<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-3288717058502810090</atom:id><lastBuildDate>Thu, 05 Sep 2024 13:38:49 +0000</lastBuildDate><title>Internet - Security tips</title><description>Tips and tricks for securing the Net.&#xa;Get it all here.</description><link>http://internet-securitytips.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>14</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-942707637549063064</guid><pubDate>Wed, 29 Sep 2010 06:50:00 +0000</pubDate><atom:updated>2010-09-28T23:50:00.575-07:00</atom:updated><title>Definition of Privacy and Data Protection</title><description>&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;The first definition of &lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Italic;&quot;&gt;privacy &lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;was given by Samuel D. Warren and Louis D. Brandeis in their famous article &quot;The Right to Privacy&quot;, which appeared in the Harvard Law Review [Warren/Brandeis 1890]. The two American lawyers defined privacy &lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Italic;&quot;&gt;as &quot;the right to be alone&quot;. &lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;The reason for this publication was the development of new forms of technologies that was coupled with other developments. Photography used by the yellow press was in the view of the authors an attack on personal privacy in the sense of the right to be alone.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;The most common definition of privacy in current use is the one by Alan Westin:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Italic;&quot;&gt;‘Privacy is the claim of individuals, groups and institutions to determine for themselves, when, how and to what extent information about them is communicated to others’ &lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;[Westin 1967].&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;According to Westin´s definition, natural (individuals) as well as legal persons (groups and institutions) have a right to privacy. In some countries, like France, Austria, Denmark, the juridical concept of privacy protection is extended to groups and institutions, whereas in most others, like in Germany, the USA or the U.K., it is restricted to individuals.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;In general, the concept of privacy can be given three aspects [Rosenberg 1992]; [Holvast 1993]:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpFirst&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-layout-grid-align: none; mso-list: l0 level1 lfo1; text-autospace: none; text-indent: -.25in;&quot;&gt;&lt;span style=&quot;font-family: Symbol; font-size: 14.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Italic;&quot;&gt;Territorial privacy &lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;(by protecting the close physical area surrounding a person, i.e. domestic and other environments such as the workplace or public space);&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpMiddle&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-layout-grid-align: none; mso-list: l0 level1 lfo1; text-autospace: none; text-indent: -.25in;&quot;&gt;&lt;span style=&quot;font-family: Symbol; font-size: 14.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Italic;&quot;&gt;Privacy of the person &lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;(by protecting a person against undue interference, such as physical searches, drug testing or information violating his/her moral sense); and&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoListParagraphCxSpLast&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: .5in; margin-right: 0in; margin-top: 0in; mso-add-space: auto; mso-layout-grid-align: none; mso-list: l0 level1 lfo1; text-autospace: none; text-indent: -.25in;&quot;&gt;&lt;span style=&quot;font-family: Symbol; font-size: 14.0pt; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;&quot;&gt;&lt;span style=&quot;mso-list: Ignore;&quot;&gt;·&lt;span style=&quot;font: 7.0pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Italic;&quot;&gt;Informational privacy &lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;(by controlling whether and how personal data can be gathered, stored, processed or selectively disseminated).