Sunday, February 25, 2007

Secure E-Mail With Google GMail

This is something I’ve set up myself, recently, to send mail through Gmail without having the unencrypted e-mail stored on their servers.To achieve this, you’ll need a Google GMail account, PGP or GnuPG, Mozilla Thunderbird, and the Enigmail extension.

First, set your Gmail account to allow POP3 access. This can be set in your mail settings within the web interface. The Gmail system will tell you the settings you need to make in Thunderbird in order to use this.

Next, get Thunderbird and the Enigmail extension, and install both, along with PGP or GnuPG. Then, enter your account settings into Thunderbird, as per the Google page.

You’ll need to create a PGP key associated with your e-mail address. In PGP, do this using the GUI interface. With GnuPG, type gpg –gen-key and follow the instructions. You can set the key type, key size (Go with at least 2048 bits. Many people use 4096) and the expiry date. Some people set their keys never to expire, I like a key duration of 6 months, so that I end up recreating keys twice a year, but at least if someone breaks or otherwise acquires my key during that time, they won’t have long to do it, nor to use it, before it gets changed again!

Finally, associate the keypair with your e-mail address, in the Enigmail settings within Thunderbird, and ensure that e-mail defaults to signed and encrypted. Collect public keys from those people with whom you wish to correspond privately, and add those to your PGP or GnuPG keyring. Enigmail will then encrypt e-mail sent to those people, and decrypt e-mail sent from them to you. Mail to a recipient whose key you do not have will not be encrypted, unless GnuPG / PGP can find a key for them on the public keyservers.

Secure e-mail prevents others reading private communications and the signing process authenticates the e-mail message as being from you.

Article Source: http://www.ArticleJoe.com

Bryce Whitty owns and runs www.technibble.com”>computer repair website called www.technibble.com”>Technibble.com. A website that provides technical how-to’s for repairing your computer. Technibble also has many guides for getting into the www.technibble.com”>computer business or managing your existing one. We also cover other side topics such as Security and Software.

The beginners guide to safely join and use eBay

I don't think it matters where you are these days, if you mention the name ' eBay ', there is someone there who has either bought an item on it, or who has sold something on it, eBay has become a household name around the world. I started buying and selling on ebay around 7 years ago. There are thousands of people living in the U.S. that make full time living's selling item's on eBay, and thousands more that buy items on it daily.

eBay was started by one man named ' Pierre Omidyar '. When Pierre was 28 years old he started writing the programming code that was to become the internet site eBay. The site was launched online on Sep 4, 1995, ' Labor Day ' here in the U.S. At first it wasn't called eBay, but was named ' Auction Web '. Later it was changed to ' ebay ' , which was a short version of a consulting firm Pierre owned named ' Echo Bay '. eBay was free at the start, then it started charging fees to help cover it's internet costs for hosting and other charges. At the time, Pierre was dating a woman that collected PEZ toys, she used the new eBay site in its earliest incarnation to buy and sell rare dispensers. In 1996 Jeffrey Skoll, a Stanford MBA, joined the company and by 1998 eBay had gone public in the stock market, making Omidyar a billionaire. In 2005, Omidyar's 214 million eBay shares were worth around $8 billion. In March 1998, Meg Whitman was brought in as President and CEO of eBay where she serves still today

Let's start by going to the eBay site and joining. Just visit: www.ebay.com and you will be taken to the main page of the website. Once there look towards the top area of the screen and you will see text that says: ' Hello! Sign in or register. ', using the mouse button, click on ' register '. After clicking on ' register ' you will be taken to a screen with a form on it, enter the information about yourself, such as your name, address, telephone number and email address. Next you will be taken to another screen where you must choose a password and ebay user name, the eBay user-name is the ID or Name you will be known by to other ebay bidders and shoppers.

The password should be something that is not common, for instance do not use your first or last name, or some common word such as ' pencil ', or ' computer ', take your time and choose something difficult and a little long, make sure you write this password down and keep it near your computer in case you forget it. I recommend writing your ebay password on a yellow post-it note and hanging it someplace near your computer.

When your done with the username and password screen, you just have to check your email for the confirmation link that eBay sends you, just click on the link as shown in the email to activate your eBay account, now you have joined eBay, and you can start bidding and buying right away, but before you do let me tell you about the different features of eBay and how some things work.

eBay is not just an auction site, I mean you do not have to bid and wait for an auction to end, in order to purchase every item on eBay. In fact many items can be purchased for a set fee, and bought instantly, these are called ' Buy Now ' listings. For an example of how listings differ from each other, let's look at some ebay items. Let's say you and I are looking for a ' singing fish ', the fish that look like their mounted and displayed on a piece of wood, when someone gets near it, it will start singing and move it's mouth and tail, they are often called ' big mouth billy bass '.

To see if eBay has any of the ' singing fish ', we just go to the main ebay page (www.ebay.com) and in the 'SEARCH' area, type in: singing fish, and the screen shows there are currently 60 different items or listings found. I scroll down and select one of the listings, it currently shows the current bid price is $7.00 and it has had 4 bids, with 1 day and 13 hours remaining before the listing or auction ends. If I really wanted this item, and was willing to pay up to $15.00 for it, I would just click on ' Place Bid ', and enter my ebay username and password, if requested to do so. It tells me that I have to enter a bid of at least $7.50, remember I am willing to spend $15.00, so I would now enter $15.00 as my bid price. The item description page would then show that I am the current high bidder, and the amount needed to outpid me would be $8.00 or so, eBay keeps my maximum bid price ($15.00) secret, and automatically bids in increments for me as other folks bid, until reaching my $15.00 limit. If someone bids more than my $15.00 limit, there is no way I can win the item, unless I bid again and set another higher limit, if the item listing time ends with my $15.00 bid as the highest one, I am the winner.

The ' maximum bid ' option is a very neat feature, if you will be away from the computer and can not watch an auction closely while the time remaining is ending, eBay will automatically bid for you until you have reached your maximum bid limit.

Besides bidding, some items have others ways of purchasing them. Now lets go back to the screen that showed the 60 different listings for the ' singing fish ', I scroll down and notice that besides the current price of one fish, it says ' Buy It Now ' and shows a price of $8.99 near it. Clicking on this listing, I see the fish can be purchased instantly for $8.99, by clicking on the ' Buy It Now ' button. If I clicked on the ' Buy It Now ', button I would be taken to another screen where I would confirm that I want to buy it by clicking on the ' Commit to Buy ' button, or I could simply click 'back' on my web browser, or just go to another page to cancel my decision to buy the item. If I did click on the ' Commit to Buy ' button, it would show me other screens, and tell me where to send the payment, etc, all which are explained in simple and easy to understand terms.

There are three things to always check on before buying or bidding on an eBay item, the first is the sellers location. As you use ebay, you will see that some of the sellers live in Canada, or even the U.K. If you are like me and live here in the U.S. you may wish to just buy or bid on items that are here in the same country, to avoid a long delivery time, and large shipping fees. Each ebay item description page, tells the users address, for instance it will say ' Item location: Chatsworth, CA United States ', etc, near the top and middle area of the screen. Another thing to check is what the shipping costs will be. Some folks offer very high shipping, for instance someone may sell a shirt for only $2.00 but have a set shipping fee of $15, so always search the item description page before bidding and buying to find the shipping information. Some item description pages have a box, with a button on them called ' Calculate ', once you click on this button, just enter your zip code, and it will tell you what the exact shipping fees will be. One more thing to always check on is what methods the seller accepts as payment. Some folks only accept PayPal, others only accept Money Orders, or Checks, while some accept all methods. Look for this information on the item description screens also, it's listed usually under the item's description section, in an area called: ' Payment methods accepted ', all three of these things I have told you about, are easy to find and view on any item's description screen.

As you search and look at different items listed on eBay, you will see that a lot of people only accept PayPal as their form of payment. If you are not familiar with ' PayPal ' visit, www.paypal.com. Signing up and joining PayPal is simple and free, and it has great benefits especially for using eBay. PayPal payments are secure, and the money is sent instantly to the seller, it makes eBay a lot more fun to use, when buying items on eBay I use both PayPal payments and money orders.

Now let me just explain a little about ' feedback ' and how it's very important when it comes to buying and selling on ebay. Let's go back to the ebay webpage that shows the listings for the ' singing fish '. As I pick a listing at random, I look under the ' Seller Information ' area of that page, I see the sellers eBay name, and the Feedback Score. The feedback score tells you how many buy/sell transactions a user has made in the past on eBay, and the percentage of the transactions that were positive. This info is a great way to protect yourself from a seller or buyer that may not be very reputable. For example if you were interested in bidding or buying an item, and you noticed the person listing the item had a feedback number of 6 and a positive percentage of 20%, stay away from this person, but if the person had a feedback number of 6 and a positive percentage of 99% or so, they would be a lot safer to deal with.

Now before finishing this article I want to give you two more pointers or bits of information to use to make your eBay experiences good ones. Once you become familiar and can find your way around the different areas, go to your account screen, and find the option to change your password. My eBay password is over 14 characters long and contains letters and numbers in random order. I change my password every month or two, and I recommend you do this also.

