Visit My Sponsors

BrickHouse Security

20100914

Stuxnet

Stuxnet is a new piece of malware that is spreading widely through the use of USB flash drives. It is starting to be quite a danger, especially in industrial plants, and many in the security business are getting very nervous. What follows is an FAQ about the Stuxnet malware.

How does Stuxnet spread?

Stuxnet spreads through USB devices. A recently discovered Microsoft Windows vulnerability has been found to allow a program to run just by browsing to a folder that contains a shortcut to it, or a ".lnk" file. Once the worm runs it scans to see if the computer is running software created by a company known as Siemens, which is very popular in certain industries. If this is the case, the worm is able to install itself on the victim computer. It will infect all future removable media that is connected to the computer and installs a rootkit, a very sophisticated type of software that deletes all record of the worm existing on the computer. After that the computer continues to steal as much data as possible from the computer and transmit it back to a remote location.

What does Stuxnet do?

Stuxnet is considered by many people to be the first-ever "control system" malware. What this means is that it has the capability of infecting control systems for large companies and factories that use software created by Siemens. Unfortunately, this software is very widely used, especially in large industrial manufacturing organizations, small and large utilities, and even defense systems. In one case it was found that this software could infect nuclear-powered aircraft carriers.

How widespread is Stuxnet and where is it most common?

At the moment Stuxnet is not that widespread. It is most common in India, Indonesia, Iran, Pakistan, Afghanistan, the United States, and Malaysia, in that order. However, it has the potential to spread very rapidly. It only affects computers running Siemens software, but computers without that software can still act as "carriers," infecting other removable media that is inserted into them. Other countries have seen infections, but mostly they have been localized and have not caused any damage so far.
 
How dangerous is Stuxnet?

This is always the big question with a large virus outbreak. Right now Stuxnet is not that dangerous. Unfortunately, it is targeted at "Control Systems." Siemens is most known for making software for sophisticated systems used in such areas as the military, large industrial plants, and utility plants. If any of these were to be infected the damage could be irreparable. The infection is clearly tailored to steal confidential information and possibly shut down "smart grids." Therefore, while it is not a danger to consumers, any large corporation or plant must be very careful to avoid this infection.

File Sharing Controversy

File sharing, the practice of distributing or providing access to digitally stored information, such as software, multi-media and documents. File sharing can be implemented through a variety of techniques, common methods include sharing removable media, purposely built distribution networks such as Apples 'iTunes' and the more popular method, peer-to-peer (P2P) networking. Peer-to-peer networks allow users to digitally distribute anything and everything, sounds simple, right?

Whilst in practice it is extremely straight forward and completely harmless, we can't hide from the fact that file sharing (aided by P2P networks) engineered a vast illegal network which is currently thriving. The increasing popularity of the mp3 music format in the late 1990's led to the release and growth of Napster. Napster is still highly regarded as the godfather of P2P file sharing, essentially paving the way for decentralized and semi-decentralised peer-to-peer file sharing networks such as Gnutella, Gnutella2, eDonkey2000 and the Kazaa network. Today, users are more familiar with the term "torrent downloads". Torrents are specialized files utilized in P2P network environments allowing users to download files at a faster rate. Whilst currently not considered illegal, torrents are extremely controversial largely due to the fact they are mainly used to distribute pirated data such as the latest films, music and computer games.

I can see what you're thinking, why not just close down the "networks"? To put it simply, it's impossible. To understand this claim, you have to understand how torrents actually work. Torrents use a toolkit called a "tracker", it's the trackers job to coordinate the P2P transfer of files among users, tracker applications typically run on websites. When initiating the download of a torrent, a user clicks on a link pointing to a torrent meta-data file. These meta-data files are not stored on the torrent trackers server, but are distributed among a number of torrent file servers. Each torrent file points to a tracker, which keeps a global registry of all the downloaders and seeds of the file in question. The tracker then responds to a download request with a list of peers who have (or a part of) the requested file, the user can then establish a direct connection and basically asks for chunks of the download.

To put it simply you are downloading from other users who possess the requested file, also known as peers. The "network" is essentially the entire world, how is one supposed to moderate what the planet is sharing? Putting an end to illegal file sharing and preventing piracy would take something exceptionally groundbreaking and somewhat drastic.

