Some Internet Security Fundamentals?

WE MUST KNOW SOME FUNDAMENTAL OF INTERNET SECURITY FOR THAT I AM WRITTING THESE ARTICLE READ THIS U WILL BE UNDERSTAND ALL THING I HOPE---

Internet security fundamentals are designed to protect individual Internet users from security risks which accompany use of the Internet. Following even the most basic security fundamentals will make your browsing experience much safer, and will also secure your personal information from predators. Being a victim of identity theft is the thing you want to avoid above all, because it can take weeks or years to clear your credit history. Security fundamentals serve several purposes: they protect you from identity theft, minimize potential damage to your computer through viruses and hijackings, and make the Internet safer for others to use as well, through a network of protected computers and users.

The most basic security fundamentals have to do with the ways in which you secure and provide your information. Change your passwords frequently, and use alphanumeric codes, or difficult pass phrases. Resist the temptation to use passwords that include your name, or the names of your children or pets. Familiar objects and locations should also be avoided, to make it more difficult to guess your password. If you suspect that an online account has been compromised, act immediately to change your password and alert the site of the breach.

Another precept of security fundamentals involves being very careful about how and when you disclose information. Do not release personal information such as your address, credit card number, phone number, or bank account number to unreliable sources. Sites with expired security certificates should be avoided, and use common sense before releasing this kind of information: if you can purchase an item locally, for example, try to choose that option over ordering it online. If you do release this kind of information, make sure that you know who it is being sent to, and how it will be used. Never release sensitive information like your passport or social security number, and always use encrypted forms to send sensitive data.

Many people are victims of phishing, a type of scam in which the victim is contacted by someone who is claiming to represent someone else. Some phishing scams, like those surrounding Nigerian money, are obvious. Others are more subtle: you may receive communications from a company claiming to be your bank, credit card company, educational institution, or cell phone provider, for example. The email might say that additional information is needed, and request you to provide it. Do not respond to emails like this: the best course of action is to call your company directly if you have questions, and be aware that most financial institutions do not carry out business via email. Banks will also not ask for usernames, passwords, and other sensitive information, because they follow security fundamentals of their own to protect customers.

Additional security fundamentals include protecting your computer and Internet connection. Breaches in security can result in viral infections, and in some cases, a hacker may hijack your computer and use it to send out unwanted email or launch attacks on a website. Avoid this by having a firewall in place, keeping your operating system current with updates, and using a less vulnerable browser such as Opera, Safari, or Mozilla Firefox.

By following basic security fundamentals to protect yourself, you can reduce the risks of Internet browsing. You will never be able to fully protect yourself, however, so make sure that you get frequent copies of your credit report, and always report suspicious transactions to your financial institution immediately. If you are on a network such as one found at a school or office, make sure to follow additional security fundamentals as recommended by your network administrator to protect the network as a whole, in addition to yourself.

8Tips On Guiding Kids How To Safely Use Social Networks

More and more kids nowadays are participating in online social networking sites to communicate with friends and to meet people all over the world. This is a good venue for kids to express themselves and learn how to be responsible.

However, sexual predators, fraudsters, bullies and other bad elements also lurk in these websites in the hope of finding people, particularly kids, to prey on. According to a survey sponsored by the US Department of Justice, about 20% of kids that fall within the 10-17 age group are recipients of unwanted sexual messages online. With these unscrupulous people just around the corner, parents should be aware of their children’s social networking activities.

Pulling the plug and preventing your kids, especially teens, from using the Internet or participating in social networking sites may not be a good idea. Kids can find other ways to access the Internet. If you want to ensure that your kid is safe from dishonest people on social networking sites, read the tips below:

1.Talk With Your Kids About Internet and Social Networking Safety
2.
Impose House Rules With Regard To Internet Use
3.
Invest On PC Parental Control Software
4.
Monitor Your Kid’s Internet Use
5.
Ask Permission To See Your Kids’ Profile
6.
Ensure That Your Kid’s Profile Is Private
7.Firewall And Other Anti-Spyware and Virus Software Is Important
8.Encourage Your Kid To Visit Kid Friendly Site

10 Ways To Know If Your PC Has Virus

Intruders in Your PC: How to Spot Them

Perhaps you’re getting confused as to why your PC suddenly starts to slow down, especially when you’re basically starting it up. Then you have noticed numerous ads popping in your screen when you still haven’t surfed the Web. Worse, there are files that have been corrupted or damaged.

