Security
Security
to
Security
By Team Digit
Credits
The People Behind This Book
EDITORIAL
Deepak Ajwani Editor
Robert Sovereign-Smith Copy Editor
Ram Mohan Rao Writer, Copy Editor
Abey John Writer
Arjun Ravi Writer
September 2006
Free with Digit. Not to be sold separately. If you have paid
separately for this book, please e-mail the editor at
[email protected] along with details of location of
purchase, for appropriate action.
Introduction
T
he old adage goes "Better safe than sorry," of course. We'd
change that to "secure" because of the sheer importance that
word has taken on. What used to be money, gold and such is
now data, and data cannot be secured using a six-lever padlock.
Contents
1 Why Security? 9
1.1 Floppies / CD / DVD-ROMs / External 11
Storage Devices
1.2 The Internet 13
1.3 Attacks From Known Sources 14
3 Virus Busting 31
3.1 How To Tell 32
3.2 Enter The Warriors 35
3.3 Viruses In Linux 57
3.4 Anti-Virus For Linux 60
5 Data Security 81
5.1 Encrypting Your Data 82
5.2 Keeping Passwords Safe 85
6 FAST TRACK
THE WINDOWS REGISTRY
FAST TRACK 7
SECURITY
WHY SECURITY? I
Why Security?
A dware can bring down your PC, a virus can mass-mail annoying
contents to all the contacts in your address book, a keylogger
can send every keystroke of yours to someone on the Net—and these
are just a few risks that are out there affecting PCs. Also, for
someone even moderately well versed with operating systems,
getting into a poorly-secured PC is child’s play. We begin this Fast
Track by telling you just how important security is.
FAST TRACK 9
I WHY SECURITY?
SECURITY
A
s computers become more and more integrated into our
lives, we end up leaving a lot of sensitive information on
our PCs—from passwords, e-mail IDs (even official e-mail
IDs) and bank accounts to personal diaries and notes, business
plans (or worse still, tender bids), confidential documents, a log
of surfing habits (which can be viewed out of context), a backup
of phone SMSes, and much more.
10 FAST TRACK
SECURITY
WHY SECURITY? I
FAST TRACK 11
I WHY SECURITY?
SECURITY
12 FAST TRACK
SECURITY
WHY SECURITY? I
FAST TRACK 13
I WHY SECURITY?
SECURITY
person may not even know that spam mails from his ID are
being sent. You can be a good friend and call him up to let him
know of this so he can take curative measures.
Some sites even make use of the fact that people occasional-
ly make typographical errors! A recent example is
www.ork0t.com (now taken down), which you could have visited
if you typed what you thought was “www.orkut.com” and made
a typo. When one entered one’s user ID and password into that
site, it would be used to hack into your account and send out
spam to all your contacts!
14 FAST TRACK
SECURITY
WHY SECURITY? I
FAST TRACK 15
SECURITY
SECURING THE DESKTOP II
FAST TRACK 17
II SECURING THE DESKTOP
SECURITY
Other than
operating system
u p d a t e s ,
Automatic Updates
also downloads all
high-priority
updates for
Microsoft Office
Turn on Automatic Updates
XP, Microsoft
Office 2003, Microsoft SQL Server, and Microsoft Exchange Server.
Note that if you use older versions of Office products, you will need
to visit the Office Web site (http://office.microsoft.com) for the latest
updates.
18 FAST TRACK
SECURITY
SECURING THE DESKTOP II
FAST TRACK 19
II SECURING THE DESKTOP
SECURITY
20 FAST TRACK
SECURITY
SECURING THE DESKTOP II
select Properties, and click on the Security tab. You can config-
ure the access rights for users and folders from this tab.
FAST TRACK 21
II SECURING THE DESKTOP
SECURITY
Use Windows XP’s User Account manager to make sure that all your users have
accounts and just enough privileges
22 FAST TRACK
SECURITY
SECURING THE DESKTOP II
Note that for this to work, you would need to have the
Secondary Logon Service running. At a command prompt, type
in “services.msc”, and verify that the Secondary Logon Service is
running.
Password Policy Settings make sure all a computer’s users are careful about their
passwords
FAST TRACK 23
II SECURING THE DESKTOP
SECURITY
24 FAST TRACK
SECURITY
SECURING THE DESKTOP II
FAST TRACK 25
II SECURING THE DESKTOP
SECURITY
❍ Telnet
❍ Universal Plug and Play Device Host
❍ IIS (not installed by default)
❍ NetMeeting Remote Desktop Sharing
❍ Remote Desktop Help Session Manager
26 FAST TRACK
SECURITY
SECURING THE DESKTOP II
❍ Remote Registry
❍ Routing & Remote Access
❍ SSDP Discovery Service
FAST TRACK 27
II SECURING THE DESKTOP
SECURITY
Inetd
Inetd is a super daemon that controls a number of network dae-
mons. You will need to modify the configuration file inetd.conf
to disable all unnecessary services. Open the inetd.conf file, nor-
mally found in the /etc folder, in a text editor like pico. To do
that, open a terminal window and type “pico /etc/inetd.conf”.
Scroll through the entries looking for listings like:
ftp stream tcp nowait /usr/etc/in.ftp in.ftp
28 FAST TRACK
SECURITY
SECURING THE DESKTOP II
Other Services
There will most likely also be other useless or potentially risky
services running on your system apart from those listed in
inetd. These include apmd, atd, netfs, httpd, portmap, pcmcia,
nfs, sendmail, routed, rstated, ruserd, rwhod, and ypbind. These
could allow a savvy Linux hacker to gain access to your system
and take over as the system root using some known or current-
ly-undocumented vulnerability in any of these services. The
concept is to provide the minimum footprint for an attack vector.
