Commando 2 Our Hero continues the battle with more missions, more enemies and bigger artillery. |
Play this free game now!! |
Monday, October 27, 2008
Metal Slug Arcade?
Well, at the very least an emulator is needed in order to play games on arcade platforms. Not quite the case for this game below- 'Commando 2' is a Metal Slug look-alike, but delivers easier game play while challenging the player to think on-the-go. Basically, it's not all just about dodging the incoming projectiles. Hosted on miniclip.com, you can now shoot your way to __________!(Fiil in the blank)
Thursday, October 23, 2008
Back Online!
This post focuses on laptop tips:
It's been a long, but short holiday for me... Boredom followed after my Ferrari(laptop) hard disk 'crash'. Well seriously, this experience has taught me to exercise extreme caution when using 3rd party software, at the tragic cost of much downtime. Apart from that, I did realise a number of loopholes in my laptop routine that should be rectified.
Alright, here are my thoughts:
1.Warranty
Best Practice:
Do not hesitate to extend your laptop warranty from the usual 1 or 2, to 3 years or longer- this will prove to be a saving grace should there be any abnormality or malfunction. In fact, the insurance that you're purchasing will definitely pay off, considering how laptops usually crash after 1½ years of usage. Did you know that replacing a laptop's hard disk(the part itself + labour fee + GST) at a service centre easily soars beyond the cost of warranty extension for a year?
The Math:
Equation A: 1 X Hard Disk replacement cost > 1 Year Warranty Extension
Equation B: 1 X Hard Disk replacement cost >= 2 Year Warranty Extension
*Whereby the 'cost' includes GST, labour fee, transport(taxi, courier etc.) and the replaced hard disk- easily costing $300 to $400. Furthermore this calculation assumes your laptop crashes at such a scale only once.
2.Backing Up Files
Best Practice:
Backup important files once in every few days, or when there is a huge project progress made during the day. Backup files should not only be stored in the hard disk of your laptop, but at least on 1 other removable device(thumbdrive, portable hard disk etc.).
3.Security Software
Best Practice:
Choose reliable software that utilises and manages system resources well- resource hogging software not only contribute largely to lag, but potentially to hardware overheating(if laptop cooling methods are inefficient).
What Do I Mean?:
Basically, if one uses a great anti-virus/anti-spyware/firewall(NOT WINDOWS FIREWALL) that is able to detect and address threats at a rate of >=95%, but at the cost of severe paranoid-like system monitoring(by the firewall): the security and insurance yielded at the primary cost of likely system lags are disadvantageous.
4.Care & Maintenance
Well, it's commonly stereotyped that ladies are way better at keeping things precious, this I would agree. But in the context of computers, it's the hardware/software know-how that defines 'maintenance'. A pretty laptop chassis per se, dosen't necessary mean a 'well-maintained' laptop.
This sentence officially concludes my first post after such a long downtime from blog posting, thanks for reading! =)
It's been a long, but short holiday for me... Boredom followed after my Ferrari(laptop) hard disk 'crash'. Well seriously, this experience has taught me to exercise extreme caution when using 3rd party software, at the tragic cost of much downtime. Apart from that, I did realise a number of loopholes in my laptop routine that should be rectified.
Alright, here are my thoughts:
1.Warranty
Best Practice:
Do not hesitate to extend your laptop warranty from the usual 1 or 2, to 3 years or longer- this will prove to be a saving grace should there be any abnormality or malfunction. In fact, the insurance that you're purchasing will definitely pay off, considering how laptops usually crash after 1½ years of usage. Did you know that replacing a laptop's hard disk(the part itself + labour fee + GST) at a service centre easily soars beyond the cost of warranty extension for a year?
The Math:
Equation A: 1 X Hard Disk replacement cost > 1 Year Warranty Extension
Equation B: 1 X Hard Disk replacement cost >= 2 Year Warranty Extension
*Whereby the 'cost' includes GST, labour fee, transport(taxi, courier etc.) and the replaced hard disk- easily costing $300 to $400. Furthermore this calculation assumes your laptop crashes at such a scale only once.
2.Backing Up Files
Best Practice:
Backup important files once in every few days, or when there is a huge project progress made during the day. Backup files should not only be stored in the hard disk of your laptop, but at least on 1 other removable device(thumbdrive, portable hard disk etc.).
3.Security Software
Best Practice:
Choose reliable software that utilises and manages system resources well- resource hogging software not only contribute largely to lag, but potentially to hardware overheating(if laptop cooling methods are inefficient).
What Do I Mean?:
Basically, if one uses a great anti-virus/anti-spyware/firewall(NOT WINDOWS FIREWALL) that is able to detect and address threats at a rate of >=95%, but at the cost of severe paranoid-like system monitoring(by the firewall): the security and insurance yielded at the primary cost of likely system lags are disadvantageous.
4.Care & Maintenance
Well, it's commonly stereotyped that ladies are way better at keeping things precious, this I would agree. But in the context of computers, it's the hardware/software know-how that defines 'maintenance'. A pretty laptop chassis per se, dosen't necessary mean a 'well-maintained' laptop.
