Showing posts with label internet. Show all posts
Showing posts with label internet. Show all posts

Wednesday, January 7, 2009

Call Centers - A Backgrounder

The call center business has become one of the fastest booming industries today. In the era of customer-oriented services, the provision for accessible support is now a priority. With many companies trying to cope up with their customers’ needs and demands, the concept of the call center was born.

A call center normally operates with all its agents (or customer service representatives) in one central location. It is equipped to handle a large amount of transactions between customers and the call center agents. Transactions may be carried out through a variety of media. The telephone is the foremost form of communication in call centers today. However, transactions are also carried out via email and the live chat through the Internet.

Call centers offer a wide range of services. The first thought that comes to mind for many is support - product information, technical support, and all sorts of after sales services. However, call centers can offer more than that. They also deal with marketing and sales. Telemarketing is an aggressive form of selling your product and can yield very good results. Call centers cater to businesses which aim to increase their sales as well as provide customer services. One example would be credit card companies.

While aiming to provide information and assistance to customers, they can also increase their revenue through sales spiels given by their agents. Another service that can be dealt with by a call center is debt collection. Credit bureaus also make use of call centers to provide information on a person’s credit rating. In effect, basically anything that has to do with your customers can be done through call centers.

What is the typical set up in a call center? The term call center brings up images of wide open work spaces, with small workstations containing a computer, headset, and telephone dialer. The practice is increasingly turning to the linking of data and voice in one pathway. This integration makes for more efficient work practices and is called Computer Telephony Integration (CTI). Individual agents are normally managed by a floor supervisor who also takes calls when the need arises.

Setting up a call center requires certain technology to be applied. There is a wide range of available technologies for call centers today. More often than not, different types of technologies are combined in order to achieve the most effective and efficient set up. The Computer Telephony Integration has already been mentioned is one of the trends in the business today. In fact, CTI is used to combine most applications used in call centers - voice, email, fax, and web. CTI provides many functions such as caller ID, on screen dialing, on screen phone controls (conference calls, hang up, hold, etc.), and agent status control (whether agent is available for calls or not).

With all these advances in technology and developments in consumer-oriented practices, the call center has emerged as an ideal solution for many companies. The call center provides standardized service to customers and helps cut the cost. In addition to that, the separate entity of the call center subtracts from the actual operational considerations of the company.

Saturday, January 3, 2009

An Introduction to Internet TV

You use the Internet and, of course, you watch television, but have you ever tried Internet television?

Most people are unaware of one of the more recent developments in interactive Internet use. This new technology brings all the benefits of the Internet and television together to create your own personalised viewing experience. In simple terms Internet television means that you can watch TV straight from your laptop or desktop PC.

Internet TV allows you to you maximize the use of your computer and your Internet connection. I expect you have probably thought that there must be more you could do with your personal computer or laptop. You know that typing the occasional letter, transferring your MP3 collection to your iPod or playing the odd game or two online is hardly making use of its full potential. Now you can explore a trusted method of entertainment with access to unlimited viewing and you don't even have to stop your usual computer activities.

If you are someone who can’t get enough of watching programs on television, think about how Internet television will open up new options for free viewing. You can catch up with current news stories, watch real time sports action, keep up to date with stock market movements or enjoy a little light comedy. You are provided with a wide variety of entertainment possibilities that continues to grow, gaining in popularity every day.

At the time of writing, FIFA World Cup 2006 is just around the corner and, for many, Internet TV will provide access to free live football streams. Viewers will be able to keep up with the latest action from all the international football games involving teams including Brazil, Argentina, France, England and many more. Japan's third largest TV broadcaster, Tokyo Broadcasting System, has recently announced plans to air World Cup programmes over the Internet and on mobile phones.

If you use the Internet for any kind of research (even if it's only helping the kids with their homework), you no longer have to view what you find in the usual format of text and pictures. Now you can see this information through streams of live or pre-recorded video enabling you to see details that simply wouldn't be visible in a series of pictures.


5 Features of Internet Television:

1. Stations are available internationally. Currently over 150 countries have Internet access so you can rest assured that your country has at least one Internet TV station you can watch.

2. No additional hardware is required. In the past, watching television on your computer would require the fitting of a PC TV card but this is no longer necessary. Improvements in the telecommunications industry have made broadband connections more widely available and cheaper than ever before allowing more and more people to view high quality streaming media on their computer.

3. Anyone with an Internet connection can watch. A minimum connection speed of 56K is recommended and watching at this speed should give you a reasonable picture. Higher connection speeds will improve the picture quality (dependant on the server capabilities) and the fastest connections can enable you to view programmes in DVD quality.

4. New channels are added all the time. Major players in the Internet industry have recently started showing significant interest in this rapidly expanding market. Google is developing Google TV and has signed up American channel UPN and is in talks with the BBC in the UK to provide content. AOL is launching IN2TV which will show thousands of hours of programmes from Warner Brothers across 6 different channels and Yahoo has plans to show Internet TV in Japan which could lead to a worldwide service if successful.

5. Personalize your experience. Normal televisions have fixed channels which depend on the local stations or the cable operators. Internet television gives you the opportunity to bookmark your favorite stations so you can get back to them quickly without having to flick through everything else available. There is usually the option of viewing in either full screen mode or in a smaller window enabling you to get on with other things on your computer while watching.

You too can enjoy all the benefits of Internet television. The world really is at your fingertips now you have discovered this new, hassle-free way of watching TV.

Virtual Private Network in Banking

How does Virtual Private Network service work in banking?
Whenever you use the internet through an Internet Service Provider (ISP) or at another site, your computer is given an address on that provider's network. While you can reach your bank from the Internet, you will normally be denied access to services that are restricted to bank network addresses because your computer is using an address from an external network.

But, if you are on the internet, you can still connect to the Bank’s VPN service, in two ways. From a web browser or with a software VPN client. A VPN need not have explicit security features, such as authentication or content encryption. Virtual Private Network setup, can be used to separate traffic of different user communities over an underlying network with strong security features.

Seek secured private connectivity across public IP networks!

Extends geographical connectivity
Improves productivity
Improves security
Reduce transit time and transportation costs for remote users
Reduce operational costs versus traditional WAN
Simplify network topology
Provides global networking opportunities
Provides broadband networking compatibility
Provides faster ROI than traditional WAN
Provides telecommuter support

VPN are categorised into two types:
• Remote access VPN
• Site to site VPN

What is site to site Virtual Private Network in banking?
Such Site to site VPN allows you to have a secured connection between locations across the open internet. With the help if site to site VPN your bank can save a great deal of money, as you can use cheaper means always – on connections such as domestic broadband rather than expensive leased lines between sites.

What about Remote access VPN?
Remote access VPN also known as Virtual Private Dial up(VPDN) is used by banks who have staff regularly working in locations outside the office. You can connect into the office network over dial up phone/isdn lines or over broadband from anywhere.