FAST TRACK 29
II SECURING THE DESKTOP
SECURITY
30 FAST TRACK
SECURITY
VIRUS BUSTING III
Virus Busting
I n this chapter, we get into the nitty-gritty of the virus menace, for
lack of a less clichéd phrase. And, well, “menace” is quite a good
word for the problem, anyway. What are the warning signs? What
anti-virus to use? Is Linux as safe as it’s touted to be?
FAST TRACK 31
III VIRUS BUSTING
SECURITY
32 FAST TRACK
SECURITY
VIRUS BUSTING III
hard look at all the programs running. If you see something with
random character strings as its name... you’ve guessed it: you’re
infected by either a virus or spyware. But most viruses and spy-
ware don’t give themselves away so easily, and call themselves by
decent names.
Talking about running the SCU, if the SCU, the Registry Editor,
or your anti-virus program itself doesn’t load, you’re almost cer-
tainly infected.
3. Several apps seem broken. The key word here is “several”: one
program not working correctly, like we said, is seldom an indica-
tor of a virus. But if you notice functional anomalies in several
applications, it’s time to scan.
FAST TRACK 33
III VIRUS BUSTING
SECURITY
8. If, despite all our warnings in the past five years, you still
opened a suspicious-looking attachment—driven, of course, by
what is called the libido—and immediately after that, everything
(or at least some things) went funny, you’re in for it. Hit Scan. And
hope that the anti-virus will scan.
10. Continuing along those dire lines, if you’re able to install any
program but an anti-virus, then yes, you are a victim.
34 FAST TRACK
SECURITY
VIRUS BUSTING III
13. Icons on the desktop that you didn’t place are again a giveaway
symptom.
15. Now this could also be an indicator of spyware, but when you
notice that your modem is doing a lot of activity on its own—both
sending and receiving—or if your hard disk is performing more
activity than you’d expect, like chattering away when you’re not
even working on anything, it could be a sign of viral infection.
In the case of anti-spyware scans, you can run a scan using one
program and then repeat it using the other, so each catches what
the other missed. But unfortunately, you can’t have two resident
anti-viruses: they’ll conflict with each other. As a result, you’ll
have to decide upon one. The following test will help you do so: it’s
FAST TRACK 35
III VIRUS BUSTING
SECURITY
We noted the initial boot-up time of the test machine and the
increase in boot-up time after the anti-virus software was
installed. We restarted Windows twice to make sure that all the
services installed by the anti-virus were up and running. We thor-
oughly scanned the entire hard drive and noted the time taken to
complete the scan process. We noted the page file usage of the
clean system and then noted the memory usage after the anti-
virus was installed, then once again during the test scan. The aver-
age CPU usage during the test scan was also noted.
36 FAST TRACK
SECURITY
VIRUS BUSTING III
FAST TRACK 37
III VIRUS BUSTING
SECURITY
The interface of the software is easy to use and one can feel
right at home using it. Interestingly, the main window doesn’t
38 FAST TRACK
SECURITY
VIRUS BUSTING III
A f t e r
installation,
we needed to
r e s t a r t
Windows,
when it per-
The snazzy avast! interface is easy on the eyes formed a
boot-time
scan. Incidentally, such a bootup scan can be scheduled to run
each time Windows boots. It even supports scanning files being
transferred using P2P agents and instant messengers.
FAST TRACK 39
III VIRUS BUSTING
SECURITY
40 FAST TRACK
SECURITY
VIRUS BUSTING III
1. “Complete Scan” in which all the local hard drives are tested.
FAST TRACK 41
III VIRUS BUSTING
SECURITY
42 FAST TRACK
SECURITY
VIRUS BUSTING III
FAST TRACK 43
III VIRUS BUSTING
SECURITY
Though it was not the fastest scanner, it wasn’t too slow either;
the test scan took 323 seconds, a little over five minutes.
44 FAST TRACK
SECURITY
VIRUS BUSTING III
Traditionally,
all incoming and
outgoing mails
pass through the
WinSock Layer at
both the client
and the server
level. The MWL
sits on top of
WinSock. Hence,
all the content
that passes
through WinSock
The eScan interface is neat and clean has to pass
through MWL,
where it is checked for malicious content. The checking is done by
passing the data through various filters such as Virus Filters,
Content Filters, Attachment Filters, and so on. An appropriate
action is taken either using user intervention or automatically, in
accordance with your setup. MWL thus potentially tackles a threat
before it reaches your applications.
FAST TRACK 45
III VIRUS BUSTING
SECURITY
such as e-mail
content scanning,
popup filter,
Browser CleanUp,
etc. There is also a
program called
“Quick Scan your
system”, which is
another way to
manually scan
your computer
but with customi-
sation options. eScan’s On Demand scanner...
The module does
not allow one to
select whether or
not to scan com-
pressed files.
eScan Updater
allows you to
update your anti-
virus, Content
Administrator
lets you set securi-
ty policies to per-
mit or prohibit ...and the scan status
specific type of
content from bring accessed (similar to parental control), and the
eScan Management Console allows you to remotely configure and
administer the eScan network when installed on multiple clients.
46 FAST TRACK
SECURITY
VIRUS BUSTING III
by removing traces of Web sites that you have visited, and also
allows you to remove cookies, ActiveX controls, plug-ins and other
links that reveal your browsing habits.
