Home
Home Network Security Simplified
Contents
1. 11 Negligible Objects Ad Aware SE Personal Build 1 06r1 Windows Defender The next option to consider is called Windows Defender beta 2 formerly known as Windows AntiSpyware beta Defender is a beta version at the time of this writing of antispyware antiadware from Microsoft that integrates with Windows Beta means it is still undergoing testing but you can use it at your own risk Defender can run on Windows XP SP2 and later or Windows 2000 SP4 and later It offers both detection passive scanning and prevention active scanning Windows Defender beta is free for Windows users at the time of this writing See the following website to download and try Defender http www microsoft com athome security spyware software After you install Defender you will see a little gray castle icon running on your taskbar and a corre sponding desktop icon Defender automatically starts every time Windows starts up and stays running in the background The main Defender control window looks like Figure 5 12 A green status means no threats have been detected You can adjust some of the settings by clicking Tools gt General Settings as shown in Figure 5 13 Some of the recommended settings you want to checkmark are these m Automatically scan my computer and you specify the frequency daily or weekly are recom mended and time of day m Check for updated definitions before scanning
2. Home Computer Known Spyware and Adware are identified and deleted Anti Spyware Adware Software If a type of Spyware is not in the Anti Spyware database it can be missed Your computer is scanned for known spyware and adware programs matching them against a list of known spyware adware signatures If detected you can remove them If a piece of spyware is not yet in the signature list it will be missed again similar to antivirus Also similar to antivirus but not quite there yet in terms of technology that is it is pretty new at the time of publication is the ability to do active scanning meaning blocking the insertion of adware and spyware into your computer in the first place This is preferable rather than detecting and delet ing it after it is already on your computer and operating You have several options for antispyware antiadware programs including the following m Installing a freeware program from the Internet m Installing Windows Defender a relatively new option m Enabling the antispyware antiadware function in a security bundle you already own or plan to buy The following sections look at each option Any option will work but they do have different advan tages and disadvantages so weigh which one is right for you You might want to install all of them and then pick which one is right for you Multiple programs for scanning are okay However be care ful having multiple programs
3. Person clicks on Computer eui the pop up ad Server New Spyware created Spyware tracks internet browsing habits Spyware is downloaded to computer Online Marketing s Company Spyware reports browsing habits back to the marketing company Are Spyware and Adware Viruses Although many adware and spyware programs increasingly share some of the characteristics of virus es especially stealth and doing things without your knowledge the primary distinction is that viruses live to replicate whereas spyware and adware live to gather information that can be sent to marketing companies or to entice you to buy a specific product In general spyware and adware are a one to one relationship between you and whatever marketing organization is trying to sell you stuff They generally do not replicate themselves and send them selves to other computers Spyware and adware tend to operate more on the cow pattie model meaning they lie around on websites until you step in one and then they cling to your shoe until you can shake them loose Preventing Spyware and Adware Adware is mainly an annoyance but can slow down the performance of you computer Spyware is a larger threat because it can be an invasion of your privacy You can take four steps to remedy the threat m Exercise common sense m Block popups m Install an antispyware antiadware program Implement a personal software firewall
4. effective passwords creating 157 161 elements of 159 email phishing scams 146 avoiding 149 152 pump and dump scams 182 183 worms 56 57 enabling antispyware antiadware in security bundles 112 antivirus software with ISP 62 63 automatic operating system updates 80 81 built in firewalls 8 9 encryption 28 WEP 29 33 36 40 42 WPA 29 44 45 personal software firewalls 10 Windows XP firewall 11 12 ZoneAlarm 13 popup blocker on IE 100 encryption troubleshooting 48 WEP 29 33 enabling on wireless NIC 35 enabling on wireless router 33 enabling with Linksys WLAN Monitor 36 40 enabling with Windows XP 40 42 WPA enabling 29 44 45 encryption keys generating 30 31 encryption enabling 28 enforcing parental controls 127 137 establishing Internet usage policy 121 122 external hard drives storing file backups 168 eyeballs 97 F files backing up 163 165 destination selecting 166 175 176 frequency of determining 166 using DVD CD storage 173 using external hard drives 168 using Flash drives 167 using network storage drives 169 using online storage 170 173 using Windows XP Backup 176 firewalls 1 access control issues troubleshooting 22 dedicated 9 deploying in home network 8 personal software 6 ZoneAlarm 12 15 enabling 10 McAfee Internet Security Suite 18 selecting 10 16 18 Symantec Norton Internet Security 200x 17 Windows XP firewall 10 12 security scans performing
5. Our illustrator Nathan Clement at Stickman Studios www stickman studio com who makes all this stuff come to life with great illustrations Our technical reviewers Bradley Mitchell and Doug Foster who both make sure we do our home work and who keep us from making fools of ourselves by catching our mistakes before you ever see them And last but not least the following people who helped us with technical questions along the way Stuart Hamilton Steve Ochmanski Brian Cox Lou Ronnau Max Ardica and Jason Frazier viii Home Network Security Simplified Contents at a Glance Introduction xiv Chapter 1 Tip 1 Chapter 2 Tip 2 Chapter 3 Tip 3 Chapter 4 Tip 4 Chapter 5 Tip 5 Chapter 6 Tip 6 Chapter 7 Tip 7 Chapter 8 Tip 8 Chapter9 Tip 9 Use Firewalls 1 Secure Your Wireless Network 23 Use Antivirus Protection 53 Keep Your Software Updated 77 Lock Out Spyware and Adware 95 Keep an Eye on Your Kids 117 Recognize and Avoid Phishing Scams 143 Create Strong Passwords 155 Back Up Your Files 163 Chapter 10 Tip 10 Use Common Sense 179 Chapter 11 They Couldn t Hit an Elephant at This Distance 187 Glossary 191 Index 201 Contents Chapter 1 Chapter 2 Introduction xiv Tip 1 Use Firewalls 1 Why Do I Need Firewalls 3 How Firewalls Work 5 Stateful Packet Inspection Firewalls 5 Personal Software Firewalls 6 Putting Firewalls to Work 7 Putting a Firewall Between You and the
6. 206 wireless network security passwords changing 27 routers changing default password 31 SSID changing 28 32 33 unintentional roaming preventing 50 work from home schemes 183 worms 56 57 WPA Wi Fi Protected Access 29 enabling 33 44 45 X Y Z ZoneAlarm 12 access settings enabling 14 15 enabling 13 logging facility viewing 16
7. Initialization Status X Ad Watch status Not available Click Here To Upgrade Definitions file SE1R94 28 02 2006 Loaded Details Usage Statistics Reset Last system scan 3 4 2006 8 50 13 PM Objects removed total 638 Total Ad Aware scans 4 Objects in ignore list 0 Open ignore list Objects quarantined 510 Open quarantine list Status ok Ad Aware SE initialized Check for updates now Ready gt Stat t Ad Aware SE Personal Build 1 06r1 Clicking Check for updates now checks for and downloads the latest signatures from the web Clicking Scan now triggers a full system scan against the known adware and spyware signatures When it completes you receive a report like that shown in Figure 5 11 To remove any detected items click Next and follow the instructions Ad Aware is another pretty good product If you try it and like it consider upgrading to the pay ver sion to get the prevention component Ad Watch 108 Home Network Security Simplified Figure 5 11 Ad Aware Scan Completed and Spyware Adware Detected Scan Complete Current Operation Finished Objects Scanned 89051 gt Scan Complete Summary 63 Running Processes 0 Processes Identified 2455 Process Modules 0 Modules Identified 0 Registry rers Identified 8 Objects Recognized 0 Registry Values Identified 0 Objects Ignored 8 Files Identified 8 New Critical Objects 9 0 Folders Identified
8. The first three are covered in the sections that follow Personal software firewalls are covered in Chapter 1 100 Home Network Security Simplified Exercising Common Sense The easiest way to avoid dealing with spyware and adware on your computer is the same as for virus es Do not get them in the first place Easier said than done but here are some tips m Avoid downloading free software programs screensavers and any program that comes with strings attached m If you are not sure whether there are strings attached do some quick Internet research on the software program m Do not click on popup ads even to win money from a monkey m Do not fall for popups on your computer saying your computer is infected with spyware E Ask yourself why something of value is being offered for free What do they have to gain from giving it to you It is almost impossible never to get adware or spyware on your computer Just like viruses we have had them and everyone we know has had them Installing a Popup Blocker The first step in avoiding adware and spyware and to save yourself a ton of annoyance is to turn on a popup blocker to stop the endless stream of windows with advertisements popping up on your com puter screen while you are on the Internet You have a couple of options Turning On the Internet Explorer Built In Popup Blocker If you are running Windows XP Service Pack 2 SP2 you have a popup blocker already All you
