How to Secure Your Computer Using Free Tools and Smart Strategies
Transcription
How to Secure Your Computer Using Free Tools and Smart Strategies
How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Version 1.08 -1- © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course This is NOT a free eook and does not come with resell rights. If you’re interested in making money with this book see page 74. Disclaimer of Warranty / Limit of Liability Disclaimer of Warranty: The authors of this material used their best efforts in preparing this material. The authors of this book make no representation or warranties with respect to the accuracy, applicability, completeness or the contents of the book. The authors disclaim any warranties (expressed or implied) for any particular purpose, or any consequences arising from the use of this material. The authors shall in no event be held liable for any loss or damages. You are advised to seek the opinion of a legal professional when dealing with business matters. The content of this ebook and bonus materials are protected by International copyright laws and may not be reproduced, redistributed, resold without the prior permission of the original authors. The authors of this material did not develop any of the software programs mentioned within this book and bonus materials. Should you have an issue with a business or product, your only recourse is to contact the company or developer directly. Trademarks: All trademarks and product names used in this book and bonus materials are properties of their respective owners. Windows and Windows XP © Microsoft Corporation. Regarding Internet Links: An active web connection is needed to view links recommended in this book and bonus materials. While every effort has been made to keep the links updated at the point of writing, the authors cannot be responsible for any outdated or broken links. All links are for informational purposes only and are not warranted for content, accuracy or any implied or explicit purpose. We strongly recommend that you make a full computer backup before changing any system settings and installing programs. -2- © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course About the Authors Doug Partridge Doug Partridge has been in the Information Technology field since 1990 and has worked in employee and consulting capacities from startups (during the infamous "dot bomb" era) to global, multi-national companies. He received his MCSE certified (Microsoft Certified System Engineer) in 1997, and has spent the past four years working in Information Security and as an Email Administrator for Nestle. Kevin Ryan Kevin Ryan has a decade of experience in the Information Technology industry. Holding the premiere Information Security certification (CISSP), Kevin has worked in Information Security at a leading global 100 company for the past seven years. -3- © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Special Message to the Reader The Internet today is comprised of some unquestionably great minds, and what’s their mission? For some it’s simple: to figure out every possible way to exploit the average computer user. These shadowy figures exploit people’s trusting nature, and in most cases, lack of adequate computer security to gain unauthorized access and infect computers with Spyware and other malicious threats. The environment on the Internet today requires paying very close attention to what information comes in and out of your computer. You can have every security tool imaginable protecting your machine, but without a basic knowledge of the current threats, to some extent you’re still vulnerable. Why We Wrote This Book It was these thoughts that prompted me to call my long-time associate in the Information Security field, Kevin Ryan. It turned out that Kevin shared many of the same thoughts about the poor state of Internet security. While the average IT professional knows exactly how to protect his computer and practice “safe computing,” recent Internet studies show that general security awareness is desperately lacking. This is truly unnecessary; with just a little bit of information and the right tools, anyone’s computer can be just as secure as those of computer professionals. With the number of people using “always on” broadband Internet connections on the rise, this information is especially vital. With this goal in mind, we sat down and outlined all of the information that became this ebook. Our objectives were simple: -4- © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course With high-speed Internet users in mind, write an easy to understand, step-by-step “how to” security book (note: for reasons explained later in the book, dial-up users would do well to follow the same steps). Highlight effective free security tools and services, and show how to use them. More than simply mention tools – explain not only why you need them, but how and why they work. Share “smart strategies” to protect your private data – and reduce the risk of threats like online Identity Theft. If you follow these steps, after reading this book and bonus materials, you will have a secure computer now, and you’ll know how to remain protected against future threats. You will have a keen eye for “Phishing” (email-based scams designed for identity theft) and other email-based scams. When making an online purchase, you’ll know if you’re in a “safe” environment or not. Most importantly, you’ll be armed with knowledge and that is a vital component of security. We sincerely hope you enjoy this holistic Internet self-defense course. Sincerely, Doug & Kevin P.S. A little bit about “I,” “we” and “ours.” As you know this book was written by two people. When we split up the chapters, we chose to write in the first person. At the same time, you’ll see phrases like “our eBook” and “we hope,” usually this is when referring to this work as a whole. Hopefully you don’t find this distracting. -5- © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Table of Contents About the Authors....................................................................................3 Doug Partridge.....................................................................................3 Kevin Ryan ..........................................................................................3 Special Message to the Reader ..............................................................4 Table of Contents ....................................................................................6 Introduction – The “Perfect Storm” of Modern Day Computing..............8 Another “Perfect Storm”.......................................................................9 Remainder of this Book .....................................................................14 Punch #1 – Personal Firewall................................................................16 What is a Firewall, and Why Do You Need One?..............................16 Your Firewall is “Muscle” on Your Side .............................................17 The Truth Exposed Through Security Scans.....................................18 Sygate’s Personal Firewall ................................................................23 My Security Scans After Installing a Firewall.....................................26 Zone Alarm ........................................................................................28 Doesn’t Windows XP Have a Built-in Firewall? .................................30 Punch #2 – Anti-Virus............................................................................31 Malware – What is it? ........................................................................31 Anti-Virus Programs...........................................................................36 AntiVir Anti-Virus Software ................................................................38 AntiVir Configuration Tips ..................................................................38 Virus Hoaxes .....................................................................................42 Punch #3 – Adware & Spyware Removal .............................................44 Spyware.............................................................................................45 How Spyware Gets on Your Computer .............................................47 Signs That You’re Infected ................................................................49 Spyware Removal Tools....................................................................50 -6- © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course The Benefits of “Real-Time” Protection .............................................53 A Moment for Security Reflection … .....................................................55 Punch #4 – Windows Security Settings ................................................56 Creating A Password-Protected Log-on ............................................56 Creating A Password-Protected Screensaver ...................................59 Creating Private Folders ....................................................................60 Disable Unused Services...................................................................61 Stop File and Print .............................................................................62 Stop the Messenger Service..............................................................64 Windows Patches and Updates.........................................................66 Windows Web Updates .....................................................................67 Download Summary ..............................................................................71 Bonus #1 – Online Identity Theft: Self-Defense 101 .........................72 Bonus #2 – Email Security & Smart Strategies .................................73 Bonus #3 – Smart Strategies for Reducing Spam.............................73 Parting Thoughts ...................................................................................74 Recommended Reading........................................................................75 -7- © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Introduction – The “Perfect Storm” of Modern Day Computing Note: this chapter provides background information and general commentary on the current state of security on the Internet. Reading it will provide a good foundation for the rest of the book, however, if you’re eager begin securing your computer – jump to the next chapter. The condition of modern day computing is well illustrated by the George Clooney and Mark Wahlberg tour de force, “The Perfect Storm.” For the benefit of those who missed this movie, it’s a riveting tale based on real events that took place in October 1991. The factors