This sentence officially concludes my first post after such a long downtime from blog posting, thanks for reading! =)
Monday, August 18, 2008
Wireless Router Security
(This post is pending for completion)
Disclaimer
(COMPULSORY TO READ & UNDERSTAND)
Under the Singapore Statutes, Computer Misuse Act Chapter 50A:
*Section 6: Unauthorised use or interception of computer service-
Any person who knowingly secures access without authority to any computer for the purpose of obtaining, directly or indirectly, any computer service shall be guilty of an offence and shall be liable on conviction to a fine not exceeding $10,000 or to imprisonment for a term not exceeding 3 years or to both and, in the case of a second or subsequent conviction, to a fine not exceeding $20,000 or to imprisonment for a term not exceeding 5 years or to both.
If any damage is caused as a result of an offence under this section, a person convicted of the offence shall be liable to a fine not exceeding $50,000 or to imprisonment for a term not exceeding 7 years or to both.
*Section 7: Unauthorised obstruction of use of computer-
Any person who, knowingly and without authority or lawful excuse interferes with, or interrupts or obstructs the lawful use of, a computer; or impedes or prevents access to, or impairs the usefulness or effectiveness of, any program or data stored in a computer, shall be guilty of an offence and shall be liable on conviction to a fine not exceeding $10,000 or to imprisonment for a term not exceeding 3 years or to both and, in the case of a second or subsequent conviction, to a fine not exceeding $20,000 or to imprisonment for a term not exceeding 5 years or to both.
If any damage is caused as a result of an offence under this section, a person convicted of the offence shall be liable to a fine not exceeding $50,000 or to imprisonment for a term not exceeding 7 years or to both.
It's come to my realisation that many Wireless users severely neglect the security of their Wireless Routers, leaving boundless vulnerabilities to hacker attacks. In this post, I'll discuss the various security loopholes in default router configurations. Building upon which, I'll explain how to implement stringent router security, using all available router features.
(To Be Continued...)
Disclaimer
(COMPULSORY TO READ & UNDERSTAND)
Under the Singapore Statutes, Computer Misuse Act Chapter 50A:
*Section 6: Unauthorised use or interception of computer service-
Any person who knowingly secures access without authority to any computer for the purpose of obtaining, directly or indirectly, any computer service shall be guilty of an offence and shall be liable on conviction to a fine not exceeding $10,000 or to imprisonment for a term not exceeding 3 years or to both and, in the case of a second or subsequent conviction, to a fine not exceeding $20,000 or to imprisonment for a term not exceeding 5 years or to both.
If any damage is caused as a result of an offence under this section, a person convicted of the offence shall be liable to a fine not exceeding $50,000 or to imprisonment for a term not exceeding 7 years or to both.
*Section 7: Unauthorised obstruction of use of computer-
Any person who, knowingly and without authority or lawful excuse interferes with, or interrupts or obstructs the lawful use of, a computer; or impedes or prevents access to, or impairs the usefulness or effectiveness of, any program or data stored in a computer, shall be guilty of an offence and shall be liable on conviction to a fine not exceeding $10,000 or to imprisonment for a term not exceeding 3 years or to both and, in the case of a second or subsequent conviction, to a fine not exceeding $20,000 or to imprisonment for a term not exceeding 5 years or to both.
If any damage is caused as a result of an offence under this section, a person convicted of the offence shall be liable to a fine not exceeding $50,000 or to imprisonment for a term not exceeding 7 years or to both.
It's come to my realisation that many Wireless users severely neglect the security of their Wireless Routers, leaving boundless vulnerabilities to hacker attacks. In this post, I'll discuss the various security loopholes in default router configurations. Building upon which, I'll explain how to implement stringent router security, using all available router features.
(To Be Continued...)
Tuesday, July 8, 2008
July 8 Updates
New Updates
-Revised labels of all posts, making them more reader-friendly
-Implemented labels for a navigation-friendly experience to locate my posts
Revisions
-Revised July 5 Updates with navigational links
-Liked Computer Security 2: Deploying 3-Tier Defence Phase 5 mention of Ad-Aware, to my Ad-Aware vs Spybot S&D Post
-Revised labels of all posts, making them more reader-friendly
-Implemented labels for a navigation-friendly experience to locate my posts
Revisions
-Revised July 5 Updates with navigational links
-Liked Computer Security 2: Deploying 3-Tier Defence Phase 5 mention of Ad-Aware, to my Ad-Aware vs Spybot S&D Post
Saturday, July 5, 2008
July 5 Updates
New Updates
-Completed File Sharing Post
-Completed Routers 101 Post
Revisions
-Added links to link-up Computer Security 1&2 posts
-Completed File Sharing Post
-Completed Routers 101 Post
Revisions
-Added links to link-up Computer Security 1&2 posts
Sunday, June 22, 2008
June 22 Notice
As of tomorrow, I'll be returning to school life.. Recently I'm extremely busy dealing with all the projects at hand, I do apologize to you guys for my inability to make detailed posts the last few rounds. Please do allow me some time to iron out my schedule. Don't worry though, I do frequently add pictures, revise my posts etc. If you do notice anything that needs improvement, do post it at the comments tagbox.