9. you to click it because you think it is part of the page you are browsing 98 Home Network Security Simplified m Drive by downloads Suddenly asking you to download a program that you did not ask for while browsing the Internet m Warning boxes Making a popup ad look like a typical warning box you get in Windows Our favorites are those that claim your system is infected with adware spyware and then try to sell you an antiadware program Adware selling antiadware Beautiful Most adware is obtained willingly by you agreeing to see advertisements for using a free piece of software or service on a website You probably do not even notice this in the fine print of the user agreement when you click the Accept button Adware vendors are counting on the fact that you don t Spyware There is also not one agreed upon definition of what spyware is and is not but in general it includes any program used to gather and relay information from your computer to a location collecting the information including the following m Data miners Actively collect information from you and then relay it to a remote server m Spyware As in the adware case this term is used for both the category and for a particular instance within the category In this case we are referring to a hidden program that collects information and sends it to a central server without your knowledge or consent m Trackware Generally passive method of tracking with cookie
10. 103 automated scanning 105 107 spyware 97 98 cow pattie model 99 antispyware programs free versions 103 107 installing 102 as viruses 99 avoiding 100 infection symptoms of 113 popup blockers installing 100 101 preventing 99 wireless network security 205 removal tools 113 Add Remove Programs panel 114 115 Windows Defender 70 SSIDs service set identifiers 25 changing 32 33 selecting 28 stocks pump and dump scams 182 183 storing file backups CD DVD storage 173 on external hard drives 168 on Flash memory 167 on network storage drives 169 online storage 170 173 strong passwords anatomy of 159 creating 159 160 versus weak passwords 157 159 Symantec Bloodhound feature 68 Symantec Norton Internet Security 200x 17 symptoms of spyware adware infection 113 system files 165 166 T third party popup blockers installing 100 101 threats mitigating 187 188 time zero viruses detecting 60 tips for creating strong passwords 160 161 for mitigating security threats 187 188 toolbars 98 trackware 98 Trojan horses 57 58 troubleshooting firewalls access control issues 22 wireless encryption 48 U uninstalling malicious programs 20 22 unintentional roaming preventing 50 unsecured wireless networks dangers of 25 updating antivirus software need for 79 operating system 79 automatic updates enabling 80 81 manual updates perfoming 82 83 signatu
11. 18 20 SPI 5 6 fixing corrupted operating systems 90 92 Flash drives storing file backups 167 free antispyware antiadware programs 103 107 frequency of file backups determining 166 G H generating encryption keys 30 31 greed role of in phishing scams 151 guidelines for avoiding virus infection 58 59 hard drives storing file backups 168 heuristic virus detection 59 61 Symantec Bloodhound feature 68 hijackers 98 home computers enabling parental controls 134 137 home network routers enabling controls 130 132 hot merchandise scams 184 peer to peer sharing 203 l J IE Internet Explorer enabling popup blocker 100 illegal peer to peer sharing 120 IM instant messaging versus online chat rooms 122 infected computers repairing 66 72 74 installing antispyware antiadware programs 102 antivirus software 63 65 selecting location for 61 popup blockers 100 101 Internet blog sites monitoring 125 126 online dangers awareness of instilling 122 123 gambling 119 hacking 120 illegal peer to peer sharing 120 pornography 119 predators 119 protecting children from 120 121 parental controls enforcing 127 134 137 policing 123 124 with activity loggers 138 141 usage policies establishing 121 122 website history monitoring 126 127 ISPs antivirus software enabling 62 63 built in parental controls 128 132 K L key generators 30 key stroke loggers 57 last
12. Real time protection On Signature version 1 14 1288 5 built on 3 1 2006 at 8 27 PM Clicking the warning area takes you to a page where you can manually determine what you want to do with the spyware or adware detected as shown in Figure 5 15 The Action options are Ignore Remove or Allow Unless you need it select Remove and then Apply Actions Alternatively click Remove All if you want to get rid of all of it Figure 5 16 shows a list of adware that has been removed by Defender Chapter 5 Tip 5 Lock Out Spyware and Adware 111 Figure 5 15 Windows Defender Requests What to Do with Detected Spyware 2 Scan v a History Defender Scan Results 1 items detected Select an action for each item Name Alert level g atomwire Severe Category Trojan Downloader Description This program has potentially unwanted behavior Advice Remove this software immediately Resources file C Program Files Morpheus Schemas video xml file C Program Files Morpheus Schemas rom xsd file FA Dranram Filae MarmhaneAGnhamaelram vml m Remove All j Apply Actions _ Figure 5 16 Windows Defender Removed Adware lt gt fiy Home Ss Scan v History i Tools si Defender 2 Scan Results Actions completed Select an action for each item Name Alert level Claria PrecisionTime Medium Claria DateManager Medium GD Claria GAIN Medium Category Adwa
13. m Apply actions on detected items after scanning Chapter 5 Tip 5 Lock Out Spyware and Adware 109 Figure 5 12 Windows Defender Main Status Window scan History Xf Too Windows Defender Today at 8 33 AM Full system scan Daily at 7 00 AM On 1 14 1288 5 built on 3 1 2006 at 8 27 PM M Automatically scan my computer recommended Scan frequency aily Time of day 7 00AM Type of scan F Check for updated definitions before scanning Z Apply actions on detected items after scanning Default actions Windows Defender will display the following actions by default for software with these alert levels Hoh et ton Medium alert items Signature default Low alert items Signature default Note If you enabled Windows Defender to apply actions after completing an automatic scan then items marked Remove will be removed as as part of the automatic scanning processes 110 Home Network Security Simplified With these settings enabled Defender will always automatically get the latest adware and spyware signatures over the Internet and scan your computer periodically If a problem is found you will see a red status appear as shown in Figure 5 14 Figure 5 14 Windows Defender Detects a Problem Windows Defender Detected items Remove All Severe High alert level 1 Review items detected by scanning Status Last scan Today at 8 33 AM Full system scan Scan schedule Daily at 7 00 AM
14. options configuring 67 69 activity loggers 138 141 Ad Aware 107 ad hoc networking disabling 31 48 50 Add Remove Progams panel Windows removing spyware adware 114 115 advertising eyeballs 97 adware 97 cow pattie model 99 antiadware programs free versions 103 107 installing 102 as viruses 99 avoiding 100 infection symptoms of 113 popup blocker IE enabling 100 third party installing 100 101 preventing 99 removing 113 with Add Remove Programs panel 114 115 uninstalling 20 22 Windows Defender 70 AES Advanced Encryption Standard 29 always on connections 3 annoyware 97 antispyware antiadware programs as security bundle application 112 free versions 103 107 installing 102 antivirus software 59 active scans performing 67 components of 59 enabling with service provider 62 63 installing 63 65 scan options configuring 67 69 INDEX selecting deployment locations 61 signatures updating 69 virus detection 60 virus scans performing 65 67 Windows Live OneCare 70 71 applications updating 83 84 auto update 59 automatic operating system updates enabling 80 81 automatic signature updates 69 avoiding phishing scams 149 152 spyware adware 100 virus infection 58 59 awareness of online dangers instilling 122 123 backing up files 163 165 destination selecting 166 175 176 frequency of determining 166 using DVD CD storage storage 173 using external hard driv
15. possible but no warranty or fitness is implied The information is provided on an as is basis The authors Cisco Press and Cisco Systems Inc shall have neither liability nor responsibility to any person or entity with respect to any loss or dam ages arising from the information contained in this book or from the use of the discs or programs that may accompany it The opinions expressed in this book belong to the author and are not necessarily those of Cisco Systems Inc Feedback Information At Cisco Press our goal is to create in depth technical books of the highest quality and value Each book is crafted with care and precision undergoing rigorous development that involves the unique expertise of members from the professional technical community Readers feedback is a natural continuation of this process If you have any comments regarding how we could improve the quality of this book or otherwise alter it to better suit your needs you can contact us through email at feedback ciscopress com Please make sure to include the book title and ISBN in your message We greatly appreciate your assistance Trademark Acknowledgments All terms mentioned in this book that are known to be trademarks or serv ice marks have been appropriately capitalized Cisco Press or Cisco Systems Inc cannot attest to the accuracy of this information Use of a term in this book should not be regarded as affecting the validity of any tra
