Showing posts with label access. Show all posts
Showing posts with label access. Show all posts

Monday, June 04, 2007

CCleaner - clear your browsing history safely

I have covered this previously, but have added some new
information to this.

CCleaner is a freeware system optimization and privacy
tool. It removes unused files from your system - allowing
Windows to run faster and freeing up valuable hard disk
space by automatically cleaning the cache when run. It also
cleans traces of your online activities such as your
Internet history. It also only takes a few seconds to run
and remove these unwanted files from your pc.

There have been over 55 million downloads of this program

http://www.filehippo.com/download_ccleaner/

Internet Explorer
Temporary files, URL history, cookies, Autocomplete form
history, index.dat.

Firefox
Temporary files, URL history, cookies, download history.

Opera
Temporary files, URL history, cookies.

Windows
Recycle Bin, Recent Documents, Temporary files and Log
files.

Registry cleaner
Advanced features to remove unused and old entries,
including File Extensions, ActiveX Controls, ClassIDs,
ProgIDs, Uninstallers, Shared DLLs, Fonts, Help Files,
Application Paths, Icons, Invalid Shortcuts and more…
also comes with a comprehensive backup feature

Third-party applications
Removes temp files and recent file lists (MRUs) from many
apps including Media Player, eMule, Kazaa, Google Toolbar,
Netscape, MS Office, Nero, Adobe Acrobat, WinRAR, WinAce,
WinZip and many more…

This software does NOT contain any Spyware, Adware or
Viruses.

I set mine up as follows:
Click on the Cleaner Tab on the left and under Windows I
tick all boxes in Internet Explorer, Windows Explorer and
System. Under Advanced tick only the first 2 boxes. Then
click on the Applications tab and tick all.

Issues tab:
Unless you are competent at dealing with the registry then
leave this one alone and DO NOT run it.

If you wish to run the Issues to clean the Registry, carry
out the following first:

Backup your Registry. Go to Start, Run and type in regedit
click on OK and the Registry Editor will then open. Go to
the top Tabs and click on File, scroll down until you see
Export, left click it and this will open Export Registry File
window. Save this file to your desktop and in the File Name
box enter Registry Backup File.
Click on Save and it should now be on your desktop.
Verify the file is a good copy, in the Registry Editor
window click on File, select Import, in new panel where it
says ‘Look in’ select desktop and then click on your saved
file then click ‘Open’. Once it says it has been read in
successfully, you have a good backup.
Now if you find that some programs are no longer running
in the way that they should, restore your Registry as detailed
above. CCleaner will also create backup copies of your Registry
and I suggest that if you do choose to run the Registry Issues
untick all of the boxes and tick one box at a time and run each
one separately.

Tools tab:
Here you will find a list of Uninstall options to remove
programs from your pc, use with caution. I prefer to use
the Add/Remove function or the programs own uninstaller.

Startup:
Lists all programs that are set to run when you boot up,
if you are unsure about deleting any of these then leave it
as it is.

Options tab:
Settings - Choose your language, untick Run CCleaner when
the computer starts, tick the next 3 boxes, then look at
the Secure Deletion, tick the radio button ‘Secure file
deletion (Slower) and set it to NSA (7 passes)

Cookies - entirely up to the individual, but I don’t save
any cookies.

Custom - You can drag and drop files or folders into the
window or browse for them and on the next run they will be
securely deleted.

Advanced - Untick boxes 1-3 tick all others.

Finally click on the Cleaner tab on the left and you have
the option to Analyze or Run Cleaner. When you are
comfortable using this program you won’t use Analyze, but
initially do use it to see what can be deleted and the
approximate size of files to be deleted.

Important
This will remove any saved passwords and usernames that
you have, so make sure that you have a copy of them all
before proceeding to clean.

http://www.filehippo.com/download_ccleaner/

Windows Media Player tutorial:

http://www.a1-ebooks.co.uk/tutorials/CCleanerSetup.wmv

Open a text document, enter the URL, username and
password, save this to floppy, external drive or print it
off. Do NOT save this text file to your hard drive.