The main reason I recommend you change your eBay password every month or two, is because there are a lot of nasty computer viruses and trojan horses floating around on the internet and arriving through email, and the purpose of some of these viruses is to scan your hard drive and seek out your passwords, ebay's included, and to email this info to hackers and other websites, giving folks you don't know access to your eBay account information.

In all of my years using eBay, I have never had one problem, and you should not either if you read and follow my advice and tips in this article, and just use some common sense or internet savy. There is no way I or anyone can guarantee you will never have trouble using ebay or any internet site, but neither can someone guarantee you won't become involved in a wreck while driving a vehicle.

Article Source: http://www.ArticleJoe.com


Computer security and encryption becoming more vital

One of the greatest miscalculations a business owner can commit is by not prioritizing how he will protect his computer system from unauthorized intrusions and data theft.

There is a common belief among business owners especially those that do not operate a big business that their small size makes them safe from the malicious intent of computer phreakers and data thieves. They think that in a sea full of big fishes a small fish will be ignored, secure in the fact they are not worth the exertion and computer time for notorious data thieves.

Nothing can be farther from the truth. In fact, smaller businesses are far more vulnerable to internet security threats and all manner of data theft and electronic sabotage. Based on a study made by research firm AMI-Partners, almost half of all small and medium sized businesses have failed to implement even the most rudimentary security precautions – which includes the installation of antivirus and anti spyware programs. This oversight could be the main reason why when the Mydoom worm hit a few years back, one in three small and medium sized businesses were affected compared to just one in six among the larger companies were affected. This was discovered by the Internet Security Alliance, a non profit organization that deals with information security issues.

In fact, now more than ever data and network protection should be given more attention because of the ever evolving sophistication of data thieves. They are now more equipped with the software and hardware necessary to break into security measures instituted by data managers. What could the chance be for a company to weather an attack if the owner forgets or ignores putting in place data security and encryption policies for his business because he thinks it will just be an additional cost? Practically zero and the untold cost to his business would be far more greater.

It is for this reason that data security and encryption should be one of the priorities of a business. Anyone is vulnerable to an attack whether that business is an international conglomerate or a new start up. In fact, a big business will have more chance to recover compared to a small business because a big company will have the read funds available to rebuild the business. A small business, on the other hand, will not have the necessary funding to start the business all over again – making an attack quite catastrophic.

These facts are not lost on many software providers who are now coming up with many types of solutions that guarantee the safety of data in an office’s network. There are also software that bring security to a higher level by incorporating encryption technology in order to safeguard not only sensitive data but also to make it harder for hackers to get into networks or intercept data being transmitted from the corporate network to devices outside of the network. Encryption technology can, in fact, be seen as one of the highest levels of protection that a business can employ in order to ensure the integrity of its data and its computer network.

Article Source: http://www.ArticleJoe.com

Resources.eu.com is an online resource centre covering many topics including computers and security and encryption.

Password Protection Tips for Online Shoppers

Online shopping was once seen as quirky and impractical, but it has proven that not only is it a viable consumer option, it is also a mega pipeline for billion dollar businesses. In fact, many experts expect to see the growth of the online shopping industry increase in ways that will eventually make offline shopping somewhat obsolete. Already we see that during peak shopping months like December, online sales statistics sometimes top the revenue figures for brick and mortar stores.

And this phenomenon has not been ignored by the bad guys, particularly those who make their money by computer-aided theft, fraud, and hacking. If you are concerned about whether or not your online shopping transactions are safe and secure, you are in good company. Even the experts on the subject say that it is a matter of concern, and they advise ways to remain vigilant in protecting our critical personal data. By being aware of the potential for criminal exploitation of our online shopping experiences, we can defend ourselves against such things, and our stress and worry can be transformed into a healthy awareness of our modern need to take reasonable security precautions.

The biggest vulnerability of all is that we have special words and codes we use to identify ourselves, since we are not involved in old-fashioned face-to-face business transactions. That means that it is easy to pretend to be someone else, if we have someone else’s personal passwords. Just as covert operators like secret agents do during wartime, thieves can discover our secret passwords and then use them to cross over into territory where they can easily attack us and wreak havoc, plundering our well-guarded assets. The trick to outwitting these crooks is to have codes that are impossible – or next to impossible – to decipher.

Password protection is a serious business, and we should take it just as seriously as we do the practice of locking our doors at night or walking on well-lighted streets instead of darkened alleys. Experts recommend that we do not use passwords related to information that could be found out about us easily. For instance, your birthday, street address, and dog’s name are probably not well protected. Anyone with the determination to research those things could find out such personal info about you, and if you are using those dates or names for passwords, they can hack your accounts. It is better to use more obscure and random passwords that have no other relevance to your personal identity.

And when creating a password, use a random mix of both numbers and letters. Some computer programs used by culprits will automatically try all combinations of numbers, for instance, to find the one that opens your account. By tossing in a few random letters, you can scramble these attempts and thwart them. Another important piece of advice is to update your passwords regularly, by changing them to new ones. Don’t use the same password on more than one account, and change your passwords on a regular basis, at least a few times each year.

Once you’re sleeping peacefully in the knowledge that you have done everything possible to protect yourself online, you can shop the Internet with confidence and reassurance.

Article Source: http://www.ArticleJoe.com

Jeff Lakie is a contributing writer at the Uk Loan online. We offer you great rates on secured loans and can compete with top lenders like Halifax and still offer you a great rate.

Protect yourself from brute-forcers

Today, I recieved an email from my server notifying me that someone was actually trying to brute-force into the server so I thought I’d make a tutorial how to protect yourself or your server.

First, you’ll need APF to be installed, I’m not going to go in details on how to setup the firewall, but you’ll simply need it install so that BFD (brute force detector) can block the IP from trying to “brute force”.

Installing APF
cd ~
wget http://www.rfxnetworks.com/downloads/apf-current.tar.gz
tar -xvzf apf-current.tar.gz
rm -f apf-current.tar.gz
cd apf-*
sudo sh install.sh

Installing BFD
cd ~
wget http://www.rfxnetworks.com/downloads/bfd-current.tar.gz
tar -xvzf bfd-current.tar.gz
rm -f bfd-current.tar.gz
cd bfd-*
sudo sh install.sh

Configuring BFD
Use your favorite text editor (I prefer nano) to edit the configuration file, /usr/local/bfd/conf.bfd

Find
ALERT_USR="0"
and replace it with
ALERT_USR="1"

Find
EMAIL_USR="root"
and replace it with
ALERT_USR="your.email@webserver.com"

Save your modifications and exit your editor, start BFD using the line
/usr/local/sbin/bfd -s

Now, whenever BFD will detect a bruteforce, it will email you at the email set above & BFD will run the command /etc/apf/apf -d the.attackers.ip

The emails you will usually recieve look like this:

Jul 29 08:22:40 yourhostname sshd[21642]: Invalid user manfred from the.attackers.ip
Jul 29 08:22:40 yourhostname sshd[21643]: Invalid user michi from the.attackers.ip
Jul 29 08:22:42 yourhostname sshd[21642]: Failed password for invalid user manfred from the.attackers.ip port 48215 ssh2
Jul 29 08:22:42 yourhostname sshd[21643]: Failed password for invalid user michi from the.attackers.ip port 48223 ssh2
Jul 29 08:22:44 yourhostname sshd[21646]: Invalid user michi from the.attackers.ip
Jul 29 08:22:47 yourhostname sshd[21646]: Failed password for invalid user michi from the.attackers.ip port 48322 ssh2
Jul 29 08:22:47 yourhostname sshd[21647]: Failed password for postgres from the.attackers.ip port 48329 ssh2

Oh, and one thing I have done after I recieved the attack, I immeditaly changed the default SSH port. Use your favorite text editor (nano again!) to edit /etc/ssh/sshd_config

Find
#Port 22
And uncomment the line (Remove the #) and replace the 22 by the port you want SSH to use (Max. port number is 49151 so make sure you don’t put anything past that. Afterwards, restart SSH. Usually on CentOS it is service sshd restart and in other operating systems, it is /etc/rc.d/init.d/sshd restart

After getting attacked, I did a WHOIS on the IP (Run whois the.attackers.ip). You’ll usually see one of the emails something like abuse@somedomain.com.

Make sure to send them an email including the logs from the email, your server IP and the attackers IP.

Thanks alot for reading
VexxHost Web Hosting Team

Article Source: http://www.ArticleJoe.com

VexxHost Web Hosting Team: Quality, affordable webhosting. As low as $2.55 and as much as 10GB space with 300G transfer, With Free domains and Free setup fees. visit us at vexxhost.com
Article Submission made possible by: www.articles-submit.com
Courtesy of:vexxhost web hosting

Where You Can Learn About The Latest In Online Security

The almost flawless convergence of personal computers and the internet brings convenience to a whole new level in the 21st century. Not having to leave the comfort of your own home to purchase the latest novel by your favorite author or getting your hands on that rare collectible via Amazon.com is the ultimate in convenience. Shopping online just beats having to sit through traffic and standing in line to pay for the goods that you want. Online banking is another example of the advantages that we have today that did not exist a few years back.

