Tuesday, August 6, 2013

Remote Desktop Connection

Remote Desktop is a software technology that helps the user to connect a computer from for away place through internet. This kind of remote access will give the user to access the files and programs and other services installed in the computer. It is also possible to control the computer remotely and do any kind of changes to the system. To do this connection we need

Remote Desktop Connection software to be installed in both computers.
Both computers are needed to be ON and connected to internet before they are going to connect.
Remote Desktop software usually works for transmitting the files and images of the time. It is almost like a live video feed of the controlled computer being watched on the controlled computer from a remote place. 

The controlling computer can also control the controlled computer using their mouse and keyboard. Typically remote desktop tools are used by the technical helpdesk of a company to diagnose and fix technical issues on the controlled computer.

There are lot of Remote Desktop connection tools are available in the market, and also we have built in tool in Windows operating system. Now we are going to discuss about a software application which is available for free at: www.teamviewer.com, it allows the user to connect remotely.
1.Start your computer and connect internet then open www.teamviewer.com website, install teamviewer application in your home computer or office computer and enter user ID , Password. Now note down the user Id and password carefully.
2.Go to another computer from where you want to connect your home or office computer connect to www.teamviewer.com website. Now click on “Establish Quick Connection” box enter the user Id and password of your home or office computer and click on connect button. Now teamviewer software toll will establish a secured encrypted remote desktop connection to you and your home or office computer.

Advantages: You can access to your remote computers files, programs and services  (printer, internet).



Saturday, August 3, 2013

Desktop Computer complete Security

Why do you need to secure your Desktop?
A personal computer used without proper security measure could lead to exploiting the system for illegal activities using the resources of such insecured computers. These exploiters could be Virus, Trojans, Keyloggers and sometimes real hackers. This may result in data theft, data loss, personal information disclosure, stealing of credentials like passwords etc. So, protect and secure your Personal Computer before it is compromised.

Things to remember while using your personal computer:
Always install Licensed Software so that you have regular updates of your Operating system and Applications. In case of open source software, make sure to update frequently.

  1. Read the “Terms and Conditions” / “License Agreement” provided by vendor/software before installation.
  2. Properly shutdown and switch off your personal computer after the use along with your external devices like Monitor, Modem, Speakers etc.


Software Installation:
Installation of Operating System

  • Get proper Licensed Operating System and read License agreement carefully before installing the OS.
  • Switch on your personal computer and go to BIOS Settings and change your first boot drive to CD Drive.
  • Insert your CD/DVD into the CD drive and restart your system using Ctrl+Alt+Delete.
  • After restart, the system boots from the CD/DVD.
  • Follow the installation steps as specified by the vendor document.
  • Use the CD provided by the Vendor to install your 
  • Motherboard drivers
  • Monitor drivers
  • Audio & Video drivers
  • Network drivers


Physical Security:
Regularly clean your system and it’s components. Note: Turn your PC Off before cleaning it.

  • Properly organize the power cables, wires, to prevent from water, insects etc.
  • While working at PC, be careful not to spill water or food items on it.
  • Always follow “Safely Remove” option provided by the Operating System while disconnecting the USB devices.
  • By setting BIOS password, you can prevent unauthorized access to your personal computer.
  • Switch off the computer when it’s not in use. Note: To setup BIOS password refer “Setting password to BIOS” section.


Internet Security: 
Follow These Internet Ethics while browsing.

  • Check the copyright issues before using the content of Internet.
  • Always access the site which uses https (Hyper Text Transfer Protocol Secure) while performing Online transactions, Downloads etc, which is secure.
  • If the site uses SSL, verify the Certificate details like Who is the owner, Expiry date of the certificate etc to confirm whether it is trusted or not. You can do this by clicking the lock icon.
  • Use only Original Websites for downloading the files rather than Third Party websites.
  • Scan the downloaded files with an updated Anti-Virus Software before using it.
  • Install and properly configure a Software firewall, to protect against malicious traffic


Data Security:

  • Enable Auto-updates of your Operating System and update it regularly.
  • Download Anti-Virus Software from a Trusted Website and Install. Make sure it automatically gets updated with latest virus signatures.
  • Download Anti-Spyware Software from a Trusted Website and Install. Make sure it automatically updates with latest definitions.
  • Use “Encryption” to secure your valuable Information. Note: For encryption password is required, always remember the password used while encrypting it, else data would not be available thereafter.
  • Strong password should be used for “Admin” Account on computer and for other important applications like E-mail client, Financial Applications (accounting etc).
  • Backup : Periodically backup your computer data on CD / DVD or USB drive etc..
  • in case it may get corrupted due to HardDisk failures or when reinstalling or formatting the system.


Browser Security:

  • Always update your Web Browser with latest patches.
  • Use privacy or security settings which are inbuilt in the browser.
  • Also use content filtering software.
  • Always have Safe Search “ON” in Search Engine.
  • Always use Anti-Spyware Software to scan the eMails for Spam.
  • Always scan the e-Mail attachments with latest updated Anti-Virus and Anti-Spy ware before opening.
  • Always remember to empty the Spam folder.
  • Startup programs should be monitored or controlled for optimal system performance.
  • Recovery Disk: Always keep recovery disk supplied by manufacturer or vendor of the Computer System to recover the Operating System in the event of boot failures due to system changes such as uncerificated drivers or unknown driver softwares.


Wireless Security:

  • Change default Administrator passwords.
  • Turn On WPA (Wi-Fi Protected Access) / WEP Encryption.
  • Change default SSID.
  • Enable MAC address filtering.
  • Turn off your wireless network when not in use.


Modem Security:

  • Change the default passwords.
  • Switch off when not in use.