FAST TRACK 47
III VIRUS BUSTING
SECURITY
form of a toolbar. The user has the option to hold the mail in a
quarantine area within SpamKiller, or to mark its subject with the
word “SPAM” and pass it on to the e-mail client.
The Privacy Service lets you store private data such as credit
card numbers in a categorized and encrypted database. This serv-
ice prevents sensitive data from going out via e-mail, an instant
48 FAST TRACK
SECURITY
VIRUS BUSTING III
FAST TRACK 49
III VIRUS BUSTING
SECURITY
50 FAST TRACK
SECURITY
VIRUS BUSTING III
FAST TRACK 51
III VIRUS BUSTING
SECURITY
The user interface is well done and easy to use. You just
need three clicks to start scanning your computer, and if you
want to scan a particular folder, it just takes a couple of clicks
more. You can also schedule a one-time, daily or weekly
scan. Scans can be also scheduled to run at predetermined
time intervals.
52 FAST TRACK
SECURITY
VIRUS BUSTING III
While scanning for viruses in our test scan, we found that for
the first couple of minutes or so, QH scan uses a lot of CPU time—
as much as 90 per cent. But later on this drops to acceptable lev-
els so that you can continue working. It also eats up quite a lot
of memory during virus scanning, which we found averaged at
around 335 MB, or 81.08 per cent. According to the data we
acquired from www.av-test.org, the outbreak response time for
Quick Heal Anti-virus 2006 is between 4 and 6 hours, which can
be considered OK.
FAST TRACK 53
III VIRUS BUSTING
SECURITY
54 FAST TRACK
SECURITY
VIRUS BUSTING III
FAST TRACK 55
III VIRUS BUSTING
SECURITY
You need just one click to scan your computer after you launch
the Anti-virus from the system tray icon. But if you need to scan a
folder, you need five additional clicks to do so. While you can spec-
ify which folders to scan, we did not find any options to specify the
type of files to scan or whether or not to scan compressed files. So
each time you scan, compressed files are also scanned.
56 FAST TRACK
SECURITY
VIRUS BUSTING III
messengers are
also supported:
MSN, Yahoo!, AOL,
AIM, ICQ, Trillion,
GAIM and
Miranda.
When we ran
the test scan, we
found that this
anti-virus requires
the lowest memo-
ry in this catego-
ry, which was 278
MB or 50.27 per The ZoneAlarm Anti-Virus interface
cent. The CPU
resources used were higher though at 32.18 per cent. The scanning
time was also very slow. It took about 19 minutes to complete the
test scan.
FAST TRACK 57
III VIRUS BUSTING
SECURITY
It’s something to think about. But even before we tell you that
there do exist viruses for Linux, here’s a snippet of what Scott
Granneman of online computer security news portal
SecurityFocus had to say about the issue, in 2003:
”We’ve all heard it many times when a new Microsoft virus comes
out. Someone on a mailing list or discussion forum complains about the
latest in a long line of Microsoft email viruses or worms and recom-
mends others consider Mac OS X or Linux as a somewhat safer comput-
ing platform. In response, another person says, basically, ‘How ridicu-
lous! The only reason Microsoft software is the target of so many viruses
is because it is so widely used! Why, if Linux or Mac OS X was as
popular as Windows, there would be just as many viruses written for
those platforms!’
“Of course, it’s not just “regular folks” on mailing lists who share this
opinion. Businesspeople have expressed similar attitudes... including ones
who work for anti-virus companies. Jack Clarke, European product man-
ager at McAfee, said, ‘So we will be seeing more Linux viruses as the OS
becomes more common and popular.’
58 FAST TRACK
SECURITY
VIRUS BUSTING III
security firm Trend Micro, echoing Clarke. “It is a stable OS, but
it’s not a secure OS.”
Clarke has also said that it’s probably easier to write a virus
for Linux because the code is available.” He has gone on to say
that it seems “ridiculous” that users have any doubt about
Linux being attacked. “It’s not a target at the moment because
the market isn’t there, but Li0n and Ramen (two of the
more famous Linux viruses) have already proved that it’s on
the menu.”
Then there’s the whole thing about why virus writers write
their viruses in the first place. Genes has this to say: “There is some
prejudice amongst the virus writing community. If you write a
virus for Windows, your peers clap their hands; write one for
Linux and they’ll stone you.”
Genes has also said that we are likely to see more viruses capa-
ble of denial of service attacks and more network-aware viruses
that use techniques similar to those of Code Red and Nimda, two
rather infamous viruses. Nimda, as an example, can set up open
shares on a network.
The experts agree that what the virus writers will be concen-
trating on now is social engineering, which, of course, doesn’t
depend on the OS.
Michael Foreman, a partner at AVG UK, said: “In the past few years
we have seen the use of enterprise Linux applications growing
steadily, and it is only a matter of time before we can expect to see
virus attacks specifically targeted at these users.
FAST TRACK 59
III VIRUS BUSTING
SECURITY
60 FAST TRACK
SECURITY
VIRUS BUSTING III
“Since there are so few Linux viruses in the wild, who knows
if the products actually work? At best, the Linux antivirus hawk-
ers are jumping the gun—trying to capture a market that isn’t
quite there yet. At worst, they’re advancing a cynical ploy to sep-
arate Linux newbies from their cash for something they couldn’t
possibly need.”
