Showing posts with label updates. Show all posts
Showing posts with label updates. Show all posts

Friday, November 09, 2007

Secunia Personal Software Inspector (Beta)

Make your PC safer with this utility from Secunia, a company that tracks known vulnerabilities in software and operating systems.

This is one of the most useful and important free tools that you can have running on Windows XP SP2, Windows 2000 and Windows 2003.

This tool examines all of the program files on your PC for information on specific software builds installed and can identify missing Windows patches and outdated, insecure applications on your PC.

After examination, the data collected is sent to Secunia’s secure servers (https://psi.secunia.com/) and matched matched against their Signature Files which then determines the precise applications installed on your system.

Secunia state that they have more than 4,700 different programs in their File Signatures engine.

Once the scan is complete, which only takes a few minutes, Secunia PSI will categorize each program as “Up-To-Date”, “Insecure” or “End-of-Life”.

Click images for larger view

The results table presents the name and version number of your installed application. Clicking on the file name or the green information button will take you to a summary page with further information. If there is a blue button this will link directly to the file that will update or patch your software, if available.

On the summary page you will also receive a link to Secunia’s advisory about why your version is not safe, and explanations of the multiple versions of a program that you may see listed, as well as available updates and download locations.

Although Secunia PSI is not perfect, and it is still in Beta version, it is fairly useful at keeping your computer programs up-to-date, which also aids in your system security.

Secunia’s privacy statement states that they store information about your software for up to 12 months, but it does not collect any personal data beyond version numbers.

Download Secunia PSI here.

Note: The free Secunia PSI is available for Private/Home Users ONLY

As with any program installation, Backup or create a Restore Point before making any changes.

Tuesday, October 16, 2007

Securing Mac PC’s

Macs are much more secure than Windows systems. In addition to having most unnecessary services disabled by default, Macs face very little threat from viruses, spyware, adware, and other malware, but this does not mean that Macs are immune from security threats though.

Apple computers need good security practice to remain secure just as Windows systems do. By configuring user accounts, assigning proper permissions, complex passwords, regularly updating Mac OS X and installed applications, ensuring the Mac’s built-in firewall is properly configured, and by following other steps reviewed here, users can help ensure they have taken steps to protect their systems from unwanted breaches.

Antivirus and antispyware options

Spyware on the Mac platform, however, is basically not an issue. Unlike the Windows OS, which is sometimes crippled by the never-ending onslaught, Macs are relatively immune from the threat. However, there are very few utilities exist to protect Macs from unwanted software and malware. Such offerings include SmithMicro Software’s Internet Cleanup and SecureMac.com Inc.’s MacScan.

Security efforts on the Mac, therefore, quickly turn to focusing on user account security. Once user accounts have been implemented and separate, complex passwords assigned to both user and local administrator accounts, users can take several steps to help ensure Mac OS X systems remain secure.

Software update

Keeping systems current with the latest security updates and patches is a necessity. The Mac’s Software Update feature is the equivalent of Windows Update. By configuring Software Update to automatically download and apply security updates, users can keep systems current and help protect Mac OS X from unwanted breaches.

To configure Software Update, users should follow these steps on Mac OS X version 10.4 systems:Open System Preferences. Double-click Software Update within the System section. Press the Update Software tab. Select the Check For Updates box.

Specify how often the Mac system should check for updates (options include Daily, Weekly, and Monthly). Weekly updates should be sufficient for most users.

If you want to review downloads before they install you should check the Download Important Updates In The Background box. When the box is checked, the Mac will notify you that important software updates have been downloaded and are awaiting installation.

If you want to review which software updates have been loaded you can check the Software Update’s Installed Updates tab. A window will appear listing installed updates, for which version number information also appears.

You can check for new updates at any time by pressing the Software Update’s Check Now button.

Application updates

In addition to ensuring Mac OS X remains up-to-date with the latest security patches and fixes, you should ensure that all installed applications remain current. For example, a number of Mac programs connect the Internet and other resources. Those programs must remain secure with the latest security patches. By regularly updating Web browsers, office applications, utilities, antivirus programs, and other software, users can help prevent common causes of system breaches.

IP Firewall

It is essential to familiarize yourself with the Mac OS X IP Firewall, known as IPFW. The built-in firewall offers a powerful tool for protecting against unwanted network access.

To enable Mac’s IP Firewall and reduce network threats, follow these steps:
Open System Preferences.
Double-click the Sharing option within the Internet & Network section.
Select the Firewall tab.
Press the padlock icon and enter an account username administrator password and press OK.
Ensure the firewall is enabled (press the Start button if the firewall is stopped).
Disable as many of the incoming network services as is practical within your operating environment.

