Thursday, January 21, 2010

What are Intrusion Detection Systems?

Intrusion Detection System (IDS) are a necessary part of any strategy for enterprise security. What are Intrusion Detection systems? CERIAS, The Center for Education and Research in Information Assurance and Security, defines it this way:

"The purpose of an intrusion detection system (or IDS) is to detect unauthorized access or misuse of a computer system. Intrusion detection systems are kind of like burglar alarms for computers. They sound alarms and sometimes even take corrective action when an intruder or abuser is detected. Many different intrusion detection systems have been developed but the detection schemes generally fall into one of two categories, anomaly detection or misuse detection. Anomaly detectors look for behavior that deviates from normal system use. Misuse detectors look for behavior that matches a known attack scenario. A great deal of time and effort has been invested in intrusion detection, and this list provides links to many sites that discuss some of these efforts"(http://www.cerias.purdue.edu/about/history/coast_resources/intrusion_detection/)

There is a sub-category of intrusion detection systems called network intrusion detection systems (NIDS). These systems monitors packets on the network wire and looks for suspicious activity. Network intrusion detection systems can monitor many computers at a time over a network, while other intrusion detection systems may monitor only one.

Who is breaking into your system?

One common misconception of software hackers is that it is usually people outside your network who break into your systems and cause mayhem. The reality, especially for corporate workers, is that insiders can and usually do cause the majority of security breaches. Insiders often impersonate people with more privileges then themselves to gain access to sensitive information.

How do intruders break into your system?

The simplest and easiest way to break in is to let someone have physical access to a system. Despite the best of efforts, it is often impossible to stop someone once they have physical access to a machine. Also, if someone has an account on a system already, at a low permission level, another way to break in is to use tricks of the trade to be granted higher-level privileges through holes in your system. Finally, there are many ways to gain access to systems even if one is working remotely. Remote intrusion techniques have become harder and more complex to fight.

How does one stop intrusions?

There are several Freeware/shareware Intrusion Detection Systems as well as commercial intrusion detection systems.

Open Source Intrusion Detection Systems

Below are a few of the open source intrusion detection systems:

AIDE (http://sourceforge.net/projects/aide) Self-described as "AIDE (Advanced Intrusion Detection Environment) is a free replacement for Tripwire. It does the same things as the semi-free Tripwire and more. There are other free replacements available so why build a new one? All the other replacements do not achieve the level of Tripwire. And I wanted a program that would exceed the limitations of Tripwire."

File System Saint (http://sourceforge.net/projects/fss) - Self-described as, "File System Saint is a lightweight host-based intrusion detection system with primary focus on speed and ease of use."

Snort (www.snort.org) Self-described as "Snort® is an open source network intrusion prevention and detection system utilizing a rule-driven language, which combines the benefits of signature, protocol and anomaly based inspection methods. With millions of downloads to date, Snort is the most widely deployed intrusion detection and prevention technology worldwide and has become the de facto standard for the industry."

Commercial Intrusion Detection Systems

If you are looking for Commercial Intrusion Detection Systems, here are a few of these as well:

Tripwire (http://www.tripwire.com)

Touch Technology Inc (POLYCENTER Security Intrusion Detector) (http://www.ttinet.com)

Internet Security Systems (Real Secure Server Sensor) (http://www.iss.net)

eEye Digital Security (SecureIIS Web Server Protection) (http://www.eeye.com)

Wednesday, January 13, 2010

Got Dial Up?

Forget Online Gaming

Computer games have come a long way since electronic checkers and the like. Today, we've got computer games that would put some 21st century movies to shame and interest in online gaming is catching on like some kind of crazy fever. Once dominated by males aged 25 and older, today's gaming generation includes mom, sis, aunt, even grandma and grandpa! If you think you've caught the online gaming bug, and you're thinking about becoming a participant, don't even think you can join in on this online fun using a dial up Internet connection!

Part of the fascination with online gaming lies in its speed. During play, online gaming becomes a virtual world and in order to project a sense of reality into the mix, its games are fast, its movements are smooth, and its sounds are as realistic as we hear them in the natural world. Sitting in front of an online game, and actively participating in one puts the player in another world - a world that's so different, so cool, and so real.