responsible for this perfect storm are so rare they are said to occur, maybe, once every hundred years. In October 1991, three significantly powerful storm systems came together creating one apocalyptic force. This storm caused winds in excess of 125 miles an hour, and created ocean waves over 10 stories high. Few people on earth had ever witnessed such a cataclysm. Tragically the six members of the commercial fishing boat, “The Andrea Gail” never got the warning and went straight into the center of this tempest. Now how could George Clooney, Mark Wahlberg and a fiercely powerful storm back in 1991 possibly relate in any way to modern computer security? Well, it illustrates how powerful forces can come together to create a threat much greater than the individual parts. I’ll resist the temptation to go further with this illustration: imagine you and your computer are like the Andrea Gail, out on the open and angry sea, danger lurking ‘round every corner! That would just be too much. ☺ -8- © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Another “Perfect Storm” Here are the four factors creating our “Perfect Storm” on the Internet today: Factor One – the Open Nature of TCP/IP TCP/IP is the protocol your computer uses while on the Internet. What is a protocol? Sometimes protocols are likened to languages, but they’re really more like “rules” computers must follow when attempting to “speak” to each other. This idea can be illustrated by a common every day task – making a phone call. You want to talk to your friend; you initiate the process by dialing their number. When your friend answers with “hello” or “what’s up?” or “who this!?” – then you would normally reply with your name. The connection is successfully established on both ends, and you and your friend go with the conversation. This simple exchange is similar in concept to how computers using TCP/IP start conversations with each other. These “connection conversations” are going on behind the scenes every time you do something ordinary like view a web page or send email. The “open nature” of TCP/IP dates back to its origins in the mid-to-late 1960s. The whole purpose of TCP/IP was open communication – not only between different computers, but also between different types of computers. In this way, TCP/IP has been, and continues to be a huge -9- © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course success. Right now, people using Windows, Macintosh, Unix, Linux, and other systems, are all on the Internet using this one protocol – pretty amazing when you think about it. You’re forgiven if you’re wondering how any of this creates a “security threat.” The important thing to know about TCP/IP, and the reason why it contributes to our perfect storm, is this: it doesn’t have a native, or we could say, “built-in” concept of security. What exactly does this mean? TCP/IP was designed for the purpose of sharing and exchanging information between groups that basically trusted each other. Going back to our phone call analogy, TCP/IP has no built-in method for evaluating the call or even the caller to determine if this is someone you want to communicate with. TCP/IP merely facilitates the request. To sum up our first contributing factor – everyone on the Internet is using a communication protocol with no built-in concept of security. Factor Two – Many “Ain’t it Cool” Windows Features Around the time of Windows 95 with the introduction of their new user desktop (does anyone remember Windows 3.x?), Microsoft (MS) put a strong emphasis on being more “user friendly” (and by extension dominating the desktop market). MS developed many new features into Windows, and they were so sure everyone would want them that “out of the box,” they were enabled. What some people call features others call security holes. Whatever you want to call them – these “features” have been exploited to no end by viruses and worms over the years. - 10 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course One good example of this in action is the security vulnerabilities in Microsoft’s web server software called “Internet Information Services” (IIS). Two well-publicized worms, Code Red and Nimda, easily took advantage of security holes in IIS and spread with ease across the Internet. ISPs and web admins had a stressful few days as they attempted to get their servers under control. However, the real awakening here is the large number of home users running IIS (web server software) on their computers. Even though most people had no need for it, many were running Microsoft’s web server software on their home Internet-connected computers. Non-secured home users running IIS played a big part in spreading these worms. Factor Three – The Rise of “Always On” Internet Connections Broadband or “high-speed Internet access” falls into two major categories: DSL & Cable Modem. Just how many people use broadband connections? As of September 2004, the number is estimated to be over 48 million according to the FCC. Now we all love broadband, and if you’ve switched over from dial-up, you probably couldn’t imagine going back. However, there’s one key element introduced by broadband that makes exploiting your system much easier. It’s your IP address. An IP address is the unique address assigned to your computer by your Internet Service Provider. Having an IP address is mandatory for you to use the Internet. It’s how you’re able to send and receive information. So, you must have one – there’s no getting around it. - 11 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Back in the dial-up world, you would receive a different IP address every time you connected (or dialed-up). When you’re using a broadband connection, you’re likely to have the same IP address for long periods of time. If you leave your computer turned on, you now have a computer with a “live” Internet connection and a non-changing IP address. This makes your computer an accessible and “stationary” target for everything from self-spreading worms, to hackers attempting to break into your system. With a broadband connection, a determined hacker may have several days or even weeks to work on getting into your computer. One other note, even if your IP address changes, once your system has been compromised, hackers can install notification programs on your computer to contact them with your new IP address. Nice, isn’t it?! The point I’m emphasizing is this: broadband users are especially at risk. However, I want to address one myth right now – it’s the idea that you’re not at risk if you use a dial-up Internet connection – WRONG. The SANS Institute (a security research group) published a report stating that an unprotected Windows XP system can be discovered and compromised in as little as 20 minutes (update: the current figure is 16 minutes). The bottom line, if you ever connect to the Internet – you need to be concerned about security, and take steps to secure your system. Let’s add one more factor to our “Perfect Storm” contributors. - 12 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Factor Four – People Looking for Vulnerable Systems Yes, we need one more element to tie this all together – to create a true ominous threat. This is one area where I’ve noticed a shift in attack methods over the years. A few years back the thinking was, unless you’re the government or a large corporation (especially one viewed as “world dominating” or “evil” by hackers at large), no one would be interested in breaking into your computer. Hackers are still interested in going after high profile targets; they’ve just invented new and creative methods to accomplish this task. A common attack launched against a targeted company involves flooding their website with more traffic than the site can handle, which will ultimately take it “off the air.” This is usually done by what’s called a “distributed attack.” This means that the attack is coming from thousands, maybe even millions of computers simultaneously. If you’re someone like Amazon or Ebay, downtime caused by such an attack is especially devastating and costly. Now, you’re probably reading this wondering why a “distributed attack” should of interest to you? Without your knowledge, your computer may have participated in the last big distributed attack! The key here is that the instigators of such attacks realized that instead of using their own computers to launch attacks, it’s better to find and infect an army of “zombie” home computers to do their biding. Not only is this extremely effective, it makes tracing the true source of the attack much more difficult. Who’s interested in getting on your computer? - 13 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course You’re looking at everyone from criminals actively seeking account information to commit fraud – to people looking for available systems to use in distributed attacks, as mentioned above – to beginning hackers who don’t intend any damage, they just want to see if they can get on your system. Whatever the motivation, you don’t want any of them on your system! Examining these “Perfect Storm” factors individually as we have should really impress upon you the urgency of taking proactive security measures immediately. Remainder of this Book The remainder of this book is organized by priority. We are assuming that you have not taken any steps to secure your computer. The next 4 chapters are referred to as the Mandatory 1-2-3-4 Punch. These steps are more than merely a “good idea,” they are mandatory steps you must do to secure your computer. Why? Without doing these steps, you’re practically guaranteed to be hosting everything from viruses and worms, to other malicious programs designed to exploit Windows security holes. If you already have one or more of these in place, wonderful. You may still want to skim through the chapters to see if there are any pointers you can use. Along with mentioning “real world” examples, where we can, we’ll highlight well-regarded and effective tools available for your use. - 14 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Enough discussion, it’s time to fight back. - 15 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Punch #1 – Personal Firewall What is a Firewall, and Why Do You Need One? Let’s start with “why you need one” first. Once you know this, you’ll absolutely want one now. In order to understand why you need a firewall, we need to talk just a little bit more about the inner-workings of TCP/IP. You already know what an IP address is; it’s the unique number identifying every computer on the Internet (they look something like this “192.168.2.124”). In addition to IP addresses, TCP/IP uses something called “ports” as a communication mechanism. We won’t delve too deeply here – but having