Dont’s:

  • Do not install pirated software such as
  • Operating System Software (Windows, Unix, etc..).
  • Application Software (Office, Database..etc).
  • Security Software (Antivirus, Antispyware..etc).Note: Remember, some Pirated Software themselve can be rogue programs.
  • Do not plug the computer directly to the wall outlet as power surges may destroy computer. Instead use a genuine surge protector to plug a computer.
  • Don’t eat food or drink around the PC.
  • Don’t place any magnets near the PC.
  • Never spray or squirt any liquid onto any computer component. If a spray is needed, spray the liquid onto a cloth and then use that cloth to rub down the component.
  • Don’t open the e-Mail attachments which have double extensions.




Broadband WiFi internet Security

Broadband WiFi Security Threats
As broadband Internet connection is “Always On” , it leads to intentional misuse through:

  • Trojans and backdoors
  • Denial of Service
  • Intermediary for another attack
  • Hidden file extensions
  • Chat clients
  • Packet sniffing

Note: Default configurations that are extremely vulnerable for out side attacks.

Types of Broadband Modem

  • Wireless Fidelity (Wi-Fi)
  • Digital Subscriber Line (DSL)
  • Asynchronous Digital Subscriber Line (ADSL)
  • Very high speed Digital Subscriber Line (VDSL)

Cable Modem

  • Satellite
  • Broadband over Powerlines (BPL)
  • Terminal Adapter Modem
  • Universal Serial Bus (USB)

Broadband Modem Setup

  • Always read the manufacturer’s manual carefully and follow the guidelines, while setting up broadband modem.
  • Insert the power source into the modem and then plug the other end of it into the wall socket.
  • Before connecting the modem to the computer, check for proper functioning of the computer.
  • While setting up the modem, follow instructions specific to the type & model of the modem.
  • In case of signal via cable, connect the modem with the cable wire provided.
  • In case of ethernet, connect the modem to the ethernet port of the computer.
  • In case of USB connection, connect the modem after the computer is properly initialised.
  • Wait until the indicators on the modem are lit.
  • Install the modem driver and associated software provided along with the modem.
  • To initialize the connectivity the proper user credentials need to be given and response should be awaited before use.

Guidelines for Securing Broadband Internet Access
Do’s:

  • Always download broadband drivers from th legitimate websites recommended by the manufacturer.
  • Regularly download the firmware (driver code).
  • Always use the power adapter supplied by the manufacturer along with the modem.
  • In case of terminal adapter modem make sure that filter is enabled for broadband lines. To filter unnecessary noise generated during the transmission.


Change Default Administrator ( Passwords and User names) :

  • In order to allow only authorized access to the equipment, change the default adminstrator or admin password of broadband router modem, as these details are given by the manufacturer which are common to all modems and can be misused by anyone.

Assign Static IP Addresses to Devices:

  • Most of the home users are allotted dynamic IP addresses, as DHCP technology is easy to setup. This may even helps the attackers who can easily obtain valid address from DHCP pool. Therefore turn off DHCP option in router or access point and use fixed IP address range.

Enable MAC Address Filtering:

  • Every device is provided with an unique MAC address. Broadband access points and router & provide an option for the user to combine the MAC addresse of the home equipment for ac- cess. This facilitates to allow connections only from those devices.

Enable Wireless Security:

  • Modem routers support wireless security.User can select any one protocol and a protection key. The same wireless security protocol and protection key has to be enabled in computer.

Turn on (Compatible) WPA / WEP Encryption:

  • All Wi-Fi enabled modems/router support some form of encryption technology, which has to be enabled.

Change the Default SSID (Service Set Identifier):

  • All the access points and routers use a network name called SSID. Manfacturer normally ships their products with the same SSID set. As it can be misused by the attacker to break into the net work / computer, it is neccesary to change the default
  • SSID while configuring wireless security.
  • Use effective end point security solution (with anti virus, anti spyware, desktop firewall etc) to protect computer/ laptop from broadband Internet security threats.

Enable Firewall on Modem Router as well as Computer:

  • Broadband modem routers contain built-in firewall feature, but this option has to be enabled. Computer connected to the broaddband modem also needs to be protected with desktop firewall.

Turn off Modems during extended periods of Non-Use:

  • Shutting down a network will certainly prevent outside unauthorized people breaking into the net work. Since it is very difficult to frequently turn on and off the devices, it can be considered during travel or extended offline period.
  • In case of USB broadband modem, disconnect and remove the device after usage.
  • Install broadband Internet bandwidth usage monitoring tool.
  • Enable SSH (secure channel) for remote administration.


Guidelines for securing Broadband Internet access :
Dont’s:

  • Don’t enable the option for remote administration(via Internet), as it is not required for a home user.
  • Don’t enable the option “Restore Factory Default Setting” in broadband modem.
  • Don’t use connection without a filter for each broadband Internet line.
  • Don’t tap the line before the splitter (a small dvice that separates phone line from data / PC port).
  • Don’t use USB broadband modem with insecure computer/laptop.

Do not Enable SSID Broadcast:

  • In Wi-Fi networking, wireless access point or router typically broadcasts the network name (SSID) over the air at regular intervals.This feature was designed for businesses as well as to access public hotspots. For a home user this feature is unnecessary and can be an entry point to break into the network.

Do not Enable Auto-Connect to Open Wi-Fi Networks:

  • In case if Auto-Connect setting is enabled, computer with Wi-Fi interface can connect automatically without notifying to the user.This may expose our computer to security risks.This setting should not be enabled except in specific cases.
  • Do not leave broadband connectivity open when it is not utilized.
  • Never connect to unkown or untrusted network in case of Wi-Fi.

Note: The setup, configuration and the features may vary from model to model. For more information please refer manufacturer’s manual.