Wednesday, October 5, 2011

Firewall Support, The Best Way to Block Hackers

Do you know you can protect your computer from unauthorized access with the help of firewall? A firewall is a security tool. It may be a hardware, a software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. It protects an entire network based on the nature or level of the network. Hardware firewalls are more expensive and harder to configure but have more options to manage desirable security features over any type of network. It is also usable to signify particular or customized data transmission. Don't you know how to configure firewall? For Firewall configuration you can talk to a computer repair company.

On the other hand, Software Firewalls are basically used for limiting access of internet for a particular local or domain user but can't be used to manage groups. It is usually less expensive and easier to configure. A firewall inspects each individual "packet" of data passing through either side of the firewall, incoming or outgoing from your computer and determines whether it should be allowed to pass through or should be blocked.

A firewall security can stop hackers from accessing computer remotely, protects personal information to be compromised, blocks malicious "pop up", ads and certain cookies which increases the chances of getting infected. Firewall security cannot be used to prevent e-mail viruses. Only an antivirus product with updated definitions can prevent e-mail viruses. The firewall will require periodic updates to the rule sets and the software itself for complete PC security.

If we don't initialize an action and the firewall picks up something automatically, we should most likely deny it and investigate it. If something stopped which was working prior to the installation, there is a good chance it might be because of the firewall. One of the primary functions of a firewall is to provide a buffer between trusted and untrusted networks. The most common place for this is between the corporate network and the Internet, protecting a group of R&D computers from the rest of the network, separating sensitive servers like finance from the corporate network. It can be used as a security gateway between two networks like between trusted and untrusted networks.


Source: http://EzineArticles.com/5283079

Thursday, September 29, 2011

How to Disable the Windows Firewall in SBS 2003



If you are working with a computer that is using the Windows Small Business Server (SBS) 2003, then you may need to turn off the firewall to help resolve connectivity problems and other issues for multiple users. To disable the Windows firewall, you must have administrator privileges to access and make changes to the Computer Management options. Also, when you are stopping the firewall, it's important to make sure the service isn't turned off for too long or that you immediately enable another firewall service.


Instructions

1. Click on the "Start" button on the desktop and then click on the "All Programs" option. Click on the "Administrative Tools" option.

2. Click on the "Computer Management" option and then the Computer Management dialog box will appear on your screen.

3. Right-click on the "Computer Management (Local)" option from the left navigation menu and then click on the "Connect to another computer" option.

4. Enter the computer name into the text box and then click on the "OK" button. Click on the "Services and Applications" option and then click on the "Services" option.

5. Right-click on the "Windows Firewall/Internet Connection Sharing (ICS)" option and then click on the "Stop" option. Close out of the dialog box and the firewall will be fully disabled.

Tuesday, September 27, 2011

Predicts 2012's SME security threats


Companies across the UK, irrespective of their industry sector or size, are increasingly targeted by cyber attacks from criminals and even their own employees.

The number of attacks is now so large and their sophistication so great, that many organisations are having trouble determining which new threats and vulnerabilities pose the greatest risk. Furthermore, planning how resources should be allocated, to ensure that the most probable and damaging attacks are dealt with appropriately, is a complex process.

For this reason, IT support provider Barton Technology has compiled these predictions for 2012.

1. Physical security: The least obvious threat comes from the physical location of an organisation's server. Although not often considered as part of an IT security policy, the server should always be located in a place with controlled access and egress. Making sure the server containing vital information is not easy to reach should be amongst the top priorities for any SME IT manager.

2. Viruses: The most common security threat comes from viruses and malware. Often these are delivered via spam e-mails containing pictures, videos and executable files but they can also be delivered via web sites, USB sticks, mobile phones and other portable memory devices. Just one click can be enough to infect an entire department or company. However, they are relatively easy to protect against, by ensuring that the company firewall and antivirus software is up to date.

3. Phishing attacks: The complexity and increase in frequency of PHISHING attacks, means that businesses, as well as individuals, are now at risk. There is no such thing as anti-phishing software, so the only way for SMEs to reduce the risk is to train their staff in how to deal with these e-mails. For instance, users can be taught to be more vigilant and aware of the warning signs associated with this kind of message. Banning porn, gambling and illegal downloads can also help reduce the risks associated with PHISHING. Unfortunately, this threat has an older and more mischievous brother; spearPHISHING, which is highly targeted and uses information, gathered from publically available Web and social media profiles to personalise the attack. SME staff have even been known to hand out the company's out bank account details as the result of particularly focussed PHISHING attacks. Again, training is the only solution.

4. Lost or stolen portable devices: Recent news stories about Government officials losing memory sticks and laptops holding the personal details of members of the public have provoked substantial criticism. For an SME, a lost or stolen external hard disk, containing sensitive company information can easily cost five or six figure sums. The best way to ensure data security on external memory devices is encryption and password protection.

5. Spyware: Spyware does not spread directly in the way that a computer virus or worm does; an infected system will not attempt to transmit the infection to other computers. Its objective is normally to obtain micro-information, such as surfing habits or Web history, but other functions such as changing the PC's homepage are not uncommon. Antispyware software includes programs designed to remove or block the unwelcome software but the best cure is preventative; not downloading unauthorized software and avoiding disreputable Web sites.