Banking through the internet enables us to make transactions like checking our account balances, making bill payments and fund transfers without having to deal with unfriendly or overly friendly bank employees. In utilizing our computers for performing the tasks mentioned, we tend to forget that vital personal information has been stored in our computers or in the database of the site where we make our virtual shopping sprees. It has become part of our daily lives, a routine, that we become oblivious to the basic fact that our computers hold a significant amount of data that translates into the who, what, how and where of our being.

Malicious individuals with even the most basic programming knowledge can make use of complex codes to violate your personal space online. Siphoning off personal information from your computer with your participation through phishing or without your involvement through remote access is a common practice among internet scam artists and hackers. The data they’re usually after are credit card or bank account information, social security numbers and other personal details.
A slighter kind of intrusion can annoy you with harmless yet irritating programs or make your life really complicated by trashing your system with a malevolent virus.

Trojans, worms and other malicious software abound in cyberspace and there is no shortage of nasty characters to use or create them either. Loathing these people after the fact is common but that will soon be replaced with a feeling of inadequacy as you begin to blame yourself. You’ll ask yourself why you didn’t take time to download the latest security patch for your operating system or updated the virus definitions of your antivirus software. There really is only one thing you can do to combat data theft or electric incursions and that is arming yourself with the right information at the proper time.

Knowledge about your system’s security issues, vulnerabilities and fixes will get you far with regards to data protection and “wellness” of your machine. Therefore, information will be your primary ammunition against various attacks whether they are specific assaults or just random annoyances. Information about computer security of any kind can be had in an instant in the net. Blogs and websites offer advice and tips for free, so there’s really no excuse for us not to be vigilant. It is our responsibility to be in the know when it comes to plugging security holes in our system. Read up and you’ll be on your way to a trouble free and more secure computer system.

Article Source: http://www.ArticleJoe.com

Tom Takihi is the owner of the IT Security Blog. To get the latest news and tips on online security, please visit : www.IT-Security-Blog.com

Tuesday, February 20, 2007

Spam Sources: How To Avoid Them

Too tired of deleting “junk mails” in your email box? Junk emails and spam are becoming a great and aggravating problem in the World Wide Web or the Internet. Some people may become so awfully annoyed with the dozens and tons of unsolicited commercial emails or spam that they are forced to change email addresses from time to time.

Spam are those mails flooding your email box with several copies of the same message. So it is like a chain letter where the source needs to send the letters, with the same message, that is, to a certain number of people to get his or her much-desired wish. Spamming is actually a scheme being used by several spam sources to impose their message to individuals who would not opt to receive it given the choice. Who are the usual spam sources? These are probably, but not limited to business-related infomercials, often for fraudulent products, and those scheming get-rich-quick ideas, or other sham services. There is no likely cost for sending spam; the cost actually is not shouldered by the spam sources but usually the recipient or the carriers of the spam.

You may wonder where on earth do these spam sources get your email address?
Researches on spam sources found out that email addresses posted on websites or in newsgroups most attracts spammers. Spammers or spam sources use a software program that can gather and record all email addresses listed on websites and all who posts to public newsgroups.

At present there is no easy way to prevent spam or junk mails. But there are some tips to avoid being tracked by spam sources.

Your first defense against spam sources, change or disguise email addresses posted in a public electronic place. It is rather ideal not to sign out any online member directories. This is like giving them your go signal to distribute your email address to spam sources.

The numbers of spam sources are ballooning everyday. So be extra conscientious when you encounter online forms that requires you to disclose your email address. In particular, pay attention to any options discussing how the address will be used. Be cautious when ticking boxes which could allow them to send you emails or share your e-mail address others.

Have several email addresses for specific purposes. This perhaps may be the best way to avoid spam sources. Instead of using a single email address in all your all transactions, use disposable email addresses which may allow you to immediately cancel the address if spam sources were able to track it. Take note that many web sites offer free email accounts and this gives you the freedom to designed one-time use of emails.

Finally, to cut down the numbers of spam sources, use spam sources filters. With the mushrooming of web hosts offering free email services, these also come in handy with a reliable spam sources filtering. Although they may not totally guard you against spam sources, but surely they can get rid of several spammers and spam sources tremendously.

Hackers - They can get you where you live

Most people have a preconceived notion that if there computer has a firewall or the latest anti-virus protection they are completely safe from hackers. This is simply not true.
It doesn’t matter if you have a firewall or not. Sure, it blocks some unwanted intrusion to your computer but it can’t block them all because of the very nature of the system. Just like a tiny bug that comes from outside and enters your home all it needs is the smallest opening and its there! Web traffic has to pass through firewalls to access your computer and even the best firewalls cannot process all the hugh amounts of inbound information.

Before a hacker can ‘hack’ they have to talk to a computer in its own native tongue. Much of the time it’s HTML (hypertext markup language), but it can be Java, XML, Perl or a number of others. Most successful hackers have much more than a basic knowledge of computer languages as well as how security systems function. A hacker can be anybody with enough knowledge of computer languages and a great deal of computer savvy to look at a URL string and read between the lines. All a hacker needs to do is ‘request’ information from web sites, servers or PCs using there unique knowledge of computer languages by using simple-well placed codes that may seen trivial yet extract a great deal of what you thought was secure information about you or your business. A hacker can, with persistence get administrative control of a web page and do just about anything to it like changing colors, graphic, text or Meta tags.
The only tools a hacker needs is an internet browser and a target URL. Broadly speaking a URL structure is: Protocol://sever/path/to/resource?parameters This roughly translates to: http://targetsite.com/directory/files
When you open your browser to a web page what’s viewed is what the browser interprets and displays. There is an ocean of information behind the pictures and text. On a typical web page, not readily available to the human eye but can be found none the less is information such as the HTML source code, source code keywords, hidden parameters, hyperlinks and a whole lot more. The more a hacker knows the better they can plan an attack. These people are very good at tricking a web server to release a source code for an application or script without it being executed. With enough prodding and poking at a web server they can view the original source code of the HTML content generated by the script. The method of attack will depend on what the hacker learns from the information accumulated from the server side, browser or client side.

Protocols

HTTPS is a protocol used for encrypted traffic within an HTTP stream. HTTPS is mainly used by sites that offer security where credit card and bank account numbers are used. Another level of security is the Secure Sockets Layer set of protocols (SSL) that has become a standard way to communicate between a web browser and a web site when a high level of security is needed. Not only that, but it can help secure e-mail, file downloads, and chat line conversations by using File Transfer Protocols (FTP) that works with SSL. Without this type of security in place it is relatively easy for someone to read the information you are transmitting. The thing to know here is that SSL only secures information in transit (between computer and website). It does not and will not guarantee security at your end and the site you are viewing! You will have to trust security measures at the site you are viewing and rely on your own computers virus and firewall protection. SSL uses a symmetric key cryptography for encryption, meaning the client and server uses the same key to encrypt and decrypt communication. If a hacker can decode the encryption key they can decipher the message coming in and going out.
Cookies

Many sites you visit will set a cookie on your system when you view that site. The purpose of cookies is to give you easier and faster access to the sites resources and to identify you later if you choose to purchase a product from them. This cookie will keep your personal information such as name, address and credit card number on their file in case you visit them again at a later date. The site itself has its own cookie system with the same personal information so when some user logs in they know who they are, what was ordered previously and what credit card was used so they can give you the ‘use same and credit card?’ option. Because a lot of websites have security vulnerabilities hackers can view there cookies and retrieve credit card numbers and other personal info. Most web browsers let a user delete cookies on there system, either all of them or manually but they are still on the website visited. A common problem is if you punch in http://buyitnowsite.com and it sets up a cookie on your system, the creator of that cookie may have specified the domain type as site.com rather than buyitnow.com. Your browser then will offer up that cookie to any page in the same domain like virusdownloadsite.com (for example) or any site that you visit which may not have good intentions for you. This can lead to other sites having access to your personal information not intended for them. This could have been prevented if the technician who created that cookie made it specific enough to include the whole site name (buyitnow) in the coding. Really cookies are not intended to store information like user names and passwords, but unfortunately it is a common practice with websites and a hacker can view this information when infiltrating them. The best way to combat against cookie threats is through cookie management software that gives you full control over the use of cookies, which should include:
* Disable the sending and saving of cookies
* Notification before a cookie is sent
* Control of sending and receiving cookies based on the domain
* Look at and delete the contents of cookies
Most internet browser should give you a whole lot more options for cookies in the advanced tab or you can buy cookie software to have complete and easy access over all cookies.
I have mentioned here only a few areas of concern on protecting computer systems and internet browsing but there are others left untouched due to space ( one could write a book on the subject) but I hope you can see we are at more risk than you think. Because many of us have so easy access to the internet like an ‘always on connection’ computers and servers will always be a target for hackers. Also the speed of connecting increases the risk of attack and the harder it will be to filter that access and make it harder for hackers. Even though we may never be completely safe from hackers there are things we can do to make there job harder. Never store personal information (passwords, credit card numbers) on your PC; instead use a floppy disk or CD for your private information and eject it from your PC when done. A general rule on firewalls is to block all incoming traffic that you didn’t initiate. Don’t run applications you are not familiar with and take what you download! Most important is to backup everything on your computer and make a bootable disk that you know is clean from infection.

http://www.articlejoe.com/Article/Hackers---They-can-get-you-where-you-live/29641

Computer Viruses: How To Avoid And Get Rid Of Them

Computer virus can really be a real treat to our very existence. Since the onset of computers, they already have become an integral part of our daily lives. Especially with the onslaught of the Internet, we now depend on computers so much from our files, to address book, to information sources, to connecting with friends, etc.

