1. You are viewing our forum as a guest. For full access please Register. WindowsBBS.com is completely free, paid for by advertisers and donations.

Suggested best practices for security

Discussion in 'Security and Privacy' started by mattman, 2011/06/14.

  1. 2011/06/14
    mattman

    mattman Inactive Alumni Thread Starter

    Joined:
    2002/06/10
    Messages:
    8,198
    Likes Received:
    63
    Maybe it has been done before, but what are your suggestions for the best security?

    I have been on this forum since 2002. In those days, I had taught myself where, what we now call malware, came from. I was helping other people to recover from their effects and, looking into their origin, how I could protect my own system?

    I was so confident in my research, I turned off my antivirus, which was not reporting anything significant and I only ran it (manually) occasionally. Recently, I have tried running a few free antiviruses. I haven't had a report of any serious threat in many years.

    So, what do I do?

    Connecting to the internet is the first consideration. You must have heard of hackers and seen the updates to avoid somebody "taking control" of your computer. These people trawl the internet for vulnerable internet connections, if your system is "invisible" on the internet, you stand a better chance. Most good firewalls can help make you invisible. I read about it at www.grc.com and test my ports there.

    I don't keep (or avoid keeping) anything important on my system and I don't do things like online banking.

    "Clicking on things" is another consideration. Even to opening an email. How many websites have attractive "click here" links? You need to think that it could be a fraud, even if it appears to be legitimate. Read the Agreement if you are not completely curtain that a program is not malware. Do websearches for the program you looking to install and check people's feedback.

    Email is a classic source. They want you to open a questionable email (that might be enough) or click on that dodgy link.

    Now there are phishing websites. They are replications of legitimate websites. Your antimalware might warn you of them, my best suggestion is to be wary.

    Yes, be wary.

    What are your best practices for security? I am talking about "avoidance ", rather than getting the best antimalware and just forgetting about any of pitfalls until your system might end up being unworkable. I would rather avoid any pitfalls in the first place and maybe not need any antimalware (I haven't seemed to have needed it in the last ten years or so). I ponder what they will do when they breech my security? Steal my family photos? I have them backed up. Destroy my system, I can get a fresh system working again in a few hours. Follow my purchasing habits? Yeah, mine are exciting :D.

    If they break into your system, don't have anything worth finding.

    Matt
     
  2. 2011/06/14
    rsinfo

    rsinfo SuperGeek Alumni

    Joined:
    2005/12/25
    Messages:
    4,076
    Likes Received:
    178
    If you don't know what the threat is, how can you avoid it ?

    Yes you can restore your system, not worried about your family photos being plastered all over the net, not worried about someone breaking into your credit card/bank accounts. Very good. An open invitation to trouble.
     

  3. to hide this advert.

  4. 2011/06/14
    leushino

    leushino Well-Known Member

    Joined:
    2010/08/01
    Messages:
    201
    Likes Received:
    11
    I'm not overly concerned about these "security issues" you raise. I've been online for fourteen years now and have not had any major issues. Due to my situation, I've had to resort to some of the things you mention but without any problems resulting.

    Bottom line: If I had to tip-toe through the internet as you are describing, I would pull the plug and forget about it. Instead, I use the best paid-for anti-virus I can get and I use my common sense when it comes to opening e-mails and links within e-mails. So far, things have been fine. The truth is... there is NO guarantee whatsoever that anyone, regardless of his/her defenses and cautions he/she may take, will remain unscathed. When the most secure sites are hacked it's an indication that being online carries with it the very real possibility of eventually running into problems.

    Am I going to worry about this possibility? No. Life is fraught with dangers (both real and imagined). We're advised to use our brains, proceed with some suspicion but in the end... come to peace with ourselves and enjoy the experience.
     
  5. 2011/06/14
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    My thesis: If all your software is up to date you are 99% there!

    A friend of mine recently got infected for the 1st time in his life. He never thought it could happen to him & he got complacent. Had not updated flash when prompted, nor Java.

    Pretty sure that's how he got hit, but can only guess, as in the middle of trying to fix his system he dropped his laptop hard drive & that was the end of it, so no idea what was actually on it (Malware wise).

    He had an older Acronis backup to work from, and had a current backup of his data, so he just had a few days of aggravation.

    If my system is visible on the Internet, it still doesn't mean that anyone can just 'come in' my system & take what they want.

    Now if you are running P2P software (and have it not configured properly - which happens all the time) you may be sharing more then you bargained for ;)

    But again, most trouble arises because users are not up to date with their software patches.

    For the rest people should do whatever they feel comfortable with...
     
