Monday, December 9, 2013

Safe Wireless Networking in Public Spaces

Accessing the internet via a public wireless access point involves serious security threats you should guard against. These threats are compounded by your inability to control the security setup of the wireless network. What’s more, you’re often in range of numerous wireless-enabled computers operated by people you don’t know. The following sections describe steps you can take to protect yourself.

Watch What You Do Online
Because you’re likely to have an unsecured, unencrypted network connection when you use a public wireless access point, be careful about what you do online there’s always the chance that another user on the network could be monitoring your activity. If you can’t connect securely using a VPN then consider avoiding.
  • Online banking 
  • Online shopping 
  • Sending email 
  • Typing passwords or credit card numbers 
Connect Using a VPN
Many companies and organizations have a virtual private network (VPN). VPNs allow employees to connect securely to their network when away from the office. VPNs encrypt connections at the sending and receiving ends, and keep out traffic that is not properly encrypted. If a VPN is available to you, make sure you log onto it any time you need to use a public wireless access point.

Disable File Sharing
File sharing in public wireless spaces is even more dangerous than it is on your home wireless network. To prevent attackers from gaining access to your sensitive files, you should disable file sharing when connecting to a public wireless access point. Check the help file from your operating system to learn how to disable file sharing.

Be Aware of Your Surroundings
  • When using a public wireless access point, you should be aware of what’s going on around you. 
  • Are others using their computers in close proximity to you? 
  • Can others view your screen? 
  • Are you sitting near a window through which someone, using binoculars, could get a view of your screen?
If any of these conditions exist, your sensitive data might be at risk. Consider whether it is essential to connect to the internet. If an internet connection is not essential, disable wireless networking altogether.

Recover your PC from virus attack

Once you know that your machine is infected with a Trojan Horse or virus (or if your machine is exhibiting unexpected behavior and you suspect that something is wrong), then you need to perform certain tasks.
If you know what specific malicious program has infected your computer, you can visit one of several anti-virus web sites and download a removal tool.

Disconnect your computer from the Internet
Depending on what type of Trojan horse or virus you have, intruders may have access to your personal information and may even be using your computer to attack other computers. You can stop this activity by turning off your Internet connection. The best way to accomplish this is to physically disconnect your cable or phone line, but you can also simply “disable” your network connection.

Back up your important files
At this point it is a good idea to take the time to back up your files. If possible, compile all of your photos, documents, Internet favorites, etc., and burn them onto a CD or DVD or save them to some other external storage device. It is vital to note that these files cannot be trusted since they are still potentially infected.

Scan your machine
Since your computer (including its operating system) may be infected with a virus, it is safest to scan the machine from a live CD (or “rescue” CD) rather than a previously installed antivirus program. Many antivirus products provide this functionality. Another alternative is to use a web-based virus removal service, which some antivirus software vendors offer free virus scan.

Reinstall your operating system
If the previous step failed to clean your computer, the most effective option is to wipe or format the hard drive and reinstall the operating system. Although this corrective action will also result in the loss of all your programs and files, it is the only way to ensure your computer is free from backdoors and intruder modifications.
Many computer vendors also offer a rescue partition or disc(s) that will do a factory restore of the system. Check your computer’s user manual to find out whether one of these is provided and how to run it.

Restore your files
If you made a backup your files, now you can now restore your files. Before placing the files back in directories on your computer, you should scan them with your anti-virus software to check them for known viruses.

Protect your computer
To prevent future infections, you should take the following precautions:
  • Do not open unsolicited attachments in email messages. 
  • Do not follow unsolicited links. 
  • Maintain updated anti-virus software. 
  • Use Internet firewall software. 
  • Secure your web browser. 
  • Keep your system patched on daily basis.

Protecting Your Home Wireless Network

While the security problems associated with wireless networking are serious, there are steps you can take to protect yourself. The following sections describe these steps.

Make Your Wireless Network Invisible:
Wireless access points can announce their presence to wireless enabled computers. This is referred to as “identifier broadcasting.” In certain situations, identifier broadcasting is desirable. For instance, an internet cafe would want its customers to easily find its access point, so it would leave identifier broadcasting enabled.

Rename Your Wireless Network:
Many wireless access point devices come with a default name. This name is referred to as the “service set identifier” (SSIS) or “extended service set identifier” (ESSID). The default names used by various manufacturers are widely known and can be used to gain unauthorized access to your network. When you rename your network, you should choose a name that won’t be easily guessed by others.

Encrypt Your Network Traffic:
Your wireless access point device should allow you to encrypt traffic passing between the device and your computers. By encrypting wireless traffic, you are converting it to a code that can only be understood by computers with the correct key to that code.

Change default Administrator Password:
Your wireless access point device likely shipped with a default password. Default passwords for various manufacturers are widely known and can be used to gain unauthorized access to your network. Be sure to change your administrator password to one that is long, contains non-alphanumeric characters (such as #, $, and &), and does not contain personal information like your birth date or phone numbers etc. If your wireless access point does not have a default password, be sure to create one and use it to protect your device.

Use File Sharing with Caution:
If you don’t need to share directories and files over your network, you should disable file sharing on your computers. You may want to consider creating a dedicated directory for file sharing, and move or copy files to that directory for sharing. In addition, you should password protect anything you share, and use a password that is long, contains non-alphanumeric characters (such as #, $, and &), and does not contain personal information like your birth date or phone numbers etc. Never open an entire hard drive for file sharing.