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;Personal data means any information concerning the personal or material circumstances of an identified or identifiable person (the data subject). The emphasis of this Chapter and of this thesis is on the discussion of informational privacy of individuals. Individual informational privacy has also been defined by the German Constitutional Court in its Census Decision of 1983 as the term &lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Italic;&quot;&gt;right of informational&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt; &lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Italic;&quot;&gt;self-determination&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;, meaning &lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Italic;&quot;&gt;the right of an individual to determine the disclosure and&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt; &lt;/span&gt;&lt;i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Italic;&quot;&gt;use of his personal data on principle at his discretion&lt;/span&gt;&lt;/i&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;Data protection is the protection of personal data in order to guarantee privacy and is only a part of the concept of privacy. Privacy, however, is not an unlimited or absolute right, as it can be in conflict with other rights or legal values, and because individuals cannot participate fully in society without revealing personal data. Privacy and Data Protection laws shall help to protect privacy rights, if personal data is collected, stored or processed.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/definition-of-privacy-and-data.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-4554622288354389245</guid><pubDate>Wed, 29 Sep 2010 06:19:00 +0000</pubDate><atom:updated>2010-09-28T23:19:00.250-07:00</atom:updated><title>Privacy in the Global Information Society</title><description>&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;Privacy as a social and legal issue has for a long time been a concern of social scientists, philosophers, and lawyers. With the arrival of the computer and increasing capabilities of modern IT-systems and communication networks, individual privacy is increasingly endangered. Especially on the way to a Global Information Society with different national programmes for the further development of data highways, there are severe privacy risks. Privacy as a fundamental human right recognised in the UN Declaration of Human Rights, the International Convenant on Civil and Political Rights and in many other international and regional treaties [PI/EPIC 1999] has to be protected in a democratic society.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;In general, privacy protection can be undertaken by&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;• privacy and data protection laws promoted by government&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;• self-regulation for fair information practices by codes of conducts promoted by&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;businesses&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;• privacy-enhancing technologies adopted by individuals&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;• privacy education of consumers and IT professionals.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;In this Chapter, privacy risks and means of privacy protection are discussed and analysed. In the first part, a definition of privacy and an overview to privacy legislation is given. Then, privacy risks in the Global Information Society are discussed, and it is shown that privacy is becoming more and more an international problem. For this reason, an international harmonisation of privacy legislation besides the EU Directive on data protection is needed. However, it shows that, due to cultural, political and historical differences, there are significant deviations in the EU approach to privacy protection from the privacy regulations of other countries, which have developed information infrastructure programmes. Although the EU Directive on Data Protection might have a coercive effect also on countries outside the EU to enact efficient data protection legislation based on the EU Directive, a common international harmonised approach seems hardly feasible. Therefore, it is argued that besides privacy protection by legislation and code of conducts, privacy enhancing technologies as a means to technically enforce legal privacy requirements are becoming increasingly important. Finally, the importance of privacy education complementary to privacy enhancing technologies is pointed out.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/privacy-in-global-information-society.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-2655636947119248441</guid><pubDate>Wed, 29 Sep 2010 04:18:00 +0000</pubDate><atom:updated>2010-09-28T21:18:00.535-07:00</atom:updated><title>The Case for Security Information and Event Management (SIEM) in Proactive Network Defense</title><description>&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending your network. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide you with unprecedented network visibility, security and control.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;Information technology and security professionals are literally drowning in data. The devices and systems they’ve deployed to protect their organizations generate millions of events every day which are virtually impossible&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;to analyze without automation. In spite of the complexity, this data must be analyzed - both to ensure the integrity of the customer, credit card, or patient data, and also to meet serious regulatory requirements and fiduciary responsibilities.