Saturday, June 21, 2008
File Sharing
Alright, this post on File Sharing is as requested by 'baldbubba'. In which, I'll venture into one of the grey areas of the Internet.
About File Sharing
File sharing in Internet context is the act of 'sharing'/propagating on-demand data through any form of Internet medium(e.g. Instant Messaging).
Common File Sharing Mediums
Briefly Ranked:
1-Torrents
2-File Hosting Sites
3-Instant Messaging
4-Forums
5-Email
File Sharing Security
Basics
Use a 3-tier defence structure to help prevent any form of malicious attacks that may originate from the downloaded file. Click on the underlined links to learn more.
Protection
-Privacy
If you're concerned about your privacy- especially when torrenting, check out your software for privacy features such a uTorrent's 'Protocol Encryption' etc..
Note
Support: Additional information will be posted should I make any new discoveries
About File Sharing
File sharing in Internet context is the act of 'sharing'/propagating on-demand data through any form of Internet medium(e.g. Instant Messaging).
Common File Sharing Mediums
Briefly Ranked:
1-Torrents
2-File Hosting Sites
3-Instant Messaging
4-Forums
5-Email
File Sharing Security
Basics
Use a 3-tier defence structure to help prevent any form of malicious attacks that may originate from the downloaded file. Click on the underlined links to learn more.
Protection
-Privacy
If you're concerned about your privacy- especially when torrenting, check out your software for privacy features such a uTorrent's 'Protocol Encryption' etc..
Note
Support: Additional information will be posted should I make any new discoveries
Wednesday, June 18, 2008
Routers 101
A post dedicated to my friend TPCO Clement as he counts down 38 more days to his SG return from the Philippines OSIP.
Inspiration:
Alright, first day over there you(Clement) called me on networking problems. Yup, I was totally dumb founded at that time, as I'd usually deal with Cisco routers. But! It was a good experience for me when I managed to get around with the 'Consumer' routers.
In this post, I'll deal mostly with 'Wireless Broadband Routers'
About 'Routers'
The 'routers' we use at home are usually Broadband/Wireless Routers which very often comes with inbuilt modems. So they work rather differently from Cisco routers in terms of user interface & connecting the hardware. Routers basically spend their life on forwarding packets of information to other networks/routers, humbly working in the background.
Unpacking & Pre-Set Up
-Check all contents provided against the 'Contents List' (when you first open the box)
-Put the router aside first
-Gather these hardware: Power Plug, Lan Cable(s), Wall Phone Line Splitter(usually built with DSL filter)
-Checkpoint '2 Paths'-
From here there are usually 2 possible paths to set up your router:
1-As an access point to the Internet
Or
2-As a access point to pass packets to an existing router
1-Setting up router as an access point to the Internet
1. Look for a good location to place your router, preferably:
-Near to Phone Line Jack (Critical)
-Near to Power Socket (Critical)
-Common location, such as Main Hall (to maximize coverage)
-Open-air, or in transparent display cabinet (preferable)
2. Connect these hardware:
-Ensure that the Wall Phone Line Splitter is connected to the phone line jack, and that your line-phone is connected to the 'Phone' jack of the Splitter.
-Prepare to connect the phone-line from the router's 'Phone' jack to the Splitter's 'Modem' jack (DO NOT connect the phone line yet)
-Connect the Power Plug to the router's power jack
3. Power on your computer first, then the router. (save power! don't rush all at once and end up waiting for your computer to start up while the router uses power to do nothing)
4. Establish a Local Area Connection to configure your router
-Connect a LAN cable from your computer's/laptop's LAN jack to one of the router's LAN jacks.
-Open up your Internet Browser(Mozilla is recommended, but does not affect set up)
Yup, I know, It says 'The page cannot be displayed' or 'Address not Found' etc. No Worries.
-Checkpoint 'Router Local Configuration'-
From here, you can follow the network set-up instructions provided by the manufacturer, if the general steps below do not work due to different router factory configurations
-Type '192.168.0.1' (without quotes), to access the router configuration page
Note: The connection is established in Local, remember that you have not connected your router's phone line jack yet.
-Navigate around and Configure these settings:
1*Service Set Identifier(SSID) Name
-Name your network with a unique SSID for identification
2*Wireless Security
-Enable 'Network Authentication', use WPA settings such as 'WPA-PSK' , 'WPA2-PSK' etc.
