<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-7564961578552297289</atom:id><lastBuildDate>Mon, 07 Oct 2024 05:52:57 +0000</lastBuildDate><category>Android</category><category>Antivirus AV Secure</category><category>SSID</category><category>Social networking security hyperlink</category><category>WiFi security</category><category>home router</category><category>security</category><category>virus</category><title>I.T. security for non-I.T. people</title><description></description><link>http://securityfornonit.blogspot.com/</link><managingEditor>noreply@blogger.com (Mike McLaughlin)</managingEditor><generator>Blogger</generator><openSearch:totalResults>12</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7564961578552297289.post-4359551580451748322</guid><pubDate>Fri, 22 Jul 2011 21:34:00 +0000</pubDate><atom:updated>2011-07-22T14:34:06.281-07:00</atom:updated><title>Blog move</title><description>After much pain and effort, mainly from &lt;a href=&quot;http://twitter.com/tobydbb&quot;&gt;@TobyDBB&lt;/a&gt;, my blog has now moved to&amp;nbsp;&lt;a href=&quot;http://www.securityfornonit.co.uk/&quot;&gt;http://www.securityfornonit.co.uk/&lt;/a&gt;. Please jump along and have a look.</description><link>http://securityfornonit.blogspot.com/2011/07/blog-move.html</link><author>noreply@blogger.com (Mike McLaughlin)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7564961578552297289.post-1670343871002283875</guid><pubDate>Mon, 11 Jul 2011 18:55:00 +0000</pubDate><atom:updated>2011-07-11T11:55:02.720-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">security</category><category domain="http://www.blogger.com/atom/ns#">virus</category><title>Another Android Trojan, again!</title><description>&lt;a href=&quot;http://threatpost.com/en_us/blogs/new-sms-trojan-targeting-android-users-071111&quot;&gt;http://threatpost.com/en_us/blogs/new-sms-trojan-targeting-android-users-071111&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Android, I love it. It is my mobile platform of choice, and I have even converted the wife!&lt;br /&gt;
I have followed it from the beginning, and now it is taking off in a big way. Samsung, HTC, Motorola and Asus have all jumped on board, mobile phones, tablets, even &lt;a href=&quot;http://www.tgdaily.com/consumer-electronics-brief/52217-nikon-plans-a-3d-android-based-digital-photo-frame&quot;&gt;photo frames&lt;/a&gt;, it really is everywhere. People may be using mobiles and not realise they are running Android, is that a sign of success? I think so, but I digress.&lt;br /&gt;
Unfortunately, the price of success today is increased focus from the bad guys. Look at Apple, for years Mac owners&amp;nbsp;believed&amp;nbsp;they didn&#39;t need antivirus as there wasn&#39;t any malware designed to target Macs. Now, this may have been true, but this was down to Apple having a tiny PC market share compared to Microsoft, so the bad guys targeted Microsoft. A bigger return on investment. Now Macs are more popular we are seeing more and more malware aimed&amp;nbsp;Apples&amp;nbsp;way. As&amp;nbsp;shown&amp;nbsp;in the following BBC article:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.bbc.co.uk/news/technology-13453497&quot;&gt;http://www.bbc.co.uk/news/technology-13453497&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
And Android is seeing the same, the fact it is open source and the Android Market rules are a lot more lenient than Apple&#39;s AppStore just compounds the problem. However, with a little research the risks can be reduced significantly. Here&#39;s a few pointers:&lt;br /&gt;
&lt;br /&gt;
1. Before installing any app, Android informs you what permissions the app is asking for. These permissions are essentially what controls what the app can do. Ask yourself why the app needs to do this? Why would a wallpaper app need to SMS people? An excellent article on Android Central lists some of the scarier permissions and what they mean. Check it out, it could save you in future&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.androidcentral.com/look-application-permissions?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+androidcentral+%28Android+Central%29&quot;&gt;http://www.androidcentral.com/look-application-permissions?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+androidcentral+%28Android+Central%29&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
2. Read the reviews! Unless you are like me (must have new toys now!), then wait a while and let the braver &quot;testers&quot; install the app and review it. Let the others take the risks (unless you are one of those risk takers, but then that&#39;s a whole new ball game).&lt;br /&gt;
&lt;br /&gt;
3. Only install apps from trusted sources. Well, trusted is a bit of a loose term, as malicious apps have appeared in Google&#39;s official Android Marketplace, but Google are pretty swift to &lt;a href=&quot;http://www.geek.com/articles/mobile/google-removes-malicious-angry-birds-apps-from-android-market-20110614/&quot;&gt;mop them up once alerted&lt;/a&gt;. But for the purpose of this post we&#39;ll call them trusted. So, try and stick to the Android Marketplace, Amazons app store (for the US readers), GetJar etc. Although the lines are going to become blurred even further with more &amp;nbsp;app stores on the horizon (Samsug and HTC are both looking to get in on the game).&lt;br /&gt;