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;To be effective in network defense, and not just for forensic analysis, the network and security event data must also be analyzed and correlated in real-time. This information needs to be manageable and actionable as well. Forensics are not enough. Detecting and stopping today’s zero-day, multi-vector and blended threats requires real-time, in-memory, analystics that can capture, correlate and respond to network attacks and insider abuse - at network speed. There are numerous obstacles to performing this task efficiently, securely and with minimal personnel resources.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;The information being analyzed from log files needs to be manageable and actionable. Forensics are not enough. Detecting and stopping today’s zero-day, multi-vector and blended threats requires real-time, in-memory, analystics that can capture, correlate and respond to network attacks and insider abuse - at network speed.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/case-for-security-information-and-event.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-3038405915258892588</guid><pubDate>Wed, 29 Sep 2010 01:17:00 +0000</pubDate><atom:updated>2010-09-28T18:17:00.497-07:00</atom:updated><title>Countermeasure: DNS Security</title><description>&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;DNS information provides a plethora of information to attackers, so it is important to reduce the amount of information available to the Internet. From a host configuration perspective, you should restrict zone transfers to only authorized servers. For modern versions of BIND, the allow-transfer directive in the named.conf file can be used to enforce the restriction. To restrict zone transfers in Microsoft’s DNS, you can use the Notify option. (See http://support.microsoft.com/support/kb/articles/q193/8/37.asp for more information.) For other nameservers, you should consult the documentation to determine what steps are necessary to restrict or disable zone transfers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;On the network side, you could configure a firewall or packet-filtering router to deny all unauthorized inbound connections to TCP port 53. Since name lookup requests are UDP and zone transfer requests are TCP, this will effectively thwart a zone transfer attempt. However, this countermeasure is a violation of the RFC, which states that DNS queries greater than 512 bytes will be sent via TCP. In most cases, DNS queries will easily fit within 512 bytes. A better solution would be to implement cryptographic Transaction Signatures (TSIGs) to allow only “trusted” hosts to transfer zone information. For a step-by-step example of how to implement TSIG security, see http://romana.ucd.ie/james/tsig.html.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: 0.0001pt; margin-left: 0in; margin-right: 0in; margin-top: 0in; text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;Restricting zone transfers will increase the time necessary for attackers to probe for IP addresses and hostnames. However, since name lookups are still allowed, attackers could manually perform lookups against all IP addresses for a given net block. Therefore, configure external name servers to provide information only about systems directly connected to the Internet. External nameservers should never be configured to divulge internal network information. This may seem like a trivial point, but we have seen misconfigured nameservers that allowed us to pull back more than 16,000 internal IP addresses and associated hostnames. Finally, we discourage the use of HINFO records. As you will see in later chapters, you can identify the target system’s operating system with fine precision. However, HINFO records make it that much easier to programmatically cull potentially vulnerable systems.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/countermeasure-dns-security.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-148626946240758877</guid><pubDate>Wed, 29 Sep 2010 00:16:00 +0000</pubDate><atom:updated>2010-09-28T17:16:00.807-07:00</atom:updated><title>Countermeasure: Public Database Security</title><description>&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;Much of the information contained in the various databases discussed thus far is geared at public disclosure. Administrative contacts, registered net blocks, and authoritative name server information is required when an organization registers a domain on the Internet. However, security considerations should be employed to make the job of attackers much more difficult. Many times an administrative contact will leave an organization and still be able to change the organization’s domain information. