Maggie's FarmWe are a commune of inquiring, skeptical, politically centrist, capitalist, anglophile, traditionalist New England Yankee humans, humanoids, and animals with many interests beyond and above politics. Each of us has had a high-school education (or GED), but all had ADD so didn't pay attention very well, especially the dogs. Each one of us does "try my best to be just like I am," and none of us enjoys working for others, including for Maggie, from whom we receive neither a nickel nor a dime. Freedom from nags, cranks, government, do-gooders, control-freaks and idiots is all that we ask for. |
Our Recent Essays Behind the Front Page
Categories
QuicksearchLinks
Blog Administration |
Monday, November 23. 2009Doc's Computin' Tips: Security update Here's the quote:
Exactly. I'd even go so far as to change his "also" to "often or "usually". This is becoming a huge problem on the 'Net and is one of the driving forces behind both personal identity theft and 'botnet' attacks. Most malevolent programs running around these days aren't "viruses" — meaning some program that does something nasty like suddenly delete your C Drive — because viruses don't ultimately do the instigator any good. Outside of the satisfaction of being mean, of course. The worst programs are the 'keyloggers', which send a record of your keystrokes to the bad guy. All he has to do is look for 19 numbers in a row (your credit card number plus the 3-digit number off the back that you just entered in some online order form) and bingo. Now all he has to do is try a few expiration dates and your bank account is toast. Second-worst is the 'botnet' program that lies dormant in your computer until the bad guys launch an attack on some corporation, usually in the form of blackmail. They'll tell the company to either cough up the dough or the 20,000 computers on their botnet (of which you're one) will 'ping' their web site 10 times a second from now until Doomsday, thereby overloading the server and keeping legitimate customers from getting to the site. Obviously, for an online company, this is serious business. And you, yourself, will never even know you were part of the attack. That's why everyone from God on down recommends installing a quality anti-virus/spyware program, and don't forget a good firewall program. You cannot rely on the stock Windows programs, such as Windows Firewall and Windows Defender. I have a post on the subject here. Back to Gringo's warning, it isn't just web sites and email where the damage is being done. There's an area of the Internet called 'Usenet' which has a large section of programs, pirated and otherwise. I got curious and did a study on this a few months ago and I'd estimate that three-fourths of the anti-virus/spyware programs available for downloading have some spyware buried deep in the install files. That is, it'll actually install the anti-virus program, but it'll have been tweaked so it overlooks the keylogger. While you're thinking your computer is finally safe, your bank account is being drained. The same is true with P2P (peer-to-peer) file-sharing sites (eDonkey, BitTorrent, etc), and sophisticated chat lines, like the IRC, that allow for file transfers. Some chat buddy says, "Hey, I just downloaded the latest Norton Anti-Virus from Usenet! I installed it and it's working perfectly! Want a copy?" You reply "Sure!", and now both of you are unknowing partners in a gang of Internet blackmailers. Or simultaneously having your bank accounts drained. So be safe, be cautious, use common sense, don't trust renegade downloads, and please spend the money on quality protection. Some program suggestions are in the above link. General security rules-of-thumb: 1. Never open a file-attachment in an email unless you're 101% sure of the sender. Remember, one of the ploys of the clever virus or spyware is using the names in a person's address book to send itself on. 2. Never click on a link in (what appears to be) a commercial email, like from a bank or loan agency, much less input anything personal like a password. The reason phishing emails look so real is because they are real. Everything you see is probably coming directly from the bank's actual site. It's when you click on something that the trouble begins. 3. Never click 'OK' in any box that pops up while you're on a web site unless it's something you've initiated, like installing a program. Plus, you know the little click-box in the upper-right corner that closes the intrusive box? Well, if you wanted the person to click the 'OK' button to install your keylogger or netbot file, wouldn't you make the little 'close box' do the same thing? And, for that matter, the 'Cancel' button? When I see one of those things pop up, I open Task Manager and shut it down that way. 4. Always right-click on a download from a possibly suspicious source and have your anti-virus/spyware program scan the file directly. It'll give the file a quick scan when it's downloaded, but often only a deep scan will detect the really nasty stuff. This doesn't apply to songs, pics and videos, but it definitely applies to compressed files such as Zip and Rar, and you should never, ever, download an EXE file unless you're positive of the source. The real danger today is spyware, and it's on your shoulders to use a quality program to fend it off. Not only could an easy argument be made that it's the most important money you can spend on your computer, but it could even be argued that it's the only money that you actually need to spend on your computer. One can get by with a lot of great freebie programs in the computer world, but not in this area. Any specific questions, as always, just ask in the comments.