A properly designed and executed virus can have a very disabling effect on our computer. Computer viruses then show us how vulnerable we can be and how human beings became so intricate with computers and technology in so many aspects in their lives.

A computer virus is like any program. However, the goal of every computer virus is to destroy files or computer systems by spreading itself in such a fast phase to unsuspecting computer users.

In order to protect your computers from these damaging and disabling viruses, we must be vigilant and employ all possible defenses against them. So let antivirus program be your first line of defense against the paralyzing effects of computer viruses.

Best tip yet, be sure to install anti-virus program from a reputable source. It is rather important to update and use the anti-virus program regularly. Everyday, new viruses come out so if you have an outdated antivirus program, it will not provide you with the much-needed protection your computer may require.

Take note that there are several reliable antivirus programs that can be downloaded for free, these are called antivirus freeware. Antivirus downloads can secure your computer and your very life. Make it a habit to check antivirus online help for updates on viruses to guard your computer before the virus hits you off-guard, which can surely bring out in you an unrelenting ogre.

The most common sources of viruses are from online chat sessions so be extremely careful about accepting programs and files. Computer virus creators are also Internet mainstays. They are these technologically gifted individuals who just want to create havoc out of their expertise, and that is creating computer viruses. So they frequent online chat rooms with the intention of generating tons of unsuspecting victims. And then, spreading the venom they just created would never be a problem because of the myriad of online chat users logging on and off.

Be sure to make backup copies of your most important files, ideally in separate CDs, DVDs, and USB drives. So if ever a virus infected your computer, you will not be at a loss.

If a virus already entered your computer, follow the directions in your antivirus freeware or antivirus downloads on how to clean it. And if you need assistance, do not hesitate to check the antivirus online support services of your antivirus freeware.

But don’t get intimated by computer viruses, as long as you have back up for your files, viruses can never annoy you anymore. In fact, today, viruses are somewhat not that disabling as before due to the popularity of reputable antivirus freeware, antivirus downloads, and antivirus online helps. So if you got the viruses from the Internet, you can likewise get rid of them also through the Internet.

http://www.articlejoe.com/Article/Computer-Viruses---How-To-Avoid-And-Get-Rid-Of-Them/29777

Forum Spamming

Forum spamming is the posting of messages that are either rubbish, abusive, a marketing gimmick or useless. Many forums normally set rules against forum spam, as these can be bothersome for other forum visitors and administrators. However, those who often commit this usually do not hold any regard for the rules the forum administrators have set.

In a forum, spamming can happen as often as possible, especially when the forum is left unmediated. It could take place in just a couple of hours, or even minutes and may even bring the forum server to crash. It also can take place in many forms. Forum spam can either be any of the following:

• When a user or a forum spammer successively revives more than one thread within a matter of hours. These are threads, which have not been participated into for more than a couple months and have been demoted to the back pages of the forum.
• When a user or a forum spammer repeatedly posts the same message in several boards. These messages are normally advertisements in nature, and more often than not, involve pornographic content or website links.
• When a user or a forum spammer posts a message that is not related to the topic or does not contribute to the discussion. The message may also be advertisements or promotions.
• When a user of a forum spammer simply posts endlessly, just to increase post count and forum ranking. Their posts contribute nothing substantial to the thread and may even be just one-liners or graphics.

For forum administrators, preventing forum spamming is not that very difficult, especially when you already have the measures at your disposal. Forum software’s like phpBB, YaBB and SMF have incorporated modifications to their software specifically to combat this problem. These modifications may be installed or set by the administrator to their preference. These modifications are normally very flexible that the controls and use of it may effectively be customized to what the forum needs. Modifications like this can help prevent forum flooding, trolling and forum spam. It can alter posting successions (where the time of last post to the next post is set at a certain interval), image posting (where the administrator can either deactivate it or set a pixel range) or the use of member privileges (like disabling or limiting signature text and avatars).

Additionally, the forum administrator can also double check a forum spammer’s identity through his or her IP address, and may act on this accordingly. Banning forum spammers’ IP address often does the trick, particularly if the forum spam happens too often and too plenty. Extra measures like moderating new registrants and approving or disapproving their posts, may take up a lot of work. But this is also a very effective way to curb forum spamming.

Also, forum administrators must be wary of bots, crawlers and spiders as they often bring in these forum spammers. There are also special modifications so that these may be prevented. Check with the support group of the kind of software your forum uses as they normally have the fix for these kinds of forum spam.

http://www.articlejoe.com/Article/Forum-Spamming/30527

The Mediocre Practice Of Guestbook Spamming

With a wide array of means and the race towards getting higher page hits and page ranks today, spamming is the term that best describes leaving behind comments on various sites, particularly guestbook scripts placed for visitors to leave behind supposedly harmless reactions or insights. Guestbook spam has become one of the resorts that can be seen on the various websites. It can be easy to spot guestbook spamming, particularly comments that have nothing to do with the site relevance, and providing links towards other sites in the guestbook as well. Guestbook spamming is another resort of most people to be able to spread their sites and try to invite other visitors to direct themselves to the site they are endorsing.

There have been a number of ways for people to be able to combat these guestbook-spamming activities, most of which have used moderation methods prior to allowing the post to be done. While guestbook spamming has not yet been completely practiced, guestbook anti-spamming is slowly following the lead of online blogs and forums that have implemented constraints to avoid their sites from becoming spamming origins for their valued visitors. Guestbook spam scripts have been made developed as well, helping relieve people of such guestbook spam practices. Such guestbook spam protection has helped in making the lives of site owners a whole lot more worry free, the fact that guestbook spamming is the trend that most people do to day to be able to drive in traffic to their websites.

Guestbook spam had only become rampant since the introduction of the adsense programs by Google. While the search engine should not be pinpointed for being the cause of all these practices, the fact that trying to go around the system of Google is something that most people love to do. Spamming guestbooks of websites that have higher page ranks and lack the proper guestbook anti-spamming scripts and protection are like sitting ducks waiting to be preyed upon by such people. Guestbook spamming will only need time until the guestbook script programming and protection have been implemented. But for now, the best that people can do is screen the guestbook comments and leave it up to them on whether to approve such inputs or categorize them as guestbook spam and will not be shown on the site’s guestbook for visitors to see.

It is not hard to spot possible guestbook spamming techniques. While to generalize all of them is certainly not proper, the immediate indicators are the content of the left message and possible hyperlinks to sites which are only aiming to re-direct people into checking out the site. People who see this may choose to ignore, but the point is that every time a visitor would check out past or current messages coming from different visitors, some just cannot help but avoid checking out the link left on the guestbook and suffice their curiosity.

Another easy way to determine this is off-topic posts that are in no way relevant to the site’s theme. Some pranksters would simply create inputs to increase the rate of keywords that are queried in a single search from the search engine giants. Spotting this immediately is in most cases a clear example of guestbook spamming.

http://www.articlejoe.com/Article/The-Mediocre-Practice-Of-Guestbook-Spamming/30620

Comment Spam: Allure For The Online Totem Pole

Unless your website is dead and six feet below the virtual ground, you are ever prone to the Internet evil commonly known as comment spam. Comment spam infiltrates every active online website which supports or accepts links from users or participants.

A comment spam is generally characterized with links and no sense, understandably so since its main concern is to be able to take advantage of the algorithm techniques of most search engines in making certain websites rank higher than the others.

Senseless as a comment spam may look at the outset, the makers of these said comment spam are extremely intelligent creatures that are properly harnessing the power of the Internet and its users to generate undeserved income.

Strangely enough, the object of affection of the makers behind every comment spam is not to gain popularity from the people and websites that they are spamming, but rather they use it to get an edge in the totem pole of user access which we know to be called search engines.

Comment spam in huge volumes actually allows the culprits to generate high ranking in search engines such as Google, Yahoo and Ask Jeeves. It helps them generate more revenue from receiving more clicks and having their links displayed all over the World Wide Web for all the people to see, regardless if these people care about what they’re advertising or not.

The allure of resorting to generation of a battalion of comment spam actually emanates from the fact that it works. No matter how hated spammers get for being an online pest for websites, they get to earn a lot from it. Even when the growing number of efforts to reduce comment spam is alive and kicking, a lot of people are doing it since it is a very powerful marketing ploy.

While thoroughly extinguishing comment spam may seem to be an impossible feat, there have been various ways created to diminish, if not eliminate the influx of comment spam in various online systems. One way of eliminating comment spam involves completely blocking off all comments. However, this method is very self-limiting and deprives the user the freedom for healthy online interaction. Not all comments are comment spam, and anyone who deprives himself of getting authentic feedbacks for the sake of blocking a spam comment is at a losing edge.