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;Thus, first ensure that the information listed in the database is accurate. Update the administrative, technical, and billing contact information as necessary. Furthermore, consider the phone numbers and addresses listed. These can be used as a starting point for a dial-in attack or for social engineering purposes. Consider using a toll-free number or a number that is not in your organization’s phone exchange.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;In addition, we have seen several organizations list a fictitious administrative contact, hoping to trip up a would-be social engineer. If any employee receives an email or calls to or from the fictitious contact, it may tip off the information security department that there is a potential problem. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: normal; margin-bottom: .0001pt; margin: 0in; mso-layout-grid-align: none; text-autospace: none;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: Times-Roman;&quot;&gt;Another hazard with domain registration arises from the way that some registrars allow updates. For example, the current Network Solutions implementation allows automated online changes to domain information. Network Solutions authenticates the domain registrant’s/identity through three different methods: the FROM field in an email, a password, or via a Pretty Good Privacy (PGP) key. Shockingly, the default authentication method is the FROM field via email. The security implications of this authentication mechanism are prodigious. Essentially, anyone can trivially forge an email address and change the information associated with your domain, better known as domain hijacking. This is exactly what happened to AOL on October 16, 1998, as reported by the Washington Post. Someone impersonated an AOLofficial and changed AOL’s domain information so that all traffic was directed to autonete.net. AOL recovered quickly from this incident, but it underscores the fragility of an organization’s presence on the Internet. It is important to choose a more secure solution like password or PGP authentication to change domain information. Moreover, the administrative or technical contact is required to establish the authentication mechanism via Contact Form from Network Solutions.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/countermeasure-public-database-security.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-8853617281014455059</guid><pubDate>Tue, 28 Sep 2010 21:56:00 +0000</pubDate><atom:updated>2010-09-28T14:56:00.474-07:00</atom:updated><title>BitDefender Internet Security 2011</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial;&quot;&gt;BitDefender&lt;/span&gt;&lt;/span&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: small; line-height: 17px;&quot;&gt;&amp;nbsp;Internet Security 2011 keeps your Internet-connected family safe, without slowing down their PCs. It locks out viruses, hackers &amp;amp; spam, while providing parental control and firewall&amp;nbsp;protection.&lt;br style=&quot;height: 1px;&quot; /&gt;Optimized scanning engine will accelerate the search procedure of viruses and other malicious programs. During the scanning process&amp;nbsp;BitDefender&amp;nbsp;will be able to ignore the known safe files, making the search procedure is performed twice as fast compared to previous versions.&amp;nbsp;BitDefender&amp;nbsp;monitors a variety of potential &quot;hot spots&quot; in your system, which can act spyware, and also checks any changes to your system and software.&lt;/span&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/bitdefender-internet-security-2011.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-146161928826413341</guid><pubDate>Mon, 27 Sep 2010 19:51:00 +0000</pubDate><atom:updated>2010-09-27T12:53:13.969-07:00</atom:updated><title>That which scares you but is not Real Threat</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #333333; font-family: Georgia, serif; font-size: 13px; line-height: 20px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;margin-bottom: 0in;&quot;&gt;&quot;Scareware&quot; (or &quot;extortionware&quot; as I call it, fake antivirus/antispy programs like XP Antivirus 2009/2010) prevention tips from redondmag.com, an online IT publication:&lt;/div&gt;&lt;ul&gt;&lt;span id=&quot;intelliTXT&quot;&gt;
&lt;li&gt;Use a firewall&lt;/li&gt;
&lt;li&gt;Use anti-virus&lt;/li&gt;
&lt;li&gt;Use anti-spyware&lt;/li&gt;
&lt;li&gt;Use a legitimate copy of Windows in order to get updates&lt;/li&gt;
&lt;li&gt;Keep Windows regularly and automatically updated and patched&lt;/li&gt;
&lt;li&gt;When a pop-up appears, check the source and remove it via the system tray; do not click the close button or any part of the pop-up&lt;/li&gt;
&lt;li&gt;Use an alternative browser and lock it down; no Active X, scripts or Java&lt;/li&gt;
&lt;li&gt;Don&#39;t give out admin rights&lt;/li&gt;