Todays news is littered with short films produced by the media designed to belittle illegal downloaders and "educate" joe public on the damage being caused by such actions. Bold claims are often outlined, "up to 800,000 jobs in the creative industries out of 1.8 million in total are threatened...", "billions has been lost due to piracy...", "record companies forced into liquidation...". More recently the media has been focusing on fines directed towards illegal downloaders, fines ranging anywhere from $1000 to $250,00000, all abit over the top isn't it? Well, according to the Recording Industry Association of America (RIAA) it's only the beginning.

In 2003 the RIAA began legal proceedings againts Jammie Thomas-Rasset for infringing the copyrights of two dozen major-label songs on the popular P2P network Kazaa. The punishment? A cringeworthy fine of $80,000, per song. For the lables themselves, that's roughly equivalent to selling 114,000 songs at Apple's iTunes Store. Thomas-Rasset's was the first trial in the campaign against individual file-sharers that the RIAA began in 2003 and ended late last year. As such, it was one of the few tests of the legal underpinnings of that campaign, including the argument that making tracks available to others online (by keeping them in a folder that was available for sharing) was a form of infringement. Is Jammie's excessive penalty enough to deter you from downloading pirated data?

So, legal action is been presented and taken againts illegal downloaders, but is it enough? Various procedures have been put into place to help combat piracy. Internet service providers (ISPs) for example have been forced to crack down on repeat offenders who insist on constantly downloading pirated data by implementing a "three strikes and your gone" type system. Not exactly $80,000 is it? Whilst we could spend a lifetime discussing possible solutions to preventing piracy, we can't hide from the fact that file sharing in it's most basic terms is here to stay for some time to come.

The economic turmoil throughout our world is financially damaging and hitting familys hard, the solution to this is to spend as little money as possible. Think of it this way, you have had a tough month, scrimped and scraped to pay the bills, you're working six days a week but for what? Survival? To top it off this years most anticipated game has just been released and you can't afford it, but wait, it's available for FREE online, you could be playing it within the hour! We've all been there, whether it's a game, a film, maybe some software.. it's convenient for us to sit on our backsides and wait for said download to reach 100%.

It's all very well ISPs threatening to cut their customers off from the world wide web and large record labels taking legal action, the world in it's entirety is to blame, filesharing is an extremely lucrative market and it's here to stay.

20100301

Scams, Spam and Facebook?

In this blog, I want to warn you of the dangers of spam and scams.

"Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately."

Spam fills your inbox with offers of cheap meds, cheap sex, cheap travel and all kinds of other stuff. I have to be honest. If I responded to every one of the spam emails I got, I'd be broke. I would have my identity stolen. I would probably have a stock pile of sugar pills and vacation after vacation in the ghettos of Mexico and other places.

What I really want to make you aware of is the scam aspect of spam. Emails with subject titles like "I've got a message for you" or "Is this you?" are just ways to get you to open the mail and read the ad that is inside. This is where the scam aspect of spamming comes in. They hook you with bleeding heart messages like "help Haiti" or "Help Chile." Once you have clicked on the link, your computer is infected with viruses and trojans. They use the information you use to "Donate" and keep your money. The best guideline for spam - dont open email if you don't know who it is from. The "from" part of your mailbox is like the peephole on your front door, if you don't know the person knocking...you simply do not let them in.

Here is where I get to talk a little about the new Facebook scams going on. The newest spam/scam is made to look like it comes from your friends. You get a nice little invite in your message folder from what looks like your friends. The message says "Click here to RSVP." Well, clicking this link takes you to another website that infects your computer. Again the best way to prevent this is to not click on "it." Nine times out of ten, a person will tell you about an event before it hits Facebook. If you don't know about it...don't click on it.


Below are a few guidelines to follow from http://www.usaaedfoundation.org/pdf/572.pdf



How can you have fun online while protecting yourself?

-Do not post information that will identify you, including:

● Your full name.

● Your home address or phone number.

● Your Social Security number.

● Passwords.

● Credit card or bank account numbers.

● Names of family members or friends.