Posted by Dr. Mercury
in Dr. Mercury's Computer Corner, Our Essays
at
12:31
| Comments (14)
| Trackback (1)
Comments
Display comments as
(Linear | Threaded)
What authority does a mouse click have in a page-coded popup?
I would guess that serious control only goes to secure popups, except for bugs in the browser. I can't imagine that a click in an insecure page, whether it says OK or CANCEL or X, can do anything anyway. "What authority does a mouse click have in a page-coded popup?"
The same that it has in a pop-up 'Install program' box? Look at it this way. What's the difference between an Install box and a typical pop-up box? Design. So, if you were a clever dickens, you'd design your Install box to look like an innocuous pop-up box, no? The bottom line in this biz, though, is "Better safe than sorry." Or, in regards to things like pop-ups, "Guilty until proven innocent." It seems unlikely to me. The page script doesn't get to do anything it wants, but has to call on the script interpreter, which is the browser or one of its plug-ins.
The script interperter isn't going to install a program just because some script says so, but call on a trusted program to do it, and that trusted program has its own real pop-up box. If you don't click in the real pop-up box, nothing gets (for example) installed, because there's no path that achieves an installation available any other way. The point of buffer overflows and other such discovered bugs is that they bypass that rule; and those bugs get fixed as soon as they're found. Probably that's most of the monthly microsoft updates in fact. RHH -
Ah, I got it. It took me a sec to figure out why we were on divergent paths. You're speaking of unsolicited boxes popping up, whereas I was thinking in terms of links and downloads since that was the main drive of the post. So you're right, an unsolicited pop-up couldn't start an install program by itself, but here's what worries me: You're Joe Blow, Mr. Average Computer User. Or you're sweet 67-year-old Betty, like my email buddy who got ravaged a few months ago. You're on some web site when suddenly a box pops up. There's a fancy Norton logo in the corner and a message that says something like, "WARNING: This web site has detected a dangerous virus on your computer. In partnership with Symantec, Inc, we are offering you the free single-run Norton Anti-Virus program to get rid of the virus before it destroys your computer. It is strongly urged that you do so immediately." The buttons say: "Yes, please!" "I'll do it later" Then an install box pops up that goes through all the usual routines, like the EULA and install location, and in goes the bad guy. Or the box says something like this: "WARNING: This web site has detected a dangerous virus on your computer. Due to our exclusive partnership with Synmantic, Inc., we are now offering Norton Anti-Virus for the exceptional price of only $9.95. This 1-time offer is due to expire on Dec 31, 2009, so take advantage now! Click here to go to our Downloads page." And, of course, the fun part is that it actually is Norton Anti-Virus, and it works just fine -- discounting that one little tweak that lets the included keylogger off the hook. And how delicious is it that not only do they now have your keylogger on their system, but they paid you $9.95 for the privilege. :) I teach computer classes to a wide range of users. My level one classes all include these two tests for e-mail attachments:
1. Do you know the sender? Fail = delete and clear deleted. 2. If you know the sender, why would that person send you this file? Fail = check with sender, plan B delete and clear deleted. I've had occasion to tell people to power off their computers rather than allow something to install. It's a desperate measure for a desperate circumstance. Geoff - Your second rule is excellent. And I certainly believe in 'desperate measures'. I've yanked the plug on my rig more than once over the years. The last time, about two years ago, was when I -- like an idiot -- clicked 'Cancel' on one of those "Do you want to test your system for viruses?" boxes and the hard drive light started blinking. Yoicks!