Virtual Private Network banking uses advanced encryption and tunneling to permit computers to establish secure, end-to-end, private network connections over insecure networks, such as the Internet or wireless networks. VPN services can impact your overall computing and network performance. VPNs exist to protect traffic on public data networks like the Internet. VPN Services will work with other ISP dialup services too. Try your online route for your VPN.

Thursday, January 1, 2009

Recovering Internet Explorer Passwords: Theory and Practice

Recovering Internet Explorer Passwords: Theory and Practice


1. Introduction
2. Types of passwords stored in Internet Explorer
2.1. Internet Credentials
2.2. AutoComplete data
2.3. AutoComplete passwords
2.4. FTP passwords
2.5. Synchronization passwords
2.6. Identities passwords
2.7. AutoForms data
2.8. Content Advisor password
3. Brief overview of Internet Explorer password recovery programs
4. PIEPR - the first acquaintance
5. Three real-life examples
5.1. Recovering current user's FTP passwords
5.2. Recovering website passwords from unloadable operating system
5.3. Recovering uncommonly stored passwords
6. Conclusion



1. Introduction
Nobody will likely dispute the fact that Internet Explorer is today's most popular Web browser. According to the statistics, approximately 70% of online users prefer to use just this program. Arguments about its pros and cons may last forever; still, this browser is the leader of its industry, and this is a fact that requires no proof. Internet Explorer carries several built-in technologies, designed to make average user's life easier. One of them - IntelliSense - is made for taking care of the routine tasks, like the automatic completion of visited webpage addresses, automatic filling of form fields, users' passwords, etc.

Many of today's websites require registration, which means, user would have to enter user name and password. If you use more than a dozen of such websites, you will likely need a password manager. All modern browsers have a built-in password manager in their arsenal, and Internet Explorer is not an odd. Indeed, why would one have to remember yet another password if it is going to be forgotten some time soon anyway? Much easier would be to have browser do the routine work of remembering and storing passwords for you. It's convenient and comfortable.

This would be a totally perfect solution; however, if your Windows operating system crashed or reinstalled not the way it's supposed to be reinstalled, you can easily lose the entire list of your precious passwords. That's the toll for the comfort and convenience. It's good just about every website has a saving 'I forgot password' button. However, this button will not always take your headache from you.

Each software developer solves the forgotten password recovery problem their own way. Some of them officially recommend copying a couple of important files to another folder, while other send all registered users a special utility that allows managing the migration of private data, and the third ones pretend they are not seeing the problem. Nevertheless, the demand creates the offer, and password recovery programs are currently on a great demand.

In this article, let's try to classify types of private data stored in Internet Explorer, look at programs for the recovery of the data, and study real-life examples of recovering lost Internet passwords.



2. Types of passwords stored in Internet Explorer
- Internet Explorer may store the following types of passwords:
- Internet Credentials
- AutoComplete Data
- AutoComplete Passwords
- FTP Passwords
- Synchronization Passwords for cached websites
- Identities Passwords
- AutoForms Data
- Content Advisor Password
Let's take a closer look at each listed item.



2.1. Internet Credentials for websites
Internet credentials mean user's logins and passwords required for accessing certain websites, which are processed by the wininet.dll library. For example, when you try to enter the protected area of a website, you may see the following user name and password prompt (fig.1 http://www.passcape.com/images/ie01.png).

If the option 'Remember my password' is selected in that prompt, the user credentials will be saved to your local computer. The older versions of Windows 9a stored that data in user's PWL file; Windows 2000 and newer store it in the Protected Storage.


2.2. AutoComplete Data
AutoComplete data (passwords will be covered further) are also stored in the Protected Storage and appear as lists of HTML form field names and the corresponding user data. For example, if an HTML page contains an e-mail address entry dialog: once user has entered his e-mail address, the Protected Storage will have the HTML field name, the address value, and the time the record was last accessed.

The HTML page title and website address are not stored. Is that good or bad? It's difficult to determine; more likely to be good than bad. Here are the obvious pros: it saves free space and speeds up browser's performance. If you think the last note is insignificant, try to imagine how you would have to perform several extra checkups in a multi-thousand (this is not as rare as it may seem to be) auto-fill list.

Another obvious plus is that data for identical by name (and often by subject) HTML form fields will be stored in the same place, and the common data will be used for the automatic filling of such pages. We will see this by this example. If one HTML page contains an auto-fill field with the name 'email', and user entered his e-mail address in that field, IE will put in the storage, roughly, 'email=my@email.com'. From now on, if the user opens another website, which has a page with the same field name 'email', the user will be suggested to auto-fill it with the value that he entered on the first page (my@email.com). Thus, the browser somewhat discovers AI capabilities within itself.

The major drawback of this data storage method comes out of its advantage that we just described. Imagine, user has entered auto-fill data on a webpage. If someone knows the HTML form field name, that person can create his own simplest HTML page with the same field name and open it from a local disk. To uncover the data entered in this field, such person will not even have to connect to the Internet and open the original WWW address.



2.3. AutoComplete Passwords
In the case with passwords data, however, as you might have guessed, the data will not be filled in automatically. Since auto-complete passwords are stored along with the Web page name, and each password is bound to only one specific HTML page.

In the new version, Internet Explorer 7, both AutoComplete passwords and data are encrypted completely different; the new encryption method is free from the shortcoming just described (if that can be classified as a shortcoming.)

It is worth noticing that Internet Explorer allows users to manage auto-fill parameters manually, through the options menu (fig.2 http://www.passcape.com/images/ie02.png).



2.4. FTP passwords
FTP site passwords are stored pretty much the same way. It would be relevant to notice that beginning with Windows XP FTP passwords are additionally encrypted with DPAPI. This encryption method uses logon password. Naturally, this makes it much more difficult to recover such lost passwords manually, since now one would need to have the user's Master Key, SID and the account password.

Starting with Microsoft Windows 2000, the operating system began to provide a Data Protection Application-Programming Interface (DPAPI) API. This is simply a pair of function calls that provide OS-level data protection services to user and system processes. By OS-level, we mean a service that is provided by the operating system itself and does not require any additional libraries. By data protection, we mean a service that provides confidentiality of data through encryption. Since the data protection is part of the OS, every application can now secure data without needing any specific cryptographic code other than the necessary function calls to DPAPI. These calls are two simple functions with various options to modify DPAPI behavior. Overall, DPAPI is a very easy-to-use service that will benefit developers that must provide protection for sensitive application data, such as passwords and private keys.
DPAPI is a password-based data protection service: it requires a password to provide protection. The drawback, of course, is that all protection provided by DPAPI rests on the password provided. This is offset by DPAPI using proven cryptographic routines, specifically the strong Triple-DES and AES algorithms, and strong keys, which we'll cover in more detail later. Since DPAPI is focused on providing protection for users and requires a password to provide this protection, it logically uses the user's logon password for protection.
DPAPI is not responsible for storing the confidential information it protects. It is only responsible for encrypting and decrypting data for programs that call it, such as Windows Credential manager, the Private Key storage mechanism, or any third-party programs.
Please refer to Microsoft Web site for more information.



