17.10.10

security guide

1

A COMPREHENSIVE SECURITY GUIDE
This is a comprehensive guide that explains bit about everything that you may be wondering about or have asked yourself one time
The guide is set up in different sections and I will be listing different security programs that are out there, please read trough the guide before you start to go and download the programs, since you won`t need them all

I DO NOT TAKE RESPOSIBILITY OF THE USE OF ANY OF THE LISTED PROGRAMS USE AT OWN RISK! I have not tried all of them myself

What is a computer virus?

A computer virus is basically a program that copies itself and relate to other objects, such as other programs or files. Computer viruses can be compared to any other computer program - the difference is that viruses tend to be harmful. Computer viruses can have different effects on your PC, but without necessarily notice anything.

The term computer virus is often used also for various types of malicious programs that can damage computer systems, even if they behave like viruses.
Here is a list of some of these programs:

    *

      Worms is a program that behaves like a virus, but are not viruses because the worms do not require any host. The transfer itself to other computer systems over the network and can overload the system. Worms often spread as attachments via e-mail and instant messaging. Worms can also spread via security holes in Windows, making it important to keep your operating system updated.
    
*

      Trojan horses are a malicious program that installs on your PC in secret - often through other programs. Such programs may seem innocent or interesting, but can be very harmful. They pretend they are something other than they really are. The effect of Trojan horses are different, but they may for example be used to send sensitive information (such as passwords or credit card information) to the person who made the malicious program.
    
*

      Keylogger is a tool that can be used to record the keystrokes of a user. This can be used to obtain include passwords, credit card information and other sensitive information.
    
*

      Root kit is a malicious program that tries to hide on an infected PC. The intention is that the user does not know that your PC is infected. Here is a list of programs that can be used to find root kit and remove them:
    
*

      Fools Virus ("hoax") is basically not harmful, but may still have adverse effects if the user is tricked into believing that they are harmful. The user can, for example, have a message to delete normal files in Windows. If the user does this, it can have serious consequences.

      Fools Virus based on the beneficiary's lack of knowledge. If you get a virus warning via email, usually it is flipped. Security companies never send such notices via email, unless the user specifically requested such messages. You should never send such messages riding on, because this can create confusion and problems for other users.
How do viruses spread?

It is common to spread viruses through e-mail messages, but your PC may be infected by visiting malicious Web sites.
This can be done by clicking on links on malicious websites, such as advertising on a website, but this can also happen by simply visiting such sites.
Fake Security Software

This is a way to trick users into installing the virus on.
Such viruses often use names similar to known products, but is actually virus. An example of this is "Security Essentials 2010" similar to the name "Microsoft Security Essentials", and therefore, many believe that these are real issues.
Why made virus?

There are many reasons why people create computer viruses, but the focus has shifted some in recent years. Previously it was common for virus writers created viruses to boast of their skills or attract attention. Today, the economic gain has become a more motivating factor. The use of the Internet has exploded over the last few years, so this has become a very profitable crime - the number of web users who are not computer literate and who know little about the dangers online, only increases and increases.
Precautions against computer viruses

The three most important precautions to prevent computer viruses are the following:

    
*

      Dangerous Attachments. If you get an e-mail or an instant message with an attachment or a link, you should think carefully before opening any attachment or click on the link. Many computer viruses from infecting your PC via an e-mail attachments.

      Attachments may seem innocent because they seemingly come from friends and acquaintances, but a return address can be spoofed.

      
Some virus pretending to be medicine for specific viruses. If, for example, e-mail from Microsoft with the "update" as an attachment, there are some who try to trick you. Running the attachment you will get a virus on your PC instead of Windows Update.
    
*

      Keep Windows and installed programs to date. Many computer viruses exploit security holes in Windows, and programs that are installed in Windows. You can download security updates from the website update.microsoft.com.

      An alternative is to turn on automatic update - you do via the Start menu in Windows, and automatically update in Control Panel. If you use Windows 7 you'll find this setting the option via the Control Panel, System and Security, Windows Update, Change Settings. Automatic updates are enabled in the first place, if you select this option during installation / setup of Windows when you bought your computer.
There are also free third party applications that can be used to check whether a program is missing security update, such as...(Secunia Personal Software Inspector.)

Use your brain by browsing. Viruses can spread through direct visits to the website, or by clicking on links on the website. There are certainly websites that offer free software, and porn sites that spread the virus. Social sites like Twitter and Facebook has become so popular in recent years that the attackers may use this opportunity to trick users into installing malicious software.

Ups are also a common way to spread viruses, and you should avoid clicking on them. It could for example be about a message offering free software, or it may be a message that your PC is infected, and it may be an offer of free antivirus, which may be used to trick users.

