Sunday, March 28, 2010

Upgrading Memory & Not Sure? Try this...

You've got a PC, Notebook, Netbook or a Mac and you'd like to get it to work faster by adding more RAM and you're not sure whether its possible. Try this scanner from crucial.com which is awesome and will give you advice on the amount of memory slots you have in your system, how many are free and how much it would cost in US$.
Simply click on the Crucial System Scanner Tool and follow the prompts to get free advice and outsmart your nerd!

Saturday, March 27, 2010

Secure your Wireless Network... just like you secure your homes!


Most people have enjoyed the benefits of wireless technology at one time or another.
Cordless phones, mobile phones, and wireless-enabled laptops all operate on the principle that the fewer cords, the better. As convenient as wireless networks are to use, they can also be easy to hack if you don't have the proper security.
Sadly, most wireless hookups are vulnerable straight out of the box, and still may not be safe even when you activate the default security features. However, with some insight into wireless technology and a few useful tips, you can block out most malicious network piggybackers.
Step 1: Know your network
Let's take a quick look at how wireless networks work. In "wired" technology, data is transmitted from your computer to the Web via cables that connect to a physical port. "Wireless" technology, on the other hand, uses radio waves to transfer data. The signals carrying your data are beamed over a wide range. Without security measures in place, anyone with the right tools can reach out and pluck them.
Step 2: Change your SSID and password
The first trick to slamming the door on hackers is to get personal. Every wireless network, from large corporate systems to simple home setups, contains a service set identification number (SSID) that is your network's digital name. To fence off your signal, you'll need to do two things. First, change your SSID number and password from the default setting into something private and strong. A default SSID is cake for hackers familiar with each company's settings and passwords. To change the SSID and your network password, launch the software for your wireless hardware. You should be able to change your SSID within the program's preferences.
Overwriting the default SSID won't do you much good if your network name is announced to anyone within range. To keep your information as private as possible, it's also important to disable the SSID broadcast. It's usually as simple as a mouse click in your program preferences.
Step 3: Set up MAC filtering
Changing your SSID settings without adding MAC filtering is like changing the locks to your house but leaving the key in the door. The MAC, or Media Access Control, filter is what gives you control over who may access your network and who may not. It takes a small time investment to set up MAC filtering, but without it, hackers can waltz in and use your network as they see fit.
To give specific computers permission to use your network, you'll need to add their MAC addresses -- the 12-digit address attached to every physical network device (PC, laptop, router). Enabling MAC filtering is a different process with each hardware manufacturer, but in most cases, opening up your wireless software and locating the security settings should put you in the right place. Finding the MAC address for each device might also be a challenge if you don't know where to look. 
Step 4: Encrypt, encrypt, encrypt
Encryption is key, pun intended. There are two types of encryption protocols, WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). Both block intruders' entry by scrambling your data, though WPA is generally regarded as more secure due to its dynamic, ever-changing key. Unfortunately, the encryption key you end up with is also device-specific and WPA isn't yet as prevalent as WEP. Even if you don't have access to WPA encryption, the combination of WEP and MAC filtering is usually enough to deter the casual hacker. A word to the wise -- WPA is built in to most new routers along with WEP; however, unless your network components support WPA, WEP will remain the default encryption.
Step 5: Fill the gaps with software
Even with all these security settings, highly determined hackers can machete their way in; all it takes is plenty of patience and the proper tools. This is where software can help. Programs such as Trend Micro PC-cillin, ZoneAlarm Internet Security Suite, and McAfee Wireless Home Network Security all actively monitor your wireless network and notify you when attempted intrusions occur, among other encryption and security measures. Also, a new product from AOL called Active Security Monitor diagnoses your wireless-security protections and makes recommendations for improvements.

