09 November 2008

Zone Alarm Pro

Q : I have an anti-virus installed in my PC, do I really need a firewall? What is it? How it works and how does it protect my PC?

A : Yes, Anti-Virus Software alone is not enough to protect your computer today. After an Anti-Virus software is installed in your computer, the limitation of it is, you can only detect the virus and heal it if the virus is found, or if the virus is in you computer; Firewall protect your computer by building a defense line in front of you computer before an unauthorized connection is made by hackers or intruders. Most anti-virus software suite today like kaspersky internet security suite included a firewall in their product. A firewall's basic task is to regulate some of the flow of traffic between computer networks of different trust levels (Wikipedia, 2008).

If you have been using the internet for quite some time, you must have heard of firewall. "Firewall is defined as : A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria" (Webopedia,2004).

Q: Why do we need firewall security?
A: Because there are many ways that people can use to access or abuse unprotected computers (Tyson, 2008). Firewall is one ways to prevent them. For example firewall can protect you from remote login. Firewall can also prevent you from Application backdoors; some virus or software might provide backdoors for hackers. Using a firewall can also prevent keyloggers software to send out the keystroke that have been captured by the software. There are many more reasons why firewall is needed and what it can do, click on the website link at the bottom of the page(reference) for more information about firewall.

Now, let's go back to out topic today, Zone Alarm Pro.
Q: Why Zone Alarm?
A: Zone Alarm Pro is software based firewall that is suitable for home users who want to extend their computer's security. Zone Alarm Pro is a very user friendly firewall software; anyone who understands English can use it without problem. Installing and setting up Zone Alarm Pro is easy. If have experience using computers, another firewall that i would recommend is Comodo Firewall Pro, stronger protection but complicated especially with the "Image Execution Prevention". In Zone Alarm it is call "program control" which is much more easier to manage and easy to configure. Similar to 'Image Execution Prevention'.

Snapshots,














Reference:

  1. Webopedia, 2004, 'Firewall', online, date accessed 20th October 2008. Available from: http://www.zonealarm.com/store/content/home.jsp
  2. Tyson, J. 2008, 'How Firewall Works', online, date accessed 20th October 2008. Available from: http://computer.howstuffworks.com/firewall3.htm
  3. Wikipedia, 2008, 'Firewall', date accessed 20th October 2008. Available from: http://en.wikipedia.org/wiki/Firewall

04 November 2008

Hard To Wake Up?

Did you know that.... Firefox 3 have reach 8 million downloads!


When Mozilla launched their latest browser, Firefox 3, Breaking the world record with 8 Million Downloads!!!

Even Babes love firefox >.< (photos from the internet)

03 November 2008

Ubuntu 8.10 Sreenshots



















02 November 2008

Are you fit to call yourself an expert?

Snapshot from an IT Magazine. Anyone who calls himself an IT Expert, ask him to answer these questions before you start getting wrong information from him or accepting rumors from internet as facts. Ask these 7 questions to see if he is qualified. Of cause, before he answers you, he will get answers from "Prof. Google" and "Mr. Wikipedia". So, force him to answer on the spot. If he say he is not sure, the answers that he give you on the next day, will either from the internet or books. If he has a CCNA (Cisco Certified Network Associate), you are just asking him to "step 7 ants".

19 October 2008

Announcement

All my post in the future will be using the "Havard Referencing System"

The reasons for using it are:

  1. To aknowledge the work of other writers;
  2. To demonstrate the body of knowledge on which I have based on my work;
  3. To enable other researchers to trace my source and lead them on to further discussion and
  4. To avoid plagiarism.

Thanks for visiting my blog....

01 August 2008

Protecting Sensitive Information - Cryptography

Why do I need encryption? My answer would be,

To protect my sensitive/confidential information. With encryption, even if intruders hack into your computers and successfully transfered your personal files to his computer, he will not be able to read or to view the files without effort of decrypting it.

Another situation why we need encryption is, when we are bringing sensitive data with us in USB thumbdrive; Traveling or maybe transferring sensitive information that will bring huge damage to a company. You will never know that the USB Thunbdrive might be lost or being stolen when you leave your house or company. We do not want these information to be exposed to anyone even though if someone steal or found the Thumbdrive that you have lost.

For home users, sometimes we have private photos or maybe videos that we want to share with our friend; and we want use Thumbdrive to transfer them. The files must protect itself before it is ready to be transfered.

Solution : AxCrypt

Now, I want to have 2 layer of security in the files, what should i do? The best way is to use Winrar to protect the files with a password (first layer) and then use AxCrypt to encrypt and protect them with passphrase and keyfile.