No, we're not talking about a super-fancy version of checkers or backgammon. We're not talking about a visually rich game of tic-tac-toe. We're talking about full-fledged networked or multiplayer gaming that allows anyone to entertain themselves and hoards of others across the world at the same time. Multiplayer games play over online but trust us when we say any old Internet connection won't do.

If you want to get in on this craze, you're going to have to ditch the old dial up connection that you might have and get into broad band. A broadband Internet connection will give you the ability to send and receive highly detailed and realistic imagery at an appropriate speed. It will give you the means to watch videos in real time, and it will allow you to experience speech as if each and every other player were speaking to you directly.

A dial up Internet connection just can't handle this kind of fun, but you can get a broad band connection just as easily. For the techies out there, broadband is a type of data transmission in which a single medium (wire) can carry several channels at once. 1 For the rest of us, broadband is an Internet connection that allows several people to send and receive data at the same time. A dial up connection doesn't do that. A dial up connection can either send or receive - but it certainly can't do both. Let's talk about Broadband ISDN for a minute.

ISDN stands for integrated services digital network and it can transmit transmitting voice, video and data over fiber optic telephone lines at about 64 Kbps (64,000 bits per second).
Most ISDN lines offered by telephone companies give you two lines at once, called B channels. You can use one line for voice and the other for data, or you can use both lines for data to give you data rates of 128 Kbps, three times the data rate provided by today's fastest modems.2

Broadband ISDN - a combination of regular broadband and ISDN can transmit voice, video and data over fiber optic telephone lines at about 1.5 million bits per second (bps). It's a much faster connection than either broadband or ISDN alone! If your ISP offers Broadband ISDN, ask for it - your online gaming adventure will be the better for it.

Sunday, December 27, 2009

Phishing For Your Identity

Who hasn’t received an email directing them to visit a familiar website where they are being asked to update their personal information? The website needs you to verify or update your passwords, credit card numbers, social security number, or even your bank account number. You recognize the business name as one that you’ve conducted business with in the past. So, you click on the convenient “take me there” link and proceed to provide all the information they have requested. Unfortunately, you find out much later that the website is bogus. It was created with the sole intent to steal your personal information. You, my friend, have just been “phished”.

Phishing (pronounced as “fishing”) is defined as the act of sending an email to a recipient falsely claiming to have an established, legitimate business. The intent of the phisher is to scam the recipient into surrendering their private information, and ultimately steal your identity.

It is not at easy as you think to spot an email phishing for information. At first glance, the email may look like it is from a legitimate company. The "From" field of the e-mail may have the .com address of the company mentioned in the e-mail. The clickable link even appears to take you to the company's website, when in fact, it is a fake website built to replicate the legitimate site.

Many of these people are professional criminals. They have spent a lot of time in creating emails that look authentic. Users need to review all emails requesting personal information carefully. When reviewing your email remember that the "From Field" can be easily changed by the sender. While it may look like it is coming from a .com you do business with, looks can be deceiving. Also keep in mind that the phisher will go all out in trying to make their email look as legitimate as possible. They will even copy logos or images from the official site to use in their emails. Finally, they like to include a clickable link that the recipient can follow to conveniently update their information.
A great way to check the legitimacy of the link is to point at the link with your mouse. Then, look in the bottom left hand screen of your computer. The actual website address to which you are being directed will show up for you to view. It is a very quick and easy way to check if you are being directed to a legitimate site.

Finally, follow the golden rule. Never, ever, click the links within the text of the e-mail, and always delete the e-mail immediately. Once you have deleted the e-mail, empty the trash box in your e-mail accounts as well. If you are truly concerned that you are missing an important notice regarding one of your accounts, then type the full URL address of the website into your browser. At least then you can be confident that you are, in fact, being directed to the true and legitimate website.

Wednesday, December 23, 2009

Online Gaming

For Mom and Dad...

Have you ever wondered what your child was rambling on about at the dinner table when he or she started saying things like "VR" or "RPG"? If so, you're not alone. "VR" and "RPG" aren't new text messaging acronyms - they're acronyms for gaming and this article is going to introduce you to some of the more common forms.

If you at least thought of the Internet when you heard "VR" or "RPG" however, you're on the right track. Exclusive to the online environment, "VR" or "RPG" - which consequently stands for virtual reality gaming and role playing games - are just two aspects of a gaming world gone wild. The days of playing scrabble in front of the fireplace are over in today's generation, but we don't believe you'll hear too many people complaining about it. Today's generation is fascinated with online gaming - an opportunity to play games over the Internet with hundreds of people at a time.