The future of Digital Photography- Snapfish

Snapfish is the home of online digital photo printing, photo sharing, and over 100 personalized photo gifts that you can make from your photos. Create a free account today to start uploading and sharing your photos. Get high-quality digital photo prints at low prices and unlimited, free photo sharing. You can even use your digital photos to create custom photo books and gifts.
Click below to check it out

Is your PC sluggish & slow and takes a while to start up?

Obviously it could be a hardware or software related issue or a combination of both. Most software and startup related issues can be fixed by this wonderful freeware called CCleaner.


CCleaner is a freeware system optimization, privacy and cleaning tool. It removes unused files from your system - allowing Windows to run faster and freeing up valuable hard disk space. It also cleans traces of your online activities such as your Internet history. Additionally it contains a fully featured registry cleaner. But the best part is that it's fast (normally taking less than a second to run) and contains NO Spyware or Adware! :)
Cleans the following:
  • Internet Explorer
  • Firefox
  • Google Chrome
  • Opera
  • Safari
  • Windows - Recycle Bin, Recent Documents, Temporary files and Log files.
  • Registry cleaner
  • Third-party applications
  • 100% Spyware FREE

Download this from the link below and run the cleaner and fix all issues with the PC and registry at the flick of a button...
CCleaner

The Best Security Combination for the Small Office Home Office

Based on my two decades of IT experience across England, India & Australia, I would strongly recommend the use of the following freeware to keep your home computers secure:
AVG Free Antivirus - This product essentially takes care of viruses & trojans
Spybot -Search & Destroy - This product essentially takes care of of spyware, hijackers & trojans
Please click on the links above to download them as they are both free products which are tried & tested and deployed by us on a regular basis. Both products come with free updates and while AVG does a regular update and check, Spybot needs to be manually updated by selecting the option when you open the program and you need to manually perform a search and destroy check preferably every week. Both products need to be installed simultaneously and work in tandem very well.
Please ensure you remove any other antivirus(ie. Norton, Mcafee, Trend Pccillin) or anti spyware program prior to installing them as they may interfere and conflict causing the PC to hang.

Remote IT Solutions is the future..

With travel costs on the rise and the need for prompt solutions remote computer solutions are on the rise. A lot of companies are hiring consultants on a Virtual Retainership basis means they dont have a full time consultant but hire one on demand. Please follow the link to see one such example:
Remote Support Solutions from Hitek Australia

Computer Security Audit Checklist


This document discusses methods for performing a thorough and effective security audit on a computer system or network. It will not specifically discuss the technical details of prevention on specific computer systems, but will rather provide a general checklist for examining the security on a computer system. (This document has aged somewhat, but the checklist items are still quite applicable. It's too bad that computer security isn't an area seeing more improvement.)
If you're interested in having me speak to your organization about computer security, please see my page on IT Audits. My company, Hitek Australia, is available for certain kinds of security consulting services.
This document is not an authoritative or comprehensive one; you should check with the information management policy of your particular institution for steps to follow to secure your system. The author of this document shall not be liable for any damage, direct or indirect, incurred in the following of this advice. If you have experienced a security breach, you should contact an experienced security professional to evaluate recovery options.

Contents

  1. Physical Security
  2. Network Security
  3. Protocols / Services
  4. User Security
  5. Data Storage Security
  6. Passwords
  7. System Administration

1. Physical Security

Physical security is the MOST important part of maintaining the security of a computer system, and is often overlooked by careless system administrators who assume their occasional proximity to a system is enough protection. This may be sufficient for some systems, but in most cases, there are more factors to be considered before a system can be called physically safe and secure.
  • Is the system located on a sturdy, stable surface as close to the ground as possible?
  • Is the system safe from excessive sunlight, wind, dust, water, or extreme hot/cold temperatures?
  • Is this system located in a monitored, isolated area that sees little human traffic?
  • Is the room/building in which the system is located secured by lock and alarm system to which only a few trusted personnel have access? Are these locks and alarms locked and armed during off-hours?
  • Is the terminal of the system secured to prevent someone from casually walking up to the system and using it (even if just for a few seconds)? Are all users logged out from the terminal?
  • Are the power and reset switches protected or disabled?
  • Are any input devices to the system secured/turned off: are all removable disk drives locked/secured? Are the parallel/serial/infared/USB/SCSI ports secured or removed? Are any attached hard drives physically locked down to the system?