2.5. Synchronization Passwords for cached websites
Synchronization passwords free user from having to enter passwords for cached websites (sites set to be available offline.) Passwords of this type are also stored in IE's Protected Storage.



2.6. Identities passwords
So are identities passwords. The identity-based access management mechanism is not widespread in Microsoft's products, except, perhaps, Outlook Express.


2.7. AutoForms Data
A special paragraph must cover the form auto-fill method, which constitutes a hybrid way of storing data. This method stores the actual data in the Protected Storage, and the URL, which the data belong to, is stored in user's registry. The URL written in the registry is stored not as plaintext - it is stored as hash. Here is the algorithm for reading form auto-fill data in IE 4 - 6:

===8<===========Begin of original text===========
//Get autoform password by given URL
BOOL CAutoformDecrypter::LoadPasswords(LPCTSTR cszUrl, CStringArray *saPasswords)
{
assert(cszUrl && saPasswords);

saPasswords->RemoveAll();

//Check if autoform passwords are present in registry
if ( EntryPresent(cszUrl) )
{
//Read PStore autoform passwords
return PStoreReadAutoformPasswords(cszUrl,saPasswords);
}

return FALSE;
}


//Check if autoform passwords are present
BOOL CAutoformDecrypter::EntryPresent(LPCTSTR cszUrl)
{
assert(cszUrl);

DWORD dwRet, dwValue, dwSize=sizeof(dwValue);
LPCTSTR cszHash=GetHash(cszUrl);

//problems computing the hash
if ( !cszHash )
return FALSE;

//Check the registry
dwRet=SHGetValue(HKCU,_T("Software\\Microsoft\\Internet Explorer\\IntelliForms\\SPW"),cszHash,NULL,&dwValue,&dwSize);
delete((LPTSTR)cszHash);

if ( dwRet==ERROR_SUCCESS )
return TRUE;

m_dwLastError=E_NOTFOUND;
return FALSE;
}


//retrieve hash by given URL text and translate it into hex format
LPCTSTR CAutoformDecrypter::GetHash(LPCTSTR cszUrl)
{
assert(cszUrl);

BYTE buf[0x10];
LPTSTR pRet=NULL;
int i;

if ( HashData(cszUrl,buf,sizeof(buf)) )
{
//Allocate some space
pRet=new TCHAR [sizeof(buf) * sizeof(TCHAR) + sizeof(TCHAR)];
if ( pRet)
{
for ( i=0; i {
// Translate it into human readable format
pRet[i]=(TCHAR) ((buf[i] & 0x3F) + 0x20);
}
pRet[i]=_T('\0');
}
else
m_dwLastError=E_OUTOFMEMORY;
}

return pRet;
}


//DoHash wrapper
BOOL CAutoformDecrypter::HashData(LPCTSTR cszData, LPBYTE pBuf,
DWORD dwBufSize)
{
assert(cszData && pBuf);

if ( !cszData || !pBuf )
{
m_dwLastError=E_ARG;
return FALSE;
}

DoHash((LPBYTE)cszData,strlen(cszData),pBuf,dwBufSize);
return TRUE;
}


void CAutoformDecrypter::DoHash(LPBYTE pData, DWORD dwDataSize,
LPBYTE pHash, DWORD dwHashSize)
{
DWORD dw=dwHashSize, dw2;

//pre-init loop
while ( dw-->0 )
pHash[dw]=(BYTE)dw;

//actual hashing stuff
while ( dwDataSize-->0 )
{
for ( dw=dwHashSize; dw-->0; )
{
//m_pPermTable = permutation table
pHash[dw]=m_pPermTable[pHash[dw]^pData[dwDataSize]];
}
}
}
===8<============End of original text============

The next, seventh generation of the browser, is most likely going to make this user's data storage mechanism its primary data storage method, declining the good old Protected Storage. Better to say, auto-fill data and passwords, from now on, are going to be stored here.

What is so special and interesting in this mechanism that made MS decide to use it as primary? Well, first of all, it was the encryption idea, which isn't new at all but still simple and genius, to disgrace. The idea is to quit storing encryption keys and generate them whenever that would be necessary. The raw material for such keys would be HTML page's Web address.

Let's see how this idea works in action. Here is IE7's simplified algorithm for saving auto-fill data and password fields:

1 Save Web page's address. We will use this address as the encryption key (EncryptionKey).
2 Obtain Record Key. RecordKey = SHA(EncryptionKey).
3 Calculate checksum for RecordKey to ensure the integrity of the record key (the integrity of the actual data will be guaranteed by DPAPI.) RecordKeyCrc = CRC(RecordKey).
4 Encrypt data (passwords) with the encryption key EncryptedData = DPAPI_Encrypt(Data, EncryptionKey).
5 Save RecordKeyCrc + RecordKey + EncryptedData in the registry.
6 Discard EncryptionKey.

It is very, very difficult to recover password without having the original Web page address. The decryption looks pretty much trivial:

1 When the original Web page is open, we take its address (EncryptionKey) and obtain the record key RecordKey = SHA(EncryptionKey).
2 Browse through the list of all record keys trying to locate the RecordKey.
3 If the RecordKey is found, decrypt data stored along with this key using the EncryptionKey. Data = DPAPI_Decrypt(EncryptedData, EncryptionKey).
In spite of the seeming simplicity, this Web password encryption algorithm is one of today's strongest. However, it has a major drawback (or advantage, depending which way you look at it.) If you change or forget the original Web page address, it will be impossible to recover password for it.



2.8. Content Advisor password
And the last item on our list is Content Advisor password. Content Advisor was originally developed as a tool for restricting access to certain websites. However, for some reason it was unloved by many users (surely, you may disagree with this.) If you once turned Content Advisor on, entered a password and then forgot it, you will not be able to access the majority of websites on the Internet. Fortunately (or unfortunately), this can be easily fixed.