Luther - Kind of a yes-and-no answer. In most blogging software, the person who makes the post and gets the email notifying them that a comment was left can see whatever info was inputted, and usually the IP address is included as a counter-sockpuppet measure. If someone has 'Admin' privileges, like BD, he can see all of the notifying emails. Whether or not anyone could actually dig up any info on the person would depend upon a number of factors, like whether their email address contains their full name or just an inital and a name, and where the person is located. Seeing "jsmith@" from New York City obviously wouldn't do much good, but "jamesbartholemew@" from Flatbush, Arkansas, would probably be easy to find. In Bird Dog's case, he has a fairly unique name and I knew where he lived and his profession from our phone chat, so that was easy. I mean, the guy's actually got official bio pages on him, some of which list his home address. So "no", it wouldn't be nearly as easy as it was from me to dig up the dirt on BD, but "yes", it could be relatively easy depending upon what's actually in the address and where the person is located. One thing I didn't want to get all bogged down in the post talking about was the size of the ISP. In our cases, because we're using national ISPs, our "location" might not even be in the same state. When I was up in central Florida using RoadRunner, it said I was "located" in North Carolina. The smaller the ISP, though, the more the field narrows. Hope that helps, Doc I'm not sure Windows Defender even exists anymore. Microsoft Security Essentials is very well reviewed anti-virus/malware/spyware.
See this review: http://www.lifehacker.com.au/2009/11/stop-paying-for-windows-security-microsofts-security-tools-are-good-enough/ Your routers' SPI firewall + MSE is more security than you need. No need to pay for this stuff anymore. Anton -
Thanks for the interesting link. I agree with a few things he said, but heartily disagree with others. If I may? "all of the scare tactics and overblown virus stories out there make it hard to feel safe online." Oh. "Overblown". Betty, a real sweet ol' gal who's been an email buddy for years, will be glad to hear that the malware she got from clicking 'OK' in one of those "Do you want to test your computer for viruses?" boxes and all-but destroyed her computer was merely "overblown" and just "scare tactics." If he had been impartial about it and said something like, "Not everything you read is true", that'd be one thing. But to pull out the old "scare tactics" line seems a little over the top. "The more tech-oriented readers will probably note that MSE does not do any fancy heuristics to detect viruses that aren’t in the database already, which is a feature offered by some paid solutions." It doesn't have heuristics? Well, that explains why its free. I don't want to put the knock on a program I haven't tried, but it sounds more like a "database comparison program", rather than a vibrant, intuitive anti-virus program. But here's where the argument falls apart: "In my opinion, this feature is usually unnecessary and a massive system drag IF combined with a healthy dose of not installing questionable nonsense." Well, uh, yeah! If! The question is, how do you know what's "questionable nonsense"? The purist might call Flash, Shockwave and Java "questionable nonsense" since you don't really need them to read a web page, right? No offense to the guy, but that's kind of a nonsensical argument: If you don't install anything bad, then nothing bad will happen to you. "Your PC now belongs to whoever is running the botnet" Er, "belongs to"? If your computer is being used to ping a web site in a DoS attack, you'd never know it unless you were actually monitoring your up/down activity with a program like DU Meter. System-wise, it's a very benign operation. "Let’s not forget that most of us are using a router with a firewall built right into it" Whoa, bucky! Most of us are using a router? Huh? "The fact of the matter, however, is that outbound firewalls on a desktop PC are Completely Pointless." Hoo-boy. I have a jukebox program called MusicMatch that I bought years ago. Yahoo later bought the company. If I fire it up without a firewall blocking its 'phone home', Yahoo will disable the program, forcing me to buy their upgrade. If I may ask, how "pointless" is my firewall now? As may be slightly apparent, at this point I'm not overly impressed with the guy, but I approve of the way he tosses UAC on the scrap heap, pushes Windows Updates, advocates keeping plugins like Flash updated, and harps on questionable downloads. "That pre-release copy of the latest video game you got from a torrent? Yeah, it probably has a virus in it." Uh-yup, it probably do. Thanks Doc, for your many good points! I appreciate not only this post and discussion, but all of your "Doc's Computin' Tips" posts...not to mention Maggie's Farm in toto...
Anton -
I feel a little bad that I beat up on the guy a bit, because I know he's sincerely trying to ease some of the unnecessary worries people have, and I agree that there's lots of overblown hype out there. Indeed, Gringo's original comment focused on just that; nefarious characters plying upon people's fears. So, to that end, he should be applauded. Got an interesting post coming up tomorrow. It's a 2-day time-lapse video of global weather patterns as seen from a NASA satellite. It's actually kind of mesmerizing. It'll be fascinating when the program gets in full gear and we can watch back over the previous month and see hurricanes forming, working their way across the Atlantic, wiping Florida off the map. Good times, good times. Doc The BEST way to stay safe from viruses and key-loggers is to get a Mac, and throw away the sicko-magnet, MS Windows. Windows itself is the problem, and it can never be made safe from the bad guys.