To disable services (for which default options include Personal File Sharing, Windows Sharing, Personal Web Sharing, Remote Login — SSH, FTP Access, Apple Remote Desktop, Remote Apple Events, Printer Sharing, iChat Bonjour, iTunes Music Sharing, iPhoto Bonjour Sharing, Network Time and CVS), simply uncheck the respective checkbox. You can add new services using the supplied New button.

When enabling new incoming services, you must specify a port name - options include ICQ, IRC, Timbuktu, VNC, and Other - TCP port number, UDP port number, and a description.

Under Advanced Options you can choose to block all UDP traffic, enable firewall logging and trigger Stealth Mode. In Stealth Mode, uninvited traffic receives no response from the Mac system, which increases security by preventing the Mac from automatically responding to even simple attempts to learn whether it is online.

FileVault

To ensure Mac data remains secure you can take advantage of Apple’s FileVault feature, which is particularly important on laptops used by mobile users. FileVault automatically encrypts all the data within each user’s Home folder. Without knowing a user’s password, the 128-bit encryption makes it much more difficult for another user or hacker to access another Mac user’s files.
To enable FileVault, follow these steps:
Open System Preferences.
Double-click the Security icon within the Personal section.
Select Turn On FileVault (you’ll be prompted to set a Master Password for the system if one hasn’t already been assigned).

The Mac will present a warning message stating that files will be encrypted. Users must enter the administrator password to proceed. Once the password has been entered the Mac begins to encrypt the user’s Home Folder. This process can take some time depending upon the number and size of files stored within the Home Folder.

When complete, the Mac will present the login Window. You can then log back in to the Mac system and will find the Home Folder contents are now encrypted, as shown by a FileVault icon on the user’s login window.

Secure virtual memory

Virtual memory is the data the Mac stores on the hard drive when operations exceed available RAM.

By enabling Secure Virtual Memory you can prevent hackers from accessing information including passwords etc. from a user’s live swap file. While it sounds unlikely, the increase of unencrypted Wi-Fi hotspots has increased the chances of such a breach.

To enable Secure Virtual Memory, follow these steps:
Open System Preferences.
Double-click the Security icon from within the Personal section.
Press on the padlock to enable changes.
Supply a username and administrator password.
Check the box for Use Secure Virtual Memory.

Other recommendations

Mac users can also take further steps to help secure their system. In addition to disabling automatic login (the checkbox is accessed using the Security applet within System Preferences), you should disable fast user switching (accessed from the Accounts applet in System Preferences). When using new Macs, care should be taken to leave the UNIX-powered machine’s root account off.

To disable the root user account (if enabled), follow these steps:
Open the Mac’s Finder application.
Navigate to the Applications folder.
Open the Utilities folder.
Open NetInfo Manager.
Select Security from the top menu bar and select Authenticate.
Enter a username and administrator password and press OK.
Highlight Security from the menu bar.
Select Disable Root User.

Monday, October 01, 2007

Securing Mac's

Macs are much more secure than Windows systems. In addition to having most unnecessary services disabled by default, Macs face very little threat from viruses, spyware, adware, and other malware, but this does not mean that Macs are immune from security threats though.

Apple computers need good security practice to remain secure just as Windows systems do. By configuring user accounts, assigning proper permissions, complex passwords, regularly updating Mac OS X and installed applications, ensuring the Mac’s built-in firewall is properly configured, and by following other steps reviewed here, users can help ensure they have taken steps to protect their systems from unwanted breaches.

Antivirus and antispyware options

Spyware on the Mac platform, however, is basically not an issue. Unlike the Windows OS, which is sometimes crippled by the never-ending onslaught, Macs are relatively immune from the threat. However, there are very few utilities exist to protect Macs from unwanted software and malware. Such offerings include SmithMicro Software’s Internet Cleanup and SecureMac.com Inc.’s MacScan.

Security efforts on the Mac, therefore, quickly turn to focusing on user account security. Once user accounts have been implemented and separate, complex passwords assigned to both user and local administrator accounts, users can take several steps to help ensure Mac OS X systems remain secure.

Software update

Keeping systems current with the latest security updates and patches is a necessity. The Mac’s Software Update feature is the equivalent of Windows Update. By configuring Software Update to automatically download and apply security updates, users can keep systems current and help protect Mac OS X from unwanted breaches.

To configure Software Update, users should follow these steps on Mac OS X version 10.4 systems:Open System Preferences. Double-click Software Update within the System section. Press the Update Software tab. Select the Check For Updates box.

