Showing posts with label PCs Safer. Show all posts
Showing posts with label PCs Safer. Show all posts

Sunday, July 17, 2011

Samsung Beam i8520 features 3G Network and latest price

Feature and Specifications of Samsung Beam i8520:-
  • 2G Network: GSM 850 / 900 / 1800 / 1900
  • 3.5 mm audio jack
  • OS Android OS, v2.1 (Eclair)
  • Size 480 x 800 pixels, 3.7 inches
  • Stand-by Up to 630 h (2G) / Up to 530 h (3G)
  • Talk time Up to 14 h 10 min (2G) / Up to 7 h 20 min (3G)
  • USB Yes, microUSB v2.0
  • Video Yes, 720p@30fps, video light
  • WLAN Wi-Fi 802.11 b/g/n, DLNA
  • 3G HSDPA 7.2 Mbps, HSUPA 5.76 Mbps
  • 3G Network: HSDPA 900 / 1900 / 2100
  • Battery Standard battery, Li-Ion 1800 mAh
  • Bluetooth Yes, v2.1 with A2DP
  • Camera Primary 8 MP, 3264×2448 pixels, autofocus, LED flash
  • Card slot microSD (TransFlash) up to 32GB
  • CPU 800 MHz processor
  • Data GPRS Class 10 (4+1/3+2 slots), 32 – 48 kbps
  • Dimensions 123 x 59.8 x 14.9 mm
  • Display Type Super AMOLED capacitive touchscreen, 16M colors
  • DNSe (Digital Natural Sound Engine)
  • EDGE Class 10, 236.8 kbps
  • Features Geo-tagging, face, smile and blink detection
  • Internal 16 GB storage, 512MB ROM, 384MB RAM
Samsung Beam i8520 is available in India at the Rs. 17,000/-

Saturday, June 14, 2008

How to test your firewall

Test firewall

The firewall is our gateway to the Internet. It is a piece of software or hardware that manages Internet connections to and from your computer. It monitors the applications that try to initiate connection with your computer from the Internet, and it controls which programs are allowed to use the Internet.

Nowadays, Internet users are exposed to several kinds of Internet threats, such as software vulnerabilities, automated worms, viruses and random Internet attackers. Properly configured personal firewalls are the first line of defense to answer these threats.

But how do you test your personal firewall? Security researchers have developed small, non-destructive, leak testers, that deliberately attempt to test different firewall capabilities. The idea behind them is simple: if the test can bypass your computer’s security, then so can a hacker.

There are many leak-testing programs available. Each one designed to test a particular flaw and each using a particular technique to bypass a firewall’s standard protection mechanisms. We’ve compiled a list of tools we believe will be of value to both home users and advance users.

  1. PCFlank Leaktest - PCFlank Leaktest is a small utility that tests any firewall’s ability to protect against unauthorized or illegal transmissions of data from a user’s computer that is connected to the Internet. It uses a special technique to impersonate another program, which your firewall has been set to trust.
  2. Breakout - Breakout sends to the IE’s or Firefox’s address bar the URL to launch, via the ‘SendMessage’ Windows API. No code is injected. Usually very hard to detect by firewalls. If the test is a success, this means that your firewall does not check for the ‘messages’ sent to your applications windows.
  3. DNSTester - Starting from Windows 2000, a Windows service DNS client is running and handles all DNS requests. Thus, all DNS requests coming from various applications will be transmitted to the DNS client which will, itself, do the DNS request. This feature can be used to transmit data to a remote computer by crafting a special DNS request without the firewalls notice it. DNStester uses this kind of DNS recursive request to bypass your firewall.
  4. MBTest - MBtest send packets directly to the network interface to try to bypass firewall. To do this, it sends differents kind of packet of different size/protocoles/type. If the test is a success, this means that your firewall is stuck in high level network and doesn’t check low level.
  5. Atelier Web Firewall Tester - AWFT probes the protection provided by your Personal Firewall software using six different tests. Each test uses a different technique for gaining access to the outside world. Techniques are differently rated, according to their sophistication, and your Personal Firewall is doing a great job if is able to score 10 points in total.
  6. ZABypass - Originaly was developed to bypass old versions of ZoneAlarm, but it may work against many other firewalls today. It uses a special technique called Direct Data Exchange to transfer data between Internet Explorer and the Internet.
  7. FireHole - FireHole attempts to launch the default web browser, inject its own DLL and try to establish a connection to the Internet.
  8. Thermite - Thermite injects it’s code into the target process directly, by creating an additional malicious thread within that process. If the test is a success, this means that your firewall is vulnerable to process injection.
  9. Leak tests are designed to help identify security flaws and provide the invaluable function of informing the user whether or not their firewall is providing adequate protection. Unfortunately, malware programs are evolving rapidly. Many of such programs (will) have very advanced techniques to conceal their malicious activities so that they easily bypass firewalls and other protection mechanisms.