And yes, never agree to any unsolicited install of anything offered over the Internet - ever! Fred -
Whew! I was afraid one of you Mac guys wasn't going to show up. :) "the sicko-magnet, MS Windows" 90% of Americans are "sickos"? I take it your next book will not be titled, "How To Win Friends and Influence People"? "Windows itself is the problem" In other words, "People don't kill people, guns kill people." People's actions are irrelevant, it's all Microsoft's fault? "and it can never be made safe from the bad guys." Unlike a Mac. Apple Macintoshes Targeted by Porn-Based Computer Virus Apple, Mozilla Issue Security Updates Apple’s Rising Popularity Lures Hackers I'd note that Firefox is in the same bag as you guys. For years, no self-respecting hacker would bother with some miniscule percentage of the browsing public, but as Firefox has become more popular, the floodgates are starting to open. The question in both cases is, are they ready for it? After years of complacency, will their respective teams have the know-how and experience to stay up with the bad guys? At least in the case of Windows and IE, their teams have been fighting the good fight for almost two decades. Thanks! Please keep on educating me. I use the snipping tool now only because this blog told me about it. It is so easy! By the way, my wife and I do have bird dogs here in Virginia. English setters, tri-colors.
Greg -
What I like best about the Snipping Tool is the way you can email the snip directly from the program. There are lots of times when I want to snip something out for someone, but it's just not worth the hassle to do the saving and file-attaching and all that. When I called the program "perfect", I meant it. As a small side note, what really made my post historic was that I'd never used the words "Microsoft" and "perfect" in the same sentence before. :) Aren't setters great dogs? I've always like both setters and spaniels. "Brilliant goofballs" is how I'd sum them up. One moment they're the Class Clown, the next moment they're reading your mind. My favorite dawg (I'm in the South so I have to pronounce it correctly), however, is the Collie. They're not overly bright, but they contain a majesty that no other dog does. While everybody else was worried if little Timmy would get out of the collapsed mine, I was worried Lassie would get her hocks muddy and blow the look. :) |
Programs AutoSizer — This has two great uses. It'll pop open the browser (or any program) in full-screen mode every time it opens, and for small programs that tend to open wherever they want (like Calculator), it will make them open righ
Tracked: Nov 29, 10:01
Here's an index of my Maggie's Computin' Tips. I can't guarantee all of these will work on every Windows operating system, but most should. Programs AutoSizer — This has two great uses. It'll pop open the browser (or any program) in full-s
Tracked: Jul 10, 11:21
Here's an index of my Maggie's Computin' Tips. I can't guarantee all of these will work on every Windows operating system, but most should. Programs AutoSizer — This has two great uses. It'll pop open the browser (or any program) in full-s
Tracked: Jul 10, 11:25
Here's an index of my Maggie's Computin' Tips. I can't guarantee all of these will work on every Windows operating system, but most should. Programs AutoSizer — This has two great uses. It'll pop open the browser (or any program) in full-scr
Tracked: Jul 22, 19:45
Here's an index of my Maggie's Computin' Tips. I can't guarantee all of these will work on every Windows operating system, but most should. Programs AutoSizer — This has two great uses. It'll pop open the browser (or any program) in full-scr
Tracked: Jul 22, 21:39
Here's an index of my Maggie's Computin' Tips. I can't guarantee all of these will work on every Windows operating system, but most should. Programs AutoSizer — This has two great uses. It'll pop open the browser (or any program) in full-s
Tracked: Jul 23, 13:06
Here's an index of my Maggie's Computin' Tips. I can't guarantee all of these will work on every Windows operating system, but most should. Programs AutoSizer — This has two great uses. It'll pop open the browser (or any program) in full-s
Tracked: Aug 28, 08:29
Here's an index of my Maggie's Computin' Tips. I can't guarantee all of these will work on every Windows operating system, but most should. Programs AutoSizer — This has two great uses. It'll pop open the browser (or any program) in full
Tracked: Jan 08, 20:00