Specify how often the Mac system should check for updates (options include Daily, Weekly, and Monthly). Weekly updates should be sufficient for most users.

If you want to review downloads before they install you should check the Download Important Updates In The Background box. When the box is checked, the Mac will notify you that important software updates have been downloaded and are awaiting installation.

If you want to review which software updates have been loaded you can check the Software Update’s Installed Updates tab. A window will appear listing installed updates, for which version number information also appears.

You can check for new updates at any time by pressing the Software Update’s Check Now button.

Application updates

In addition to ensuring Mac OS X remains up-to-date with the latest security patches and fixes, you should ensure that all installed applications remain current. For example, a number of Mac programs connect the Internet and other resources. Those programs must remain secure with the latest security patches. By regularly updating Web browsers, office applications, utilities, antivirus programs, and other software, users can help prevent common causes of system breaches.

IP Firewall

It is essential to familiarize yourself with the Mac OS X IP Firewall, known as IPFW. The built-in firewall offers a powerful tool for protecting against unwanted network access.

To enable Mac’s IP Firewall and reduce network threats, follow these steps:
Open System Preferences.
Double-click the Sharing option within the Internet & Network section.
Select the Firewall tab.
Press the padlock icon and enter an account username administrator password and press OK.
Ensure the firewall is enabled (press the Start button if the firewall is stopped).
Disable as many of the incoming network services as is practical within your operating environment.

To disable services (for which default options include Personal File Sharing, Windows Sharing, Personal Web Sharing, Remote Login — SSH, FTP Access, Apple Remote Desktop, Remote Apple Events, Printer Sharing, iChat Bonjour, iTunes Music Sharing, iPhoto Bonjour Sharing, Network Time and CVS), simply uncheck the respective checkbox. You can add new services using the supplied New button.

When enabling new incoming services, you must specify a port name - options include ICQ, IRC, Timbuktu, VNC, and Other - TCP port number, UDP port number, and a description.

Under Advanced Options you can choose to block all UDP traffic, enable firewall logging and trigger Stealth Mode. In Stealth Mode, uninvited traffic receives no response from the Mac system, which increases security by preventing the Mac from automatically responding to even simple attempts to learn whether it is online.

FileVault

To ensure Mac data remains secure you can take advantage of Apple’s FileVault feature, which is particularly important on laptops used by mobile users. FileVault automatically encrypts all the data within each user’s Home folder. Without knowing a user’s password, the 128-bit encryption makes it much more difficult for another user or hacker to access another Mac user’s files.
To enable FileVault, follow these steps:
Open System Preferences.
Double-click the Security icon within the Personal section.
Select Turn On FileVault (you’ll be prompted to set a Master Password for the system if one hasn’t already been assigned).

The Mac will present a warning message stating that files will be encrypted. Users must enter the administrator password to proceed. Once the password has been entered the Mac begins to encrypt the user’s Home Folder. This process can take some time depending upon the number and size of files stored within the Home Folder.

When complete, the Mac will present the login Window. You can then log back in to the Mac system and will find the Home Folder contents are now encrypted, as shown by a FileVault icon on the user’s login window.

Secure virtual memory

Virtual memory is the data the Mac stores on the hard drive when operations exceed available RAM.

By enabling Secure Virtual Memory you can prevent hackers from accessing information including passwords etc. from a user’s live swap file. While it sounds unlikely, the increase of unencrypted Wi-Fi hotspots has increased the chances of such a breach.

To enable Secure Virtual Memory, follow these steps:
Open System Preferences.
Double-click the Security icon from within the Personal section.
Press on the padlock to enable changes.
Supply a username and administrator password.
Check the box for Use Secure Virtual Memory.

Other recommendations

Mac users can also take further steps to help secure their system. In addition to disabling automatic login (the checkbox is accessed using the Security applet within System Preferences), you should disable fast user switching (accessed from the Accounts applet in System Preferences). When using new Macs, care should be taken to leave the UNIX-powered machine’s root account off.

To disable the root user account (if enabled), follow these steps:
Open the Mac’s Finder application.
Navigate to the Applications folder.
Open the Utilities folder.
Open NetInfo Manager.
Select Security from the top menu bar and select Authenticate.
Enter a username and administrator password and press OK.
Highlight Security from the menu bar.
Select Disable Root User.

Monday, September 03, 2007

eCards and Postcards from Friends

From: BlueMountain.Com ufp@btconnect.com

Subject: You’ve received a postcard from a School mate!

Hi. School mate has sent you a postcard.
See your card as often as you wish during the next 15 days.