-Use TKIP/AES encryption
-Enter your Password/Pass phrase (used later when you establish a wireless connection)
-Edit other settings you're familiar with
-Checkpoint 'Establishing LAN Internet Connection'-
After you've finished with the configuring the router on Local, connect the phone-line from the router's 'Phone' jack to the Splitter's 'Modem' jack (preparations to establish Internet Connection)
I assume most users use a Home Internet Service Solution, so the following steps will deal with connecting to your Internet Service Provider(ISP)
*1. Look for 'Connection Settings' or something similar
*2. Enter your username (as provided when you signed up for your Internet plan)
*3. Enter your password (your Internet plan's password, NOT the router's password.. And- using default password? you might want to change it by logging on to your ISP's portal, or by contacting your ISP thru phone service)
*4 Select your connection type: 'PPPoE' , 'PPPoA' , 'Routed IPoA' etc. (this connection setting MUST adhere to your ISP's setting for your Internet plan, contact your ISP's help desk if you're unsure)
*5 Establish a connection (Click the 'Connect' button, or something similar)
*6 You should be able to connect on 'LAN Broadband setting'
-Checkpoint 'Establishing Wireless LAN Internet Connection'-
Rather simple to set-up actually:
*1. Boot up your laptop (or any other device that has wireless adapter)
*2. Bring up the 'Wireless Network Connection Manager' (or something similar)
*3. 'Scan for Wireless Networks in Range'
*4. Select your Network Name & follow the steps prompted by the 'Wireless Network Connection Manager' to establish the connection.
Note: Do select the correct Network Authentication(WEP, WPA) & Data Encryption(TKIP, AES) protocols.
Note
Support: Additional information will be posted should I make any new discoveries
Inspiration:
Alright, first day over there you(Clement) called me on networking problems. Yup, I was totally dumb founded at that time, as I'd usually deal with Cisco routers. But! It was a good experience for me when I managed to get around with the 'Consumer' routers.
In this post, I'll deal mostly with 'Wireless Broadband Routers'
About 'Routers'
The 'routers' we use at home are usually Broadband/Wireless Routers which very often comes with inbuilt modems. So they work rather differently from Cisco routers in terms of user interface & connecting the hardware. Routers basically spend their life on forwarding packets of information to other networks/routers, humbly working in the background.
Unpacking & Pre-Set Up
-Check all contents provided against the 'Contents List' (when you first open the box)
-Put the router aside first
-Gather these hardware: Power Plug, Lan Cable(s), Wall Phone Line Splitter(usually built with DSL filter)
-Checkpoint '2 Paths'-
From here there are usually 2 possible paths to set up your router:
1-As an access point to the Internet
Or
2-As a access point to pass packets to an existing router
1-Setting up router as an access point to the Internet
1. Look for a good location to place your router, preferably:
-Near to Phone Line Jack (Critical)
-Near to Power Socket (Critical)
-Common location, such as Main Hall (to maximize coverage)
-Open-air, or in transparent display cabinet (preferable)
2. Connect these hardware:
-Ensure that the Wall Phone Line Splitter is connected to the phone line jack, and that your line-phone is connected to the 'Phone' jack of the Splitter.
-Prepare to connect the phone-line from the router's 'Phone' jack to the Splitter's 'Modem' jack (DO NOT connect the phone line yet)
-Connect the Power Plug to the router's power jack
3. Power on your computer first, then the router. (save power! don't rush all at once and end up waiting for your computer to start up while the router uses power to do nothing)
4. Establish a Local Area Connection to configure your router
-Connect a LAN cable from your computer's/laptop's LAN jack to one of the router's LAN jacks.
-Open up your Internet Browser(Mozilla is recommended, but does not affect set up)
Yup, I know, It says 'The page cannot be displayed' or 'Address not Found' etc. No Worries.
-Checkpoint 'Router Local Configuration'-
From here, you can follow the network set-up instructions provided by the manufacturer, if the general steps below do not work due to different router factory configurations
-Type '192.168.0.1' (without quotes), to access the router configuration page
Note: The connection is established in Local, remember that you have not connected your router's phone line jack yet.
-Navigate around and Configure these settings:
1*Service Set Identifier(SSID) Name
-Name your network with a unique SSID for identification
2*Wireless Security
-Enable 'Network Authentication', use WPA settings such as 'WPA-PSK' , 'WPA2-PSK' etc.
-Use TKIP/AES encryption
-Enter your Password/Pass phrase (used later when you establish a wireless connection)
-Edit other settings you're familiar with
-Checkpoint 'Establishing LAN Internet Connection'-
After you've finished with the configuring the router on Local, connect the phone-line from the router's 'Phone' jack to the Splitter's 'Modem' jack (preparations to establish Internet Connection)
I assume most users use a Home Internet Service Solution, so the following steps will deal with connecting to your Internet Service Provider(ISP)
*1. Look for 'Connection Settings' or something similar
*2. Enter your username (as provided when you signed up for your Internet plan)
*3. Enter your password (your Internet plan's password, NOT the router's password.. And- using default password? you might want to change it by logging on to your ISP's portal, or by contacting your ISP thru phone service)
*4 Select your connection type: 'PPPoE' , 'PPPoA' , 'Routed IPoA' etc. (this connection setting MUST adhere to your ISP's setting for your Internet plan, contact your ISP's help desk if you're unsure)
*5 Establish a connection (Click the 'Connect' button, or something similar)
*6 You should be able to connect on 'LAN Broadband setting'
-Checkpoint 'Establishing Wireless LAN Internet Connection'-
Rather simple to set-up actually:
*1. Boot up your laptop (or any other device that has wireless adapter)
*2. Bring up the 'Wireless Network Connection Manager' (or something similar)
*3. 'Scan for Wireless Networks in Range'
*4. Select your Network Name & follow the steps prompted by the 'Wireless Network Connection Manager' to establish the connection.