16. when scans occur you can do that too Follow these steps Step 1 Click the Mode gt Advanced option on the toolbar to turn on the more advanced func tions of Spybot Search amp Destroy Step 2 Click the Settings plus sign on the left side of the control window Then click Settings below that Page down in the panel on the right of the window to a section called Automation as shown in Figure 5 8 Step 3 Under System start select the following options Automatically run program at system startup Run check on program start Fix all problems on program start Wait a few minutes until starting the check Close program if everything s O K Step 4 Under Web update select the following options Search the web for new versions at each program start Download updated include files if available online Step 5 Click File gt Exit to save the settings 106 Home Network Security Simplified Figure 5 8 Spybot Settings for Automated Scanning File Mode Language Help 12 Defauts E Wead Hep 4 Here YON can zoe Mony OPN 1o SHR PIDA STOD to yor Be ae ool ne Barou eenige are Oe ceoommenantonso K yon Wwa not intend but you don t remember which ones you have changed please use faults button ide this informal V Age of recovery 30 Automation amp Program start J Run check on program start C Fix all problems on program start C Rerun checks after fixing problems C Immunize on program
17. B The adware program will be uninstalled Often as part of the uninstall process the adware or spy ware will open the Internet browser go to their website and ask you to confirm you want to delete it They will also typically pester you a bit with questions about why you are uninstalling In general it is good practice to become familiar with the programs in the Add Remove Programs list and the Program Control list in your personal software firewall That way when a new entry unex pectedly appears you can recognize it Chapter 5 Tip 5 Lock Out Spyware and Adware 115 If you are not sure whether the program is adware spyware or a legitimate program the best thing to do is look in the directory under C Program Files and get the name of the exe or dll file Then search on the name at one of these online resources http www pcpitstop com spycheck known asp http www processlibrary com They will tell you whether the program files are spyware adware or legitimate Some adware spyware and viruses will not be detected by antispyware antiadware antivirus software and will not show up in the Add Remove Programs list or in your program files These will be more difficult to remove and the multitude of possibilities here requires detail no book has room for If you suspect you have spyware adware or a virus and the steps covered previously do not get rid of the symptoms or the problem you will have to do a b
18. Cisco Systems Home Network Security Simplified A straightforward graphic based reference for securing your home network Jim Doherty ciscopress com Neil Anderson Home Network Security Simplified Jim Doherty Cisco Press Neil Anderson 800 East 96th Street Illustrations by Nathan Clement Indianapolis IN 46240 Home Network Security Simplified Home Network Security Simplified Jim Doherty Neil Anderson Copyright 2007 Cisco Systems Inc Published by Cisco Press 800 East 96th Street Indianapolis IN 46240 USA All rights reserved No part of this book may be reproduced or transmitted in any form or by any means electronic or mechanical including photocopying recording or by any information storage and retrieval system without written permission from the publisher except for the inclusion of brief quotations in a review Printed in the United States of America 1234567890 First Printing July 2006 ISBN 1 58720 163 1 Library of Congress Cataloging in Publication Data Doherty Jim CCNA Home network security simplified Jim Doherty and Neil Anderson p cm Includes index ISBN 1 58720 163 1 pbk 1 Home computer networks Security measures I Anderson Neil 1965 II Title TK5105 75 D638 2007 005 8 dc22 2006019633 Warning and Disclaimer This book is designed to provide information about home network security Every effort has been made to make this book as complete and as accurate as
19. Internet 8 Routers with a Built In Firewall 8 Dedicated Firewall Devices 9 Enabling Personal Firewalls on Your Computers 10 Windows XP Built In Firewall 10 ZoneAlarm Personal Software Firewall 12 Personal Software Firewalls for Purchase 16 Test Driving Your New Protection 18 What to Do If You Think You ve Been Hacked 20 Sometimes Firewalls Block the Good Stuff 22 Summary 22 Where to Go for More Information 22 Tip 2 Secure Your Wireless Network 23 Why Should I Care About Wireless Network Security 25 What Do I Do About Wireless Security 26 Change Your Password 27 Do Not Advertise Your Wireless Network 28 Scramble Your Signal 28 Disable Ad Hoc Networking 31 How to Do It Securing Your Wireless Network 31 Change the Router s Default Password 31 Stop Advertising Your Wireless Network 32 Enable Wireless Encryption 33 Enabling WEP Encryption on the Wireless Router 33 Enabling WEP Encryption on the Wireless NIC 35 WPA Encryption Example 44 Disable Ad Hoc Networking 48 Prevent Unintentional Roaming 50 Wireless Security Checklist 50 Summary 51 Where to Go for More Information 52 x Home Network Security Simplified Chapter 3 Chapter 4 Chapter 5 Tip 3 Use Antivirus Protection 53 What Are Computer Viruses 55 Viruses 55 Worms 56 Trojan Horses 57 Commonsense Approach to Computer Viruses 58 How Antivirus Works 59 Virus Detection 60 Virus Prevention 60 Inoculating Yourself Against Computer Viruses 61 Turning On Antivirus a
20. Please stand by When the scan completes Spybot automatically removes any detected spyware and adware Chapter 5 Tip 5 Lock Out Spyware and Adware 107 Spybot Search amp Destroy is a pretty good antispyware antiadware program It is mainly a sweeper meaning it scans and removes spyware programs after they are already there A few prevention fea tures are starting to appear in Spybot Check out the Immunize function Finally the good folks at Safer Networking operate today based on donations So if you like Spybot Search amp Destroy consider kicking a few euros their way they are based in Ireland Ad Aware The next product to consider is called Ad Aware from Lavasoft a Swedish company apparently Europeans hate adware and spyware even more than Americans It is fairly similar to Spybot in that it is a sweeper type of program The basic personal version is free with a more enhanced version available for a small fee One of the features available in the pay version is Ad Watch which offers spyware adware prevention and blocking before it reaches your computer Both versions are available here http www lavasoft com After you have installed Ad Aware you can access the Ad Aware main control window by double clicking the desktop icon It looks like Figure 5 10 Figure 5 10 Ad Aware Main Control Window Copyright 1999 2005 Lavasoft Sweden All rights resorved Ad Aware SE Status 2
21. ans 18 20 preventing spyware adware 99 unintentional roaming 50 viruses 60 61 protecting children from online dangers 120 123 Internet usage policy establishing 121 122 pump and dump scams 182 183 purchasing personal software firewalls 16 18 Q R remote control programs 57 removing malicious programs 20 22 spyware adware 113 repairing corrupted operating systems 90 92 infected computers 66 72 74 reporting phishing scams 153 restore points 85 86 activating 88 90 creating 86 88 routers built in firewalls enabling 8 9 wireless changing default password 31 S scams protecting against 182 185 scanning engines 59 searchbars 98 security bundles 63 antispyware antiadware programs enabling 112 security scans performing 18 20 Sedgewick John 187 selecting antivirus software installation locations 61 destination for file backups 166 175 176 personal software firewalls 10 16 18 Windows XP firewall 10 12 ZoneAlarm 12 15 SSIDs 28 self replication as characteristic of worms 56 57 signatures 59 active scans performing 67 detecting 60 updating 69 virus scans performing 65 67 social engineering phishing scams 143 145 avoiding 149 152 nature of 146 reporting 153 tools used in 146 software security bundles 135 updating 83 84 Spare Backup 171 SPI stateful packet inspection firewalls 5 6 deploying in home network 8 Spybot Search amp Destroy
22. box This is great for getting your wireless networking up and running quickly but the only way to make it that easy for you is to turn off all the security features which makes is easy for everyone else in range of the router to gain access to your network too The usual result of not guarding against this threat is that you end up providing all the people around you with free Internet access This may or may not be an issue for you but you are also vulnerable to some hackers who can access your files or monitor your network traffic looking for passwords and personal information such as credit card numbers There is also the risk that someone might be looking to download illicit indecent or illegal sometime all three simultaneously material from the Internet through your network rather than their own just in case the feds or someone else come looking for them Software Based Threats This is probably the threat most people are familiar with The category includes viruses worms spam spyware adware and Trojan horses Most of the time these types of attacks are more of an inconvenience than anything else but the annoyance factor gets pretty high when you get 100 or so unsolicited e mails every day or if a virus copies your entire contacts list and starts sending copies of itself to everyone you know Some viruses though can damage your computer or files or worse deposit a Trojan horse that enables a hacker to take remote control of your co
