Showing posts with label Computer Viruses. Show all posts
Showing posts with label Computer Viruses. Show all posts

Monday, April 16, 2007

Surfing the Web Anonymously

Surfing the Web Anonymously – Questions to Ask

When you surf the web it is possible to learn information about you
even when you don’t want to advertise who you are. This is true even
if your system contains no virus or malware software. Specifically
information that is easily available online includes your IP address,
your country (and often more location information based on IP
address), what computer system you are on, what browser you use, your
browser history, and other information. It gets worse. People can
get your computer’s name and even find out your name if your machine
supports programs like finger or identd. Also, cookies can track your
habits as you move from machine to machine.

How do people get this basic information about you?

When you visit another web site, information about you can be
retrieved. Basically, information is intercepted and used by others
to track your Internet activities.

How do you stop this from happening?

First of all, it is possible to surf the web anonymously and thereby
stop leaving a trail for others to find. Note that this is not fool-
proof, but it makes it much harder for people to know who you are.
There are products called anonymous proxy servers that help protect
you. The anonymous proxy server replaces your Internet address for
its own. This has the effect of hiding your IP address and making it
much harder for people to track you.

How do I get an anonymous proxy server?

There are many vendors who sell anonymous proxy servers. There are
also free proxy servers available to you. Two such products are
ShadowSurf and Guardster. Guardster (http://www.guardster.com/)
offers various services for anonymous and secure access to the web,
some paid as well as a free service. ShadowSurf
(http://www.shadowsurf.com/) ShadowSurf provides anonymous surfing at
their site for free. Go to it and you will find a box to enter a URL
that you want no one to track. There are many others, but here are
two that are frequently used.

Another interesting product, given the recent news about the Google
search engine filtering its findings for the Chinese government, is
Anonymizer (http://www.anonymizer.com). This company, among others,
recently (Feb 1st, 2006) pressed that it “is developing a new anti-
censorship solution that will enable Chinese citizens to safely
access the entire Internet filter free”
(http://www.anonymyzer.com/consumer/media/press_releases/02012006.html
).

Does an anonymous proxy server make you 100% safe?

No. Still, you are much better off if you use such technology.

What other things should I be concerned about when trying to keep my
private information private?

Three other items come to mind when trying to keep your information
private. First, you can use an encrypted connection to hide your
surfing. This article does not go into detail on this, but search the
web and you will find a lot of information on this. Secondly, delete
cookies after each session. Third, you can configure your browser to
remove JavaScript, Java, and active content. This actually leads to
limitations, so you need to think about the cost/benefit of this
course of action.

Anything else?

Wishing you happy and safe surfing!

Add to Technorati Favorites


How many spyware items are infecting your computer?

I just had, by mistake, a plug-in called Intelligent Explorer attach
to my browser. What a nightmare! I have another article on this
topic, but this brings home a point. Spyware or adware items are
continually infecting computers. Most computers have no protection
from them. Most frightening is the frequency of them. From the
InfosecWriters web site, "According to a 2004 survey by America
Online and the National Cyber Security Alliance, 91% of users
questioned were familiar with the term spyware. Only 53% believed
their computers were infected, but a scan found that 80% of their PCs
had some type of spyware installed on them." It goes on to say,
"...The average number of spyware components per computer was 93 with
one computer having well over a thousand."

What is Spyware?

Butte College (www.bctv.butte.edu/support/spyware.html) offers this
definition:

“The term ‘spyware’ is broadly defined as any program that gets into
your computer without permission and hides in the background while it
makes unwanted changes to your user experience.

Spyware is generally not designed to damage your computer. The
damage it does is more a by-product of its main mission, which is to
serve you targeted advertisements or make your browser display
certain sites or search results.

At present, most spyware targets only the Windows operating system
(Internet Explorer).”

To be fair, spyware can be harmless, for example tracking cookies
don’t do much. While such things infringe on your privacy, they don't
really harm anything. Others, however, are extremely dangerous.

So what do you do about it?

No spyware program seems to do everything, but there are a lot of
goods solutions out there that can help. Here is a list of some of
the top Spyware tools to look at:

1) Try Ad-Aware 6.0 Professional from LavaSoft (there is also a free
version with less functionality)

2) Spybot Search & Destroy from PepiMK Software

3) Xoftspy form Pareto Logic

4) Spyware Guard from Javacool Software is a free program

5) Pest Patrol (now part of Computer Associates by acquisition)

6) McAfee Anti-Spyware

One thing is for certain: you do need to take spyware seriously.
For some reason, too many people out there think anti-virus solutions
are the end-all solution. They are not.

And, when all else fails?

Finally, as drastic as it seems, if your computer has been infected
with a large number of spyware programs, the only solution you may
have is backing up your data, and performing a complete reinstall of
the operating system.

Add to Technorati Favorites

Tuesday, April 03, 2007

Why Do I Feel Like Somebody’s Watching Me?

