Importance of applying security to your system

This is an update on my first post about the removing the trojan called smithfraud.  I help my friend get rid of the trojan and had the system purring, but shortly after he got back on the Internet with no protection and got hacked again.  This time worse then before.  Not only did he get smithfraud AGAIN but he got some crap I never even heard of.  I may have to wipe his entire hard drive.

I constantly tell him how important it is to secure your system even if your on dial-up.  Just having Sp2 for XP is not enough.  I recommend at least a firewall

If you have a broadband connection check out my walk through on securing broadband Internet connections.

Broadband Internet Security


3 Easy Steps for Broadband Internet Security for your Cable Modem and DSL

 

Broadband Internet Security for Cable Modems/DSL: 

1)    Get Yourself a Router

If
your ISP issues you a fairly robust router with instructions on how to
secure it, you may not need a router. Just follow their instructions on
how to configure the security on the device. Step 1B explains what
security features are needed.

 

A. Types of routers:

 

linksys, Netgear, Actiontec When you buy a router look for the following features:

 

Four 10Base-T/100Base-TX RJ-45 ports, one 10Base-T broadband WAN port, one 10Base-T/100Base-TX RJ-45 uplink port

 

This means that it can get four of you

computers online using Cat 5.

If you have multiple computers and your Cable/DSL device does not support more than one connection I do NOT recommend wireless.

If
you can, connect the DSL device to another router. You will need to use
a crossover CAT 5 cable to connect the two like devices (i.e. computer
to computer, router to router) require a crossover cable.

A USB cable will also work.

 

B. Configure the Router Correctly:

For
security, as a minimum, use the Network Address Translation (NAT)
feature of the router to hide your internal computers from the
Internet.

You may have to go to an Advanced Setup Feature on your router to turn on the NAT feature.

C.     Additional Router Security

         Features

Some
routers offer additional firewall features for broadband Internet
security such as actively closing ports, blocking websites, blocking
services and integrating third party software firewalls such as
ZoneAlarm and PC-Cillin.

 

2)    Consider using software to protect your system for broadband Internet security

 
A.    Virus protection

Free online virus scan:

Pandasoftware

Trendmicro

More Free Virus tools:

Freebyte

Thefreesite Dot Com

Free trial of Norton Anti-Virus

Free for DOD Employees

Other virus tools:

AVAST

Grisoft

 

I’ve
heard that Norton was better than McAfee and vise-versa, but in my
experience basic computer security can not be beat. The best practices
are to not download e-mail attachments from unknown sources, turn off
java script, cookies and asp functions on the browser and make sure you
don’t put virus infected disks into your system. If you do use
Anti-virus software make sure it is updated with the latest virus
definitions.

 

Even More Anti-Virus Resources

Software Downloads:

MajorGeeks
As you can see MajorGeeks is one of the best resources for freeware on the net.

B.    Ad-ware protection

In
my opinion, adware, spam and spyware have become worse than Virii,
trojans, worms, logic bombs or any other malware in compromising
broadband Internet security.

 

Many
times there is no difference between adware, spyware and malware.
Adware and spyware creators are constantly coming up with creative ways
to get there software on our computers. Just when I think I’ve figured
out a way to eliminate ALL adware, and adware, they come up with a new
brilliant method of deploying their software on my system and keep it
there.

 

Here is a list of common Adware/Spyware  removal tools:

Adaware

Hijackthis (don’t use unless you know what your doing)

Spyware Blaster

The
best resource in getting rid of adware and spyware and malware are
search engines. Usually you can find someone online who managed to fix
the problem. Forums are an incredible resource for your broadband
Internet security.

 

Even More Anti-Spy/Ad ware Resources

Software Downloads:

MajorGeeks

**BEWARE of WARES**

Beware
of Freeware & Shareware from illegitimate sites. A lot of spyware
and shareware comes from freeware such as P2P (i.e. Kazaa). Manytimes
what you think is free is really not free at all. Even if you have a
rare legitimate copy of beloved Kazaa or Sharezaa, WinMX, or whatever,
you MUST beware of what you download.

Be
aware that malware and spyware can be hidden in .jpg, .gif, video and
even sound files. Its call stenography. Its very cool. The safest thing
to do is not use P2P at all. It is almost as bad as wireless.

 

KazaaBegone

For secure methods of P2P check out:

Creators of Kazaa: Joltid

       Bittorrents

C.    Software firewall

I
have used firewalls built in Linksys, Netgear, and Actiontec routers
and I think they work great. They are by no means the push button
solution to broadband Internet Security. For one thing they have holes
just like any other software, hardware and firmware on the market.
Malware can still get to your system. Many times people think just
because they have a firewall they have an “S” on their chest.

Computer Security Principles

Be humble. Know that you need:

– More than one layer of defense (patches, security configurations, cleaning tools)


Security awareness of what is going on with the services, applications
and operating system you are running that are exposed to the Internet.
Be proactive. Look at your Event/Audit logs, processes, and network
activity at least bi-weekly.

– If your system seems slower than usual assume the worst and check it out immediately.
I hate software firewalls but they are probably the best way to protect your home computer if you keep up with it.

Free software firewalls:

Zone Alarm

Not free but still good:

Norton

McAfee

Tiny Firewall

My resources:

Free-firewall

http://www.Majorgeeks.com

tucows

3)    Check your Security

 

A.        SCAN your own IP

These are sites that allow you to scan your system from the outside. It is a very simple penetration test.

Sygate

GRC

I would also recommend using a port scanner such as SuperScan

TASK MANAGER

Check your processes with Task Manager

If your on a Windows NT/2000/XP system hit

CTRL + ALT + DEL
and choose Task Manager. Once your in Task Manager select processes and
take look at what is running. This is a great resource for locating and
killing rogue applications.

