Quantcast

Jump to content


Photo

Basic Security Guide


  • Please log in to reply
8 replies to this topic

#1 HeartWong

HeartWong
  • 19 posts

Posted 01 April 2007 - 09:04 PM

Guide taken from http://www.sgforums....hread_id=201632



Service Packs, Patches and Windows Update

You can install as many security tools (such as antivirus, anti-malware or firewall software), as you like, it won't be a secure solution if the operating system itself has security flaws.

However no software is error free. It doesn't matter if is a Microsoft OS or a Linux OS, some software errors are based on problems in the software architecture. Most of the critical security holes result from inaccurate programming or too short tests during the developing phase. As soon a critical error is found, a patch, which is a tiny update eliminating the security hole, will be made available by the software manufacturer.

Microsoft offers patches and patch collections (service packs) for free. All you have to do is go to the Microsoft Windows Update Page and follow the installation instructions.

Windows Update: http://www.windowsupdate.com

Thus the most important rule to make your system safe is: Always keep your system up to date with updates and patches!

The same goes for your Java.

Update Java from this link: http://java.sun.com/...loads/index.jsp. Scroll down to Java Runtime Environment (JRE).

Click on Download.

Select Accept License Agreement. The page will refresh.

Select either online or offline installation. For offline installation, save it to a convenient location and run it. If you are surfing the Net, just close your browser, and open it again for the changes to take effect..


Anti-Malware Software

Malware describes Trojans, Dialers, Worms (worm-viruses) and Spyware (adware). These few are the most common threats for users.

Trojans
Trojan Horses (Trojans) are programs that make you think they are something else than what they really are. In most cases they come via email or downloads to the computer. They mask themselves as programs, games or other media of interest. Trojans hold a wide choice of harmful features such as logging credit card numbers and passwords to destroying all data on your system. A special subgroup of Trojans are the backdoors, they open the computer from the inside and hold a port open for an outside attacker who can take over the PC.

Dialers
Dialers are little programs that reconfigure your dial-in default number to an extra cost number if you have a computer dialup modem. This can result in many hundred dollars costs for each dial-in procedure. When a site popup asks you if it may install some software, even if it seems necessary to obtain more information on certain topics, be alarmed and if you don't wish to install it, don't let them coax you into saying "accept".

Worms and viruses
Worm and viruses are currently the biggest dangers in the Internet. They spread via emails with harmful attachments, which send themselves to as many other computers as possible and damage your system if they are opened. If you don't open the attachments or, at best, delete them at once, you won't be in danger.

Spyware, Adware and Browser Hijackers
Your personal data and your habits are gold for some advertising companies. So they try to infiltrate your computer with their software that can collect your information about your surfing habits and invade your privacy. The information it collects is then sold for advertising purposes or for companies that gather marketing data. Browser Hijackers can change your Internet Options settings to get you to visit certain websites or use certain search engines. They usually affect your Internet Explorer search settings and homepage, but can also change context menu items or add entries to your Registry and Hosts file to redirect you to the site of their choice (not yours). Advertising modules and Adware can also change your default home page settings in your browser.


Antivirus Software

Although the classic 'virus' has been moved into the background lately, a good antivirus software is indispensable. When you chose the software, make sure that the program has a background guard that detects and blocks the spreading of viruses. Viruses affect programs or write into the boot sector of hard disks, some of them are not found in files on the disk but exist in the virtual memory space of the PC (the latter can be eliminated with a reboot). Good Antivirus Software can also find these viruses in the memory and remove them.


Get an antivirus

Here are some free antivirus programs, which offer real-time protection against most viruses.

Never have more than 2 antivirus programs running in real-time. This may cause conflicts within the PC and cause your PC to crash. If you wish to have 2 antivirus programs running, use the other one as an on-demand scanner.

AVG Antivirus Free(http://free.grisoft.com/softw/70free/setup/avg75free_432a861.exe)
AntiVir for Windows 2000 and Windows XP(http://www.free-av.com/down/windows/antivir_workstation_win7u_en_h.exe)
A few Reliable antivirus companies:

AVG Antivirus > www.grisoft.com (free verion can be downloaded.)

McAfee>www.mcafee.com



Firewall Software

Here you must distinguish between two different types of firewalls:

Desktop-Firewalls
They interpose into the operating system and catch unwanted data packages before they can reach the target program. They also catch data, which is sent from specific programs to the web. You can define rules to block or allow certain programs to be used. You can also define rules to allow or block certain data from being received or sent.

But desktop firewalls have a fundamental weak point. They can be bypassed. Nearly everyone has a rule for the web browser (Internet Explorer) defined, which allows the browser to access the web. This fact is capitalized by some Trojans that hijack the browser to make a connection to outside the computer with the rights of the browser. Another weak point of desktop firewalls is, that they can only catch data that is processed by the communication modules of the operating system (WinSock). If a harmful program uses it's own communication module (it's own protocol stack) the firewall can't do anything against it in most cases.

Hardware Firewalls
Firewalls that are not installed on the local computer are better in every way. They are located between your computer and the Internet. So they can hardly be bypassed. Hardware firewalls are special appliances or computers with special firewall software installed. For private use, they are too expensive in most cases. But several routers can also be used as hardware firewalls.

The best solution in any case is don't run software that tries to send or receive unwanted data. Don't open unnecessary ports and set the firewall to block them.


Here are some free firewalls to protect against intruders and know who is trying to communicate with your PC.

Filseclab Personal Firewall Professional Edition
Outpost Firewall Free
ZoneAlarm Free
Sygate Personal Firewall Free
Comodo Personal Firewall
Jetico Personal Firewall
Kerio Personal Firewall
AS3 Personal Firewall
Tiny Personal Firewall



Hope this guide help all of you here =D
Hope you all find it useful =D

Edited by HeartWong, 03 April 2007 - 04:15 PM.


#2 Raui

Raui
  • 5687 posts


Users Awards

Posted 03 April 2007 - 02:11 AM

Wow, this is a great guide smile.gif Props wink.gif

#3 cx323

cx323
  • 648 posts

Posted 03 April 2007 - 03:45 PM

you might want to give a little credit
http://www.emsisoft....cles/tec040402/

#4 redlion

redlion
  • I don't exist!

  • 12072 posts


Users Awards

Posted 03 April 2007 - 03:52 PM

It would have been cool if you had written it yourself. Now you just look like a nub. Good job violating copyright law
QUOTE
© 2003-2006 Emsi Software GmbH - 4/4/2007


#5 HeartWong

HeartWong
  • 19 posts

Posted 03 April 2007 - 04:15 PM

Oh i got it from http://www.sgforums....hread_id=201632
Sorry crybaby.gif

#6 shabba

shabba

Posted 05 April 2007 - 07:08 AM

Hmm - This is very bad mister, credit where it is due. Plagiarism is not something we like here at codex.. hmm

#7 BinaryAttack

BinaryAttack
  • 487 posts

Posted 16 April 2008 - 04:51 PM

should have credit the original author...

#8 Frizzle

Frizzle
  • M'lord

  • 16889 posts


Users Awards

Posted 16 April 2008 - 04:53 PM

Dude this thread is like over a year old? Try not to bump old threads unless there's something new to add.

#9 BinaryAttack

BinaryAttack
  • 487 posts

Posted 16 April 2008 - 11:54 PM

well it was the first few topics in this section. Explains how deserted this section is.


0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users