There are several players who have an overview of what kind of sites that are dangerous, including
Symantec, Trends Updates og Sydney Morning Herald.
It turns out that surfing the Chinese web pages (. Cn) can be especially dangerous. On the web mcafee.com You will also find an overview of what kind of keywords that can be dangerous.
http://www.google.com/images/cleardot.gif

Spyware

Spyware may be installed on the PC, ie without the user initially has no control over this. Such programs exist in many varieties, they can, for example, come with free programs that you download from the web or via malicious websites.

The effects of spyware are very different, but they can install advertising on your PC and may lead to your PC becomes slower.

A spyware can also transfer information from your PC to another PC on the internet, often sensitive information such as credit card information or passwords.

There are many free anti-spyware that can be used to find and remove spyware. It is wise to scan your PC with more than one anti-spyware - one program is second to spyware than the other. But do not install many at once, it stays with a couple or three.
Free antispyware

This is a list of free anti spyware:...
·  Microsoft Security Essentials
Microsoft security program can both remove viruses and spyware.

·  Ad-aware Popular program to search for and remove spyware.
·  Spybot search & destroy
A program to search for and remove spyware from your PC.

·  Malwarebytes
According to the developers to remove malicious programs of various types, including spyware. The program is available in both free and paid versions. This free version can be downloaded from
download.com.
·  Superantispyware
A program that removes spyware from your PC

·  Spyware terminator A program to search for and remove spyware. A good alternative to the other free programs.
·  CA Threat Scanner
This is a web-based scanning for spyware. Works only with Internet Explorer...

·  Hijackthis WARNING THSI PROGRAM IS ONLY FOR HIGLY EXPERIENCED USERS DONT USE IF YOU ARE NOT 100% SHURE WHAT U ARE DOING
useful application that can be used to remove harmful programs, but recommended only for computer savvy users. The program shows namely a list of all programs running in the background in Windows, and it may be difficult to see which programs are harmful and which are normal. If you remove the normal programs you might want Windows to stop working properly. The idea is the fact that you first check the the programs you want removed, and then select Fix checked.
You should first search for more information about a program you believe is suspicious, until you eventually decide to remove something. On the web

Task list programs you will find a list of quite a few programs - here you will find information about programs you may have doubts about. The search engine Google is also a usefull tool to check programs
·  Spywareblaster
A program that blocks spyware, that is, before they install on your PC.

·  Spywareguard A program that blocks spyware, that is, before they install on your PC.
Commercial anti-spyware

These are a few examples of programs that are specialized in finding and removing spyware. It should be noted that there are multiple security applications that also manages to detect many types of malicious programs, not least, there are many anvirusprogrammer also able to detect spyware. In addition, there are many free versions also pay versions...
Phishing is a common term for fraud that are used to trick the web user to enter sensitive information, feel free to trick them into giving him money.

The typical of phishing is that a user receives a false e-mail or an instant message with a link directing the user to a malicious website.

Phishing is often used to obtain passwords or credit card information. The site that the user is tricked into visiting look like a web site from a serious player, but the appearance has been modified so that it resembles the real website. The malicious Web site may contain a dialog where the user to enter sensitive information.

Con artists make use of ever-new methods. Among the new measures are called "in-session phishing" which is to exploit a vulnerability in JavaScript to use pop-ups for scam

How to avoid scams? You'll pretty much plain common sense. If you get an offer or a request via e-mail or an instant message, you should be on guard.

Phishing attempt may be tried by a message that basically looks pretty real. Such a message often have a link that sends you to a website that looks like a genuine website such as a bank.

There are also a number of programs that have built-in phishing filter, and that gives you a warning if you are about to visit a bogus website.
Firefox, Internet Explorer, Chrome og Opera.
Clickjacking
Clickjacking can be described as the kidnapping of links to surfer clicks on. A surfer might be affected by visiting a malicious website, allowing an attacker to take control over which websites the user visits.

What makes Clickjacking possible is a vulnerability in web pages, a vulnerability that affect browsers using DHTML, ie a collection of several technologies like HTML, JavaScript, CSS, Document Object Model.
This affects so browsers like IE, Firefox, Safari and Opera, but not browsers like lynx.

The vulnerability is said to have directly with JavaScript to do, but the problem can still be reduced by disabling active scripting / JavaScript and plug in your browser.

Firefox NoScript extension can be used to block the widgets which are written in languages such as JavaScript. This can also be used NoScript to block Clickjacking attacks.

Read more about Clickjacking in the encyclopedia Wikipedia.
SPAM
Why we get so much spam?

