Program Evaluation Reports
Hard Drive Sanitizing
Windows Update and more
Internet Security - Home
Defending the Fortress
AtGuard Firewall Rules
Security for Home and SOHO Computers
(Also check out the FAB
page for more!)
For your browsing safety, we strongly recommend:
Don't accept Java, ActiveX controls or VBS scripts.
Check out the Parasite tests you
can do. Click the link on the left - Parasite Detector.
Links to programs mentioned below can be found on this site. Please look first at the FAB Software page.
Bear in mind these points and software are suggestions only.
You will find Security test links at the bottom of the page.
Please click the link on
the left for Internet Security - Home
also available as an RSS or XML feed
If you really believe you don't need vigilance, then check these sites:
Secunia and CERT. These are just 2 sites
of many regarding vulnerabilities.
|For the new or
||For the power user
- Install a Firewall, for instance, AntiVir
ZoneAlarm* or Tiny Personal Firewall*
- Install a Proxy server
- Install a proxy Filter - Proxomitron or here.
- Setup your browser to use the proxy.
- Setup your proxy to use the filter
- Setup your filter to use your ISP proxy.
- Install a modern Anti-Virus program
a Spyware checking program - MajorGeeks
- Don't use Spyware[Adware]-enabled software - like
download managers, even Netzip from Real networks, Smartdownload from Netscape, Opera,
Kazaa, and many others. Other Spyware could inclide PIMs, screensavers, etc.
- Go here for a list of
- Spyware can damage or compromise your system as much as a virus.
- Go to Spyware-Guide for
There are so many ways for trojan programs to start up whenever you
start Windows. There are many programs which monitor the common startup areas, such as,
win.ini, system.ini, startup, registry run keys. However none of them can monitor ALL the
possible ways to autostart a program. For more information follow this link:
try Nohack or here or click here for the plain text version.
Found a great little program which lists most
of the Autostart entries mentioned above on your computer. It is called StartupList
and can be found here. Get it
now. Also, on the same page, is a link to Spybot Search and Destroy and HijackThis, a
browser hijacker detector and removal tool.
If you use any kind of On the Fly Encryption, you may want to check this site-from
Sara Dean. Click on the Security link.
- Install a modern Anti-Virus program -
pick one that doesn't trash your entire inbox when a virus is detected and removed from
- Install 2 Firewalls - with filtering capability
- Install a Proxy server - AnalogX or Junkbusters
- Install a Filter - Proxomitron or here. If set up right, this is the
best filter proxy bar none. Click here for the 2 Ver 4.4 compatable SSL dlls (ssleay32.dll, libeay32.dll) you need
for filtering https urls.
- Install monitor programs
- Install HTAstop - from Privacy Software
Corporation. It stops hta scripts from running when you visit a rogue web site.
- Encrypt your email
- Install Spyware checking programs - AdAware and
companion AdWatch, a task tray monitor.
- Setup your browser to use the proxy.
- Setup your proxy to use the filter
- Setup your filter to use your ISP proxy, or anonymous proxy.
- Go to Privacy.net - If you see your IP
address at the end of X-Forwarded-For:, you may want to consider using an
anonymous proxy service like Freedom.net, or use a program like MultiProxy.
Or use a fee-based anonymous proxy service like the one at LDProxy.
- Go to Privacy Software Corporation and
get control over your internet surfing (NS or IE Clean), and trojan protection
(BOClean - one purpose - one job - does it exceptionall well).
- Go to corporate windows update
for Win98, here
for Win2000 (huge number of security issues), or windows update for a
- Go to Microsoft
TechNet Security - Security Bulletin Search
- Clean out the GUID from your MS Word 97
documents, and stop Word from adding GUIDs to new ones.
- Put your own entries in your Win Hosts file to
block pop-up ads and double-click type profiling. Go
here for more info.
|Go to Microsoft TechNet Security -
Security Bulletin Search or try here (big page-wait
to load), or their frames
page with menus pointing to many areas of concern, specially with Win2000.
For those who actually like IE, etc., and care about security. There are quite a number of
patches to fix security holes.
If you don't care about security, after reading the MS patch page, you should!
Well, we have seen a huge number of infected computers
this spring, due mostly to the Netsky and Sasser worms. Microsoft vulnerabilities never
seem to end for their "secure" operating systems. But I suppose we must thank
Microsoft for all the overtime needed to fix the problems.
A very indepth and thorough page regarding "Securing your PC"
written by Paul Szabo of The University of Sidney can be found here. It is kept up to
date. It lists and links a huge number of vulnerabilities. It has solutions. Try it, I
think you'll be there for quite a while, because there is so much to read and heed.
Is Microsoft issuing patches for all discovered vulnerabilities?
Don't think so. Sign up for this mailing list and Go here to find out!
Then go to Windows Update and get
any updates for your verson.
For you Win2000 users, go to the NSA site to download a large
number of pdf documents related to securing Win2000, which has a few holes.
For those now using Windows XP - there is a very serious vulnerability which leaves the
computer wide open to attack, especially if you are using a high speed connection to the
Internet, because Universal PnP is turned ON by default. Go to Steve Gibson's site for more information
and a small program to allow you to simply turn it off.
