Computer+Security

=**Computer Security**=

Below are links to some computer security related stories:


 * Microsoft patches 
 * Conficker infection 
 * Firings at Bruce Nuclear 
 * Malware arms race 
 * Bad Trojan 
 * Security warnings ignored 
 * Scareware 
 * Unholy rage 
 * Jailbreaking breaks stuff 
 * Protect your data 

Uuninformed computer users constantly put themselves and others at risk by their own ignorant or risky behaviour.

**Keep your computer secure**
What steps can you take to maximize your computer and data security?
 * apply updates and patches as soon as they become available
 * don't transfer files
 * don't allow personal content
 * don't download any content that you don't know the source of
 * trust no one
 * don't put total faith in antivirus, anti-malware, anti-spyware, or software firewalls
 * minimize the number of programs that attach to the internet
 * read and understand messages
 * investigate any software to ensure it works as advertised
 * don't exploit websites
 * do not perform unauthorized modifications to your hardware
 * use login passwords
 * use unique and strong web passwords
 * use a password manager (eg. KeePass)
 * set up individual user accounts
 * use encryption
 * use encrypted networks, routers, VPNs
 * use regular backups
 * backup everything in more than one location

**Security Now! assignment**
Open and read the requirements for the Security Now! assignment. Get your podcast from the Security Now! website: .

Add your topic and simplified conclusion, security rule or statement, to this wiki page.


 * The Security Now! assignment is due October 7, 2009.**

eg. **RAM Hijacks** Although RAM loses the contents of its memory when powered off, some parts of the RAM can still be read (using sophisticated equipment) many seconds or minutes after power is removed. To prevent the contents of RAM from being discovered, and potentially revealling secrets, crypto keys, etc., you must maintain the physical security of the location in which the computer is installed and operated. This means keep your laptop with you at all times, or keep people out of computer rooms, offices, etc.

Ben - GSM encryption is very weak, and hackers can gain access to your conversations and text messages with only seven hundred dollars of equipment. 3G is more secure, but over three billion people in two hundred countries still use the same GSM from the 1980's. Nick - Cellphones send weak encrypted code through the air and anyone can pick it out. There isn't anything you can do about it unless you get a special phone like the president. Tyler S - GSM encryption is very weak. And hackers can easily gain access to your conversations. 3G is an updated version of GSM and is more secure. Over three billion people and 80% of cell phones still use this in two hundred countries. It is from the 1980's. GSM is wireless and anyone can get access to your signal.
 * 213 - Cracking GSM Cellphones**

Meisha, Jesse
 * 211 - Voting Machine Hacking**


 * 205 - Lempel and Ziv**

Moeed, Josh D Jeff
 * 197 - Windows 7 Security**

Jeff =Windows 7 is a HUGE improvement from windows vista and XP. Windows 7 is adding many great security features such as: biometric framework, BitLocker disabling auto play, adding a security level slider for different peoples preferences. And re and some fire walls to be more effective. Windows 7 will be much more secure than any other windows has been. =

Windows 7 has done a lot to improve it's security, and it has also made it less complicated to maintain and fortify the computer. There is now an action center which suggests the actions a user can take to protect his/her computer. It has also made BitLocker a part of Windows.
 * __Moeed H.__

Download Assignment: http://www.4shared.com/file/138285267/ff220164/blah.html **

Kenny
 * 189 - Internet Explorer 8**

Microsoft release this new update which is internet explorer 8. Its is still the fifth slowest browser. It has new features but it is still not really secure. Its already been hacked and there is vulnerability for it. It go good features like you can zoom in and "InPrivate' browsing which makes the browser not to save the history of browser and temporary internet files __**Tyler Robinson**__ Micorsoft is releasing a the new Internet Explorer 8. A new feature is that DEP (Data Execution Prevention) is now enabled by default, which prevents unautorized programs from running code. Also, Microsoft introduced the new 'InPrivate' browsing mode, which prevents the browser from saving browsing history, temporary Internet files, passwords and usernames.
 * __Raazia__**,

The release of the Ie8 has finally came after all the noise that Mircosoft had made. It came with many new features of which were quite handy and a higher security level and privacy level. Sadly, IE8 is not advised to be used right away due to all the unpatched bugs that still has to be found. Plus, IE8 is still considered the worst on the market when it comes to good performance browsers, regardless of all the false advertising that Mircosoft has done.
 * __Kenny Truong__**


 * 187 - Windows Autorun-around**

The Autorun feature of Windows allows the system to run a device as soon as it is mounted to the computer. This means that if an infected storage device is inserted into a machine, the whole system can be exploited because the device is automatically loaded. To avoid malware problems, disable Autorun. To disable Autorun entirely, go to Registry Editor and modify NoDriveTypeAutorun to the value of 0xFF.
 * __Syed__**

For more detailed instruction on how to disable Autorun, go to: [] 

Above is a picture of the correct folder (HKEY_CURRENT_USER) that should be used when disabling Autoplay. This folder takes precedence over the other folder (HKEY_LOCAL_MACHINE ).

