CenterBeam News Log
News You Can Use




Subscribe to "CenterBeam News Log" in Radio UserLand.

Click to see the XML version of this web page.

Click here to send an email to the editor of this weblog.
 

 

Thursday, August 21, 2003
 

The Wall Street Journal, 8/21/03:  Defend Thyself From Bugs With a Four-Layered Plan

LOOSE WIRE

By JEREMY WAGSTAFF  

By the time you read this, a worm called Blaster may well be history. If not, you might want to read on. (Even if it is history, read on anyway.)

[more]


8:11:13 AM    

The Far Eastern Economic Review, 8/28/03:  Protecting Your Castle

 By the time you read this, a worm called Blaster may well be history. If not, you might want to read on. (Even if it is history, read on anyway.)

[more]


8:10:59 AM    

Loose Wire Blog, 8/21/03:  Update: Protecting Your Castle

Further to my column this week about protecting your computer in the Far Eastern Economic Review, here as promised is the full email from Brian Johnson of Centerbeam. It's an excellent primer.

[more]


8:10:45 AM    

C|net, 8/20/03:  Microsoft warns of critical IE flaws

By Robert Lemos

Microsoft alerted PC users to three critical security flaws in Internet Explorer and Windows on Wednesday, as the MSBlast worm and its variants used a previous vulnerability in Windows to spread across the Net for a second week.

The software giant released a cumulative patch for Internet Explorer that fixes several vulnerabilities previously disclosed by the company, and it re-released an advisory for Microsoft's SQL Server software, warning that a flaw in that program actually affects most Windows users.

[more]


8:10:30 AM    

The Register, 8/21/03:  Forget California, it's time to recall Microsoft

By Richard Forno

Opinion A sign on a Trenton, NJ railroad bridge says "Trenton Makes, The World Takes."  In light of recent history, a sign at Sea-Tac airport should probably read "Microsoft Makes, The World Quakes."

For the second time this year, Microsoft is the source of a major internet security event. First was Slammer/Sapphire in January that seriously impacted networks and corporations around the world, including shutting down ATM machines at some large banks. And now, we've got MSBlaster taking advantage of a years-old vulnerability in Microsoft Windows operating systems. But unlike Slammer that only targeted servers, this one goes after desktop computers as well - meaning that ninety percent of the world's computers are potential targets and victims this week.  Consumer desktops are significantly more plentiful than corporate ones but less-protected against viruses, worms, and other attacks. As low-hanging fruit goes, they're a perfect target of opportunity for cyber-mischief.

[more]


8:10:16 AM    

Computer Reseller News, 8/21/03:  Microsoft Releases Tool To Accelerate XP Deployment

Says zero-touch tool cuts deployment by 75 percent

by Steven Burke, CRN

Microsoft Wednesday unveiled a new tool for solution providers designed to accelerate the deployment of Windows XP, Office XP and Office 2003.

Microsoft's Solution Accelerator for Business Desktop Deployment (BDD) zero-touch product decreases the time it takes to manually migrate a full client desktop to Windows XP from two hours to 30 minutes, said Alain Meeus, a product manager for Microsoft's Windows Desktop Group.

[more]


8:10:02 AM    

Social Software Blog, 8/20/03:  Email is Dead.

Wired has a good article on how Aggregators Attack Info Overload, a perfect excuse for me to go on a rant on how information overload will kill email lists within the short term.

I have posted at length on Blogging to Prevent Email Overload, Occupational Spam and how email should be a one-to-one medium.

Joi says email is officially broken because 17% of messages are rejected as spam. Never mind the false positives, the point is that your average F500 employee spends 3-4 hours per day using email, almost 50% of email is spam and 30% is occupational spam. Email volume is growing at 30% per year, invading our time and effectiveness. Email is no longer a productivity tool.

[more]


8:09:46 AM    

The Register, 8/21/03:  Forget California, it's time to recall Microsoft

By Richard Forno

Opinion A sign on a Trenton, NJ railroad bridge says "Trenton Makes, The World Takes."  In light of recent history, a sign at Sea-Tac airport should probably read "Microsoft Makes, The World Quakes."

For the second time this year, Microsoft is the source of a major internet security event. First was Slammer/Sapphire in January that seriously impacted networks and corporations around the world, including shutting down ATM machines at some large banks. And now, we've got MSBlaster taking advantage of a years-old vulnerability in Microsoft Windows operating systems. But unlike Slammer that only targeted servers, this one goes after desktop computers as well - meaning that ninety percent of the world's computers are potential targets and victims this week.  Consumer desktops are significantly more plentiful than corporate ones but less-protected against viruses, worms, and other attacks. As low-hanging fruit goes, they're a perfect target of opportunity for cyber-mischief.

[more]


7:17:05 AM    

Update: Protecting Your Castle.
 Further to my column this week about protecting your computer in the Far Eastern Economic Review, (subscription required), here as promised is the full email from Brian Johnson of Centerbeam. It's an excellent primer.
 
Jeremy, thanks for the invitation to send you something about protecting computers viruses, worms and other exploits.  I?I've spent some time with the engineers here and have come up with a checklist of the steps people can, and should, take to protect their computers. 
 
So, maybe the best way to describe the overall strategy of protecting your computer is to ask you if you saw Lord of the Rings: The Two Towers.  If you did, you?you'll certainly recall the siege on Helm?Helm's Deep, the ancient fortress of Rohan.  The castle was built with several nested layers of defense.  When the Orcs broke through one layer, the army inside fell back behind the next layer of defense.
 
