Don't get trapped by Rogue Anti-Spyware software!

Written by Richard Rossbauer

Continued from page 1

Before spending that amount of money for a suspicious product, I did a Google search for ["Name of Anti-spyware program" + Avoid].

Yes! It was shown as Rogue/Suspect Anti-Spyware(*) at along with another 199 similarly suspicious offerings, and advice on how to avoid being duped or robbed by False Positive findings.

(*)"Rogue/Suspect" means that these products are of unknown, questionable, or dubious value if used for anti-spyware protection.

Spyware Warrior is a great website to bookmark for future reference. Here's a link:

These arerepparttar programs I used to confirm my suspicions. None foundrepparttar 146106 four infiltrators:

Spybot S&D,AdAware, Xoftspy, Xcleaner, CWSshredder, HijackThis, AVG, and ErrorNuker.

It's possible thatrepparttar 146107 Suspect anti-spyware program would have removed them.

I wasn't going to take that gamble. It's bad enough that spyware and adware are disabling millions of home computers. Exploiting this epidemic with fake programs that claim to remove these pests for an exorbitant fee, but might not, is unscrupulous and unconscionable behavior.

Richard Rossbauer started his "Firewalls and Virus Protection" website and "Security Alert News Reporter" to help everyday Internet users navigate safely through the Cyber Space that has become a 'Cyber Jungle', loaded with ambushes and booby traps. He promotes his "Computer Security Awareness Campaign" thru his Blog and website at

How Will Your Network Be Compromised?

Written by Darren Miller

Continued from page 1

Important, and sometimes critical documents left on web servers. Information that only internal or technical people should have access to;

Poor password and authentication policy. Users using weak passwords to access accounts, especially remote access devices that are present onrepparttar Internet;

Test servers thatrepparttar 143157 have been forgotten about and are still present onrepparttar 143158 Internet;

Poor network border architecture For instance; installing a firewall and forgetting that there are other network that need to be protected or should be placed behindrepparttar 143159 firewall.

The above is just a handful of "Little Things" that get overlooked and can result inrepparttar 143160 undoing of your networks security measures.

As an example; Many organizations provide their internal and external customers with a public FTP service. Most times, this is done to allow people to easily post "non-critical" or public information and share it with other associates.

Recently, I identified just such an FTP server. The server allowed anonymous logons, however it contained sub-directories that were secured. These secure directories were only accessible byrepparttar 143161 people who ownedrepparttar 143162 account. It was obvious to me that I was not going to easily compromise these accounts. Onrepparttar 143163 other hand, sitting right inrepparttar 143164 anonymous "root" directory was a .zip file that was rather large. I downloadedrepparttar 143165 file, which took quite a while, unzipped it on my desktop, and guess what it contained? It was a compressed file ofrepparttar 143166 entire FTP server, including repparttar 143167 secure directories.

I would bore you with what I found within these directories. The bottom line is, I should have never had access torepparttar 143168 information they contained.

Conclusion ---------- The bottom line is this; it really isrepparttar 143169 little things that will come back to haunt you when it comes to computer security. No system should ever be rushed into production. This is one ofrepparttar 143170 most common causes for poorly secured systems. The team in charge of implementing new technology needs to be educated on how to securely deploy new systems. And if you are installing support software from outside vendors, make sure you thoroughly review their products security features. Also, make sure they fully disclose any known bugs or improperly functioning features.

Darren Miller is an Information Security Consultant with over sixteen years experience. He has written many technology & security articles, some of which have been published in nationally circulated magazines & periodicals.

    <Back to Page 1 © 2005
Terms of Use