Archive for the ‘Security’ Category

TapInstalling/Upgrading to AVG8 Free (Windows)

4 May 2008 18:01 by Rick

Now that it is available, upgrading from AVG 7.5 to AVG 8 is a logical step but there are some decision points to be made along the way so it is best to be prepared for them.

[Note that the Free edition has some quite rigid conditions about home use only.] First you have to find it. The link I gave before is still good but it is a few clicks of Grisoft determinedly trying to get you to buy the full suite. Some of the links on the way are a bit misleading. One says that AVG Anti-Spyware is being discontinued but others that it is now included with the Anti-Virus package. The eventual download location is either their own site or C|Net downloads.com.

When you come to install it there is no need to un-install the previous version. You will need to login to an admin account. Leaving a lot out, the sequence of events is:—

  • Standard or Custom install—you will need custom if you don’t need the email scanner.
  • For the Custom install, Un-tick the email scanner if you don’t want it.
  • Un-tick the AVG Security Toolbar if you don’t want it. Everyone seems to want you to get one of those and if you loaded them all you wouldn’t have enough window left to browse in.
  • Un-tick the “Enable Daily Scanning” box if you don’t want it. I find that it is a long process and very heavy on resources (though they have put in some sort of load-limiter now). I would rather do them when I want to—and certainly not daily.
  • There is a tick box for informing AVG about potentially dangerous web sites that you come across. I haven’t checked the privacy statement for this yet so I would be cautious.
  • Definitely SKIP the updates at the moment as the install is not really ready for them.
  • Skip the registration for the time being.
  • Now you will need to reboot (it prompts you).
  • When it comes back the System Tray icon will probably be red. Right click to open the AVG User Interface.
  • Click Update Now and it should go ahead and do it.

That is the install complete but you need to check one other thing. One of the features of AVG 8 is the AVG Search Shield, sometimes called the Link Scanner. This intercepts results from the search engines (Google etc.) and inspects them for malicious content—try it and see the little green icons after every hit. Quite how it does that I am not sure but it seemed to take a long time and have a lot of internet traffic. I would imagine that on a dial-up connection it would be impossible. The search engines themselves do some quality checking, if this is doing it real time then it would be better but at what cost. The other thing that bothers me about this is that it could be that you are automatically visiting sites that you wouldn’t otherwise touch with a barge pole (porn etc.) and it will leave the evidence of this in your cache even if it never displays it.

If you decide that you don’t want this facility there are two ways to switch it off. You can use the AVG interface, but if you switch it off there it will forever say that AVG is not fully functional. The other way is with the browser controls. It works using a browser plugin (both IE7 and Firefix, I don’t know about Opera or Safari) and these can be disabled. Go to Tools —>Manage Add-ons—>Enable or Disable Add-ons in IE7 or Tools —>Add-ons in Firefox. This will need to be done on EACH ACCOUNT on your computer.

Now you can register at leisure, if you can figure out how. I haven’t yet! It is worth remembering that, despite all my griping, this is still a free service for which we are grateful.

Update: 20 Jun. As far as I can tell, the Firefox plugin which drives LinkScanner is not Firefox 3 compatible. It will be interesting to see how they update it.

TapFlying Low

22 Apr 2008 10:04 by Rick

If someone you passed in the street stopped you to point out that your trousers were undone, you might get a bit embarrassed as you quickly did them up and you might stutter a bit as you thanked them. What you would certainly not do is flag down a police car and report your informant as a pervert for looking in the first place.

So why, when someone with a bit of knowledge discovers and reports a weakness in a web site, do some major organisations immediately call in the lawyers and take them to court on “hacking” charges. This has got so bad that security researchers, even professionals, are now wary of reporting such flaws direct to the owners. Instead they must publish publicly and anonymously to protect themselves. That means that the criminals have access to the information at the same time as the administrators making them much more vulnerable to attack. To be convicted of theft it has to be shown that you not only took something but also intended to permanently deprive the owner of it. Something similar needs to be added to the various computer misuse laws around the world.

However, in a far sighted move, Microsoft have said publicly that they will not take action in cases like this. Indeed they positively welcome being told.

TapWhat next after CAPTCHA

27 Feb 2008 14:50 by Rick

They were quite efective even though we all hated them—the fuzzy, misshapen, blurred letters that we had to read and type into the box to verify that we were human not some robot spam generator. But recently, two big systems, Google’s gmail and Microsoft’s live mail have been cracked. There are other types about such as simple arithmetic and counting monkeys but they wouldn’t last long if used on high volume, high profile systems like these. They all suffered from being more or less inaccessible to the disabled anyway. So now that CAPTCHA can’t keep the crackers out, where can we go next? And whatever, for the accessibility reasons they must be dropped altogether now.

There are a lot of possibilities out there; one-time pass codes texted to your mobile or RSA key-fob dongles for instance, but they are all far to expensive for the many places that you (the end user) would like to use and you (the site owner) would like to attract customers.

TapSpyware, who cares?