Some companies have already launched their own versions of anti-spam techniques for the benefit and protection of their users. Still, even with the best of the best anti-spam method, a comment spam can still find its way even in the most protected pages. But it is better to have some level of protection than none, so every user must exercise his or her right to have spam-free interactions by selectively seeking the websites which are more protected and encouraging other websites which are not entirely comment spam-protected.

Filters are also used by most systems to purge comment spam, but they need to be updated frequently since these notorious comment spam authors are extremely resourceful people with a knack for taking advantage of every online loophole they could find.

http://www.articlejoe.com/Article/Comment-Spam--Allure-For-The-Online-Totem-Pole/30721

Phishing - What Is It And How Can You Avoid It

WHAT IS PHISHING?
Simply put, phishing is a crime where criminals use social engineering techniques to persuade you to reveal sensitive information - such as your bank account details, your credit card details, passwords etc. Or, in plain English, they trick you into giving them your personal information so that they can use it to steal your money.

In order to get you to reveal your details, the fraudster normally assumes the identity of a trusted person or organisation - typically a bank, a credit card company or an online payment processor such as PayPal.

This is often carried out using electronic communication - both e-mail and instant messenger systems are widely used today, but telephone or normal mail can also be used by these fraudsters

HOW DOES PHISHING WORK?
The normal mode of attack is an e-mail or sometimes one of the instant messenger systems, but e-mail is most common. Typically the scammer pretends to be someone such as Paypal, Ebay, your bank, or a credit card company. They will send you an e-mail, which looks very similar to the e-mail and website of the organisation being impersonated, complete with logos, graphics, similar font styles etc.

They tend to use a headline which will either entice you into reading by stimulating your sense of fear, greed or even anger. Some Typical examples are below:

1. Your account has been suspended
2. Thank you for your order
3. Someone has sent you money using (insert name) online payment system

These are only typical - there are many other variants.

Item 1 might be used for banks, online payment processors or credit cards. The first time that you get one of these, it’s quite understandable that you would be concerned about your account. The e-mail will advise you that your account has been frozen for some reason - possibly because of some security issue or misuse. You need to update your details before you can restore full access to your account.

There will be a link for you to click on to access their site where you can update your details and everything will be fine after that. However, if you click on the link you will be taken, not to your account but to the scammers website where any information that you enter will be used by them to assume your identity and either steal money directly from you or use your details to buy goods online.

Like the e-mail, the scammer’s site will look very much like the official site that is being impersonated. It will use the same font size, the same - or very similar - images, official logos etc. It’s surprisingly easy to do this and it’s easy to be fooled.

Item 2 is often used when impersonating a well known online vendor such as Ebay. The e-mail arrives, again the logos are very convincing, the type and size of font are the same as normal etc. but you know you didn’t buy the item you’ve just been given a receipt for. Not to worry, there’s a handy link in the e-mail which usually says something like “click here if you didn’t buy this item” which you can use to sort it all out.

Guess what happens when you click on that link. That’s right, you’re going to arrive at the scammers carefully disguised website and be asked to enter some of your confidential information which will then be used to defraud you.

Item 3 is used to appeal to your sense of greed. By now, we have the method of operation off by heart I think. The e-mail arrives - someone’s sent you some money - click here to confirm and receive payment - visit scam website - enter details and the rest is history.

SPOTTING PHISHING E-MAILS
After a while, phishing e-mails are relatively easy to spot and you can avoid them by applying a little common sense. There are also new software security tools available.

There are several things that can alert you to a phishing e-mail.

* Do you actually have an account with the organisation which is purported to be the sender?

* Have they got your details correct (your name, your account number etc.)?

* What is the return e-mail address?

* Where does the “click here” link actually take you (check before you click)?

* Are there a lot of spelling and grammatical errors (lots of phishers are from countries which don’t have English as a first language).

The golden rule to avoid being phished is never to click on the link within the e-mail. Be aware that if you click on the link and decide upon arrival at the site that it’s a scam - the fraudsters might have the ability to extract information from your PC or to load spyware onto your machine even if you decline to enter information at that point.

Even if you think that the e-mail is probably genuine you are always safer to log into your account by using your web browser address bar or by clicking from your favourites list.

Also, just to be on the safe side, make sure your aware of the information policy of your important online accounts. Most reputable companies will have details of what type of information they will send you and what type of data they may ask you for by e-mail. More importantly, they will probably have clear guidelines about the types of information that they will not ask you for.

HOW CAN YOU AVOID PHISHING ATTACKS?
Here’s your plan to avoid being phished:

* Be aware of your online accounts information policy guidelines.
* Never click on a “handy” link in an e-mail - always enter the site using your browser or favourites list.
* Forward a copy of the e-mail to the official site in question. Most of them will be happy to confirm that it’s a phishing attempt or, alternatively, advise that there is a real problem with your account.
* Delete any phishing e-mails you get immediately after forwarding to the “real” company. Once you’ve deleted them, clear out your “trash” folder to stop any accidental clicking in future.

http://www.articlejoe.com/Article/Phishing---What-Is-It-And-How-Can-You-Avoid-It-/32358

Psychological Internet Security: There is More to Downloads than Meets the Eye

Internet downloads offer unlimited potential; if you want something, chances are there is a download for it. Because of the history of downloads and the uses they have provided, most people have developed a mindset that with proper computer security and internet security, downloads are harmless. Unfortunately, there is more to downloads than meet the eye.

Have you ever had advertisements (i.e. adware) spontaneously pop up on your computer? What about dramatic decreases in computer security, speed and performance? Now you would think computer and internet security software would always detect these things when they first appear on your system, but they don't. Know this: computer security software, no matter how expensive or how much is on your system, will never provide 100% security. Hackers and malicious software (a.k.a malware) developers know this and capitalize on people's ignorance, therefore allowing them to infect people with ease.

This is where psychological computer security and internet security come into play. Before you download anything, make sure to use your judgment and common sense. This can be one of your best internet security defenses against malware and it doesn't cost any money! With that in mind, just remember all downloads are not created equal, which you will quickly discover.

Hackers and malware developers evade computer security by taking legitimate downloads and injecting homemade or pre-constructed malware in them. This serves two purposes: (1) antivirus software will have more troubles detecting malware within other files, and (2) people will download and install the program since it looks legitimate at face-value.

To protect yourself from running into malware infected downloads, there are two things you can do. First, only download from trusted sites such as CNet and TuCows. If you stumble into downloads that are not on trusted sites because of exclusivity, research the website by checking the Better Business Bureau or using a search engine. Second, use integrity checking software to see if downloads have been altered.

Integrity checking software provides good computer security and internet security because of what it examines. The software can be downloaded for free and analyzes MD5 hashes, which are like ID tags for downloads. MD5 hashes look like this:

de4174sd23859b1f1fr147424328fb7m

These hashes can be trusted because the most minor modification will change virtually the entire string, thus making it easy to detect unauthorized alterations or malware in downloads. The software is easy to use and can be done in three steps: (1) copy the MD5 hash supplied by the website, (2) download the file onto your computer, and (3) use integrity checking software to develop a MD5 hash of the downloaded file. If the hash from the website is identical to the one you created, it hasn't been modified and reduces the probability of malware infections!

Now you know why psychological computer security is so important when it comes to malware infected downloads. There are a lot of times where internet security software will not help, thus leaving protection entirely up to you. While common sense and judgment can act as a double-edged sword, remember to use the strategies above. Knowing and practicing what you now know about internet downloads will provide you with above-average computer security and internet security against malware, and you didn't even spend a penny to do so.

http://www.articlejoe.com/Article/Psychological-Internet-Security--There-is-More-to-Downloads-than-Meets-the-Eye/34077

Feel Even Safer With a Digital Surveillance System

Worried about crime? I know I sure am. It’s true that we do have the police and the FBI watching out and making sure that the riff-raff is kept off the streets. But they aren’t in charge of your own home safety. And when you come home and look around at your loving family, you know you have to do all you can to make sure they are safe. Relying on the police to protect you is not enough—they’re not outside your door at all hours of the day. You need to be pro-active about protection for your home, and perhaps get yourself a state-of-the-art digital surveillance system.

Now you may think that’s going to the extreme. But I would say it is hardly more extreme than getting a shotgun for your protection—and it’s safer for the kids, too. Besides, do you really think you’re better off doing nothing? Maybe you think it won’t happen to you. But take a look at the TV and the newspapers. Read the stories about kidnapping and home intrusion and malicious vandalism. The people these things happened to never thought it could happen to them, but it did. Maybe they thought the local law enforcement would keep them safe. But it didn’t.

You can’t afford to take chances, that’s all I’m saying. Of course, you can’t be like the proverbial ostrich and stick your head in the sand. This is our world, not the criminals’ and we are gonna go on living our lives the way we see fit. But at the same time, we can take a few more steps to increase the safety of ourselves and our families. That is why I recommend a digital surveillance system, and perhaps several other means of security like a home alarm.