FAST TRACK 61
SECURITY
ADWARE AND SPYWARE IV
FAST TRACK 63
IV ADWARE AND SPYWARE
SECURITY
64 FAST TRACK
SECURITY
ADWARE AND SPYWARE IV
FAST TRACK 65
IV ADWARE AND SPYWARE
SECURITY
66 FAST TRACK
SECURITY
ADWARE AND SPYWARE IV
FAST TRACK 67
IV ADWARE AND SPYWARE
SECURITY
really expensive pirated software off a warez site, you are almost
certainly going to be open to spyware as you do it. The same goes
for some P2P clients (like Kazaa, BearShare, and Morpheus).
Gator
One of the most common spyware on the Web is Claria Corporation’s (formerly
Gator Corporation) Gator. Usually, Gator installs itself with such applications as
DivX Pro or KaZaA. However, Gator can also install itself even if you haven’t
installed these programs. Most malicious Internet advertising will guide you to
some or the other “free” software download. And if you do download such soft-
ware, nine times out of ten, Gator will be installed on your computer without
your knowledge.
68 FAST TRACK
SECURITY
ADWARE AND SPYWARE IV
Shareware
Put simply, shareware is “try before you buy” software. Shareware allows you
to use the software for a trial period, after which you are asked to purchase it.
The purchase may be of the entire software package, or a registration code to
unlock the original shareware package for unrestricted use. The best part
about shareware packages are that they allow you to evaluate them before
actually buying, so you know whether the package suits your requirements or
not. And as the name implies, users are encouraged to share the shareware
package with friends.
Warez
Warez is essentially pirated stuff (games, applications, music albums, et al) that
are available for download over the Internet. There are clear violations of copy-
right laws in downloading and using warez.
FAST TRACK 69
IV ADWARE AND SPYWARE
SECURITY
70 FAST TRACK
SECURITY
ADWARE AND SPYWARE IV
FAST TRACK 71
IV ADWARE AND SPYWARE
SECURITY
4.4.1 Ad-Aware
http://www.lavasoftusa.com/software/adaware
By far the most popular adware and spyware removal tool is Ad-
Aware from Lavasoft. There is a freeware version available for
download at the Lavasoft Web site. The software features power-
ful search and removal tools that help detect and eliminate spy-
ware from your computer efficiently and effectively.
72 FAST TRACK
SECURITY
ADWARE AND SPYWARE IV
any changes to the Registry that have been made by spyware and
adware programs. The best part about Ad-Aware is that it can
get rid of stubborn spyware.
FAST TRACK 73
IV ADWARE AND SPYWARE
SECURITY
4.4.3 HijackThis
www.merijn.org
Before we discuss what HijackThis is and what it does, we need
to have an idea of what essentially a browser hijack is. A brows-
er hijacker, as the name suggests, is a form of malware that
“hijacks” your Web browser and displays tons of pop-up ads one
after the other. It replaces the existing start page, search page or
error page of your browser with ones of its own. This results in
74 FAST TRACK
SECURITY
ADWARE AND SPYWARE IV
The application executable is just 213 KB, and gives you the
option of a plaintext log file of the entries found on your
Registry and hard drives. Most of these entries can be removed
or disabled by the software.
FAST TRACK 75
IV ADWARE AND SPYWARE
SECURITY
76 FAST TRACK
SECURITY
ADWARE AND SPYWARE IV
The best feature of Spyware Doctor (and also the one you are
eventually asked to pay for) is the OnGuard feature. This is the
tray monitoring functionality of the software. It keeps itself up
to date with the latest spyware definitions with its very regular
Live Update feature.
The software also lets you undo any changes you made when
disabling or removing spyware, so that you do not inadvertent-
ly lose the host program’s functionality in the process. Spyware
Doctor features one of the fastest full-system scans.
FAST TRACK 77
IV ADWARE AND SPYWARE
SECURITY
What the program does is set “Rules” for the processes run-
ning on your computer, and alert you if changes are made to
these, or if any new processes are attempting to be opened. This
way, if any malicious application is trying to enter or start on
your computer, you will be shown an alert (from the system tray)
and will be prompted for the action to be taken—whether to
allow it or block it.
SSM may seem a little annoying at first, since when you open
any application on your computer, be it your browser or your
word processor, it will prompt you for an action. However, you
can disable whatever rules you like.
78 FAST TRACK
SECURITY
ADWARE AND SPYWARE IV
FAST TRACK 79
IV ADWARE AND SPYWARE
SECURITY
80 FAST TRACK
SECURITY
DATA SECURITY V
Data Security
FAST TRACK 81
V DATA SECURITY
SECURITY
82 FAST TRACK
SECURITY
DATA SECURITY V
Alas, such software are a dime a dozen, and where they lack is
in the following areas:
❍ If you forget your password, you have no way of recovering
your file. No password hints!
FAST TRACK 83
V DATA SECURITY
SECURITY
84 FAST TRACK
SECURITY
DATA SECURITY V
FAST TRACK 85
V DATA SECURITY
SECURITY
These are, again, a dime a dozen, but they’re not all bad.
Again, we’re making no recommendations, and are just provid-
ing an example: for $19.95 (Rs 900), you can purchase TK8 Safe,
a relatively simple software, from www.tk8.com/safe.asp .
86 FAST TRACK
SECURITY
DATA SECURITY V
FAST TRACK 87
V DATA SECURITY
SECURITY
88 FAST TRACK
SECURITY
DATA SECURITY V
Open Word. Then go to File > Open. In the “Files of type” list,
click “Recover Text from Any File”, locate a Word file, and click
Open. The document will open without any formatting. Look at
the information at the end of the document—you may see stuff
such as the name of the author and path of the document.
5.3.3 What To Do
The following are some steps you can take if you want to avoid
sending metadata.
