ONLINE SECURITY WITH PUPPY 5
Terry Ritter
ritter@ciphersbyritter.com
2010 November 21
Using free Puppy Linux instead of Microsoft Windows
makes common equipment safe for online banking.
INTRODUCTION
The vast majority of home computers run Microsoft Windows
and are not very secure, even with extensive anti-virus add-on
programs.
Those same computers can be made vastly more secure, essentially
for free, by using a Puppy Linux LiveDVD, at least when banking.
And Windows would still be available, when desired.
THERE IS A PROBLEM: Malicious software can and does infect
personal computers
to steal from online bank and brokerage accounts, and to steal
identities and online bandwidth.
Exceedingly clever and advanced malware cannot be stopped by
firewalls, anti-virus or other features, and infections may not
even be detected.
Trying to "harden" a Windows installation is increasingly
irritating, decreasingly effective, and the consequences of
failure can be devastating:
Your online bank simply cannot distinguish between "the real you"
and a malware "bot" infection inside your computer, even with
modern "2-factor" "one-time" and external "dongle" authentications.
THERE IS NOT ALWAYS A SOLUTION: Malware exploits holes in
security-unconcious Web standards.
Our Swiss-cheese standards are so intertwined with modern technology
that a fundamentally secure approach would require changing every
computer and every web site.
Standardized weakness applies to all Web browsing platforms: desktop,
laptop, netbook, smart phone, tablet and whatever comes next.
Antivirus scanning cannot guarantee to detect a modern bot infection.
THERE IS AN OBVIOUS TARGET: About 91 percent of browsing is
done from Microsoft Windows, and attackers will exploit anything
and anybody to get at that market.
The vast majority of malwares are designed to run only in a
Windows environment, so most malware can be avoided simply by not
using Microsoft Windows online.
New cross-platform malwares can be avoided by also not using Java
(JavaScript is not Java).
Not everyone can avoid using Windows and Java applications online,
and not everyone wants to, but stepping away from the target is a
move in the right direction.
THERE MAY BE A SOLUTION FOR YOU: You can prevent malware
infection provided you can boot your operating system from
an optical drive.
Malware "infects" by changing the "boot" or run-up data to restart
malware on each session.
Infection can be prevented by booting from a DVD, which is inherently
"difficult or impossible" to infect.
Currently, the best solution seems to be Puppy Linux:
- By using free Puppy Linux booted from DVD, every reboot starts a
clean, uninfected system.
- By immediately jumping into Firefox, the complexity of Linux is
avoided, while providing a familiar and stable browser experience.
- Puppy Linux is unique among LiveDVD packages in providing an
easy way to update the boot DVD with browser updates and
configuration changes.
I EXPLAIN HOW: The Puppy Linux process is exposed in detail.
Serious online security is made available to anyone willing to
follow directions, provided only that they have a computer with a
DVD-writer optical drive.
Setting up a Puppy LiveDVD the first time may take 3 or 4 hours, but
every time it starts it is bot-free.
Serious security means re-booting Puppy and going directly to a
financial site, without first reading email or browsing.
A configured Puppy DVD can be replicated in 5 or 10 minutes, and
may work with only minor changes on different machines.
I. MAKE A PUPPY DVD
You cannot just buy a configured Puppy Linux LiveDVD, but
you can make one yourself, by following reasonable choices
described here.
These lists only seem overwhelming.
Most steps are a single keypress.
You are not going to "blow up" your computer by making a DVD.
If you use the recommended DVD+RW discs and screw up, you can erase
the DVD and try again with no loss.
Nobody need know.
If you want, you can still go back to the original Windows system,
which this process does not modify.
FIRST: Find and Download Lucid Puppy 5.1.1
- From Windows, go to one of the Puppy repositories, such as:
- You are looking for the ISO file "lupu-511.iso".
- The file "lupu-511.iso" (129MB) may be in a subdirectory such as
"puppy-5.1.1" as just one of various files.
- Typically, a left-click on the "lupu-511.iso" entry will prepare
to download the file.
- Have the download file placed where you can find it later.
II. BURN PUPPY ISO TO DVD
Now we have the "lupu-511.iso" file, which is an "ISO" type of file.
An ISO file is just the raw sequence of bytes recorded on a CD or DVD.
