Home Computer Security and Privacy Seminar Advanced - PowerPoint PPT Presentation

1 / 17
About This Presentation
Title:

Home Computer Security and Privacy Seminar Advanced

Description:

Not the 'Best of the Best' programs (Note that best is variable) ... Spybot Search & Destroy - Spyware Blaster. Netveda SafetyNet Firewall ... – PowerPoint PPT presentation

Number of Views:80
Avg rating:3.0/5.0
Slides: 18
Provided by: ANOt1
Category:

less

Transcript and Presenter's Notes

Title: Home Computer Security and Privacy Seminar Advanced


1
Home Computer Security and Privacy
Seminar(Advanced)
  • a presentation byBob Cook
  • Discovery Owners Association, Inc

http//www.discoveryowners.com
2
SECURITY SUITE LIMITATIONS
  • Most security suites are easily defeated by
    malware
  • Most security suites are only updated once per
    week
  • Not the Best of the Best programs
    (Note that best is variable)
  • Need multiple antispyware programs for best
    protection

3
USE THE BEST PROGRAMS
  • NOD32 (Eset) Antivirus
  • Use several antispyware programs
  • - MS Defender (XP Only)
  • - Tenebril Spycatcher
  • - Spybot Search Destroy
  • - Spyware Blaster
  • Netveda SafetyNet Firewall
  • (test your firewall at www.grc.com)

4
ADDITIONAL MEASURES
  • Disable unnecessary services (www.grc.com has
    some easy programs to help with this..Shoot the
    Messenger, Decombulator, UPnP)
  • Implement a custom HOSTS file to protect against
    phishing and pharming
  • Upgrade to XP if you must use Windows

5
  • Use a program such as ClamWin (free) or
    ProcessGuard (30) to guard against unauthorized
    processes and global hooks
  • Monitor your running processes and threads with
    ProcessExplorer
  • MS Updates are issued on the second Tuesday of
    each month. However, it can be a week before
    updates are actually delivered to your computer.
    Use the auto update feature, but check manually.

6
  • Use rootkit detection software, such as
    BlackIce(), Rootkit Revealer, or IceSword Be
    prepared for false positives requiring manual
    investigation
  • Use a program such as Autoruns to investigate
    what is starting and running on your computer

7
  • Consider removing MS Java and replacing with Sun
    Java (www.java.com). This will eliminate
    vulnerabilities, BUT it may break some HP printer
    applications.
  • Create a limited account for surfing.
  • For additional tips, see the Internet Security
    booklet.

8
AM I SAFE NOW?
  • No, but you are a lot more secure
  • New security vulnerabilities are constantly being
    discovered and implemented
  • Attacks on programs are a threat that will likely
    increase in the future
  • Image backups will allow you to get back to a
    known good state quickly and easily

9
HOUSTON, WE HAVE A PROBLEM
  • Easiest, quickest fix is to restore from your
    image
  • Alternative is to use advanced tools to try to
    fix problem
  • Hijack This! may help resolve some problems, but
    not problems such as rootkit viruses

10
IMAGE BACKUPS
  • First, reformat and reinstall Windows
    (backup your data first)
  • Partition drive into at least 3 partitions (OS,
    Programs, Data)
  • Install programs and data
  • Make individual backup of each partition
  • Your best defense against infection, equipment
    failure or operator error
  • Keep second copy of images offsite

11
ULTIMATE SOLUTIONS
  • The following solutions offer the ultimate in
    security and also free you from worrying about
    internet security.
  • All of these solutions are within the
    capabilities of most users

12
  • Use a gateway device such as iPhantom or D-Line
    SecureSpot
  • - All your traffic is routed thru their
    servers which have enterprise-level security
  • - All traffic is encrypted
  • - Anonymous access
  • - Content filtering
  • - Plug and Play, easy to use
  • - Only works with a Broadband connection
  • Approx 90 for hardware 15/month

13
  • Use a Linux LiveCD distro for internet
  • - No knowledge of Linux required
  • - Linux is NOT installed on your PC
  • - Works with dial-up, cell phone, broadband
  • Disadvantages
  • - Requires time to boot (varies with distro)
  • - May want to use thumb drive to save data
  • - If you want to use any Win programs, will
    not work

14
  • Use a Virtual Computer (VC)
  • Another computer and OS running inside Windows
    and completely isolated
  • Allows you to use Windows apps (must be installed
    in the VC)
  • Can easily save data
  • When you power down the PC and revert to your
    base PC, your base PC is unaffected by any
    malware that may be on VC
  • You MUST protect your base PC with a GOOD firewall

15
VIRTUAL PC IMPLEMENTATION
  • Buy VMware or MS Virtual PC and create your own
    virtual machines
  • Use FREE VMware Player and download free virtual
    machines
  • - Browser Appliance (subset of Ubuntu Linux
    configured for internet browsing and email, works
    only on broadband)

16
AN EASY SOLUTION
  • Use an old PC to browse the internet and get
    email.
  • Dont keep any personal info on it.
  • You will still want to keep the software
    updated and also image the HD.

17
  • For more details download and read the free
    Internet Security Booklet at
  • www.discoveryowners.com/internetsecurity.htm
Write a Comment
User Comments (0)
About PowerShow.com