❍ Go to Tools > Options, then click the Security tab. Select the
“Remove personal information from this file on save” checkbox
in the Privacy options area, and click OK. Then save the docu-
ment.
FAST TRACK 89
V DATA SECURITY
SECURITY
ThisDocument.RemovePersonalInformation = True
90 FAST TRACK
SECURITY
DATA SECURITY V
FAST TRACK 91
V DATA SECURITY
SECURITY
Word has some special Macro names that are run at certain
times. For example, a macro virus in AutoOpen would be run
when you open a document and would can copy itself when you
open another document. There are many other ways a macro
virus can spread from one document to another.
92 FAST TRACK
SECURITY
DATA SECURITY V
file. You should delete the file that is detected, but you’ll still
have to remove the macro virus that created this file.
If you don’t have Adobe Acrobat and don’t wish to pay too
much for PDF creation software, there are several applications
available. For example, for just $19.95 (Rs 900), you can
FAST TRACK 93
V DATA SECURITY
SECURITY
94 FAST TRACK
SECURITY
DATA SECURITY V
FAST TRACK 95
SECURITY
THE CLEAN INBOX VI
T here was a time when you’d eagerly open your Inbox for those
two or three messages you were expecting, and a couple of new
ones would actually surprise you. We’d never imagined at that time
that we’d one day get 1,569 mails when we clicked “Receive”. Read
on as we speak about spam in detail.
FAST TRACK 97
VI THE CLEAN INBOX
SECURITY
98 FAST TRACK
SECURITY
THE CLEAN INBOX VI
The idea of using this terminology for spam came about when
certain users on bulletin boards used to scroll other users’ text off
the screen by repeating the word “spam” over and over again. They
also used several references from the Monty Python scene to
achieve their purpose. This sparked off the use of the term “spam”
in the way that we know it today.
6.2 Phishing
Back to your Inbox: “Get a replica Rolex cheap.” “Increase your sex-
ual performance by triple!” “I’m a lonely housewife…” As you
scroll through one after the other ridiculous offer, your eye catch-
es something different.
FAST TRACK 99
VI THE CLEAN INBOX
SECURITY
and ask for your credit card details so you can reactivate your
account, or something of that nature.
Phishers’ lan-
guage also suffers
from bad gram-
mar and poor
vocabulary. You The PayPal fraud that Phishers commonly use
may often find
that some e-mails have lots of spelling mistakes, or are written
in terrible English. But even a perfectly well-written e-mail is no
guarantee of legitimacy. The PayPal phish also had an IP address
in the supplied links, which is a giveaway of the legitimacy of
the sender.
Here’s where Trojan Horses (see box Trojan Horses) come into
the picture. Through various ways (spam, spyware, etc.), phishers
install Trojans on unsuspecting home PC users. These computers
then become partly (or in some serious cases, wholly) controlled by
the phisher who uses the host computer’s e-mail client as a mes-
Trojan Horses
A Trojan Horse, or simply a Trojan (the name is derived from Greek mythology)
is a malicious program that disguises itself as something interesting, thereby
gaining the confidence of the user, who unsuspectingly then installs a piece of
malicious software on his computer. Trojans are generally disguised as free
screensavers and such, and they arouse the curiosity of those who they are sent
to (usually by e-mail). Once installed, the developer of the Trojan is able to gain
content from the machine(s) it has been installed on, which can then be used for
malicious purposes.
6.2.3.1 Keyloggers
One of the most common spying techniques, a keylogger, as the
name suggests, logs the keypresses of the user. Basically, it makes
a log of all the keys pressed on the user’s keyboard and transmits
this log to the phisher.
6.2.3.2 Screen-grabbing
The more enterprising of phishers capture personal data in the
form of screen grabs of the user’s desktop. Given that there are
already several attempts to block keyloggers by corporations and
home users alike, sophisticated phishers find this an effective way
of capturing confidential customer/user information. Phishers
also don’t need a grab of the entire screen for their purposes. In
order to keep the upload size of the data small, they only grab the
“relevant” sections of the screen wherein there is a disclosure of
confidential information.
2. E-mails with
embedded sub-
mission forms
are something
to avoid like
the plague.
Never fill out a Gmail allows users to report phishing attempts
form that has been sent in an e-mail unless you are absolutely sure
of its authenticity.
4. View the SSL certificate of the site in question. You can do this by
double-clicking on the lock icon.
6.3.1 Fighting It
Apart from standard spam filters, there are several downloadable
tools that can help you block phishing attempts. Phishing gener-
ally falls under the purview of spam, so if you are searching for a
phishing-only software, you’ll probably get a range of anti-spam
software that also block phishing.
6.3.2 Pharming
Like phishing, pharming is another attempt by hackers to divulge
personal information from you, and eventually, your money.
For example, the pharmer could divert your browser from the
original Gmail Web site, to a look-alike and then save your user-
name and password. This is a very simple example; there are
much further lengths that pharmers will go to get your private
information. The advantage that pharmers have over phishers is
that whereas phishers have to get their prey one by one, pharm-
ers can get a whole bunch of individuals at a time.
the “From” address. More often than not, with spammers using
randomly generated e-mail addresses, it is likely that the “From”
address will be a jumble of words.
❍ Check for disguised URLs in the body of the e-mail. If the URLs
are long and have several characters in them (for example,
www.hotmail.com-SECURITYCHECKrt6uw9ru>shwideoifj>
AccountMaintenance-dnif82jr-4md>gobargas.co.in) then the
links are probably fake.
ters are slipped under your door or into your mail tray. Only those
who have the key to the lock of the door (i.e. the private key) can
open the door and read the message.