The actual Content Advisor password is not stored as plaintext. Instead, the system calculates its MD5 hash and stores it in Windows registry. On an attempt to access the restricted area, the password entered by user is also hashed, and the obtained hash is compared with the one stored in the registry. Take a look at PIEPR source code checking Content Advisor password:


===8<===========Begin of original text===========
void CContentAdvisorDlg::CheckPassword()
{
CRegistry registry;

//read the registry
registry.SetKey(HKLM, "SOFTWARE\\Microsoft\\Windows\\CurrentVersion\\policies\\Ratings");

BYTE pKey[MD5_DIGESTSIZE], pCheck[MD5_DIGESTSIZE];
if ( !registry.GetBinaryData("Key",pKey,MD5_DIGESTSIZE) )
{
MessageBox(MB_ERR,"Can't read the password.");
return;
}

//Get one set by user
CString cs;
m_wndEditPassword.GetWindowText(cs);
MD5Init();
MD5Update((LPBYTE)(LPCTSTR)cs,cs.GetLength()+1);
MD5Final(pCheck);

//Check hashes
if ( memcmp(pKey,pCheck,MD5_DIGESTSIZE)==0 )
MessageBox(MB_OK,"The password is correct!");
else
MessageBox(MB_OK,"Wrong password.");
}
===8<============End of original text============

The first thing you may think about is to try to pick the password by using the brute force or dictionary attack. However, there is a more elegant way to that. You can simply remove the hash from the registry. That's it; so simple... Well, it's better to rename it instead, so that if you ever need it, you can restore it back. Some programs also let users check Content Advisor password, "drag out" password hint, toggle password on/off, etc.



3. Brief Overview of Internet Explorer Password Recovery Programs
It's worth noticing that not all password recovery programs suspect there are so many ways to recover passwords. Most likely, this is related to the fact that some passwords (e.g., synchronization passwords) are not often used in the real life, and FTP passwords are not so simple to be 'dragged out'. Here is a brief overview of the most popular commercial products for recovering passwords for the most popular browser on earth :)

Advanced Internet Explorer Password Recovery from the not unknown company, ElcomSoft - does not recognize AutoForm passwords and encrypted FTP passwords. Not to be excluded, the last version of the program may have learnt to do that. Simple, convenient user interface. The program can be upgraded online automatically.

Internet Explorer Key from PassWare - similarly, does not recognize certain types of passwords. Sometimes the program halts with a critical error when reading some uncommon types of IE's URLs. Displays first two characters of passwords being recovered. The advantages worth noticing are the Spartan user interface and operating convenience.

Internet Explorer Password from Thegrideon Software - not bad, but can recover just three types of Internet Explorer passwords (this is enough for the majority of cases.) Deals with FTP passwords properly. Version 1.1 has problems recovering AutoForm passwords. Has convenient user interface, which in some way reminds one from AIEPR. One can be totally overwhelmed with the beauty and helpfulness of the company's website.

Internet Password Recovery Toolbox from Rixler Software - offers some greater functionality than the previously covered competitors. It can recover encrypted FTP passwords and delete selected resources. However, it has some programming errors. For example, some types of IE records cannot be deleted. The program comes with a great, detailed help file.

ABF Password Recovery from ABF software - quite a good program with friendly user interface. The list of IE record types supported by the program is not long. Nevertheless, it deals with all of them properly. The program can be classified as a multi-functional one, since it can restore passwords for other programs also.

The major drawback of all programs named here is the capability to recover passwords only for user currently logged on.

As it was said above, the general body of stored Internet Explorer resources is kept in a special storage called Protected Storage. Protected Storage was developed specially for storing personal data. Therefore the functions for working with it (called PS API) are not documented. Protected Storage was first introduced with the release of the version 4 of Internet Explorer, which, by the way, unlike the third version, was written from scratch.

Protected Storage provides applications with an interface to store user data that must be kept secure or free from modification. Units of data stored are called Items. The structure and content of the stored data is opaque to the Protected Storage system. Access to Items is subject to confirmation according to a user-defined Security Style, which specifies what confirmation is required to access the data, such as whether a password is required. In addition, access to Items is subject to an Access rule set. There is an Access rule for each Access Mode: for example, read/write. Access rule sets are composed of Access Clauses. Typically at application setup time, a mechanism is provided to allow a new application to request from the user access to Items that may have been created previously by another application.
Items are uniquely identified by the combination of a Key, Type, Subtype, and Name. The Key is a constant that specifies whether the Item is global to this computer or associated only with this user. The Name is a string, generally chosen by the user. Type and Subtype are GUIDs, generally specified by the application. Additional information about Types and Subtypes is kept in the system registry and include attributes such as Display Name and UI hints. For Subtypes, the parent Type is fixed and included in the system registry as an attribute. The Type group Items is used for a common purpose: for example, Payment or Identification. The Subtype group Items share a common data format.

So, until very recent time, all programs for recovering Internet Explorer passwords used those undocumented API. That's the reason why one significant restriction was applied to the recovery work: PS API can only work with passwords for user that is currently logged on. When the system encrypts data stored in Protected Storage, besides everything else it uses user's SID, without which it is literally impossible (taking into account the current level of computers' calculating performance) to recover stored passwords.

Protected Storage uses a very well thought through data encryption method, which uses master keys and strong algorithms, such as des, sha, and shahmac. Similar data encryption methods are now used in the majority of modern browsers; e.g. in Opera or FireFox. Microsoft, meanwhile, quietly but surely develops and tests new ones. When this article is written, in the pre-Beta version of Internet Explorer 7 Protected Storage was only used for storing FTP passwords.

The analysis of this preliminary version suggests that Microsoft is preparing another 'surprise' in the form of new, interesting encryption algorithms. It is not known for sure, but most likely the new company's data protection technology InfoCard will be involved in the encryption of private data.

Thus, with a great deal of confidence one can assert that with the release of Windows Vista and the 7th version of Internet Explorer passwords will be stored and encrypted with fundamentally new algorithms, and the Protected Storage interface, to all appearances, will become open for third-party developers.

It is somewhat sad, for we think the true potential of Protected Storage was still not uncovered. And this is why we think so:
- First, Protected Storage is based on module structure, which allows plugging other storage providers to it. However, for the last 10 years while Protected Storage exists, not a single new storage provider was created. System Protected Storage is the only storage provider in the operating system, which is used by default.
- Second, Protected Storage has its own, built-in access management system, which, for some reason, is not used in Internet Explorer or in other MS products.
- Third, it is not very clear why MS have decided to decline Protected Storage in storing AutoComplete data and passwords. Decline it as a tried and true data storage, and not data encryption mechanism. It would be more logically proven to keep Protected Storage at least for storing data when implementing a new encryption algorithm. Without fail, there were weighty reasons for that. Therefore, it would be interesting to hear the opinion of MS specialists concerning this subject matter.


4. PIEPR - the First Acquaintance
Passcape Internet Explorer Password Recovery was developed specifically to bypass the PS API's restriction and make it possible to recover passwords directly, from the registry's binary files. Besides, it has a number of additional features for advanced users.