23. d in the USA Publisher Paul Boger Cisco Representative Anthony Wolfenden Cisco Press Program Manager Jeff Brady Senior Editor Elizabeth Peterson Managing Editor Patrick Kanouse Development Editor Andrew Cupp Senior Project Editor San Dee Phillips Project Editor Betsy Harris Copy Editor Keith Cline Technical Editors Doug Foster Bradley Mitchell Editorial Assistant Vanessa Evans Cover Designer Louisa Adair Book Designer and Compositor Mark Shirar Indexer Tim Wright Proofreader Katherin Bidwell iv Home Network Security Simplified About the Authors Jim Doherty is the director of marketing and programs with Symbol Technologies industry solu tions group Prior to joining Symbol Jim worked at Cisco Systems where he led various marketing campaigns for IP telephony and routing and switching solutions Jim has 17 years of engineering and marketing experience across a broad range of networking and communications technologies Jim is the co author of the Networking Simplified series of books including Cisco Networking Simplified Home Networking Simplified and Internet Phone Services Simplified He is also the author of the Study Notes section of CCNA Flash Cards and Exam Practice Pack CCNA Self Study Exam 640 801 Second Edition Jim is a former Marine Corps sergeant he holds a bachelor of science degree in electrical engineering from North Carolina State University and an MBA from Du
24. demark or service mark Cisco SYSTEMS o Corporate Headquarters Cisco Systems Inc Cisco Systems International BV 170 West Tasman Drive Haarlerbergpark San Jose CA 95134 1706 Haarlerbergweg 13 19 San Jose CA 95134 1706 USA 1101 CH Amsterdam USA www cisco com The Netherlands www cisco com Tel 408 526 4000 www europe cisco com Tel 408 526 7660 800 553 NETS 6387 Tel 31 0 20 357 1000 Fax 408 527 0883 Fax 408 526 4100 Fax 31 0 20 357 1100 European Headquarters Americas Headquarters Cisco Systems Inc 170 West Tasman Drive Asia Pacific Headquarters Cisco Systems Inc Capital Tower 168 Robinson Road 22 01 to 29 01 Singapore 068912 www cisco com Tel 65 6317 7777 Fax 65 6317 7799 Cisco Systems has more than 200 offices in the following countries and regions Addresses phone numbers and fax numbers are listed on the Cisco com Web site at www cisco com go offices Argentina Australia Austria Belgium Brazil Bulgaria Canada Chile e China PRC Colombia Costa Rica Croatia e Czech Republic Denmark Dubai UAE Finland France e Germany Greece e Hong Kong SAR Hungary India Indonesia Ireland Israel Italy Japan Korea Luxembourg Malaysia e Mexico The Netherlands e New Zealand Norway Peru Philippines Poland Portugal Puerto Rico e Romania e Russia Saudi Arabia e Scotland Singapore Slovakia Slovenia South Africa e Spain Sweden Switzerland Taiwan Thailand T
25. e directory paths and filenames might vary Your User Manual or help files should help get you where you need to go In some places we give special instructions for other operating systems too We also had to make some decisions regarding what type of hardware or programs to install as examples These are our obvious recommendations but we also mention good alternatives regarding security equipment or programs In most cases turning on the security measures we point out with any equip ment fitting the category will be a huge step up from doing nothing at all When we do make a rec ommendation it is usually based on price and performance reasons We are not being paid by any of the vendors we refer to in the book and we do not endorse any par ticular products When we do call out and show examples with a specific product it s because we need to show a tangible example to illustrate how to protect against the security threat being dis cussed Feel free to try out the products we show or research and try others CHAPTER Tip 5 Lock Out Spyware and Adware Threat Type Software based victim enabled Examples of Threats Popping up advertisements all over your computer screen Installing programs to collect and report data on your Internet browsing habits Inserting toolbar or searchbar programs into your browser or applications such as Internet Explorer which slow down your computer s performance Collecting and reporting inf
26. ere to Go for More Information 162 Tip 9 Back Up Your Files 163 What Should I Back Up 165 Where Do I Back Up To 166 How Often Should I Back Up 166 Storage Method Overview 167 Flash Memory 167 External Hard Drives 168 Networked Storage 169 Online Storage 170 DVD or CD Storage 173 Summary of Storage Options 174 Putting It All Together 175 Using Windows XP Backup 176 Summary 177 Where to Go for More Information 177 xiii Chapter 10 Chapter 11 Glossary Index 201 Tip 10 Use Common Sense 179 Urban Legends 182 E Mail Stock Tips Pump and Dump Scams 182 Work from Home Pyramid Schemes 183 Money Exchange Schemes 183 Hot Merchandise Scam 184 What to Do to Protect Yourself 184 Summary 185 Where to Go for More Information 185 They Couldn t Hit an Elephant at This Distance 187 191 xiv Home Network Security Simplified Introduction This book provides what we hope is a simplified approach to home network security Our aim is not to make you a security expert or a network expert or an expert on any other topic We would howev er like to arm you with some amount of knowledge and know how so that you can adequately pro tect your assets monetary and computer and identity which are both at risk when you connect your computer to the Internet Some level of risk is always present while on the Internet but the danger can be mitigated Without knowing what the threats are and how to protect yourse
27. es 168 using Flash drives 167 using network storage drives 169 using online storage 170 173 using Windows XP Backup 176 banner ads 97 blog sites monitoring content of 124 126 Bloodhound feature Symantec 68 bot armies 4 browsers IE enabling popup blocker 100 brute force attacks 3 157 built in firewalls enabling 8 9 built in parental controls 128 130 on home computer 134 137 on home network routers 130 132 C CD DVD storage 173 charities and phishing scams 151 chat rooms versus IM 122 comparing signature based and heuristic virus detection 61 weak and strong passwords 157 159 complacency as security threat 187 components of antivirus software 59 computer viruses See viruses configuring antivirus software scan options 67 69 202 contests prizes phishing scam example contests prizes phishing scam example 151 cow pattie model 99 Crack 157 creating effective passwords 157 160 161 restore points 86 88 strong passwords 159 160 critical files 165 D data miners 98 DDoS distributed denial of service attacks 4 dedicated firewall devices 9 default router passwords changing 31 destination selecting for file backups 166 175 176 detecting malicious programs 20 22 viruses heuristic detection 61 time zero 60 disabling ad hoc networking 31 48 50 disk scans active scans 67 performing 65 67 drive by downloads 98 DVD storage 173 E
28. example how a virus works in a detailed way you just need to know how to recognize the threat and most important how to protect yourself against it We also provide a detailed explanation about how to use the hardware install the software what to be suspicious of and when to unplug everything and maybe just go outside and play with the kids We recommend that you follow all 10 tips because they all guard against different threats within the 4 threat categories To get you started here is an illustration that describes each threat and shows you the relevant topics After that we get right to the business of keeping you your stuff and your bank account safe from the bad guys Access Based Threats Topics Include e Wireless Security e Antivirus Wireless Router Connection Based Threats Topics Include e Firewalls e Spyware Adware Your Computer Topics Include Software Based Threats e Phishing Scams Topics Include e Common Sense e OS Upgrades e Child Protection e File Backups e Antivirus xviii Home Network Security Simplified Housekeeping Stuff This book focuses on the Windows operating systems and all screen shots were taken from computers running Windows XP Home Edition If you are not running Windows XP Home Edition you can still follow the recommendations and tips for the chapters where changes or setups are made or where directory paths are followed The general steps still hold but th
29. ily unavailable Please try the following Click the Refresh button or try again later If you have visited this page previously and you want to view what has been stored on your computer click File and then click Work Offline For information about offline browsing with Internet Explorer click the Help menu and then click Contents and Index Internet Explorer Enable or disable pop up blocker 14 After you install it a little white glove icon will appear in the lower right of your screen on the run ning tasks bar If you double click the glove you can toggle Pop Up Stopper on and off as shown in Figure 5 3 Figure 5 3 Panicware Pop Up Stopper Personal Privacy Report Check For Updates Stop Spam and Junk E Mail with SpamWasher Show your support for Pop Up Stopper Tell a Friend About Pop Up Stopper About Pop Up Stopper Online Help If the glove is white Pop Up Stopper is on If the glove is empty no color Pop Up Stopper is off 102 Home Network Security Simplified Installing an Antispyware Antiadware Program The next step in adware and spyware prevention is to install an antispyware antiadware program Figure 5 4 shows how these programs work They work similarly to antivirus programs Figure 5 4 How Antispyware Antiadware Works Some programs can Known Spyware and Adware also block known X P B X 8 Adware and Spyware V