&lt;br /&gt;
4. Most of all, use some common sense. If it doesn&#39;t feel right, for whatever reason don&#39;t install it. This applies to all mobile platforms, not just Android.&lt;br /&gt;
&lt;br /&gt;
Don&#39;t get me wrong, i love Android, and I wouldn&#39;t swap for another mobile platform. But everyone should apply the same thinking they do with their PCs. Downloading practices have been forced down everyone&#39;s throats for years now, carry them over to your mobile devices.</description><link>http://securityfornonit.blogspot.com/2011/07/another-android-trojan-again.html</link><author>noreply@blogger.com (Mike McLaughlin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7564961578552297289.post-7439159635472051368</guid><pubDate>Sat, 09 Jul 2011 08:53:00 +0000</pubDate><atom:updated>2011-07-09T01:53:16.984-07:00</atom:updated><title>Google+, first thoughts.</title><description>Ever since Google+ started it&#39;s &quot;limited field trial&quot; I have been itching to give it a go. I mean, who doesn&#39;t want to play with the shiny new toys? Luckily a good friend &lt;a href=&quot;https://twitter.com/#!/f1nux&quot;&gt;@f1nux&lt;/a&gt;&amp;nbsp;dropped me an invite last night. So the playing began.&lt;br /&gt;
&lt;br /&gt;
I like it, whether it is a &quot;Facebook killer&quot; I&#39;m unsure, but it is definitely the best social network offering from Google to date. But what about security? Google doesn&#39;t have the greatest past record when it comes to protecting personal information, and have no doubt anything posted on Google+ will be used to refine their ad serving technologies (just as Facebook do).&lt;br /&gt;
But I do like Google&#39;s Circles idea, which is grouping your friends into different Circles. When you post/share anything, you choose which Circles can see it. A mix of Facebook and Twitter almost.&lt;br /&gt;
This idea covers your profile as well. Every bit of your profile can be locked down to particular Circles, all Circles or anyone on the web, allowing you to refine who sees what. For example, my personal email address is available to my Family and Friends Circles, but my work email address is only available to my work Circle. This kind of granularity is what I have wanted in Facebook for a long time, real management of personal information.&lt;br /&gt;
&lt;br /&gt;
Will it take off? Who knows, I can see it as an excellent way to run both personal and business social networking in one place. It seems the doors are closed again for now, but feel free to post your email address if you want an invite and I&#39;ll drop one across when they reopen.</description><link>http://securityfornonit.blogspot.com/2011/07/google-first-thoughts.html</link><author>noreply@blogger.com (Mike McLaughlin)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7564961578552297289.post-1826612317296511660</guid><pubDate>Fri, 08 Jul 2011 17:08:00 +0000</pubDate><atom:updated>2011-07-08T10:08:36.861-07:00</atom:updated><title>Get your phreak on. Well, don&#39;t actually.</title><description>So, the News of the World is shutting down, and as it should. The &quot;hacking&quot; scandal has lowered my opinion of the tabloid press to rock bottom, but whatever sells a story right?&lt;br /&gt;
Enough of the rant though, back to the point. Phones weren&#39;t really &quot;hacked&quot;, it isn&#39;t some mystical voodoo skill only a handful of people know, and I think some&amp;nbsp;individuals&amp;nbsp;may find it funny to do the same to their &quot;friends&quot; over the next few weeks as it is the most recent &quot;cool&quot; thing. David Rogers from the Naked Security blog posted some helpful tips and explanations &lt;a href=&quot;http://nakedsecurity.sophos.com/2011/07/08/how-phone-hacking-worked/&quot;&gt;here&lt;/a&gt;, have a read and see what you think. Have a play with your own phone and number, can you get in?&lt;br /&gt;
&lt;br /&gt;
I remember getting my first mobile and this kind of &quot;hacking&quot; (although it wasn&#39;t called that amongst my group of friends) was&amp;nbsp;prevalent&amp;nbsp;as practical jokes. The fact that every mobile on the same carrier used the same default PIN to have remote access to voicemail made it all the easier. But in todays privacy driven, ever connected world your voicemails may be worth something to someone. The bad guys are always finding more ways to make money from personal information, so don&#39;t make it easy. Follow the steps in David Rogers post and see if you are vulnerable. If you are, fix it. Even the minor annoyance of having your voicemail greeting changed should be enough to motivate you to check your settings.&lt;br /&gt;