The program's wizard allows you to choose one of several operating modes:
- Automatic: Current user's passwords will be recovered by accessing the closed PS API interface. All current user's passwords currently stored in Internet Explorer will be recovered with a single click of the mouse.
- Manual: Passwords will be recovered without PS API. This method's main advantage is the capability to recover passwords from your old Windows account. For that purpose, you will need to enter path to the user's registry file. Registry files are normally not available for reading; however, the technology used in PIEPR allows doing that (provided you have the local administrative rights.)

User's registry file name is ntuser.dat; its resides in the user's profile, which is normally %SYSTEMDRIVE%:\Documents and Settings\%USERNAME%, where %SYSTEMDRIVE% stands for the system disk with the operating system, and %USERNAME% is normally account name. For instance, path to registry file may look like this: C:\Documents and Settings\John\ntuser.dat

If you have ever been a happy owner of Windows 9x/ME, after you upgrade your operating system to Windows NT, Protected Storage will providently save a copy of your old private data. As a result of that, Protected Storage may contain several user identifiers, so PIEPR will ask you to select the right one before it gets to the decryption of the data (fig.3 http://www.passcape.com/images/ie03.png).

One of the listed SIDs will contain data left by the old Windows 9x/ME. That data is additionally encrypted with user's logon password, and PIEPR currently does not support the decryption of such data.

If ntuser.dat contains encrypted passwords (e.g., FTP sites passwords), the program will need additional information in order to decrypt them (fig.4 http://www.passcape.com/images/ie04.png):
- Logon password of user whose data are to be decrypted
- Full path to the user's MasterKey
- User's SID

Normally, the program finds the last two items in user's profile and fills that data automatically. However, if ntuser.dat was copied from another operating system, you will have to take care of that on your own. The easiest way to get the job done is to copy the entire folder with user's Master Key (there may be several of them) to the folder with ntuser.dat. Master Key resides in the following folder on your local computer: %SYSTEMDRIVE%:\Documents and Settings\%USERNAME%\Application Data\Microsoft\Protect\%UserSid%, where %SYSTEMDRIVE% stands for the system disk with the operating system, %USERNAME% - account name, %UserSid% - user's SID. For example, path to the folder with a master key may look as follows: C:\Documents and Settings\John\Application Data\Microsoft\Protect\S-1-5-21-1587165142-6173081522-185545743-1003. Let's make it clear that it is recommended to copy the entire folder S-1-5-21-1587165142-6173081522-185545743-1003, for it may contain several Master Keys. Then PIEPR will select the right key automatically.

Windows marks some folders as hidden or system, so they are invisible in Windows Explorer. To make them visible, enable showing hidden and system objects in the view settings or use an alternative file manager.

Once the folder with user's Master Key was copied to the folder with ntuser.dat, PIEPR will automatically find the required data, so you will only have to enter user's password for recovering FTP passwords.

Content Advisor
Content Advisor passwords, as it was said already, is not kept as plain text; instead, it is stored as hash. In the Content Advisor password management dialog, it is enough to just delete (you can restore the deleted password at any time later) or change this hash to unlock sites locked with Content Advisor. PIEPR will also display your password hint if there is one.

Asterisks passwords
PIEPR's fourth operating mode, which allows recovering Internet Explorer passwords hidden behind asterisks. To recover such password, simply drag the magnifier to the window with a **** password. This tool allows recovering passwords for other programs that use IE Frames as well; e.g., Windows Explorer, some IE-based browsers, etc.

We have reviewed the basic Internet Explorer password recovery modes. There is also a number of additional features for viewing and editing cookies, cache, visited pages history, etc. We are not going to cover them in detail; instead, we are going to look at a few password recovery examples done with PIEPR.



5.1. Three Real-Life Examples.
Example 1: Recovering current user's FTP password
When opening an FTP site, Internet Explorer pops up the log on dialog (fig.5 http://www.passcape.com/images/ie05.png).

If you have opened this site and set the 'Save password' option in the authentication dialog, the password must be saved in Protected Storage, so recovering it is a pretty trivial job. Select the automatic operating mode in PIEPR and then click 'Next'. Locate our resource in the dialog with decrypted passwords that appears (the site name must appear in the Resource Name column.)

As we see, the decryption of current user's password should not cause any special difficulties. Oh, if the password is not found for some reason - don't forget to check IE's Auto-Complete Settings. Possibly, you have simply not set the program to save passwords.



5.2. Three Real-Life Examples.
Example 2: We will need to recover Web site passwords. The operating system is unbootable.
This is a typical, but not fatal situation. The necessity to recover Internet Explorer passwords after unsuccessful Windows reinstallation occurs just as often.

In either case, we will have user's old profile with all files within it. This set is normally enough to get the job done. In the case with the reinstallation, Windows providently saves the old profile under a different name. For example, if your account name was John, after renaming it may look like John.WORK-72C39A18.

The first and the foremost what you must do is to gain access to files in the old profile. There are two ways to doing this:
- Install a new operating system on a different hard drive; e.g., Windows XP, and hook the old hard drive to it.
- Create a Windows NT boot disk. There are many different utilities for creating boot disks and USB flash disks available online. For instance, you can use WinPE or BartPE. Or a different one. If your old profile was stored on an NTFS part of your hard drive, the boot disk will have to support NTFS.

Let's take the first route. Once we gain access to the old profile, we will need to let the system show hidden and system files. Otherwise, the files we need will be invisible. Open Control Panel, then click on Folder Options, and then select the View tab. On this tab, find the option 'Show hidden files and folders' and select it. Clear the option 'Hide protected operating system files'. When the necessary passwords are recovered, it's better to reset these options to the way they were set before.

Open the program's wizard in the manual mode and enter path to the old profile's registry file. In our case, that is C:\Documents And Settings\ John.WORK-72C39A18\ntuser.dat. Where John.WORK-72C39A18 is the old account name. Click 'Next'.

This data should normally be sufficient for recovering Internet Explorer passwords. However, if there is at least a single encrypted FTP password, the program will request additional data, without which it will not be able to recover such types of passwords:
- User's password
- User's Master Key
- User's SID.
Normally, the program finds the last two items in user's profile and fills that data automatically. However, if that didn't happen, you can do that by hand: copy ntuser.dat and the folder with the Master Key to a separate folder. It is important to copy the entire folder, for it may contain several keys, and the program will select the right one automatically. Then enter path to file ntuser.dat that you have copied to another folder.

That's it. Now we need to enter the old account password, and the recovery will be completed. If you don't care for FTP password, you can skip the user's password, Master Key, and SID entry dialog.



5.3. Three Real-Life Examples.
Example 3: Recovering uncommonly stored passwords.
When we sometimes open a website in the browser, the authentication dialog appears. However, PIEPR fails to recover it in either automatic or manual mode. The 'Save password' option in Internet Explorer is enabled. We will need to recover this password.