    Arie,
    #4
  6. 2011/06/14
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
  7. 2011/06/14
    broni

    broni Moderator Malware Analyst

    Joined:
    2002/08/01
    Messages:
    21,701
    Likes Received:
    116
    Let me add couple of things.
    Those would be rules you can't break no matter what.

    1. "If all your software is up to date you are 99% there!" - that's the basic; if you're not there, you'll get hit sooner, or later.

    Then....
    ...most infections comes from 3 sources, listed below not in particular order...

    2. Visiting websites (WOT will give you pretty good warnings; if WOT doesn't want you to go there, do NOT; also some browsers, like Firefox will give you a warning, if the site has been compromised; I don't know about IE - not using it)

    3. Downloads, especially torrents and other P2P programs.
    You may know my point of view from some of my postings in malware forum - I'm not your censor, so if you "must" download, make sure you scan EVERY single file before even touching it; your AV program should warn you automatically, if the file is bad - do NOT trust that feature, scan the file again.
    NOTE. I scan all downloaded files, even, if they come from trusted sources (what will happen, if that "safe" site has been just hacked and we don't know about it yet?)

    4. Email
    Never, ever believe, that particular mail came from your "mama ", even, if it clearly shows her email address.
    Especially, if some links, or attachments are involved.
    If I see a link, I always copy that link and Google it to make sure, it's safe.
    Downloading an attachment is fine, but do NOT open it, unless you scan it with your AV program (again, your AV should automatically warn you, but....scan it anyway).

    Too much work?
    Put your computer in the storage and don't use it.
    I don't like your computer being compromised, because it becomes a threat to me and other people online.
     
  8. 2011/06/15
    TonyT

    TonyT SuperGeek Staff

    Joined:
    2002/01/18
    Messages:
    9,072
    Likes Received:
    400
    It used to be that getting infected required some user interaction, i.e. clicking on a link, email link, downloaded executable, etc., else one could not get infected.

    That was the case until a few years ago. Until then, I'd stopped using antivirus auto-protect features or turned off antivirus completely and manually scanned downloads and attachments.

    Things have changed. Most infections now come from Web sites with code that exploits browser security holes. Many such holes can be closed by updating the browser & its plugins such as flash & java. But ALL browsers today are subject to certain x-site scripting attacks unless the browser is completely sandboxed.

    IMHO, besides updating software, the two best things one can do to avoid this type of infection are:

    1. Do not use an account on the comp with admin privileges, i.e. use a restricted account. (software cannot be installed)

    2. Learn how to read search results. For example, if search google for "apples" you will get a page with results. Put your cursor over the link and view the URL in the status bar. Compare it to the site description and look for oddities. Then compare the URL & description to the green URL beneath the description. Anything that seems odd or slightly "off" is reason enough not to click the link.

    Using security software browser extensions/plugins that monitor site URLs can also be of help, but they tend to slow down browsing or cause other annoying things to happen, but these are good for the average user as a means of protection.

    A custom hosts file is similar to these browser add-ons. But it too only works against known malicious sites.

    As long as there are criminals, there will be methods of exploiting browsers and operating systems. Similar habits exist in the concrete world...if you don't want to get mugged, don't walk through through bad neighborhoods with dollar bills sticking out of your pockets. In other words, learn how to distinguish between good and bad Web sites.
     
  9. 2011/06/16
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    I'll add:

    Do not switch OFF UAC!!! Wanne shoot yourself in the foot?

    If you have Windows 7, you can set UAC to Notify me only when programs try....., i.e. the second from last option.

    If you select Never notify you lose a LOT of Windows 7 protection, including in IE.

    Install WOT. It'll even show you on Google search (or any other for that matter) the unsafe sites:
     

    Attached Files:

    • wot.jpg
      wot.jpg
      File size:
      16.6 KB
      Views:
      9
    Arie,
    #8
  10. 2011/06/16
    kiasuteo

    kiasuteo Well-Known Member

    Joined:
    2002/01/09
    Messages:
    149
    Likes Received:
    0
    I am using win 7 but I do not know what is UAC or where / how to turn it on . Please advise . Thanks
     
  11. 2011/06/16
    wildfire

    wildfire Getting Old

    Joined:
    2008/04/21
    Messages:
    4,649
    Likes Received:
    124
    It's on automatically, don't turn it off ;)
     
  12. 2011/06/16
    kiasuteo

    kiasuteo Well-Known Member

    Joined:
    2002/01/09
    Messages:
    149
    Likes Received:
    0
    how do I even know that its on already or I may have accidentally off it previously not knowing what it is ?
     
