courtesy of Skinner and Elad
Here ya go
Introduction to Computer Security Threats
http://www.democraticunderground.com/discuss/duboard.php?az=show_mesg&forum=437&topic_id=72&mesg_id=91Introduction to Computer Security ThreatsThere is no guaranteed way to avoid computer security issues unless your machine is always completely isolated from the outside world. Whenever you connect to the internet, and whenever disks or drives that have been connected to other machines are used on your machine, there is a possible security issue. Dangers can be reduced substantially by your cautious behavior and intelligent use of existing security tools, but the risk cannot be eliminated completely. Possible problems include, for example, compromise of banking or credit card information or other personal data, unauthorized use of your machine for criminal purposes by third parties, and prankster vandalism of software programs on your machine
We focus here on free resources. Consider doing further research, as this Topic will not be exhaustive and may not be up-to-date
Computer Security, Defense-in-DepthSafeguarding your personal informationIt is easiest for someone to steal your important personal data (such as bank account numbers or credit card information) if you provide it to them. So do not post such information online. You should be careful when transmitting personal data by electronic methods such as emails, since eavesdroppers may be able to retrieve such information by intercepting parts of transmitted packets; it is preferable to transmit such data in a secure fashion. Also be aware that if you send personal data by email, even in a form you consider secure, it may reside in the recipient's inbox in cyberspace for an extended period; the longer it remains undeleted, or insecurely deleted, the more opportunity there is for someone to obtain it by hacking into the email system. Do not engage in any online banking or online purchase activities without first assessing the security of the transaction. Spammers have been known to spoof legitimate websites in order to collect private information. Some (but not all) efforts are painfully amateurish and obvious; others can be quite sophisticated. Hyperlinks may not actually point to the address indicated
PhishingRequests for your account information ('phishing' scams)Anti-Phishing Work GroupSPAMfighter: Free spam and phishing filter for Windows
Careless online purchases with disreputable companies can cause you major headaches. Amateurish webpages can be a warning sign. To reduce the risk of identity theft, be sure your credit card transaction is transmitted securely. Investigate unknown companies before engaging in business with them: reviews from other customers can be helpful; in general, these reviews may be more reliable when hundreds or thousands of reviews are available
Double-checking companiesBetter Business Bureau: Check Out a Business or CharityReseller ratings: Find a storeRipoff Report - disgruntled consumers, sometimes with company rebuttals
Complaints Board Preventing infection by viruses and malwareYour browsing habits, choice of browser and browser settings, use of anti-virus and firewall software, and choice of operating system can all affect your risk of being infected by viruses or worms, your chance of installing malware and trojans, and the possibility of malevolent control of your machine by third parties. If you have a network connected to the web, protect it appropriately. A wireless network (for example) should be protected by a secure password, so that unauthorized persons cannot connect to it. Downloading material from the web is not a risk-free activity. The risk presumably increases if you download free material from nonstandard sites and increases even more if the material is pirated. However, some viruses have also spread through mass-produced CDs or similar commercial products. As a general rule, do not click links in unexpected emails
A number of anti-virus and firewall products are available. Some of these may be provided with operating systems; some can be obtained for free; and some are pay-to-use commercial products. When using such products, it is important to keep them up-to-date
Unfortunately, however, there are also various scams involving nonfunctional "security programs" designed to obtain your money or credit card number. A common scam involves malware that is downloaded to the user's computer during websurfing; the malware later displays a pop-up window indicating that a virus has been found and encouraging the user to buy a particular "antivirus" product. The call-to-purchase may be reinforced by increasingly frequent pop-up windows that can render normal computer use impossible. The malware can sometimes be difficult to remove. Examples include
MS Antivirus and
AntiVirus Pro 2010 (which masquerades under
dozens of different names)
Anti-Virus GuideFreebyte's Guide to Free Anti-Virus SoftwareSuperAntiSpyware Free EditionWeb of TrustOnline help forumsBleepingcomputerGeekPoliceGeeksToGoOperating System Specific AdviceAs a rule of thumb, one expects the most popular operating systems to a more frequent target of malicious software. So there is some advantage to using (say) a Linux distro or OS X instead of Windows, since the majority (but not all) of software threats are directed against Windows
Users do not uniformly agree about whether anti-virus programs are worth the effort to protect Linux and OS X systems; however, if you use Linux or OS X in a work environment where filesharing is necessary, it may still be prudent to take some precautions, especially if you share files directly or indirectly with Windows system users, in order to avoid the possibility of transferring a virus to another machine
