Showing posts with label Firewall. Show all posts
Showing posts with label Firewall. Show all posts

Friday, January 9, 2009

10 Steps To A Safe, Smooth Running PC

10 Steps To A Safe, Smooth Running PC By Michael A Silva

These ten steps will help you increase your computer's security. From discovering viruses to learning how to avoid them, this article is a must read!

Windows password This is the easiest way to make sure you know who is using your pc. Choose a lengthy password that contains capital and lower case letters. Including a number or two will greatly increase your security. Having a Windows password means that the only people that can log onto a Windows session are people that you have granted access to.

Password manager You should never write your passwords down. Using the same password all the time will also make it very easy for hackers to reach your personal information. So if you can’t write it down and you’re not
supposed to use the same one – how are you supposed to keep track of all of your passwords? The easiest way to do this is to use a password manager. We prefer to use Roboform. Roboform is an easy to use password and profile manager that docks neatly into your Internet Explorer toolbar and keeps track of all of your passwords for you. Roboform also uses a master password system. You will have one password that accesses all of the passwords in the program. This way you can keep all of your information safe and secure. You can download Roboform for free by http://www.roboform.com.

Spyware Remover Next to spam, spyware is the internet’s biggest annoyance. By definition, spyware is “any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Once installed, the spyware
monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers.” The amount of spyware that exists on your pc is dependent on the amount of internet surfing you do. A good rule of thumb here is to scan for spyware once per week or whenever poor system performance surfaces. If you don’t have a spyware scanner, we recommend http://www.webroot.com.

Antivirus This should go without saying, but if your computer is connected to the internet you need antivirus software. With weekly scans and program updates you should be protected from most threats. For added protection, we
recommend using more than one anvtivirus scanner.

Firewall A firewall will keep unwanted visitors out of your computer. You can obtain a firewall either by using software application like ZoneAlarm or Black Ice Defender, or by using a router with your internet connection. For more information on routers plese visit http://www.Linksys.com.

File sharing Basically, file sharing programs are the single biggest security risk you will come across. This is because the only facts you have about the files you are downloading are the file name and the file size. It is quite simple to change a filename to dupe someone into downloading a virus or other malware like keystroke recorders. Our advice – stay away from file sharing at all costs. If you need to use it, make sure you have updated antivirus software installed and running.

Research In a sentence – know what’s out there. http://www.Symantec.com has a section on their website that will serve you well. Knowing what types of viruses exist and how to avoid them will make you a much smarter internet user.

Email protection Most of the antivirus applications available offer email scanning. If yours does not, you will want to get one that does. Email scanning will make sure all of your incoming and outgoing emails are safe for both you and the recipient. Email viruses spread very quickly by using your address book to propagate. Never read email from people you don’t know and always make sure your email scanner is active.

Network security Another way that viruses spread is through computer networks. We have a few quick tips to keep your network safe. Always scan any files that come in from other computers. Even if it’s a file you have brought from home. Never allow a file to be placed on your network until it
has been scanned. The main server should be the only computer with file sharing enabled. By not allowing computer users to transmit files, you can quickly neutralize a threat.

Maintenance Performing weekly virus and spyware scans will go a long way to keeping your computer safe. Defragmenting weekly will also greatly improve performance. If you put in the effort, you will be rewarded with a safe and smooth running pc. Not to mention less headaches!

By following these ten guide lines, you will greatly improve the performance of your computer. You will also generate peace of mind as you gain a new sense of security.

------------------

For more information on affordable hosting packages, website builder software, dedicated and shared server packages, website design and promotion services and specialized fund raising and campaign websites please visit us at http://www.ipowereurope.com

Saturday, January 3, 2009

About Botnet

BotNet, also called zombie network and network of bots is a group of computers which are used to discreetly send data like spam and viruses to other computers on the internet. These actions are carried out by malicious programs without the knowledge of the users. These malicious programs mainly consist of viruses, Trojans and worms. Infected computers are called bots or zombies. Most computers which are infected are personal home internet PCs which are inadequately protected.

