How Safe is Your Success? Part 2 of 8

Written by Bill Hely


"How Safe is Your Success" is a series of eight articles. Each article addresses a different aspect of a universal problem which is of particular importance to those who do business on-line. Most Internet users are at least aware there are dangers "out there", but few appreciaterepparttar real extent of those dangers,repparttar 103504 possible (even likely) consequences, orrepparttar 103505 best, most practical and least expensive means of countering them. This series is intended to at least provide some useful awareness ofrepparttar 103506 situation.

-------------------------

Part 2 – Shoring Up Your Browser

In Part 1 of this series I gave you some "homework" reading. If you followed up on that recommendation you have already had a glimpse of some ofrepparttar 103507 things we'll discuss in this part. If you didn't do so back then, I urge you to read that article before continuing: http://hackersnightmare.com/FreeContent/Browser_Wars.pdf

Now, there simply isn’trepparttar 103508 space available here to get intorepparttar 103509 specifics ofrepparttar 103510 various browser brands and versions so, where specifics are at all necessary, I'm going to restrict this article to Microsoft's Internet Explorer. Despiterepparttar 103511 inroads made by competitors such as Mozilla Firefox, Internet Explorer is stillrepparttar 103512 choice (even if by default) of 90% ofrepparttar 103513 worlds Internet-using population. No matter whose survey figures you choose to believe, it's somewhere around that number. Even so, whilerepparttar 103514 fine detail may differ,repparttar 103515 general warnings and recommendations herein apply to all browser brands.

As computer programs become more and more complex,repparttar 103516 likelihood of errors somewhere inrepparttar 103517 thousands – even millions – of lines of programming code becomes so high as to be almost guaranteed. Obviously it is thus essential that there be some way to correct any errors that may be discovered afterrepparttar 103518 program has been released. The method of doing so is referred to as "applying patches and/or updates". Broadly speaking, we can say that patches fix "broken things", while updates add new functionality. In either case it is usually a simple process of downloading a small corrective file and running it to applyrepparttar 103519 fix/update torepparttar 103520 main browser program.

Unfortunately, if they think about it at all, millions of browser usersrepparttar 103521 world over takerepparttar 103522 position "if it works, why mess with it?". Their browser gets them aroundrepparttar 103523 Internet and that's all they want of it. But they are giving no thought to what is happening behindrepparttar 103524 scenes; to what advantage is being taken ofrepparttar 103525 "broken things" they haven't bothered to patch.

A great example ofrepparttar 103526 dangers of such complacency can be found in a short article from USA Today that is actually more to do with firewalls (which we will look at in Part 7 of this series). I urge you to read this article now, paying particular attention torepparttar 103527 fact thatrepparttar 103528 malicious exploits mentioned were all targeted at, and made possible by, known flaws in Internet Explorer – flaws for which a patch was available but had not been applied. Please do read this article before continuing: http://hackersnightmare.com/FreeContent/Other/HoneyPots.pdf

Patches were available to plugrepparttar 103529 holes that were exploited byrepparttar 103530 MS Blaster and Sasser worms (as described inrepparttar 103531 above article) even before those attacks took place. It wasrepparttar 103532 sheer number of unpatched Internet Explorer installations globally that allowed those very costly and near-catastrophic attacks to take place at all. Instead of going off with a bang that was heard aroundrepparttar 103533 world and echoed in allrepparttar 103534 mainstream media, they should have resulted in nothing more than a fizzle.

Internet users who don't patch their Windows Operating System and browser regularly are doomed to get infected. If you have an always-on broadband connection, then make that a guarantee. The really insidious thing about all this is that you often will not even know that someone or some thing has squirreled away inside your computers. Only if you are lucky will you be alerted by "strange things" happening or some sort of obvious problem. But be aware an infection can be more akin to a slow cancer – invisible but "deadly" to your safety, your security and possibly to your bank account. Your files can be altered and your precious data browsed by strangers without your knowing anything about it.