some background knowledge will prove useful. A port is what it sounds like: a portal – a potential entry point for data in and out of your computer. Every program uses a port when communicating with another computer. For instance, your email program uses one port to send, and a different port to receive. A web server “listens” for web requests on a port, and your web browser uses the same port to request a web page. When a program is using or “listening” on a port – that port is said to be “open.” This means that if a request is directed to that port, your computer responds to the request. The important thing to know about ports is that every open port on your computer is a possible entry point for an attack. How many ports are there? Only 65,535! Hackers use programs called “port scanners” to scan entire blocks of IP addresses to see: 1.) how many computers they can find and; 2.) how many have open ports? - 16 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Port scanners are extremely effective at discovering this information. To relate this to the real world, imagine if a burglar, from the privacy of his home, had the ability to scan entire city blocks to see not only who is home, but also which doors and windows are unlocked! Makes you goose-pimply just thinking about it …. What if a port scanner detects an open port? Usually one of two things, either an attack is launched immediately, or this information is logged for later use. Remember, with a broadband connection, you’re likely to be at the same IP address for quite some time. Aside from being extremely effective, port scanners are readily available on the Internet and don’t require much technical experience to operate. This is a good place to mention that it’s not necessary to understand all of the inner workings of TCP/IP, ports, and port scanners. For now, what you should take away from this introduction is that exposed ports on your computer present a security exposure. This brings us to the remedy, a personal firewall. Your Firewall is “Muscle” on Your Side A firewall acts as a powerful security checkpoint or boundary between all data coming in and out of your computer (note: we’ll also talk about why you want to know about data leaving your computer). To put it another way, it examines all data coming in and out of your computer, and compares this against its “firewall rules” (we’ll also explain rules a little later), and then decides if the traffic can proceed or should be blocked. Remember, the “open nature” of TCP/IP provides no such functionality. Without a firewall, your computer will respond to connection requests without a second thought. Make sense? - 17 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course That’s basically how a firewall works – but we should really focus for a minute on what this actually means for you. Because a firewall intervenes before your computer can acknowledge a request for information, your computer will appear invisible to port scanners. People searching for computers to exploit will not even know your computer exists. We’ll see this demonstrated later in this chapter. Another benefit is that now you must grant programs permission to use your Internet connection. The truth is, without a firewall in place, programs both legitimate and otherwise could be making outbound connections using your Internet connection at their will, and you would never know about it! The Truth Exposed Through Security Scans Illustrations usually help drive home a point. So think of your computer as an expert and shameless flasher – always ready to expose information – information about you. OK, that illustration was over the top.☺ Naturally, by this time you’re probably curious about your own computer’s security – and how many open ports you’re exposing right now. Fortunately this information is easily obtained using free security scanning websites. How do they work? The website will record your IP address and launch a port scan of your computer and display the results. A note of caution: since security information about your computer could be valuable information in the wrong hands, I would - 18 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course only use a reputable website for such a scan. The two sites I use in this chapter are both highly regarded. In order to demonstrate the virtues of a firewall, I thought it would be interesting to load a new installation of Windows XP, and then run a scan before and after installing a firewall. Sygate Security Scan For the first scan, I’ll use Sygate Security Scan. In case, you’re unfamiliar with Sygate, in addition to security scans, they make an excellent personal and corporate firewall. Sygate’s site offers several free scans ranging in duration from 30 seconds to 45 minutes. I usually run the “Quick Scan” and the “Stealth Scan.” Both scans take about 30 seconds and provide a good overview of your security level. - 19 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Sygate security scan before installing firewall. As I expected, without a firewall in place, I’m exposing several open ports (much more than can be seen on the screenshot). As the last box shows, in addition to open ports, my computer responds to ICMP or “Ping” requests. What’s Ping, and why should you care? The first thing that may come to mind when you read “Ping,” might be the sonar device used by submarines. One submarine will send out a - 20 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course sonar signal, and based on the response (or lack of) they know if there’s another object in the water, and how far away it is. The Ping command works similarly in concept, except its sending out data and not a sound signal. Ping is a useful TCP/IP command used to test connectivity between computers. However, Ping reveals useful information to a hacker. If fact, usually the first thing a port scanner does is Ping an IP address to see if a computer responds. Not only does a successful Ping response confirm there’s a computer at the IP address, it usually reveals what operating system you’re running: Windows, Macintosh, etc. This is extremely useful information to someone planning to launch an attack against you. GRC Scan I like to confirm my scan results using another scanner. Gibson Research Corporation provides several free scans. You can’t link directly to the page running the scan. Just keep clicking on “Sheilds Up” and you’ll get there. From GRC.com, I usually run the “Common Ports” scan. The results from this scan are below. - 21 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course GRC security scan before installing firewall. This does not look good at all. Both of these scans reveal that my computer is exposing information – namely open ports to the Internet. As we’ve already discussed, open ports present a huge security exposure. You may be surprised to learn that closed ports are less than desirable as well. Say what? If open ports are horrible and closed ports are bad too – what else is there? I hinted at it earlier in the chapter, but I’ll explain it in detail a little later in this chapter. For now, let’s get our firewall installed. - 22 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Sygate’s Personal Firewall I’ll mention another great firewall at the end of the chapter – for this exercise I’ll use Sygate’s Free Personal Firewall. This is a top-notch firewall that also checks your system for malicious software programs! Not only is this a great product, it’s easy to install and use. In fact, during installation, you can accept all default options. Creating Your Firewall Rules (a.k.a. “Program Control”) Once your firewall is installed – you will begin creating your firewall rules – i.e. which programs will be allowed to use your Internet connection. You’ll need to do this for every program before it will be allowed to make an outbound connection. As your firewall detects programs attempting to make outbound connections – you’ll be prompted with a message like the one shown below when I started Internet Explorer for the first time. Program control is absolutely essential for security. Sygate alerts you when a program attempts to use your Internet connection. Notice that the message clearly tells you the name of the program – and the destination of the connection (in this case, my.yahoo.com). You have the option of answering Yes or No; clicking the checkbox makes - 23 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course your choice permanent (meaning that you will not receive this prompt again for the same program). There’s a common group of programs that you’ll probably immediately OK, and make the choice permanent – e.g. web browser, email, and instant messaging programs. All of those programs obviously need to use your Internet connection. Invariably, you will see programs attempting to use your Internet connection, and it will surprise you. Be very careful when allowing programs “free reign” to your Internet connection – especially if it doesn’t make sense to you that this program wants to make an outbound connection. At the same time, you don’t want to be too strict here – for instance, your Anti-Virus program will need to connect to the Internet to download updated virus definitions (this is discussed in the more detail in the AntiVirus chapter). Not allowing this action to occur will mean your AntiVirus program will quickly become outdated in a short amount of time, and significantly weaken its usefulness. Similarly, programs may be configured to automatically check for updated versions. This is usually a good thing to allow. If in doubt, you may want to allow the program to make a one-time outbound connection – i.e., do not check the box to make your choice permanent. In addition to protecting your Internet connection through program control, Sygate provides an additional benefit by verifying that the program you allowed has not been replaced by another version. - 24 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Hackers in an attempt to gather information about your computer, or to make your computer unstable, may try to replace a trusted program on your system with a “hijacked” version. When Sygate detects a change in a program you accepted – you’ll see a notification like the one below. Sygate's alert of a change in a previously trusted program. In this case the change is legitimate; Yahoo Messenger was upgraded to a newer version. Be very concerned if you see a message like this for no apparent reason. Note: after running Windows updates, it’s not unusual to see messages like this for many Windows related components (we explain Windows updates in our Windows Security Settings chapter). As an extra security measure, you can password protect this