USB 3.0 may still have a long way to go before
it becomes the speedy interface of choice for gadgets, but a sure sign that day
is fast approaching is the announcement of the first motherboard sporting USB
3.0 ports. Don’t get too excited about this though, as Asus has taken a
shortcut to getting….Tuesday, 26 March 2013
Gigabyte’s four new
AMD 785G-series boards with integrated DirectX 10.1 / UVD 2.0
Gigabyte MA-785GT-UD3H, click for larger
image. AMD took the NDA wraps off its 785G-series motherboards today. As such,
a host of benchmarks for the integrated on-board DirectX 10.1 support will
likely be found in all corners of the web. Technically speaking, the AMD 785G
chipset includes an enhanced on-board ATI Radeon HD 4200 graphics engine
Gigabyte’s four new
AMD 785G-series boards with integrated DirectX 10.1 / UVD 2.0
Gigabyte MA-785GT-UD3H, click for larger
image. AMD took the NDA wraps off its 785G-series motherboards today. As such,
a host of benchmarks for the integrated on-board DirectX 10.1 support will
likely be found in all corners of the web. Technically speaking, the AMD 785G
chipset includes an enhanced on-board ATI Radeon HD 4200 graphics engine
Wednesday, 13 March 2013
The world record for an over clocked processor currently stands at 8.429GHz and was set using an AMD FX-8150 Bulldozer chip. Getting to such high frequencies requires specialized cooling, and in that case the over lockers turned to helium as a solution. Yesterday, manufacturer Gigabyte set its own record by pushing an Ivy Bridge Core i7-3770K processor……
Thursday, 7 March 2013
Monday, 4 March 2013
Law #10: Technology Is Not A Panacea
Technology can do some amazing things.
Recent years have seen the development of ever cheaper and more powerful
hardware, software that harnesses the hardware to open new vistas for computer
users, as well as advancement in cryptography and other sciences. It’s tempting
to believe that technology can deliver a risk free world, if we just work hard
enough. However, this is simply not realistic.
Perfect
security requires a level of perfection that simply doesn’t exist, and in fact
isn’t likely to ever exist. This is true for software as well as virtually all
fields of human interest. Software development is an imperfect science, and all
software has bugs. Some of them can be exploited to cause security breaches.
That’s just a fact of life. But ever if software could be made perfect, it
wouldn’t solve the problem entirely. Most attacks involve, to one degree or
another, some manipulation of human nature this is usually referred to as
social engineering. Raise the cost and difficulty of attacking security
technology, and bad guys will respond by shifting their focus away from the
technology and toward the human being at the console. It’s vital that you
understand your role in maintaining solid security, or you could become the
chink in your own systems’ armor.
Law #9: Absolute Anonymity Isn’t practical, In Real Life Or ON The Web
Virus scanner
work by comparing the data on your computer against a collection of virus
“signatures”. Each signature is characteristic of a particular virus, and when
the scanner finds, data in a file. Email, or elsewhere that matches the
signature, it concludes that it’s found a virus. However, a virus scanner can
only scan for the viruses it knows about. It’s vital that you keep your virus
scanner’s signature file up to date, as new viruses are created every day.
The problem
actually goes a bit deeper than this, though. Typically, a new virus will do
the greatest amount of damage during the early stages of its life, precisely
because few people will be able to detect it. Once word gets around that a new
virus is on the loose and people update their virus signatures, the spread of
the virus falls off drastically. The key is to get ahead of the curve, and have
updated signature files on your computer before the virus hits.
Virtually every
maker of anti-virus software provides a way to get free updated signature files
from their website. In fact, many have “push” services, in which they’ll send
notification every time a new signature file is released. Use these services.
Also, keep the itself that is, the scanning software update as well. Virus
writers periodically develop new techniques that require that scanners change
how they do their work.
Law #9: Absolute Anonymity Isn’t
practical, In Real Life Or ON The Web
All
human interaction involves exchanging data of some kind. If someone enough of
that data together, they can identify you. Think about all the information that
a person can glean in just a short conversation with you. In one glance, they
can gauge your height, weight and approximate age. Your accent will probably
tell them what country you’re from, and may ever tell them what region of the
country. If you talk about anything other than the weather, you’ll probably
tell them something about your family, your interests, where you live, and what
you do for a living. It doesn’t take long for best bet is to live in a cave and
shun all human contact.
The
same thing is true of the internet. If you visit a website, the owner can, if
he’s sufficiently motivated, find out who you are. After all, the ones and
zeroes that make up the web session have to be able to find their way to the
right place, and that place is your computer. There are a lot of measures you
can take to disguise the bits, and the more of them you use, the more
thoroughly the bits will be disguised. For instance, you could use network
address translation to mask tour actual Ip address, subscribe to an anonym zing
service that launders the bits by relaying them from one end of the ether to
the other, use a different ISP account for different purposes, surf certain
sites only from public kiosks, and so on. All of these make it more difficult
to determine who you are, but none of them make it impossible. Do you know for
certain who operates the anonym zing service? Maybe it’s the same person who
owns the website you just visited! Or what about that innocuous website you
visited yesterday, that offered to mail you a free $10 off coupon? Maybe the
owner is willing to share information with other website owner. If so, the
second website owner may be able to correlate information from the two sites
and determine who you are.
