Swamp Geek
  Login or Register HomeDownloadsYour Account   
Navigation 
Site Info 
Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 4,197,090
  • Today: 1,566
Server InfoServer Info
  • Apr 27, 2024
  • 07:00 pm CDT
 
 
Reviews, comparisons, and opinions about the latest technology products, services, trends and anything of interest to the thick glasses crowd!
Computer Security
Swamp Tech

Originally published October 22, 2003:

Taken from a PC Magazine article, this article addresses all aspects of PC security, including data protection, communication protection, and physical protection.References:Computer Cops 

First, do this right NOW: block W2K, NT and XP pop-up spam messages (not the same as pop-ups from web pages) by disabling the Windows Messenger. To do this, open Control Panel, Administrative Tools, Services, then right click Messenger and go to Properties. Set Start-up Type to Disabled and press the Stop button. (Firewalls should also stop them, but may not if they are initiated via an email). 

There are multiple approaches to protecting data:

  • Encryption
  • Steganography
  • Data erasers
  • Activity Tracking Removal (Covering your tracks)
  • Secure USB drives
  • PDA protection

Encryption - used to prevent people from reading files without knowing a password
Key attribute: encryption level: 64-, 128-, 256-bit keys (64 is good enough, and higher is better)
Utilities: FileAssurity (www.articsoft.com)

Steganography - hiding documents inside multimedia files with a password and special software required to extract
Key Attribute: Unless you're a criminal or terrorist, use file encryption instead.

Data erasers - repeatedly overwriting files so they can't be recovered (e.g. when you sell your computer)
Key Attribute: DoD standards support
Utility: Eraser (free) www.heidi.ie 

Activity Tracking Removal - covering your tracks by removing the various histories left behind (auto-complete, web history, cookies, run history, find history).
Key Attributes: remove all types, integrate with data erasers, interface / ease-of-use, browser plug-in history removal support
Utilities: Window Washer (www.webroot.com), AbosluteShield Internet Eraser Pro (www.internet-track-eraser.com), Windows Trace Remover (www.bulletproofsoft.com) 

Secure USB drives - highly portable, easily lost requires security
Key Attributes: technology (e.g. fingerprint,password), software installed on drive or host
Alternative: data encryption of files on USB drive
Products: ThumbDrive, ThumbDrive Touch (www.trekstorusa.com), USB007 (www.sub007.com) 

PDA protection - physical (not worthy of consideration) and software protection for handheld devices
Key Attribute: encryption support, password database with desktop synchronization
Utilities: eWallet (www.iliumsoft.com), Signature Wallet (www.cic.com), Passwords Plus (www.dataviz.com) 

There are many ways to secure and protect your electronic communications (Internet browsing, email, IM):

  • Antivirus tools
  • Firewalls
  • Wireless security
  • Secure e-mail
  • Private information on public PCs
  • Antispam
  • Secure Browing
  • Anonymous browsing
  • Secure IM
  • Antispyware 

Antivirus tools - incredibly only 90% of PC users use these tools to stop viruses, worms, and Trojan horses (why not 100%??)
Key Attributes: frequent updates, effectiveness, cost
Utilities: AVG (free) (grisoft.com) 

Firewalls - software or hardware tools for blocking inappropriate access from or to a computer, most broadband routers have built-in hardware firewalls
Key Attributes: access control features, cookie blocking, effectiveness
Utilities: Zone Alarm (free) (ZoneLabs.com), Sygate (free) (Sygate.com) 

Wireless security - important for wireless users in high-density areas, includes technologies like password key-based WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) and MAC filtering (allows only specified wireless cards to access)
Key Attributes: features (WEP, WPA, Mac Filtering), cost 

Secure e-mail - encryption, digital signatures, public key access
Key Attributes: ease-of-use, security options
Utilities: Zip Lip (free) (ziplip.com), HushMail (free) (hushmail.com), FileAssurity (articsoft.com), SecExMail (bytefusion.com) 

Private information on public PCs - if you use public Internet access, this removes passwords, surfing history, temp files and other personal information - requires a USB device and USB port on public computer
Key Attributes: Cost, only one choice?
Utilities: P.I. Protectory Mobility Suite (imaginelan.com) 

Antispam - delete, prevent, and / or take action against spam and those who send it
Key Attributes: challenge / response (delays incoming email by forcing sender to identify himself - something spammers won't want to do), cost, accuracy (false positives, missed), integration with mail client
Utilities: SAProxy (free) (statalabs.com) 

Secure Browing - block ActiveX controls, pop-up ads - but most features are already built into open source browsers like Netscape / Mozilla and Opera
Key Attributes: integration with Internet Explorer
Utilities: Secure IE (secureie.com) 

Anonymous browsing - prevent web sites from tracking your IP address, previous page, cookies and your ISP / network admin or hackers from watching where you go
Key Attributes: traffic / data encryption, browser integration
Utilities: Anonymizer (free restricted) (anonymizer.com) 

Secure IM - prevent others from accessing your instant messages (which are totally unsecure) but must be running on BOTH ends
Key Attributes: digital signatures, encryption
Utilities: SimpLite (free) (secway.fr), IMsecure (free) (zonelabs.com) 

Antispyware - identify and disable or remove adware programs and cookies, keystroke loggers, and Trojan horses
Key Attributes: cost, accuracy
Utilities: SpyBot Search and Destroy (free) (security.kolla.de) 

The physical security of PCs can be protected in several ways:

  • Physical laptop security
  • Tracking utilities
  • Surveillance
  • Hardware Authentication 

Physical laptop security - use the security slot to lock the laptop to an immovable object, install an alarm, or track a stolen laptop
Key Attributes: cannot recommend 

Tracking utilities - Laptop LoJack
Key Attributes: notification method, file encryption / deletion
Utilities: cannot recommend 

Surveillance - keystroke loggers and video surveillance (track what others are doing on your PC)
Key Attributes: web, email, IM support; email webcam snapshots, motion detection, alarm
Utilities: cannot recommend 

Hardware Authentication - fingerprint / iris authentication, typically via USB device
Key Attributes: portability (passwords stored ON device)
Utilities: cannot recommend

click Related        click Share
Sorry, Comments are not available for this article.