When a PC becomes part of a BotNet, it can be instructed to do almost anything by the creator of botnet. In effect it becomes a drone which cannot resist the commands of its master. In this case, the master is the creator of the malicious software (malware). Most Bots are employed in propagation of spam and viruses. Often malware is used for key-press logging which can result in mass identity theft. Zombie computers can also be used for denial of service attacks in which many bots simultaneously log onto a particular server, thus exceeding the server's bandwidth and crashing it. This technique is particularly effective when the Botnet is large and contains thousands of computers. Many advanced malware can even spread themselves via email while the malware of smaller botnets lack this capability.

BotNets are programmed in such a way that they are difficult to find and analyze. Normally they receive instructions from their creators through IRC (Internet Relay Channels). As of April 2008, the Storm BotNet and the Kraken BotNet are the largest BotNets in the world with an estimated 400,000 bots. Other significant BotNets are Rbot and Bobax with an estimated 20,000 bots each.

So on a day to basis, the best way to protect your computer properly is to frequently scan and update your antivirus and firewall software. Special sensors called 'honeynets' have also been set up on the internet these nets mimic the characteristics of computers with known security flaws in an effort to lure hackers into them and track down malware creators. It has been recently quoted by Kaspersky Labs (creators of Kaspersky anti-virus) that botnets pose more of a threat to the internet community than individual viruses and worms.

About Botnet

BotNet, also called zombie network and network of bots is a group of computers which are used to discreetly send data like spam and viruses to other computers on the internet. These actions are carried out by malicious programs without the knowledge of the users. These malicious programs mainly consist of viruses, Trojans and worms. Infected computers are called bots or zombies. Most computers which are infected are personal home internet PCs which are inadequately protected.

When a PC becomes part of a BotNet, it can be instructed to do almost anything by the creator of botnet. In effect it becomes a drone which cannot resist the commands of its master. In this case, the master is the creator of the malicious software (malware). Most Bots are employed in propagation of spam and viruses. Often malware is used for key-press logging which can result in mass identity theft. Zombie computers can also be used for denial of service attacks in which many bots simultaneously log onto a particular server, thus exceeding the server's bandwidth and crashing it. This technique is particularly effective when the Botnet is large and contains thousands of computers. Many advanced malware can even spread themselves via email while the malware of smaller botnets lack this capability.

BotNets are programmed in such a way that they are difficult to find and analyze. Normally they receive instructions from their creators through IRC (Internet Relay Channels). As of April 2008, the Storm BotNet and the Kraken BotNet are the largest BotNets in the world with an estimated 400,000 bots. Other significant BotNets are Rbot and Bobax with an estimated 20,000 bots each.

So on a day to basis, the best way to protect your computer properly is to frequently scan and update your antivirus and firewall software. Special sensors called 'honeynets' have also been set up on the internet these nets mimic the characteristics of computers with known security flaws in an effort to lure hackers into them and track down malware creators. It has been recently quoted by Kaspersky Labs (creators of Kaspersky anti-virus) that botnets pose more of a threat to the internet community than individual viruses and worms.

Sunday, December 28, 2008

Web Servers and Firewall Zones

Web and FTP Servers

Every network that has an internet connection is at risk of being compromised. Whilst there are several steps that you can take to secure your LAN, the only real solution is to close your LAN to incoming traffic, and restrict outgoing traffic.

However some services such as web or FTP servers require incoming connections. If you require these services you will need to consider whether it is essential that these servers are part of the LAN, or whether they can be placed in a physically separate network known as a DMZ (or demilitarised zone if you prefer its proper name). Ideally all servers in the DMZ will be stand alone servers, with unique logons and passwords for each server. If you require a backup server for machines within the DMZ then you should acquire a dedicated machine and keep the backup solution separate from the LAN backup solution.

The DMZ will come directly off the firewall, which means that there are two routes in and out of the DMZ, traffic to and from the internet, and traffic to and from the LAN. Traffic between the DMZ and your LAN would be treated totally separately to traffic between your DMZ and the Internet. Incoming traffic from the internet would be routed directly to your DMZ.
Therefore if any hacker where to compromise a machine within the DMZ, then the only network they would have access to would be the DMZ. The hacker would have little or no access to the LAN. It would also be the case that any virus infection or other security compromise within the LAN would not be able to migrate to the DMZ.