Does
this mean that privacy on the web is a lost cause? Not at all. What it means is
that the best way to protect your privacy on the internet is the same as the
way you protect your privacy in normal life through your behavior. Read the
privacy statement on the website you visit and only do business with ones whose
practices you agree with. If you’re worried about cookies, disable them. Most
importantly, avoid indiscriminate web surfing recognize that just as most
cities have a bad side of town that’s best avoided, the internet does too. But
if it’s complete and total anonymity you want, better start looking for that
cave.
Law #8: An Out Of Data Virus Scanner Is Only Marginally Better Than No Virus Scanner At All
Virus scanner
work by comparing the data on your computer against a collection of virus
“signatures”. Each signature is characteristic of a particular virus, and when
the scanner finds, data in a file. Email, or elsewhere that matches the
signature, it concludes that it’s found a virus. However, a virus scanner can
only scan for the viruses it knows about. It’s vital that you keep your virus
scanner’s signature file up to date, as new viruses are created every day.
The problem
actually goes a bit deeper than this, though. Typically, a new virus will do
the greatest amount of damage during the early stages of its life, precisely
because few people will be able to detect it. Once word gets around that a new
virus is on the loose and people update their virus signatures, the spread of
the virus falls off drastically. The key is to get ahead of the curve, and have
updated signature files on your computer before the virus hits.
Virtually every
maker of anti-virus software provides a way to get free updated signature files
from their website. In fact, many have “push” services, in which they’ll send
notification every time a new signature file is released. Use these services.
Also, keep the itself that is, the scanning software update as well. Virus
writers periodically develop new techniques that require that scanners change
how they do their work.
Law #7: Encrypted Data Is Only As The Decryption Key
Suppose you installed
the biggest, strongest, most secure lock in the world on your front door, but
you put the key under the front door mat. It wouldn’t really matter how strong
the lock is, would it? The critical factor would be the poor way the key was
protected, because if a burglar could find it, he’d have everything he needed
to open the lock. Encrypted data works the same way on matter how strong the
crypto algorithm is, the data is only as safe as the key that can decrypt it
Many
operating system and cryptographic software products give you an option to
store cryptographic keys on the computer. The advantage is convenience you
don’t have to handle the key but it comes at the cost of security. The keys are
usually obfuscated (that is, hidden), and some of the obfuscation methods are
quite good. But in the end, no matter how well hidden the key is, if it’s on
the computer it can be found. It has to be after all, the software can find it,
so a sufficiently motivated bad guy could find not, too. Whenever possible, use
offline storage for keys. If the key is a word or phrase, memorize it. If not,
export it to a floppy disk, make a backup copy, and store the copies in
separate, secure locations. (All of you administrators out there who are using
Syskey in “local storage” mode you’re going to reconfigure your server right
this minute, right?)
Law #6: A Computer Is Only As Secure As The Administrator Is Trustworthy
Every computer
must have an administrator: someone who can install software, configure the
operating system, add and manage user accounts, establish policies, and handle
all the other management tasks associated with keeping a computer up and
running. By definition, these tasks require that he have control over the
computer. This puts the administrator in a position of unequalled power. An
untrustworthy administrator can negate every other security measure you’ve
taken. He can change the permissions on the computer, modify the system
security policies, install malicious software, add bogus users, or do any of a
million other things. He can subvert virtually any protective measure in the
operating system, because he controls it. Worst of all, he can cover his
tracks. If you have an untrustworthy administrator, you have absolutely no
security.
When hiring a system administrator,
recognize the position of trust that administrators occupy, and only hire
people who warrant that trust. Call his references, and ask them about his
previous work record, especially with regard to any security incidents at
previous employers. If appropriate for your organization, you may also consider
taking a step that banks and other security-conscious companies do, and require
that your administrators pass a complete background check at hiring time, and
at periodic intervals afterward. Whatever criteria you select, apply them
across the board. Don’t give anyone administrative privileges on your network
unless they’ve been vetted and this includes temporary employees and
contractors, too.
Next,
take steps to help keep honest people honest. Use sing in/sing out sheets to
track who’s been in the server room. (You do have a server room with a locked
door, right? If not, re read Law #3). Implement a”two person” rule when
installing or upgrading software. Diversify management tasks as much as
possible, as a way of minimizing how much power any one administrator has.
Also, don’t use the Administrator account instead, give each administrator a
separate account with administrative privileges, so you can tell who’s doing
what. Finally, consider taking steps to make it more difficult for a rogue
administrator to cover his tracks. For instance, store audit data on write only
media, or house system A’s audit data on system B, and make sure that the two
system have different administrators. The more accountable your administrators
are, the less likely you are to have problems.