PGP encrypts
messages sent
from your com-
puter to a desig-
nated recipient.
The private key
of the recipient
decrypts the
message, which
also contains the
“session key”,
that is, the key Hushmail offers free encrypted e-mail
for that particu-
lar mail session, to read the e-mail. In this way, PGP provides a very
high level of security.
to on your “keyring”, you can use your mail client to send it to that
location. If you don’t have the public key, you can ask the person
to mail it to you, or you can just search for it on the hundreds of
public key servers available online.
Once you have the key, you get onto your e-mail client, type in
your message and select “Encrypt” (or “Confidential”) from the
PGP menu. The program will ask you for your passphrase, and will
encrypt your message. For the receiver to read the message, he will
have to choose “Decrypt” (or “Verify”) from the PGP menu and
then, key in his passphrase.
6.5.3 Hushmail
An alternative to PGP is a service called Hushmail (www.hush-
mail.com). It is similar to standard free e-mail services. However,
Hushmail offers a high level of security given its encryption. The
best part about Hushmail is that you can use it from anywhere,
that is, like Gmail and the others, you can sign in from any com-
puter connected to the Internet. All you need to know is your pri-
vate/secret key.
Security On The
Network
If you plan to do it on your own make sure you follow the follow-
ing steps:
1. Update your virus/adware definitions and scan your entire
system.
2. If you have a software firewall, get the latest version. This
will be SP2-compatible.
3. Get hardware driver updates from the manufacturers of all
your hardware devices.
4. Back up all your software to CD/DVD.
5. Create a system restore point.
6. Restart your computer, disable anti-virus software and all
other software that are currently running, make sure you
are disconnected from the Internet, and only then access the
SP2 update.
7. Once SP2 is installed, reboot your system normally, let all the
background programs (including anti-virus programs) load,
and then connect to the Windows Update site for any fresh
updates. Install those as well and reboot.
8. Last but not least, find a Windows guru (there are many on
the Digit forum (http://www.thinkdigit.com/forum) who
will be quick to help) just in case something goes wrong.
Note that the “Simple” in Simple File Sharing refers to the ease
of use in file sharing, and does not mean that the file sharing is
technologically inferior to the advanced file sharing in XP
Professional. Simple File Sharing hides the complexity of manag-
ing users and permissions for newbies.
that is, users cannot change the contents of the file and save it
back to the shared folder. To allow network users to change the file
contents, check the box next to “Allow network users to change my
files”. This will make this folder accessible to whoever browses the
network for shared folders.
If you want to give a different name for the shared folder, type
in that name in the “Share Name:” field. For example, if your local
folder is called “My Music”, you might want to change the name to
“Family Music Centre”. To verify that the files have been shared, go
to My Network Places and look for the shared folder name, in our
case, “Family Music Centre”, under your computer name.
In the permis-
sions dialog box, the
default listing will
be for the
“Everyone” group.
This allows access to
anyone who con-
nects to this shared
folder.
XP Professional’s Advanced File Sharing
Select the
Everyone group and click Remove. Next click Add to select the
users who can access the folder. In the resulting “Select Users or
Groups” dialog box, click “Object Types”. This will open the
Object Types dialog box. Clear the checkboxes next to “Built-in
Security Principals and Groups”. Ensure
that the box next to Users is checked,
and click OK.
Pre-Installation Checklist
Installation
If possible, start the Wireless Network Setup Wizard on a comput-
er that is connected to a printer, so you can use the configuration
information printout to manually configure wireless devices that
do not support Windows Connect Now technology.
the box that says “Use WPA instead of WEP”. (If the Wizard has
been run before, you will asked “What do you want to do?”
Select “Set up a wireless network for a home or small office”,
and click Next.)
3. You will be asked how you want to set up your wireless net
work. Select to use the USB Flash drive option and click Next.
4. The Wizard will now ask you to plug in your USB drive. When
you insert the drive, it will be automatically detected, and the
drive letter assigned to the pen drive will be displayed.
Click Next.
5. The Wizard will copy all the necessary files to the USB drive,
and then display a page asking you to transfer the settings to
other computers and devices. Do not click Next at this time.
6. Take the USB drive and plug it into your Windows Connect
Now enabled Wireless Access Point. If your AP does not support
Windows Connect Now, skip this step. If there is a read-out
display, select the options to complete the configuration. If
there is a no read-out display, the indicator panel should have
a green LED that flashes three times when configuration is
complete. Some AP vendors use the LED indicators for other
purposes, so be sure to refer to the documentation. In any case,
leave the USB drive in for at least 30 to 60 seconds to ensure
that the network configuration is updated to the AP.
8. Plug the USB drive into your other wireless Windows XP SP2
computers, that is, other than the ones where you created the
wireless setup configuration. The Removable Disk dialog box
will open with various options; select “Wireless Network Setup
Wizard using the program provided on the device” and click
OK. (If the Removable Disk dialog box doesn’t start, open your
USB Drive from Windows Explorer, find the file setupSNK.exe,
and double-click it).
10. Follow the same procedure for all your other Windows XP SP2
computers.
11. Plug the USB drive back into the original computer (where you
created your wireless network configuration in Step 5). We had
left the screen at the “Transfer your network settings to your
other computers or devices” page. Click Next.