program. The main reason for this step is to protect your settings from being changed by others (either mistakenly or maliciously). You even have the option of forcing the password to be entered before the program can be shut down. - 25 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course To enable this feature, go to Tools Options – look for the “Password Protection” area at the bottom. My Security Scans After Installing a Firewall Let’s see how our security scans look after loading Sygate Personal Firewall. Getting back to our earlier question about open and closed ports – we know open ports are horrible – closed ports while better, still aren’t what we want. What else is there? What we’re after is often illustrated in futuristic sci-fi movies. We’re all familiar with the “cloaking device” on spaceships. They allow a spaceship to appear invisible to the enemy’s scanners. In fact, a cloaked spaceship can fly right past an enemy ship, and it wouldn’t be detected. You have seen this before, right? Hope I didn’t lose you with that one. You don’t want any evidence that your computer is on the Internet. All it takes is one port, open or closed, for your computer to be discovered by a port scanner. What you’re after is what’s commonly called “stealth mode.” “Stealth mode” occurs when your firewall blocks all unauthorized connection requests to your computer. By virtue of this feature, it’s impossible for an outside party (e.g., someone running a port scanner) to determine the status of any of your ports (either open or closed). Even better with a properly configured firewall, outside parties will find no evidence that your computer is on the Internet. This “stealth mode” is only achieved by using a firewall. Now that we know what we’re after – I’ll run the same scans on my firewalled computer … - 26 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Sygate security scan after installing firewall. - 27 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course GRC security scan after installing firewall. Both scans confirm that all port information is hidden, and I’m no longer responding to Ping requests … Ladies & Gentleman (and whomever else may be reading), we have a fully stealthed computer! The best defense against an attack is avoiding detection entirely. Zone Alarm Another good free firewall is Zone Alarm from Zone Labs. In fact, Zone Alarm is probably the most well known free firewall. Between the two free versions (Sygate & Zone Alarm), I think Sygate’s offers more. For - 28 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course instance, Sygate’s free firewall allows you to set a password to protect your settings – while the free version of Zone Alarm does not. It’s worth mentioning that Sygate and Zone Alarm are not the only free firewalls available. I recommend these two for the following reasons: they’re both highly regarded and well respected in the industry, and they’re un-expiring and truly free versions. Note: some claim to be “free” versions but are really free trial versions, and will make you buy the full version after the trial period expires. Zone Alarm Pro is an excellent full-featured firewall that also adds incoming/outgoing email protection. Zone Alarm Pro is not free, so why do I mention it? Throughout the book, where possible, we’ll use the free versions in our examples and screenshots, and we’ll also mention the full versions for a few reasons: 1. The free version is usually a “lite” or stripped down version of the full version. Additionally, the free versions are usually only free for personal use. Using the program in a business or commercial setting usually requires the purchase of a licensed or full version. 2. While the various software companies are kind enough to provide useful free versions, at the same time, they’re in business to make money and want you to buy their full version. To entice you, they often include useful features and benefits only available in the full version. Sometimes technical support is only available in the full versions. In some cases, the additional benefits make it - 29 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course worth buying the full version, even for personal use. Otherwise, the free version more than adequately does the job. 3. Finally, some people just can’t accept that a free program is useful. For those people, we’ll highlight some key benefits found in the full version. Doesn’t Windows XP Have a Built-in Firewall? Yes, and it’s turned off by default. If you don’t want to load another firewall – please enable this one. Alternately, if you have a brand new system, enable the Windows firewall until you can get Sygate or Zone Alarm. The Windows XP firewall is better than none at all, and it’s a welcome addition to Windows. However, security-wise it’s limited. For instance, Sygate and Zone Alarm monitor both incoming AND outgoing traffic. The Windows XP firewall only monitors incoming traffic – in other words, it doesn’t provide program control. As I mentioned earlier, you want to know exactly which programs are making outbound connections. Unauthorized programs using your Internet connection pose huge security risks. One other limitation: since it lacks “program control,” you will not be alerted if a trusted program is replaced with a hijacked version. TIP Never run multiple firewalls simultaneously. Doing so will not provide added security, and will likely cause system instability and/or crash your computer. Always disable or uninstall one firewall before loading another. - 30 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Punch #2 – Anti-Virus Before I mention any Anti-Virus programs by name, I think it’s useful to talk about what they protect against and how Anti-Virus programs work and are kept up-to-date. Malware – What is it? Let’s begin by discussing what is referred to as “malicious code.” This destructive programming code comes in many forms and is transmitted in many ways. In fact, there are so many types of programs designed with malicious intent that a new term was required to describe them, “Malware.” Malware, meaning “malicious software,” is not any one thing but describes an intention. Any malicious program that secretly copies itself onto your computer can be called Malware. It can take many different forms and execute a wide variety of destructive tasks, from harmless but annoying taunting (e.g., playing sound files with a pornographic or rude message), to hard drive failure (loss of data), to the most serious, identity theft. Some of the most popular and widely publicized invaders are the Virus, Trojan Horse and Worm. Let’s examine each in more detail. Virus A computer virus is a program or programming code that replicates itself by copying to another program, computer boot sector (a small program that tells your computer how to load its operating system), or - 31 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course document. Viruses can be sent as an email attachment, or reside in a downloaded file. Once it’s downloaded to your computer, the malicious code can begin its destructive phase. Viruses have varying agendas and execution schedules. Some will begin the attack immediately, while some will wait for a trigger such as a time, date or running of a program. The destruction to your system can vary. Some viruses will erase all data on your system requiring you to reinstall Windows, while others may simply send irritating pop-up messages taunting the user. They can also attack specific programs such as Microsoft Word and Excel by scrambling words and numbers. By nature a virus will copy itself to files on your computer and/or programs. Some may self-propagate by using a worm (discussed below) to send itself as an attachment to other computers. Below are some of the more famous viruses and the destruction they caused. Notice how the recent viruses are taking less time to infect while causing greater destruction. - 32 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Virus Year Type Time to become Estimated prevalent damages Jerusalem 1990 Boot Sector 3 Years $50 million Concept 1995 Word Macro 4 Months $60 million Melissa 1999 Email enabled 4 Days $93 million to word macro I Love You $385 million 5 hours 2000 Email enabled $700 million Visual Basic script/Word macro Clearly the new generations of viruses are getting more intelligent and destructive. They use worms to self-propagate and infect at incredible rates. Not only will they infect your computer but some can read your email address book and send themselves as an email attachment to all of your friends, family and business associates. This is an extremely devious and effective transmission method. Why? The recipients likely will not suspect a virus, and open the infected attachment because after all, they believe you sent it! Now they are infected, and the cycle begins again. It’s truly a “gift” that keeps on giving. I’m sure you see the potential for great destruction. What you also need to know is that new viruses are being created daily, which makes not only running an Anti-Virus program, but also keeping it updated and configured properly absolutely mandatory. Note: this is covered in more detail later in this chapter. - 33 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Worm A worm is a self-replicating virus. However, unlike the virus, the primary job of a worm is to copy itself across the network to every available (unprotected) computer. The network can be a home office, large corporation or the Internet. The troubling fact is that a worm can carry a payload (virus) and distribute it to all of its targets. Once the worm has infected its victim – it will start looking for available network connections on the newly infected computer. To get other computers to respond, usually it will send out network broadcasts. This will reveal which computers are vulnerable. When the infected machine finds a vulnerable computer, the worm will make new connections, infect the remote computer and start the cycle all over again. You can imagine what this waste of network traffic (bandwidth) does to the speed of legitimate network traffic. In some cases the excess traffic is so extreme; it will practically bring the network to a grinding halt. This is called a “denial of service” (DOS) attack. Hackers have used this method to shut down government and large corporate websites. You may remember some of the more destructive worms such as Love Bug, Code Red, Nimda and Blaster. Code Red at its peak infected an estimated 2,000 computers per minute and eventually infected 359,000 machines. Once again, you can see the potential for infection. Remember the Sans Institute Statistics? An unprotected computer can be infected within 16 minutes. This