There is an excellent program for saving your passwords
etc available from http://www.roboform.com/
I will cover this in more detail another time.

As always, back-up your system or create a restore point
before making any changes.

To your safety and security online
cotojo

Wednesday, May 30, 2007

Securing Windows XP

With its default configurations, Windows XP is not very secure. However, by making some simple changes,you can secure your system and data from attackers and viruses.

Automatic Updates
Keeping your system up-to-date is crucial to maintaining security. Microsoft releases security updates and makes them available for download on the Windows Update web site.
Using the Automatic Updates feature, Windows XP can be configured to download and install updates for you automatically at a time that suits you.

Scheduling this task is very simple. In Windows XP, use the following steps to enable this feature:
1. Right click My Computer and select Properties.
2. Click the Automatic Updates tab from the System Properties box.
3. Select the option to Automatically download the updates, and install them on the schedule that I specify.
4. Select the day and the time when you want the updates installed.
5. Click Ok.

Windows Firewall
Windows XP includes the Internet Connection Firewall service. In Windows XP Service Pack 2, the ICF is renamed to Windows Firewall and it is enabled by default. It is designed to protect your computer from intruders while it is connected to the Internet.

Note: if you are setting up a home network, do not enable Windows Firewall on your LAN (Local Area Network)connection. Only enable it on the Internet connection. If you enable it on your LAN connection, it will block File and Printer Sharing.

Important NoteIf you are using Zone Alarm Free Firewall DO NOT enable the Windows Firewall.

User Accounts
Windows XP includes various built-in user accounts. There are certain steps that you should take to ensure they are not compromised.

Disable the Guest Account. The guest account has always been a huge hacker hole and should remain disabled if it is not required.

Require passwords for all user accounts. Obviously, blank passwords are a bad idea if you care about security.Make sure you assign passwords to all accounts, especiallythe Administrator account and any accounts with Administrator privileges. All passwords should be a minimum of eight characters in length.

In Windows XP Home Edition all user accounts have administrative privileges and no password by default.Make sure you close this hole as soon as possible.

Rename the Administrator account. By renaming the administrator account hackers will have to guess the password and the name assigned to the account.

Don’t make it easy for hackers, renaming the Administrator account will stop some hackers in their tracks, and will deter the more determined ones. They won’t know what the group permissions are for an account, so they’ll try to hack any account they find and then try to hack other accounts toimprove their access. If you rename the Administrator account, try not to use the word Admin in its name. Pick something that won’t make it easy for others to guess.

Remote Desktop
Windows XP Professional’s Remote Desktop allows users to connect remotely to your computer.Although it can be useful for obtaining remote assist with troubleshooting problems, it is also an open door for intruders. Remote Desktop should always be disabled and only enabled when it is needed.
To disable Remote Desktop right click on My Computer, select properties then click on the Remote tab and untick the check box beside Allow Remote Assistance invitations to be sent from this computer.

Anti-virus Software
Anti-virus software is a program designed specifically to detect and remove viruses, making it an essential application to install. Once you install anti-virus software,it will scan your computer and clean any viruses it finds.

Some of the more popular antivirus software programs are listed below, though I refuse to pay for these as mentioned below you can get the same protection for free.
1. Trend Micro
2. McAfee
3. F-secure
4. Symantec
5. Computer Associates
6. Panda Software
Most anti-virus software must be purchased or it may be included with the purchase of a new computer for a limited time.

I highly recommend the use of AVG-AntiVirus available fromhttp://free.grisoft.com/doc/avg-anti-virus-free/lng/us/tpl/v5

I have covered this with a tutorial athttp://cotojo.wordpress.com/2007/04/27/avg-anti-virus-installation-guide/

Important note: DO NOT use more than ONE anti-virus program on your pc as this will cause conflicts.

I prefer to use AVG which scans daily and also runs in the background continuously. On a monthly basis I use Trend Micro housecall online.