Note: Do select the correct Network Authentication(WEP, WPA) & Data Encryption(TKIP, AES) protocols.
Note
Support: Additional information will be posted should I make any new discoveries
Tuesday, June 17, 2008
Vista Comics
Back from a 2-day TPCO CCA camp, nearly depleted of my "Li-ion(Lithium Ion) battery" ._. but will make a short post for comic lovers..
Alright, managed to find some hilarious comics about Vista after a light dive.. Compilation credits given to the author of the article at cybernetnews.com.
I will showcase 2 of the funniest comics, as for the rest.. do check it out Here. Enjoy =)
Do click on the images to view in full size:
Vista Dilemma
Vista Upgrade Flowchart
Alright, I'm still working on upcoming posts so don't worry =)
Alright, managed to find some hilarious comics about Vista after a light dive.. Compilation credits given to the author of the article at cybernetnews.com.
I will showcase 2 of the funniest comics, as for the rest.. do check it out Here. Enjoy =)
Do click on the images to view in full size:
Vista Dilemma
Vista Upgrade Flowchart
Alright, I'm still working on upcoming posts so don't worry =)
Friday, June 13, 2008
June 13 Updates
An Image I found
New Updates
-Added a Poll complementing my post on 'Stunningly Beautiful Laptops'
-Added images to my previous posts
Revisions
-Re-expression of certain sentences, ensuring correctness
-Background coding revised, all images & links now open in new window
Upcoming Post
Will be based on feedback
New Updates
-Added a Poll complementing my post on 'Stunningly Beautiful Laptops'
-Added images to my previous posts
Revisions
-Re-expression of certain sentences, ensuring correctness
-Background coding revised, all images & links now open in new window
Upcoming Post
Will be based on feedback
Thursday, June 12, 2008
Stunningly Beautiful Laptops
Alright, my previous posts were filled with tech terms and might be overly wordy, so... for this post: Eyes-only, visually-stunning pictures of chio laptops!
To fully enjoy image details, you might want to click on the respective images. Not to worry, I background coded it to open in a new window =).
Acer Ferrari 1005
Acer Ferrari 1100
Asus Lamborghini VX2S
Apple MacBook Air
OLPC XO-2
Alright, thats all for now. Stay tuned for my upcoming post!
To fully enjoy image details, you might want to click on the respective images. Not to worry, I background coded it to open in a new window =).
Acer Ferrari 1005
Acer Ferrari 1100
Asus Lamborghini VX2S
Apple MacBook Air
OLPC XO-2
Alright, thats all for now. Stay tuned for my upcoming post!
Ad-Aware vs Spybot S&D
A post dedicated to my friend Tow Yuan.
Inspiration:
Tow did a scan using 'Ad-Aware Free 07' today(Wed) prior to system shutdown. When asked of his opinion on 'Spybot Search & Destroy', he expressed that Ad-Aware is able to detect and remedy a wider array of threats as compared to the former. The stage is set =)
Note that the following test is based on my perspective, and results produced are analysed based on observation. As such I urge you to use any information posted for reference only.
Test Criterion:
-Is Ad-Aware able to detect threats after a Spybot S&D scan?
*If (the above is) true- how significant is the threat(s) detected?- On a scale index of 1(Low) to 10(Critical)
-Will Ad-Aware interfere with the operation of Spybot S&D?
*If (the above is) true- to what extent is the interference?
Software Edition: Ad-Aware 2008 Free
Interface:
Process:
-Spybot S&D Scan History: Did a full scan the previous day(Tue), using the latest updated definitions
-Installed 'Ad-Aware 2008 Free', system not restarted
-Runned 'Smart Scan', scanned using default settings
Results:
87 Infections, but on further analysis:
-2 Adware.Agent threats with threat index 5(medium): A .sys file and a Registry key
-3 Most Recently Used (MRU) lists (like recent documents) with threat index 0
-82 Cookies from Firefox and Internet Explorer with threat index 3
*The main concern here is the 2 Adware.Agent Medium threats. MRU lists are fairly insignificant, and Cookies can be detected by Spybot S&D too.
*But on a side note, Ad-Aware's scanning rounded Cookies from both Internet Explorer and FireFox(by scanning 'Program Files')- Something Spybot S&D didn't do, because my default browser is Mozilla FireFox(so, is Spybot's scanning oriented to the default browser only? Possibly overlooking possible cookies from other browsers, but this only applies to non-Internet Explorer users).
Conclusion:
-Is Ad-Aware able to detect threats after a Spybot S&D scan?