What you may not know, however, is the fact that maybe your PC is infected with a virus. There are many types of viruses and malware, and their effect can range from minor to severe. Nevertheless, they are still considered threat to your system. How do you keep track of them? Here are 10 ways:


1. Run your antivirus and anti-spyware software. There are many software that can help you scan your system to check if there are hidden viruses or adware. They can identify what kinds of viruses are inflicting your PC. You can also have the choice of deleting them into your computer or putting them in quarantine. Nevertheless, you should make sure that the software you are using are safe. You basically don’t like to worsen the condition with a defective or a scam software.

2. Use online security. It’s not only offline that your system can get affected. One of the main causes, the Internet, can also cause harm into your PC. To know how not secure you are when you are surfing the Web, there are different analysis software that you can use. On of these is Shields Up. You can check Internet ports to check if you are in stealth mode, which is considered to be the safest mode for your PC. It will also provide recommendation how to shut down the system when you are becoming vulnerable to hacks.

3. Check your wireless network. It’s only when your system is connected to network cables that your system is very prone to hacking. It may even happen when you are making use of a wireless network. You can check your MAC address, making sure that they are filtered, or monitor the routing setting. You may also employ the use of a free program that can do the monitoring of wireless networks for you.

4. Run your Firewall. It may not really detect the presence of viruses in your PC, but it will prevent your computer from being more vulnerable to spyware and other programs that are being planted by hackers into your system. You may also have to enable your Auto Update as it will automatically update your firewall. Keeping it up to date will make it more capable of fighting unscrupulous scammers and hackers from attacking your PC.

5. Tweak your settings. To make sure that there are no more viruses that can cause damage into your files, you must be able to allow your PC to accept auto updates. But since there is a default schedule for it, if your computer is off or you’re not connected to your PC by that time, you may not be able to receive one. So it may be ideal to modify the settings of your Auto Update so it will match the schedule of your home or office PC use. You may also opt to be notified when the update is ready for you.

6. Your PC uploads unauthorized files. There are certain types of viruses that will cause your PC to upload files without your permission. This is also the case with spyware and adware, which will send all of your confidential information to hackers and other individuals who will be using them for malicious intent or to sell you some products and services.

7. Monitor your PC’s system configuration utility. MSConfig can give you an idea of whether your PC is infected with a virus or not. You can click on Start, then Run, and then type in MSConfig. Press the tab for Startup. Then look for those program names that may appear like those of eye charts. This is because viruses and other malicious software are usually renamed using random characters.

8. Your PC shuts down automatically. It is a classic way of hinting if there are viruses and adware infecting your computer. It will automatically shut down even if you haven’t started it up properly.

9. You have distorted dialog boxes. There are a number of worms and viruses that love to make themselves known. That’s why images in your desktop, especially the format of your menu as well as dialog boxes appear to be very distorted.

10. Your PC receives error messages that are unusual. It may be that there are error messages that keep on popping, and yet they look as if something you’re not familiar with. It’s time to scan your computer as there could be viruses that are causing such occurrences.

7 EASY WAYS TO BOOST YOUR ONLINE SECURITY

TODAY I WILL PROVIDE U SOME MORE THING FOR INTERNET SECURITY......

Many people think that installing anti-virus, firewall and anti-spyware software should inoculate them from all manner of threats.

The truth is, you need to be a bit more savvy than that.

Read on to find out 7 really easy ways to close the security holes that still remain on your PC.


1 Switch to plain text mail
2 Don’t click mail links
3 Switch web browser
4 Check web sites before you visit
5 Manage your passwords
6 Screen all downloads

Never open attachments or downloads directly - save the file to your hard drive, right-click it and run a quick scan with your security tool of choice prior to opening it. When downloading files, make sure you downl
7 P2P basics
Peer-to-peer networks are a breeding ground for malicious software, particularly in content that’s been copyrighted. If you can’t live without P2P, pick a trusted provider and client . Be careful what you share, and scan all downloads prior to opening them
Create a virtual sandbox .

HOW YOU SAVE YOUR EMAIL FROM EMAIL SPOOFS

Email Spoofs -- "phishing"

Email spoofs are fast becoming a new threat. They make the receiver of the email believe that a website they use needs updating. If you are unsure of the validity of the request, email the webmaster of the real site (the one you use) and attach or forward the email you received. Ask if the email came from them.