Available to anyone with a computer and fast Internet connection, there are thousands of online games available to play by anyone... sometimes free and sometimes for a fee. They range from the familiar family board games to strange and more complicated games which require a hundred page manual to understand. One thing that they all have in common however is that they're fun to play.

The most common type of online game you'll probably run into is the Flash game - usually located on educational sites or Yahoo! for Kids for example. These games may or may not involve other players, but they're always full of color, they're fast to download, and they're fun to play. Since they run inside the web browser, no special equipment is needed. These are the simple games - more intriguing than checkers, but no more difficult to play than chess.

Another type of online gaming is more violent than the ones we described above and it's similar to the "shoot-em-up" type games found on the first Nintendo and Playstation systems. Designed from the first person's point of view, the player typically maneuvers around the screen as a weapon-clad hand - periodically changing weapons as the game's scenario permits. The violence in these games vary from mild to offensive, and as a parent, you're cautioned to monitor your children's access to them - especially since these games are played online with other people.

Next, in terms of complication or violence, comes the virtual reality gaming and role playing games that we introduced earlier. These types of games require an extensive amount of time spent online since players assume the role of a game character in play. Players work hard to build up an inventory of weapons or skills - none of which can be accomplished in a period of thirty minutes or less. They then go on to interact with other characters which extends game time even longer (if it even stops). Both virtual reality gaming and role playing games require and encourage strategic thinking, but as parents, you may not be comfortable with the violence that's prominent in some of these games. Nor may you be comfortable with the amount of time that playing these kinds of games can consume. Depending on the complexity of the game, any one person could spend at least six months at a game and having access to thousands of other players simultaneously doesn't exactly make them easy to walk away from.

Our best advice is to learn about these games right along with your child and make the decision to play them (or not play them) together. You can find some helpful advice about making computer decisions with children in our article entitled, "Protecting Children Online."

Dust Kills. Cleaning the Unit Fan is Essential Computer Care

Between taking care of the household, the kids, the pets, and the district PTA, computer care is probably one of the last things that you think of doing on a regular basis. Without a regular maintenance schedule however, you could find out (the hard way) that a neglected computer is an energy hog - one that works harder than it needs to and one that could be a financial burden to replace.

Let's talk about maintaining hardware. So much emphasis is put on maintaining a computer's operating system that we sometimes forget how important it is to maintain a computer's hardware components. Since there can be quite a few components to take care of, let's talk about the most important one.

The most important component of a computer's hardware system is its fan. The fan is located on the computer's CPU unit and when that thing gets clogged with dirt and dust, it can run down a computer faster than you can say, "Something's wrong with my computer and I don't know what it is!" In short, the fan is responsible for keeping a computer's motor cool and this motor is what keeps the computer's hard drive and peripherals functioning the way you need them to, which translates to "fast."

A dirty fan doesn't rotate fast enough to keep that motor cool and a completely clogged fan just stops rotating altogether. This causes the computer's motor to work harder - and a harder working motor can raise the electric bill! Worst case scenario: the motor can overheat and stop working as well. No motor equals no computer.

Keep your computer's fan clean by preventing the fan from getting dirty or dusty in the first place. Use the computer in a dust-free environment and never smoke around it. Nicotine and tar mean certain death when it comes to computer fans, however should you find a need to clean the fan, do so with extreme care.

It's quite easy to cause more damage from cleaning so if you're not comfortable with cleaning your PC yourself, take it to a shop for servicing. Otherwise, you can unplug and disassemble the computer to do it yourself.

You'll need a can of compressed air and an anti-static rag to remove stubborn clumps of dust. Hold the can perfectly vertical and spray the fan being careful not to spray the dust off the fan onto other sensitive parts of the computer like circuit boards or inside the motor casing. Wipe up remaining dust with your anti-static rag and then reassemble the computer.

One thing that you certainly don't want to use to remove computer dust is a vacuum cleaner. Although using a vacuum cleaner seems to make more sense, the strong suction of a vacuum cleaner can actually spark damaging static electricity or dislodge loose cables. You also don't want to use oil-based cleaners. Although Pledge may dust your wooden tables and cabinets to a perfect shine, the oil inside a cleaner like this will erode sensitive computer parts. Stick to a liquid-free dusting method and your dusting routine will be safe enough to repeat as often as you need.