LinuxLinux firewalls for newbiesAvira AntiVir: free antivirus
AVG Anti-Virus Free Edition 8.5 for LinuxClamAV: Unobtrusive Anti-Virus for Linux
GUFW: GUI for ufw firewall
OS XUnder the Security tab, Snow Leopard offers a firewall that can block all incoming connections. At a lower level of security, it can also be set to allow or disallow software to receive connections with a security certificate and to allow "stealth mode" browsing so that the computer does not respond to pings and similar connect attempts. It is also possible to use secure virtual memory
Macintosh Internet Security GuideApple security updatesMac OS X Security Checklist (U Illinois advice)New Mac Security News (SecureMac)ClamXaviAntiVirusWindowsMicrosoft Security EssentialsMicrosoft Security TechCenterMicrosoft Malware Protection CenterWindows Defender (Microsoft)SafeXP (free version) - adjust XP security and privacy settings
Pros and Cons of Windows 7 SecurityActive Scan: online infection scan for Windows and IE or Firefox
ESET: free online scan
F-Secure Online Scanner: Requires browser plug-in
HouseCall: online virus and worm scan for Windows (small download required)
Threat Scanner: online virus and malware scan for Windows and IE
Belarc Advisor - Free Personal PC Audit avast! Home EditionAvira: free and commercial tools
AVG Anti-VirusFree Virus Removal Tools (BitDefender)Panda Cloud Antivirus Comodo Free Firewall and AntiVirusMalwarebytesIobit Security 360 Free:malware/spyware scan
Superantispyware (free edition)SpywareBlasterZoneAlarmZoneAlarm 3rd Party GuideSecunia Personal Software InspectorCompletely removing unused programs and old files may also help reduce vulnerabilitiesCcleanerRevo Uninstaller (freeware)Online Testing of OS SettingsShieldsUP!: attempts port scans and reports the results
RootkitsSophos Anti-Rootkit Rootkit Buster (TrendMicro)Antirootkit.comDNS issuesTo access an address such as "
http://democratic.underground," it is necessary to reference an online dictionary (the DNS) and then look-up a numerical version of the website name, indicating how to find the website. Master copies of the DNS are widely recopied for local use
In principle, it is possible to corrupt these dictionaries and to send the websurfer off to a phony site. The fact that you see the expected domain name in your browser navigation window is not necessarily proof that you have navigated to the expected website: this can happen if the DNS server you are using has a poisoned cache. Security certificates should therefore be taken seriously. For the same reason, you may want to be cautious about using software that promises to connect you to the fastest DNS available, if you cannot ensure connection to a DNS secure from cache poisoning
An Illustrated Guide to the Kaminsky DNS VulnerabilityOpenDNSGoogle Public DNShttp://code.google.com/p/namebench/">namebench - open source DNS benchmarking, checks cache poisoning vulnerability by querying a service
Browser Specific AdviceBecome familiar with security setting options for your browser. Current versions of some common browsers (such as Internet Explorer, Foxfire, and Safari) allow the user to automatically block known malicious sites, including phishing sites
Keep your browser software updated and realize that add-ons and plug-ins can introduce security gaps
Understanding the Web browser threatComparison of web browsersOne Security Prediction for 2010Comparison of web browsersChromeAttempts to limit security threats by sandboxing
FirefoxAllows control of Java and Javascript in Preferences
GhosteryFirefox addon notifies about webpage spying
NoScriptFirefox addon prevents executable content in webpages unless allowed by user
Known Vulnerabilities in Mozilla ProductsVendor information for Firefox, SeaMonkey, and Thunderbird
OperaAllows control of Java and Javascript in Preferences or by checkboxes in the chrome
SafariAllows control of Java and Javascript in Preferences
Wi-Fi Security7 tips for working securely from wireless hotspots (MicroSoft)How do I stay safe in an internet cafe?Practical Wi-Fi security (HP)Best Security for Wireless NetworksTop Ten Free Wi-Fi Security Test ToolsPacketProtector -
"WARNING- installing third party firmware (like PacketProtector) will void your warranty"Nasty New Worm Targets Home Routers, Cable ModemsThe Chinese Google Hack (January 2010)This attack involved sending emails with links to targeted employees at various companies. Clicking the link downloaded sophisticated malware that exploited vulnerabilities in Internet Explorer and perhaps also in several Adobe products
Operation “Aurora” Hit Google, Others (McAfee)Microsoft Security Advisory (979352)Microsoft Security Advisory (979267)How to protect yourself against the Chinese Google hack (ComputerWorld)German Government: Stop Using Internet ExplorerAdobe Reader and Acrobat ... APSA09-07 Further Reading:
The Difference Between a Computer Virus, Worm and Trojan HorseVirus, Spyware and Trojan RemovalCyberTech: Malware Removal Forum: Read the stickies and follow the instructions
Major Geeks: Malware Removal GuideGeeks to Go: Malware and Spyware Cleaning GuideRansomware: Extortion via the InternetSpywareHow Spyware WorksSpybot Search and DestroyHow to Detect and Remove Annoying Spyware/Adware (SecureMost)The Best Security Suites for 2009: PCMag's take on security software
15 Free Security and Backup Utilities (PC Mag)Common Windows PC Issues: Tips to Diagnose and fix a slow running computerDSLReports: Security ForumOnline DatabasesThreat Explorer (Symantec)Threat Encyclopedia (Trend Micro)Security analyses (Sophos)Virus Encyclopedia (CA)Secunia AdvisoriesVirusListSome Recovery ToolsGuide to Saving your Windows System with Thumb Drive (Lifehacker)Put System Rescue CD on USB using WindowsCreate multiboot rescue USB flash drive