26 Feb 2008 14:20 by Rick

…when the ISP’s are selling your browsing data direct to the advertisers anyway. If you are a BT, VirginMedia or Carphone Warehouse customer who values your privacy I suggest you start looking for proxy anonymizers. Anonymizer.com and proxify.com are well known ones but I can’t vouch for any of them.

TapWords on the air

14 Feb 2008 09:28 by Rick

This is a problem a colleague at work came across with a home machine. His wife said that suddenly strange words started appearing on the screen. Suspecting some virus she disconnected the network immediately and called her husband. When he tried to use a bootable Linux CD to investigate the problem he had trouble closing down because windows were being selected randomly. Resorting to the kill button (hold down the power button for a while) he rebooted but strange words started to appear during the boot sequence as well.

What is your diagnosis?

He first suspected a BIOS virus but those haven’t been seen since the late ’90s. Then he spotted that one of the words showing up was the name of a neighbour’s child. Light dawns! A chat with the neighbour revealed that they had just replaced the battery in their wireless keyboard and the extra power must have been sufficient to be picked up by the identical receiver on his wife’s PC.

The implications are left as an exercise for the reader.

Thanks to Frank and his (internal) blog for the details.

TapDoes your website *all* belong to you?

12 Feb 2008 14:13 by Rick

When we build web sites we don’t necessarily create all the content ourselves. For various reasons we might subcontract out parts of it to third parties. Some examples are banner advertising and external widgets such as page counters and other statistics. In each case the code we insert on behalf of the third party pulls in content from their web servers and we have little control over it.

Now you might imagine that the big advertising company that you are signed up with have their reputation to consider and would only serve you good banners but it is not as simple as that. They sell on advertising space (syndicate) to other companies. The person visiting your site may be in another country; the code can tell that and will adjust the response accordingly; that is called geo-targeting. Now the agency doesn’t necessarily have material for that country so they contract out to yet another company to do it for them. This can happen many times before the advert is delivered, sometimes on a geographical basis, sometimes on a share arrangement—all without you knowing anything about it. You trusted the original supplier, and they trusted their subcontractor but it is getting a bit thin by the time the eventual supplier is reached and it is not uncommon for that one to be sending a virus or spy-ware to your customer. Yes, they are still your customer and will hold you responsible for what happens.

The other example I suggested was page counters, they are useless but small site owners still seem to like them. There used to be hundreds of different ones around but I haven’t looked recently. Some of these go out of business or get bought out without you knowing. The web address may have lapsed and been snapped up by someone else. This new owner could be using it for anything—including sending mal-ware to your visitors. When was the last time you looked at that page counter? Is it still doing what you though it was?

There are two good, but rather technical, reports linked to from this Google Blog that you should read if you think you may be affected by this.

TapWordPress update 2.3.3

6 Feb 2008 23:20 by Rick

This came out yesterday as an emergency patch for a vulnerability. I wouldn’t normally write about it here but, for some reason, they didn’t publish the list of changed files. So here they are:—

xmlrpc.php
wp-content\plugins\akismet.php
wp-admin\install-helper.php
wp-includes\version.php
wp-includes\gettext.php
wp-includes\pluggable.php

It is the first one that is important.

TapEmpty property

22 Jan 2008 22:20 by Rick

This is more of a problem in an area with a lot of holiday homes but The St. Ivean points out that you only have to look for the houses with a Yellow Pages standing by the front door to find one where you won’t be disturbed breaking in.

TapDonor card

16 Jan 2008 09:37 by Rick

For longer than I can remember, I have carried a Donor Card in my wallet—I have just looked and mine is dated 17 Apr 1986. They were easy to get and quite high profile; on the counter in doctor’s surgeries, dentist’s, blood donor sessions, even non medical places like pubs, newsagents etc. sometimes had them.

Today they are saying that there are nowhere near enough donors and perhaps we should change over to an opt-out system where permission to donate is assumed unless you have made a declaration that you do not want to. I don’t disagree with the idea but in passing I picked up another clue—the NHS Organ Donor Register. I had never heard of it! Is it now true that it is no longer good enough to carry a card but you have to be signed up to some online database? I don’t think I like that idea*. Perhaps that is why the number of available donors is so low.

* I have had a look at the registration web site and, despite the announcement that it uses Digi-Sign and so is secure, that is an illusion. The information required is Name, DOB and Address. This is fairly public information; anyone could fill this in. DOB is a bit harder to obtain, but is not fully private.

TapOpen or not?

15 Jan 2008 14:21 by Rick

There is a big debate going on at the moment prompted by an article by Bruce Schneier in which he explains why he leaves his home Wi-Fi network unsecured i.e. no password, no encryption. He discusses the risks and benefits and comes to the conclusion that, for him, the latter outweigh the former. Note that he is not saying it is for everyone.

The key points in the debate centre around

  • How much you trust your neighbours not to flood your bandwidth.
  • The terms of service from your ISP, if you are bothered about that.
  • The responsibility you have for what travels over your link—e.g. illegal/unsavoury material.
  • Reducing your protection from hackers—this is why it is not for everyone.

I still don’t know which way to turn—which means I secure it for the time being.

^ Top