12. The setup Wizard will now display all the computers and
devices configured for wireless access. Click the Print
Network settings to print out the settings that were used to
configure the wireless network. Use this printout to
manually configure those devices that are not Windows
Connect Now capable. If you want to keep the wireless
settings on your USB drive for later use, clear the checkbox
next to “For security reasons, remove network settings from
my flash drive”, else remove the settings from your USB
drive by leaving the box checked. The latter is recommended
was scanned, what the results of the scan are, and what the
steps to correct the vulnerabilities are.
Going Online
A midst all this talk, there have been the good guys—anti-spyware
tools and such—and the bad guys: the spammers, the phishers,
and such. Each of these sides is constantly battling the other. With
all this action going on, where exactly do you and every other
average Joe Internet-user stand? What should you do before you take
that giant leap online? Read on…
Part of the problem is that some Web sites have content that
can only be viewed if you install additional software, which puts
your computer at further risk of attack. But before we go into how
you can effectively secure your browser, let’s take a look at what
features hackers are looking to exploit.
In the Privacy tab, you will find your computer’s settings for
cookies. Here’s an example of just how much control you can have:
if you are really paranoid, press the Advanced button and select
“Override automatic cookie handling”. Select Prompt in both
fields. This will give you an alert every time a Web site attempts to
place a cookie on your computer. You can then choose what you
want to do with the cookie.
Ideally, you
should disable IE
playing sounds
and video on your
browser as these
are potential vul-
nerabilities. Select
the Advanced tab,
scroll down to
Multimedia
Options, and dese-
lect the items of
your choice.
Disable multimedia
options on IE
Tools > Options. Now, as with IE, go to the Privacy tab. Here you
will find options for, among other things, Cookies. Under the
Cookies tab, it is recommended that you enable cookies only for
the originating site. It is also recommended to select the “unless
I have removed cookies set by the site” option, in which case a
Web site will get blacklisted from setting cookies on your com-
puter if you have removed them manually.
The next security area is the Content tab. Under this, select
the Block Popup Windows option, the function of which is self
explanatory. Also select the next option, that is, “Warn me when
Download different
file types on to your
computer first
In the Downloads tab, click the “View & Edit Options” button.
The Download Actions box that opens shows different file types
and the actions that Firefox will take when dealing with these file
types. For any file type, click the Change Action button. In the
Change Action box, select “Save them on my computer”. This is the
secure option, since when the files are opened from your comput-
er, your anti-virus will detect whether there is any hanky-panky or
not, if it hasn’t already when you visited the Web site.
8.1.4 Opera
The latest version of the Opera browser comes with added func-
tionalities and security measures. View the current options the
8.2 Firewalls
A firewall is based on a security policy—which can be customised
by the user—that permits or denies communications to and from
your PC. The difference between a firewall and an anti-virus is that
a firewall blocks access to your computer and the setting up pro-
grams there, while an anti-virus blocks different kinds of security
threats like virus installations and other malicious content where
the presence of physical outsider access is not necessary.
But why do you need a firewall when you already have an anti-
virus? Well, there are some functionalities that only a firewall can
provide. For example, a firewall protects your computer from the
threat of remote logins. Effective firewalls can block access to files
and applications on your computer that others may be trying to
access. Firewalls also protect against application backdoors: some
applications have features that allow remote access, and these act
as backdoors to your computer that hackers try and exploit.
8.2.2 Which
Firewall?
XP comes with an
inbuilt personal
firewall. The fire-
wall is enabled by
default. It can be
accessed through
the Security Center
in the Control
Panel. It is advis-
able to turn it on
and leave it on
while you are con-
nected to a net-
work.
firewalls you can use, which have more functionality than Windows’
inbuilt firewall. Some of the better ones are:
your computer directly from the Web site itself, and you remain
invisible to the site.
❍ Proxify
(www.proxify.com):
At first glance,
Proxify looks like a
covert militant site
for a terrorist outfit.
But Proxify offers
one of the most com-
prehensive, free Web
proxy service avail-
able today, with a
variety of options Proxify rules!
for users.
be shared over IM unless you are more than 100 per cent sure of
the trustworthiness of the receiver.
Safety On The Go
❍ The same goes for conferences and meetings. Keep your laptop
in view at all times. If you need to go out of the room, take it with
you, or ask a colleague to keep an eye on it.
❍ Use a pen drive to store your sensitive data. Of course, you need
to ensure that you also keep the pen drive safe!
❍ Use tracking software to have the laptop call home. While not
so easily available in India, tracking software enable one to track
● English uppercase (A to Z)
● English lowercase (a to z)
● Base 10 digits (0 to 9)
❍ Create a
dummy Administrator
Account. Under
Control Panel > User
Accounts, create an
account called
“Administrator” with
no privileges, and a 10+
digit password that
contains letters, num-
bers and non-alphanu-
Disabling display of last logged in user
meric characters, mak-
ing it next to impossible to guess or crack. Enable log on Auditing
so that you will know if somebody tries to access the account. To
enable Auditing, go to Local Security Policy, and under Local
Policies, select Audit Policy. In the right pane, open the setting
Audit Logon Events and check both the Success and Failure boxes.
You can review the Audit in Event Viewer (Start > Run >
eventvwr.msc)
To encrypt a folder
or file, right-click on it,
select Properties, click
Encrypt Sensitive Folders
on Advanced in the
General Tab, and check
“Encrypt contents to secure data”.
to connect to yours, and when you are done surfing, turn off the
Wi-Fi card.
The first, of course, is the SIM card PIN Code. You will normal-
ly be given a PIN code when you purchase your SIM card. Actually
you will be given four sets of codes when you purchase the phone:
PIN1, PIN2, PUK1, and PUK2.