SEEING YOUR CARD

If your email software creates links to Web pages, click on your
card’s direct www address below while you are connected to the Internet:

http://**.***.***.**/?e3ca036e47840d8e117868911e6c3

Or copy and paste it into your browser’s “Location” box (where Internet
addresses go).

We hope you enjoy your awesome card.

Wishing you the best,
Webmaster,

BlueMountain.Com

At present there are millions of these being mass mailed on a daily basis, from ’schoolmates’, ‘friends’, ‘family members’, ‘your mate’ and many more.

Ensure that your Anti-Virus is up to date, and all system security patches have been downloaded.

NO Greeting Card company will ever ask you to DOWNLOAD anything, ecards are viewed online through a link in an email, but the links contained in these ‘cards’ prompt you to download.

In this particular case, if you click the link you are PROMPTED to DOWNLOAD or informed that your DOWNLOAD will start shortly.

It is important that you just delete these mails, many contain a Trojan Script…..but they will not zero your drive or boot sector as the rumours are saying.

As with all emails, if you don’t know the sender DELETE it.

How to ruin your PC

Fighting off Viruses

AVG Anti-Rootkit Free

Grisoft has developed quite a following with its free (for personal, non-commercial use) security applications, and for good reason.

Now there’s an anti-rootkit utility in AVG’s free software stable, too, and for users seeking a minimum of interaction, AVG Anti-Rootkit Free may very well be the Right Tool for the Job.

Grisoft makes its free AVG Anti-Rootkit application available for download. Users download the avgarkt.exe setup file, which features simple installation.

You may download a free version of AVG Anti-Rootkit here.

In keeping with the goal to make AVG Anti-Rootkit a very simple tool, the file features a simple .exe install file that triggers a setup wizard.

Users can select between a normal interface (which Grisoft recommends and sets as the default) or a low graphics interface (which is optimized for visually impaired users who rely on screen-reading programs).

Users must accept the AVG Anti-Rootkit Free license agreement before they can use the program to check their Windows system for stealth rootkit programs.

Next, users must specify the location of the AVG Anti-Rootkit Free installation files.

As with most software programs, users must specify the name of the Start Menu Folder. This is the name the AVG Anti-Rootkit application receives on the user’s Start menu.

Once users have specified all setup information, the free anti-rootkit utility installs itself.

Due to the way most anti-rootkit applications operate, it’s necessary to reboot Windows to enable proper operation. AVG’s free anti-rootkit application is no different. AVG’s setup utility gives users the option of rebooting immediately automatically or manually rebooting later.

AVG purposefully keeps its anti-rootkit interface simple. There are very few options for users to choose, thereby helping simplify the already confusing and complex world of rootkits.

AVG includes concise educational information aimed at helping regular (non-IT professionals) better understand the threat stealth rootkit programs present.

The Learn More tab lists information on what rootkits are and how users can protect their PCs from the stealth threats. There’s also a link to Grisoft’s site where additional computer security information is made available.

Users can check for AVG Anti-Rootkit Free updates using the third tab (About & Update). Clicking the About & Update tab also reveals the current version users have installed.

An interesting note, Grisoft informs users on this third tab why the AVG Anti-Rootkit uses random window titles. The reason is that AVG’s programmers wanted intentionally to change the name of the window the free anti-rootkit application uses to help thwart detection efforts rootkit hackers might program into their malware.

If users click the Check For New Version button found on the third About & Update tab, they are directed to Grisoft’s Web site. Here users will see whether the version they are using is current or whether updates must be downloaded.

The Search For Rootkits tab is the meat of the program and the reason users will download it in the first place.

Clicking the Search For Rootkits button triggers a search of stealth rootkit programs. The free AVG application tracks its progress in the progress bar at the menu’s bottom.

By default, the Search For Rootkits button only searches critical Windows directories on the root drive.

When no rootkits are found, AVG presents a congratulations window.

When rootkits are found, AVG displays those that are found (with information on the rootkit path and type). Users can then highlight the rootkit items in question and click the Remove Selected Items button to eliminate the offending files from their Windows systems.

With the In-Depth Search, however, AVG Anti-Rootkit searches for stealth rootkit files on all the hard drives and partitions within a system.

Just as with the simple rootkit search, the AVG Anti-Rootkit Free application tracks its progress as it works. Should users wish, they can terminate the search using the provided Stop button.

These are all the options a user can select when working with AVG’s free anti-rootkit program. By purposefully keeping the application easy to use, AVG engineers have created a free malware detection utility that’s the Right Tool for regular (personal) users seeking to check their systems for unwanted stealth software.

Download your copy here