Ans: Yes, on a small scale if you're using a 3-tier defence structure(Anti-Virus, Firewall, Anti-spyware 'Spybot S&D') which is similar to mine. As for threat significance, according to an index of 2 detected threats at 5(Medium)- there might be some concerns depending on the type of threat detected by different users.
-Will Ad-Aware interfere with the operation of Spybot S&D?
Ans: Possibly- from my experience, Spybot S&D displayed a notification message indicating possible interference on program startup after I installed 'Ad-Aware 2008 Free'. It's true: Strangely, I was not able to remove the Internet Cookies being detected on the first try(Error message was produced stating that I had aborted the 'Scan'- somehow unrelated?), but that worked out after rescanning.
This is what I observe as for now, will update this post if new dicoveries are made
Inspiration:
Tow did a scan using 'Ad-Aware Free 07' today(Wed) prior to system shutdown. When asked of his opinion on 'Spybot Search & Destroy', he expressed that Ad-Aware is able to detect and remedy a wider array of threats as compared to the former. The stage is set =)
Note that the following test is based on my perspective, and results produced are analysed based on observation. As such I urge you to use any information posted for reference only.
Test Criterion:
-Is Ad-Aware able to detect threats after a Spybot S&D scan?
*If (the above is) true- how significant is the threat(s) detected?- On a scale index of 1(Low) to 10(Critical)
-Will Ad-Aware interfere with the operation of Spybot S&D?
*If (the above is) true- to what extent is the interference?
Software Edition: Ad-Aware 2008 Free
Interface:
Process:
-Spybot S&D Scan History: Did a full scan the previous day(Tue), using the latest updated definitions
-Installed 'Ad-Aware 2008 Free', system not restarted
-Runned 'Smart Scan', scanned using default settings
Results:
87 Infections, but on further analysis:
-2 Adware.Agent threats with threat index 5(medium): A .sys file and a Registry key
-3 Most Recently Used (MRU) lists (like recent documents) with threat index 0
-82 Cookies from Firefox and Internet Explorer with threat index 3
*The main concern here is the 2 Adware.Agent Medium threats. MRU lists are fairly insignificant, and Cookies can be detected by Spybot S&D too.
*But on a side note, Ad-Aware's scanning rounded Cookies from both Internet Explorer and FireFox(by scanning 'Program Files')- Something Spybot S&D didn't do, because my default browser is Mozilla FireFox(so, is Spybot's scanning oriented to the default browser only? Possibly overlooking possible cookies from other browsers, but this only applies to non-Internet Explorer users).
Conclusion:
-Is Ad-Aware able to detect threats after a Spybot S&D scan?
Ans: Yes, on a small scale if you're using a 3-tier defence structure(Anti-Virus, Firewall, Anti-spyware 'Spybot S&D') which is similar to mine. As for threat significance, according to an index of 2 detected threats at 5(Medium)- there might be some concerns depending on the type of threat detected by different users.
-Will Ad-Aware interfere with the operation of Spybot S&D?
Ans: Possibly- from my experience, Spybot S&D displayed a notification message indicating possible interference on program startup after I installed 'Ad-Aware 2008 Free'. It's true: Strangely, I was not able to remove the Internet Cookies being detected on the first try(Error message was produced stating that I had aborted the 'Scan'- somehow unrelated?), but that worked out after rescanning.
This is what I observe as for now, will update this post if new dicoveries are made
Tuesday, June 10, 2008
Computer Security 2: Deploying 3-Tier Defence
Continued from Previous Post
Alright! I'm back with this post to continue from where I've left off. The next step in securing your precious computer's OS is to implement a 3-tier defense against malware. A 3-tier defense structure includes: Anti-virus, Firewall(non-windows), Anti-Spyware.
Discalmer: All programs that I've mentioned below are governed by their respective copyrights and international laws. Apart from that, this post is prepared by the author(me) using information that is believed to be reliable and accurate, but I make no warranty as to the performance and reliability with regards to different user environments- And will not accept responsibility in an event of System Failure, Data Loss or any form of system abnormality. If you do not agree with any part of this disclaimer, please DO NOT click on any links in this post.
Step 2: Implementing your arsenal
Phase 1: Bring up the Anti-virus
In this phase, the most basic defence: anti-virus software, is being installed. My personal recommendation is 'AVG Free Anti-Virus'. With Version 8.0 launched on 24th April 2008, you can expect a more intuitive user interface, and better anti-virus, anti-spyware protection engine. Best of all, it comes free!
Direct download from AVG Free site Here
AVG Free 8.0 details Here
Phase 2: Deploy the Firewall
In my previous post I've mentioned crappy system firewalls. In order to leverage security, one has to posses a more capable firewall. 'ZoneAlarm Basic Firewall' is my nifty defence against programs and malware which slyly target your system when you install a program, open a file or browse the web. The FOC basic firewall protection covers your network and programs, sufficient for the layman user. What about the (Windows) System Firewall?- Disable it, as its plain trash and does nothing more than providing repeatedly irritating admin confirmation messages (for Vista), false alarms, and very "Helpful" advice.