Imagine having security cameras guarding every side of your home. It would be like having a legion of invisible patrolmen watching the house. No one can attempt to get in without your knowing it. And you will have the convenience of being able to monitor the perimeter of your home while you’re lying in your bed. You just flip the remote to bring up the security view on your TV. Or you can have the video relayed to your laptop. I’m sure you now understand how easy it would be to give yourself a little peace of mind just before bed.

You can even go the next step and purchase infrared security cameras. I did, and now I can watch the perimeter of my home and yard even when it’s dark outside. Now that is what I call a state-of-the art surveillance system.

Article Source: http://www.ArticleJoe.com

Sunday, February 18, 2007

Internet Security Threats: Who Can Read Your Email

Before being able to choose a secure Internet communication system, you need to understand the threats to your security.

Since the beginning of the Internet there has been a naive assumption on the part of most email users that the only people who are reading their email are the people they are sending it to. After all, with billions of emails and gigabytes of data moving over the Internet every day, who would be able to find their single email in such a flood of data?

Wake-up and smell the coffee! Our entire economy is now information based, and the majority of that mission critical information is now flowing through the Internet in some form, from emails and email attachments, to corporate FTP transmissions and instant messages.

Human beings, especially those strange creatures with a criminal mind, look for every possible advantage in a dog eat dog world, even if that advantage includes prying into other peoples' mail or even assuming your identity. The privacy of your Internet communications has now become the front line in a struggle for the soul of the Internet.

The New Generation Packet Sniffers:

At the beginning of 2001, most computer security professionals began to become aware of an alarming new threat to Internet security, the proliferation of cheap, easy to use packet sniffer software. Anyone with this new software, a high school education, and network access can easily eavesdrop on email messages and FTP transmissions.

Software packages such as Caspa 3.0 or PassDetect - Ace Password Sniffer automate the task of eavesdropping to the point were if you send an email messages over the Internet with the phrase "Credit Card", it's almost a certainty that someone, somewhere will capture it, attachments and all.

(Caspa 3.0 - from ColaSoft Corporation, located in Chengdu, China http://www.colasoft.com ,PassDetect - a product whose advertised purpose is to sniff passwords sent in email, over HTTP, or over FTP from EffeTech Corporation, http://www.effetech.com )

A good example of this new class of software is called MSN Sniffer, also from Effetech, and it highlights the "party line" openness of today's LAN and Internet environments. Just like old telephone party lines, MSN sniffer lets you listen-in on other people's conversations, just like picking up another phone on a party line.

On their web site, Effetech advertises MSN Sniffer as:

"a handy network utility to capture MSN chat on a network. It records MSN conversations automatically. All intercepted messages can be saved as HTML files for later processing and analyzing. It is very easy to make it to work. Just run the MSN Sniffer on any computer on your network, and start to capture. It will record any conversation from any PC on the network."

Just as the Internet has been flooded by a deluge of spam messages after the introduction of cheap, easy-to-use spam generation software, the same effect is now taking place with sniffer software. The major difference is that, unlike spam, Internet eavesdropping is totally invisible, and ten times as deadly. How much of the identity theft being reported today is a direct result of Internet eavesdropping? Its hard to tell, but with the every growing dependency by individuals and corporations on Internet communications, opportunities to "capture" your sensitive data abound.

Most FTP transmission are unencrypted!

As of November 2003, the majority of corporate FTP transmissions are still unencrypted (unencrypted is geek speak for "in the clear" ) and almost all email communications take place "in the clear". Many email and FTP transmissions travel over 30 or more "hops" to make its way from the sender and receiver. Each one of these hops is a separate network, often owned by a different Internet Service Provider (ISP).

Any Idiot in the Middle

Even a well run corporation must still primarily rely on trusting its employees, contractors and suppliers to respect the privacy of the data flowing over its networks. With the new sniffer technology, all it takes is one "idiot in the middle", and your security is compromised. It could be the admin assistant sitting in the cubical next to you, or a network assistant working for one of the many ISPs your data will travel over, but somewhere, someone is listening. Maybe all he is looking for is his next stock trading idea, or maybe he wants to take over your eBay account so he can sell a nonexistent laptop to some unsuspecting "sucker" using your good name. its all happening right now, at some of the most respected companies in the world.

Access to your network doesn't have to come from a malicious or curious employee-many Internet worms, Trojans and viruses are designed to open up security holes on a PC so that other software can be installed. Once a hacker has access to one computer in your network, or one computer on your ISP's network, he can then use a sniffer to analyze all the traffic on the network.

So I'll password-protect my files, right?

You're getting warmer, but this still isn't going to do the trick. It's a good way to stop packet sniffers from searching for key words in a file, but unfortunately it is not as secure as you might think. If you ever forget a Zip, Word or Excel password, don't worry, just download the password tool from Last Bit Software www.PasswordTools.com, it works very well. There are many other packages out on the Internet but Last Bit's tool is the most robust and easy to use, if a bit slower that some others.

So what can I do about it?

OK, so now that you understand the threat, what can you do about it?

Stop using the Internet? - More than a few professionals are returning to phone calls and faxes for all their important communications.

Complain to your IT department? - If you have an IT department in your company this is a good place to start. But did the spam mail stop when you complained about it to your LAN administrator? Unfortunately he is almost as helpless as you are.

Encrypt your communications with PKI, etc. - For email this is a bit drastic, and can be very expensive, especially since you will need to install a key on each PC and coordinate this with the receivers of your email messages, your IT organization, etc.

Use FileCourier - This is by far the easiest and most cost effective way to protect your email attachments, or replace FTP transmissions. It takes out the "idiot in the middle" with a very clever solution.

The FileCourier approach to Security

I believe that FileCourier is the easiest out-of-the box secure communication system available.

FileCourier approaches Internet data transfer security in a unique way. Until FileCourier was first released in December of 2002, all secure email and file transmission systems relied on encrypting the data during the tried and true method of "upload, store, and forward". When you send an email, it and any documents attached to it are first transmitted to one or more intermediate servers. These mail server store the documents and then attempt to forward it to the receivers email server. To secure the transmission of the email requires either the servers to use extra encryption software technology, or forces the individual sender and receivers to install encryption software and their associated keys, or both. Not only is this a costly and time consuming exercise but it also often fails to protect the data over the complete path of the transmission. What do you do if the receiver is in another company and doesn't have any encryption software installed? What if his company is using a difference encryption standard? Ignoring the complexity of existing secure email and FTP systems their biggest failings continue to be the "idiot in the middle". From a nosey email or FTP server administrator, to a hungry co-worker, to an incompetent who lets a hacker have free reign of their server, if your sensitive documents are stored on a server maintained by someone else then that person, or his company, can view your documents.

The FileCourier approach is creative, yet simple. FileCourier utilizes existing email and instant messaging systems in the same way you use an envelope to send a letter thru the US postal service, as a wrapper for the real content. We assume that EVERYONE can read what is in the email, so we don't send your documents in the email at all. In fact your documents never leave your PC, until the receiver of the email requests it.

How it works:

FileCourier lets you ticket the file you want to email, and then instead of sending the file in the email, sends a "FileTicket" instead. The file is only transmitted to the receiver of the email when he opens the FileTicket and is "authenticated". After the receiver is authenticated the file is transmitted through an SSL (secure socket layer) tunnel directly from the sender's PC to the receiver's PC through our secure relay servers. SSL is the same security used by banks and is impossible for packet sniffers to penetrate. With FileCourier each packet is encrypted using a 1024 bit key and is delivered to your receiver through his browser. FileCourier lets your communications go un-detected by any sniffer, and removes the "idiot in the middle" threat by never storing the data on an intermediate server. More over, FileCourier is the easiest way to secure your sensitive data transmission in both an Internet and corporate LAN environment.

Take Action Now!

Internet communications security is one of the most important privacy issues we face today. It might feel a bit paranoid for a law-abiding citizen to encrypt his email communications and computer document transmissions, but would you send a customers contract thru normal mail without an envelope? How would you feel if your employer sent your next pay stub to you on the back of a postcard? Use FileCourier, just like you would use a envelope for regular mail. Download the no obligation free trial today at www.filecourier.com and send 50MB of data securely for free!

http://www.articlecity.com/articles/computers_and_internet/article_105.shtml

Delete Cookies: New-Age Diet or Common Sense Internet Security

No, this article isn’t about some new, lose-20-pounds-in-a-week, certified-by-some-tan-Southern-California-doctor diet. It’s about cookies on your computer - what they are, why they are there, and what to do about them. Computer cookies actually have quite a bit in common with their baked counterparts - some are good, some are bad, and they have expiration dates.