Some may accuse me of scaremongering, but in my line of work I see the outcomes of what bad guys on the Interwebs do everyday, so isn&#39;t it better to have all the information available to you so YOU can make the informed decision?</description><link>http://securityfornonit.blogspot.com/2011/07/get-your-phreak-on-well-dont-actually.html</link><author>noreply@blogger.com (Mike McLaughlin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7564961578552297289.post-7439659081042520248</guid><pubDate>Wed, 22 Jun 2011 20:25:00 +0000</pubDate><atom:updated>2011-06-22T13:25:58.036-07:00</atom:updated><title>Updates, updates and, wait, more updates!</title><description>&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Java, Flash, Firefox/Internet Explorer/Chrome, Microsoft Office. Keeping everything up-to-date can be a pain, I know. I recently installed Secunia&#39;s Personal Software Inspector (PSI). Awesome is all I can say. It &quot;inspects&quot; everything installed on your machine and tells you if it requires an update. I have mine configured to run at boot time and it alerts if anything requires updating. There are some advanced options, but for home users just install and let it keep track of everything for you.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Here&#39;s a link:&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;http://secunia.com/vulnerability_scanning/personal/&quot;&gt;http://secunia.com/vulnerability_scanning/personal/ &lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Have fun!&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;</description><link>http://securityfornonit.blogspot.com/2011/06/updates-updates-and-wait-more-updates.html</link><author>noreply@blogger.com (Mike McLaughlin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7564961578552297289.post-3279614129113829714</guid><pubDate>Wed, 15 Jun 2011 18:53:00 +0000</pubDate><atom:updated>2011-06-15T14:44:03.931-07:00</atom:updated><title>Another hack? Oh well.....</title><description>&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Almost a year I have neglected this blog. Well no more! My promise to my millions of fans.....&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Anywho, the media is full of high profile hacks from the likes of &quot;Anonymous&quot; and &quot;Lulzsec&quot;. But does it matter to the average PC user at home? Well, in a word, yes.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Lulzsec have been pilfering website databases and releasing the information for anyone to download, including email addresses and passwords ( I won&#39;t link it, but it isn&#39;t all that hard to find....). One of the sites hit was a porn site. Now I&#39;m not suggesting anyone visits or registers on these sites (ahem), but the principle remains. The site was hacked, email address and password information was released. The problem? Not only could anyone log into the porn site as any registered user, people also started trying email accounts/facebook/twitter etc with the revealed passwords. And guess what? It worked!&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Whilst this may have been &quot;for the lulz&quot;, there are some serious security issues. If someone can read your email, they can also see where else you are a member. Do you use the same password for your online shops? I&#39;m guessing alot of people do. If not, as the bad guy has access to your email, resetting the password and retrieving it is trivial. Anything that is stored in your emails is fair game, a scary thought.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;I talked about creating secure passwords &lt;a href=&quot;http://securityfornonit.blogspot.com/2010/07/passwords-passwords-passwords.html&quot;&gt;here&lt;/a&gt;, and recent events should make people think more about their online security. The answer is simple, do not use the same password across multiple accounts. there are many password managers out there which can help create and securely store unique passwords. I use &lt;a href=&quot;http://keepass.info/&quot;&gt;KeePass&lt;/a&gt;, but there are plenty of other options (&lt;a href=&quot;https://lastpass.com/&quot;&gt;Lastpass&lt;/a&gt;, &lt;a href=&quot;http://passwordsafe.sourceforge.net/&quot;&gt;Password Safe&lt;/a&gt; etc), just Google, there are many to choose from.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Please, don&#39;t let &quot;lulz&quot; end up costing you more than a websites password...... &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;</description><link>http://securityfornonit.blogspot.com/2011/06/another-hack-oh-well.html</link><author>noreply@blogger.com (Mike McLaughlin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7564961578552297289.post-5860454407377401486</guid><pubDate>Wed, 18 Aug 2010 19:55:00 +0000</pubDate><atom:updated>2010-08-18T13:21:44.640-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">home router</category><category domain="http://www.blogger.com/atom/ns#">SSID</category><category domain="http://www.blogger.com/atom/ns#">WiFi security</category><title>The WiFi, it works!</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;H&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;ow busy is life? Babies, work, pets and the occasional bit of social life seem to be keeping me occupied, and the blog slips from my mind. I am back however! If any readers have specific questions you would like me to talk about please feel free to leave a comment or drop me a line on Twitter.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;div style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: &#39;Times New Roman&#39;; font-size: medium;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Anyway, on with the blog...&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Inspired by: Me! Having configured many home routers for others I thought I&#39;d share some of the pitfalls of the free WiFi router your ISP supplies in order to gain your custom.