Direct download from ZoneAlarm site Here
ZoneAlarm Basic Firewall details Here
Phase 3: Complete your protection with Anti-Spyware
No ah kong ah ma story to explain this- The crux here is to guard against Trojans, Root kits, Internet Cookies and other forms of Spyware from sniffing your personal details, account passwords, Internet surfing activities etc. The solution?- 'Spybot Search & Destroy'
Looking for the direct download link?
Here's a quest for you:
Look for and download the 'Spybot Search & Destroy' anti-spyware program installer Here
Quest Rewards:
-Anti-Spyware Protection
-Computing Experience
Phase 4: Scanning & Reinforcing
Now is the time to put the programs you've acquired into good use:
1: Scan for Spyware using Spybot Search & Destroy
2: Scan for Viruses using AVG Free 8.0
3. Make necessary adjustments to AVG Free 8.0 ,Zone Alarm Firewall & Spybot Search & Destroy. Details may include setting automatic scanning schedules etc.
*My above prescribed order is for the benefit of time.
Phase 5: Continuing your protection
-Remember to update all your programs regularly:
AVG Free 8.0: Everyday
Spybot Search & Destroy: At least once a week
ZoneAlarm Firewall: When the newest engine is released
-Scan your computer for malware regularly
-Never allow programs that you're unsure of past the ZoneAlarm Firewall
-Backup all your precious data in external devices such as a Thumb Drive or External Hard Disk
-Also note that for Anti-spyware protection, some sources recommend more than one program to handle the task. In my prescription, AVG Free 8.0 alongside with Spybot Search & Destroy provides the base level of protection, while Zone Alarm Basic Firewall comes in as a secondary form of user intervention. If you seriously want to consider a 4th measure, try Ad-Aware by Lavasoft.
Note: Do read my post on Ad-Aware vs Spybot S&D
Conclusion
Notice that all the programs in my prescribed solution are without trail dateline and best of all, free? With the best programs out in the market, reliable computing security can be achieved at no monetary cost. But most important of all, we cannot be complacent and must understand that there will always be loopholes in the Windows OS which are vulnerable to malware attacks. As such, we must always be on guard to handle the next attack... ironic isn't it?
Alright! I'm back with this post to continue from where I've left off. The next step in securing your precious computer's OS is to implement a 3-tier defense against malware. A 3-tier defense structure includes: Anti-virus, Firewall(non-windows), Anti-Spyware.
Discalmer: All programs that I've mentioned below are governed by their respective copyrights and international laws. Apart from that, this post is prepared by the author(me) using information that is believed to be reliable and accurate, but I make no warranty as to the performance and reliability with regards to different user environments- And will not accept responsibility in an event of System Failure, Data Loss or any form of system abnormality. If you do not agree with any part of this disclaimer, please DO NOT click on any links in this post.
Step 2: Implementing your arsenal
Phase 1: Bring up the Anti-virus
In this phase, the most basic defence: anti-virus software, is being installed. My personal recommendation is 'AVG Free Anti-Virus'. With Version 8.0 launched on 24th April 2008, you can expect a more intuitive user interface, and better anti-virus, anti-spyware protection engine. Best of all, it comes free!
Direct download from AVG Free site Here
AVG Free 8.0 details Here
Phase 2: Deploy the Firewall
In my previous post I've mentioned crappy system firewalls. In order to leverage security, one has to posses a more capable firewall. 'ZoneAlarm Basic Firewall' is my nifty defence against programs and malware which slyly target your system when you install a program, open a file or browse the web. The FOC basic firewall protection covers your network and programs, sufficient for the layman user. What about the (Windows) System Firewall?- Disable it, as its plain trash and does nothing more than providing repeatedly irritating admin confirmation messages (for Vista), false alarms, and very "Helpful" advice.
Direct download from ZoneAlarm site Here
ZoneAlarm Basic Firewall details Here
Phase 3: Complete your protection with Anti-Spyware
No ah kong ah ma story to explain this- The crux here is to guard against Trojans, Root kits, Internet Cookies and other forms of Spyware from sniffing your personal details, account passwords, Internet surfing activities etc. The solution?- 'Spybot Search & Destroy'
Looking for the direct download link?
Here's a quest for you:
Look for and download the 'Spybot Search & Destroy' anti-spyware program installer Here
Quest Rewards:
-Anti-Spyware Protection
-Computing Experience
Phase 4: Scanning & Reinforcing
Now is the time to put the programs you've acquired into good use:
1: Scan for Spyware using Spybot Search & Destroy
2: Scan for Viruses using AVG Free 8.0
3. Make necessary adjustments to AVG Free 8.0 ,Zone Alarm Firewall & Spybot Search & Destroy. Details may include setting automatic scanning schedules etc.
*My above prescribed order is for the benefit of time.