2. Network Security

Network security is the SECOND MOST important part of maintaining a system security. While good physical security can go a long way, if you operate your system in a networked/multi-user environment, the system is many times more susceptible to outside attacks than a standalone system. Network security is also harder to evaluate because it requires a thorough understanding of the various components and layers of your system and all the external services that interact with your system.
  • Physical network: is the network connection a secure "pipe" with no danger of unauthorized rewiring? Do only authorized personnel have physical access to the physical network to which the system is attached? Do you know and trust all of the various points where your physical network connection is managed/administered by another person or entity?
  • Are the other systems on the same network physically and electronically secure? If your system is reasonably secure but another system on the network is not, your system's vulnerability is increased greatly.
  • Approved Network Traffic
    • Do you know the names, functionality, vendor, and nature of the software on your system that participates in any network activity? Have you checked all the vendors for security patches, and do you regularly receive security updates about patches/vulnerabilities to the software you use in a networked environment?
    • Have you thoroughly tested any and all services that interact with the network to insure that they do not, by default, provide any unauthorized users with useful security information that could be used to attack the system?
    • Do you effectively limit your users` abilities to make sensitive information about the system available over the network?
    • Do you only allow trusted users shell/command line access to your system?
    • Are you aware of any security holes created by certain software packages interacting with each other?
    • Do you keep sufficient logs of all approved network activity?
    • Are you aware of all the software that should be interacting with the network, the port numbers they use, the size and location of their binaries, etc.?
    • Do user accounts that are accessible over the network regularly have their passwords changed?
    • Do you encrypt sensitive data that is transferred over the network?
  • Unapproved Network Traffic
    • Do you regularly check for repeated unauthorized attempts to connect to your system over a network? Do you keep sufficient logs of all network activity related to your system?
    • Do you regularly check for unauthorized programs running on your system that could potentially allow a user to connect over the network?
    • Do you monitor for excessive or unusual network activity that comes to your system?

3. Protocols / Services

Once you are past the physical and network layers of your system, the next category of evaluation is perhaps one of the largest; computers are made to compute, and depending the purpose of your system, it will be running many different kinds of software and programs at any point in time. It is likely in most cases that, because all of the software was written by different people with different understandings of security (and because there are always people who know more about security), at least one of those programs has some sort of security hole that could be exploited.
  • While it is generally safe to assume that software that comes pre-installed on a new system is reasonably secure, you should always check with software vendors for security patches, release notes, and other relevant information to your particular configuration.
  • For any software that you install onto a new system, make sure you are fully aware of the credentials of the vendor, any security patches, existing exploits, and release notes that exist. You should make it a habit to check in with vendors every month or so for new releases that may have security fixes. It's also a good idea to subscribe to mailing lists for your software, or general mailing lists, that would announce security holes early.
  • Misconfiguration is probably the most common cause of someone exploiting a security hole. Most software is written to be reasonably secure, but even the most secure software can be used for unintended purposes if it is poorly configured. Always follow the vendor's instructions for installing software, and always take notes on any problems you encounter in the configuration process. If a piece of software requires special privileges to be installed or run (e.g. running setuid on a UNIX system), make sure you understand the full implications of having it do so, and any side-effects created in the process. Test your configuration of the software thoroughly; try to break it, try to hack into it, and see if others can do the same.
  • If a program accesses sensitive data, make sure that it can only be executed by authorized users, and make sure that any logs or temporary information is stored in a safe place and promptly disposed of; people can do amazing things with the simple information found in a system log file.
  • If a piece of software runs as a daemon (i.e. it is constantly running and responds to requests from users locally or over the network), make sure it properly handles buffer overflows, denial of service attacks, and general heavy system load. It's generally a good idea to have as few services as possible running as daemons, as they allow continuous and typically unmonitored access to your system.
  • Be aware of all the services that are supposed to be running on your system, the typical amount of resources (e.g. CPU time, memory, disk space) that they take up. Check for unidentifiable daemons or software, or programs that are unusual in their resource consumption. Remember that most security breaches occur using the existing configuration of a system rather than installing a new one; unless you're careful, an intruder can manipulate the system to their liking and you won't notice anything out of the ordinary.
  • Run process accounting to keep track of typical software usage patterns of your users.