First Step - Winrar
To Protect WinRAR files with a password, right click on the Folder and Click "Add to archive..."
Click on the Advance tab and click Set Password
Now, click enter a password
Press OK and WinRAR will start creating the Archive
Now we have successfully created a WinRAR archive with password.
WinRAR is not strong enough to protect the files because, there is a lot of software that is free, can crack the password and view the content, that is why we need to encrypt it and have second layer of security implemented in the file.

AxCrypt

Install AxCrypt and Right click on the WinRAR archive that we have created just now and click make key file, after you have successfully created a keyfile you will see a new .txt file, the default name is 'My Key-File
The key-file is a file storing a long key randomly generated by the software to lock and encrypt the content, AxCrypt can protect your file using the key-file or a passphrase. You can also use both of them, when decrypting, if you are unable to provide either one of them, you will not be able to decrypt the file if you have use both the key-file and the passphrase. So you must store the key-file in a safe place and make sure that you have a backup of the key-file.

*Note : You that you must use the same key-file that you have use to encrypt the file earlier in order to decrypt it.

Now start protecting the file, right click on the file and there is 3 options
Encrypt = encrypt the selected file (not recommended)
Encrypt a Copy = make a copy of the selected file and encrypt it (recommemded) (the pc must install AxCrypt to decrypt the encrypted file)
Encrypt copy to .EXE = encrypt a copy and create a .exe file ( the pc that you are going to use to decrypt the file does not required to have AxCrypt installed)
Since you have installed AxCrypt, we will try 'Encrypt a copy'; Click on encrypt a copy and enter a passphrase, then browse for the key-file that AxCrypt have created.
AxCrypt will start encrypting and you will see a file successfully being created.

Now, repeat the step if you want to create an .EXE file. To decrypt the file, double click on it and enter the passphrase and browse for the key-file.
AxCrypt Starts Decrypting
and WinRAR will ask for password before you can view the content


This one method that you can use to protect your files when transferring information. You can also encrypt important data in your computer using this method.

*Note:
  • Do a few times testing before you delete the original unencrypted files to make sure that there is no error when encrypting
  • some users have reported that it is not compatible with windows vista yet
  • if you need technical support, log on to their official website and get help in the forum, you can also report if you found any bugs in the software
  • store your key-file in a safe place and make sure you make backup of it because you need the same key-file to decrypt the encrypted file
  • again, do testing, testing and testing.

24 July 2008

Submarine Cable Map 2008

Recommended Readings

A few minutes ago I was searching for some network security document for home user, to make sure my information can be trusted, usually I will 'google' before I post something; I found this,

http://www.cert.org/tech_tips/home_networks.html#I-C

and

http://www.dipol.com.pl/bib80e.htm

The first thing in my mind after reading this document = Post it in my blog!!!
I don't like C&P other people's work and post it in my blog, like what many people do;to me, I feel shame, but this is a good document, home users should read it. Any content that I steal from an websites I will sure give credits to the author.

20 July 2008

Can hackers hack my computer?

The only answer to this question is, yes. No matter how secure is your system, Hackers can hack your computer. You should ask yourself, do hackers want to hack my computer?

In this post, I am going to explain about what is a security test.
The tool that I am going to introduce is PC Security Test

A Security test is performing a test on your computer. The purpose of this test is to know what hackers can do to your system. It means, after we have built a strong wall, we are now trying to break the wall like what the enemy does and see the results. How strong is the wall? What method can hackers use to break in to your system?

This tool is a very user friendly and GUI tool, anyone who can understand English should be able to use this tool without any problem. This tool is for computer literates who wish to have a basic security test on their computer.This tool is made for commercial use, not for enterprise or corporate network. This tool will perform a security test so that home users will be aware.

Let's look at a screen shot of the tool.
Now to perform a security test. Click on any test that you want to perform, I would recommend you to start with a standard test first before you perform other tests. Now as I have said earlier, this tool is very user friendly, easy to use and suitable for home users; So I am not going to make screen shot but I will briefly explain about this software.

There is 3 steps that you need to practice when you are using this software:
1)READ
2)Click
3)R-E-A-D!

This software will hack your computer like what a hacker will do to your computer. This software will not harm your computer; For example, in 'standard test', this software will copy a virus to your computer and run it. After all test have been done, the virus will be removed and the software will show you the results of the test. If this software can successfully get information, bypass your anti-virus, or control your hardware that you use; It means your computer is vulnerable for hackers to exploit your system.

After performing the tests, to increase your knowledge on computer security, you may try to answer the quiz. The quiz will ask you questions to test your knowledge on computer security and provide the explanation. READ every single word and you will definitely learn something from this software.