Spyware is one of the fastest-growing internet threats. According to the National Cyber Security Alliance, spyware infects more than 90% of all PCs today. These unobtrusive, malicious programs are designed to silently bypass firewalls and anti-virus software without the user's knowledge. Once embedded in a computer, it can wreak havoc on the system's performance while gathering your personal information. Fortunately, unlike viruses and worms, spyware programs do not usually self-replicate.

Where does it come from?
Typically, spyware originates in three ways. The first and most common way is when the user installs it. In this scenario, spyware is embedded, attached, or bundled with a freeware or shareware program without the user's knowledge. The user downloads the program to their computer. Once downloaded, the spyware program goes to work collecting data for the spyware author's personal use or to sell to a third-party. Beware of many P2P file-sharing programs. They are notorious for downloads that posses spyware programs.

The user of a downloadable program should pay extra attention to the accompanying licensing agreement. Often the software publisher will warn the user that a spyware program will be installed along with the requested program. Unfortunately, we do not always take the time to read the fine print. Some agreements may provide special "opt-out" boxes that the user can click to stop the spyware from being included in the download. Be sure to review the document before signing off on the download.

Another way that spyware can access your computer is by tricking you into manipulating the security features designed to prevent any unwanted installations. The Internet Explorer Web browser was designed not to allow websites to start any unwanted downloads. That is why the user has to initiate a download by clicking on a link. These links can prove deceptive. For example, a pop-up modeled after a standard Windows dialog box, may appear on your screen. The message may ask you if you would like to optimize your internet access. It provides yes or no answer buttons, but, no matter which button you push, a download containing the spyware program will commence. Newer versions of Internet Explorer are now making this spyware pathway a little more difficult.

Finally, some spyware applications infect a system by attacking security holes in the Web browser or other software. When the user navigates a webpage controlled by a spyware author, the page contains code designed to attack the browser, and force the installation of the spyware program.

What can spyware programs do?
Spyware programs can accomplish a multitude of malicious tasks. Some of their deeds are simply annoying for the user; others can become downright aggressive in nature.

Spyware can:

1. Monitor your keystrokes for reporting purposes.

2. Scan files located on your hard drive.

3. Snoop through applications on our desktop.

4. Install other spyware programs into your computer.

5. Read your cookies.

6. Steal credit card numbers, passwords, and other personal information.

7. Change the default settings on your home page web browser.

8. Mutate into a second generation of spyware thus making it more

difficult to eradicate.

9. Cause your computer to run slower.

10. Deliver annoying pop up advertisements.

11. Add advertising links to web pages for which the author does not get paid. Instead, payment is directed to the spyware programmer that changed the original affiliate's settings.

12. Provide the user with no uninstall option and places itself in unexpected or hidden places within your computer making it difficult to remove.

Spyware Examples
Here are a few examples of commonly seen spyware programs. Please note that while researchers will often give names to spyware programs, they may not match the names the spyware-writers use.

CoolWebSearch, a group of programs, that install through "holes" found in Internet Explorer. These programs direct traffic to advertisements on Web sites including coolwebsearch.com. This spyware nuisance displays pop-up ads, rewrites search engine results, and alters the computer host file to direct the Domain Name System (DNS) to lookup preselected sites.

Internet Optimizer (a/k/a DyFuCa), likes to redirect Internet Explorer error pages to advertisements. When the user follows the broken link or enters an erroneous URL, a page of advertisements pop up.

180 Solutions reports extensive information to advertisers about the Web sites which you visit. It also alters HTTP requests for affiliate advertisements linked from a Web site. Therefore the 180 Solutions Company makes an unearned profit off of the click through advertisements they've altered.

HuntBar (a/k/a WinTools) or Adware.Websearch, is distributed by Traffic Syndicate and is installed by ActiveX drive-by downloading at affiliate websites or by advertisements displayed by other spyware programs. It's a prime example of how spyware can install more spyware. These programs will add toolbars to Internet Explorer, track Web browsing behavior, and display advertisements.

How can I prevent spyware?
There are a couple things you can do to prevent spyware from infecting your computer system. First, invest in a reliable commercial anti-spyware program.

I recommend you follow this link http://www.linkbrander.com/go/34613 and read more and you can also scan your PC for free. There are several others on the market including stand alone software packages such as Lavasoft's Ad-Aware available for free at http://www.lavasoft.de/products/ad-aware_se_personal.php or Windows Antispyware. Other options provide the anti-spyware software as part of an anti-virus package. This type of option is offered by companies such as Sophos, Symantec, and McAfee. Anti-spyware programs can combat spyware by providing real-time protection, scanning, and removal of any found spyware software. As with most programs, update your anti virus software frequently.

As discussed, the Internet Explorer (IE) is often a contributor to the spyware problem because spyware programs like to attach themselves to its functionality. Spyware enjoys penetrating the IE's weaknesses. Because of this, many users have switched to non-IE browsers. However, if you prefer to stick with Internet Explorer, be sure to update the security patches regularly, and only download programs from reputable sources. This will help reduce your chances of a spyware infiltration.

And, when all else fails?

Finally, if your computer has been infected with a large number of spyware programs, the only solution you may have is backing up your data, and performing a complete reinstall of the operating system.

Add to Technorati Favorites