How to Detect a Hacker Attack

Detect a Hacker Attack

Most computer vulnerabilities can be exploited in a variety of ways. Hacker attacks may use a single specific exploit, several exploits at the same time, a misconfiguration in one of the system components or even a backdoor from an earlier attack.

Due to this, detecting hacker attacks is not an easy task, especially for an inexperienced user. This article gives a few basic guidelines to help you figure out either if your machine is under attack or if the security of your system has been compromised. Keep in mind just like with viruses, there is no 100% guarantee you will detect a hacker attack this way. However, there's a good chance that if your system has been hacked, it will display one or more of the following behaviours.

Windows machines:

  • Suspiciously high outgoing network traffic. If you are on a dial-up account or using ADSL and notice an unusually high volume of outgoing network (traffic especially when you computer is idle or not necessarily uploading data), then it is possible that your computer has been compromised. Your computer may be being used either to send spam or by a network worm which is replicating and sending copies of itself. For cable connections, this is less relevant - it is quite common to have the same amount of outgoing traffic as incoming traffic even if you are doing nothing more than browsing sites or downloading data from the Internet.
  • Increased disk activity or suspicious looking files in the root directories of any drives. After hacking into a system, many hackers run a massive scan for any interesting documents or files containing passwords or logins for bank or epayment accounts such as PayPal. Similarly, some worms search the disk for files containing email addresses to use for propagation. If you notice major disk activity even when the system is idle in conjunction with suspiciously named files in common folders, this may be an indication of a system hack or malware infection.
  • Large number of packets which come from a single address being stopped by a personal firewall. After locating a target (eg. a company's IP range or a pool of home cable users) hackers usually run automated probing tools which try to use various exploits to break into the system. If you run a personal firewall (a fundamental element in protecting against hacker attacks) and notice an unusually high number of stopped packets coming from the same address then this is a good indication that your machine is under attack. The good news is that if your personal firewall is reporting these attacks, you are probably safe. However, depending on how many services you expose to the Internet, the personal firewall may fail to protect you against an attack directed at a specific FTP service running on your system which has been made accessible to all. In this case, the solution is to block the offending IP temporarily until the connection attempts stop. Many personal firewalls and IDSs have such a feature built in.
  • Your resident antivirus suddenly starts reporting that backdoors or trojans have been detected, even if you have not done anything out of the ordinary. Although hacker attacks can be complex and innovative, many rely on known trojans or backdoors to gain full access to a compromised system. If the resident component of your antivirus is detecting and reporting such malware, this may be an indication that your system can be accessed from outside.

Unix machines:

  • Suspiciously named files in the /tmp folder. Many exploits in the Unix world rely on creating temporary files in the /tmp standard folder which are not always deleted after the system hack. The same is true for some worms known to infect Unix systems; they recompile themselves in the /tmp folder and use it as 'home'.
  • Modified system binaries such as 'login', 'telnet', 'ftp', 'finger' or more complex daemons, 'sshd', 'ftpd' and the like. After breaking into a system, a hacker usually attempts to secure access by planting a backdoor in one of the daemons with direct access from the Internet, or by modifying standard system utilities which are used to connect to other systems. The modified binaries are usually part of a rootkit and generally, are 'stealthed' against direct simple inspection. In all cases, it is a good idea to maintain a database of checksums for every system utility and periodically verify them with the system offline, in single user mode.
  • Modified /etc/passwd, /etc/shadow, or other system files in the /etc folder. Sometimes hacker attacks may add a new user in /etc/passwd which can be remotely logged in a later date. Look for any suspicious usernames in the password file and monitor all additions, especially on a multi-user system.
  • Suspicious services added to /etc/services. Opening a backdoor in a Unix system is sometimes a matter of adding two text lines. This is accomplished by modifying /etc/services as well as /etc/ined.conf. Closely monitor these two files for any additions which may indicate a backdoor bound to an unused or suspicious port.

3 Security Features to Help Keep Your PCs Safer

PCs Safer

1. Windows Defender
You or your employees may get tricked into downloading spyware to your business’s PCs through e-mail messages or from “spoof” Web sites. (Spyware refers to an array of software that can be installed on a PC inadvertently, or without the user’s consent.) Windows Defender, shown below, helps protect your PCs against security threats caused by spyware.

Windows Defender does three key things to protect your PCs from spyware:

• It scans for spyware on your PC and presents you with options for ignoring, allowing, or deleting any potential threats it has quarantined.
• It monitors the common entry points for spyware on your PC in real time.
• It stays current on what the latest spyware threats are so it can scan for them.