And this is the best approach to computer security and protection:  Build several layers of defense so that, even if one layer is compromised, another layer is there to protect you. 
 
Layer One:  Stop Problems Before They Reach Your Computer
 
       Turn off Your Computer When You Aren't Using It
It?Helm's very tempting these days to leave your computer on and attached to your always-on broadband connection.  Don?Don't.  Turn off your computer when you leave your home.  Quite simply put, if your computer is off, it can?Don't be hacked.
 
       Disposable Email Addresses
When doing commerce on the net, use a one-use, disposable email addresses.  This cuts down on spam, and especially spam that might carry a virus or worm with it.  Jetable.org is a good source of these addresses.
 
       Use A Firewall
Windows XP has a built-in firewall, but if you aren't?Don't on XP, or want an additional layer of protection to stop threat from ever reaching your computer in the first place, then try ZoneAlarm. 
 
       Turn Off Remote Services
Go to Start -> Settings -> Control Panel -> System -> Remote and turn off the remote assistance and remote desktop.  This will help prevent someone from hijacking your computer.
 
       Scan Your System for Vulnerabilities
Microsoft provides a free security tool called the Microsoft Baseline Security Analyzer, it can be used identify vulnerabilities, and how to fix them, quickly.  There are also a number of 3rd party security scanners available.
 
These five practices will help prevent viruses and worms from ever reaching you.
 
Layer Two: Immediately Identify and Stop A Risk When It Arrives At Your Computer
 
       Virus Protection
If an exploit makes it past your firewall, there?Helm's still a way to stop it.  By now, hopefully, everyone has some sort of virus protection program installed on their computer.  If not, invest in a high-quality program such as the one offered by McAfee.  But do remember one thing, virus protection programs tend to look for the threats it knows to look for.  McAfee is constantly looking for new threats and regularly sends out updates.  Be sure to set up your virus program to automatically check for updates otherwise new exploits will not be caught.
 
Layer Three: Don?Don't Allow Exploits to Work
If an exploit makes it past your firewall and your virus protection program, there?Helm's still another level of defense:  Don?Don't knowing allow the exploit to work.
 
       Get Your System Patches Up-To-Date
The easiest way to do this on a Windows XP system is to go to the System Update control panel and make sure this function is turned on and that it is checking daily for new updates.
 
       Turn Off Unused Services
If you do not need a particular service, (like File and Print sharing, etc.), disable them.
Disable Java, JavaScript and ActiveX if possible.  (Internet Explorer -> Tools -> Advanced)
 
       Don?Don't Open Unknown Email Attachments
Pay attention to the email that hits your inbox- and don?Don't click on it as soon as you receive it.  Don?Don't open suspicious attachments (especially with file extensions such as .vbs, ...exe, ...bat, .wsh) and get in the habit of first saving all attachments, scanning them with anti-virus program before you execute them.
 
 
Layer Four: Find Out When Things Go Wrong
 
       Install An Alarm
Remember, many security measures depend on advance knowledge of what does and does not constitute a threat.  A finally line of defense is to set an alarm that will let you know when damage is done. 
 
A company called Tripwire makes a product that constantly monitors the critical system files on your computer and alerts you when they?they've been changed.  The idea here is two-fold:  It is the last perimeter of defense as it does let you know that something has made it past all the others and has started wrecking havoc. It also identifies the damage so you know what to repair. 
 
 
Layer Five: Be Able to Escape
 
       Boot Disk
The current exploit that?Helm's on the loose has been known to complete crash a system so that it can?Don't even be booted.  This is a reminder that it?Helm's a good idea to create a boot disk, something you can boot the system with and at least recover your undamaged files.  To make one, right-click on your floppy drive and follow instructions.
 
       Back-ups
It?Helm's always a good idea and one more honored in the breech than in the observance ? like flossing.  Traditional back-ups onto removable media are time and task intensive.  And most people don?Don't follow through on this best practice by keeping their back-ups someplace other than next to their computer.  A very good alternative is to do on-line back-up through a service like Connected.  This makes the process easy and, your data is someplace secure. 
 
Finally, resign yourself to the fact taking these steps are part of the price we pay for the convenience of personal computing.  In this day and age, it is inevitable that your system will come under attack.  So, you can pay the price now, or someday regret that you didn't?Don't.
 
Thanks, Brain.
[loose wire]
7:12:02 AM    

Security

C|net, 8/20/03:  Microsoft warns of critical IE flaws

By Robert Lemos

Microsoft alerted PC users to three critical security flaws in Internet Explorer and Windows on Wednesday, as the MSBlast worm and its variants used a previous vulnerability in Windows to spread across the Net for a second week.

The software giant released a cumulative patch for Internet Explorer that fixes several vulnerabilities previously disclosed by the company, and it re-released an advisory for Microsoft's SQL Server software, warning that a flaw in that program actually affects most Windows users.

[more]


7:08:52 AM    


Click here to visit the Radio UserLand website. © Copyright 2005 Brian D. Johnson.
Last update: 4/20/2005; 3:16:55 PM.
This theme is based on the SoundWaves (blue) Manila theme.
August 2003
Sun Mon Tue Wed Thu Fri Sat
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31            
Jul   Sep