Indeed, some websites don't let browser to save passwords in the auto-complete passwords list. Often, such websites are written in JAVA or they use alternative password storage methods; e.g., they store passwords in cookies. A cookie is a small bit of text that accompanies requests and pages as they go between the Web server and browser. The cookie contains information the Web application can read whenever the user visits the site. Cookies provide a useful means in Web applications to store user-specific information. For example, when a user visits your site, you can use cookies to store user preferences or other information. When the user visits your Web site another time, the application can retrieve the information it stored earlier. Cookies are used for all sorts of purposes, all relating to helping the Web site remember you. In essence, cookies help Web sites store information about visitors. A cookie also acts as a kind of calling card, presenting pertinent identification that helps an application know how to proceed. But often cookies criticized for weak security and inaccurate user identification.

If the password field is filled with asterisks, the solution is clear: select the ASTERISKS PASSWORDS operating mode and then open the magic magnifier dialog. Then simply drag the magnifier to the Internet Explorer window (fig.6 http://www.passcape.com/images/ie06.png).

The password (passwords, if the Internet Explorer window has several fields with asterisks) is to appear in the PIEPR window (fig.7 http://www.passcape.com/images/ie07.png).

But it's not always that simple. The password field may be empty or that field may indeed contain *****. In this case, as you have guessed by now, the ASTERISKS PASSWORDS tool will be useless.

We can suppose, the password is stored in cookies. Let's try to locate it. Choose the IE Cookie Explorer tool (fig.8 http://www.passcape.com/images/ie08.png).

The dialog that appears will list the websites that store cookies on your computer. Click on the URL column header to order the websites list alphabetically. This will help us find the right website easier. Go through the list of websites and select the one we need. The list below will display the decrypted cookies for this website (fig.9 http://www.passcape.com/images/ie09.png).

As the figure shows, in our case the login and password are not encrypted and are stored as plain text.

Cookies are often encrypted. In this case, you are not likely to succeed recovering the password. The only thing you can try doing in order to recover the old account is to create a new account. Then you will be able to copy the old cookies in a text editor and replace them with the new ones. However, this is only good when the worst comes to the worst; it is not recommended to use it normally.

Don't forget also that just about all pages and forms with passwords have the 'Forgot password' button.




Conclusion
As this article shows, recovering Internet Explorer passwords is a pretty simple job, which does not require any special knowledge or skills. However, despite of the seeming simplicity, password encryption schemes and algorithms are very well thought through and just as well implemented. Although the Protected Storage concept is over 10 years of age, don't forget that it has proven the very best recommendations of the experts and has been implemented through three generations of this popular browser.

With the release of the next, 7th version of IE, Microsoft is preparing fundamentally new schemes for protecting our private data, where it uses improved encryption algorithms and eliminates shortages peculiar to Protected Storage.

In particular, the analysis of the preliminary beta versions of Internet Explorer 7 has revealed that autoform password encryption keys are no longer stored along with data. They are not stored, period! This is a little know-how, which is to be estimated at its true worth by both professionals and end users, who, finally, will benefits of it anyway.

But the main thing is, the release of the new concept will eliminate the major drawback peculiar to Protected Storage, which is the possibility to recover passwords without knowing the additional information. Better to say, was enough for a potential hacker to gain physical access to the contents of a hard drive, in order to steal or damage passwords and user's other private data. With the release of Internet Explorer 7, the situation will somewhat change.

Meanwhile, we will only have to wait impatiently for the advent of Windows Vista and IE 7 to take a closer look at new encryption mechanisms used in the next generation of this popular browser.



This document may be freely distributed or reproduced provided that the
reference to the original article is placed on each copy of this document.
(c) 2006 Passcape Software. All rights reserved.
http://www.passcape.com

Wednesday, December 31, 2008

A Look At The History Of Notebook Computers

A notebook computer is a term used interchangeably with laptop computers. For those of you not familiar, a notebook computer is one that is smaller and lighter than a personal computer. You can take it with you anywhere so it offers you more access to the internet, a way to watch movies, and even a way to work while you are away on business trips.

The first notebook computer was introduced in 1981 but they were very expensive and not as versatile as they are today. IBM and Epsom both placed versions of portable laptops on the market in 1983. Even with more models emerging, notebook computers were an item often associated only with high profile businessmen.

It wasn't until 1995 when Microsoft introduced their operating system Windows 95 that the world of notebook computers exploded. This operating system along with advances in technology that allowed notebook computers to function in the same ways as a personal computer led to them dropping in price and more consumers buying them.

Some of the improvements that occurred around this time were a better battery that no longer included acid. Power saving notebook computers were introduced so the life of the battery lasted much longer. They also were now able to hold more data so they could be used for more concepts at any given time.

Today you see people of all ages carrying their notebook computers to the office, home, on airplanes, colleges, and hotels. Many public places are set up with areas for individuals to conveniently use their laptops. Since we live in such a computer age having a notebook computer can help you stay on top of things for work and pleasure no matter where you go.

You can find notebook computers in a variety of sizes and from multiple manufacturers. They come with a good price, plenty of storage capacity, and warranties. If you are in the market for a notebook computer you will have no trouble finding exactly what you are looking for.

Tuesday, December 30, 2008

A Few Search Engine Optimization Techniques

You completed a web site for your business about three months ago, but you are still not seeing very many people visiting your web site. You do a little research and find that your web site is buried about ten pages deep on all of the major search engines. It seems that you have created a very nice web site, but it is not optimized for search engines, so your page rank is very low. Search engine optimization has become a very large field for many different consultants all over the internet. However the techniques needed to optimize your web site for search engines are not very hard to implement on your web site all by yourself. Here are a few of the most important things that you can do for search engine optimization:

Use keywords throughout your web site. – Many people do a good job putting a good description and group of keywords in their meta tags, but they do not use these same keywords throughout the rest of their web site. You must continue to use your keywords throughout the content on the rest of your web site if you would like to get high search engine rankings.

Create a sitemap – Many search engines will try to index your site’s pages by following links to all of the different pages. However if a search engine is unable to follow a link, then a page might not get included in the search engine’s results. To make sure all of your pages get indexed, make sure that you have a text-based sitemap that includes all of the major pages of your web site.

Use Flash sparingly – Flash is a very neat technology and it has its place on the web. However you do not want to overuse Flash, because a search engine will not be able to read the text that is embedded in the Flash elements, which could hurt your ranking if you have keywords in that area.

Get inbound links – One of the best things that you can do for search engine optimization is to get inbound links to your web site. If you are able to get high quality web sites that relate to your business to link to your web site, then your search engine ranking is sure to climb.

Monday, December 29, 2008

4 Top Benefits Of A Professional Web Design

A professional web design is essential to internet success. This is especially true for businesses. While there are many software programs, tutorials, and do-it-yourself websites available across the internet, nothing can compare to a professional web design, for so many different reasons. Here, we are going to show you the top four benefits of a professional web design and why no business should take a chance on anything but professionalism.

