IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Would You Download an Anti-Virus Freeware for Purchase?

12 August 2011 By Saran

Getting hold of an anti-virus software these days is not as hard as before. Normally, you had to the nearest computer shop and ask around which best anti-virus software can keep your protected and then install it once you buy it outright. Through the years, software companies have allowed anyone to download their software, try it and then eventually be given the option to buy it. Some are even lucky enough when geniuses develop certain key generators to which they can crack the trialware into the full version. But all that seems checked now.

To date, there are still an abundant number of sites like forums that house such cracks and codes. Some of them work but not as plenty as before. Software companies have religiously sought to skim them one by one, blacklisting said codes to which makes freeloaders scratch their heads and continue to get a working key just to avoid a couple of dollars. Sadly, that is not as rampant as before.

If you think about it, this may only be the tip of the iceberg. Software companies may soon follow the cue of Microsoft in blacking out their screens if they are using pirated versions. If Microsoft can do it, then why not companies like McAfee or Norton? They are not small time companies and for sure, they have the funds to make it work like Bill Gates did.

Cheaters cannot complain and so do pirated users. So if that happens, it will all be due to the nature of being a cheapskate that did these people in.

Filed Under: IT Security Basics, Operating Systems, Spyware, Tips Tagged With: freeware, protecion, Spyware, virus

Biometrics + Physical security = Next best thing to unbreakable?

13 July 2011 By Saran

bio.jpg
Biometrics is seen as the next step in computer systems security and access control due to the failure of more primitive and fundamental security systems. Fingerprint scanners, passwords, security keys and even smartcards have failed miserably in providing the ultimate and most secure intrusion prevention method for just about anything. From your home, car, computer terminal at work to just about anything else that needs security, it has be come more and more of a must due to the increasing threat of identity theft and other computer related crimes in and out of the workplace.

Biometrics are security systems that are based on the differences the human body manifests in terms of eye structure, facial features and now vein geometry. We’ve all heard of DNA or the so-called blueprint for life and the way it makes each and every human different from everyone else on this earth (well, except for some genetic disorders and diseases that changes the DNA makeup). That is what biometrics takes advantage of as a source of a very unique key or method of identifying one from another person.

Your fingerprint is mapped when it is initially scanned into a computer system which convert’s your analog (actual) print into a digital map that is as unique as you are an individual. Iris scanners take into account the differences the iris has from each and every individual (through the use of a low powered light and scanner to obtain a picture of the eye’s iris which is also unique). Voice recognition takes into account, the differences our voices have from everybody else also converting it into a digital map or password of sorts. Vein geometry, uses a thermal imaging camera to take a picture of your hand or whole body which is sensitive to heat showing all the blood vessels which show as hotspots thus giving you a unique id of sorts as that is also mapped and converted into digital form. All of the above biometrics systems rely on our individual differences which are quite unique to us and add onto it, other more basic security measures such as a physical key (password, key or other devices) to give the ultimate security system preventing intrusion.

Filed Under: General, IT Security Basics, Network Security, Operating Systems, Physical Security, Real-World Issues, Security Policies Tagged With: identity-theft, Secure workplace

How to Handle a Virus

28 June 2011 By Saran

One of the common problems that PC owners have these days is finding out that they have a virus residing in their PC. Don’t be comforted by the fact that you have an anti-virus software running. Viruses will always find a way. Also, if you do have one, are you sure it is licensed?

Apparently, most people fail to realize the value of a good anti-virus software when it comes enabled with all the features included. Some are fine with the trial version as long as they are protected. At least that is what they think. But the real value of a good anti-virus software comes out when you get the full version that comes with the actual cleaning tool when you get one officially.

For most trial versions, you may be surprised to note that once they are able to detect a certain virus, you can only discover them but not clean them. If you do try to clean them, it will tell you to get the full version at a certain price of course.

There are some software that clean certain viruses but these are mostly low in threat. But the graver ones are the issues you have to content with. If you really want a fully protected PC, chances are you better consider an investment that can really protect you from such virus issues, most of which can really hurt you as far as computer files and documents are concerned.