Cookies are small text files that a server places onto your hard drive whenever you access a given domain. Cookies typically contain information that the website uses to either customize the page you are viewing or otherwise make your web browsing experience more convenient and enjoyable. The information is stored on your hard drive and accessed whenever you go back to the website that originally gave you the cookie. They usually include an expiration date at which point they will be erased from your computer - it could be when you close your browser; or hours, days, months, or years after it is placed. Some don’t expire at all. At the time of this writing I had a cookie stored on my computer that wasn’t set to expire until Wednesday, February 25th, 2195 at 3:45:13 am - I deleted it. Before you run out to your browser’s options and delete and block all cookies, let me mention a few common uses of cookies:

  • Cookies store information for ‘shopping carts’ at online stores. When you select an item and place it in the shopping cart, a cookie is created to remember the item and the price so that you can keep shopping. When you are done shopping you simply click the button to check out and the site accesses the information stored in the cookies to complete your order.
  • Cookies can be used to remember logins and passwords. While this initially sounds a little disheartening, the purpose is really to save you time. Sites will remember the information for you so you don’t have to type it in each time you want to access information.
  • Cookies help websites customize their content and layout for you. If you are a diehard fan of the local college’s basketball team, and you always access the stats and score from the game at a website, that site might use a cookie to send you straight to your team’s page.
  • Cookies help identify whether you have already visited a site. They can also count how many times you have visited the site in a given period of time.
  • Cookies remember the last page or position you were on at the site. Like a virtual bookmark, this is especially helpful if you are reading online or accessing several pages of information.

There are many other ways cookies can be used, and there is obvious potential for abuse. You probably wouldn’t eat a cookie given to you by a complete stranger, especially if you didn’t know what was in it. The same common-sense principle holds true while you’re online, and exercising a little caution can save you from a lot of heartache later on. Blocking any and all cookies will guarantee no personal information is leaked through the cookies, but many sites will either not be able to or will choose not to interact with you.

The trick, then, is to let the good cookies through while screening out the bad ones, not at all dissimilar to what you do when you hover over the cookie tray at a party - you take the ones you want and leave the rest behind. This can be accomplished in a few different ways.

First, you can periodically delete all the cookies on your hard drive. This will systematically wipe out all unwanted cookies that have made their way to your computer. Unfortunately, it will also take care of all the good cookies too. If you only use the internet occasionally (i.e. a few minutes a week), this option might work for you.

Second, you can try to go about it manually. Many browsers that allow you to block cookies also include a feature that allows you to include a list of sites from which you will allow cookies. The advantage of this method is it places virtually complete control over cookies into your hands, allowing only those that you want to be placed on your hard drive. The disadvantage is that it can become very burdensome (at times downright annoying) having to constantly update the list of allowed sites.

Third, you can call in some third-party software to help out. The best programs will scan your computer to find all the cookies and put them into a table or list. This saves you the trouble of having to dig around your hard drive to find the files yourself (try looking for a folder named "Cookies"). Many programs will also indicate with some degree of confidence whether a given cookie is wanted or unwanted, and provide a convenient way to delete the ones that you decide you don’t want.


http://www.articlecity.com/articles/parenting/article_234.shtml

Security and Internet Browsers – Firefox vs. Internet Explorer

The Internet is becoming a more and more dangerous place to be, due in no small part to the inherent security risks posed by viruses and spyware. Additionally, applications that access the Internet as part of their normal operations may have errors in their code that allows hackers to launch attacks against the computer on which those applications are running. The safety and integrity of digital assets is further compromised by the fast-growing threat of cybercrooks who devise and implement large-scale hoaxes such as phishing and ID theft.

In the light of all this, it’s clear that users need a reliable and secure web browser between them and the Internet, which will be free of these problems and won’t let harmful content invade the computer.

The web browser industry continues to be dominated by the Windows-bundled Internet Explorer, with an 85% market share, but in recent years a new breed of free, more functional and resilient browsers has appeared – the most popular being Mozilla/Firefox and Opera. All have received serious security upgrades to help protect against recent scares and safeguard users online.

Internet Explorer is at version 6.0, essentially the same product that was included with Windows XP in 2001. Eighteen months ago, the release of Windows XP Service Pack 2 substantially increased IE safety; however, it did not eliminate many of the loopholes exploited by hostile program code. At present, Firefox is at version 1.5, but its very different development history (see next section) means that it can be considered at a similar level of maturity as Internet Explorer.

Currently, Microsoft is preparing its next-generation browser, Internet Explorer 7.0, which it plans to introduce sometime during the first half of 2006. The company has stated that it intends to make the browser stronger and more secure to help protect its users against the many problems that have dogged the software over the years.

We, along with Internet users everywhere, await the final results with interest. In the meantime, we decided to undertake our own security evaluation of both IE 7 (beta) and its closest rival, Firefox 1.5.

History and overview

Internet Explorer is a proprietary graphical web browser developed by Microsoft. In 1995, the company licensed the commercial version of Internet Explorer 3.0 from Spyglass Mosaic and integrated the program into its Windows 95 OSR1 edition. Later, it included IE4 as the default browser in Windows 98 – a move which continues to raise many antitrust questions.

Firefox is an open-source browser developed by the Mozilla Foundation; anyone who is proficient enough can collaborate in writing and improving its program code. Mozilla is known for its stringent approach to security, promising a bounty of several thousand dollars for any major vulnerability found in the product.

Security incidents and threat response

While no browser is perfect, major security lapses happened rather more frequently with IE than with Firefox. To be fair, Firefox has less than a 10% market share and is thus a rather less enticing target than IE; that’s probably also why security researchers focus much of their attention on the vulnerabilities of Microsoft’s browser, not Firefox’s. Some people have argued that if the market shares were reversed, bugs in Firefox would start appearing on a more frequent basis, as has recently been the case with Internet Explorer.

The open-source architecture of Firefox contributes to the overall safety of the browser; a community of skilled programmers can spot problems more quickly and correct them before a new release is available for general use. It’s been said that threat response time for Firefox averages one week, while it may take months for Microsoft engineers to fix critical bugs reported by security analysts – an unacceptable situation for users who remain unnecessarily vulnerable to exploits (hacker attacks) during that time.

>From the threat response standpoint, Firefox is clearly the winner.

Security features

Phishing safeguard

New protection against financial fraud and identity theft has been incorporated into the new IE. A so-called “phishing filter” now appears on the Internet Options menu, which is intended to protect users against unknowingly disclosing private information to unauthorized third parties. Here’s how it works:

If a user visits a spoofed site which looks exactly like a genuine one – usually as a result of clicking on a link in a fraudulent email - the browser senses a phishing attempt and compares the site against a list of known phishing sites. If the filter finds the site is a phishing culprit, it blocks access to the site and informs the user of the danger of leaving his/her personal details on sites like this. The database of known phishing sites is updated regularly, and users have an option to report a suspected phishing instant to Microsoft for evaluation.

We’re pleased to report that, even in beta, the filter appears to work quite well, correctly identifying half of the test sites we visited as phishing sites.

In Firefox, phishing protection is delivered through third-party extensions such as Google Safe Browsing (currently in beta for US-based users only (see http://www.google.com/tools/firefox/safebrowsing/index.html); this can be plugged into the browser’s extension menu.

As additional protection against accidental phishing, the authors of IE have stated that they plan to make their product display the URL of every visited site. With IE 6, this capability was not available and many pop-ups appeared without displaying an address in the previously non-existent address bar. Unfortunately, in neither browser were we were able to achieve more than a fifty percent URL display ratio; we trust that this percentage will increase as the release of IE 7 approaches and Mozilla continues to work on improving its functionality in this area.

Restriction of executable Web content

In the current version of IE, suspect websites have been free to install almost any software they want on visitors’ machines. While XP SP2 has dramatically reduced this possibility, many unnecessary add-ons and toolbars can still be easily installed by inexperienced users. IE 7 should provide more protection for naïve users, as it will offer to run in protected mode, thus restricting access to the host OS files and settings and making these critical elements of the computer inaccessible to malware.

The default setting for Firefox 1.5 is to have installation of extensions and add-ons disabled; the user must manually change settings in order to enable adding extensions to the browser.

There will always be a tradeoff between security and functionality, but security experts always maintained that letting websites unrestrictedly launch executable code within the browser creates unlimited potential for exploitation. IE 7 will offer much greater flexibility in configuring which external code will be permitted to run within the browser and what impact it would have on the OS.

ActiveX restrictions

Aside from some graphics enhancement of web pages, in most cases ActiveX is more damaging than beneficial. Many sites that serve up spyware and pop-up ads use ActiveX scripting technology, and ActiveX scripting in the Windows environment can be allowed to run unrestrictedly with administrator (root) privileges. Firefox 1.5 does not support Microsoft’s proprietary ActiveX technology and so the Firefox browser is more resilient against spyware infection.

In IE6, even with SP2, ActiveX is allowed to run by default, which automatically renders IE users less protected against the threat of spyware. In the upcoming IE 7, it is not yet known whether Microsoft will continue this approach, but early indications point to this being the case. This would be unfortunate, since the current approach is a clear security vulnerability.

Of course, IE users can manually disable ActiveX scripting on a particular website and let ActiveX be started automatically on all other sites visited. Or, vice versa, they can disable ActiveX scripting on most of the sites visited and permit it to run on a particular site. All this can be configured under the Security tab in IE’s Options menu. However, it is hardly realistic to expect Internet novices, who need the most protection, to do this.

Java, JavaScript and Visual Basic components

Java and JavaScript can be enabled and disabled by both browsers. Firefox allows users to specify permissions for particular actions performed by these scripts. IE 6 allows users to create a group of trusted sites to which global limitations on these scripts will not apply. In IE 7, more flexibility will be added that will lead users toward a more customized display of web pages belonging to a particular site; it appears Firefox also plans to introduce more flexible parameters.