Double clicking on innocent looking files may be dangerous - go to
the Georgi Guninski security advisory
to learn more.
Also see the link at the bottom of the page to GFI's page for an email security test.
For the extreme power user
E3 - The Evidence Eliminator Eliminator
E3 is in all ways a superior application. Among other things, please note that the
entire run usually takes less than one second, and while the download, install damage and
EXE size of EE are devastating, E3 has a footprint of only 17.5KB, a lightning fast
download, and no install damage at all.
|For the Registry -
Back it up FIRST!
- EasyCleaner - A small program which
searches Windows' registry for entries that are pointing nowhere.
- OleClean - The purpose of this program
is to remove the Ole garbage left in the registry after installing and deinstalling
several Ole (Com) dlls.
- Registry Pruner - Clean up your
Registry's SharedDLLs key. Orphaned entries can cause install and uninstall programs to
misbehave. And can even trigger bogus Registry Corrupted error messages.
The program can also remove "ghosts", entries in the Control Panel's Add/Remove
Programs list that remain even after a program has been uninstalled.
- Notify - Alerts the user when it detects
any kind of change in a directory it has been told to monitor.
- ScanSys - This is like the Win98 System
File Checker. Excellent for Win95, runs on Win98 as well. Keep tabs on system file changes
brought on by software installations.
who are using:
Internet Explorer / Outlook Express / Outlook
- SetBrowser - Lets you set the default
web browser in Windows.
- HTAstop - from Privacy Software
- Script Defender - from AnalogX -
associate it with certain scripting file extensions.
- ScripTrap - ScripTrap traps scripts when
they attempt to run on your computer and provides the option of blocking them or letting
them continue to run.
- WatchDog - On its first run, WatchDog
will prompt you to associate it with certain scripting file extensions. Once associated,
WatchDog becomes the default program for Visual Basic Script (VBS) and other scripting
files. When one of these files is launched, WatchDog will look it over and warn you of any
possible security risks. You can then determine whether the file is supposed to be taking
these actions and how to proceed.
- CookieWall - from AnalogX!
- IEClean - from Privacy Software
Corporation. Keep control of Internet Explorer!
- CacheSentry - This is a program that
fixes serious bugs in the Internet Explorer cache manager (versions 3.0 on up through and
including IE4 SP1, Internet Explorer for Windows 98, and IE5.5).
- CacheMonitor - New version of
CacheMonitor II used for tracking Internet cache changes.
- Watch Your Back - In a nutshell, WYB!
will safely remove a read receipt without the sender knowing that you removed it. When a
read receipt is detected, you can be alerted to its presence, remove the read receipt, or
read the message without the sender knowing that your message has been read. Although
this is Shareware ($12.00) I thought it was important enough to include in this category.
No more "I spy" using read receipts!
- Microgarden Outlook Tools - If you're
tired of people using read-receipts as ammunition or as a tool to see when you're at your
desk (so that you can be attacked by a phone call), our read-receipt blocker disables any
receipts as soon as they arrive.
The BCC notification mechanism is for those clumsy people who sometimes forget they have
been BCCed and blow their cover by replying to the message. This tool reminds you that you
have been BCCed to prevent accidental replies.
|* Zonealarm will start from scratch. You
authorize as each internet application is used for the first time. It will detect servers
before they actually answer a request - nice feature. Excellent firewall for a novice or
intermediate user. The only drawback for an advanced user is that you can't get at the
common rules, like DNS. It also sometimes stops other programs from working.
past the intro page. So the link above is more direct. Their support system leaves much to
be desired as well. Perhaps it's time for a new vendor.
* Tiny Personal Firewall is very good. It comes with
a few rules already to go, including DNS. All rules are easily edited, however. Good for
novice to advanced. Very nice log files and stats file.
Both are free for personal use. Other free firewalls are not mentioned because, as of this
writing, they don't MD5 checksum the internet applications after the access rules are
created. (Many of the not-free ones do not check either.)
Remember: only authorize trusted applications! If you are not sure of the program
name, research it first. If you authorize a trojan or spyware as a trusted application
then the firewall isn't going to help - YOU let it happen!
|Ok, Ok - so you think you're secure behind
your corporate or government routers and firewalls and gateways. You leave your browser
Email Security Test. Try this gem of a
page from GFI which will send you, with your active permission, a set of VBS / ActiveX
exploits to check if you are vulnerable.
Now, are you really
Go here to find out: Security Testing Center
|First try this one to test your proxy. Do
you see your IP address anywhere? Netspy -
Proxy Test - or try this page All Nettools - Test.
Sygate has a good scan
site too. PC Flank has some interesting tests as
well. A suite of tests found here! Pay particular
attention to the web forms test.
Secunia has a browser-checking site as well, using https - very
interesting! For the ultimate in browser testing, try BrowserSpy!
To test your firewall against outbound attacks, go to these sites
and try their test software. Firehole and Tooleaky
Note: More programs can be found on the FAB software page. 45086
If you wish to help by a donation, please click the