very real threat is out there actively searching for vulnerable computers; let’s make sure you’re not one of them. - 34 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Trojan Horse A Trojan horse (commonly abbreviated as “Trojan”) is a program that infects your computer and allows a hacker to run hidden tasks without your knowledge. Here’s a bit of trivia for you. Where does this odd name come from? The term comes from the Greek story of the Trojan War, in which the Greeks give a giant wooden horse to their foes, the Trojans, seemingly as a peace offering. After the Trojans bring the horse inside their city walls, Greek soldiers sneak out of the horse's hollow belly and open the city gates, allowing their compatriots to pour in and capture Troy. Trivia aside, this is the kind of Malware everyone should be most worried about. The program works behind the scenes and waits for instructions (either from a hacker or from other infected machines). Symptoms of a Trojan-infection include files or programs opening or closing automatically. Sometimes hackers will display obscene graphics that cannot be closed until the computer is shut down. In something reminiscent of the movie “Poltergeist,” people reported that their CD drive tray would open and close for no apparent reason. In some cases Trojans give hackers the ability to activate web cameras so they can watch you without you knowing it! I know it sounds like horror movie material, but it’s real. Because the Trojan horse is a virus, it can be spread in many different ways including the most popular method, email attachments. Another popular way is attaching it to a legitimate file, and placing it on the - 35 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Internet for download as a shareware or freeware program. Usually, it’s disguised as something fun like a game or other free download. Once this file is downloaded, the Trojan is installed in the background and is sitting there waiting for a hacker to connect and take control of your computer such as the infamous “Sub Seven” Trojan. This point is repeated throughout this book – you should never open a mail attachment you’re not expecting – even if it’s from someone you know. The reason I went through these detailed explanations is this: complacency is a big problem when it comes to security on the Internet. I believe that once a person truly understands the risks they face; they’ll be diligent and take the necessary steps to protect their computer. Anti-Virus Programs Let’s talk for a bit about how Anti-Virus programs work. What are Virus Definitions? As mentioned before, merely running an Anti-Virus program on your computer is not enough. To truly be effective, your Anti-Virus program needs to be configured properly, and have a current set of virus definitions. What are virus definitions? Anti-Virus vendors analyze each new virus to find its programming code or “signature.” This new information, along with older virus signatures is packaged together in what’s called virus definitions. Simply put, virus definitions are a listing of known viruses. During a virus scan, your Anti-Virus program compares files on your computer against its virus definitions. Since new viruses practically come out daily, you can see why it’s critical to always have up-to-date - 36 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course virus definitions. In fact, not having up-to-date virus definitions, in time, will make your Anti-Virus program almost entirely useless. Studies show that many people do not update their definitions frequently enough – in some cases people’s definitions are many weeks, if not months old. In these cases, the security they may feel by running an Anti-Virus program is truly a false sense of security. There is absolutely no need for this to happen. How often should you update your definitions? Since new definitions are released almost daily, I would check for updates every 1 to 2 days, and at a minimum, once per week. Fortunately this process can be automated, so you don’t have to constantly remember to do this. The point to (over) emphasize again: always have up-to-date virus definitions. It’s absolutely critical for security. Understanding Virus Scans What happens when a virus is found? Anti-Virus programs will attempt to handle this in 1 of 3 ways. Repair (if it is able), delete, or quarantine. I recommend first attempting a repair. If the file can’t be repaired, delete it. How do Anti-Virus programs “repair” a virus? It just means your Anti-Virus program will remove all traces of virus code from the file. “Quarantining,” means moving the infected file to your Anti-Virus program’s quarantine folder. After each new virus definition update, your Anti-Virus program will try to repair the infected file. Most of the time, I find they are beyond repair and are better off deleted. Later in this chapter, I will show how to configure these - 37 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course program settings. How often should you run a full system scan? At least once a week. Personally, I run a full virus scan about three times a week (yeah, I’m a little on the paranoid side). AntiVir Anti-Virus Software There are very good personal Anti-Virus programs available. One I recommend is called AntiVir. This program is free for personal use and provides free updates and virus definitions. AntiVir is especially good at finding Trojans, and has been known to find things other scanners missed. Like all good Anti-Virus programs, AntiVir includes a background “agent” to provide real-time virus protection. Without such an agent, viruses would only be discovered during a virus scan. An agent can discover and remove a virus the moment it lands on your system. AntiVir Configuration Tips Below is the first window you will see after installing the program. You can see that you can simply check the box corresponding to the drive you want to scan. The screen shots following are recommendations of how you can configure the scan; handle viruses and schedule virus definition updates. All Anti-Virus programs have the functionality described below in case you already have one installed on your computer. - 38 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Configuration 1 AntiVir main window. Configuration 2 What to scan. Select from the toolbar “Options” and click “Configuration”, make sure “Search” is highlighted. The default is to scan all “Program and macro files,” change this to “All files.” This will make your virus scans take longer, but it also provides the most thorough protection. This configuration is highly recommended. - 39 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course AntiVir Search Settings Configuration 3 Schedule the virus definition updates. From the toolbar, click on “Tools” and then “Scheduler”. From there choose “Insert” and select the “Internet Update” tab. From there you can choose the “Scheduler” button and set up the automatic updates. Note: when you select your frequency, you’re scheduling both the check for new virus definitions, program updates, and virus scans. If there’s one thing I don’t like about AntiVir, it’s that you’re required to download the entire program (program plus definitions) for an update. For broadband users this is not such a big deal, however, it’s more of a - 40 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course concern for dial-up users. Hopefully a future version will provide the ability to download virus definitions separately from the entire program. AntiVir Scheduler Keep in mind that if you already have an Anti-Virus program on your computer you can configure it the same way. It may look a little different but you can always check the help section or visit the website of the manufacturer. If for some reason, you don’t like AntiVir, or you need an Anti-Virus program for a business or commercial setting, VirusScan from McAfee is a stellar product. VirusScan also includes protection for email and Instant Messaging. TIP Wouldn’t it be great to test your Anti-Virus software without actually downloading a virus? If you’ve never seen your AntiVirus program react to a virus incident – it’s nice to verify it’s working correctly. Of course, “testing” with a real virus is crazy - 41 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course – not to mention if your Anti-Virus program failed the test – you now invited a virus onto your system. Doh! Fortunately there is a better way. Anti-Virus researchers worked together to develop the Eicar test virus string. Important note: Eicar is not a real virus, nor is it a “deactivated” virus. It poses no threat to your system. It’s just harmless text characters that Anti-Virus programs were told to recognize as a “virus.” If you would like to test your own Anti-Virus program, you can download the Eicar test string here. Virus Hoaxes I’ll wrap up this chapter by discussing virus hoaxes. The Internet is full of hoaxes, and hoaxes about viruses are no exception. Usually these hoaxes take the form of an email chain letter. They may falsely alarm you by asking you to search your computer for the presence of a valid system file; only the hoax will claim that this file is evidence of a virus. Of course hoaxes do not actually infect your system, but are worth mentioning because they cause a great deal of wasted time and energy (and sometimes panic) which is propagated each time someone forwards the warnings on. Below are several tip-offs that can help verify a virus hoax. - 42 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course • Does the warning urge you to forward it to everyone you know? Genuine virus alerts do not ask that you participate in a frantic distribution scheme. • Did a genuine security expert send you the alert? Did the alert come from your friend’s mechanic that knows a lady that works for a security guy at Microsoft? • Does the alert offer links to experts that will validate this threat? An alert should quickly summarize the threat and if it has a link, it should go to a well-known company or organization such as Microsoft, MacAfee, Symantec, etc. Finally, McAfee has a list of virus hoaxes which can be used to crossreference potential hoaxes. If you have a friend or family member who is constantly sending out phony virus alerts, let them know they are not only propagating misinformation, but also playing into some hoaxster’s agenda. Junk email wastes everyone’s time – note: we discuss this topic in more detail in our “Email Security & Smart Strategies” special report. Please do all Internet users a favor and ask them to stop. Be nice however, they mean well. It bears repeating again that having all of the proper tools loaded; your best defense is the knowledge of how