The ISO "image" includes both the files and the file structure
which names and locates those files.
For Puppy use, I recommend DVD+RW discs which seem somewhat more
reliable than other types.
(You do need a DVD writer which supports DVD+RW, of course.)
If you make a mistake, you can erase a DVD+RW and start over.
To burn an ISO from Microsoft Windows, you might try CDBurnerXP:
To use CDBurnerXP:
- Run the install.
- Run the program.
- Select the "Burn ISO Image" subprogram.
- At "Select ISO image to burn:" browse to the lupu-511.iso file.
- For "Burn method:" use "choose automatically"
- UNselect "DVD high compatibility"
- UNselect "Mode2XA instead of Mode1" (Mode1 has better error-correction)
- UNselect "Finalize disc" (allows multi-session saves)
- Select "Verify data after burning"
The resulting burn, with a DVD+RW at 4x speed, with verify, completes
in about 1min 20sec.
III. BOOT PUPPY, CONFIGURE, INSTALL FIREFOX, SAVE TO DVD
Some Things to NOT Install
When used for security, Puppy Linux should not be installed
to a hard drive or a USB flash drive, but should instead boot from
DVD on every session.
Easily-writable boot drives are easily infected.
The Linux program "Wine" which emulates Microsoft Windows should
not be installed.
Wine has gotten good enough to support a range of Windows malware,
which is precisely what we are trying to avoid.
Similarly, the "Java" system also should not be installed,
unless absolutely required.
("Java" is not the same as "JavaScript" which is part of the browser
and is tamed by the Firefox add-on "NoScript".)
Java is extremely dangerous because it expands the 1 percent Linux
group (thus, not a target) to the 97 percent Windows + Mac + Linux
group (absolutely a target) which may have Java.
It is not enough to disable Java in the browser or in NoScript;
Java should not even be present unless you cannot work without it.
Tell the BIOS To Boot a CD
The BIOS (Basic Input / Output System) is the computer program
in control before an operating system is loaded or "booted."
Basically, the BIOS goes down a list of devices to see if they
hold a bootable OS to load.
The first thing found that can be loaded, is loaded, and becomes
the computer OS for that session.
Normally, we want the "first boot device" to be "CDROM".
The idea is to boot from a CD or DVD when one is present, and
otherwise boot from the hard drive.
To enter the BIOS, restart the computer and watch for the message
about which key to press to enter the BIOS.
Often this will be Del (the delete key), but may be F1 or F2 or even
something else.
Press the key very quickly, or restart and try again until a BIOS
configuration screen opens.
Find "Boot / Boot Device Priority" or
"Advanced BIOS Features / First Boot Device" or "Boot Sequence",
and change the first entry to "CDROM".
Move subsequent entries down, including the hard drive entry,
"HDD" or "Hard Drive" or "Hard Disk".
Then save changes and exit, which will start a reboot.
For BIOS help, see:
Boot Puppy and Configure
Put the Puppy DVD in the DVD reader, close the tray and
restart the computer.
This is a tested, working example for my particular
equipment--do not follow it blindly!
- WAIT to Configure Internet
On my systems, Lucid Puppy sets up a wired (CAT5) Internet
connection automatically, and I have not tried to set up Wi-Fi.
However, some sort of Web connection will be needed to download a
video driver and also Firefox.
Ideally one would plug in by wire to get things going before
taking on a Wi-Fi configuration.
- on the desktop, click connect
- click on internet by network or wireless LAN
- select an interface (like eth0) and click
- click on Auto DHCP (connection succeeds)
- save configuration
- click Done to move on
- Set Up Firewall
- follow Menu / Network to Linux-Firewall firewall and click
- select OK, press Enter (confirm default install)
- press Enter to move on
- Install Intel Graphics
- on the desktop, click quickpet
- select "Drivers"
- click Xorg High icon (download occurs)
- click OK to confirm install
- follow Menu / Shutdown to Restart X Server and click
- Click the "Classic Configuration Experience" icon on the first startup panel
- select "us" keyboard layout and press Enter
- select "US/Central timezone" and "OK" then press Enter
- select "Local" time and press Enter
- select "Probe" (video display) and press Enter
- select 1024x768x24 or 1280x800x24 and "TEST", then press Enter
- select "TEST_X_NOW" and press Enter
- use control-alt-backspace to recover, if necessary
- select "FINISHED" and press Enter to move on
Install Firefox
- Get Firefox
- on the desktop, click quickpet
- select Internet Pets
- click on Firefox icon (download occurs)
- click OK to confirm install
- Update Firefox
- on desktop, click browse to start Firefox
- in Firefox, follow Help to select "Check for Updates"
- click "Update Firefox" (download occurs)
- click "Restart Firefox"
- click "Restart"
- Update Flash
- on Firefox update screen, click on "Update Adobe Flash Player"
- select Linux version ".deb for Ubuntu..."