* Do not "Reply To" or email the sender of the email or the contact email contained in the suspected email you received.
* Go to the actual site you normally use, do not click on the link in the suspected email.

That being said, we here at Cape Cod Web Service as well as other business do send out emails reminding customers to update their credit card or other information. If you suspect an email that looks like it came from us is a fraud, do not hesitate to contact us. You may also surf to our members page and update your information directly from our site. Most often when we request an update we will send you to our website before going to the secure update site.
This is done to re-assure the customer that indeed it is a valid request, not a spoof.

FIREWALL

What is a firewall;

The term "fire wall" originally meant, and still means, a fireproof wall to prevent the spread of fire from one place or area of a building to another.
The Internet is a volatile and unsafe environment when viewed from a computer-security perspective, therefore "firewall" is an excellent term for security.

A firewall protects your network/computer from unwanted Internet traffic.
The primary function of a firewall is to let normal or good traffic pass through
while ‘bad’ traffic gets blocked. The most important part of a firewall is its
configuration that distinguish between good and bad traffic.

When installed, a firewall exists between your computer and the Internet.
The firewall lets you browse web pages, download files, chat, etc.
while making sure other people on the internet can not access your computer.
Some firewalls are software that run on your computer like Windows XP Firewall®.
Other firewalls are built into hardware and can protect your network/computer
from attack.

If you have Microsoft's Windows XP there is a firewall built in, by default it
is usually turned on. See "Help and Support" in Windows XP for more information.

Firewall software can be purchased between $40. and $80. at almost any Staples,
EB store, online or large department stores.

SPYWARE AND ADWARE

NOW I AM GOING TO WRITE ABOUT ADWARE AND SPYWARE HOW IT DANGEROUS FOR YOUR PC-----------



ANTIVIRUS PROTECTION

Anti-Virus protection

Anti-virus programs are one of the most important concerns in today's computer world.
Viruses come in with email, text messaging,
voice messaging, web pages over active-x channels and many more avenues.
We can not stress enough how important
it is to have and keep updated your antivirus protection.


A common misconception; "I got anti-virus with my new computer two years ago,
it still protects me even though I can't update it anymore, right?".
(How many times we have heard this one.) You are protected only in the smallest way.
If you are not able to update your virus definitions all new viruses that have come out
since your last update are potential trouble.


PC virus infection is all too prevalent.
These, shall we say, spiteful programs cause damage to your computer
and corrupt systems. Once you have a virus your computer will email the
virus to other computers. To help stay protected from viruses, we strongly
recommend purchasing and installing anti-virus software.
Also, it's important to keep your virus protection software current and updated with
the latest virus definitions.

TUDAY i am gong to write about System security........................

How can you save own pc-----------from virus spam,
hackers, worms>>>>

Below we have listed some information and resources that may help you to keep your PC "healthy".

Keep your operating system up to date
Anti-Virus Protection
Spyware and Ad-ware
Firewalls
Hijacking
Email Spoofs ("phishing")
Email Security (or lack thereof)


Keep your operating system up to date

One of the most important concerns is to make sure your operating system is up to date.
This can be accomplished simply
(for Windows operating systems) by clicking on your
"Start" button then click on "Windows Update".
Of course you need to be on-line,
your computer will synchronize with Microsoft's server
and let you know what critical updates are available.
We suggest installing all critical patches available.

Keeping your operating system up to date keeps security loop-holes closed.
It address most security issues that have been found or reported to Microsoft,
as well as system enhancements and usually makes yo

System Security

TUDAY i am gong to write about System security........................

How u

System Security

TUDAY i am gong to write about System security........................

How u can sve

How To Find The IP Address Of The Sender In Yahoo-/Gmail





When you receive an email, you receive more than just the message. The email comes withheaders that carry important information that can tell where the email was sent from andpossibly who sent it. For that, you would need to find the IP address of the sender. Thetutorial below can help you find the IP address of the sender. Note that this will not workif the sender uses anonymous proxy servers.