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: 13px;&quot;&gt;WiFi. The box arrives from your &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Internet_service_provider&quot;&gt;ISP&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: 13px;&quot;&gt;, you plug in your new router, follow the instructions to put in your account details for your Internet connection,turn on your PC and you have WiFi. Your PC connects automatically, your phone connects, your laptop, games console, fridge, freezer, etc, etc. It works, out of the box, excellent! Wrong, it is not excellent, if all your devices connect automatically then what about next doors laptop?&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;I have helped set up (and fix when not involved in the set up ;) ) enough home routers to know how many of them work. Infact, alot are exactly the same underneath, especially the free ones supplied by the ISP. So, can you secure these devices? Yes, you can certainly make your home WiFi more secure. First thing first though, get a pen and some paper. If you are going to change anything always write it down, and only change one thing at a time. This will help with fault finding should anything go wrong.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;Administrative account&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;The first step is always to change the default administrative account&#39;s password on the router. There are usually written instructions on how to login into the router (I would recommend using a wired connection to begin with) using the default password.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;It is trivially easy to find a default password for a router. Try yourself, Google for &quot;default password for {insert make and model of router}&quot;. Scary huh? As I described in &lt;a href=&quot;http://securityfornonit.blogspot.com/2010/07/passwords-passwords-passwords.html&quot;&gt;this post&lt;/a&gt;, good passphrases are easy to make and remember. Choose a strong one for the admin account.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;Remote assistance&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Does the router support remote assistance? Probably yes. Search through every menu, make sure this is turned off. Why would you want anyone, at any time, attempting to log into your router?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;If it is&amp;nbsp;required&amp;nbsp;you can turn it on as and when it is needed. If you do turn this on for someone to gain access, set a strong passphrase, and remember to disable it once it is no longer required. Remote assistance can be the foothold the bad guys need.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;b&gt;SSID Broadcast&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;An SSID is basically the name of your wireless network. If this is set to broadcast, your router is basically shouting from the rooftops &quot;If you want to join my network talk to me&quot;. Do you want anyone to join your wireless network? Didn&#39;t think so. Write down the SSID so you can manually configure devices with it and turn off broadcasting.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;Note: If you can, configure the router with a different SSID than the one that is pre-configured.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;Encryption&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;If your wireless network does not enforce encryption all the data you send can easily be read by a third party. This includes passwords to non-encrypted sites, such as Facebook. Even for encrypted web sites, encrypting the wireless network adds another layer of security to your data transfer.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Modern WiFi routers support &lt;a href=&quot;http://en.wikipedia.org/wiki/Wi-Fi_Protected_Access&quot;&gt;WPA&amp;nbsp;or WPA2&lt;/a&gt;, which is more than adequate for a home network. &lt;a href=&quot;http://en.wikipedia.org/wiki/Wired_Equivalent_Privacy&quot;&gt;WEP&lt;/a&gt;&amp;nbsp;may be supported, however this is considered weak encryption now and there are tools freely available which can break WEP based encryption.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;WPA/WPA2 can encrypt using a &lt;a href=&quot;http://en.wikipedia.org/wiki/Pre-shared_key&quot;&gt;pre-shared key&lt;/a&gt;, which is perfect for home users. Create a long password/phrase, and keep it in a safe place. I personally keep all my WiFi details in an encrypted file away from my computer ;)&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;Before turning on the encryption, ensure any device you want on the network supports WPA/WPA2. Most modern devices should, but there is no harm in checking.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;b&gt;DHCP&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Dynamic Host Configuration Protocol (&lt;a href=&quot;http://en.wikipedia.org/wiki/Dhcp&quot;&gt;DHCP&lt;/a&gt;) is a way of automatically configuring devices with the correct address information to &quot;talk&quot; on the network. This is an excellent protocol, making the chore of connecting new devices to the network seamless (usually). However, it could also make life easier for a bad guy to connect to your network. If you are extra paranoid (as I am), then turn off DHCP on the router and manually configure each device you want on the network. Here is a guide to configuring static addresses on some of the most common devices...