- click "Download Now"
- click OK to confirm "Open with" petget (download occurs)
- click "OK" to confirm install
Save to DVD
- Save Changes to DVD+RW, then Reboot
- follow Menu / Shutdown to Power-off computer and click
- select "SAVE TO CD" then press Enter
- select "SAVE" then press Enter (save occurs)
- select "OK" and press Enter to power down
- wait 5 seconds then restart computer
- Puppy comes back up
IV. INSTALL SECURITY ADD-ONS
Firefox add-ons provide security features which other
browsers do not have.
When other browsers get those features, or similar add-ons,
then we can discuss whether they are as secure as Firefox.
- on desktop, click browse to start Firefox
- in Firefox, follow Tools to "Add-ons" and click
- select "Get Add-ons"
- search for and select each desired add-on and download into
Firefox:
- if not updated on Mozilla, go to author's site for the
latest version
- if apparently unavailable, keep looking. If necessary,
use a general Google search for "Firefox addon" and the add-on
name to find it somewhere on the Mozilla site.
- click "add to Firefox..." (site contacted)
- after a delay, click "Install Now" (download occurs)
- WAIT! do not click "Restart Firefox" just yet
- it is faster to add all desired add-ons before restarting Firefox
- at least get important / security add-ons, shown in bold
- Adblock Plus -- hide ads to improve speed
- BetterPrivacy -- clear Flash cookies and DOM storage
- Cert Viewer Plus -- certificate viewer enhancements
- Certificate Patrol -- track certificate changes to
expose SSL man-in-the-middle
- CipherFox -- show current cipher and keysize
- CoLT -- allow selecting link text, location, or both
- Cookie Monster -- control cookies
- CopyAllUrls -- save tab URL's as text, recover tabs from text
- Down Them All -- fast download manager
- Extension List Dumper -- save add-on names as text
- JSView -- expose external stylesheets and JavaScripts
- Google Docs Viewer -- view .PDF files safely
- LastPass -- cross-platform syncing encrypted passwords in the cloud
- MD5 Reborned Hasher -- check hash in normal downloads
- MultipleTabHandler -- close multiple tabs
- NoScript -- whitelist for scripts, XSS protect, etc.
Options / Advanced / HTTPS can demand an SSL
connection and block a site otherwise.
- NoSquint -- page and text sizing per site
- PageDiff -- show differences between HTML pages
- Perspectives -- notaries expose SSL man-in-the-middle
- Safe -- colored outline around SSL pages
- Save Complete -- File / Save Page As... improved
- SearchMenu -- fast dictionary, thesaurus (keep disabled until needed)
- Shooter -- capture screen or entire page as graphic
- ShowIP -- show page IP address
- SSLPasswdWarning -- warns when sending password w/o SSL
- Tab Mix Plus -- tab setup / crash protect (also Bookmark All Tabs)
- Uppity -- URL up-one-level
- URL Tooltip -- expose link URL with mouse
- WOT -- (Web Of Trust) danger colors on search result links
- each can be uninstalled or just disabled later from Firefox Tools / Add-ons...
- when done, on the Add-ons panel, click "Restart Firefox"
- when Firefox comes up:
- use Tab Mix Plus Session Manager
- click "No Thanks" on LastPass
- click "Enable only Multiple Tab Handler's Features"
- click "Decline" on WOT
- in the browser, select the Adblock Plus page and click "Add Subscription"
I have once had Firefox lock up before all add-ons installed.
In response, I started the process manager from
Menu / System / System Status and
Config / pprocess process manager.
Then I selected the bottom-most Firefox process and clicked
"End process" which killed the remaining Firefox window on the
desktop.
Subsequently clicking the desktop "browse" started Firefox again which
then continued from where it left off.