4. User security

The particulars of user security varies widely with the nature of the system you're running. In some cases, a system will be an isolated machine performing mostly server functions with very few users who actually log in to the system and use it directly, most of the users thusly being people interacting with the server functions. In other cases, a system might have hundreds of users directly accessing the system simultaneously. Obviously, the degree to which user security is a concern depends largely on the character of your users, but be aware that one user who attempts to breach security, or who has poor security practices, can affect and possibly endanger an entire system.
  • Develop a standard method for creating and maintaining user accounts. Develop clear and concise acceptable use policies, and publish them well to your users. Don't create user accounts for people or organizations whom you have not previously interacted with in some form, or who have been known to have security problems on other systems.
  • You should set limits on the amount of resources a user can consume, from number of logins to amount of disk space; make sure that the user cannot cause a security breach or take down the system out of pure stupidity (e.g. a recursive script that creates a 10 M file each time)
  • In some cases, you may want to limit the manner in which a user can connect to the system; if you're providing a terminal login, make sure the terminal itself is secure and reasonably maintained. If you provide direct access via protocols such as telnet, consider running services such as tcp_wrappers or identd that verify the user is connecting from the system they claim to be connecting from.
  • Keep accurate logs of user activity; specifically, connection time, connection duration, and the place where they logged in/connected from. In some cases you may want to log more detail with process accounting, user command history, and activity monitoring.
  • You should regularly check for irregular user activity; there are many programs available that constantly "patrol" for failed attempts on the part of users to gain administrator privileges, access files that they shouldn't, or perform other unauthorized tasks.

5. Data storage security

Data and file storage, at first, does not seem to present itself as a security risk; either people have access to files or they don't! In reality, it turns out that there are many and complicated ways to access the same data on a given system, and a good system administrator should be aware of these schemes.
  • Know the file ownership scheme that your system implements; is it group based, user based, role based, or some combination of these? Know the different levels of protection you can apply to files and directories, and be aware of who has access to make changes to these protections.
  • Know the general structure of your filesystems, how much is stored where, and who typically accesses what parts of them. Keep logs of disk activity (e.g. significant changes in disk space used) and of any disk problems.
  • Make sure that users are only able to access the parts of the system relevant to their use of it; your protection scheme should clearly and easily include a logical and conceptual separation of user and data files from system files.
  • Make sure that the file ownership schemes are consistent for various directories (i.e. that the owner of a directory owns all the files in that directory, etc.)
  • Insure that users cannot have access to more disk resources than you intend; often user disk quotes are the best solution to this.
  • If your filesystems are available via any sort of network or sharing protocol., carefully examine the security of these protocols (see the protocols/services section above). Always check your configuration of these services to make sure that only authorized users and hosts are allowed to access shared data; many configurations by default allow for unauthorized access.
  • Always maintain secure backups of a system; the most standard conventional method is to backup files to a tape disk and then to remove that tape from the site to guard against data loss from fire, flooding, etc. In the case of operating systems, it's a good idea to maintain a known good copy of your operating system's configuration on a read-only media such as a CD-ROM.
  • If you maintain any databases, make sure that the database is accessible only to authorized users, both on the client side (via a data querying tool such as SQLnet) and on the server side (i.e. the actual database files stored on the disk drive of your system). As with other services, make sure any network and sharing of databases is done securely.