Keep Your Access Point Software Patched and Up to Date:
From time to time, the manufacturer of your wireless access point will release updates to the device software or patches to repair bugs. Be sure to check the manufacturer’s web site regularly for any updates or patches for your device’s software.

Check Your Internet Provider’s Wireless Security Options:
Your internet service provider may provide information about securing your home wireless network. Check the customer support area of your provider’s web site or contact your provider’s customer support group.

Latest Threats to Home Wireless networks

If you’re planning to move to a wireless connection in your home, take a moment to consider what you’re doing: You’re connecting a device to your DSL or cable modem that broadcasts your internet connection through the air over a radio signal to your computers. If traditional wired connections are prey to security problems, think of the security problems that arise when you open your internet connection to the airwaves. The following sections describe some of the threats to home wireless networks.

Piggybacking:
If you fail to secure your wireless network, anyone with a wireless enabled computer within range of your wireless access point can hop a free ride on the internet over your wireless connection. The typical indoor broadcast range of an access point is 150 to 300 feet. Of course in outdoors, this range may extend as far as 1,000 feet. So, if your neighborhood is closely settled, or if you live in an apartment or condominium, failure to secure your wireless network could potentially open your internet connection to a surprising number of users. Doing so invites a number of problems:
  • Service violations: You may exceed the number of connections permitted by your internet service provider. 
  • Bandwidth shortages: Users piggybacking on your internet connection might use up your bandwidth and slow your connection. 
  • Abuse by malicious users: Users piggybacking on your internet connection might engage in illegal activity that will be traced to you. 
  • Monitoring of your activity: Malicious users may be able to monitor your internet activity and steal passwords and other sensitive information. 
Direct attack on your computer: Malicious users may be able to access files on your computer, install spyware and other malicious programs, or take control of your computer.

Wardriving:
Wardriving is a specific kind of piggybacking. The broadcast range of a wireless access point can make internet connections possible outside your home, even as far away as your street. Savvy computer users know this wireless network range, and some have made a hobby out of driving through cities and neighborhoods with a wireless equipped computer sometimes with a powerful antenna searching for unsecured wireless networks. This practice is nicknamed as “wardriving.” Wardrivers often note the location of unsecured wireless networks and publish this information on web sites. Malicious individuals wardrive to find a connection they can use to perpetrate illegal online activity using your connection to mask their identities. They may also directly attack your computer, as noted in the “Piggybacking” section above.

Unauthorized Computer Access:
An unsecured wireless network combined with unsecured file sharing can spell disaster. Under these conditions, a malicious user could access any directories and files you have allowed for sharing.

Thursday, December 5, 2013

Facebook replaces "Hide All" button with "Unfollow"

Facebook popular social network site has replaced its "Hide All" button with the more succinct "Unfollow," letting users block all messages and posts from selected friends.

As with the previous button, it gives users the option of blocking content from certain people without offending them, say through de-friending. The latter alternative severs ties with that person on the social network, without notifying them.

"This means you are still friends, but updates from that person won't appear in your News Feed. The goal of this change is to help people curate their newsfeed and see more of the content that they care about," according to Facebook news.

The world's largest social network is constantly tweaking its newsfeed the main page users look at on the network often by reducing clutter, especially from advertising, and bringing to the surface or revealing the posts deemed most relevant to any particular user.

Facebook began rolling out the "Unfollow" button and a related change to its users on Monday. It added a "Following" button next to the usual "Like" button on a page or next to the "Friends" button on a personal timeline, which will also enable users to block posts.


Traffic Light Protocol (TLP) Matrix and FAQs

The Traffic Light Protocol (TLP) is a set of designations used to ensure that sensitive information is shared with the correct audience. It employs four colors to indicate different degrees of sensitivity and the corresponding sharing considerations to be applied by the recipient(s).

Red:
When should it be used?
Sources may use TLP: RED when information cannot be effectively acted upon by additional parties, and could lead to impacts on a party's privacy, reputation, or operations if misused.
How may it be shared?
Recipients may not share TLP: RED information with any parties outside of the specific exchange, meeting, or conversation in which it is originally disclosed.

Amber:
When should it be used?
Sources may use TLP: AMBER when information requires support to be effectively acted upon, but carries risks to privacy, reputation, or operations if shared outside of the organizations involved.
How may it be shared?
Recipients may only share TLP: AMBER information with members of their own organization who need to know, and only as widely as necessary to act on that information.

Green:
When should it be used?
Sources may use TLP: GREEN when information is useful for the awareness of all participating organizations as well as with peers within the broader community or sector.
How may it be shared?
Recipients may share TLP: GREEN information with peers and partner organizations within their sector or community, but not via publicly accessible channels.

White:
When should it be used?
Sources may use TLP: WHITE when information carries minimal or no foreseeable risk of misuse, in accordance with applicable rules and procedures for public release.
How may it be shared?

TLP: WHITE information may be distributed without restriction, subject to copyright controls.

DIFFERENCE BETWEEN CORE i3, CORE i5 and COREi7

Core i3:
Entry level processor
2-4 Cores
4 Threads
Hyper-Threading (efficient use of processor resources)
3-4 MB Cache
32 nm Silicon (less heat and energy)

Core i5:
Mid range processor
2-4 Cores
4 Threads
Turbo Mode (turn off core if not used)
Hyper-Threading (efficient use of processor resources)
3-8 MB Cache
32-45 nm Silicon (less heat and energy)

Core i7:

High end processor
4 Cores
8 Threads
Turbo Mode (turn off core if not used)
Hyper-Threading (efficient use of processor resources)
4-8 MB Cache
32-45 nm Silicon (less heat and energy)