Benefit #1 – First Impressions DO Count

Surely, you remember your mother telling you, the first impression is all you get in life. This still holds true in life and on the internet. Your website is your access to a world of customers and your customer’s access to you. It is a proven fact that you have no more than six seconds, that is right six (6) seconds, to grab a potential customer’s attention. If your website is not professional designed in an appealing nature with easy navigation, fresh content, and believability, you will have lost them almost instantly.

Benefit #2 – More Sales = Greater Profit

It is yet another proven fact that the right design will increase your sales. If you are new to website design and fail to include the fundamental aspects in your website, there is a great chance that your sales and profit will suffer as a result. With professional web design, the designers, project managers, and any person that works with the company knows just what it takes to create a profitable website, which will increase sales, and ultimately your profit.

Benefit #3 – Product Highlights

No matter if you offer 1 product or 5,000 products, a professional web designer will know just what it takes to highlight the right products. They have a good idea of your targeted audience, what they are looking for, and how to properly highlight products for increased sales. The same applies with services as well. It is necessary to show the best of what you have to offer in order to convert visitors to paying customers.

Benefit #4 – Unique

Perhaps one of the best things about a professional web design is the fact that your website will be yours and only yours. There will not be another website on the internet that looks like yours. When you use templates found on the internet or WYSIWYG (What You See Is What You Get) editors, there is a good chance that hundreds of other webmasters, just like you, have the same exact template. Potential customers want to see something new, fresh, and unique. They definitely do not want to see the same website over and over again.

There you have it the top four benefits of a professional web design. There are so many more benefits, but the above four are the top reasons why you should be choosing a professional design company.

Sunday, December 28, 2008

3 Things You Need To Know About Voip

You have seen the ads about VOIP and you want in on it if it is what it promises to be. But, before you do so, you realize you need to know a little bit more about it. VOIP is fast becoming the talk of the world, literally! People are seeing the benefits of it in their bank accounts as well as in their service experiences. VOIP, or Voice Over Internet Protocol, is a way of communicating via the internet instead of using standard land phone lines.

What You Have To Know

* Not sure how it works? Just as your internet connection can stay on, so can a phone system that is hooked up to it. The phone runs through the web, allowing for you to talk to anyone, anywhere without the need of expensive phone service. A great way to learn more about VOIP is to take a free demo of how it works. You’ll find these throughout the web.

* How does it save money? Another common question people have is how VOIP can save you money. If you are one that spends a lot of money each month on long distance phone calls, call waiting and forwarding services… and all other gadgets available for your standard phone, VOIP can save you money. It can do this because when you call through the internet, distance simply does not matter. Does it cost you anything to email your friend in China? No! And, neither does it cost to use VOIP long distance.

* What do you have to do to get it? First, you’ll need to insure that you have the service available in your area. Next, you’ll need to do some research to find out what the businesses can offer you in terms of service and cost. Then, you’ll need to install software and simple equipment and that’s that. You’ll likely pay a monthly payment as you do now, but it is likely to be much lower.

VOIP is fast growing because it is easy to use, affordable and quite possibly is the way of making phone calls in the years to come.

Web Servers and Firewall Zones

Web and FTP Servers

Every network that has an internet connection is at risk of being compromised. Whilst there are several steps that you can take to secure your LAN, the only real solution is to close your LAN to incoming traffic, and restrict outgoing traffic.

However some services such as web or FTP servers require incoming connections. If you require these services you will need to consider whether it is essential that these servers are part of the LAN, or whether they can be placed in a physically separate network known as a DMZ (or demilitarised zone if you prefer its proper name). Ideally all servers in the DMZ will be stand alone servers, with unique logons and passwords for each server. If you require a backup server for machines within the DMZ then you should acquire a dedicated machine and keep the backup solution separate from the LAN backup solution.

The DMZ will come directly off the firewall, which means that there are two routes in and out of the DMZ, traffic to and from the internet, and traffic to and from the LAN. Traffic between the DMZ and your LAN would be treated totally separately to traffic between your DMZ and the Internet. Incoming traffic from the internet would be routed directly to your DMZ.
Therefore if any hacker where to compromise a machine within the DMZ, then the only network they would have access to would be the DMZ. The hacker would have little or no access to the LAN. It would also be the case that any virus infection or other security compromise within the LAN would not be able to migrate to the DMZ.

In order for the DMZ to be effective, you will have to keep the traffic between the LAN and the DMZ to a minimum. In the majority of cases, the only traffic required between the LAN and the DMZ is FTP. If you do not have physical access to the servers, you will also need some sort of remote management protocol such as terminal services or VNC.

Database servers

If your web servers require access to a database server, then you will need to consider where to place your database. The most secure place to locate a database server is to create yet another physically separate network called the secure zone, and to place the database server there.
The Secure zone is also a physically separate network connected directly to the firewall. The Secure zone is by definition the most secure place on the network. The only access to or from the secure zone would be the database connection from the DMZ (and LAN if required).



Exceptions to the rule

The dilemma faced by network engineers is where to put the email server. It requires SMTP connection to the internet, yet it also requires domain access from the LAN. If you where to place this server in the DMZ, the domain traffic would compromise the integrity of the DMZ, making it simply an extension of the LAN. Therefore in our opinion, the only place you can put an email server is on the LAN and allow SMTP traffic into this server. However we would recommend against allowing any form of HTTP access into this server. If your users require access to their mail from outside the network, it would be far more secure to look at some form of VPN solution. (with the firewall handling the VPN connections. LAN based VPN servers allow the VPN traffic onto the network before it is authenticated, which is never a good thing.)

Router - Transmitting Packets

In a previous article we discussed the basics of what a router did. We're now going to get into a more detailed, and yes technical, explanation of how packets are transmitted as well as a few other tech specs of how routers work. So put on your learning caps because you're in for a real mind bender.

Internet data, whether it be in the form of a web page, a downloaded file or an email message, travels over what is called a packet switching network. Basically what happens is that the data is broken up into individual packets because there is only so much data that can be transmitted at one time. Each packet is about 1500 bytes long. Each packet contains quite a bit of information including the sender's address, the receiver's address and of course the information being sent which includes the order of each packet how it should be put back together so that the end user can make sense of the data. The packet is sent off to its destination based on what the router believes to be the best route to follow, which is usually the route with the least amount of traffic and if possible, the shortest route. Each packet may actually given a different route depending on conditions at the time, which in a high traffic network can change every second. By doing this, the router can balance the load across the network so that no one segment gets overloaded. Also, if there is a problem with one piece of equipment in the network, the router can bypass this piece of equipment and send the packet along another route. This way if there is a problem, the entire message will still arrive intact.

In conducting this process, routers have to speak to each other. They tell each other about any problems on the network and make recommendations on routes to take. This way, paths can be reconfigured if they have to be. However, not all routers do all jobs as routers come in different sizes and have different functions.