Screensavers
Ok, so you are sitting at your desk, or left it for a while and suddenly, a nice image appears on your screen. Ok it’s your screensaver. However, screensavers can serve a much more important purpose other than providing us some cool images, and preventing screen burn.

Enabling a screensaver can increase the security on your computer.
Use a password protected screensaver, this stops others from accessing your computer.
You can configure a screensaver to start when your computer has been idle for a specific amount of time (eg: 5minutes). By password protecting the screensaver, the computer is locked when the screensaver starts. This is a simple idea for additional security. You will need to enter the correct password to resume using your pc.
So once a password protected screensaver has been enabled,you can walk away from your computer knowing thateverything is secure. In Windows XP, you can use the steps outlined below to enable a password protected screensaver.
1. Right click a blank area on your your desktop and click Properties.
2. From the Display Properties dialog box, select the Screensaver tab.
3. Use the drop down arrow to select your screensaver of choice.
4. Change the Wait value to specify how long the computer can remain idle before the screensaver is started.
5. Select the On resume, password protect option. If you do not select this option any activity will cause the desktop to appear.

Give your pc a quick tune-up at http://pcpitstop.com
Run the Full Tests from the menu on the left of the page after creating a user account and password.

Go to http://www.belarc.com/free_download.html
The Belarc Advisor builds a detailed profile of your installed software and hardware, missing Microsoft hotfixes,anti-virus status, CIS (Center for Internet Security) benchmarks,and displays the results in your Web browser. All of your PC profile information is kept private on your PC and is not sent to any web server. I would recommend that you print off the results page as it contains details of your Drivers and Software License Keys, useful if you have to perform a format.

Scan for any viruses at http://housecall.trendmicro.com/

Check to see if your ports are Open, Closed or in Stealth mode athttps://www.grc.com/x/ne.dll?bh0bkyd2

Check your internet connection speed at
http://www.abeltronica.com/velocimetro/pt/?idioma=uk&newlang=uk
Click the green arrow beside the flag on the top right of the header and select your language. Scroll down to Speedometer and click on Test Now.

Remember to always back-up your system or create a restore point before making any changes.

Safe surfing everyone
cotojo

Thursday, May 10, 2007

Zone Alarm Free Firewall

Get Into the Zone

Malware. An odd sounding word created to lump all
malicious software programs, including viruses, worms,
trojans, spyware, adware, and other malevolent codes into
one cause-your-computer-serious-hurt category.

In 2005, Computer Economics released a report on malware.
The good news was that for the first time since 2002, the
total worldwide financial losses from malware actually
declined to a mere $14.2 billion. The bad news was that the
nature of malware was changing from overt threats to more
focused, covert attacks. This definitely is not great news
for the average computer user just trying to keep up with
the hundreds of malware programs that bombard us daily.

It’s not an easy task keeping malware out of your computer
system. In order to accomplish this, you need a strong
antivirus program. I have covered that with AVG Anti-Virus.

Now you need a good firewall to complement it.
One such program that can deliver the
goods is ZoneAlarm Internet Security Suite 7 from Zone
Labs. Zone Labs is one of the most trusted brands in
Internet Security for good reason. Their product, simply
put, kicks serious malware gluteus maximus.

ZoneAlarm has received more review recommendations that
any other Internet-security software suite because of its
superb firewallprotection. It blocks pop-up
ads, protects against identify theft and provides adequate
spam filters that are flexible. It even beats the market
leader, Norton Internet Security, which is often criticized
for excessive system drag.

The bonus for the average user who cringes at the idea of
setting-up one of these systems is that the interface is
easier to understand and use in comparison to most if its
competitors. If you choose to venture beyond the out-of-the-
box default settings, and install a more elaborate
filtering, know that this will require some additional time
to set up on your part.

Overall, ZoneAlarm is a user-friendly, solution that will
have your computer safe from Internet hazards and cyber
criminals within minutes of installation and it also has
an auto-update feature, very useful.