&lt;li&gt;Consider Windows Vista, or Linux or a Mac&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/that-which-scares-you-but-is-not-real.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-1771519158057264128</guid><pubDate>Fri, 03 Sep 2010 00:25:00 +0000</pubDate><atom:updated>2010-09-02T17:25:00.135-07:00</atom:updated><title>Securing Network - Quick Guide</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIz19KfL2glSSpl5F6abpMw85vA11rz310i9WuEERFwJt2oGAavzeyvaDXGZONGLsEewU-ALcD8oHTWSO0l7KIDspVaxlP4CownHztSPMb-_wGn2ZlNGfUvRHhCqVW-Ya8sGOjGd_ZRFY/s1600/images+(59).jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIz19KfL2glSSpl5F6abpMw85vA11rz310i9WuEERFwJt2oGAavzeyvaDXGZONGLsEewU-ALcD8oHTWSO0l7KIDspVaxlP4CownHztSPMb-_wGn2ZlNGfUvRHhCqVW-Ya8sGOjGd_ZRFY/s320/images+(59).jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;&amp;gt;&amp;gt;Authentication provides an effective means of ensuring that only the people you want to have access to your computer network are actually allowed to do so. There are a range of different levels of sophistication, so you need to select the authentication solution that is most appropriate for the particular needs of your business.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;&amp;gt;&amp;gt;Bear in mind the need to provide secure access for your remote workers. A security defense is only as strong as its weakest link and any remote weaknesses can, and will, be fully exploited by attackers.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;&amp;gt;&amp;gt;Wireless technologies pose serious security threats unless they are effectively managed. Consider the use of encrypted VPNs to address these issues.&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/securing-network-quick-guide.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIz19KfL2glSSpl5F6abpMw85vA11rz310i9WuEERFwJt2oGAavzeyvaDXGZONGLsEewU-ALcD8oHTWSO0l7KIDspVaxlP4CownHztSPMb-_wGn2ZlNGfUvRHhCqVW-Ya8sGOjGd_ZRFY/s72-c/images+(59).jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-6541160049120893137</guid><pubDate>Thu, 02 Sep 2010 21:23:00 +0000</pubDate><atom:updated>2010-09-02T14:23:00.208-07:00</atom:updated><title>Always opt for Total Security Solutions</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMuKPMSt79kwegzWgBAC1et0GuOVLnElEIzfXOQZvaq7aKnD0oQtqAlt_yXhRiL6YoWYCdw37570pVxFEGQ_dPA-rgN3xFCiCID_NAwJAMfpnzMuQLBIpFgNf9Lsb5zfyk21dvZqAnLsM/s1600/images+(57).jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMuKPMSt79kwegzWgBAC1et0GuOVLnElEIzfXOQZvaq7aKnD0oQtqAlt_yXhRiL6YoWYCdw37570pVxFEGQ_dPA-rgN3xFCiCID_NAwJAMfpnzMuQLBIpFgNf9Lsb5zfyk21dvZqAnLsM/s320/images+(57).jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;Internet Security software offers protection for computer users from viruses, spyware and malware from malicious sources on the Internet. While feature sets vary from product to product, some common security features include heuristic protection against &quot;zero-day&quot; threats, anti-phishing, anti-spam, root kit detection, a personal firewall, parental controls, identity protection or web content scanning.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Compared to Internet Security suites, Anti-Virus software offers only basic protection for users from malware. This software category offers fewer security features and generally has less impact on system performance. Some vendors also offer free Anti-Virus solutions that have fewer features than some commercial Anti-Virus products.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;&lt;span style=&quot;mso-tab-count: 1;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;Total Security software offers all the protection against malware that Internet Security software would typically offer users, plus a range of PC maintenance tools, disk back up and other features that would help give users comprehensive coverage and safeguards against malware.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/always-opt-for-total-security-solutions.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMuKPMSt79kwegzWgBAC1et0GuOVLnElEIzfXOQZvaq7aKnD0oQtqAlt_yXhRiL6YoWYCdw37570pVxFEGQ_dPA-rgN3xFCiCID_NAwJAMfpnzMuQLBIpFgNf9Lsb5zfyk21dvZqAnLsM/s72-c/images+(57).jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-1461272031918715471</guid><pubDate>Thu, 02 Sep 2010 20:13:00 +0000</pubDate><atom:updated>2010-09-02T13:13:00.099-07:00</atom:updated><title>How to make your internet connection secure</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVzspeVF0IQzTxqK7HcGFZYf4j94w6lsarSXMEpAzVYvjDvDjuWS6ExCgtloFOpJU26n1KYNl4smZ-gFMVgRg_mOCVyuHNGsTrb5n-Ar-32DVufSafx8wl22e8kcFkQn6Fb5H3cMBZrMo/s1600/download.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVzspeVF0IQzTxqK7HcGFZYf4j94w6lsarSXMEpAzVYvjDvDjuWS6ExCgtloFOpJU26n1KYNl4smZ-gFMVgRg_mOCVyuHNGsTrb5n-Ar-32DVufSafx8wl22e8kcFkQn6Fb5H3cMBZrMo/s320/download.