In order for the DMZ to be effective, you will have to keep the traffic between the LAN and the DMZ to a minimum. In the majority of cases, the only traffic required between the LAN and the DMZ is FTP. If you do not have physical access to the servers, you will also need some sort of remote management protocol such as terminal services or VNC.

Database servers

If your web servers require access to a database server, then you will need to consider where to place your database. The most secure place to locate a database server is to create yet another physically separate network called the secure zone, and to place the database server there.
The Secure zone is also a physically separate network connected directly to the firewall. The Secure zone is by definition the most secure place on the network. The only access to or from the secure zone would be the database connection from the DMZ (and LAN if required).



Exceptions to the rule

The dilemma faced by network engineers is where to put the email server. It requires SMTP connection to the internet, yet it also requires domain access from the LAN. If you where to place this server in the DMZ, the domain traffic would compromise the integrity of the DMZ, making it simply an extension of the LAN. Therefore in our opinion, the only place you can put an email server is on the LAN and allow SMTP traffic into this server. However we would recommend against allowing any form of HTTP access into this server. If your users require access to their mail from outside the network, it would be far more secure to look at some form of VPN solution. (with the firewall handling the VPN connections. LAN based VPN servers allow the VPN traffic onto the network before it is authenticated, which is never a good thing.)

Saturday, December 27, 2008

Securing Your Network And Your Career With Cisco's CCSP Certification

You don't need me to tell you that security is the #1 concern in today's networks. With that in mind, your career path must include some security certifications, or you will be left behind.

Cisco's Cisco Certified Security Professional (CCSP) certification demands a candidate be well-rounded and well-versed in Cisco security measures. Besides the difficultly we've all come to expect from a Cisco exam, this five-exam path covers every major aspect of network security (from Cisco's viewpoint, anyway!)

You must hold a valid CCNA certification to earn your CCSP.
Typically, the first exam CCSP candidates take is Securing Networks With Cisco Routers An Switches (SNRS), followed by Securing Cisco Network Devices (SND). After you've nailed these two exams, which obviously focus on devices more familiar to CCNAs and CCNPs, you'll be faced with three exams that are more specific to Cisco security devices.

Your PIX knowledge will be tested with the Securing Networks With PIX and ASA (SNPA) exam, followed by the Implementing Cisco Intrusion Prevention System (IPS) exam.

In October 2005, the final exam is scheduled to change from a VPN exam (CSVPN, Cisco Secure Virtual Private Networks) to Securing Hosts Using Cisco Security Agent (HIPS). If you're just getting started on the CCSP track, you'll be taking the HIPS exam. (Insert your own joke here.)

The CCSP is valid for three years; to recertify, you'll need to pass the 642-541 CSI exam or any CCIE written exam. As always, this is subject to change, and you should bookmark Cisco's Learning page (found off the main Cisco webpage) to make sure you're aware of the latest changes to Cisco certification and recertification requirements.

Not only must you know how to secure your network, you also need to secure your current job and the possibilities for your future. By pursuing and obtaining the CCSP, you will do all three at once.

Friday, December 26, 2008

How To Earn Cisco’s Firewall Specialist Certification

Security is a hot topic in today's networks, and will continue to be for a long time to come. With that in mind, you must consider adding a Cisco security certification to your resume and firewall skills to your skill set.

It's quite a jump from the CCNA to the CCSP (Cisco Certified Security Professional), and Cisco has made that leap more manageable by adding Specialist certifications. These certifications can give quite a boost to both your resume and your skill set, and act as a great "stepping stone" to the CCSP.

At present, Cisco offers four VPN/Security certifications, those being Cisco Firewall Specialist, Cisco IPS Specialist, Cisco VPN Specialist, and Cisco VPN/Security Sales Specialist. Since every WAN engineer has contact with Cisco firewalls on a regular basis, we'll take a closer look at this popular certification first. (And those who want to be WAN engineers had better learn something about firewalls, too!)