Spam is used in marketing of various products and services. Such marketing is basically almost free, as advertising is sent simultaneously to quite a few users around the world.

The reason for the large amount of spam is not least the fact that spammers are getting more inventive with new ways to increase the spread even more. They use such as Trojan horses that "kidnaps" PCs worldwide, and these will spread spam from PCs that are basically innocent.
How do spammers get my email address?

Spammers (those who send spam) using different methods.
Here are some examples:

    *

      They use programs that collect addresses.
    *

      In a so-called "Brute force attack" method spammers send many messages to a specific mail server and uses the addresses with all possible letter combinations. Some of these messages will then "accidentally" hit the valid e-mail addresses. This method is usually a great strain on mail servers.
    *

      PCs become infected and hijacked by Trojan horses. PCs are then used to send spam again, without the user is aware of this.

Avoiding spam

When an e-mail address first begins receiving spam, it is virtually impossible to get rid of the problem totally, but here is a list of a number of measures to limit the scope.

Not all methods are equally effective, but a combination of several methods can reduce the problem long term.

    
*

      Get the new e-mail address
      This is the most effective method in the fight against spam as a new address is unknown to spammers. Once they find your email address, it is very difficult or impossible to "clear" address.

      Feel free to use this alternative email address for all e-mail communications outside of friends and acquaintances.
    
*

      Do not register the address on the Internet
      Avoid typing your e-mail address more or less random forms you find online. Do this only when the player seems serious.

      There are many forms on the Internet that asks you to send your e-mail address. Some such forms are only set up to trick users into revealing their e-mail address so they can send you advertisements.
    
*

      Do not send answers back
      If you get spam, do not reply back. You are usually asked to reply to remove yourself from a list. This is usually just to fool you.

      What you achieve by sending a reply back to confirm your e-mail address is real, and you get even more spam. Some users have the opposite experience, but they are in the minoritDatainnbrudd
FIREWALL
A firewall is hardware or software that protects your PC from unwanted data traffic and intrusion via the Internet.

Windows 7 has a built-in firewall that can possibly be configured via the Control Panel, System and Security, Windows Firewall. The protection and warnings can be tuned for each each network profile (Home, Work and Public).

You can get a program or function through the firewall via a link in the left margin of the settings for the firewall. There are also advanced settings via a special link.

Alternatively, you can turn off the firewall, if you want to use another program to protect your PC against computer break-ins.

There are quite a few alternative solutions when it comes to firewalls. Here are examples of free software-based firewalls. Some of the products offer a more konplett zig rets solution, that is, not just firewalls:
Free Antivirus Software

There are many free antivirus programs. There are some of the most popular:
Free antiroot tools
·  Gmer
·  Darkspy

Virus Scanning through the Internet

No anti-virus programs are the same.
Some programs find viruses that others do not find. Therefore, virus scanning via the Internet can be a good option in addition to an antivirus program, but there is no substitute.

Free services that offer virus scanning of your PC via the Internet:
Commercial antivirus software

There are quite a few such programs. Here is a list of some of the most popular:
There are a lot of programs out there and pc/tech sites are always warning about new infections and scare tactics last year it was registered over 32.000 new malicious programs each week, but the fact is that most of us won`t see to much of it, Viruses and Trojan horses are the most common ones

The programs I would recommend is
Spybot Search & destroy- cleans a lot of other stuff
Ad-Aware – Anti spyware anti rootkit and malware
CC-cleaner-  cleaning internet history and other temporarily files you get when on internet
Antivir free- Antivirus program
All these programs are free to use

There are other programs out there that can do the job just as good but its based on personal preferences mostly

FAQ
1)Do Not install more then one antivirus program on your pc or they will cause conflicts with each other
2)Most users will never see rootkits or need to use software for it since its fairly new they are rare, so you don’t need to worry about it
3)all the programs in the world can`t replace the human brain, use common sense when on internet and you will be just fine
4)Firewall are optional, some say you need some don`t so its up to each of us depending on your internet use
5)Staying away from 18 xxx rated sites will save you from a lot of grief
6) saying it again I DO NOT TAKE REPONEBILITY FOR THE USE OF ANY OF THESE PROGRAMS USE AT OWN RISC!
7)Free Programs can do just as good jobs as Pay-ware you just get a lot more features when you pay so its up to everyone what they prefer
8)this is ment as a guide to explain the different threats you may hear of when you are on the internet or just annoying stuff like Spam mails etc, I do not work with internet security as a job nor am I an IT expert so I may have missed something and due to the nature if the internet were things change rapidly its hard to be updated on evrything

1 Comment`s:

Denne kommentaren har blitt fjernet av forfatteren.

Legg inn en kommentar