Because Windows Defender takes advantage of many of the Windows Vista platform enhancements, including improved caching technology, scans run quickly. And most of the work is done in the background without requiring your intervention or attention. Windows Defender will only alert you to serious issues that require immediate action. You will stay busy and productive with the confidence that your PCs have enhanced protection while you work.

Note: Windows Vista does not include real-time virus protection. The features discussed in this article complement antivirus software but are not a substitute for third-party antivirus software.

2. User Account Control

In Microsoft Windows XP, a user must be an “administrator” to accomplish certain day-to-day tasks like changing power settings on a portable computer or installing and updating software. One of the purposes of requiring administrator privileges is to help protect PCs from harmful downloads of malicious software - or malware. Malware refers to unwanted software including worms, viruses, adware, and spyware that could delete or steal files and information from the PC.

While this scenario keeps your PCs safer, it also limits productivity because each time a standard user needs to change a basic setting or install software, the user has to locate someone with administrator privileges to help.

Windows Vista Ultimate changes all this by offering User Account Control (UAC), a feature that makes it easier to use a PC with standard user privileges. You can create separate accounts for yourself and your employees and easily set up security parameters on each account to control which Web sites and programs each user can access and install-all without additional IT support. In addition, even when you use an administrator account, you will still benefit from increased security. Most programs run with standard user permissions by default, even when you are logged in as an administrator, which limits potential damage from malware.

3. Internet Explorer 7

To help protect against cyber attacks, businesses need a higher level of protection when employees use the Web. That is why the Internet Explorer 7 browser, included with Windows Vista Ultimate, features a number of security enhancements such as stronger safeguarding of personal data and protection against malware.

A key feature of Internet Explorer 7 is the Microsoft Phishing Filter designed to keep confidential data safer. Shown below, the Phishing Filter helps protect you from attacks that occur when you enter sensitive data, such as credit card numbers, into a Web site form that looks legitimate, but is actually designed to steal confidential information.

The Phishing Filter helps protect your business by:

• Comparing the sites you visit to addresses of reported legitimate sites
• Analysing the sites you visit for phishing characteristics
• Sending the addresses of the sites you visit to an online service that keeps a database of known phishing sites

If a site you visit has been confirmed as a phishing site, you will be warned of its threat level and automatically redirected to a safer page. The online database of known phishing sites is an opt-in service. If desired (though not recommended), the Phishing Filter can be deactivated with a single click. Used in combination with Windows Defender, Internet Explorer 7 helps keep your PCs and data safe.

Maintain PC security

PC Security must be your first priority. Your personal computer is a common target for intruders and other malicious users because they want to access personal data such as bank account information, credit card numbers or any important data they could find.

Intruders not only steal your financial information, they could also use your computer resources – such as hard disk, processor and internet connection to attack other users. This way, law enforcement will find it difficult to solve where the attacks are coming from.

To prevent possible identity theft or computer hijack, follow these eight steps in maintaining PC security:

1. Anti-Virus Programs – These programs search and assess the contents of each computer file then removes or destroys “virus signatures”, which are known to be harmful to your computer.

2. Patch up your System – This process involves fixing the operating system and restoring different functions of your computer. Most computer vendors offer patches that are designed to fix bugs in their products. This process is repeated until the patch fixes the problem completely.

3. Email Attachment Precautions – Most unsolicited items, such as exploding packages or letter bombs, can be sent through your e-mail. Take extra precaution in opening emails to prevent any harm your computer may receive.

4. Firewall Programs – Install and use a firewall program. These programs act as a guard to your computer when looking at network traffic received from or destined for other computers. The firewall program determines if certain traffic should be allowed to continue to its destination or stopped. These programs keep the unwanted out and permit only “healthy” traffic to enter and leave your computer.

5. Data Backups – It is important that back up your data in your computer’s hard disk, external hard disk drives or any removable media. This ensures each important data will not be harmed when computer problems arise.

6. Strong Passwords – It is important to mix up several numbers, symbols and letters to strengthen password safety. An ideal length of password is around eight or more letters, numbers or symbols.

7. Download and Installation – Be careful in accepting or downloading any material online to prevent virus attacks and computer hijacks.

8. Hardware Firewall – Hardware firewall, which works similarly to firewall programs, stands between your personal computer and the Internet.

Although these steps may seem simple, remember that maintaining computer safety is a continuous process. You cannot perform these tasks once and let your computer be. Get back to each of these steps regularly and check if you need program updates.

Keeping your computer secure is in your hands. Outsmart computer hijackers by reinforcing computer safety precautions.

Followers

Get our toolbar!

 
Design by Wordpress Theme | Bloggerized by Free Blogger Templates | JCPenney Coupons