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;When you are connected to the internet, the internet is also connected to you: Malicious people can use that internet connection to look for ways to access your computer&#39;s files, programs, and devices such as printers. Although problems of this kind are relatively rare, several software developers now offer firewalls - programs that restrict the kind of information that can be exchanged over the internet connection. Firewalls are not foolproof, but they can make a computer much less susceptible to unauthorized access. There are several popular firewalls, including &lt;a href=&quot;http://www.zonealarm.com/&quot;&gt;ZoneAlarm&lt;/a&gt; and &lt;a href=&quot;http://www.symantec.com/norton/internet-security&quot;&gt;Norton Internet Security&lt;/a&gt;. Windows XP comes with its own protection against unwelcome intruders: the Internet Connection Firewall.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;&lt;span style=&quot;mso-spacerun: yes;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;However, the Internet Connection Firewall is available only for Windows XP and does not protect against some security risks. If you don&#39;t use Windows XP or want a more fully featured firewall, you might be interested in the &lt;a href=&quot;http://www.zonealarm.com/security/en-us/zonealarm-pc-security-free-firewall.htm&quot;&gt;ZoneAlarm Firewall&lt;/a&gt;. &lt;a href=&quot;http://www.zonealarm.com/&quot;&gt;ZoneAlarm&lt;/a&gt; is available in free and in pay versions from Zone Labs. To download the free version of this software visit &lt;a href=&quot;http://www.zonealarm.com/&quot;&gt;http://www.zonealarm.com&lt;/a&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/how-to-make-your-internet-connection.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVzspeVF0IQzTxqK7HcGFZYf4j94w6lsarSXMEpAzVYvjDvDjuWS6ExCgtloFOpJU26n1KYNl4smZ-gFMVgRg_mOCVyuHNGsTrb5n-Ar-32DVufSafx8wl22e8kcFkQn6Fb5H3cMBZrMo/s72-c/download.gif" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-77598740635772074</guid><pubDate>Thu, 02 Sep 2010 05:11:00 +0000</pubDate><atom:updated>2010-09-01T22:11:00.593-07:00</atom:updated><title>How Spywares enter to your system?</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;Spyware finds its way to your computer through:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;• Web sites you browse on the Internet.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;• Adware and pop-ups that load onto your computer.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;• Cookies that get loaded automatically.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;• Results of your Internet searches.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;• Unusual eCommerce sites you visit.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;• Software you download onto your computer from the Internet.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;• Weaknesses in the operating system software you’re using.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/how-spywares-enter-to-your-system.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-8386893412415574751</guid><pubDate>Thu, 02 Sep 2010 03:10:00 +0000</pubDate><atom:updated>2010-09-01T20:10:00.622-07:00</atom:updated><title>Antivirus and Antispyware Software: The similarities and differences</title><description>&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;Antivirus and antispyware programs work pretty much in the same way, the difference being the type of malicious file and pattern the program scans your hard drive (including the system registry) for and detects. Today some antivirus programs include antispyware protection, and vice versa. While dual purpose and all-in-one software has its advantages, most industry experts still agree that for optimal protection, computer users should invest in both a good antivirus and a good antispyware program.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;Preventive maintenance tips:-&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;&amp;gt;&amp;gt;Always keep your programs and antivirus up-to-date.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;&amp;gt;&amp;gt;Install an antivirus and antispyware program that automatically scans for viruses when the system boots.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;&amp;gt;&amp;gt;Update the virus/spyware definitions daily to ensure your system is protected against the latest threats.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;&amp;gt;&amp;gt;Do not download any file from the internet unless you are certain the source is not transmitting a virus to you, or the files are spyware free.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;&amp;gt;&amp;gt;Do not any storage media that has been used in another computer unless you are certain the other computer is free of viruses and will not pass the virus on to your system.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;Never open email attachments from people you don&#39;t know; and don’t open any file attachment that ends in &quot;.exe&quot;, all downloaded files should be scanned by your antivirus application before you run or install it.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/antivirus-and-antispyware-software.