30. is the antispyware antiadware programs discussed earlier in this chapter All the options presented scan your computer and detect known adware and spyware programs and remove them 114 Home Network Security Simplified Some adware and spyware will not be completely removable by these tools and might be more stub born to eradicate Removing Spyware and Adware Programs Using the Installed Programs List If you run across stubborn adware or spyware that cannot be completely removed by the antispyware antiadware program you are using you might have to remove the program using the Windows Add Remove Programs panel To do so click Start gt Control Panel gt Add Remove Programs As shown in Figure 5 19 click the program you want to remove and then click Change Remove Figure 5 19 Uninstalling an Unwanted Program Currently installed programs Remove j5 Credant Mobile Guardian Programs fF Cucusoft DvD to iPod iPod Video Converter Suite 2 7 3 2 GB File and Settings Transfer Tool JB FIRE GL driver for 3D Studio MAX VIZ J FireGL Control Panel sit El HighMAT Extension to Microsoft Windows XP CD Writing Wizard Set Program IBM Active Protection System 1 65MB Access and Defaults IBM DLA 270MB 5 IBM Integrated 56K Modem 0 53MB 00 1EM System Migration Assistant 4 2 1 07MB IBM ThinkPad Battery MaxiMiser and Power Management Features 24 09MB E IBM ThinkPad Configuration 24 09MB IBM ThinkPad EasyEject Utility 19 51M
31. it of research Go to a trusted security discus sion forum and post details about the symptoms or problems you are having Chances are someone out there has discovered a way to fix the same problem you are having and will share some steps to help you Remember only follow steps from a trusted site such as the support forum at your security product s website Summary Popup blockers are a good first step toward protecting against spyware adware programs finding their way onto your computer Antispyware antiadware programs offer protection against most spyware and adware threats Some programs provide passive scanning detection after infection whereas others provide both passive and active scanning detection before infection Much like antivirus technology antispyware antiadware programs rely on regular updates of signa tures to be effective Where to Go for More Information You can learn more about spyware adware from the following websites http www microsoft com athome security spy ware http www lavasoft com trackware_info http www safer networking org en tutorial This page intentionally left blank Numerics 128 bit WEP 30 64 bit WEP 30 A access control issues troubleshooting 22 access settings verifying on ZoneAlarm 14 15 account verification phishing scams example of 150 activating restore points 88 90 active scanning mode Windows Defender 112 active scans 59 performing 67 scan
32. ke University Neil Anderson is the senior manager of enterprise systems engineering with Cisco Systems Neil has more than 20 years of broad engineering experience including public telephone systems mobile phone systems Internet and home networking At Cisco Neil s focus is on large corporate customers in the areas of routing and switching wireless security and IP communications Neil is the co author of the Networking Simplified series of books including Home Networking Simplified and Internet Phone Services Simplified Neil holds a bachelor of science degree in computer science About the Illustrator Nathan Clement declared himself an illustrator a little more than three years ago Nathan holds a bachelor of fine arts degree in art and writing which launched a surprise career in publishing design and art direction His major roles have been owning a printing company designing books in house at Macmillan Computer Publishing and serving as art director for an ad agency Through these little adventures he decided to get back to his art roots and keep both feet planted in the publishing world as an illustrator He has been pleased to illustrate three previous books in the Cisco Press Networking Simplified series and has done work for Que Publishing Macromedia Press Peachpit Press Prentice Hall and ESPN The Magazine He lives with his wife Greta a nurse practitioner in Indianapolis and also pursues children s book illustration wi
33. known good Windows restore points 85 86 activating 88 90 creating 86 88 Lavasoft Ad Aware 107 link redirects phishing scams 148 149 Linksys NSLU2 170 Linksys WLAN Monitor enabling WEP 36 40 Linksys WPC54GS Wireless G PCMCIA laptop NIC enabling WPA 45 malicious programs detecting 20 22 manual operating system updates performing 82 83 McAfee Internet Security Suite 18 mitigating security threats tips for 187 188 mnemonics creating strong passwords 159 160 money exchange schemes 183 monitoring children s Internet usage 120 124 activity loggers 138 141 blog sites 125 126 parental controls 127 134 137 website history 126 127 N O NAT Network Address Translation 8 NetNanny 137 network storage drives storing file backups 169 Nigerian bank scams 184 OneCare 70 71 online activities parental controls enforcing 127 134 137 policing 123 124 with activity loggers 138 141 online chat rooms versus IM 122 online dangers awareness of instilling 122 123 gambling 119 hacking 120 illegal peer to peer sharing 120 Internet usage policy establishing 121 122 pornography 119 predators 119 protecting children from 120 122 scams protecting against 182 185 online storage 170 173 operating systems automatic updates enabling 80 81 manual updates performing 82 83 repairing 90 92 restore points 85 90 updating 79 P parental controls built in 128 130 enf
34. lf against them you put yourself in an unnecessarily risky position Most books on security try to hook you with fear fear of hackers fear of viruses fear of some digital terrorist stealing your credit card numbers and buying an island in the Caribbean Our approach is different The best tool for fighting fear is knowledge knowledge of the real threats not the hype knowledge of the types of security available and proba bly most important knowledge of what to do to keep yourself reasonably safe from threats We provide this knowledge in the form of actionable steps that you can take to protect yourself Ten things that if done correctly will keep you safe against the most common threats attacks hacks and scams Will following these 10 steps make your home network 100 percent bulletproof Not a chance The only true way to be 100 percent bulletproof is to turn off your computer and bury it in the backyard But if you do follow these 10 steps it will give you a reasonable level of security keeping you about as safe as one can be without becoming a full fledged security expert and spend ing a bunch of money Why Do I Even Need Network Security in the First Place We promised not to jump on the fear mongering bandwagon but we do need to help you 1 recog nize that threats do exist and 2 understand the nature of the threats so that you can adequately protect yourselves against them First things first the threats Unless you have bee
35. m Internet f Viruses worms trojans scanned by default gt Email m Security Risks Instant Messenger Spyware threats Programs that can compromise the privacy of your data LiveUpdate i Spyware vV Adware Other MA Smeal Categones Additional threats Programs that can be used with malicious intent Advanced M Dialers Exclusions M Joke Programs Miscellaneous M Remote Access M Hack Tools What to Do If You Think You ve Been Infected If you think your computer might already be infected with spyware or adware you are probably correct If you have never performed a spyware adware scan before chances are pretty good you have some Some symptoms of spyware adware can include the following New toolbars or searchbars appearing in your Internet browser m New programs that you do not recognize appearing in your add remove programs list m Sluggish computer performance m Popup ads that keep appearing One way to see what is happening in your computer is to check out the running tasks list In Windows XP you can press the Ctrl Alt Del keys simultaneously and then click Task Manager First check the Performance tab which shows you what percentage of your computer s processor is being used over time If it is excessively high you could have spyware adware consuming cycles If you do think you have spyware and adware on your computer you can take a number of steps to remove them Spyware Adware Removal Tools The first option
36. mary 115 Where to Go for More Information 115 Tip 6 Keep an Eye on Your Kids 117 What Are the Dangers Your Kids Might Encounter Online 119 Pornography 119 Predators 119 Gambling 119 Hacking 120 Illegal Peer to Peer Sharing 120 Maybe I Should Rethink This Internet Thing 120 Preparing Kids for Being Online 121 Establish and Communicate the Internet Usage Policy 121 Making Kids Aware of Online Dangers 122 Avoid Giving Out Personal Information Online 123 Policing Kids Online 123 Browse in Plain Sight 123 Monitor and Review Your Kids Websites and Blogs 124 Check Out Your Kids Blogs 125 Review Website History 126 Using Parental Controls 127 Parental Controls at Your ISP 128 Parental Controls at Your Home Network Router 130 Parental Controls on Your Computers 134 What to Do If You Think Your Child Is Abusing the Rules 138 Activity Loggers 138 Summary 142 Where to Go for More Information 142 xii Home Network Security Simplified Chapter 7 Chapter 8 Chapter 9 Tip 7 Recognize and Avoid Phishing Scams 143 How Phishing Scams Work 146 Tricks of the Trade 146 How to Avoid Becoming a Victim 149 What to Do If You Suspect You Are the Target of a Phishing Scam 153 Summary 154 Where to Go for More Information 154 Tip 8 Create Strong Passwords 155 Anatomy of a Lousy Password 157 Elements of a Strong Password 159 How to Create a Strong Password That You Can Remember 159 Additional Password Tips 160 Summary 161 Wh