This appears to be rare Firefox issue.
Nothing was lost.
V. CONFIGURING FIREFOX AND ADD-ONS
These are suggestions for people just getting started.
If you can configure Firefox on your own, do so.
Configure Firefox
- Follow View / Toolbars to deselect "Bookmarks Toolbar"
- Follow Edit to Preferences and select the "General" tab.
- Set up a Home Page URL.
- In Downloads, select "Save files to" and browse to the
bottom of the file system to select "/archive".
- In the Tabs tab, UNselect all warnings.
- In the Content tab, if "Enable Java" exists, UNselect it. (Java is NOT JavaScript!)
- In the Privacy tab,
- at "Firefox will:" choose "Use custom settings for history".
- UNselect "Accept third-party cookies"
- Select "Clear history when Firefox closes", click
"Settings..." and select everything EXCEPT
"NoSquint Site History, "Site Preferences" and
"Tab Mix Plus Saved Sessions" then click "OK".
- In the Security tab,
- UNselect "Remember passwords for sites" (never allow any
browser to manage passwords).
- at "Warning Messages" click "Settings...", check only "I
submit information that's not encrypted."
- Click "Close" to move on.
Configure Tab Mix Plus
- In Firefox, follow "Tools" to "Tab Mix Plus Options" and select.
- In the "Events" tab,
- under "Tab Closing", for "When closing current tab,
focus", select "Last selected tab".
- under "Tab Features", "Max number of closed tabs to
remember" enter 50 and select.
- In the "Display" tab, under "Tab Bar"
- Select "New tab button" and "on Left Side".
- Select "Close tab button".
- UNselect "All..." and "Extra..." options.
- For Hide the tab bar, select "Never".
- For When tabs don't fit width, select "Multi-row".
- For Max number of rows to display, select "5".
- In the "Display" tab, under "Tab"
- under "Highlight" select "Current tab" only.
- under "Show on Tab" UNselect "Close tab button".
- for "Tab width" use 25 to 250.
- In the "Session" tab,
- select "Enable Session Manager" and "Enable Crash Recovery" only.
- On "Start / Exit", for "When Browser Starts", select "Ask Before Restoring".
- For "When Browser Exits", select "Save Session".
- For "Startup Session", select "Last Session".
- In Preserve tab, select everything.
- Click "OK" to move on.
Save Changes
- if you have favorite sites or browser tabs you want to open
on each session, set them up
- set up your configurations the way you want them saved
- close Firefox and any open windows
- on desktop, find "save" button and click
- click "SAVE"
- select "SAVE" and press Enter (save occurs, then tray opens)
- press Enter to move on.
VI. ADJUST TO PUPPY AND FIREFOX
Booting Puppy Linux from DVD is the best approach to get a
believably uninfected OS.
Most people probably will start out on an existing Windows
system, and Puppy does support use of Windows drives.
However, Puppy does not need a hard drive, and when no hard
drive is present, there is no hard drive to damage or expose.
Personally, after getting beyond the traumatic change, I appreciate
the increased security more than I miss having massive local storage.
When necessary, I can use (and remove) USB flash drives.
Using Windows Drives
When Puppy comes up it will look for system drives (hard drives,
floppies, CD's, etc.), and can use normal Windows drives.
It is easy to read Windows files, and write files that
Windows can use.
But Puppy does not need a hard drive, and the best security is
to not have one.
At first, the drive names in Linux will be unfamiliar, but it
is easy to see what files are on any drive.
A single click on a drive "mounts" that drive, and a directory
window will appear.
A mounted drive will have a name like "sr0" and some sort of
indication on the drive icon as a reminder that it is mounted.
It is normal for an OS to "buffer" or temporarily store data
being sent to a drive while waiting for the drive to catch up.
It is important to not just yank out a USB plug for an external
drive until the data have been fully stored.
To "unmount" a drive, right-click-and-hold to select "Unmount sr0"
(for example) and wait for the "mounted" indication to go away.
Using NoScript
NoScript is a browser add-on that disables JavaScript and also
most other scripting languages, but allows scripting to be enabled
for any particular web site and remembered for future use.
Scripting is a problem because scripts are executable program code
which the browser downloads and runs as part of a displayed page.
Not enabling scripts can cause awkward page problems, but enabling
a malware script can cause serious security problems.