hackers and Malware can infect your computer. This takes us to our related chapter on Adware & Spyware. - 43 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Punch #3 – Adware & Spyware Removal If you just finished reading our Anti-Virus chapter, you’ll probably notice some cross-over information. Adware and Spyware are so prevalent, and potentially devastating that they rightfully deserve their own chapter. According to most security experts, Spyware is quickly becoming the most serious threat on the Internet. As evidence of just how widespread this menace is, a recent study sponsored by AOL and the National Security Alliance examined 329 computers. Notice these findings: • 77% of those surveyed thought their computers were safe, yet four out of five had Adware and Spyware on their computers. • Two-thirds of the group did not have a firewall installed. • While the majority of the group (85%) had Anti-Virus programs – most had not updated their virus definitions in over a week. • Imagine the shock one person must have felt when learning there were over 1,000 Spyware programs running wild on his computer! One more finding of this study, complacency played a contributing factor in these computers getting compromised. No one wants to believe that it could happen to them. Unfortunately, it can and it does. - 44 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Spyware Spyware is a general term for any program that secretly monitors your actions. It’s very common to see the terms Spyware and Malware used interchangeably, so I thought it might help to breakdown these terms. Spyware with malicious intent is also known as “Malware.” Malware, literally “malicious software,” is a blanket-term for any such software – think viruses, Trojans, malicious Spyware, etc. Unfortunately, as the AOL study shows, getting infected with Spyware/Malware is much easier than one would imagine. Spyware comes in many forms; let’s examine a few of the more serious types. Adware Adware is usually bundled with “shareware” or “freeware” programs. It can also get loaded when you do things like click a button in a web popup ad, or even something as simple as visiting certain websites. Adware comes alive when it senses you’re on the Internet. Adware has two main objectives: 1. Deliver ads to your desktop usually in the form of pop-up windows and Spam. 2. Track and record information about your online activities and purchases for the purpose of selling this information to advertisers (which leads to more Spam and pop-ups than you ever imagined). To assist Adware in its efforts to “profile” you – programs called “dataminers” look for trends in your activities. For instance, if you were viewing real estate websites, you may soon be pelted with real estate or - 45 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course home loan related pop-up ads and/or Spam. Some data-miners may record your habits in a centralized advertising database. Keyboard Loggers (a.k.a “Keystroke” or “Key” Loggers) These have one single-minded purpose: Identity Theft. Keyboard loggers are secret or hidden programs that record everything you type. Some keyboard loggers can be programmed to recognize significant information like credit card numbers, and user account/password information. This is especially alarming when you consider how many people access financial information like online banking and shopping. What makes keyboard loggers so insidious is their stealth nature. In contrast to a virus, which usually does something to let you know it’s there, keyboard loggers don’t want to be discovered and quietly sit in the background recording information about you. Browser Hijacker This is one of the most annoying things you can get on your computer. Once it’s on your system, a Browser Hijacker can do everything from installing links on your desktop, to installing software without your permission. If you’ve ever had your start page repeatedly changed to another location – you’ve met a Browser Hijacker. I’ve worked on friends’ computers where they’ve lost all control when trying to navigate to a website. Yet another example, imagine my friend’s intrigue and then frustration as his My Yahoo start page changed repeatedly to a site called “Sex Patriot” – seriously. There is really no end to what Spyware can do once loaded onto a computer. It’s really a jungle out there! - 46 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Modem Hijacker (a.k.a. “Dialers”) This is a potentially costly form of Spyware. It’s a small piece of software that uses your modem to make long-distance phone calls to numbers overseas, and adult chat-line numbers. Some victims have received monthly phone bills exceeding US $2,000! Modem Hijackers are commonly transferred through a virus, by using MP3 file-sharing networks, and by visiting porn sites. Cookies In general cookies are useful. They’re small text files placed on your computer by websites to store information like passwords, user accounts, and display preferences for a website. Without cookies a website doesn’t have a way to “remember” you. While technically not Spyware, cookies may be used by Spyware tools to build profile information on you. Marketing groups use this information to fine-tune their ads that are sent directly to your computer via pop-up or email Spam. Cookies are usually permanent and remain on your hard drive until removed through your browser settings or Spyware removal tool. How Spyware Gets on Your Computer Never click links in Spam email. While on the web, never click links for offers of free movies, prizes, contests, etc. If it looks suspicious – it probably is – get away from that site. Just when you think you’ve seen it all, Spyware creators find new and creative ways to exploit people. For instance, some of the most deceptive Spyware will mimic Windows dialog boxes, actually warning - 47 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course that your computer is infected with some sort of Malware. However, if you follow the directions and click the button to remove it, you could actually be loading more destructive program code on your system! Yes, you caught that correctly – Spyware warning you about potential Spyware loads Spyware on your computer! Notice the pop-up below. Beware of these types! By clicking Yes, (and sometimes even “No”) Spyware/Malware could be installed on your computer. Clever advertisement made to look like a Windows system message. TIP To reduce the risk of loading unwanted programs from pop-ups like those pictured above – either close the Window by clicking the “X” in the upper right-hand corner, or press ALT+F4 on your keyboard. While Spyware can certainly land on your computer through no fault of your own, this is not always the case. Many times it’s installed with your permission. Have you ever clicked the “I agree” box without reading the license agreements? Peer-to-Peer file sharing programs such as Kazaa & Bearshare are known to install loads of Spyware. If you read the fine print, some programs openly tell you they will install this kind of software. It’s important to point out that none of the truly malicious Spyware is loaded this way. - 48 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course If you take one thing from this section, take this: there are a lot of clever people trying to get inside your computer. They will deceive, cheat, and steal to do so. Be very weary of any unsolicited warnings or “freebies.” It’s a scary thing to click the “ok” button today on the Internet, do not take this action lightly. Signs That You’re Infected Sometimes it’s blatant like the Browser Hijacker example, and sometimes it’s subtle evidence. Have you experienced any of these symptoms? • Your computer runs progressively slower and it takes longer to start up. • Your home page is mysteriously changed to something else (usually something pornographic). • Starting your browser means spending several minutes trying to close pop-up windows. • Strange icons appear on your desktop. • You notice that new programs were installed on your computer. The likely culprit is Spyware running in the background consuming your computer’s resources like processor, memory, hard drive space and Internet bandwidth. Let’s talk about fixing this mess. - 49 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Spyware Removal Tools Anti-Spyware programs (Ad-Aware) will scan your hard drive, memory and Windows registry (a database of program and Windows information) for Adware & Spyware. It also has the ability to remove cookies but that’s not its main focus. In most cases, cookies can be removed by clicking “Tools” on your browser’s toolbar, and then selecting “Internet Options”. There you will find a button labeled “Delete Cookies”. Internet Explorer is used in this example but similar steps can be taken with non-Microsoft browsers. Internet Explorer's Internet Options screen. - 50 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Keep in mind that there is a difference between Anti-Spyware and AntiVirus programs. They are designed for two different threats and both are needed in the quest for a secure computer. While your Anti-Virus program may discover some of the more serious forms of Spyware, you can’t rely on it to find everything. Anti-Spyware is necessary for the removal of Adware, Spybots (automated Spyware programs) and unwanted cookies. Ad-Aware Ad-Aware from LavaSoft was one of the first to introduce a removal tool. Below you see a list of processes and objects running in the background that were found after a scan, all are related to Spyware/Adware or cookies. Ad-Aware Scanning screen. - 51 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course At the end of a scan, Ad-Aware will display the results (shown below). It’s not uncommon for Ad-Aware to discover many objects – especially on a first scan. If you’re curious and would like to know more about the discovered objects, click on the “Category” tab – this will sort objects by category. To find out more information about a particular object – rightclick on it and select “Item Details.” This will tell you the actual severity of the object – it can be quite an eye-opening experience. When you’re ready to remove the found items, right-click anywhere in the results window and select “Select All Objects.” Next, click “Next” to process the objects. This will add all objects to a quarantine file. The reason these objects are not immediately deleted is just to make sure removing them does not break one of your applications. I’ve never seen this happen, but Ad-Aware takes a cautious approach. How often should you run an Ad-Aware scan? At least once a week, probably more often if you’re a heavy Internet user. Similar to an Anti-Virus