6. Passwords

Passwords are the central components in most security schemes; user accounts, sensitive websites, system services are all protected by them. If you know the right passwords, you can gain administrative privileges on a system where you may not even be a user or infiltrate an environment you've never even worked with before. They are conventionally accepted as a good way to implement security because they can be incorporated easily into most operating systems and sensitive software, and yet can be made complex enough to be difficult to "crack", while still being remembered by a user. Their downfall as a security scheme are in their power; one password is all you need to have complete access to an entire system, and passwords CAN be cracked. The best you can do is try to make these two events very unlikely.
  • Require unique, complex passwords for all user accounts on your system; it's not acceptable to have "guest" accounts or other accounts that don't require any sort of authentication. If an account is not ever used for connection (i.e. that account will never be accessed), remove its ability to login altogether.
  • Passwords should contain at least 6 characters and have a combination of letters and numbers, uppercase and lowercase. Passwords should not resemble any word, name, idea, or concept that might appear in any dictionary anywhere in the world. A good example:jY2EHxqy
  • Enforce password rotation and expiration; users should never be able to keep a password for more than a few months at a time, as someone could easily (but unnoticeably) brute force hack a password over a long period of time. You should also advise users against using the same password in other places.
  • The password file or similar mechanism for storing the passwords should be encrypted, and should not be available to the average user if possible (e.g. via shadowing). If a user can obtain the password file, they can use another system to try to crack the passwords without you noticing.
  • Never write passwords down or store them in anything but human memory.
  • System passwords should be changed at least once a month, and should not be shared with more people than is necessary.

7. System Administration

Quality system administration techniques can make all the difference in security prevention. There's not a lot required for most modern systems; many do self-checks and keep the system administrator automatically informed of any suspicious changes. But there are still a few general tips to follow:
  • Regularly browse through your system, looking at the contents of system directories, logs, and other files. Note file locations, file sizes. Observe the usage patterns of your machine and your users.
  • Run cracking tools (such as "CRACK" and "Satan" in the Unix environment) regularly to check for vulnerabilities in your system configuration
  • Manually try to break into your system through different means.
  • Be aware of persons or groups who may have intentions of breaking into your system.
  • Keep your users advised of your techniques and what you expect of them to maintain security.

Broadband Speed Testing Tool

A quick way to check your bandwidth and analyse and compare broadband plans without wasting any time on the phone..
Please click on the link below:
http://www.ozspeedtest.com/

CEO of Thermopools has something to say..


Hitek Australia (see www.hitekaustralia.com.au) Testimonial from Paul Zammit from Rajiv Chaudhri on Vimeo.

See what Ken Callander has to say about us..


Hitek Australia (see www.hitekaustralia.com.au)  Testimonial from Ken Callander from Rajiv Chaudhri on Vimeo.

Technologies that will impact 2010

The Tablet: It’s the most anticipated product of the year. The mythical tablet computer (which everyone seems to be working on). There are beautiful Android tablets, concept tablets, and, of course, the one tablet which could define the category, the Apple Tablet. Or iSlate or whatever it’s called. If Steve Jobs is not working on a tablet, he’d better come up with one because anything else will be a huge disappointment.Why do we need yet another computer in between a laptop and an iPhone? We won’t really know until we have it. But the answer lies in the fact that increasingly the Web is all you need. As all of our apps and data and social lives move to the Web, the Tablet is the incarnation of the Web in device form, stripped down to its essentials. It will also be a superior e-reader for digital books, newspapers, and magazines, and a portable Web TV.

Geo: The combination of GPS chips in mobile phones, social networks, and increasingly innovative mobile apps means that geolocation is increasingly becoming a necessary feature for any killer app. I’m not just talking about social broadcasting apps like Foursquare and Gowalla. The advent of Geo APIs from Twitter , SimpleGeo, and hopefully Facebook will change the game by adding rich layers of geo-related data to all sorts of apps. Twitter just recently launched its own Geo API for Twitter apps and acquired Mixer Labs, which created the GeoAPI.