Finding IP address in Yahoo! Mail :-

1. Log into your Yahoo! mail with your username and password.

2. Click on Inbox or whichever folder you have stored your mail.

3. Open the mail.

4. If you do not see the headers above the mail message, your headers are not displayed. Todisplay the headers,* Click on Options on the top-right corner* In the Mail Options page, click on General Preferences* Scroll down to Messages where you have the Headers option*Make sure that Show all headers on incoming messages is selected* Click on the Save button*Go back to the mails and open that mail.


5. You should see similar headers like this:Yahoo! headers : nameLook for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.That isbe the IP address of the sender!


6. Track the IP address of the sender



IF gmail :-.

Find IP Address in GMail

1. Log into your Gmail account and open the mail.

2. To display the headers,

* Click on More options corresponding to that thread. You should get a bunch of links.
* Click on Show original

3. You should get headers like this:
Gmail headers : Varun
Look for Received: from followed by a few hostnames and an IP address between squarebrackets. That is be the IP address of the sender!

4. Track the IP address of the sender

Find IP address in Hotmail :-

1. Log into your Hotmail account with your username and password.

2. Click on the Mail tab on the top.

3. Open the mail.

4.If you do not see the headers above the mail message, your headers are not displayed.Todisplay the headers,

* Click on Options on the top-right corner
* In the Mail Options page, click on Mail Display Settings
* In Message Headers, make sure Advanced option is checked
* Click on Ok button

* Go back to the mails and open that mail

5. If you find a header with X-Originating-IP: followed by an IP address, that is thesender's IP address

Hotmail headers : *******(sender's name), followed by IP address within square brackets[].Jump to step 9.

6. If you find a header with Received: from followed by a Gmail proxy like thisHotmail headers :******(sender's name)

Look for Received: from followed by IP address within square brackets[].
Jump to step 9.

7. Or else if you have headers like this
Hotmail headers : *******(sender's name)
Look for Received: from followed by IP address within square brackets[]. Jump to step

8. * If you have multiple Received: from headers, eliminate the ones that haveproxy.anyknownserver.com.

9. Track the IP address of the sender.

Cyber Crime And Law Enforcement Agencies

Type of Crime
Appropriate federal investigative law enforcement agencies
Computer intrusion (i.e. hacking)
Password trafficking
Counterfeiting of currency
Child Pornography or Exploitation
Child Exploitation and Internet Fraud matters that have a mail nexus
Internet fraud and SPAM
Internet harassment
Internet bomb threats
Trafficking in explosive or incendiary devices or firearms over the Internet

Other Cybercrime Reporting Resources

  • The Internet Crime Complaint Center (IC3)

    The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). IC3's mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal, state, and local level, IC3 provides a central referral mechanism for complaints involving Internet related crimes.

  • Department of Homeland Security's National Infrastructure Coordinating Center: (202) 282-9201 (report incidents relating to national security and infrastructure issues)
  • cyber questions)

The first cyber Crime

The first recorded cyber crime took place in the year 1820! That is not surprising considering the fact that the abacus, which is thought to be the earliest form of a computer, has been around since 3500 B.C. in India, Japan and China. The era of modern computers, however, began with the analytical engine of Charles Babbage.

In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

Tips to save your pc

  • Avoid giving out any information about yourself in a chat room.
  • Children should never arrange face-to-face meetings or send their photographs online without informing their parents.
  • Use the latest anti-virus software, operating systems, Web browsers and email programs.
  • Check out the site you are doing business with thoroughly. Send credit card information only to secure sites.
  • Use a security program that gives you control over cookies that send information back to Web sites. Letting all cookies in without monitoring them could be risky.
  • If you own a Web site, watch traffic and put host-based intrusion detection devices on your servers. Monitor activity and look for any irregularities.
  • Put in a firewall and develop your content off line.
  • Make sure web servers running your public site are physically separate and individually protected from your internal corporate network.
  • Protect your databases. If your Web site serves up dynamic content from a database, consider putting that database behind a second interface on your firewall, with tighter access rules than the interface to your server.
  • Back up your Web site after every update, so you can re-launch it immediately in case of a malicious defacement.

