration tool to let
IT administrators manage user settings. Since Microsoft Office does not recognize StarOffice files, you
may wish to save files in Microsoft Office format. Follow the instructions under OpenOffice to load and
save files in Office format.
StarOffice 8 Reviews
Review: StarOffice 8
http://software.newsforge.com/article.pl?sid=05/09/23/198225
StarOffice 8 is Office’s Toughest Rival Yet
http://www.eweek.com/article2/0,1895,1864224,00.asp
StarOffice 8 Inches Up to Microsoft Office
http://www.crn.com/sections/microsoft/microsoft.jhtml?articleID=171201631
Figure 2
StarOffice
Writer
(Comparable
to Microsoft
Word)
Those
familiar with
the Microsoft
Office layout
will easily
navigate
within
StarOffice.
OpenOffice
has a similar
layout.
7
8
Browsers
8.1
Internet Explorer
Most Internet transmitted viruses and spyware are written for Internet Explorer. IE allows ActiveX
programs to run without permission of the user. Many Internet viruses and spyware programs are
downloaded through ActiveX files. A quote from The United States Computer Emergency Readiness
Team (US-CERT), a division of the Department of Homeland Security, emphasizes the vulnerability of IE
in a document entitled “Microsoft Internet Explorer Does Not Properly Validate [the] Source of
Redirected Frame[s].” CERT recommends the use of a non-IE web browser that does not use ActiveX or
the disabling of ActiveX and Active scripting in the IE Internet Zone setting.
CERT Browser Recommendation
http://www.kb.cert.org/vuls/id/713878
Use IE security settings to eliminate ActiveX capabilities. Follow instructions given in the following
website to change ActiveX settings.
Procedure to Change ActiveX Settings
http://www.microsoft.com/windows/ie/using/howto/security/setup.mspx#EBAAE
Even though you may decide to use another browser, keep Internet Explorer on your computer in order to
update the Windows operating system and to access sites that require ActiveX functionality.
All operating systems (Mac and Linux included) should be updated often. However, updates are
especially critical for Windows operating systems. Microsoft offers Windows updates at least once a
month. Update Windows at the following website.
Windows Update
8.2
http://www.windowsupdate.com
Alternative Browsers
The free browsers listed below do not allow ActiveX and are more secure and feature laden compared to
Internet Explorer.
Firefox
http://www.mozilla.org
Firefox is an excellent open-source browser. Firefox is very configurable and has an effective popup
blocker. Since many web pages are created by the World Wide Web Consortium (W3C)-noncompliant
and insecure web standards of Microsoft FrontPage, some webpages do not properly display in W3C
compliant browsers. You may need to occasionally view a web page via Internet Explorer.
Opera
http://www.opera.com
Many knowledgeable users consider Opera to be second-to-none among browsers. Opera is a fast,
configurable browser. Among the many features of Opera are tabbed browsing and magnification of text
and images. Opera can emulate IE or Firefox. If a page does not render properly in Opera, under the
Opera Tools menu, go to Quick Preferences and select Identify as Internet Explorer.
Until recently, Opera could be used with an annual fee or a free version with ads. Opera is now free and
without ads. In addition, Opera has a secure e-mail client that integrates into its browser. Furthermore, it
has a trainable spam filter.
8
9
Pop-Up Blockers
A pop-up blocker must not only prevent nuisance window pop-ups but also must allow legitimate pop-ups
(such as windows in which information is supplied to allow a transaction). Pop-up blockers contained in
Windows XP Service Pack 2, the Google Toolbar, Firefox, and Opera were rated among the top five
blockers in a recent study.
Google Toolbar/Pop-Up Blocker
http://www.toolbar.google.com
Pop-Up Study
http://www.popupcheck.com
Popup Check
http://www.popupcheck.com/pop_up_blocker.asp
Popup Check determines the effectiveness of your pop-up blocker. It checks if “bad” pop-ups are blocked
and if “good” pop-ups are allowed.
10
E-mail Clients
It is not uncommon for an e-mail attachment to contain a virus (Figure 3). The most common e-mail
clients are Outlook and Outlook Express. Due to the prevalence of Outlook, many e-mail viruses and
spam are created to exploit Outlook’s weaknesses. Only open attachments from e-mails that you are
expecting and trust. For enhanced security, you may wish to consider a non-Microsoft e-mail client.