Of course, with Puppy Linux on DVD, we can restart the machine
and get a clean OS with minimal effort.
Many sites can be used without JavaScript.
Other sites need Flash, which is also protected by NoScript, and
the site may say you need to download Flash, when you really just
need to enable that site in NoScript.
JavaScript can be enabled for a particular page by clicking on the
"S" at the bottom of the browser window and selecting sites to allow.
It can be illuminating to see how many different sites are being
promoted from what seems to be a single page, and that is part of
the browsing security problem.
Note that a save is necessary for a new configuration to survive
the next DVD boot.
Using LastPass
The user is responsible for having good passwords.
A good password cannot be short and it cannot be words or names.
The best password is a machine-generated sequence of random characters.
A 15-random-character password should be good enough, with more
brute-force security than any other part of the system.
We need a different long, random password for every site, account
and piece of equipment (such as a Wi-Fi router).
We cannot remember such passwords, so we need a password manager
to save them for us.
Passwords are saved in a little database protected by cryptography
done right.
The password manager LastPass.com works as a browser add-on, as
a website, or as a stand-alone portable program.
Normally, the browser add-on is most convenient.
Alternately, users can access their passwords from the website
using any uninfected computer.
Or one can save the little encrypted password database, then use
the standalone program to access passwords.
Starting to use password management can seem like being out of
control.
Only the password manager knows the actual passwords, and if it
dies, what then?
- A copy of the encrypted password database is saved on the
LastPass website.
If a disaster affects your machine, you can still get your
passwords online from a different machine.
- The browser add-on stores a copy of the encrypted database
locally, for use if the LastPass site is down.
- The encrypted database can be exported to a local file as
backup or for use by a stand-alone LastPass program.
Using LastPass can seem scary, because it tries to be automatic.
New sites are included by signing in and letting LastPass create an entry.
Sometimes the automatic way fails, and sometimes the web site
changes their login page.
A manual login option is available by clicking on the LastPass icon,
and then selecting the current site.
The Username or Password can be copied to the clipboard, which then
can be pasted into the desired location.
Correcting a login sequence can seem daunting, but there are
relaxing options.
When I edited an entry and changed the name, the old entry was not
lost but the new entry was added.
That meant I could change the new entry as desired without losing
the password.
LastPass also has a "Secure Notes" feature which saves little
text files in the encrypted database:
- Secure Notes is good for saving text lists of everyday tabs
(URL's) as created by the Copy All URLs add-on "Copy", and then
placed in a Secure Note using "Paste".
Later, perhaps on a different machine, I can highlight that list
in the Secure Note, copy it to clipboard with Ctrl-C, then use
Edit / Copy All URLs "Paste" to open that whole list of tabs.
That avoids the need for normal bookmarks and local storage (which
would require a DVD write after every addition), but also makes the
list available on any machine I use, since LastPass will be open
anyway.
- Secure Notes is also good for holding a text list of the
installed add-ons created by the Extension List Dumper add-on.
From Tools / Add-ons, click the "Dump list" button, then click
"Copy to clipboard" and paste that into a Secure Note.
Unfortunately, I know of no way to use that list to automatically
load all the add-ons, but I can use it on a new install to remind
me what add-ons are needed.
- Secure Notes is a good way to save the authentication security
questions and answers needed for access from a different computer.
This will be crucial if you become incapacitated and someone has to
handle your affairs for you.
It is important that your spouse or someone responsible have your
LastPass password, and, thus, all your account access information.
We are not in this life alone.
Saving Files to DVD
Most new or modified files are automatically saved when we save
a session to the DVD, preferably a DVD+RW.
For some reason, the desktop "save" button seems more reliable than
an update triggered by Menu / Shutdown.
The "save" button copies all changed files to a new session or
directory on the DVD, but does not mark them as saved, so clicking
"save" again will save all the same files again!
Ending the session by Menu / Shutdown will offer to save those files
yet again!
Just say no, by selecting "NO SAVE", then press Enter and press Enter
again (to "close drive tray").
Each startup boot will complain about an "unclean exit" for "x", but
just select "Ignore" and move on.
I try to limit my DVD saves to once every couple of weeks or so,
and then just after a clean startup and immediately after the desired
updates or configuration changes.
