Please feel free to contact me if you have questions or comments. Koralleen Stavish [email_address] 0300G Symons Hall (301) 405-2916
A router sits between your internet service and your PCs in a network (even if it’s just a network of one machine in your home). T hey help to secure the network using a protocol called NAT (Network Address Translation). NAT obscures the computers from the rest of the Internet and uses the router-firewall as a mediator for all communication to and from the Internet. If your network is inaccessible, no one can see the personal documents, financial records, or other vital information that resides on its machines. A nice feature is the fact that they are operating-system independent. The built-in security standard for 802.11x - WEP (Wired Equivalent Privacy) - has been criticized for poor effectiveness. NetStumbler, software tool for Windows that searches for open networks / War Driving Enable 128-bit WEP Change the default password that comes with wireless router-firewalls (the &quot;Access Point&quot;). Install software firewalls on all machines to help detect possible intrusions (more about this in the next article in this series). Audit your Access Point logs frequently to see who's using the network. Expect further safeguards to be forthcoming Pentium III chip included a unique identifier for tracking. It was supposed to control piracy but privacy-conscious consumers went nuts when they heard about it. Intel agreed to a default “off” setting, but the feature is still present on the chips. Pentium IV chips do not have this. In addition to software keyloggers, several types are devices that sit between the mouse and its PS/2 port.
Virus information sites: http://www.helpdesk.umd.edu/virus/news.shtml http://www.symantec.com/avcenter/ http://us.mcafee.com/virusInfo/default.asp
Two examples – there are many available, most with free trials Zone Alarm http://www.zonelabs.com/store/content/home.jsp Sygate http://www.sygate.com/products/sygate-personal-firewall-pro.htm Free “firewall” included with XP does not protect outgoing data.
Proxy software examines all the packets coming in to your web browser. As a new page is requested, the proxy examines the Web page's HTML, scripts, and graphics, checking these against your preferences so that it knows what you want to view. Lots of these are available, too: Web Washer http://www.webwasher.com/ Guidescope http://www.junkbuster.com/guidescope.html AdSubtract http://www.intermute.com/adsubtract/ Using a proxy can speed up your browsing right away.
Free spyware checkers: http://www.spychecker.com/software/antispy.html (Ad-Aware and SpyBotS&D are recommended) Time-limit control: http://members.aol.com/YPEmail/ (free and simple) http://www.akrontech.com/ (free trial, multiple profiles) Content control: http://www.cybersitter.com/ http://www.cyberpatrol.com/ http://www.netnanny.com/index.html Browser-enabled content control depends on Internet Content Rating Association labelling. Windows Update: http://windowsupdate.microsoft.com/ Depending on the version, MS Word retains various types of information in all documents. These can be revealed by opening the document in Word while using the “recover text from any file” file type.
In Outlook or Outlook Express, to work offline just go to the &quot;File&quot; menu and choose &quot;Work Offline&quot;. Unfortunately, due to the way Microsoft tied its e-mail programs and Internet Explorer together, your choice to work offline in your e-mail program also prevents your Web browser from accessing the Internet. You’ll still be able to browse using your Netscape browser if you like, but you’ll have to reconnect to use IE. In Netscape, you can choose the File menu, then select &quot;Offline&quot; and highlight &quot;Work Offline“ OR click the icon at the bottom of the browser window that looks like wires connected by a plug. Click the icon again to go back online. Encryption : http://web.mit.edu/network/pgp.html Some people filter out messages that do not have their email address in the to: field as spam.