14 July 2008

Choosing An Antivirus Product

It is very important to have an Anti-Virus software installed in your computer. Script kiddies are creating virus that bring potential harm or damage to your computer. Now, I cant give you an exact amount of how many virus being are created in a day, but I am sure that virus are created every second not day.

Virus usually come from the internet, Instant Messenger (MSN,Yahoo,Skype,AIM...) or USB thumb drive, in one of my previous post, I have introduced McAfee Site Advisor and some screen shot of how can virus infect computers by just viewing a web page. If an image is attached with a virus or any malware, once the image is loaded in your browser, it means, your machines has been infected. You do not need to click on the image or save it into your computer.

Sometimes, viruses come from Instant Messenger, for example MSN Messenger, in this software, a feature call Sharing Folder, where you can share folders with your contact.
If User A have shared a folder with Contact B , and Contact B's Computer is infected with virus, trojan or spyware that has the ability to spread, User A will be infected.

Another situation usually that usually happen is autorun in USB Thumbdrive. Some virus will spread and duplicate itself into any mass storage devices that is plugged into the computer. The thumbdrive is plugged into another computer and infect that computer.

Virus also come from email attachment, today, almost all the anti-virus has
the intelligence to detect and scan email attachment and warm the user if there is a malware or any potential threats that will harm the computer.

Solutions? Anti-Virus

If you ask me what Anti-Virus is the best, I will tell you the is no such thing as best Anti-Virus in this world. Triangle again ><, if the anti-virus is too sensitive, you will end up saying that anti-virus s*cks, if it is too weak, you will say lame or useless . If you ask me what Anti-Virus I trust the most, i would say Symantec Norton and Kaspersky, I Trust Norton Anti-Virus because Norton has a large list of Virus Definition and the solutions; how to remove the virus manually, no other anti-virus company has a list larger than Norton. For Kaspersky, everyone knows it is famous for strong detection, the anti-virus's ability to detect a virus or a malware is very high. Both of product are recommended if you are willing to spend money for your anti-virus. Another product to consider is BitDefender, My experience of using BitDefender is it is quite sensitive in when scanning and it updates the virus definition every hour, without disturbing the user or slowing down the performance. You may consider McAfee, it is a quite famous anti-virus solution.


Free Anti-Virus List?

If you are not willing to spend money to buy an anti-virus product, there are some free anti virus available in the Internet. The one I trust the most for free anti-virus is BitDefender Free Anti-Virus.
A few more to consider:-

1)AVG Anti-Virus 8.0
2)Avira AntiVir Personal
3)avast! 4 Home Edition

No screen shot :(, all are based on experience and some important testing. If you want to compare some famous Anti-Virus Product, this website has a very detail comparison and review.

25 June 2008

Keeping watchdog in your computer

In reality, dogs guard houses, prevent thieves and protect its owner. Keeping a watch dog like rottweiler, bulldog, or doberman to guard the house is definitely a good choice.

For computers, no rottweilers...:( BUT...let me introduce a watch dog call Scotty :D


I have been training Scotty for quite some time and notices that Scotty is a very loyal, smart, intelligent, high performance but sometimes irritating :(

Scotty is born in a company call BillP Studios, the product name is called Winpatrol
http://www.winpatrol.com/

Again, installation is as easy as ABC. Install winpatrol and say hi to Scotty. There is many things that Scotty can do, it can be used to clean virus. Some virus disable the task manager of windows, and hide itself from being detected by anti virus. Even if the virus did not disable the task manager, some virus is visible and can be seen in the task manager. You can end the process in task manager, but next time your when machine boots up, the virus will be execute again....:(

Using Scotty/Winpatrol u can actually view the folder/directory of the virus file.
for example, explorer.exe(not a virus, just an example, but some virus may use the same name)

Click on 'Active Tasks' ( In case some virus disable your task manager.This can be used to stop the virus) Right Click and click 'Info'

Now you can see the location of the program, if it is a virus, you can browse and find the folder then delete the virus folder or .exe file manually

Scotty can also view the startup location of a program or explore the folder, you can also disable some programs which you do not want it to start when booting up yr machine.

You can also view the ActiveX which is use by Internet Explorer or other browsers,

or view hidden files


This is a good program if you want to remove a virus manually or view processes that is running in your machine. Winpatrol will automatically scan your computer for any possible treat. If a virus is trying to modify your system files, winpatrol will alert you and ask wait for your decision whether to allow or decline the changes.

Scotty will keep on scanning and alert you if there is any changes in your system.
So, performance or security? :) Triangle...........