As previously mentioned, preventing dust from entering the computer is extremely important and will reduce the need to open and dust your system in the first place. The severity of outside elements (smoking, humidity, pets, etc.) will ultimately determine how often you'll need to de-dust your machine. But as an average, you shouldn't need to perform this procedure any more than once or twice a year.

The entire exercise should take no more than twenty minutes tops and once complete, you'll immediately see and hear the difference in your machine. The computer's keyboard and mouse will run more smoothly, hardware won't take as long to connect, and the entire machine won't be as loud as one that's corroded with ugly dust bunnies.

Backup Data On Your Laptop

If you were to look at past statistics regarding the information that has been lost in regards to laptop computers, you would find yourself amazed. Even though this information can be astounding, many of us still don’t take the time to back up the information on our laptops.

To put it in simple terms, nothing in the computer industry is fool proof. Hard drives can crash, the laptop can get stolen, or it can even be dropped and rendered useless. To ensure that we are never left without our precious data, we should always create a backup of our information.

There is no mistaken the fact that over a million laptops have been stolen over the years in the United States alone. Anytime a laptop is stolen, chances are that it won’t be recovered. If the information wasn’t backed up, then the owner will be left with no laptop - but more importantly - no backed up data either.

Just like you can with desktop computers, you can also create a backup of the data on your laptop as well. You can use online services, back it up remotely, or use several other methods to ensure that you keep all of your data. Preserving your data is something you should really look into, especially if you have business material on your laptop.

The best way to go about backing up your data and files is to burn them to a data CD. Data CDs can hold up to 700 MB (Mega Bytes) of data, which means a lot of files. To back things up this way, all you need is a CD/RW burner in your laptop, which most of the newer ones come with.

The only drawback to laptops is the fact that they don’t offer near as much storage or security measures as a desktop PC. Desktop computers have a lot more power, and they can also do things (including backups) in a fraction of the time.

The laptop computer was designed for on the go use, which is the main reason why people don’t really think about backing up their data. When the thought finally does come to mind, it is normally too late to do anything about it.

As mentioned above, the easiest and quickest way to backup your laptop data is to use an online backup service. Depending on your connection to the Internet, it can take anywhere from several minutes to several hours. Although it may take you a little bit of time, you’ll have the satisfaction in knowing that your data is there if something should happen.

Whether it’s for your business or personal use, you can’t go wrong backing up your data. You should always create a backup of your data at least once a month, even more than that if you have a lot of important information that you add to your laptop on a frequent basis.

Saturday, December 19, 2009

Beware Internet Explorer Plug-Ins

Just what is Intelligent Explorer? For your safety, you really need to know

I recently hit, by mistake, what I thought was an Explorer upgrade option. It turned out to be a pop-up appearing legitimate but really was not. It uploaded a product called Intelligent Explorer on my machine. What a nightmare!

I did some research on the web and found messages like this one from a BullGuard Antivirus Forum,

"PLEASE HELP!!! I HAVE A SPYWARE, TROJAN AND HIJACKER ON MY COMPUTER. I HAVE RUN BULLGUARD, CWSHREDDER AND AD-AWARE. ALL HAVE PICKED UP THE VIRUSES AND SAID THAT THEY HAVE BEEN MOVED/REMOVED BUT WHEN I LOG ONTO THE INTERNET THAT DAMN INTELLIGENT EXPLORER TOOLBAR IS SHOWING"

Another message from spywareinfo Forum goes something like this:

"Hey I'm having issues with something called Internet explorer toolbar - Intelligent explorer. I can’t find a way to remove it from my comp and I really don’t want to reinstall windows. I've used spybot, ad-ware, and cw shredder but nothing seems to work."

It appears that Intelligent Explorer allows other software to be downloaded to your machine and this is where the problem occurs. What is even more remarkable is that by downloading Intelligent Explorer, their license grants them the right to install software add-ins on your computer at their will. Take a look at what the software license for Intelligent Explore says (go to http://www.ieplugin.com/terms.html to read it all):

"You grant to us the right, exercisable by us until you uninstall the Software or this agreement is otherwise terminated, to provide to you the Service of downloading and causing to be displayed advertising material on your computer, through ‘pop-up’ or other display while you use your browser. You acknowledge and agree that installation of the Software may automatically modify toolbars and other settings of your browser. By installing the Software you agree to such modifications."