Along with the above, you should also consider locking your
phone with a phone-specific security code. This will effectively
stop anyone from accessing the phone if they do not know the
code. Even if they switch off the phone, remove the SIM and
replace it with another, they will still be unable to access the
phone without the security code.
If the attacker is able to obtain the link keys and the address-
ing of two communicating devices, he can launch a man-in-the-
middle type of attack where all information is routed through the
attacker’s device.
9.3.2Avoiding It
Securing your Bluetooth phone is easy. Take these few simple steps
to ensure that your device is protected from Bluetooth attacks.
❍ Switch off Bluetooth when you are not using it. This will pre-
vent unauthorised access for the most part. Only enable Bluetooth
when you are actively transferring data from or to another device.
❍ Use a strong PIN code, one that is at least six to eight digits or
longer.
Further Resources
Let us first take a look at some Web sites that can help you know
what’s happening in the world of security and what action you
can take when something comes up on that front.
you may be using. On the left side of the page, you will find
links that take you to different sections such as information for
home security, news for IT professionals, and much more.
When you click on “Home Users”, for instance, you will be
taken to a page that has information and tips pertaining to
home security.
CERT
www.cert.org
CERT is a project maintained by Carnegie Mellon University to
study Internet security vulnerabilities, research long-term
changes in networked systems, and develop information to
improve IT security. Look for two sections called “Security
Alerts” and “Current Activity”, which provide information on
security threats and particular trends. Most of the news here is
aimed at people at the level of system administrator, but some
of them it can be used by home users as well. If you wish to
know what’s happening in IT security, this is a good site to visit.
There are even statistics pertaining to virus / worm infections
and vulnerabilities.
CERT has separate Web sites and working teams for different
geographic areas, including India.
NASSCOM
www.nasscom.in
The Web site of NASSCOM (National Association of Software and
Services Companies) contains information on several aspects of IT
and outsourcing in the Indian context. There is a section dedicat-
ed to security and cyber offences under the “Resource Center”
link. Click on “Be-Secure Newsline” under the Resource Center
link on the homepage. There isn’t a whole lot of content, but it’s
got to do with the scenario in India.
CERT-In
www.cert-in.org.in
ITsecurity.com
www.itsecurity.com
Secunia
http://secunia.com
Secunia is a Danish computer security service provider. They are
best known for tracking vulnerabilities in software and operating
systems. Secunia, on its site, says it monitors vulnerabilities in
You'll need to check out the page to see the sheer amount of
useful information there. And most of what you need to know is
right there on the index page - highlights, and the latest advi-
sories. The “highlights” section is usually one of the first places on
the Web where critical security information crops up on the Web.
Sophos
www.sophos.com
Sophos is a security firm that makes anti-virus software and such.
But their Web site holds more than just information about their
products - the latest security threats are listed, as are the latest
“news, events and awards.” There's a “hot topic” on the index page,
Kaspersky Lab
www.kaspersky.com
The “viruslist” on this site calls itself the “largest encyclopedia
of malware.” There's a “virus watch” section, where, like at
some of the other sites we've mentioned, you can find a list of
the latest viruses. Another must-visit for those concerned about
security, partly because at Kaspersky Linux Security, you can
find anti-virus and anti-spam products for protecting your
Linux systems.
SecurityFocus
www.securityfocus.com
SecurityFocus is probably the most comprehensive and trusted
source of security information on the Internet. It is a vendor-neu-
tral site that provides objective, timely and comprehensive securi-
ty information to “all members of the security community, from
end users, security hobbyists and network administrators to secu-
rity consultants, IT Managers, CIOs and CSOs.”
Housecall
http://housecall.trendmicro.com
This service from Trend Micro is one of the oldest and most well-
known online scanning services.
BitDefender
www.bitdefender.com/scan8/ie.html
From the site, “BitDefender Online Scanner is a fully-functional
anti-virus product. It features all required elements for thorough
anti-virus scanning and effective cleaning: it scans your system’s
memory, all files, folders and drives’ boot sectors, providing you
with the option to automatically clean the infected files.”
PC-Pitstop
www.pcpitstop.com/antivirus/ AVLoad.asp
Pcpitstop.com offers a variety of tests besides an anti-virus scan—
Internet speed, privacy scan, spyware scan, a “quick scan,”
“Exterminate”, driver scan, disk health, and more.
Jotti.org
http://virusscan.jotti.org
You can submit a file here for an anti-virus test. Useful if you’ve
received a file from someone and you don’t have an anti-virus (or
one that’s not updated.)
Windowsecurity.com
www.windowsecurity.com/trojanscan
McAfee
http://us.mcafee.com/root/mfs/ default.asp
This is an online anti virus scanning service from well-known anti-
virus maker McAfee.
10.3 Forums
Online forums exist on almost every topic conceivable, security
included. To know from people who are more experienced than
You can get help on almost any security-related issue at many forums entirely
dedicated to the topic
you are, you can join a forum and observe what’s going on. You
can post your queries and have them answered—and gradually
start replying to other’s questions if you know the subject well
enough. Don’t post frivolous questions: you could end up irritat-
ing some people—watch the forum for a while to gauge the level of
the discussions, and look at older threads as well. You will need to
register to get access to topic threads in the forums.
http://computing.net/security/wwwboard/wwwboard.html
www.security-forums.com
www.castlecops.com/c2-Security.html
http://forums.techguy.org/54-security
Notes
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
Notes
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
Notes
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
Notes
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
Notes
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................
.....................................................................................................................................