 

NETSTAT

 

Use netstat to examine what network activity is happening on your system.

Netstat is a built in feature.

 

Go to Start | Run | type “cmd”

This will bring up a DOS prompt. Type “netstat”

 

If
there is a ridiculous amount of activity scrolling up the screen and
your system is a sluggish, you may have a Trojan, virus or worm.


I had one called HWCLOCK.exe
on my system. It actually scanned other people in my ISP's network
looking for other people to exploit. I had to shut off the process
called HWCLOCK in my Task Manager and remove the malware while in Safe
Mode.

Other Broadband Internet Security Sites:

Broadband Internet Security software

CERT Home Network Security

Broadband Internet Security links

Broadband Internet Security

 

 

Remove the HWCLOCK.EXE/W32.Hwbot-A Trojan

I got the HWCLOCK.EXE when I was testing my new Internet connection.  I noticed it when my Internet DSL connection started feeling like a  56K dialup. 

I removed it by going into Showing all files, going into Safe Mode and deleting the HWCLOCK.exe/W32.Hwbot-A Trojan.

This is a trojan that can actually steal your passwords and other personal data.  On my system is was attacking other system.

I've got more detail instructions on how to remove the HWCLOCK.exe at http://elamb.blogharbor.com/hacked/hwclock.htm

If you found this post or others useful, feel free to donate to

elamb – Home Computer Security.  No amount is too low (or high).

Securing Internet Explorer

Securing Internet Explorer:
Step 1.  Turn Security WAY UP
   Tools | Internet Options | select the Security tab | Move the
“security levels for this zone” to HIGH

Step 2. Turn off and Delete All Cookies.
   The first thing you should do is clear out all your cookies.
   Tools | Internet Options | select the Privacy tab | Move the slider in the Settings area to a higher level of security.  Keep in mind that if you block ALL cookies some sites will be limited or even unaccessable.. but you can always go back and change it.

Limiting the number of cookies you except can increase your privacy

Step 3. Disable Java and Active X
THIS IS PRETTY EXTREME.  YOU WILL NOT BE ALOWED TO LOG ON TO WEB BASE EMAIL ACCOUNTS AND OTHER SITES REQUIRING A LOG IN.  BUT YOU WILL BE ABLE TO SURF. I personally Can not use this because it is TOO restricting.   
   Jave and Active X are know as mobile code because they download software from a remote source (or run from a remote source) to your computer.  Some of the most effective malware are mobile code.
   Tools | Internet Options | select the Security tab | Select the “Costum Level” button which will open up “security settings.”
   Once in Security Settings disable everything under “Active X” and “Scripting.”

What I do is Highten the Security Tab and use Internet Explorer as little as possible.  I use Firefox.  It is also very important to update these (and all other applications) with the latest patches.  This, combined with my router firewall, seems to work really well. 

Neither Firefox or Internet Explorer are secure if you don't take the appropriate measures.

If you do use cookies you should delete them all about twice a week.

http://elamb.blogharbor.com/hacked/igothacked.htm –> get rid of malware
http://elamb.blogharbor.com/broadband/broadband.htm –> secure your broadband connection

Google Web Accelerator – Broadband Internet Security

Google has launched a web accelerator for broadband users.  And security has become an issue.   Some users are conscerned with cokies being copied and/or shared since the Google Web accelerator caches sites on computer systems to make downloads faster.

Web accelerator concerns on digg.com

by: n-g-k (0) on 10:34 AM 5/05/05 | Score:

This is the antithesis of the anonymous proxy, you're giving up privacy for a couple more seconds of speed here and there? Google is going to log everything, find out who goes from what site to whatever other site, datamine, look for patterns, find out all kinds of things about people and society for what purpose? To help them sell more advertising and make more money? Well, that's just the primary reason, who knows what other nefarious motivations there could be. Imagine yourself owning google with all of that supercomputing power, others have said it above, google is the ultimate hacker. You can have your GWA, I say “No thanks!”

Better solution: use Firefox, hold down CTRL when you click, any links you click on will open in a new tab and begin downloading. Using this method you can click a bunch of links you will want to see, then by the time you get to the tabs they are already opened. Use CTRL-W to close the tab when you are done reading it and the next tab will be up.

by: n-g-k (0) on 02:23 PM 5/05/05 | Score:

Here is a very good article that goes along with what I wrote above:

http://www.somethingawful.com/articles.php?a=2858

Broadband Internet Security

In light of the growing amount of broadband users, I've decided to make a page about broadband Internet security

Security seems to be the last thing people think about when it should be the first.  It takes a sluggished compromised system for most users to considered examining their system. 

There are plenty of broadband pages out there but I wanted mine to be a simple walk through for the average compuer user.

Broadband a security issue

Removing TROJAN-SPY.HTML.SMITFRAUD Trojan

My friend around the corner calls me about once a month to clean up his computer.  Usually, its just a simple matter of running
Adaware or HiJackThis.  But this time was different. 

I
was helping my partner clean a trojan off of his Dell the other
day.  And to my surprise Adaware did not remove it.  It also
removed the ability to get to the Task Manager in order to view the
processes and added a link to the desktop. 

I found out it was called TROJANSPY.HTML.SMITFRAUD.  It took more effort than usual to remove, but I did manage to get rid of it with the help of a the Geekstogo! Malware removal forum.  I've found forums to be VERY helpful in getting help cleaing up and securing my home computer with ease.  Here is how I got rid of the Smithfraud.

 http://elamb.blogharbor.com/hacked/removesmitfraud.htm

1 2