The company, IBC incorporated, is incorporated in Belize. I really can't believe this license!

One end user found highly objectionable pop-up advertisements generated by this software bundled with Intelligent Explorer in the form of extreme pornography.

I have yet to break this.

Intelligent Explorer is a plug-in, which can create a new home page, as well as start up and endless loop of pop-ups. You can remove the view bar, but then starting up Internet Explorer will cause it to reappear. I asked some friends to help, and no one could tell me what to do.

This is what I did:

I bought a copy of a program called XoftSpy and it removed the software. It took two scans and a reboot to do it. This is not an advertisement for this product. They advertised it was free, which it was to run, but then I had to buy it to actually fix anything. It cost me $40 and I am sure that there are freeware products out there as well, but that is what ended the nightmare for me. Other spyware products I have seen out there include spybot, NoAdware, Spyware Eliminator, Pal Spyware Remover, and Spyware C.O.P.

Let the buyer beware!

Saturday, December 5, 2009

Buying Video Games for a Gaming

Visit any video game outlet and you're bound to get overwhelmed by the hundreds of choices available - especially if you're new to gaming. Interestingly, children and teens seem to know their way around these places as if they were their second home. But for the adult, the typical video store looks like some sort of color paint explosion and sooner or later, all the games start to look the same. This guide is for the adult who's buying a game for a younger person perhaps as a birthday gift or as a bribe. Whatever the reason, you're going to appreciate the following tips.

  1. Research this strange phenomenon before setting foot inside a video store. There's plenty of information available about video games online, so to reduce frustration offline, fire up your web browser and do a little homework. Visit the website of the gaming outlet nearest you and then look for a link to the games section of the system that your youngster plays. Here's a helpful chart to explain what all those strange letters mean.

    Wii = Nintendo's Wii System
    EA Sports = Entertainment Arts System
    PS3 = Playstation 3 System
    XBOX 360 = Microsoft's XBOX 360 System
    PC = Personal Computer
    PS2 = Playstation 2 System
    PSP = Playstation Portable System
    DS = Nintendo's DS System

    The key is to locate the system on the store's website first. The system, it's accessories, and all of the games that work on that system will follow. If not, you may need to use the website's internal search engine.

  2. After locating the appropriate games section for your youngster's machine, check out the ratings of each game and create a temporary shopping list of age appropriate material. The Entertainment Software Rating Board (ESRB) gives each game a rating in an effort to inform parents what their children are playing. Here's a handy reference to what the ratings mean:

    C = Appropriate for Early childhood
    E = Appropriate for Everyone
    E 10+ = Appropriate for Everyone aged 10 and older
    T = Appropriate for Teens
    M = Appropriate for Mature Adults

  3. Within your temporary shopping list, try find a game that's built from the latest movie release. Little people love the new animated movies put out by Disney and Pixar, and they really enjoy re-living precious moments in the movie in a video game. That's why when these movies come out on DVD, their producers put a few games in the "Special Features section" of the CDs.

  4. If you can't find a game that's built from a movie that the child likes, try to find a game that centers around a popular cartoon character or one that attempts to educate.

  5. If you still can't find one that resembles something that you've heard this particular person rambling on about, first give yourself a slight slap on the hand. You should pay better attention. Then point your browser to the nearest Blockbuster or Hollywood Video website. Follow the same procedure outlined in steps 1 - 3 only this time, elect to rent 5 or 6 games that look appealing. This will give your tot a chance to play some games and select one to keep forever while you return the others.

  6. If on the other hand, you did find a game in step 3 or 4, you can either check out online, or drive up to the store and buy it there.


They say you can't judge a book by its cover, but the illustrations on the both video and pc game cases do a pretty good job of representing the game's content. So if you see an illustration of fighting warriors, chances are the game will be more violent than you prefer. If on the other hand, you see an illustration that resembles what you'd see on the cover of an interesting children's book, the game should be age appropriate.