&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;a href=&quot;http://portforward.com/networking/staticip.htm&quot;&gt;http://portforward.com/networking/staticip.htm&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;b&gt;Firewall&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: 13px;&quot;&gt;If your router has a firewall inbuilt, turn it on. It may not be the greatest in the world, but it is another layer of defense none the less. The firewalls that come preinstalled on these types of routers generally have three settings, deny all, allow all, and allow outbound but deny inbound. I recommend &quot;allow outbound but deny inbound&quot; as a general rule. This will stop connections from the Internet coming in, but not you browsing the web, emails etc.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: 13px;&quot;&gt;If you require connections to come in from the Internet (for remote access) I recommend researching the router in order to just allow the type of connections you&amp;nbsp;require.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: 13px;&quot;&gt;The above is only a brief overview of the settings you can encounter in the typical home router, and they can vary from model to model. Before changing anything, have a look through the settings, make sure you know what they do before you change them.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: 13px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: 13px;&quot;&gt;As always, comments and/or questions are more than welcome.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://securityfornonit.blogspot.com/2010/08/wifi-it-works.html</link><author>noreply@blogger.com (Mike McLaughlin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7564961578552297289.post-732380310358948093</guid><pubDate>Thu, 22 Jul 2010 13:15:00 +0000</pubDate><atom:updated>2010-07-22T06:15:57.499-07:00</atom:updated><title>Passwords, passwords, passwords.....</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Inspired by the comment: &quot;Why do I need a password when I&#39;m the only one who uses the computer?&quot;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;I&#39;m assuming if you are reading this then you have used one recently (hopefully!), but what&#39;s the point? Simply, passwords are the fortress protecting a wealth of &lt;b&gt;YOUR &lt;/b&gt;data, your shopping list, your Amazon wishlist, your&amp;nbsp;favourite&amp;nbsp;sites, your Facebook information, all the information on your computer, even your credit card information.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Online retailers can implement the up-to-date security systems, the highest grade encryption, and an entire security team to protect the information on their servers (which includes your information), but what&#39;s the point if a bad guy can walk in the front door? A poor password is like building a wooden door complete with Yale lock onto the back of the Tower of London, all the protection can be bypassed.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;So why do people choose short, dictionary based passwords? Simple, they are easier to remember. &quot;password&quot; is easier for a human to memorise than &quot;&amp;amp;htR1!9I_1h&quot;, even though they are the same amount of characters. The problem is bad guys know this, and use it to their advantage.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;So what can you do? Many people in the I.T. security&amp;nbsp;field&amp;nbsp;advocate &quot;passphrases&quot;&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;(myself included!)&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;, that is using a phrase for the password. Thinking in the manner, you can create a long, strong passphrase which is easy to remember. &quot;I hate dirty nappies&quot; is exponentially stronger than &quot;password&quot;, this can be proven on&amp;nbsp;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.hammerofgod.com/passwordcheck.aspx&quot;&gt;http://www.hammerofgod.com/passwordcheck.aspx&lt;/a&gt;. This website calculates how long it would take to &lt;a href=&quot;http://en.wikipedia.org/wiki/Password_cracking&quot;&gt;crack&lt;/a&gt;&amp;nbsp;(guess) a particular password. Using a computer which is capable of guessing a password 1 billion times a second, &quot;password&quot; would be cracked in 129 seconds, whilst &quot;I hate dirty nappies&quot; would take&amp;nbsp;52,530,122,724,423,900,000,000 years. That&#39;s a long time. Have a play with the site, but please do not use your real passwords, as the site says, there&#39;s no reason to risk it.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Another option is a &lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;a href=&quot;http://www.google.co.uk/search?sourceid=chrome&amp;amp;ie=UTF-8&amp;amp;q=password+managers&quot;&gt;password manager&lt;/a&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;. These are&amp;nbsp;pieces&amp;nbsp;of software which securely store all your passwords on your computer. You set a master password in the program which will allow you access to all your other passwords. The better password managers can create complex passwords for you and auto fill them into websites, meaning you never have to remember them! But please use a passphrase as the master password for the software, you wouldn&#39;t want to undo all the good work would you?