Tuesday, May 4, 2010

What Happened To The Soul Train Dancers

The 10 Immutable Laws of Security

what anyone with internet access has to know

Walking through the network, I have found these laws very friendly, every user and owner of a computer should know! Many people do not know that with a single executable downloaded from any website whatsoever, whether a game, program, movie, etc. .. doors may be opening for hackers and instrus in our system .. I leave here:



Law # 1: If a bad guy can persuade you to run the program it on your computer, it's not your computer.


the intruder or attacker typically will use the social engineering to convince run a seemingly "harmless", it tends to be through emails, electronic greeting cards, including any trojan or virus designed to damage .
Avoid downloading files from unknown sources and even some known contact hesitate to send any email out of the ordinary (I say this from experience), may have been the victim of an attacker already, and only this usurping their identity, avoid contact by other means not the same email.


Law # 2: If an attacker can alter the operating system on your computer, it's not your computer.


Close relationship with Act 1, as if somehow the attacker alters your computer's operating system, sorry but you lost. The operating system is metaphorically the "soul" of the PC, is one who performs and controls each process to be performed. Have access to all information stored on the computer it is the one who allows that interaction between the hardware and the user. To be altered the operating system is at the mercy of the attacker.


Law # 3: If an attacker has unrestricted physical access to your computer, it is not your computer.


common thing among the top 3 law is that your computer will no longer be yours. It sounds intimidating, but I think that this law applies double. If someone can physically access your computer is absolutely no longer your computer. It is a law that applies to everyone, but especially those using mobile devices such as laptops, Smartphone's, PDA's, etc where they store information. But anyone who can access your desktop PC can among many things, remove the hard drive (or drive) and take him stealing your information, which after all is most valuable for everyone.


Law # 4: If you allow an attacker to upload programs to your Web site, it ceases to be yours.


Very consistent this law with the freedom movement to share information. If you have a site you want to share with the world, limit or condition access to its visitors. Do not let it get on your Web site files unknown or dubious. This will download to your computer and your visitors and the first 2 laws took effect. Restrict your users and only allow privileges to their partners and not saboteurs.


Law # 5: Weak passwords against the security deposit.


The best security systems have been violated by the existence of users with weak passwords. As a network administrator from applying for its users to implement strong passwords that include special characters such as @ $ & # As well as uppercase and lowercase letters and numbers. Recommendation (External Embedding Disabled) is replacing letters with symbols or numbers. Eg, Password = P @ $ sW0rD and if they can see how strong it is, in sites such as Password Checker.



Law # 6: A machine is as safe as reliable as the administrator.


Poor but well-established practice is to let users and administrators of equipment or personal, or enter logearnos our teams with an account with administrator privileges. On this type of user has full control over the system on which it is working. Lets executing unknown and perhaps harmful to the system. I recommend that as we work on basic applications, Office, email, Internet, etc. do it with a standard user account and need to install something authentic, then we use our account manager.


Law # 7: Encrypted data is as secure as the decryption key.


Act 5 is jumping? Go back and read it because it is closely connected with this law. If our paranoia is such, and distrust of everything to the point that every file on your PC or email we send is coded properly and encrypted, but your decryption password is "weak" Have you lost your time and paranoia. Follow the recommendations of the Law 5.


Law # 8: An outdated antivirus is only slightly better than no antivirus virus at all.


Still have licensed the antivirus 3 or 6 months that came with your new pc ... 1 year?? Sorry but your PC is infected. The virus should be kept updated, if you have budgeted to buy one, find a free but get advice about their reputation. Keep your operating system updated online and use software referenced to know the vulnerabilities of your computer and its solution.


Law # 9: Absolute anonymity is not practical, nor in real life or on the Web.


Internet is full of forms that are intended to be filled by you with your real data. Be jealous of your information, anonymity does not take him anywhere, and less if a netizen recognized. Read the privacy statements hangouts, dude pop-ups that advertise themselves as the 1,000,000 user of the site, do not fill too many forms where personal data are "mandatory" unless you fully trust the site. Internet, like your city has some recommended areas for safety, avoid them.



Law # 10: The technology is not a panacea


is said that if something is not on Google it does not exist. The truth? Obviously not true, just a publicity stunt for this popular search engine. The technology provided countless benefits throughout the world, but the solution to their problems do not always find on the net, not everything is perfect, however there are also dangers, system errors, villains lurking, etc. . Try to have a 100% secure system is impossible, every day we can do "more" secure but there will always be who want to do some damage. The software we have installed is imperfect but it helps us in our activities, are imperfect and detectable virus but also get to make their dark activities. If you are a user of technology to ensure your system updated and common sense.

0 comments:

Post a Comment