How To Back Up Files Correctly

Throughout the world of computers, it’s simply amazing just how many people are scared to death of losing their data. Most of those who are scared, don’t give a second thought to backing up their data. Even though the thought may be the same, most people are worried more about losing their data than actually backing it up - which can prove to be a downfall in the face of disaster.

The process of backing up files is done by using servers, floppy disks, CD, DVD, external hard drives, or other methods to keep the data protected. This way, when something happens to your hard drive and you lose your information, you’ll have the information backed up so that you can easily access it again. Data that is important, such as tax files or business records should always be backed up, to ensure that nothing happens to it.

If you are using Windows as your operating system, it will be a lot easier to back up your files. Windows XP has a back up facility in it, so that it can make things a lot easier when you create your backups. If data that is stored on hard drives with XP becomes lost, Windows will immediately fetch the file from another drive or area where it has been stored as a back up. This is a very useful technique, although it still has to be practiced to ensure that you understand how it works. Although it may be very useful, it isn’t as safe as other options.

In order to back up your data and programs in a safe and efficient manner, you’ll need to use some of the more reliable methods, such as external hard drives or servers. Offsite backups are great as well, as the data you backup isn’t left around your office, it is instead entrusted with a company who will ensure that it stays protected.

No matter which method or methods you have decided to use for backing up your data, you’ll be happy to know that they are all easy to use. CD and DVD backups are easy to create, all you need is the software installed on your computer to create the backups with. Servers are easy to use as well, all you have to do is upload your data to a server, then log into the server anytime you need to have access to the data.

All in all, creating backups of your data and information is the perfect way to ensure that you always have it in the event of a disaster. Disasters can happen at any time, which is why you should always back up your data anytime you have something new or something that you haven’t backed up yet.

Understanding Operating Systems (OS)

Every new computer that's brought home from the store has an operating system installed onto it. But what most new computer users don't realize, is that without an operating system, that computer would be a simple shell of possibilities. A powered computer lacking an operating system wouldn't display anything more than a bunch of confusing text messages that describe the computer's boot process. At the very end of this process, the computer looks for an operating system and if not found, it will prompt the user to tell it where it is.

Earlier computers didn't have an operating system and if you have experience with the computers of the early eighties, you'll remember that most to them didn't even have a hard drive! These old computers booted an MS-DOS type operating system from drivers stored onto a floppy disk, and in order to use a program, users would remove the boot floppy and then insert a new floppy that contained the program. The floppy not only stored the program (word processor, spreadsheet, etc.), it also stored the drivers that the program needed to communicate with the computer's hardware. As you can imagine, the cumbersome process of switching from floppy to floppy prompted the birth of the operating system.

An operating system is a software program that controls how the computer's hardware (and installed software) works. It manages the activity of every component and then displays that activity as a user-friendly interface (GUI). It keeps track of where things exist on a computer's hard drive as well. But perhaps most importantly for the end-user, the operating system is responsible for translating commands issued with a keyboard and mouse into binary code (010110101 stuff) that can communicate with a set of speakers, a printer, a scanner, and more.

With an operating system installed onto a computer's hard drive, users no longer need to boot a computer with a floppy disk, nor do they need to run programs from a floppy disk. All the drivers of a program are stored onto the computer and used whenever a program is started.

Apple's Macintosh computer was among the first of a couple systems to establish a user-to-hardware relationship through a user-friendly interface. Today, we have quite a few operating systems. Some of the more popular ones are Windows Vista, Mac OS X, ZETA, IBM, Unix, and Linux. But even still, operating systems have extended onto to non-computer devices such as game consoles, portable music players, and PDAs. Regardless of the device, the operating system installed onto it serves the same purpose across the board: to enable user-to-hardware communication.

When you think about upgrading your computer to a new operating system, be careful to make sure that you have the necessary hardware components. We tried to upgrade one of our Windows 98 machines to Windows XP, but we were cautioned that the former may not be hardware compatible with XP technology. Apparently, the Windows XP operating system requires components that weren't developed at the time Windows 98 was distributed and if we were to install Windows XP on this machine anyway, the new operating system would look for hardware that the computer didn't have. And that would be an instant recipe for failure.

Also be careful about installing operating systems that are incompatible with existing hardware. The hardware of Macintosh computers is extremely different from the hardware of Windows computers and under no circumstances will a Windows operating system work on a Macintosh machine!