&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;In my line of work, we see weak passwords everywhere, and you don&#39;t need to be some super mystical ninja hacker to start guessing passwords. You can have a strong password and it be easy to remember, so start changing your passwords now.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;Any questions are, as always, more than welcome.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;</description><link>http://securityfornonit.blogspot.com/2010/07/passwords-passwords-passwords.html</link><author>noreply@blogger.com (Mike McLaughlin)</author><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7564961578552297289.post-9137074749899587873</guid><pubDate>Sat, 19 Jun 2010 10:16:00 +0000</pubDate><atom:updated>2010-06-19T03:16:56.629-07:00</atom:updated><title>A little peace of mind for free......</title><description>&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;Inspired by the link: &lt;a href=&quot;https://www.eff.org/https-everywhere&quot;&gt;https://www.eff.org/https-everywhere&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;I have just installed the HTTPS everywhere Firefox plugin (linked above), and I have to say, what an awesome idea. It has never really sat well with me that certain web sites (Facebook, twitter etc) default to a non-encrypted (&lt;a href=&quot;https://secure.wikimedia.org/wikipedia/en/wiki/Hypertext_Transfer_Protocol&quot;&gt;http&lt;/a&gt;) page, which means any data you enter into these sites is transmitted over the Internet in clear text (readable).&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;There is a downside, in the form of third party domains without support for &lt;a href=&quot;https://secure.wikimedia.org/wikipedia/en/wiki/Https&quot;&gt;https&lt;/a&gt; (encryption). For example, advertisements. Adverts tend to come from other web sites to the one you are looking at, which brings its own problems and annoyances (i&#39;ll cover this at a later date). However, this shouldn&#39;t detract from the value of this plugin. I&#39;ve installed it and, barring any compatibility problems in the future, it will be staying.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;So, if you are strict on your Facebook privacy settings, don&#39;t want anyone knowing your Google searches (apart from Google.....) or are wanting to add that little bit more peace of mind, install &lt;a href=&quot;http://www.mozilla-europe.org/en/firefox/&quot;&gt;Firefox&lt;/a&gt; (if you aren&#39;t already using it) and use HTTPS everywhere. As the Beatles once sang &quot;I&#39;d give you everything for a little peace of mind&quot;. Everything may be a little too much in this case, but a little peace of mind for free has to be a good thing.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;</description><link>http://securityfornonit.blogspot.com/2010/06/inspired-by-link-httpswww.html</link><author>noreply@blogger.com (Mike McLaughlin)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7564961578552297289.post-6938368488809000017</guid><pubDate>Tue, 01 Jun 2010 19:43:00 +0000</pubDate><atom:updated>2010-06-01T12:43:22.694-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Social networking security hyperlink</category><title>Oooh, Bob sent me a link.......</title><description>&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;Inspired by the link:&lt;/span&gt;&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt; http://www.sophos.com/blogs/gc/g/2010/05/31/viral-clickjacking-like-worm-hits-facebook-users/&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif; font-size: small;&quot;&gt;&quot;Don&#39;t click links you don&#39;t trust&quot;. This has been the mantra of I.T. security professionals since time began (was there a time before emails?). But what if the link comes from (or at least appears to come from) a friend? Unfortunately there is no easy answer.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Bad guys know how you think, and know the ways to entice you into clicking a link. But if a friend has recommended it, then it must be OK?........&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Not all the time. The bad guys know how to spoof emails, know how to use &quot;hacked&quot; social networking accounts and send the malicious link to the entire friends list, and many other tricks to get the highest possible hit rate on these malicious links. So what can you do? A few simple steps can dramatically reduce the risk.....&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;1. &lt;b&gt;Keep your &lt;a href=&quot;http://en.wikipedia.org/wiki/Operating_system&quot;&gt;Operating System&lt;/a&gt; (OS) up-to-date with the latest security patches.&lt;/b&gt; - Most modern day OS&#39; allow configuration of automatic updates, which will require minimal user interaction. Windows users (most people who are reading this I assume use Windows), can browse to http://windowsupdate.microsoft.com/ for assistance setting up automatic updates.&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;2. &lt;b&gt;Keep your web browser up-to-date.