  13. 2011/06/16
    wildfire

    wildfire Getting Old

    Joined:
    2008/04/21
    Messages:
    4,649
    Likes Received:
    124
  14. 2011/06/16
    Admin.

    Admin. Administrator Administrator Staff

    Joined:
    2001/12/30
    Messages:
    6,687
    Likes Received:
    107
    No chance you can switch it off by accident.
     
  15. 2011/06/16
    wildfire

    wildfire Getting Old

    Joined:
    2008/04/21
    Messages:
    4,649
    Likes Received:
    124
    Arie, you disrespect the ability of the cranial disadvantaged :)
     
  16. 2011/06/16
    rsinfo

    rsinfo SuperGeek Alumni

    Joined:
    2005/12/25
    Messages:
    4,076
    Likes Received:
    178
    Well said. I would like to frame it & hang it on my wall. :D
     
  17. 2011/06/16
    kiasuteo

    kiasuteo Well-Known Member

    Joined:
    2002/01/09
    Messages:
    149
    Likes Received:
    0
    well , sad to say , I did turn it off :eek: Now that I know , I turn it back on to the top level. thanks , I learned another lesson here .:)
     
  18. 2011/06/18
    mattman

    mattman Inactive Alumni Thread Starter

    Joined:
    2002/06/10
    Messages:
    8,198
    Likes Received:
    63
    UAC makes you (me, at least) think twice. It can warn you of things being installed by an "unknown" source, it also can make you stop and have second thoughts about something you actually wanted to install. When you clicked OK for the Agreement, was there anything that could be detrimental in that agreement. Have you read it?
     
  19. 2011/06/19
    Arie

    Arie Administrator Administrator Staff

    Joined:
    2001/12/27
    Messages:
    15,174
    Likes Received:
    412
    Not only that, but Internet Explorer "Protected Mode" feature uses UAC to run with a 'low' integrity level (a Standard user token has an integrity level of 'medium'), effectively running in a sandbox, unable to write to most of the system (apart from the Temporary Internet Files folder) without elevating via UAC.

    Since toolbars and ActiveX controls run within the Internet Explorer process, they will run with low privileges as well, and will be severely limited in what damage they can do to the system.

    As soon as you set UAC to Never notify, you will lose this protection too!

    Extensions that attempt to gain write access to securable objects by using an API function in one of the following binary files will receive Access Denied errors when IE runs in Protected Mode:

    Code:
    actxprxy.dll	ieui.dll	mswsock.dll	sensapi.dll
    Advapi32.dll	iexplore.exe	NAPINSP.dll	Shdocvw.dll
    bcrypt.dll	IMM32.dll	ncrypt.dll	SHLWAPI.dll
    BrowseUI.dll	Inetcpl.cpl	NETAPI32.dll	SWEEPRX.dll
    clbcatq.dll	IPHLPAPI.dll	NLAapi.dll	TAPI32.dll
    Comctl32.dll	jscript.dll	NSI.dll		URLMon.dll
    Corpol.dll	jsproxy.dll	Ntdll.dll	USERENV.dll
    CREDSSP.dll	Kernel32.dll	ntmarta.dll	USP10.dll
    Crypt32.dll	LPK.dll		offprof.dll	uxtheme.dll
    Cryptnet.dll	mf.dll		OLEACC.dll	vbscript.dll
    dciman32.dll	mlang.dll	pnrpnsp.dll	Wininet.dll
    ddraw.dll	MPR.dll		PSAPI.dll	WINNSI.dll
    dhcpcsvc.dll	MSASN1.dll	rasadhlp.dll	winrnr.dll
    dhcpcsvc6.dll	mscms.dll	rasapi32.dll	WINSPOOL.DRV
    DNSAPI.dll	MSCTF.dll	rasdlg.dll	winsta.dll
    dssenh.dll	msfeeds.dll	rasman.dll	Wintrust.dll
    dwmapi.dll	msfeedsbs.dll	rpcrt4.dll	ws2_32.dll
    Dxtmsft.dll	Mshtml.dll	rsaenh.dll	wship6.dll
    Dxtrans.dll	MSHTMLED.dll	rtutils.dll	wshtcpip.dll
    gpapi.dll	msimg32.dll	samlib.dll	wsock32.dll
    Ieframe.dll	msimtf.dll	Schannel.dll	wtsapi32.dll
    IEPeers.dll	msls31.dll	secur32.dll	 
    iertutil.dll	Mstime.dll	Secure32.dll
    As I said: You'll lose that protection when switching off UAC. DON'T DO IT!
     

Share This Page

  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.