program, Ad-Aware uses a definition file. Clicking “Check for updates now” on the main program window, as you would guess, checks for updates. To be prudent, do this every time you start the program. - 52 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Ad-Aware Scan Results screen. Ad-Aware is free for personal use. Here’s a list of download sites. The Benefits of “Real-Time” Protection The free version of Ad-Aware does not provide “real-time” protection. This means that it will not prevent Adware/Spyware from getting on your system – it will only discover objects during a system scan. This is not so terrible as long as you run frequent scans. To entice you into a “set and forget it” mode – Ad-Aware Plus adds a real-time monitoring agent. The benefit, of course, is “always on” protection. If you’re interested in this approach, I would recommend using Spy Sweeper by Webroot. Not to discourage Ad-Aware in any way, in fact, I know several people who run both the free version of Ad-Aware and Spy Sweeper together for the most complete protection. This is a great strategy. Just one thing you should know, sometimes Spy Sweeper detects objects in Ad-Aware’s quarantine (and vice-versa), and this has - 53 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course lead some to mistakenly think that Ad-Aware itself is Spyware. Rest assured this is nonsense. - 54 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course A Moment for Security Reflection … We’ve covered a lot of material in these last few chapters, let’s just take a moment to reflect on everything you’ve accomplished. By installing a personal firewall, you now enjoy these benefits: “Stealth mode” on the Internet, much dreaded port scanners will not even know you’re there. “Program Control,” programs cannot make outbound connections without your permission. Through a combination of Anti-Virus and Anti-Spyware programs, you’re now protected from the following menaces: Viruses Worms Trojans Adware Spyware Please take a moment to congratulate yourself. If you didn’t have any of these tools in place prior to reading this book, your security level, and awareness have increased dramatically. Good job. This brings us to Punch #4, Windows Security Settings. - 55 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Punch #4 – Windows Security Settings In addition to your personal firewall, the settings on your computer may very well be your first layer of security and therefore extremely important. This section on locking down Windows is targeted for Windows XP, but a lot of the principles described here can be applied to previous versions of Windows. Note: this is the most “hands on” chapter in this book. I know most people don’t like to get their hands dirty with configuration settings. Acknowledged. However, doing these simple steps will greatly increase your computer security. Creating A Password-Protected Log-on Windows XP out of the box does not set up password-protected user accounts and anyone walking by can log on to your computer. During the install, Windows asks for a user name and it creates a user icon that you click on, but a password is not configured at this point. On older operating systems such as Windows 98, user logon security was not available. Access to your computer only required a user to hit the power switch. Did you ever have a “friend” who would see your computer and assume it was OK to log on just because they knew how to operate it? Well I did, and it was irritating to say the least. Let’s take a look at the Windows XP users and passwords section in “Control Panel.” You can get there by selecting “Control Panel” from the “Start” menu. The layout of the “Start” menu may differ a little depending - 56 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course on whether you have Windows XP Home version or Windows XP Professional but they will include basically the same content. At this point you want to select “User Accounts” where you can view, create, edit or delete users. This is where you control how users log on to your computer and what rights they have once logged on. Windows XP Control Panel Once you select “User Accounts” you will have the option of changing an account, creating a new account, or changing the way users log on and off. For this example you will click “User Accounts” and then “change an account”, you have several options here, but for now we’re - 57 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course interested in “create password”. You will need to select a password and type it in twice to verify. Your account will now prompt you for this password every time you log in. Congratulations, you have just taken a major step toward a secure computer by eliminating access to anyone walking by. This process should be repeated for each person using this computer. A benefit to creating user accounts for everyone who logs on to your computer is that Windows will now keep track of user preferences such as favorite websites, default font size and type, desktop wallpaper, screensavers and more. A few password tips: • When selecting a password make sure it does not exist in the dictionary in any language. • Try to include numbers. • Include upper and lower case letters • Stay away from obvious passwords (your name, birthday, etc.). As an example, the password “MyCatsName334” is a lot more secure than “password.” TIP Instead of using an account with Administrator access as your general account, it’s highly recommended that you create a general user account for daily use. This serves as a protection against making inadvertent system changes (general users don’t have sufficient access to do this). Finally, if your user session is hijacked by someone, they’ll only be able to do limited damage. - 58 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Creating A Password-Protected Screensaver Another great way to protect your computer is to set a “passwordprotected” screen saver. If you’re pulled away from your computer, the logon screen will automatically appear after a preset amount of time. To set this, right-click on your desktop, select “properties”, and select the “screen saver tab”. Once you choose the screen saver and time to wait, click the button, “On resume, display Welcome screen” and then “OK”. That’s it. Based on the example below, the screen saver will turn on after 10 minutes of inactivity. Once a key is pressed or the mouse is moved, the welcome screen will appear and ask the user for the account password. In order to use this function, users must be configured with passwords as described earlier in this section. - 59 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Setting a password protected screen saver. TIP To lock your Windows XP computer manually, just press the Microsoft button (a.k.a. Windows key) and the letter “L” on your keyboard. Most keyboards come with this button. The Microsoft key is between Ctrl and Alt. For those running Windows 2000, do Ctrl + Alt + Delete to lock your workstation. Creating Private Folders If you have multiple users logging on to your computer or connecting to it over a network, you may want to protect files and/or folders by making them “private.” Note: this section requires that your user account(s) has/have been established with passwords, as described earlier in this section. When you make a folder “private,” you’re saying that only I (the person logged on) can open this folder. Anyone else that tries to access this folder will receive an “access denied” error message when trying to view the data. Let’s look at how to make a folder private. 1. Double-click on “My Computer”. 2. Double-click the drive on which Windows XP is installed. (Usually C:) 3. Double-click on the “Documents and Settings” folder. 4. Double-click on the folder labeled with your user name. Drill down until you get to the folder you want to make private. 5. Right-click on the folder to be made private and choose “Properties” from the menu. - 60 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course 6. Click on the “Sharing” tab and check the box next to “Make this folder private”. There you have it. Any other user that directly logs on to your computer or connects over a network will not be able to access this folder. Disable Unused Services Windows XP has several “services” enabled by default. This means that there are services running in the background ready to perform tasks. They’re active without you doing anything other than installing - 61 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Windows. Hackers know about these services and are very good at exploiting them. As a rule of thumb, you should not run any services on your computer that you’re not using. A concept used in the security world states “start with no services\access and turn them on as needed.” This means that you start by turning everything off, and then you can turn on individual services, when you need them. This helps to ensure you don’t have anything running in the background that could be exploited. The other benefit is that you’re not wasting computer resources by running unused services. Stop File and Print The first service you should be concerned about is a Windows service called “file and print” sharing. By default, your computer is set to act like a server, which “serves” up files or other resources on your computer. This is a common service exploited by hackers and worms. Skip this section if you don’t connect your computer to a network, including the Internet. Everyone else read on. ☺ To turn off this service you can just right-click on “My network places” and select “Properties.” You will see the check box near the label “File and printer sharing for Microsoft networks”. Uncheck this box. - 62 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Disable File and Print Sharing. Disable IIS (Windows XP/2000 Professional Only) The next unused service you should check for is IIS, which stands for “Internet Information Services.” This enables your computer to act as a web-server and once again creates an opportunity for someone to exploit your computer. To check if this service is enabled, select Start, Settings, Control Panel and click on “Add/Remove Programs.” - 63 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Remove Internet Information Services If IIS is installed it will appear checked. Uncheck and click “Next” to remove IIS. Unless you’re learning HTML programming, there’s virtually no reason to run IIS on your home computer. As mentioned in the Introduction Chapter, highly destructive worms such as Code Red and Sasser exploited this service; you can see why this is an important step. If you fall into that category of requiring this service on your home computer – make sure you always run the latest Windows updates (I’ll show you how to do this below). Stop the Messenger Service The next service of concern is the “messenger service.” It’s a Windows service that receives network messages through the Alerter service. - 64 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Network administrators use this service to send broadcast messages between computers such as “you will be disconnected,” or “get off the system!” Windows and other software can use this service. One example is the message you receive when finishing a print job. AntiVirus programs often use this service to send you notifications. Important note: even though it sounds like it, this service has nothing to do with MSN messenger chat. On a home computer, this service is not needed. And guess what – using what’s called “Messenger Spam,” hackers and Spammers found a way to exploit this service to send Windows pop-up messages. Yes, it’s turned on by default. Here's how to turn it off. 1. Click Start, Settings and then Control Panel. 