Network Security guide for the home or small business network – Part 4 – Know your software



Ok, so you’ve got a hardware firewall and you’ve got antivirus. You’re safe right? Well, not entirely. I’ve mentioned the flaws of antivirus. It’s always a step behind. A firewall doesn’t protect against unknown viruses, so what else is there to do? I’m going to tackle this in two steps. The first is to know what software is running on your system. Isn’t there a lot of that? How can I keep up?


Take an inventory of what software you typically use. Email program (maybe outlook express), web browser (internet explorer), are there any programs that you’ve given permission to listen for remote access on? (telnet servers, web servers, ssh servers, ftp servers???) inventory everything that either you run, or you have allowed through your firewall.

Beyond that, I would suggest you take a good look at the programs that run when your computer boots. (ctrl-alt-del should give a list of running processes under windows.) *(msconfig gives you options to control things starting at boot under windows). Identify what each one is. Search online, get an idea of what is “normal” for your system. systray is normally running for instance, explorer, make a list and make sure you know what they are. You don’t have to know what they DO, just identify them as “friendly”.

When I see an infested system, one of the first things I do is skim the msconfig list of what will run at startup and the ctrl-alt-del list of what IS running to see what looks safe and what might be questionable. Anything that I can’t identify I consider suspect and disable until I see evidence that it may be legit. In other words if a web search doesn’t turn up a conclusive “it’s ok”, I disable it. One problem is that I rarely know what is normal for the specific system I’m looking at. Yes, there are some things that are generic to most any windows system, others that I commonly run across, but some, more obscure, programs may look suspicious to someone unfamiliar with the system.

So, know what you run and use on a frequent basis and know what your computer loads at startup and is normal. Also, know if you’ve allowed any program to actively listen for connections as a server from your pc. (FTP server, http server, etc.)

Related Posts

Blog Traffic Exchange Related Posts
  • How to Remove PC Scout | PC Scout Removal Guide PC Scout is another rogue application with a similar look and feel to the Windows Security Center. (It's also apparently a clone of the same family as ActiveSecurity (ActiveSecurity Removal) It likely installs through malware and the use of web popups. Once it's installed on your system it tries to......
  • More on Explorer vulnerability Among other things... Sans has lowered the infocon to green, NOT that the threat is diminished, but there have been no new developments with regards to the announcement yesterday of a major Internet Explorer security vulnerability. Sans recommends browsing the web with firefox (with the noscript extension, so you can......
  • Vista UAP (User Account Protection) - too much? First let me tell you I have not seen first hand Microsoft's Vista UAP (User Account Protection) I cannot then claim firsthand experience with it, the following is and will be based on what I have read plus how it relates and compares to linux and "run as" functionality. George......
Blog Traffic Exchange Related Websites
  • Making the Most Out of Competition by Running for Charity Charity is alive and well in the modern culture. This is seen in the donation drives as well as the charitable events which are held every day. For those who are into running, there are many ways you can do your part by running for charity. While some people will......
  • The Secret to Running Marathons Like a Pro Marathons are run in every city. There are some more popular than others. Each offers its own challenges for the participants. No matter what skill level the marathon you are looking to enter, you are sure to want to perform well. This means doing much more than just crossing the......
  • Deciding On The Correct Server For Webcast Hosting Service Webcast hosting services are essential for your webcast success. Picking a webcast hosting service isn't an uncomplicated decision, simply because hosting a webcast is extremely resource-intensive. Not due to the fact the bandwidth use is rather high, but the processor of the webcast-hosting server is under good load, because it'll......
www.pdf24.org    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Leave a Reply

You must be logged in to post a comment.


Switch to our mobile site