CYBER CIRME & INFOMATION SECURITY TRENDS


On 12th October 2008, French president “Mr. Nicolas Sarkozy” came to know that his bank account has been hacked and small sums of money have been withdrawn without his authorization. French Secretary of State for Consumer Affairs, Luc Chatel, confirmed the security breach.
The explosive growth of internet brought many good things but as we know everything in universe has pros as well as cons. As with most technological advances, there is also a dark side - in context of internet it’s cyber crime.
“Cybercrime is defined as the use of information technology infrastructure for crime which covers a huge range of illegal activities including illegal access, interception, data interference, system interference and electronic fraud that promote a racial hatred”.
“Who are cyber criminals”?
The cyber criminals constitutes of various groups/ category with different objectives in their mind:
1. Children and adolescents between the age group of 6 – 18 years :
The simple reason for this type of delinquent behaviour pattern in children is seen mostly:
Due to the inquisitiveness to know and explore the things. To prove themselves to be outstanding amongst other children in their group.
2. Organised hackers:
These kinds of hackers are mostly organised together to:
Fulfil certain objective such as shaping their political bias, fundamentalism etc.
A relevant example is the Pakistani hackers who are considered to be one of the best quality hackers in the world. They mainly target the Indian government sites with the purpose to fulfil their political objectives.

3. Professional hackers / crackers:
Motivated by the colour of money.
Mostly employed to hack the site of the rivals and get credible, reliable and valuable information.
Employed to crack the system of the employer basically as a measure to make it safer by detecting the loopholes.

4. Discontented employees:
To avenge their sack or their dissatisfaction with their employer, they normally hack the system of their employer.
Mode and manner of committing cyber crime:
1. Hacking: Hacking in simple terms means an illegal intrusion into a computer system or network. There is an equivalent term to hacking i.e. cracking. Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction.

2. Denial of service Attack: This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his e-mail box with spam mail depriving him of the services he is entitled to access or provide.

3. E-mail spoofing: A spoofed e-mail may be said to be one, which misrepresents its origin, different from one which actually it originates. Recently spoofed mails were sent by terrorist in context of Mumbai attack and that was completely fake mail sent from somewhere else.

4. Trojan attacks: This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized programme, which passively gains control over another’s system by representing itself as an authorised programme.

5. Web jacking: This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the website of another. This may be done for fulfilling political objectives or for money. E.g. recently the site of MIT (Ministry of Information Technology) was hacked by the hackers and some obscene matter was placed therein.

6. Salami attacks: This kind of crime is normally prevalent for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed. E.g. The Ziegler case wherein a logic bomb was introduced in the bank’s system, which deducted 10 cents from every account and deposited it in a particular account.
As the evil consequence of cyber crime grew, the various systems and organisations demanded for security and protection measures of the database and systems. Security =prevention + detection + response.
Security is a social as well as a technical process, the by-product of a community of trust created by having appropriate systems properly set up to support stakeholders’ evolving needs and good operating procedures appropriately implemented in context of respectful interaction with and valued service to all stakeholders.
Therefore, different people across the world shown their interest towards this which includes:
1. IT experts from the industrial sector.
2. Professional hackers.
3. Law enforcement agencies.

These professionals implied the various techniques and methods for security measures which may be shortlisted as below:
1. Investing in antivirus, firewalls and SPAM blocking software.
2. Detecting secure websites when conducting transaction online.
3. Blocked response to e-mails and checking header of the information from unknown sources.

4. Constant supervision of our assets, careful scrutiny of payments or rewards, and discrimination when releasing personal information might help reduce the success of an attack by way of the salami technique
5. Data entry typically must be protected using manual controls. Manual controls include separation of duties or responsibilities, which force collusion among employees to perpetrate fraudulent acts.
6. Another common control is the use of check digits or characters or sequence numbers and time of arrival that can be associated with the embedded data on the basis of various characteristics of each field.
7. Secure SQL injection method opting and having new techniques in web certification
Innovative trends in security management:
More enterprises are turning to role-based access control and fine-grained authorization to enforce data and application restrictions and comply with a variety of regulations.
It emphasizes that security technologies must be deployed in accordance with a well thought information security architecture.
Enterprise technologists must look beyond the confusion to build an effective security control layer and to construct comprehensive information security architecture.
In a nut shell the cyber crime has emerged as one of the major and fastest growing criminal activities on the planet. The modern era wants secured network and system and the best road to protect our-self is “being aware”. Knowledge of the modern hacking techniques and staying on the top of current cyber crime trends can help to extract the best use of cyber world and move to a more progressive and meaningful life. After all there is a whole other world that exits in cyber space...