There are what we call simple routers. A simple router is usually used in a simple small network. Simple routers simply look to see where the data packet needs to go and sends it there. It doesn't do much else.

Slightly larger routers, which are used for slightly larger networks, do a little bit more. These routers will also enforce security for the network, protecting the network from outside attacks. They are able to do a good enough job of this that additional security software is not needed.

The largest routers are used to handle data at major points on the Internet. These routers handle millions of packets of information per second. They work very hard to configure the network as efficiently as possible. These are stand alone systems and actually have more in common with supercomputers than with a simple server one might have in a small office.

In our next instalment we'll look at how to actually trace the path that a message has taken and some examples of transmitting packets.

IT Networks: How to Argue for a Bigger Budget

IT network managers have to fight the "if it ain't broke don't fix it" mindset to win resources. With computer networks, that mindset is dangerously complacent. IT networks will keep pumping data until they die or let in hackers. Here are some winning arguments against "if it ain't broke…"



IT Network Maintenance: Better Analogies

Don’t let your IT network's budget get lumped with IT in general--or worse, operations in general. "If it ain't broke, don't fix it" sometimes makes sense in IT or operations. Upgrading workstations or desks can cost productivity, making it self-defeating.

You have to stress that IT networks are different from workstations or desks.

  • IT networks are harder to repair.
  • IT networks cannot be done without until fixed. You depend on them for email, web, file transfers, and in some organizations, printing, fax and telephone. If your network breaks you may be forced to rely on hand-written letters.
  • IT network improvements rarely lower productivity on the front line. Instead, a faster, more reliable network can improve front-line productivity.

Here are the analogies you should stress to counter "if it ain't broke":

  • Plumbing: IT networks will appear to function until they burst. The damage will be more expensive than maintenance ever could have been. In the meantime, you are losing productivity to all the little "leaks."
  • Dams: If a poorly maintained IT network bursts, the eventual flood will harm overall productivity.
  • War: There is no such thing as "good enough" when you are in competition. With an IT network, you're in a quiet arms race with hackers. You are also competing with your business competitors in terms of productivity.
  • Health: Your IT network has to be in top physical condition. You can't make up for bad habits with a week or two of "rejuvenation." Meanwhile, your day-to-day performance will suffer.
  • Cars: Don't wait for your IT network to conk out. Get a regular tune-up of up-to-date equipment.


IT Network Maintenance: What Can Go Wrong

Now, let's drive the point home. Here are some concrete, easy-to-explain reasons to keep your network up-to-date:

  • Power supplies. Without redundant backups, your network is vulnerable to a shutdown. The lost productivity will make extra equipment seem inexpensive in comparison.
  • Integrity. Faulty or contradictory data can break older networks. Newer equipment has solved these problems. Again, the potential cost of lost productivity makes newer equipment a good value.
  • Firewalls. Hackers can leak trade secrets stolen from unprotected networks. Firewall software upgrades are relatively inexpensive.
  • VOIP. Organizations worldwide are switching to VOIP--not just outside-line telephones but also switchboard and teleconferencing. If your network is out-of-date, it may fail when you eventually try this new technology.
  • Speed. Older platforms such as 10BASET will throttle your bandwidth. You can now upgrade to a Terabit or more. Just think of the seconds, minutes, hours, and days lost as staff wait for email to arrive and web pages to load.

Final tip: show how cost-effective IT network maintenance really is. Get a firm cost estimate from a vendor. Just make sure your cost estimate is as competitive as it can be. You can often get new equipment at half the cost of retail by buying refurbished equipment.



Close your case for a better network with this wisdom: no matter what you pay, keeping your network up-to-date is cheaper than the consequences of letting it fall into disrepair.

Saturday, December 27, 2008

Does The Google Desktop Really Put Your Privacy In Jeopardy?

There has been a lot of talk recently about Google Talk and how there are serious privacy concerns with the new application.

The biggest concern seems to come with the ability to search and share multiple computers with one account. In other words, you could use a single desktop search account to search, index and allow you to share files between your desktop and laptop for example.

But are these concerns grounded in truth? Is there really a privacy issue here?

I downloaded and installed the new Desktop Search beta the other day. It has some interesting new features such as the ability to remove panels from the sidebar and dock them anywhere you like on your desktop.

And there are several more panels available to let you do anything from manage what is indexed, to passing time by playing games.

One of the coolest features is its ability to reach beyond the desktop it is on to do a variety of things. Now, I can play tic tac toe with co-workers, or even friends around the world.

But the biggest, and most troubling update to some is the ability to remotely index files, as well as share them using Google servers to temporarily store the items.

By turning this feature on you give Google the right to store your files for up to 30 days. Therein lies the crux of the issue – there seems to be no way around this 30 day requirement.

All I have to say is 'so what?'

So what if you have to give Google this ability? Google will encrypt the data so that no one else can access it. And even if there is some sort of DOJ subpoena requiring access to these files I don't think it would stand up in court.

This is because Google has set up a network whereby all your Google activities are tied to one Google account. Your personalized home page, gmail, google analytics, adwords and adsense accounts all share the same Google account. Therefore, it would be difficult for anyone to get a subpoena to review information pertaining to only part of that account.

Legalities aside, if you are that concerned about the privacy being surrendered to Google in order to use this system then don't sign up for it.

You can still download and use the new Desktop Search with most of its new features, but you don't have to use the file sharing.

But what if you want to share files between computers?

Well, do what I did – go to your favorite electronics store and buy a flash drive. I just bought a USB flash drive with over 2 gigs of storage for under $100. Now I can easily transfer anything between any computer with no worry of some government agency wanting to know what's on it.

As I said, I do have the new Google Desktop installed, and I did look at the settings for the search and file sharing, but I didn't turn them on. I have no need to be able to search my home computer from work and vice versa, nor do I need to share files between the two computers.

And if I did, I'll simply use the FTP site I have set up on a computer at home or the aforementioned flash drive.

Really, when it comes to all the other ways that Google captures your personal data, from search history to Gmail, should we be all that concerned that some files may end up being stored on a Google server somewhere?

I think we should have other concerns. For example, I think we should be concerned about what Google already knows about us via those services I mentioned earlier.

I think business owners should be concerned that such a service would allow employees to easily steal and transfer data to and from work.

I think if you are that scared of the US government infringing on your privacy then you shouldn't have a Google account, nor Google Desktop Search nor a Gmail account. In fact I don't think you should have any Internet accounts because quite honestly everyone is a target for the DOJ. Further, I can almost guarantee you that your local ISP will fold and hand over the data much easier than Google will.

So before you start complaining about how Google could infringe your privacy, remember that YOU have the ability to stop it from happening. It's just a matter of choosing to do so.