6. Internal hacking: Although external hackers consistently grab the headlines, surveys show that the biggest threat to a company's data security is its own employees. While there may be workers with a clear malicious intent, there are also cases in which employees unknowingly contribute to security lapses. In this situation, the best way to alleviate the risk of company computers being hacked is proper training. Furthermore, to minimise internal malicious hacking, companies can reduce the attractiveness of the information and data stored on their servers. For example, making CRM, financial and marketing databases secure is a good step towards reducing internal hacking.

7. Lack of appropriate company policies: Unfortunately, many SMEs who fall victim to hacking, PHISHING and spyware have brought their problems on themselves. Failing to create IT, internet, e-mail and social media procedures and proper employee handbooks is often the deep root cause of security problems. The remedial action to counter this problem is obvious, but when writing the documents it may well be worth taking the advice of your IT consultant to ensure that the measures you suggest are appropriate.

8. Cyber crime: Recognised as one of the fastest growing IT security threats of 2011, the profile of cyber theft will only increase in 2012. Inappropriate use of company data, internal hacking, inappropriate use of social media, e-mail or Web publishing and planting illegal documents in a company's IT system all fall into this category. Although it's very tricky to deal with, cyber crime can be avoided by making sure security procedures are in place and employees follow them accordingly. Furthermore, a strong organisational culture, based on honesty and rewarding professionalism could also help.

9. Lack of deep understanding: One of the key problems in SME security is actually a lack of understanding of the minutia of the industry and technology. The root cause of this problem is often that the person responsible for IT is rarely a specialist IT professional. It's normally just someone with a high level of working knowledge; sometimes a financial director as the result of their expertise with SAGE and similar database driven software. For example, a non IT professional will often choose a software based firewall instead of a hardware based system. This means that the firewall is dependent on software updates and, if it's the integral Windows firewall, dependent on the integrity of the Windows operating system. A hardware based system is completely independent of these factors and thus more reliable. There are examples like this littered across the IT security industry and there is no reason to expect someone without a specialist background to know about them.

10. Website and networking hacks: More and more businesses are using social media in their marketing campaigns. However, this leaves them open to attacks. Hackers can take over a company's Twitter or Facebook account, and then use it to discredit the company or SPAM its followers. Similarly, websites can be hijacked, and unwanted content can be uploaded, which can seriously damage an organisation's image.

Source :industrytoday

Monday, September 26, 2011

How to Go Through a Firewall With Yahoo Messenger


Yahoo! Messenger is an instant messaging client that allows users to talk to their friends from almost anywhere in the world. However, if it is used by a computer that has a firewall installed, certain problems can arise in trying to connect to the Yahoo! instant messaging servers. This can be remedied by changing settings in the firewall to allow Yahoo! Messenger through.

Instructions

1. Open your firewall software that is installed on your computer and look for the option on the main menu that says something like "Port Forwarding," "Exceptions" or something similar. Click on this option to open the part of the firewall software where you can choose to allow software programs through the firewall.

2. Add the following ports to the firewall software (if port exceptions are options in your firewall software): 5050 (Chat and Messenger access), 5000-5010 (Voice Chat access) and 5100 (WebCam access). Save the port exception settings.

3. Add the application titled "ypager.exe" to the list of program exceptions in the firewall software. This EXE file is the program that Yahoo! Messenger runs under, so adding it as an exception will allow all communications to and from the program to occur.

Source: eHow

Thursday, September 22, 2011

Set Up ESMTP on a Cisco Firewall


Extended Simple Mail Transport Protocol (ESMTP) enhances support for the Cisco Internetwork Operating System (IOS). When businesses can use ESMTP to install mail servers behind a firewall rather than Simple Mail Transport Protocol (SMTP). Both of these protocols establish a Transport Control Protocol (TCP) channel from server to client to exchange email. The difference is that ESMTP uses the Extended Hello (EHLO) command. This provides troubleshooting support by creating a series of extensions that allow error codes to go back to the client if a message transmission failure occurs


1.Type "enable" (without quotes) on the router to enter the privilege mode on the firewall. You enter all commands in the command line editor, which automatically starts when the router is turned on. The screen will look like this:

2.Privilege mode allows you to work only using certain configuration commands; for example, you cannot enter interface commands here. There are multiple modes on the router. Think of a mode like a floor in a building. In the higher floors, you can do certain things you could not do on lower floors.

2.Type "config t" (without quotes) in order to enter the global configuration mode. Type "ip inspect name email esmtp" (without quotes), where "email" can be any name you chose. This command configures inspection on the router. The inspection command will look at different parameters before the email transmission occurs. One extension is message size, another is the delivery status notification. In all, the router inspects eight extensions.

3. Type, "interface e0" (without quotes) to assign the inspection duties to an interface. The interface is the router's physical connection to the network. Here, it supports Ethernet.

4. Type "ip inspect email in" (without quotes) in order to apply the inspection rule to the Ethernet interface. Type "end" (without quotes) and then type "copy run start" (without quotes) to save the configuration.