Internal download manager

IE 7’s download manager will be revamped, and feature an option to pause and resume downloads - a feature not available with the current version. Specific actions will be able to be defined following the completion of a download, and users can check the newly-downloaded file with their anti-virus before running it. This approach is already in place with Firefox, so Microsoft appears to be playing catch-up here.

Encryption of data on protected sites

When you submit sensitive information, such as transaction details to a bank or financial institution, it travels in an encrypted form through a secure HTTP (SHTTP) connection. The information is encrypted by your browser and decrypted at the receiving end. The new version of IE will use stronger encryption algorithms to reliably transfer your data without the risk of being intercepted and deciphered by someone in transit. A padlock icon indicating that a user is on a secure site will be placed in a more obvious place than currently, and more detailed information will be provided to help visitors check the authenticity of such sites.

Firefox currently has a better-organized display of security certificates for its users, so clearly Microsoft has a room for improvement.

Updating

Both browsers are updated automatically when new code is ready. Firefox has this update mechanism already in place, and for IE 7, it is expected that updates will be provided through Windows update technology.

Privacy enhancements

IE 7 will have the ability for users to flexibly set what private data will be saved and can be applied to different sites; users will be able to easily remove browsing history and other private details such as passwords, cookies, details submitted on web forms, download history, and temporary files. In IE 6, these files were stored all over the place and users have complained that there is no clear way to delete this information. Firefox 1.5 already provides this capability.

Conclusion

IE 7 promises a lot of interesting security and privacy enhancements that will help users stay more secure. With the final release users will receive a good, solid browser that, if Microsoft promises are fulfilled, will help it to compete well on the security front. As we have seen, Firefox 1.5 is already a role model, and it will be interesting to see what lies ahead for this talented challenger

http://www.articlecity.com/articles/computers_and_internet/article_2785.shtml

Internet Security and You - Take Action

It amazes me that for whatever reason people tend to overlook this problem time and time again. With the expansion of the Internet comes more threats. There are people in this world that want to cause harm to your computer, just because they can. You may not know when or where these attacks will occur, but it can happen to you at a moments notice.

When you are online you are sharing a vast network with millions of other users from all over the planet. Some of these user like to abuse the Internet by sending you spam emails or even worst, these people can be hackers and those who create viruses meant to harm your system.

You may have received an email from an unknown sender with an attach link or file with the sole propose to cause havoc to recipient. This file could be an Trojan, keylogger, adware, spyware or a number of the thousands of harmful viruses that can damage your computer, and the time and hard work you spend to customize your system can be wipe clean.

Some of the more well known viruses have been the:

Anna Kournikova virus

This arrives as an email attachment. Opening this attachment infects your machine. Once infected, the virus mails itself to all recipients found in the Windows Address Book.

Lovsan Worm virus also known as "Blaster" or "MSBlaster"

Has quickly infected computers throughout the Internet. The worm takes advantage of a flaw in Windows operating systems to drop a malicious program on your computer.

Unlike typical computer viruses, which usually arrive as email attachments, Internet worms attack communication ports on vulnerable computers, often without the user's knowledge. By taking advantage of a vulnerability in Windows, the worm is able to spread without requiring any action on the part of the user.

Nimda

Infects web servers and local files. Its main goal is simply to spread over the Internet and Intranet, infecting as many users as possible and creating so much traffic that networks are virtually unusable.

The "I Love You" Virus

This virus is pernicious, using Microsoft Outlook and Outlook Express to send itself to everyone on a Contact List from these programs, and destructively replacing files. The subject line of the infectious email reads "ILOVEYOU", and the message of the email reads "Kindly check the attached LOVELETTER coming from me." The attachment, which has the destructive Visual Basic script, is named "LOVE-LETTER-FOR-YOU.TXT.vbs"

If you receive this email attachment, DON"T OPEN IT!!! Your computer will not become infected unless you open the attachment on purpose. Reading the email won't infect your computer.

You may also be careful when using File sharing, Peer-to-Peer (P2P) software. This platform is great place for people to spread viruses to other people by simply creating or modifying an virus and renamed this program to a popular file name. Then once the file have completed downloading, the unsuspected user opens the file, and the destruction begins.

It can be a simply problem that hoping your anti virus will detect and alert you of a potential danger, or the virus may just completely wipe you hard drive in seconds. For those of you can use popular p2p programs like kazaa, limewire, shareaza, emule and others, please do not download any file that may look suspicious with a weird a file extension. This file may look like "britney spears.jpg.exe" or "norton antivirus.exe" with a smaller file size then usually.

If you have an antivirus software, you can simply, "right click" a file on your system and scan for viruses, before your open the file itself. This method can help you, but is not foolproof.

Don't be the next victim. Take these steps to help keep the odds in your favor of being protected:

Antivirus Software

An premium antivirus software like Panda Platinum Internet Security (which included an antivirus, firewall, spam blocker, and anti-spyware), BitDefender, or The Shield Pro is the most critical element of your Internet safety.

If you don't have up-to-date antivirus software on your PC you're asking for trouble. A good antivirus software will find viruses that haven't yet infected your computer and remove the ones that have.

Firewall Software

Windows XP comes built-in with a firewall, and if you are running Service Pack 2, it is turned on by default. Although Windows XP's firewall is certainly better than nothing, you should strongly consider acquiring another firewall to work on top of, or replace (recommended!) the firewall that comes with Windows XP.

Firewall software watches these ports to make sure that only safe communication is happening between your computer and other computers online. If it sees something dangerous happening it blocks that port on your computer to make sure your computer stays safe from the person who is trying to hack into your system.

Some of the better firewalls are Zone Alarm Pro, Norton Personal Firewall, Panda Platinum Internet Security, and The Shield Pro.

Spyware Removal

There is a good chance that if you are actively online with your computer system that in some way spyware will get installed. All it takes is just clicking on the wrong site or by signing up for some web programs. Another issue with spyware is the danger of invasion of privacy.

Remember that these programs can collect all types of data from you computer system and then send back to its creator. Spyware usually collects information that can be used for advertising, marketing to see what websites you visit on a frequent bases.

There are several spyware tools available, but many provide insufficient protection.

One of the better spyware removers are; Webroot Spy Sweeper, XoftSpySE, and AdwareAlert.


http://www.articlecity.com/articles/computers_and_internet/article_2936.shtml

Encryption: Security Tool For Internet

Web site security is a complex and perhaps even controversial subject. On one side there are individuals whom regard themselves as the freedom fighters of the technology and information era; on the other side there are those who view this as a form of modern terrorism. Whatever the case, breaking into a computer system without consent is, without question, a crime.

It is convention to use a protected connection when gathering sensitive data such as the personal information of a visitor of a Web site. The security levels of those protected connections currently in popular use are "none", 40-bit, 56-bit, and 128-bit listed from lowest to highest level of page security.

Encryption is a very effective tool in protecting information from unauthorized access. Data is scrambled before transmission, making it illegible until the recipient for whom the information is intended unscrambles the contents, restoring them to their original condition. While this tool is useful for safeguarding the information during transmission, it cannot guarantee privacy after the data has been deciphered on the other end.

Encryption is an algorithmic process that converts plain text into scrambled and illegible appearance known as "cyphertext" as a means to provide privacy. The recipient of the encoded or encrypted message decodes it with the use of a "key", much like the simpler substitution codes played with by children.

Modern Web browsers can automatically encrypt text once connected or linked to a secure server, identifiable by a Web address starting with "https". The Web server then decrypts or decodes the data when it arrives. Thus, as the data passes between computers anybody attempting to spy on the information will gather only encrypted data, useless without the key.

Encryption systems are defined as either asymmetric or symmetric. Examples of symmetric key algorithms would be AES, Blowfish and DES. They work with a single key that is distributed ahead of time and is shared by both the sender and the receiver. This "key" is used both to encrypt and decrypt the data.

Asymmetric encryption systems, such Diffie-Hellman and RSA, make use of a pair of keys. The public key is widely distributed and used by many users to encrypt information. The private key is different for each online user and is used for decrypting information.

When a browser is connected to a protected domain or Web site a secure layer of sockets holds and validates the server and confirms a method of encryption and a unique session key. This creates a session that is secured and which helps to guarantee privacy and integrity of information exchange.

It is important to remember that strong encryption only makes the data exchange private and cannot actually secure it over the long term. In order to ensure that it will remain secure, steps must be taken to make certain the receiver of the information is a legitimate and responsible entity, which is generally achieved online through the use of digital certificates or signatures. After all, the best way to keep something secret is not to share it at all.

As more become aware of the generally unsecured nature of the Internet, encryption will undoubtedly become increasingly popular. Without encryption browsing, email and also instant messaging is available for potentially everyone to read, perhaps even end up stored for many years.

The best security functions invisibly, since a professional site strives to be open and inviting in appearance. Nevertheless a nice-looking site can boast the best security. It should be a primary concern of all online users. The savvy Internet user is demanding no less than the best protection from Web site owners.

http://www.articlecity.com/articles/computers_and_internet/article_3573.shtml