Realtime Search: After licensing realtime data streams from Twitter, Facebook, MySpace, and others, Google and Bing are quickly ramping up their realtime search. But realtime search is still treated as a silo, and is not regularly surfaced in the main search results page. In 2010, I expect that to change as the search engines learn for what types of searches it makes sense to show Tweets and other realtime updates. In the meantime, a gaggle of realtime search startups such as Collecta, OneRiot, and Topsy will continue to push the ball forward on the realtime search experience. Realtime search will also become a form of navigation, especially on Twitter and Facebook. The key will be to combine realtime search with realtime filters so that people are delivered not only the most recent information but the most relevant and authoritative as well.

Chrome OS: In November, Google gave the world a sneak peek at its Chrome operating system, which is expected to be released later this year. The Chrome OS is Google’s most direct attack on Windows with an OS built from the ground up to run Web apps fast and furious. Already a Google is rumored to be working on a Chrome Netbook which will show the world what is possible with it a “Web OS.” It sounds like it would be perfect for Tablet computers also (see above). Chrome is a risky bet for Google, but it is also potentially disruptive.

HTML5: The Web is built on HTML (Hypertext Markup Language) and the next version which has been taking form for a while is HTML5. Already browsers such as Firefox and Google’s Chrome (the browser, not the OS) are HTML5-friendly. Once HTML5 becomes more widespread across the Web, it will reduce the need for Flash or Silverlight plug-ins to view videos, animations, or other rich applications. They will all just be Web-native. HTML5 also supports offline data storage, drag-and-drop, and other features which can make Web apps act more like desktop apps. A lot of Websites will be putting HTML5 under the hood in 2010.

Mobile Video: With video cameras integrated into the latest iPhone 3GS and other Web phones, live video streaming apps are becoming more commonplace—both streaming from phones and to them. As mobile data networks beef up their 3G bandwidth and even start to tiptoe into true broadband with 4G (which Verizon is heading towards with its next-gen LTE network), mobile video usage will take off.
Augmented Reality: One of the coolest ways to use the camera lens on a mobile phone is with the increasing array of augmented reality apps. They add a layer of data to reality by placing everything from photos to Tweets to business listings directly on top of the live live image captured by the camera. Tonchidot’s Sekai Camera, Layar, GraffitiGeo and even Yelp are examples of augmented reality apps.
Mobile Transactions: As mobile phones become full-fledged computers, they can be used for mobile commerce also. One area poised to take off in 2010 are mobile payments and transactions. Twitter founder Jack Dorsey’s latest startup Square turns the iPhone into a credit card reader. Verifone has its competing product, as does Mophie. The idea is that any mobile phone can become a point of sale, and those mobile transactions can tie into back-end accounting, CRM, and other enterprise systems.

Android: Last year saw the launch of nearly two dozen Android-powered phones, including the Verizon Droid. In a few days, Google’s Nexus One will launch as the first Android phone which can be unlocked from any given carrier (it is launching with T-Mobile). Android is Google’s answer to the iPhone, and as it reaches critical mass across multiple carriers and handsets it is becoming increasingly attractive to developers. There are already more than 10,000 apps on Android, next year there will be even more. And other devices running on the mobile OS are launching as well.

Social CRM: We’ve seen the rise of Twitter and Facebook as social communication tools. This year, those modes of realtime communication will find their way deeper into the enterprise. Salesforce.com is set to launch Chatter, it’s realtime stream of enterprise data which interfaces with Twitter and Facebook and turn them into business tools. Startups like Yammer and Bantam Live are also making business more social.

Livescribe Pulse Smart Pen

A new product that can revolutionise the way you work.. Available at Office Works and Apple Mac Stores. Watch this review...

New Apple IPad

One of the exciting product launches in 2010 is the Apple Ipad.. Watch this live from no one better than their CEO Steve Jobs..