37. mputer All should be guarded against xvi Home Network Security Simplified Victim Enabled Threats The Internet is a scam artist s paradise Along with the usual array of rip off scams the Internet allows thieves to wrap themselves in legitimate looking letters web pages and other wrappers that make it hard for the casual observer to tell the difference between legitimate and illegitimate sites and sources The good news is that it takes a victim s participation to enable these threats Unlike the other threats that require hardware or software this type of threat can usually be solved with a simple set of rules for answering account questions and some education on how to avoid biting on the bait In addition to identity theft there is also good old fashioned theft someone taking your laptop so we also pro vide you with some tips on how to keep folks from cracking your passwords Some of the threats we discuss actually fall into more than one category and we point those out to you as we go In addition we have put a little summary box at the beginning of each chapter that describes the threat what the issues are and what you can do about it What s to Come The rest of this book is set up such that each chapter provides a security tip that you should follow In each chapter we describe the category of threat protection and give an example or two of common threats Nothing too deep as you really do not need to know for
38. n living in a cave for some time and even then maybe you have surely heard about the threat of computer viruses worms hackers scams and identity thefts Internet security is big news and also big business On a corporate level companies must protect themselves against intrusion attempts aimed at gaining secret information and against attempts to shut down corporate websites that provide both the face of a company and a revenue conduit On the home network side individuals must protect their personal information protect their computers from corruption or from being taken over and protect against others accessing their networks to download illegal or illicit material or just annoying the heck out of you with endless spam If you do connect to the Internet sooner or later you will see every threat and hack attempt there is Well you ll see it if you take no precautions If you follow the steps we lay out you will either stop them in the act by recognizing the threat and acting accordingly or prevent them from happening at all and not even be bothered by it XV Threat Categories One of the things that we have noticed in most of the books and articles on home network security is a lack of any explanation of the different types of security threats This is a pretty serious issue because many nonexperts lump every type of threat into something called security which often leads people into thinking that one type of security soluti
39. nder can be improved with the latest signatures Windows Defender still in beta do not forget but could be production ready by the time you read this book seems like a pretty good addition to Windows for security Adding to that Windows Firewall and Windows Live OneCare antivirus and it would seem that Microsoft is finally on their way to incorporating much needed security into Windows Antispyware Antiadware in the Security Bundles A final option available for antispyware antiadware is that if you decided to buy or already own one of the security software bundles such as McAfee Internet Security Suite 200x Symantec Norton Internet Security 200x Trend Micro PC cillin Internet Security or ZoneAlarm Internet Security Suite all have an antispyware antiadware component See Table 1 1 Chapter 1 or Table 3 1 Chapter 3 for the location of the websites to purchase one of the security bundle products For these products consult the User Guide for how to enable the spyware adware protection Figure 5 18 shows one example for enabling antispyware antiadware in Symantec s product Chapter 5 Tip 5 Lock Out Spyware and Adware 113 Figure 5 18 Turning On Spyware Adware Blocking with Symantec Norton Internet Security 200x Norton AntiVirus Options Ea gt Auto Protect Li acanta ad tet ela a Script Blocking What threats to scan for gt Manual Scan Virus threats Programs that can compromise the security of your syste
40. need to do is turn it on If your version of XP is not SP2 you can acquire it here http www microsoft com windowsxp sp2 default mspx The popup blocker is built in to Internet Explorer To turn it on click Tools gt Pop up Blocker gt Turn On Pop up Blocker as shown in Figure 5 2 That was easy Periodically some websites might use popups you want to see not as ads but as part of the way that website functions to show you information You can just toggle the popup blocker in your browser off temporarily Just remember to turn it back on when you leave that website When you turn on the popup blocker the menu option will change to Tools gt Pop up Blocker gt Turn Off Pop up Blocker You just use the same menu option to toggle the feature on and off Installing a Third Party Popup Blocker Program If you do not have Windows XP still running Windows 98SE 2000 or ME you do not have the option to upgrade Internet Explorer to receive the built in popup blocker However several popup blockers are available for free yes we know we said not to download free stuff Pop Up Stopper from Panicware is a pretty decent one You can get it here http www panicware com product_psfree html Chapter 5 Tip 5 Lock Out Spyware and Adware 101 Figure 5 2 Enabling the Internet Explorer Popup Blocker Sun Java Console Internet Options Internet Explorer was unable to link to the Web page you requested The page might be temporar
41. oads the latest signatures over the Internet to your computer so that Spybot has the latest set of spyware adware knowledge to search with Clicking Check for problems scans your computer for known spyware and adware problems When the scan has completed you will see a display such as Figure 5 6 showing the spyware and adware programs that were detected on your computer 104 Home Network Security Simplified Figure 5 6 Spybot Scan Completed and Spyware Adware Detected File Mode Language Help ry pa Check for problems Bj Ee een amp Print Help selected problems button Hint if you haven t done so yet we recommend you read the tutorial see Help menu to learn how to deal with the scan results Cg This is the main scan page of Spybot S amp D Here you scan your system Check for problems button and fix any problems found Fix Immunize Hide this information se Problem a ica Advertising com Avenue A Inc m CoreMetrics amp 7 DoubleClick m HitBox 7 MediaPlex a p Sexist ica SexTracker WebTrends live 18 problems found 06 23 Clicking Fix selected problems removes all the spyware and adware programs that are checked VERY IMPORTANT Some adware programs are on your computer because you downloaded something such as a screensaver program that you are using for free under the agreement that the adware can live on your com
42. on say a firewall will protect them from all the bad stuff out there This is a big mistake There are several different types of security threats and one or two things that you can and should do for each type of threat To help you sort it out we have grouped threats into four basic categories connection based threats access based threats software based threats and victim enabled threats Each threat category is described here Connection Based Threats A connection based threat is an attack that is directed through your Internet connection This threat exists because high speed Internet is always on unlike dialup which you set up use and then break the connection when finished Hackers typically look for open IP addresses which represent your location on the Internet using tools that randomly look for an open connection into an unprotected home network When hackers find an open network they can do a number of bad things including but not limited to searching through and possibly deleting personal information and files or using your computer to launch attacks against other home commercial or government networks This latter form of activity is called a redirect attack a tactic hackers use to protect their own identity and location Access Based Threats An access based threat usually results from using a wireless networking device in your home Just about every wireless router on the market today is made to work right out of the