&lt;/b&gt; - Newer versions of your favourite web browsers have been developed with more security in mind.&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;3. &lt;b&gt;Keep your antivirus up-to-date&lt;/b&gt;. - With new malware seemingly being discovered every other minute it is imperitive to keep antivirus products up-to-date with the latest definitions etc. Most will ask you to configure automatic updating when you install it, &lt;b&gt;DO NOT SKIP THIS STEP!!!&lt;/b&gt; Please :D&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;4. &lt;b&gt;Check a links destination before clicking.&lt;/b&gt; - It is trivially easy to &quot;hide&quot; a links true destination. If you hover your mouse cursor over the link, &lt;b&gt;WITHOUT CLICKING&lt;/b&gt;,&lt;b&gt; &lt;/b&gt;the real destination can be observed. (In the bottom left hand corner of your web browser is the usual place).&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;5. &lt;b&gt;Use your instinct&lt;/b&gt;. - If it doesn&#39;t feel right, don&#39;t click it. Taking a few minutes to email or message the person asking if they have really sent the message could save you hours (or even days/months!) of work attempting to rectify any damage. Use yourself as the first line of defence, computers will always have security holes, being aware of this can save you.&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Comments and questions are always more than welcome.&lt;br /&gt;
&lt;br /&gt;
On a side note, it seems my son knows the perfect way to keep safe online....&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8_zED3CM2GRqmz0_lXVKNOa5weKCWmcE7kGRI0s5fp-UdJAQawMrea9g0CbM14CLlzFuZnUDcZrjMRv0P7kEDV2rn022odD3lPlWnNO_sSVw4VMQOtstzM6bVDkioanNPiddIWpFd_Ww/s1600/30505_429753736718_584276718_5543299_1458661_n.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8_zED3CM2GRqmz0_lXVKNOa5weKCWmcE7kGRI0s5fp-UdJAQawMrea9g0CbM14CLlzFuZnUDcZrjMRv0P7kEDV2rn022odD3lPlWnNO_sSVw4VMQOtstzM6bVDkioanNPiddIWpFd_Ww/s1600/30505_429753736718_584276718_5543299_1458661_n.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8_zED3CM2GRqmz0_lXVKNOa5weKCWmcE7kGRI0s5fp-UdJAQawMrea9g0CbM14CLlzFuZnUDcZrjMRv0P7kEDV2rn022odD3lPlWnNO_sSVw4VMQOtstzM6bVDkioanNPiddIWpFd_Ww/s320/30505_429753736718_584276718_5543299_1458661_n.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: Verdana,sans-serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: Verdana,sans-serif;&quot;&gt;Eat the device connected to the Internet! Such a wise head on those young shoulders :)&lt;/span&gt;</description><link>http://securityfornonit.blogspot.com/2010/06/oooh-bob-sent-me-link.html</link><author>noreply@blogger.com (Mike McLaughlin)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8_zED3CM2GRqmz0_lXVKNOa5weKCWmcE7kGRI0s5fp-UdJAQawMrea9g0CbM14CLlzFuZnUDcZrjMRv0P7kEDV2rn022odD3lPlWnNO_sSVw4VMQOtstzM6bVDkioanNPiddIWpFd_Ww/s72-c/30505_429753736718_584276718_5543299_1458661_n.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7564961578552297289.post-8055073618375631905</guid><pubDate>Fri, 28 May 2010 21:02:00 +0000</pubDate><atom:updated>2010-05-31T05:41:22.583-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Antivirus AV Secure</category><title>The salesman said I need antivirus....</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;Inspired by the comment: &quot;I bought {insert antivirus product} because the computer salesman said I needed it.&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;Anyone who has bought a computer in the last decade will have heard of antivirus, usually from the salesman when he was selling you it along with your nice, shiny, &quot;state of the art&quot; computer. But what is this? How does it do it? Is it the &lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Silver_bullet#Idiomatic_usage&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt; &quot;silver bullet&quot;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt; for all your personal I.T security?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;What is it?&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;The antivirus products you see in computer retailers may sell themselves as &quot;Complete Internet Security&quot;, and they tend to include much more than an antivirus product.  I won&#39;t cover these other inclusions in this post, but may at a later date.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;Wikipedia describes antivirus as:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&quot;Antivirus (or anti-virus) software is used to prevent, detect, and remove malware, including computer viruses, worms, and trojan horses. Such programs may also prevent and remove adware, spyware, and other forms of malware.&quot;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;Which is all well and good, sounds important right?&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;Yes, it is important.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;But before we go further we need to define malware. Malware is any software installed on your computer (intentionally or not) which has been created for malicious activities. These malicious activities can range from stealing bank account passwords to forcing your machine to actually attack others across the Internet. Scary stuff?