How Safe is Your Success? Part 5 of 8

Written by Bill Hely


"How Safe is Your Success" is a series of eight articles that address different aspects of a universal problem which is of particular importance to those who do business on-line. Most Internet users are at least aware there are dangers "out there", but few appreciaterepparttar real extent of those dangers,repparttar 103503 possible (even likely) consequences, orrepparttar 103504 best, most practical and least expensive means of countering them. This series is intended to at least provide some useful awareness ofrepparttar 103505 situation.

-------------------------

Part 5 - Phishy Tales

The word "phishing" has become something of a buzz word, yet many casual Internet users still do not know what phishing really is or how to identify it. In this part of our series I'm going to use a simple but actual email to demonstraterepparttar 103506 most common form of phishing. But first, a bit of background.

Computer and technology dictionary Webopedia.com defines phishing as "The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scamrepparttar 103507 user into surrendering private information that will be used for identity theft." Onrepparttar 103508 origin ofrepparttar 103509 word, Webopedia says "Phishing, also referred to as brand spoofing or carding, is a variation on 'fishing',repparttar 103510 idea being that bait is thrown out withrepparttar 103511 hopes that while most will ignorerepparttar 103512 bait, some will be tempted into biting".

OK, but how do you distinguish between a phishing eMail and a real message from, say, your bank or credit card provider? A phishing message may look very legitimate, with allrepparttar 103513 right logos and so on. Even most ofrepparttar 103514 links may berepparttar 103515 real thing. Although there are often tell-tales such as poor spelling or bad grammar, many examples of this scam do appear to be perfect in every respect. The only way to see what is really going on is to look "underrepparttar 103516 covers".

Whatrepparttar 103517 scammer is trying to do is get you to click on a link that will take you to a website which is different torepparttar 103518 one you think it is going to take you to. At this dummy pagerepparttar 103519 scammer will try to get you to enter sensitive information such as credit card or on-line banking details.

With plain text emails, what you see is what you get. If a link says "www.CitiBank.com" then that is exactly where it will take you. But all is not so transparent withrepparttar 103520 links in a HTML email. With HTMLrepparttar 103521 only way to tell where a link will really take you is to look atrepparttar 103522 HTML code that underliesrepparttar 103523 message. And "No", you cannot tell by hovering your mouse cursor overrepparttar 103524 link and looking atrepparttar 103525 status bar. The status bar message can be faked very easily.

All eMail client programs of which I am aware provide some means for you to look atrepparttar 103526 HTML code. In Outlook, for instance, you can right-click onrepparttar 103527 body ofrepparttar 103528 message and select "View Source" fromrepparttar 103529 pop-up menu. I've selectedrepparttar 103530 scam eMail I'm going to use because it is a very simple example without too much HTML code to complicaterepparttar 103531 picture. The original eMail as it appeared in Microsoft Outlook can be seen here: http://HackersNightmare.com/FreeContent/Other/phishing1.jpg

In a moment I'll show yourepparttar 103532 HTML code associated with that eMail. Don't worry if you don't understand HTML code at all – I'll explainrepparttar 103533 few important parts. But first, just a bit of general information to help you make sense of what you see.

In HTML code, anything that is between is called a "tag". A tag isrepparttar 103534 actual code that tellsrepparttar 103535 web browser how to displayrepparttar 103536 message text. In this simple example there are only a few tags in use, and only one of them is very important to us. The tags in use inrepparttar 103537 example email are:

repparttar 103538 equals (=) sign will berepparttar 103539 location of an image that is to appear at this point onrepparttar 103540 page. The tag must then be "closed" with a right-angle bracket >. See Lines 1 and 2.

<.BR> A line break. Several together is a series of line breaks. E.g. line 3. NOTE: The dot before BR is not part of a real HTML Tag. It is inserted so some editors will not interpretrepparttar 103541 text as a real Tag.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use