It is easy to archive files on the DVD by placing them in the
"my-documents" directory before a save.
Files in my-documents will be loaded from DVD to the in-memory file
system in every subsequent runup, and thus be available (unless
deleted and that system saved).
Saving files on the DVD rarely seems helpful to me:
- I often send files to myself as email attachments, and also
create text in Gmail, which provides automatic real-time editing
backup.
- I use Google bookmarks extensively.
- I almost never need local storage, and my Web computers are very
usable and even comfortable with no hard drive at all.
Obviously, I do have extensive storage on the Microsoft Windows boxes,
but those are generally aimed at offline use.
Files in the Puppy /tmp directory are not saved to DVD.
Files in the /archive directory are saved to DVD, but not recovered
in the next boot.
Changed files are saved to DVD without overwriting the older
versions, and only the most recent version recovered on boot.
In most file systems, a new file replaces the old one.
But each time Puppy Linux saves to DVD, it creates a new DVD
directory for that save.
So the DVD can contain many different versions of the same file,
as it was each time it was saved.
This will automatically archive the progress of a writing or
programming project over time in a way that does not occur in normal
computer file systems.
Each DVD session, and each archived file version, can be read from
DVD under Linux or Windows.
DVD Issues
As an online security system, Puppy Linux should be booted from
DVD, and run in memory.
The unique Puppy Linux ability to update the DVD is what makes
a DVD boot practical.
But updates do need to be written to the DVD, and optical storage
simply is not as reliable as hard drive storage.
Since all storage systems are somewhat unreliable, our Puppy
response is just to be more rigorous than usual.
For example, I manually back up an important local work (like this
article, during development) before the end of every session.
I may copy my file to a USB flash drive (1 minute), or send the
file to myself as an email attachment (2 minutes), and save it to
a Windows drive (1 minute), if present.
Even if I work "in the cloud" using Google Docs, I still
"Download as" the file and attach it to an email to myself, thus
creating a project archive without writing to the DVD.
Sometimes upon restart Puppy comes up (the splash screen shows),
but then fails upon reading the last saved session.
We can permanently void the last session by starting Puppy again and
entering the command "puppy pfix=1" at the splash screen input.
Rarely, we can find that the last session save has made the disc
completely unreadable, at least for boot purposes.
Then we need to start over with a new disc we have cleverly made in
advance.
Or we get to start over from scratch, which may be irritating but
not really a disaster.
Making a configured boot DVD
Puppy does have a "remaster" process, at
Menu / Setup / Remaster Puppy live-CD, but that seems overly complex
and I have had problems with it (in 4.3.1).
An alternative way to "copy" a configured Puppy DVD is to first
boot from a fully-configured DVD, then save that session to a
different disc.
It would be nice to simply put in a blank DVD and click "save",
but that does not appear to work.
Puppy asks for the original boot DVD, which is immediately updated
with a new session, instead of reading the system for transfer to
another disc.
What has worked for me requires another Puppy ISO DVD.
We can make that in Puppy:
- download the puppy ISO again, or copy from USB flash drive into
Puppy memory, perhaps /tmp
- put a clean DVD in the burner tray and close tray
- follow Menu / Multimedia to "Burniso2cd burn iso file to CD/DVD"
and click
- select DVD and click "OK"
- select drive and click "OK"
- browse to lupu-511.iso and click "OK"
- click "MULTI"
- set burn speed at 4 and click "OK" (burn occurs, tray opens)
- "Would you like to verify...?" click "Yes"
- manually close tray
- wait for burner LED to settle down
- click "OKAY" (verify process occurs)
- "the burn has been verified as good"
- click "OKAY" (tray opens)
- click "FINISHED" to move on
- manually close tray
When we have a Puppy ISO DVD, we can save our current configured
state:
- on the desktop, click "save"
- click "SAVE" (DVD tray opens)
- IGNORE "Please insert the Puppy live-CD/DVD media that you booted from..."
- INSTEAD, insert (or do not remove) Lucid Puppy 5.1.1. ISO DVD
- close tray
- wait for the burner LED to settle down
- press Enter (burn process occurs)
- "Have saved session to live-DVD (unless it has not, which is an error)."
Sadly, The cuteness of that message evaporates rather quickly
when things do not work, since there is no indication about what went
wrong or what the user could do about it.