ZoneAlarm makes it easy. Unlike other personal firewalls,
ZoneAlarm protects automatically from the moment it’s
installed - no programming required. ZoneAlarm barricades
your PC with immediate and complete port blocking. And
then runs in Stealth Mode to make your PC invisible on the
Internet - if you can’t be seen, you can’t be attacked.
ZoneAlarm is a simple to use Firewall without compromising
your security. A getting started tutorial explains controls
and alerts to get you up and running quickly. And, to keep
you confident that you’re always protected, intuitive color-
coded alerts rate security risks - in real time. For basic,
“no frills” firewall protection, ZoneAlarm® is the popular
first step for many home PC users. And it’s still FREE for
individual & non-profit use.

Install it and forget it. ZoneAlarm comes configured to
deliver “out-of the-box” safety and security. As you use
your computer and applications that access the Internet, a
bubble will open on the lower left of your screen and
ZoneAlarm asks you whether you want applications to access
the Internet. It quietly protects you while logging
unauthorized repelled attempts to access your computer.
Security Levels make ZoneAlarm easy to use. In just a few
seconds you can decide how secure you want your system to
be. In contrast to other security solutions, ZoneAlarm does
not require you to learn about ports, protocols and
firewall programming. Security Levels automatically
configure the Firewall and eliminate the risk of improper
use that comes with other products. With ZoneAlarm’s
Security Levels, you get peace of mind, not confusion.
ZoneAlarm makes Internet safety and security hassle-free.

Remember……either back-up your system or create a
Restore Point BEFORE making any changes.

So what are you waiting for? Click the link below, click on
‘I only want basic ZoneAlarm Protection’ and
download and install it.


http://www.zonealarm.com/store/content/company/products/znalm/freeDownload.jsp

Thursday, April 05, 2007

About Encryption and Making Your System Secure

To What does encryption do for me?
Encryption and cryptographic software has been used in many different ways to make systems more secure.
This article discusses only a few ways that such software can make your system more secure, including:

1) Encrypting your email

2) Encrypting your files

Two programs are mentioned that will help encrypt information. There are many more programs out there that will help, but these programs are good and a good place to start as any. They have the added benefit of both being free with source code available.

Will encryption stop people from accessing my information?
Encryption simply makes it harder for people to gain access to important information, like passwords or sensitive information in a file. The first thing you should know about encryption is that the algorithm that is used to encrypt can be simple or more complex and that affects how securely what you have encrypted is protected. Encryption systems have been broken when the method of encryption is understood by hackers and is easy to break.

Why bother to encrypt my email?
It should be noted that email is far less secure than paper mail for two very good reasons: first, electronic data can be accessed easily over an Internet and secondly, electronic data is really simple to copy. There is a very good chance that someone has snooped around in your email despite your best intentions to stop it.

How do I go about encrypting my email?
There are many programs out there that can help you encrypt your email. A very popular one is PGP (Pretty GoodPrivacy) or its Gnu offshoot GPG.
PGP (http://www.pgpi.org/) self-describes itself this way: This "is a program that gives your electronic mail something that it otherwise doesn't have: Privacy. It does this by encrypting your mail so that nobody but the intended person can read it. When encrypted, the message looks like a meaningless jumble of random characters. PGP has proven itself quite capable of resisting even the most sophisticated forms of analysis aimed at reading the encrypted text."

Why bother to encrypt my files?
The answer to this boils down to what you store on your computer. If you have financial data with important information like social security numbers, email addresses, account numbers and passwords, then you open yourself up to losing very valuable information. Most corporate Internet security employees will attest to the widespread theft of very valuable information. As long as you are connected to the Internet you are vulnerable.

How do I go about encrypting my files?
AxCrypt File Encryption Software (http://axcrypt.sourceforge.net/) Self-described as "FreePersonal Privacy and Security for Windows 98/ME/NT/2K/XP with AES-128 File Encryption, Compression and transparent Decrypt and Open in the original application."

Add to Technorati Favorites