Filters can be set for umd.edu addresses by using the web utility - will work even if you read mail using other clients To filter for key words of your choice in Outlook 2000 and Outlook XP - do the following: in Outlook, create a new folder (ideally in your 'personal folder') called 'Spam' (or whatever you like). click on the 'Tools' menu then 'Rules Wizard' option - see 'Rules Wizard' dialog. click on the 'New' button to create a new rule. click on 'Move messages based on content' text - see options change at bottom of dialog. click on the 'Specific Words' option at bottom of dialog - see new dialog. type in your word or words then click 'Add' button, then click OK - see old dialog. click on 'Specific' folder option and navigate to your Spam folder then click OK. click on the 'Next' button, then click 'Next' again and then 'Next' yet again - see &quot;Add any exceptions&quot;. scroll down a little then click the 'except if the body contains' option. click on the 'specific' words option - see new dialog. type in an 'exception word' so that people can send you email of this kind if necessary. click on the 'Add' button then OK. click on the 'Finish' button. In Netscape, do the following: 1. From the Edit menu, choose Message Filters to display the &quot;Message Filters&quot; dialog box. 2. Click the New button to display the &quot;Filter Rules&quot; dialog box. 3. Enter a name for the set of rules you're about to define (such as Junk Mail) in the &quot;Filter Name:&quot; text box. 4. The middle portion of the dialog box is where you enter the filtering criteria. 5. Choose (click)the appropriate radio button to match ANY or ALL of the criteria you specify. For example, to delete messages from a number of different sources and containing various subject lines, you'll probably want to choose &quot;Match ANY of the following“. Choose &quot;Match ALL of the following&quot; when you want to refine the specifications — to include exceptions to the rule, for example 6. Make selections from the drop-down menus and enter text in the text box as appropriate. 7. To include additional criteria, click the More button. 8. When finished specifying rules, stipulate what to do if the rules are met by selecting Delete from the drop-down menu next to &quot;then&quot;. 9. Finally, click the OK button.
To disable AutoComplete, you need to go to two places: First of all, open IE and select the Tools menu, then choose &quot;Internet Options ...&quot; and the &quot;Advanced&quot; tab. Scroll down and uncheck the box next to &quot;Use inline AutoComplete for Web addresses&quot;. Next, without closing the &quot;Internet Options ...&quot; dialog box, select the &quot;Content&quot; tab and then the &quot;AutoComplete ...&quot; button. Here you check or uncheck the boxes next to the items you want AutoComplete to remember: &quot;Web addresses&quot;, &quot;Forms&quot;, and &quot;User names and passwords on forms&quot;. If you decide to check next to &quot;User names and passwords on forms&quot;, make sure you also check &quot;Prompt me to save passwords&quot; so you can tailor your choices for each Web site. Click &quot;OK&quot; to close the dialog box, and you're done Open Netscape and select the Edit menu, choose &quot;Preferences ...&quot;, then &quot;Privacy & Security&quot;, and &quot;Passwords&quot;. Check or uncheck the box next to &quot;Remember passwords&quot;, depending upon your certainty that your machine is secured. If you decide to enable &quot;Remember passwords&quot;, make sure that you also check &quot;Use encryption when storing sensitive data”. It is possible to fake many, sometimes all, of the header elements that identify the true source of an email. URL cloaking masks the true destination of a link.
There’s no way to recover a forgotten BIOS password—you can only reset it mechanically. Start > Programs > Accessories > System Tools > Backup Never leave your password set to the default that was assigned to you. Don't use your name - even backwards. * Don't use your dog's name. Don't use your spouse's name. * Don't use the kind of car you drive. Don’t use anything found in a dictionary. Not even joined together, like mycutedog. Don’t use anything found in a foreign dictionary. * Don’t use only numbers. A good password includes a mixture of capital letters, small letters, numbers, and symbols. It should be easy to remember, but hard to guess. CNET Security Watch http://reviews.cnet.com/4520-3513_7-5020904.html CERT Coordination Center http://www.cert.org/nav/index_red.html http://www.symantec.com/avcenter/hoax.html http://www.vmyths.com/ http://www.snopes.com/
Cyber Security Preserving your privacy Safeguarding your data Presented 1/21/05 AGNR CIT Professional Development
Use it--either a combined program or two separate programs. Download and install the updates, at least weekly and whenever you read about a new virus in the news. Some antivirus products automatically check for updates. Enable that feature and set it to "daily."
Install an e-mail and file encryptor (like PGP). Encrypting all your e-mail or your entire hard drive is unrealistic, but some mail is too sensitive to send in the clear. Similarly, some files on your hard drive are too sensitive to leave unencrypted.