Figure 3
E-mail Containing a
Virus Attachment
Thunderbird
http://www.mozilla.org
Thunderbird is a comprehensive and customizable, free e-mail program. Its adaptive spam filter analyzes
e-mail and detects likely junk. It deletes spam or stores it in a folder. Thunderbird contains a
spellchecker and integrated news reader (for RSS feeds).
Opera
http://www.opera.com
The Opera e-mail client is integrated into the Opera browser and is relatively secure. Like Thunderbird,
Opera contains a spam filter and RSS reader.
9
Regardless of the e-mail client that you use, make sure that graphics cannot be viewed in e-mail. (In other
words, turn off html e-mail.) A common spammer trick is to place invisible pixels at different locations
for each outgoing spam e-mail. Viewing the e-mail will grab the invisible pixel image from the
spammer’s server. By referencing pixel images retrieved from the server, the spammer can determine
which e-mail addresses are still in use. Consequently, even more spam will be sent to the addresses that
opened the e-mail. To disable viewing html e-mail, please see the following link:
Disable HTML E-Mail
http://expita.com/nomime.html
Certain e-mail viruses can infect a computer even if a message is viewed in the Preview Pane. Therefore,
the Preview Pane should be disabled.
To disable the Preview Pane in Outlook:
1. From the Menu bar, click View then click Layout.
2. Uncheck the box labeled Show Preview Pane.
3. Click OK to save the change.
11
Scams
Phishing
Phishing scams can result in identity theft (Figures 4, 5, and 6). Do NOT reply to any e-mails which
redirect to another site. If you believe the e-mail may be legitimate, directly contact the company or
organization (never click-on or use the address provided in the e-mail). If you are submitting sensitive
information to a website, such as social security numbers or credit card information, make sure that the
URL address starts with “https” NOT “http”. Furthermore, a closed padlock should be either at the top or
the bottom of the window. When the padlock is clicked, a security certificate should appear. (Figure 7)
NetCraft Anti-Phishing Toolbar
http://toolbar.netcraft.com/
The NetCraft anti-phishing toolbar warns web surfers if they enter a suspicious website or a potential phishing site.
Figure 4
eBay Phishing Scam
10
Figure 5
Redirection to a
Purported Legitimate
Site in a Phishing Scam
(This site appears when
the e-mail link in Figure 4
is clicked. The site
accepts any user ID and
password to bring up the
link in Figure 6 which
asks for credit card
information.)
Figure 6
Phishing Site Asking for
Credit Card Information
Notice that this is an
insecure site…an http
address, instead of https,
and without a padlock.
11
Figure 7
Secure Website.
Contains an https
address along with a
security certificate which
appears when the
padlock is clicked.
Pharming
To create a pharming scam, a hacker must place a program on a computer to automatically redirect the
user to a fraudulent site when the legitimate site is typed in the address window. If upon accessing the
website, a warning appears that states that the name on the security certificate does not match the name on
the site (Figure 8), DO NOT proceed and enter the site. The site could be a pharming scam. For more
information, see pharming.org.
Pharming.org
http://www.pharming.org
Figure 8
Security Alert Warning That
the Names on the Site and
Security Certificate Do Not
Match
12
12
Password Generators and Managers
“Treat your password like a toothbrush. Don’t let anyone else use it, and get a new one every six months.”
Clifford Stoll
Passwords should be at least 8 characters long with random combinations of numbers and upper and
lowercase letters. (Substituting numbers for letters does not prove to be much of a deterrent to a hacker.
For instance, changing the word such as “equilibrium” to “equ171br1um” is an old ploy and easily
cracked by hacker programs.) Also, each site should have a different password. It is easy to forget so
many seemingly random passwords. Instead use one of the following free programs to generate and
manage your passwords.
Infinite Password Generator
http://www.ikitek.com/products/Infinite-Password-Generator.html
Infinite Password Generator generates and manages random passwords for given sites from an easily
remembered master password. (Remember the capitalization of the master password or Infinite Password
Generator will produce a different password.)