At the writing of this article (October 21, 2005), Cisco is offering an option for each of the two exams you'll need to pass to earn this certification. For the first exam, you can take either the 642-551 SND (Securing Cisco Network Devices) or 642-501 SECUR (Securing Cisco IOS Networks). The final day to register for the SECUR exam is December 19, 2005.

For either, you'll need to be able to answer questions regarding the proper use of Cisco security devices; how to configure security on a Cisco switch and on a router, including syslog logging, AAA, ACLs, and security for router services and interfaces.

The choices for the second exam are the 642-522 SNPA (Securing Network with PIX and ASA) and 642-521 CSPFA. Topics for these exams include , IPSec, NAT, firewalls, AAA, and policy mapping. (As always, you should check for the latest exam blueprints at Cisco's website. Click "Learning And Events" on the main page, www.cisco.com).

The only prerequisite for this certification is that you must hold a valid CCNA certification.

As always, getting some hands-on experience is the best way to prepare for your Cisco exams. (Your employer is going to get a little upset if you practice your configs on his or her PIX. It would be a good idea to have a good lawyer, too.) There are online rack rental services that include Cisco security devices in their pods.

Cisco certifications are a great way to help protect your career as well as your network. The more you know, and the more varied your skills, the more valuable you are to your present and future employers. Use your CCNA as a foundation, and keep building on your skills!

Tuesday, December 23, 2008

5 Steps to Securing Your Windows XP Home Computer

Most people are aware that there are continuous security issues with Microsoft’s Windows operating system and other programs. However, what most people do not realize is how easy it is to significantly improve your computer’s security and reduce the likelihood of becoming a victim to ever increasingly sophisticated threats that lurk on the internet. These steps should take less than a couple of hours to complete and should not clean out your wallet.

1) Windows Update – the first crucial step you need to take to make sure that all your Microsoft applications have all the latest product updates installed. These updates or “patches” address security vulnerabilities and other issues. Microsoft usually issues these updates on a monthly cycle. Visit the Microsoft website or switch on automatic updates from the Windows Control panel. Even if your “new” computer is second hand this is still a critical first step. If you buy a used computer with Windows XP make sure Service Pack 2 or SP2 is installed.

2) Strong Passwords - people often overlook this but having well thought through passwords is an important element of your computer security. A strong password should include at least 8 characters with a mixture of text, symbols and numbers. As a minimum you need to make sure the services most at risk have a strong log-in password. These services include your bank, credit card, other financial services like PayPal, your email address and any other services like Ebay which hackers can use to generate profit.

3) Anti Virus Protection – while it is fair to say the threat of the computer virus has receded during the last couple of years they can still inflict serious damage on your computer. Part of the reason why the threat has reduced is because PC manufactures are now more frequently bundling anti virus packages with their new computers. For example last year my new Dell shipped with a 90-day trial of McAfee's Internet Security Suite. The best bet here is to purchase a security package which includes firewall and anti virus software as a minimum. Top brands include McAfee and Symantec Norton products. However, Microsoft has recently entered the market with their "OneCare" offering which is very aggressively priced.

4) Firewall - if you are using a broadband connection then a firewall is definite requirement to manage the traffic flowing between your computer and the internet. A firewall monitors the inbound internet traffic passing through the ports of your computer. Better products also monitor outbound traffic from your computer to the internet. As per above the best bet here is buy a firewall application as part of a security package which most vendors offer as standard. If a hardware firewall is included as part of your router package then you do not need anything else. A company called Zone Labs offer a great free firewall product called Zone Alarm which should be used as a minimum. Windows XP does now ship with a free firewall but the product does not monitor outbound communication and therefore I believe does not offer adequate protection.

5) Anti Spyware Tool - this software is the last piece in your basic internet security set up. This tool helps combat spyware and adware. There is a good mixture of free and paid versions on offer. Good free software include Microsoft's Windows Defender, Spybot S&D or Ewido Anti-Malware. Ewido Anti-Malware is frequently recommended in computer help forums. Be careful if you decide to purchase a solution. There are a number of rogue vendors out there which aggressively push products which offer you little value. Stick to trusted names like Webroot's Spy Sweeper or PC Tool's Spyware Doctor. These products always come out well on independent tests.