43. orcing 127 128 on home computer 134 137 on home network router 130 132 passive scanning mode Windows Defender 110 password attacks brute force 3 passwords changing 27 161 creating 157 effective creating 159 160 on wireless routers changing 31 securing 160 strong anatomy of 159 weak anatomy of 157 159 peer to peer sharing 120 204 performing performing manual operating system updates 82 83 security scans 18 20 virus scans 65 67 active scans 67 scan options configuring 67 69 personal information online security 123 personal software firewalls 5 6 access control troubleshooting 22 enabling 10 McAfee Internet Security Suite 18 security scans performing 18 20 selecting 10 16 18 Symantec Norton Internet Security 200x 17 Windows XP firewall 10 enabling 11 12 ZoneAlarm 12 access settings verifying 14 15 enabling 13 logging facility viewing 16 phishing scams 143 145 account verification e mail example of 150 avoiding 149 152 nature of 146 reporting 153 tools used in 146 types of 150 151 phreaking 145 policing children s Internet usage 123 124 blog sites monitoring 125 126 parental controls built in 128 130 enforcing 127 128 on home computers 134 137 on home network router 130 132 website history monitoring 126 127 with activity loggers 138 139 141 popup blockers installing 100 101 popups 97 port scanning utilities performing security sc
44. ormation about which websites you visit so that you can be targeted more effectively with advertisements and marketing Our Tips Install and enable a popup blocker Install and enable a spyware adware blocker Use a personal firewall program on each computer to prevent unauthorized program installations and Internet access see Chapter 1 Tip 1 Use Firewalls Avoid downloading free software programs that have strings attached Periodically use a spyware elimination program to find and delete spyware and adware Adware Click here to visit me Larry answers 3 Gez Bie on my hr Ww a enncing website 240 Ys adware Try our new 99 PopUp formula Proven to row hair D A Central Server Larry s PC oi The advertiser returns a spyware program to Larry s PC The spyware begins running in the background and returns Larry s personal information and surfing habits to the server p os Affordable i act trips pe a PJA ga ae P Hai This advertiser then sells or otherwise h Tod 09 broadcasts this information to other v advertisers who promptly inundate Larry with more popups than he s ever seen All this hidden traffic begins to clog Larry s web traffic greatly slowing his download speed RAMONES Larry gets smart and loads DONNE an antispyware antiadware program wT Races i o eaS EE Tee Now unsolicited ad
45. puter and bring you advertisements If you remove the adware with Spybot or any other tool you will likely disrupt the freebie program you are using So if you want to keep a particular piece of adware uncheck it in the list before you click Fix selected problems Spybot attempts to remove the selected adware and spyware programs and gives you a report about whether it succeeded as shown in Figure 5 7 That s it pretty easy but you do have to remember to perform a scan periodically VERY IMPORTANT Adware and spyware scans have to search a lot of files on your hard disk so depending how large your disk is how many files you have how fast your comput er is and how many adware and spyware signatures the program needs to look for it can take several minutes to complete a scan Chapter 5 Tip 5 Lock Out Spyware and Adware 105 Figure 5 7 Spybot Removes Spyware Adware B Spybot Search amp Destroy caog Immunize D Settings Tools E Info amp License sd m E 18 problems found 06 23 JO Check tor problems GE Ei selected problems Pint Hep This is the main scan page of Spybot S amp D Here you scan your system Check for problems button and fix any problems found Fix selected problems button Hint if you haven t done so yet we recommend you read the tutorial see Help menu to leam how to deal with the scan results If you would rather automate
46. re Description This program has potentially unwanted behavior Advice Review the alert details to see why the software was detected If you do not like how the software operates or if you do not recognize and trust the publisher consider blocking or removing the software Resources tegkey HKLM software gator com file C WINDOWS gatoruninstaller_cme log Remove All Apply Actions 112 Home Network Security Simplified That covers the passive scanning mode of Defender meaning detecting and removing spyware adware when it is already there Let s now look at Defender s active scanning to see how it can help prevent spyware adware from being installed in the first place Windows Defender runs in the background on your computer If you click something to install that has spyware or adware associated with it Defender pops up a warning such as the example shown in Figure 5 17 Figure 5 17 Windows Defender Adware Spyware Warning Windows Defender Warning 3 Windows Defender detected programs that may compromise your privacy or damage your computer Name Alert level C Claria GAIN Trickler Medium EE A iam You can then avoid installing the software and thereby prevent the adware from getting on your computer Another cool feature of Defender is the ability to report potential spyware threats back to Microsoft for investigation so that future versions of Defe
47. res 69 software programs 83 84 urban legends and home network security 182 US CERT United States Computer Emergency Readiness Team 79 user files 165 V verifying ZoneAlarm access settings 14 15 viewing ZoneAlarm logging facility 16 viruses 55 56 See also antivirus software heuristic detection 61 infections avoiding 58 59 repairing 72 74 preventing 60 61 scanning for 65 67 active scans 67 scan options configuring 67 69 time zero detecting 60 visited website history monitoring 126 127 W war drivers 25 warning boxes 98 weak passwords anatomy of 157 159 websites eyeballs 97 link redirects phishing scams 146 149 uploaded content monitoring 124 WEP Wired Equivalent Privacy 29 enabling 33 on wireless NIC 35 on wireless routers 33 with Linksys WLAN Monitor 36 40 with Windows XP 40 42 Windows operating system See also Windows XP adware spyware removing with Add Remove Progams panel 114 115 repairing 90 restore points 85 86 activating 88 90 creating 86 88 Windows Defender 70 108 110 active scanning mode 112 passive scanning mode 110 Windows Live OneCare 70 71 Windows XP firewall enabling 11 12 System File Check utility 92 WEP enabling 40 42 Windows XP Backup 176 wireless network security 25 ad hoc networking disabling 31 48 50 encryption enabling 28 troubleshooting 48 WEP 29 33 36 40 42 WPA 29 44 45 encryption keys 30 31 implementing 50
48. s what site or sites you have vis ited and also some amount of personal information m Hijacker These little gems like to hijack your Internet Explorer settings such as changing your home page to where they want you to go or hijacking and overlaying the search function m Searchbars and toolbars Toolbars for searching that can be added as add ons to Internet Explorer They generally cause slow performance on your computer and can be used to track what information you search for and browse Some spyware is obtained willingly by you agreeing to participate in some trial marketing for using a free piece of software or service on a website Just as often you might think you are agreeing to adware when in reality a program has been placed on your computer that can collect information and send it to a marketing company Figure 5 1 shows an example of spyware In this example the spyware program is put in a popup ad as a payload When the computer user clicks the popup ad the spyware program is deposited on the computer After the initial deposit the spyware can track whatever it was created for for example which appli cations are running on the PC or which web pages are browsed most often Periodically the spyware can call home by sending its information to the creating company over the Internet Chapter 5 Tip 5 Lock Out Spyware and Adware 99 Figure 5 1 How Spyware Works Spyware inserted into a pop up add Home
49. setup for active scanning at the same time because it could affect your computer s performance Chapter 5 Tip 5 Lock Out Spyware and Adware 103 Free Antispyware Antiadware Programs A couple of really good antispyware antiadware programs are available on the Internet for free If you have been paying attention at all you should be saying Hey you told me not to do that Well exceptions apply to every rule The basic version of these programs is free They make money by offering an upgrade to a premium version that has more features and a higher level of service We look at the basic versions here Spybot Search amp Destroy The first is a product called Spybot Search amp Destroy from Safer Networking It is available here for download http www safer networking org After installing the program you can double click the desktop icon to start it You will see a dialog like Figure 5 5 Figure 5 5 Spybot Search amp Destroy Main Control Panel _ E Use this button to start scanning your system for spyware and all other threats detected by Spybot Search amp Check N problems Destroy 4 Use this button if you notice some problems that have occurred during a recent removal of problems and you a Recovery want to undo some changes This is very important it is recommended to update the detections at least once a week W Search for Updates Clicking Search for Updates downl
50. start if program has been updated be C Don t ask for fixing confirmation 1 Wait a few minutes until starting the check C Wait until specified programs have quit O Wait a few seconds if something else than spies were found a System start aut Run program once at next system startup Z Run check on program start X Fix all problems on program start Z Wait a few minutes until starting the O Wait until specified programs have quit O Wait a few seconds if something else than spies were found E Close program if everything s 0 K Vaca Z Search the web for new versions at each program start Download updated include files if available online C Remind me to look for updates at program start C Display available beta versions Display updates for other languages C Display new and updated skins C Display PGP signature updates C Use proxy to connect to update server E Log file settings Now each time Windows is started Spybot will automatically start download the latest adware spyware signatures and start scanning The scanning looks slightly different as shown in Figure 5 9 Because many different programs compete for the CPU resources as the computer starts up it is a good idea to set the startup time to about 4 or 5 minutes after Windows boots Figure 5 9 Spybot Auto Scanning After Windows Boot CECE TT Spybot Search amp Destroy is checking your system