Aurora Password Manager
http://www.animabilis.com
Aurora Password Manager organizes and stores credit card information, pin-codes, software license
information, passwords, etc. Furthermore, you can create and store your passwords or Aurora Password
Manager can create passwords for you.
MySecurityVault
http://www.whitecanyon.com/mysecurityvault-download.php
MySecurityVault is a password generator and manager. The program has an automatic Internet, personal
information form filler. It encrypts personal files so that only the users have access to them. The “Pro”
version ($24.95) has a security scanner which determines if personal information is left on your computer.
If so, it prompts users to store that information in a personal encrypted “vault.” (For instance, if a web
site stores a credit card number as a temporary Internet file, MySecurityVault will detect the breach of
security.)
13
Encryption
If there are files which contain sensitive information, such as passwords or financial information, on your
computer, CDs, floppy disks, or thumb drives, you may decide to encrypt those files so that if the files fall
into the wrong hands, it would be exceedingly difficult to break into those files. MySecurityVault (under
Password Managers and Generators) can be used to encrypt files, also.
TrueCrypt
http://www.truecrypt.org
TrueCrypt is a free, open-source program which allows a user to select the level of encryption. The
program creates a drive on a computer or storage medium which will automatically encrypt files that are
dragged into the drive.
14
Anonymous Web Browsing
Web surfing can reveal private or personally-identifiable information to others. Using a site designed for
anonymous browsing can greatly reduce that amount of pop-up ads and spam. A free anonymous surfing
site is Anonymouse. Anonymizer is commercial site.
Anonymouse
Anonymizer
http://anonymouse.org/anonwww.html
http://www.anonymizer.com/index.shtml
13
15
Resources
15.1 General Information Concerning Computer Security
Computer Security Checklist
http://www.securityfocus.com/columnists/220
Malware Article
http://arstechnica.com/articles/paedia/malware.ars
Safe Computing Article
http://news.com.com/2010-1071-5482340.html
Security Tool Reviews
http://www.pcworld.com/reviews/article/0,aid,115939,00.asp
Antivirus Software
http://www.software-antivirus.com/
Spyware Warrior
http://www.spywarewarrior.com
Anti-Trojan Reviews
http://www.anti-trojan-software-reviews.com
Firewall Guide
http://firewallguide.com
15.2 Computer Security Information for the More Advanced User
Secunia
http://secunia.com/
The Spamhaus Project
http://www.spamhaus.org
Virus Bulletin
http://www.virusbtn.com
AV-Test.org
http://av-test.org
West Coast Labs
http://www.westcoastlabs.org
ICSA
https://www.icsalabs.com/icsa/icsahome.php
Internet Storm Center
http://isc.sans.org
AntiOnline
http://www.antionline.com
Antisource
http://www.antisource.com/
Spyware Newsletter
http://www.spywareinfo.com
CERT
http://www.cert.org
SecurityFocus
http://www.securityfocus.com
The Honeynet Project
http://www.honeynet.org
myNetWatchman
http://www.mynetwatchman.com
16
Safeguards
 Back up all important files and programs.
 Do not use public computers when submitting sensitive information to a web site. Public
computers may be compromised by keylogging or pharming programs.
 Do not transmit sensitive information when using wireless connections.
 Do not open e-mail attachments unless you are sure the e-mail is from a trusted source.
 Do not forward chain e-mails. These contain a treasure trove of active e-mail addresses if they
land in a spammer’s hands.
 Use multiple e-mail addresses. Keep one e-mail address for relatives and close acquaintances and
one address used for business contacts. Use a third e-mail for general Internet mail (which would
likely contain spam).
 Do not use formal names or common words for an e-mail address (e.g. joesmith@.gmail.com or
mymail@aol.com). Spammers send e-mails to common words and names.
 Do not place your e-mail address on web sites. If you must, use spaces or words to prevent
automated web page scanning programs from harvesting your address. (For instance, use
“blahblahblah @ yahoo.com” or “blahblahblah@yahooDOTcom” in place of
“blahblahblah@yahoo.com”)
 Above all:
UPDATE AND SCAN WITH ANTI-VIRUS/ANTI-SPYWARE PROGRAMS AT LEAST ONCE A WEEK.
INSTALL OPERATING SYSTEM UPDATES.
14
Download