&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;So simply put, antivirus looks for and attempts to remove malware on your computer.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;How does it do it?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;Antivirus tend to use two methods of malware detection. Signature based detection and behaviour based detection.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;Antivirus companies attempt to collect malware from the Internet (also known as &quot;in the wild&quot;). When a sample of the malware has been collected a &quot;signature file&quot; is created, which is unique to that version of the malware. When the antivirus updates itself it is adding new signatures to its own dictionary for future use. This signature file is then used when the antivirus scans files, whether that is during a scan or when a file is created, emailed, downloaded etc (these functions vary by antivirus product), and an alert is created if a match is found. This is signature based detection.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;The downside to signature based detection is that if an antivirus company hasn&#39;t found or received a sample of the malware it cannot detect it. This is where behaviour based detection comes into play. The antivirus product monitors the activities of all the software running on your machine, not looking for a specific signature, but for suspicious behaviour.If suspicious behaviour is discovered an alert should be produced telling you what has been discovered.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;Is it the &quot;silver bullet&quot; for all your personal I.T. security?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;In a word..... no.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;The antivirus companies do attempt to have the latest signature files, behavioural detection and other seemingly unexplainable features within their product. Well, they don&#39;t want you sending your money elsewhere do they? ;) But try as they might no one product can guarantee 100% protection, no matter what the salesman says. Antivirus should be used as a last line of defence. Safe browsing/email procedures should be followed. I&#39;ll talk about these in later posts.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;Any comments or questions are more than welcome. Either comment here or catch me on twitter @miketmclaughlin.&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: verdana;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: normal;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: sans-serif, serif; line-height: 19px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Georgia, serif; line-height: normal;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://securityfornonit.blogspot.com/2010/05/salesman-said-i-need-antivirus.html</link><author>noreply@blogger.com (Mike McLaughlin)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7564961578552297289.post-4108707440306037029</guid><pubDate>Fri, 28 May 2010 16:00:00 +0000</pubDate><atom:updated>2010-05-28T11:17:47.122-07:00</atom:updated><title>Introduction</title><description>&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;According to &lt;/span&gt;&lt;a href=&quot;http://www.internetworldstats.com/&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt;www.internetworldstats.com&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana;&quot;&gt; 1,802,330,457 people are connected to the Internet. Whether you know it or not, via your phone line/cable/mobile phone network you are connected to all of these people (in a roundabout way). Amazing isn&#39;t it? Well I think so, but have you ever thought where your email to Aunty Edith actually goes? What your &quot;Complete Internet Security&quot; software actually does? What your web browser does when you surf the web? Most people would answer &quot;no&quot; to these questions, and rightly so, the Internet is a complex place.&lt;/span&gt;&lt;br /&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana, serif;&quot;&gt;Working within corporate environments on a day to day basis I get to see the lengths businesses go to to protect their data. Some of these systems are highly complicated, and have huge teams of experienced people dedicated to maintaining and updating them. Generally home users only have a few computers (yes this does include laptops, 3G enabled phones, games consoles and anything else which connects to the Internet!) to look after, but protecting personal data can be a daunting task. Luckily my friends and family can harrass, erm, I mean ask, me computer security related questions. But what do you do? With some basic information you can understand what the threats are, how the bad guys operate and most importantly, what you can do to help protect yourself.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana, serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:verdana, serif;&quot;&gt;I get asked the same questions over and over, and while I am (mostly) happy to answer these questions, if the answers are in one place it will make my life easier ;) Hopefully they can help others as well.&lt;/span&gt;&lt;/div&gt;</description><link>http://securityfornonit.blogspot.com/2010/05/introduction.html</link><author>noreply@blogger.com (Mike McLaughlin)</author><thr:total>2</thr:total></item></channel></rss>