April 30, 2013
Let us take a moment from web design and security and look at an activity that is so every day, so mundane, it is almost forgotten. Maintaining your computer is an essential part of making it last as long as possible. This is simple and, if done regularly, can add to the life of your equipment.
Make sure to wipe dirt off your monitor. Do this by spraying glass cleaner onto a soft cloth. Do not spray on the monitor itself or you risk damaging it. Remove particle from your keyboard using a mini-vacuum or tweezers. As with your monitor, do not spray anything directly onto the keyboard. Keep your equipment away from food or drink. Perhaps twice a year, remove the case of your computer and dust the insides sing a compressed air can.
These simple steps done regularly will ensure the long life of your computer.
March 30, 2013
You can do anything on the Internet now. You can buy your groceries, order take out, order medicine, buy anything from furniture to a trinket. You can do online back transaction, book flights abroad, bus tickets cross country, rent a car, you can even work online. A whole life can revolve around the Internet and movies where the individual does not feel the need to leave the house because everything can be done with the click of a mouse is not a hypothetical but a reality. That said, it is always important to recall safety online.
Online safety is something that everyone needs to know, and for those who do any activity online, this is something they should know by heart. So some basics: keep your firewalls, spyware, and virus detection programs updated and running on regular intervals. Do not go to unsecured sites as much as possible. When you are on social media, switch to https. Block pop ups and do not click on links in unknown email. Do not leave personal, especially financial detail online. Vigilance is the key to successful inline activity.
January 27, 2013
We have discussed the many reasons a person should be vigilant about online security. There really is no way around going online to do some kind of activity. Today, classes and even homework is given and reinforced online. So instead of remaining backward or hiding from the inevitability of the Internet, it is better to know how to protect yourself and to exert all the necessary effort to do this.
The problem is that we often do not think negative things will happen to us. As long as it is a hypothetical, then it’s importance is not deeply felt. Let’s look at the latest case of online security fraud that has caught the nation’s headlines. Footballer Manti Te’o and his girlfriend who supposedly died from leukemia but who in fact never existed is a classic example of how online security must be strictly applied. The latest news that the image of his girlfriend was actually a picture stolen off Facebook is further proof that it can happen to anyone, anywhere.
Let’s remember to be safe and to apply our Internet security protocol at all times.
January 1, 2013
If you are new to the computer world, maybe you haven’t really felt the need to be informed about this before, or maybe you are just starting to do activities online, you will have to familiarize yourself with the evils out there. Everyone knows that once you get set up, whether this be a PC, laptop, tablet, smart phone or all, you need to have the proper security systems set up.
Why is this? Because there are such things as ‘malicious software’ or ‘malware’ that exists to destroy your computer system and to steal your information. Making sure you are armed to defend yourself against malware should be the first thing you do when you get your computer set up.
There are different kinds of malware out there but do not fret. Getting started with your basic security setup is a good enough shield to begin with. You can build on this. Make sure you have your firewall set up, your security software installed and regularly updated and you should be good to go.
November 30, 2012
Doing some kind of activity online is unavoidable in these times. The simple act of emailing someone is an activity online that will leave a thumb print. Since this is now a fact, a concern for a lot of people is how to maintain privacy online. One sure way to do this is to manage your information online, specifically your passwords.
Back in the day, you only needed to memorize your banking pin. Since these were not too many and were all numeric, the habit was to create one password for all accounts so this would be easy to remember. For internet accounts of any kind, you should do the opposite to maintain your security. Whether we are talking about the simple creation of an email address to something more financially based like online shopping, you should remember to never have the same password for these accounts.
Following this simple advice will do so much in ensuring you are secure online.
November 13, 2012
1. Use Cases
1. Web intrusion detection and prevention
2. Continuous Security Assessment
3. Virtual (or just-in-time) patching
4. HTTP traffic logging and monitoring
5. Network building blocks
6. Web application hardening
2. Deployment models
2. Out of line
3. Data Model
1. Model construction
2. Persisting information across requests
3. Distinguishing sessions
4. Distinguishing users
4. Analysis Model
1. Negative security
2. Positive security
3. Anomaly scoring
6. Impedance mismatch
5. Traffic logging
6. Special protection techniques
1. Cookie protection
2. Cross-Site Request Forgery
3. Brute force attacks
4. Denial of Service attacks
5. PDF UXSS protection
October 30, 2012
There is this saying that you can do and find anything on the Internet. That was an exaggeration a decade ago but is certainly true now. Today, you really can get and do anything on the World Wide Web. With a few keystrokes you can make purchases, get hired, even arrange to move to another continent. There is no limit.
This is mind, one must always be vigilant about web security. Since you can do anything on the web, you must be sure to protect yourself from those who would take advantage or expose you or your profile to theft or fraud.
There are some simple rules to protect yourself. Do not leave any financial information online. Make purchases using an online account and not a credit card. Do not make your password easily cracked ones. And do not access sites you are not sure of. These three steps are foundational for internet security.
September 10, 2012
Represents the level of consistent download capacity provided by your Broadband or DSL providor. The higher QOS percentage, the higher the overall quality of the internet connection. High quality plus internet speed provides better connections for VoIP (voice over IP), Citrix and other high traffic applications.
This figure should come in around 80 or higher yet. This does not mean that you won’t find success at lower speeds, but on average, the speed test should report >= 80.
The Round Trip Time (RTT) reports the total time in milliseconds (ms) to send a small data packet in our internet speed test and obtain a reply back. The faster (smaller) the RTT, the better broadband speed you’ll have.
For Voice over IP, round trip delays can occur when results exceed 250 mSec or 150 mSec one way which is also considered the maximum desired one-way latency to achieve high-quality voice.
Max Pause is the longest pause recorded during the Broadband Speed Test data download. This should be a very small number. If not, it could indicate Internet speed congestion or a bad broadband connection.
July 6, 2012
A Brute Force attack is an automated process of trial and error used to guess a person’s username, password, credit-card number or cryptographic key.
Many systems will allow the use of weak passwords or cryptographic keys, and users will often choose easy to guess passwords, possibly found in a dictionary. Given this scenario, an attacker would cycle though the dictionary word by word, generating thousands or potentially millions of incorrect guesses searching for the valid password. When a guessed password allows access to the system, the brute force attack has been successful and the attacker is able access the account.
The same trial and error technique is also applicable to guessing encryption keys. When a web site uses a weak or small key size, its possible for an attacker to guess a correct key by testing all possible keys.
Essentially there are two types of brute force attacks, (normal) brute force and reverse brute force. A normal brute force attack uses a single username against many passwords. A reverse brute force attack uses many usernames against one password. In systems with millions of user accounts, the odds of multiple users having the same password dramatically increases. While brute force techniques are highly popular and often successful, they can take hours, weeks or years to complete.
May 3, 2012
There are many pieces to intrusion prevention and like a puzzle, you must put them all together before you start surfing the net; miss just one piece and you’ve left yourself wide open to attack!
This is what you need to help prevent intrusions including the web security services you should use on a regular schedule.
For those of you that don’t want to read all the details and are ready to jump right into the web security audit, then follow the five steps below.