Law #5: Weak Passwords Trump Strong Security
The purpose of
having a logon process is to establish who you are. Once the operating system
knows who you are, it can grant or deny requests for system resources
appropriately. If a bad guy learns your password, he can log on as you. In
fact, as far as the operating system is concerned, he is you. Whatever you can
do on the system, he can do as will, because he’s you. Maybe he wants to read
sensitive information you’ve stored on your computer, like your e-mail. Maybe
you have more privileges on the network then he does, and being you will let
him do things he normally couldn’t. Or maybe he just wants to do something
malicious and blame it on you. In any case, it’s worth protecting your
credentials.
Always use a
password-it’s amazing how many accounts have blank passwords. And choose a
complex one. Don’t use your dog’s name, your anniversary date, or the name of
the local football team. And don’t use the word “password”! Pick a password
that has a mix of upper-and lower-case letters, number, punctuation marks, and
so forth. Make it as long as possible. And change it often. Once you’ve picked
a strong password, handle it appropriately. Don’t write it down. If you
absolutely must write it down, at the very least keep it in a safe or a locked
drawer-the first thing a bad guy who’s hunting for passwords will do is check
for a yellow sticky note on the side of your screen, or in the top desk drawer.
Don’t tell anyone of them is dead.
Finally,
consider using something stronger than passwords to identify yourself to the
system. Windows 2000, for instance, supports the use of smart cards, which
significantly strengthens the identity checking the system can perform. You may
also want to consider biometric products like fingerprint and retina scanners.
Law #4: If You Allow A Bad Guy To Upload Programs To Your Website, It’s Not Your Website Anymore
This is
basically Law #1 in reverse. In that scenario, the bad guy tricks his victim
into downloading a harmful program onto his computer and running it. In this
one, the bad guy uploads a harmful program to a computer and runs it himself.
Although this scenario is a danger anytime you allow strangers to connect to
your computer, Website are involved in the overwhelming majority of these
cases. Many people who operate website are too hospitable for their own good,
and allow visitors to upload program to the site and run them. As we’ve seen
above, unpleasant things can happen if a bad guy’s program can on your
computer.
If you run a
website, you need to limit what visitors can do. You should only allow a
program on your site if you wrote it yourself, or if you trust the developer
who wrote it. But that may not be enough. If your website is one of several
hosted on a shared server, you need to be extra careful. If a bad guy can
compromise one of the other site on the server, it’s possible he could extend
his control to the server, itself, in which he could control all of the sites
on it-including yours. If you’re on a shared server, it’s important to find out
what the server administrator’s policies are. (By the way, before operating
your site to the public, make sure you’ve followed the security checklists for
IIS 4.0 and IIS 5.0.
Law #3: If A Bad Guy Has Unrestricted Physical Access To Your Computer, It’s Not Your Computer Anymore
Oh, the things a
bad guy can do if he can lay his hands on your computer! Here‘s sampling, going
from stone age to space age:
He could mount
the ultimate low-tech denial of service attack, and smash your building, and
hold it for ransom.
He could boot
the computer from a floppy disk, and reformat your hard drive. But wait, you
say, l’ve configured the BIOS on my computer to prompt for a password when I
turn the power on. No problem-if he can open the case and get his hands on the
system hardware; he could just replace the BIOS chips. (Actually, there are
even easier ways).
He could remove the hard drive from your
computer, install it into his computer, and read it.
He could make a
duplicate of your hard drive and take it back his lair. Once there, he’d have
all the time in the world to conduct brute-force attacks, such as trying every
possible logon password. Programs are available to automate this and, given
enough time, it’s almost certain that he would succeed. Once that happens, Laws
#1 and #2 above apply.
He could replace
your keyboard with one that contains a radio transmitter. He could then monitor
everything you type, including your password.
Always make sure
that a computer is physically protected in a way that’s consistent with its
value-and remember that the value of a computer includes not only the value of
the hardware itself, but the value of the data on it, and the value of the
access to your network that a bad guy could gain. At a minimum,
business-critical computer like domain controllers, database servers, and print/file
servers should always but you may want to consider protecting other computers
as well, and potentially using additional protective measures.
If you travel
with a laptop, it’s absolutely critical that you protect it. The same features
that make laptop great to travel with-small size, light weight, and so
forth-also make them easy to steal. There are a variety of locks and alarms
available for laptops, and some models let you remove the hard drive and carry
it with you. You also can use features like the Encrypting File System in
Microsoft Windows 2000 to mitigate the damage if someone succeeded in stealing
the computer. But the only way you can know with 100% certainty that your data
is safe and the hardware hasn’t been tampered with is to keep the laptop on
your person at all times while traveling.
Subscribe to:
Posts (Atom)