Phase 5: Continuing your protection
-Remember to update all your programs regularly:
AVG Free 8.0: Everyday
Spybot Search & Destroy: At least once a week
ZoneAlarm Firewall: When the newest engine is released
-Scan your computer for malware regularly
-Never allow programs that you're unsure of past the ZoneAlarm Firewall
-Backup all your precious data in external devices such as a Thumb Drive or External Hard Disk
-Also note that for Anti-spyware protection, some sources recommend more than one program to handle the task. In my prescription, AVG Free 8.0 alongside with Spybot Search & Destroy provides the base level of protection, while Zone Alarm Basic Firewall comes in as a secondary form of user intervention. If you seriously want to consider a 4th measure, try Ad-Aware by Lavasoft.
Note: Do read my post on Ad-Aware vs Spybot S&D
Conclusion
Notice that all the programs in my prescribed solution are without trail dateline and best of all, free? With the best programs out in the market, reliable computing security can be achieved at no monetary cost. But most important of all, we cannot be complacent and must understand that there will always be loopholes in the Windows OS which are vulnerable to malware attacks. As such, we must always be on guard to handle the next attack... ironic isn't it?
Monday, June 9, 2008
Computer Security 1: Knowing your enemy
In my first post, I would like to discuss computer security...
'Ignorance is a bliss', as said by some.. but come to discover its absence in the area of security. Security should be accurately addressed as a 'measure' to protect and prevent malicious attacks, not as a pre-installed 'feature' that comes with our computers.
While the Internet facilitates information exchange, it has also been a playground for many budding virus writers. Worst of all, the Operating System(OS) we commonly use is Windows- very ironically recognised as the "standard" OS, one which allows many possible forms of system attacks.
And in case you were wondering about the boasts of Vista's "invulnerable" firewall, the Blue Pill breached its firewall in 1ms (milli seconds).. and uh oh.. >.<. Click Here to see the Blue Pill article.
Don't worry though, it's created by a virus researcher to prove her point on stealth malware- very much for research purposes.
Besides, most would regard the Vista firewall to be a phenomenal pain in the butt, and the XP firewall is merely an empty shell.. So how exactly can we implement security measures in our computers if the system firewall is trash?
Step 1: Know your enemy
Below is a brief overview of popular malicious codes in the 'market'...
-Viruses (often loosely used to describe any form of malware)
Has an 'engine' for propagation- meaning it has to infect files to spread, and usually a 'payload' which contains codes to execute after infection.
-Worms
Self-replicates and propagates itself over a network without having to infect files.
-Trojans
Does not propagate by infecting files or self-replication. Usually appears as harmless executable(.exe) files, but upon tricking user into execution, will inject malicious codes which can do anything from sniffing passwords to opening backdoors into the system.
-Spyware
Software installed on the system without the user's knowledge, to gather information for later retrieval. 2 main categories are:
*Surveillance*
Basically to capture data without the user's knowledge
Includes: Key loggers, screen capture devices, Trojans
*Advertising* (also called Adware)
Installed alongside other software or via Internet ActiveX controls, usually without the user's knowledge or without full disclosure. Used for gathering personal information and/or showing ads.
Step 2: Implementing your arsenal
Will be discussed in my next post. Stay tuned!
Continued Here
'Ignorance is a bliss', as said by some.. but come to discover its absence in the area of security. Security should be accurately addressed as a 'measure' to protect and prevent malicious attacks, not as a pre-installed 'feature' that comes with our computers.
While the Internet facilitates information exchange, it has also been a playground for many budding virus writers. Worst of all, the Operating System(OS) we commonly use is Windows- very ironically recognised as the "standard" OS, one which allows many possible forms of system attacks.
And in case you were wondering about the boasts of Vista's "invulnerable" firewall, the Blue Pill breached its firewall in 1ms (milli seconds).. and uh oh.. >.<. Click Here to see the Blue Pill article.
Don't worry though, it's created by a virus researcher to prove her point on stealth malware- very much for research purposes.
Besides, most would regard the Vista firewall to be a phenomenal pain in the butt, and the XP firewall is merely an empty shell.. So how exactly can we implement security measures in our computers if the system firewall is trash?
Step 1: Know your enemy
Below is a brief overview of popular malicious codes in the 'market'...
-Viruses (often loosely used to describe any form of malware)
Has an 'engine' for propagation- meaning it has to infect files to spread, and usually a 'payload' which contains codes to execute after infection.
-Worms
Self-replicates and propagates itself over a network without having to infect files.
-Trojans
Does not propagate by infecting files or self-replication. Usually appears as harmless executable(.exe) files, but upon tricking user into execution, will inject malicious codes which can do anything from sniffing passwords to opening backdoors into the system.
-Spyware
Software installed on the system without the user's knowledge, to gather information for later retrieval. 2 main categories are:
*Surveillance*
Basically to capture data without the user's knowledge
Includes: Key loggers, screen capture devices, Trojans
*Advertising* (also called Adware)
Installed alongside other software or via Internet ActiveX controls, usually without the user's knowledge or without full disclosure. Used for gathering personal information and/or showing ads.
Step 2: Implementing your arsenal
Will be discussed in my next post. Stay tuned!
Continued Here
Subscribe to:
Posts (Atom)