51. t Your ISP 62 Installing Antivirus Software on Your Computers 63 Scanning Your Computer for Viruses 65 Blocking New Virus Infections 67 Enabling Unknown Virus Detection Heuristics 67 Updating Your Virus Signatures 69 Windows Live OneCare 70 What to Do If You Think You ve Been Infected 72 Summary 74 Where to Go for More Information 75 Tip 4 Keep Your Software Updated 77 Why Software Needs to Be Updated 79 Updating Your Operating System 79 Enabling Automatic Updates 80 Manual Operating System Updates 82 Updating Your Software Programs 83 Using Windows Restore Points 85 Creating a Restore Point 86 Restoring Your Computer to a Restore Point 88 What to Do If You Think Your Operating System Has Been Compromised 90 Summary 92 Where to Go for More Information 93 Tip 5 Lock Out Spyware and Adware 95 What Is Spyware and Adware 97 Adware 97 Spyware 98 Are Spyware and Adware Viruses 99 Preventing Spyware and Adware 99 xi Chapter 6 Exercising Common Sense 100 Installing a Popup Blocker 100 Turning On the Internet Explorer Built In Popup Blocker 100 Installing a Third Party Popup Blocker Program 100 Installing an Antispyware Antiadware Program 102 Free Antispyware Antiadware Programs 103 Windows Defender 108 Antispyware Antiadware in the Security Bundles 112 What to Do If You Think You ve Been Infected 113 Spyware Adware Removal Tools 113 Removing Spyware and Adware Programs Using the Installed Programs List 114 Sum
52. th paint and brushes Contact Nathan at nathan stickman studio com About the Technical Reviewers Doug Foster works in the area of packet voice video and data convergence With 30 years of expe rience for companies such as Cisco Systems John Deere Alcatel and private business Doug has some interesting firsthand stories to tell about the evolution of the Internet He has architected and helped install international networks such as the migration of John Deere s worldwide SNA busi ness network into a multiprotocol intranet in the mid 1980s As a result of that work Doug was asked by the U S Department of Defense to speak at Interop 88 on How John Deere builds tractors using TCP IP This was nearly a decade before most businesses began to leverage the value of the Internet and eCommerce applications Most recently Doug worked for Cisco Systems as one of its first enterprise voice consultants Doug has a bachelor of science in mechanical engineering from Iowa State University and lives in Cary North Carolina with his wife Cindy When not busy with family daughters Erin and Amber son in law Jeremy and grandson Jake or business Convinsys Performance Podcasts and Idea Mechanics Doug devotes his free time to writing his first book Convince Me and to sea kayaking Bradley Mitchell works as a freelance writer on the About com wireless networking site He has produced online content at About com on home computer ne
53. tworking wireless and related topics for six years Bradley is also a senior engineer at Intel Corporation Over the past 12 years at Intel he has served in various capacities for research and development of software and network systems Bradley obtained his master s degree in computer science from the University of Illinois and his bachelor s degree from M LT vi Home Network Security Simplified Dedications I would like to dedicate this book to my parents Jim Doherty and Pierrette Phillips Dad thanks for teaching me to be a good kid Mom thanks for sticking up for me when I wasn t Jim I would like to dedicate this book to my parents I am not exactly sure how but my dad continues to live in the twenty first century without touching a computer That s one way to avoid online identity theft And to my mom who despite being the target of several computer viruses still sees the value in home and business networking Neil vii Acknowledgments Jim and Neil would like to thank the following people Our families for putting up with all the late nights and weekends rooms full of computers and cables and for changes we made to their PCs when they were asleep or at school Our publisher and the fine team at Cisco Press and Pearson Education We would especially like to thank our editor Drew Cupp who we beat like a rented mule He not only survived he also managed to make sense out of our garbled English
54. urkey Ukraine United Kingdom United States Venezuela Vietnam Zimbabwe Copyright 2003 Cisco Systems Inc All rights reserved CCIP CCSP the Cisco Arrow logo the Cisco Powered Network mark the Cisco Systems Verified logo Cisco Unity Follow Me Browsing FormShare iQ Net Readiness Scorecard Networking Academy and ScriptShare are trademarks of Cisco Systems Inc Changing the Way We Work Live Play and Learn The Fastest Way to Increase Your Internet Quotient and iQuick Study are service marks of Cisco Systems Inc and Aironet ASIST BPX Catalyst CCDA CCDP CCIE CCNA CCNP Cisco the Cisco Certified Internetwork Expert logo Cisco IOS the Cisco IOS logo Cisco Press Cisco Systems Cisco Systems Capital the Cisco Systems logo Empowering the Internet Generation Enterprise Solver EtherChannel EtherSwitch Fast Step GigaStack Internet Quotient 10S IP TV iQ Expertise the iQ logo LightStream MGX MICA the Networkers logo Network Registrar Packet PIX Post Routing Pre Routing RateMUX Registrar SlideCast SMARTnet StrataView Plus Stratm SwitchProbe TeleRouter TransPath and VCO are registered trademarks of Cisco Systems Inc and or its affiliates in the U S and certain other countries All other trademarks mentioned in this document or Web site are the property of their respective owners The use of the word partner does not imply a partnership relationship between Cisco and any other company 0303R Printe
55. ut quite a few commercials With increasingly good technology we can also screen out a lot of advertisements online too which is the focus of the rest of this chapter What Is Spyware and Adware So why spyware and adware Well quite frankly online advertisers are getting more desperate to keep the ads under your nose As a result there is an escalation of techniques occurring some getting pretty aggressive These techniques include adware and spyware Adware There is not one agreed upon definition of what adware is and is not but in general it includes any program used to facilitate getting advertising content in front of you on your computer including the following Popups Advertisements that pop up on your computer screen as new windows especially while you are browsing the Internet m Adware Although the whole category of advertisements is often referred to as adware the term also is used in reference to hidden programs inside of other programs This is usually from free software or a game you download that is permitted to shower you with ads as the price you pay for using it for free m Annoyware Term for aggressive adware practices such as asking whether you want to install a program and then only allowing you to click OK and not Cancel or popups that when you close them keep popping up more and more additional ones m Banner ads Blending an advertisement into a website in an official looking banner enticing
56. vertising tends to bounce off Larry s browser and he is notified if spyware is secretly installed on his PC Chapter 5 Tip 5 Lock Out Spyware and Adware 97 One of the engines that has driven the explosive growth of the Internet is the concept of eyeballs For a relatively low price you are provided with a high speed broadband connection that gives you access to an endless amount of mostly free information services digital media and even software programs Ever ask yourself how these companies stay in business For example how does Weather com pay their bills to be able to bring you awesome up to the minute radar images for your city s weather How can people give you software programs such as screensavers and games for free The answer is eyeballs Eyeballs refers to the number of people s eyes someone can get to view their Internet content and accompanying advertisements Yes the Internet is based on relatively the same concept as commercial television The difference is the Internet can bring highly targeted advertising like never before and sometimes nearly force you to view it Banner and popup ads were the first wave but most people are tuning them out so to speak by installing popup blockers So advertisers are relying on more sophisticated methods to get their stuff in front of your eyes An all out brawl is looming between consumers and advertisers Between cable networks DVRs and TiVo players we can screen o
Download Pdf Manuals
Related Search
Related Contents
Leica SKI-Pro User Manual Silverstone SST-ST55F-G power supply unit Bedienungsanleitung Miwell L - V-Zug Voilures principales Manuel de pliage et d`entretien Main canopies MX2/RX-series CompoNet Communications Unit User's Manual S i e m - N o v a Remington PG6060 Samsung YP-R0AP Инструкция по использованию Targus Notebook ChillHub Copyright © All rights reserved.
Failed to retrieve file