2. Click “Performance and Maintenance”. (If you are in classic view you can just click Administrative tools here). 3. Click “Administrative Tools”. 4. Double-click “Services”. 5. Double-click “Messenger”. 6. Change the start up type to “Disabled” as shown below. This will prevent Windows from starting this service during your next reboot. 7. Click the “Stop” button to immediately stop the currently running service. - 65 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Messenger Service Properties Window. Congratulations, your Messenger service is now disabled. Windows Patches and Updates When Microsoft releases a new version of Windows, all is good in the world … until the problems surface. The problems, usually security related, are normally discovered in one of two ways – Microsoft finds them, or “others” discover these problems. Sometimes these “others” notify Microsoft, and sometimes these “others” are people with malicious intentions, and go about creating the next big virus or worm to - 66 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course exploit their finding. In any case, when Microsoft knows of an issue in Windows – they’re usually quick to create a fix for it. Anytime Microsoft creates a fix, it’s available for download from their website. When Microsoft gets enough of these fixes, they combine them and roll them up into something called a “Service Pack.” Microsoft makes it easy to update your computer, which means connecting to the Microsoft website where it scans your system for patches or updates, and then downloads and installs the ones you’re missing. This procedure is really very easy, as a matter of fact, this can be automated so you don’t even have to think about it. Note: updating Windows is a mandatory step; many of the Windows security exploits over the past few years would have been avoided if more people had regularly updated their systems. Windows Web Updates If you are using Microsoft Internet Explorer as you browser, you can just open it, click on “tools” and select “Windows Update.” Alternately you can start Windows Web Update here. You will be connected to the Microsoft website where it will scan your system and create a list of patches and fixes. You will have the opportunity to read about and install them. I recommend you just install all of them. If you have never done this, or it’s been awhile since your last one, this would be a good time to do that. Note: on a dial-up connection, please be aware this could take some time to complete. - 67 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Microsoft's Windows Web Update. Note: Internet Explorer (IE) must be used in order to run the Windows Web update. Running a web browser other than IE is a great idea, but you'll still need IE for this purpose. For the advanced user, Windows updates and patches can be downloaded individually from Microsoft's Download Center (even using non-Microsoft browsers). However, updating automatically through Windows Update is still the preferred method. Automating Windows Updates As I mentioned, you can have your computer automatically check and download updates by right-clicking on “My Computer” and select the “Automatic Updates” tab. From here, just check the box, “Keep my - 68 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course computer up to date”. You have the option of scheduling the updates. You also have a few options on how to download it. This is a great “set it and forget it” option, especially if you know you’re not going to be diligent about checking for updates. Enabling Automatic Windows Updates in Windows XP. One final, but very important point: Microsoft does not send out updates and patches through email attachments. Hackers will send an email or pop-up message supposedly from Microsoft claiming that there’s a new security patch that needs to be installed. Microsoft will never do this; in reality it’s a Trojan, virus or some other type of nasty Malware. The - 69 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course point is to realize that the bad guys are out there, constantly coming up with new and creative ways to break in to or exploit your computer. Impersonating trusted sources like Microsoft is a common method of attack for hackers. We examine this subject in more detail in our “Online Identity Theft: Self-Defense 101” special report. - 70 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Download Summary For your convenience, here’s a list of all tools we mention in the main book and bonus materials. Ad-Aware Adware/Spyware scanning and removal tool. Free for personal use. AntiVir Free Anti-Virus program for personal use. Gibson Research Corporation Free security scans to check which TCP/IP ports your computer is exposing. Note: keep clicking on “Shields Up,” and you’ll get to the scanning page. Spy Sweeper Adware/Spyware scanning and removal tool, also adds “real-time” monitoring to prevent Spyware from getting on your computer. Sygate Free Personal Firewall Excellent free personal firewall. Sygate Personal Firewall Pro Full version of Sygate’s free firewall. Sygate Security Scan Free security scans to check which TCP ports your computer is exposing. Virus hoaxes McAffe’s list of known virus - 71 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course hoaxes. VirusScan McAffe’s Anti-Virus program which includes Email and Instant Messaging protection. Windows Web Update Microsoft’s website for downloading updates and fixes for Windows. Zone Alarm Free personal firewall. Zone Alarm Pro Full version of Zone Alarm’s free firewall. Bonus #1 – Online Identity Theft: Self-Defense 101 Browser check Check if your browser supports SSL encryption features. Earthlink Internet Service Provider with a strong commitment to security. Subscriber’s get the following free services: email virus scanning, Spyware and pop-up blockers. ScamBlocker Earthlink’s browser toolbar to help prevent Phishing scams, also includes pop-up blocker and Google search features. Currently only works with Internet Explorer. "Whois" lookup page “Whois” lookup used to check the register of an Internet domain. - 72 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Bonus #2 – Email Security & Smart Strategies Encrypt Program to create secure encrypted email attachments. Encrypt can create attachments suitable for Windows, Macintosh and Unix computers. Secure Email Attachment (SEA) Free security tool to encrypt email attachments (between Windows users only). Bonus #3 – Smart Strategies for Reducing Spam Mailwasher Pro Excellent Spam filter that works with every mail program. Mailwasher Pro allows you to examine your email on the server before it’s downloaded to your computer. My Trash Mail Free service for creating temporary disposable email accounts. Qurb Excellent Spam filter that tightly integrates with Outlook and Outlook Express. Spam Gourmet Free service for creating temporary disposable email accounts. - 73 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Parting Thoughts We worked very hard to make this Internet self-defense course not only informative, but also enjoyable to read (and maybe even a little bit entertaining). While obviously there’s a strong emphasis on tools and the underlying reasons you need them, it’s really your knowledge and security awareness that will serve you best. If you followed the recommendations in this book and the bonus material, we’re confident in saying that you’re very well armed against current threats both on and off the Internet. Here’s to practicing safe computing. All the best, Doug & Kevin P.S. We’re always trying to improve our product, and appreciate feedback. If you found areas that could use improvement, please let us know by sending an email to talkback@SecureYourComputer.net P.P.S. If you enjoyed this book and want to recommend it to others, we’re cool with that. ☺ Please visit our Affiliate page to learn how you can earn generous commissions on each referral. P.P.P.S Any corrections or updates to our book will be posted here. - 74 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited. How to Secure Your Computer Using Free Tools and Smart Strategies: An Internet Self-Defense Course Recommended Reading What’s the best kind of book? Thrillers? Mysteries? Biographies? Lust stories? In our opinion, the best are the ones that entertain as well as educate. All of these fall into that category. There are no sleepers here. Enjoy. "Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage" by Clifford Stoll. This is the book that started it all! It’s part thriller, part international intrigue – think Tom Clancy meets Michael Crichton. This is Cliff Stoll’s gripping personal account of detecting and chasing a hacker through cyberspace (before it was called that). "The Art of Deception : Controlling the Human Element of Security" by Kevin Mitnick. Kevin Mitnick is the world’s most famous hacker (he was the inspiration for Mathew Broderick’s character in the movie War Games. From the age of 17 Kevin’s spent nearly half of his adult life either in prison or as a fugitive. Read this fascinating examination of how he skillfully manipulated computer systems and people. "Secrets and Lies : Digital Security in a Networked World" by Bruce Schneier. Bruce Schneier is a true security visionary with a sense of humor to boot. Who would have thought that Star Wars and Raiders of the Lost Ark could be used as examples and metaphors for digital security? Bruce expertly explains that security is a not a product, it’s a process, and technology alone is not the answer. - 75 - © 2004 Douglas Partridge & Kevin Ryan — All Rights Reserved. www.SecureYourComputer.Net Unauthorized duplication or distribution is strictly prohibited.