Filed Under: IT Security Basics, Operating Systems Tagged With: anti-virus, freeware, protection, software, trialware

The Price for Downloading Cracked Software

21 June 2011 By Saran

Whether you are downloading a trialware or files from Bittorrent, the chances of cracking or using the full version has severely dwindled in the past months. For one, other than possibly downloading infected software with Trojans and malware, unlocking these supposed protection software has taken a bad hit by the advanced efforts of private software companies to crack down on piracy.

Take for example Kaspersky Internet Security 2009 which has cracked the whip on licenses by blocking them once you start updating the software. While you can install and crack them, they are rendered useless in the end since once you hit that update option, your key is automatically blocked. Worst, malware and Trojans start coming in (a scenario which I don’t understand if it was made on purpose by the vendor in sending malware) infecting the systems folder where Windows is installed.

Before you know it, dozens of files in the form of dll’s start showing and mind you, they are dangerous. So if that was the case, it makes you think if you were better off not using an anti-virus software at all.

But such is the price to pay for trying to pull a fast one. Everyone loves free things and free software is surely to be an eye-catcher. But if the return is tons of viruses and malicious programs that can wreck your computer, you better think twice before downloading them again.

Filed Under: Operating Systems, Spyware Tagged With: cracked, kasperksy, Malware, software, trojans, viruses

Patch Up or Lose your Information

20 April 2011 By Saran

You just have to look at how Microsoft always announces certain patch releases for their software these days. Nothing is definite and safe just yet especially if you consider hackers and computer geeks trying to discover flaws in certain computer software such as an operating system. There will always be something discovered and the loophole can be entirely critical and dangerous.

Unlike in the latter 1990’s, today we rarely see patches being given since they have more or less covered the security threats ranging from viruses to malware today. There are still recommended patched needed. But surely, they are not as rampant and dangerous compare to before. And to make sure that you are using authentic software, they make use of software authenticity codes to know if you are using genuine software or not.

Microsoft can be commended for this but it still remains that there are still a lot of flaws as far as their software releases are concerned. But to make sure that customers do not experience these unfortunate mishaps, a continuous research and development for such threats has to be implemented. We can see these days that something will suddenly break out and if you are not protected, chances are you are missing a patch.

As much as possible, apply these patches. If you are in doubt, read on them or even ask for technical support. Security breaches in the IT world are common and to stay away from such a discomfort, it is best to be updated and make sure you are well-protected.

Filed Under: IT Security Basics, Malware, Operating Systems Tagged With: Malware, Microsoft, patches, security, viruses

Implement a Strict IT Policy

29 October 2010 By Saran

It is perhaps the headache of any IT head when it comes to implement policies to have a smooth running network and department. But while the essence of a good security system is evident, it is really the implementation part that is hard to accomplish.

For one, the transition and building of security awareness from various threats that can easily make their way towards an acclaimed secure network is abundant. Manually or transmitted, suspicious files will always find a way especially if you are not that adamant towards making sure that all bases are covered as far as the security of your system and data is concerned.

Many people fail to appreciate that value of the data they have gathered. They fail to appreciate the value of a strict IT policy mainly because all they care about is a workstation to use and opening files (both internal and external) as they please. So if you put all these things together, you can imagine the problems that an IT guy has to work with. But to some, taking the initiative such as passwords and some hardware exclusions has to be made.

If you notice, some drives like the usual floppy drives or even USB ports are either missing or disabled. To make them work, certain permissions and passwords are set for them to be enabled. Only the IT administrator would know these security measures and basic as they may seem, they really help a lot.

This is just a basic but effective way that IT personnel use. There are the usual network policies but for the sake of people who want to making it doubly sure, old and basic practices such as this is perhaps the best way to go.

Filed Under: IT Security Basics, Network Security, Operating Systems, Physical Security, Privacy & Anonymity, Security Policies Tagged With: it, management, policy

Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security