Above is a picture of the //**incorrect**// folder (<span style="font-family: 'Times New Roman',serif; font-size: 11pt; line-height: 17px;">HKEY_LOCAL_MACHINE ) that should //**not**// be used when disabling Autoplay. This folder will be overridden by <span style="font-family: 'Times New Roman',serif; font-size: 15px; line-height: 17px;">HKEY_CURRENT_USER.


 * 172 - Sandboxie**
 * Matt F -**
 * Asheek Arfeen** **-** Sandboxie is a proprietary sandboxie-based isolation program developed by Ronen Tzur. It is a security software for Windows. Which allows you to install and run programs in a virtual sandbox environment without writing to the hard drive


 * Raeann -** Sanboxie is a program that runs your programs in a isolated space and this stops the programs from making permanent damage to your other data and programs on your computer.


 * 170 - The TKIP Hack**

Ian
 * 159 - Vista Security Bypass**
 * 149 - ISP Betrayal**


 * 143 - Yubikey**

Salman- Iron key is high end memory stick with technology beyond any other memory stick. Iron key uses security software the encrypts everything on your iron key. It is really reliable and safe, it lets you set up a password for your usb so you can keep it safe without people going through it. Iron key is aslo physically stong it's water proof and tamper resistanctint so, if some one tampers with it to much it will delete everything off your Iron key.
 * 135 - Ironkey**


 * 133 - TrueCrypt v5.0**

__**Alexandra (summary) -** **TrueCrypt 5 :**__ The topic TruCrypt 5 is extremely secure. It will encrypt your whole drive and keep it secure. When you start to encrypt it, you can make a disc which will be a recovery disc after it's downloaded. When encrypting your drive, you will have to put in a password after the computer reboots, and it has to be more than 20 characters in order for it to accept it.If it's less than 20 characters, it will not continue until you change it. If your system is encrypted, you can always bring it back to how it was before, just de-crypt it. TrueCrypt, to make sure you won't lose any files or information, it will disable hibernation. They made TrueCrypt very secure so that no one can steel files or information or delete anything. It is very secure with your drives and will make sure of what you want to do next.


 * 127 - Corporate Security**

Tyler D, Amir
 * 121 - Is Privacy Dead?**

Iulian- Are you Human Podcast expalained CAPTCHA which practicly is used to tell humans apart from computer by a picture which a human can easly solve it but its almoust impossible for computers.
 * 101 - Are you Human?**

Mohamed Nasir- In conclusion CAPTCHA is mainly used to tell which one is the human and which one is the machine. despite the fact that we sometimes can read what it says. it's also difficult to the machine to figure it out.

Nikki (summary) - In short, the purpose of the CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is exactly what it stands for. CAPTCHA's tell man from machine. Although it is difficult for humans to comprehend, that makes it even more tough for computers. The creation of CAPTCHA shows how developed computers really are. To the point that humans have to prove that they are, in fact, human.


 * 91 - Mark Maiffret**


 * 90 - Multifactor Authenticaion**

Nathaniel Download: http://cid-09efe34ce44da4c9.skydrive.live.com/self.aspx/Public/Computer%20Science.zip
 * 81 - Hard Drive Unreliability**

Therefore it is recommended for vista buyers to buy the 64-bit system rather than the 32-bit system. **
 * 66 - Windows Vista Security**
 * __ Ogai Sadiq -__ Windows vista has the latest security in the OS,the Windows Vista security center. The windows security center monitors the malware protection, antivirus protection, automatic updates and firewall also includes automatic scans for the system.Vista also includes truecrypt which helps to protects your files and folders that you do not want to share with other users.Another very secure feature that is available o the vista system id called the Bitlocker Encryption Drive. Bitlocker prevents theft of your computer's files and apps.Another important security feature is the kernel patch that is only on the 64-bit computers not on the 32-bit computers.