● Your workplace or favorite hangout.

● Names of clubs or organizations to which you belong.

● Historical information that could identify your past residences.

● Do not use a nickname that can be used to identify you (for example, “CharlestonLawyer,” “CindyFromTulsa” or “KyWildcatMom”).

● Never share your account password.

-Protect Your Computer System

● Consider using encryption to protect your personal information.

● Shut down your computer when it is not in use — especially in public places, such as Internet cafes, coffeehouses or airports.

● Keep your antivirus and antispyware programs, other software and operating systems updated to protect against new attacks.

● Consider using a firewall on your system to protect against hackers accessing your system remotely.

● Think about how your e-mail message will be read by others. Do not say anything online that is cruel or may damage someone’s reputation. Doing so puts you at risk of being accused of slander or defamation, or may cause a dangerous escalation of hostilities.

● Do not give out personal information about someone else.

● Do not forward another individual’s e-mail without their permission.

● Never allow anyone to photograph you in an embarrassing or compromising situation.

● Never post anything that would cause you embarrassment or shame. The Internet is the most public of forums — once you have posted a comment, a photo or a video, it cannot be erased or taken back. You cannot control its duplication and it may be used against you.

● Do not send photos of yourself or family members to Internet acquaintances. Photos can be altered and sent to others, and elements in photos — a landmark or a street name, for example — can be used to identify your location.

● Remember that, once posted, the information can be seen by anyone with a computer and an Internet connection: family and friends, employers or potential employers, admissions officers at schools you might like to attend — even police and other law-enforcement authorities.



Following these guidelines and taking to heart the information I have written about are just small steps that will have a huge effect on keeping you, your computer and your family safe from Scams, Spam, and Facebook.

20100212

You Tube Download

I created a tutorial using the new windows Problem Solving Recorder. This video shows you how to use the YouTubeVideo Downloader program to download video from youtube.com to your computer. Check it out, Download the zip from here http://www.mediafire.com/?j1mtzgw2nym

20100209

Novell problems and why you should probably stick with Active Directory

Working for an institution that amazingly loves Novell, that is the old guys love Novell while us young guys would love to see it go away, I have learned a thing or two. Novell is buggy, unreliable, horrible, and hates change. Some companies should go the way of the dinosaurs and just go extinct. Novell was founded in 1979 as Novell Data Systems Inc. they started as a computer manufacturer and DOS maker. Novell has acquired many consulting firms and software firms over the years and even made a few deals with Microsoft. This is great and for a company to stick around this long is also amazing, there are only a few software companies that can maintain for so many years. Novell’s background isn’t the problem, Novell is Novell’s problem.
Let’s get a few things straight first, I in no way and a complete fan of any OS or software company, nor have I ever worked for one. My personal experiences and troubleshooting is what gives me these perspectives. I have only dealt with Novell since Windows 2k but have worked with it through XP, 2000 and now Windows 7.

Some of our main problems have stemmed from Novell authentication and hindered our use of other devices like the Fortinet. Novell Zen Works Imaging engine, worked for maybe a full 24 hours before one of the admins had to rebuild it. After rebuilding it every day for about two weeks we’ve decided to use Closezilla (http://Clonezilla.org). Novell’s authentication errors have caused many of our PCs to take close to 30 mins to log in. Our software/hardware inventory program was at its greatest time 2 weeks behind in reporting. Novell’s Windows 7 client is a joke and hardly works, if it works at all. Imaging Windows 7 computers has been fun but when I install the Novell client it becomes a headache.

I will give in and say our Novell Tree structure isn’t the greatest, but a lot of the problems with it could have been prevented if Novell wasn’t so horrible. Changing our tree or fixing the current issues are such a hassle that no one wants to take the challenge of correcting them.

Personally my feelings are that AD is a much better utility and much easier to manage. Active directory is just so much better when it comes to creating and deleting anything. Novell is all over the place when it comes to file placement. Active Directory is a little smarter more intelligent, itll put files together instead of all over the disk or shares.

I would love to see Novell go the way of the dinosaur or the way of the Ford Pinto rather.
Follow these steps to add product previews to your blog posts. (What are product previews?)