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-837514636713937756</guid><pubDate>Wed, 01 Sep 2010 23:08:00 +0000</pubDate><atom:updated>2010-09-01T16:08:00.227-07:00</atom:updated><title>Internet Security - Key Steps</title><description>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: small;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 13px;&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;1. Your approach to internet security should begin with a risk assessment. If you don&#39;t know what threats are likely to be posed to your IT systems and networks, and their potential effects on your business should they occur, then you are not in a position to put in place a series of measures to counter these threats.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;2. An effective antivirus solution is absolutely fundamental to the security of any computer network.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;3. Equally, a firewall is one of the most basic security mechanisms and should form an integral part of your internet security defenses.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 16.0pt; line-height: 115%;&quot;&gt;4. However, antivirus solution and firewalls are only of value if they are regularly updated. The range and scale of internet threats is constantly changing and in order to address these it is vital that you ensure that your antivirus software and firewalls are fully patched and up-to-date. Ideally, this should be carried out automatically in background mode.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/internet-security-key-steps.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-3288717058502810090.post-8852138682271585154</guid><pubDate>Wed, 01 Sep 2010 21:08:00 +0000</pubDate><atom:updated>2010-09-01T14:08:18.215-07:00</atom:updated><title>Protecting Yourself on the Web</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaBcMxrlt5Nf_Zs_vyMyBM41ljj-qLy4xGJadcn7xaPYt1hLfpL0dfklcRQ7kF-_A0C-b6V5S4lYHBlu6_3SL1mGnEsR-4uItFwpnuP4ZHy2FWxV9eoty2Y_xZIN4Nw3ctUHtDMEft5U4/s1600/images+(56).jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaBcMxrlt5Nf_Zs_vyMyBM41ljj-qLy4xGJadcn7xaPYt1hLfpL0dfklcRQ7kF-_A0C-b6V5S4lYHBlu6_3SL1mGnEsR-4uItFwpnuP4ZHy2FWxV9eoty2Y_xZIN4Nw3ctUHtDMEft5U4/s320/images+(56).jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; line-height: 115%;&quot;&gt;Part of the World Wide Web&#39;s appeal is its wide-open nature. Never before has there been a mass medium with so few barriers between publisher and an audience. Anyone can put a site on the web and reach people all over the world at a little or no cost.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; line-height: 115%;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; This has its advantages - free speech is exercised on the internet with great success. This also has its disadvantages - content that some people find objectionable is available on the World Wide Web in great quantity.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; line-height: 115%;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Web pages can contain interactive programs written with languages such as Java and with technology such as ActiveX. These programs can sometimes expose security holes that put your own computer at risk.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; line-height: 115%;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Files you receive over the Web also can contain viruses - small programs that secretly copy themselves to different disks on your computer. Because viruses can intentionally damage files and programs, your Web Browser can be set up to warn you before any file is run from the browser.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; line-height: 115%;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; When you run a program in a Web Browser, the program runs on your computer just like any other software you use. For this reason, browsers have security settings that restrict the ways a page can interact with your system. By adjusting these settings, you can reduce the risk of harming your computer system.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: Arial, sans-serif; line-height: 115%;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; But with advancement of technology, the virus programs are becoming more complicated to handle, and for this reason some security softwares like antivirus, antispyware and firewalls must be used. These softwares completely protect against any threats and you feel safe while browsing or surfing.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://internet-securitytips.blogspot.com/2010/09/protecting-yourself-on-web.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaBcMxrlt5Nf_Zs_vyMyBM41ljj-qLy4xGJadcn7xaPYt1hLfpL0dfklcRQ7kF-_A0C-b6V5S4lYHBlu6_3SL1mGnEsR-4uItFwpnuP4ZHy2FWxV9eoty2Y_xZIN4Nw3ctUHtDMEft5U4/s72-c/images+(56).jpg" height="72" width="72"/></item></channel></rss>