Source : Ehow

Wednesday, September 21, 2011

Delivering remote plant-wide visualisation


Establishing a secure and reliable communication path over the Internet requires solving a number of technical challenges such as, firewalls and public IP addresses. Rather than using complex and expensive solutions to install and manage this such as VPN, special M2M SIM cards etc. HMS’s new Netbiter Argos 3 has been developed to provide a simpler firewall friendly solution. This enables the user to focus on the plant issues without the needs for specialist IT skills, or calling on others to address the extensive Internet, firewall, GPRS/APN configurations.

Using cloud based architecture, the secure online data centre automatically gathers and stores both site and equipment data from the remote communication gateways at intervals specified by the user. Through the remote server users can access their industrial installations, machines and devices from anywhere in the world. The information the user is viewing is effectively a mirror site in real-time on the secure server.

In addition to basic reporting, the Netbiter servers provide a browser based graphical dashboard/user interface to view the plant data. This enables users to quickly and easily create a graphical layout of their remote installation. The dashboard includes functions for loading pictures into the layout, analogue and digital graphical components (such as gauges, meters, indicators, etc.), which makes it possible to detail a remote system with a visual layout that is easy to understand. Where appropriate GPS data makes it possible to view the location of each device in the field on an overview map (using Google maps) and the system also lets you build multiple installations.

Access to the server information means users can log historical data and produce graphical trends or diagnostics, manage alarms, or automatically backup or restore remote configurations. Although not originally conceived as a supervisory control and data acquisition (SCADA) package, the functionality exists to easily configure one. The data can also be accessed by the users own ERP system for further analysis and reporting.

Security of data and access

Moving data off-site raises concerns over both its security and availability. By using special firewall friendly communications between the remote communication gateways and the data centre makes it possible to keep existing broadband security infrastructure at the customer’s site. This procedure is accepted by almost all IT departments and gives confidence that the installation is secure from a security perspective.

Data storage is rigorously protected as the remote server/data centre is automatically backed up, so the risk of losing data, or downtime due to access problems with the server areminimised. Data centresrun on professional enterprise-class architecture that is designed to support both small and large-scale deployments. They provide 24/7 monitoring of the server health, redundant servers at different geographical locations, redundant storage, and protection against fire, theft and similar eventualities.

To ensure the security of wireless communications over GPRS, dedicated SIM cards can be selected. These mean that it is not possible to ping or try to access the remote site except through the data centre and also avoids unnecessary and costly GPRS traffic. If however the system does not need this added security normal data enabled SIM cards can be used.

Access to the online system is centrally controlled and requires password authentication. Multi-level password layers are used to provide permissions to access different functions, and the server authenticates users and ensures their correct access levels. Password activity is logged by the server, and all communications are secured using Secure Socket Layer (SSL) encryption. This is the same method banks use for secure online transactions.

Typical adopters have been machine monitoring and analysis, building automation and monitoring, monitoring tank farms, pump and pumping stations monitoring, and monitoring renewable energy sites. Mobile communications via GSM and GPRS mean that monitoring even the smallest sites is viable.

The costs are subscription based and reflect the functions required. One subscription is used together with each Netbiter gateway, and it is possible to host up to three remote gateways in one account with the free subscription option. Cloud based services may not be the answer to all manufacturing issues, but its secure performance and potential to reduce investment costs is likely to have a huge impact.

Most people are comfortable with online banking for checking their assets and transferring money from one place to another, so maybe remote management of our business assets is not such a big a leap into the unknown.

Source : threngineer

Monday, September 19, 2011

Firewall Support, The Best Way to Block Hackers


Do you know you can protect your computer from unauthorized access with the help of firewall? A firewall is a security tool. It may be a hardware, a software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. It protects an entire network based on the nature or level of the network. Hardware firewalls are more expensive and harder to configure but have more options to manage desirable security features over any type of network. It is also usable to signify particular or customized data transmission. Don't you know how to configure firewall? For Firewall configuration you can talk to a computer repair company.

On the other hand, Software Firewalls are basically used for limiting access of internet for a particular local or domain user but can't be used to manage groups. It is usually less expensive and easier to configure. A firewall inspects each individual "packet" of data passing through either side of the firewall, incoming or outgoing from your computer and determines whether it should be allowed to pass through or should be blocked.

If we don't initialize an action and the firewall picks up something automatically, we should most likely deny it and investigate it. If something stopped which was working prior to the installation, there is a good chance it might be because of the firewall. One of the primary functions of a firewall is to provide a buffer between trusted and untrusted networks. The most common place for this is between the corporate network and the Internet, protecting a group of R&D computers from the rest of the network, separating sensitive servers like finance from the corporate network. It can be used as a security gateway between two networks like between trusted and untrusted networks.

A firewall security can stop hackers from accessing computer remotely, protects personal information to be compromised, blocks malicious "pop up", ads and certain cookies which increases the chances of getting infected. Firewall security cannot be used to prevent e-mail viruses. Only an antivirus product with updated definitions can prevent e-mail viruses. The firewall will require periodic updates to the rule sets and the software itself for complete PC security.


Source: EzineArticles