This process usually does work and can be used to:
- Manufacture a few mostly-configured DVDs for
a group, a class, or a family, much easier than configuring each
one by hand.
- Make a backup, in case something goes wrong
and a boot disc is damaged.
- Combine accumulated boot sessions into a single
session for faster loading.
- Possibly update to a new Puppy version just by saving to a
DVD with the new ISO.
Difficult or Impossible to Infect
The huge advantage of a LiveDVD is that it is "difficult or
impossible" for malware to change data on the DVD.
The presence of an easily-infected and immediately-writable
boot drive (or even a boot USB flash drive) is what turns a
successful malware "attack" into "infection."
Hard drive infection happens in the blink of an eye and often cannot
be detected afterwards.
These infections are vastly expensive because simply deleting
malware files is no longer enough for recovery.
Once modern malware starts to operate, it "calls home" and then there
are no limits to what it might do on the hard drive.
After that, nobody can possibly know what to do to put things
right.
The only secure way to recover from modern malware on a boot hard
drive is to re-install the OS (or recover an uninfected system image).
The alternative of a hard-to-infect and slowly-writable boot DVD
makes stealth infection very difficult, and actually
impossible when there is no DVD in the drive.
Puppy Linux normally loads completely into RAM so the boot DVD
can be removed to play music or videos -- or to prevent infection.
Even if DVD infection does occur, the latest sessions can be voided
by Puppy before startup, or a brand new DVD created at low cost
and minimal effort (when a configured backup is available).
In practice, the ability to save security updates to the boot
DVD makes a DVD boot practical.
There is no perfect security, but we can make vast improvements while
still retaining some shreds of practicality.
Video Issues
In the older Puppy 4.3.1 version, it was hard to take a configured
Puppy DVD to another computer because the video selections generally
would not work on a different system.
Dealing with this generally involved trying to somehow invoke the
Video Wizard by menu selections without being able to see the menus.
The current Lucid Puppy 5.1.1 seems to detect being on a different
computer and automatically starts the Video Wizard, at least on the
machines I have tried.
This is a big, big improvement.
It may be possible in general to take a configured Puppy DVD to
another computer and expect to get it to work fairly easily and
quickly.
- see "Welcome to the Puppy Video Wizard" panel
- select "Probe" and press Enter
- select appropriate format (in my case, 1024x768x24 or 1360x768x24 or
1440x900x24)
- select "OK" or "TEST" and press Enter
- select "TEST_X_NOW" and press Enter
- use control-alt-backspace to recover, if necessary
- select "FINISHED" and press Enter to move on
When moving to a new machine, if you cannot trust
the hardware, you also cannot fully trust Puppy on that hardware.
A hardware keystroke logger will not disappear simply by booting
Puppy.
External penlight-cell-size in-line loggers for PS/2 or USB keyboards
are commonly available and might be installed by users.
Internal laptop logger boards are uncommon, but are known to exist
for laptops having a MiniPCI slot, as typically manufactured
before 2008.
Connection Issues
In general, networking hardware will be different on different
computers, so a configured Puppy may need new configuration.
- on the desktop, click "connect"
- find "Internet by wired or wireless LAN" and click that icon
- find "Simple Network Setup" and click that icon
- select an interface (like eth0) and click
- click "OK"
- click "YES SET AS DEFAULT"
- click "OK" to move on
Actually, I would prefer for Puppy to not automatically log
into the Net, but instead wait until and unless I want that.
Currently I do not know how to get that.
Power-Down
In a system without a hard drive, we can just turn the power off.
Power failure cannot damage a hard drive when there is no hard drive.
If the system has a hard drive, we need to follow Menu / Shutdown
to "Power off computer" and click.
Select "NO SAVE" and press Enter (DVD tray opens), then press
Enter to finish.
VII. SECURE USE
Just getting Puppy, booting it from a DVD, and using Firefox
with security add-ons covers a whole lot of computing weakness.
As one might expect, there are other issues:
What about passwords?
- Even the most basic security requires us to use long random
values for passwords.
- We need to make and use a different long random password for
every device and every site and every account.
- Never save passwords in a browser.
- Instead, use the LastPass password add-on.
- LastPass works in Firefox, for both Windows and Linux, and
also has website access via SSL.
- Do not email passwords to anyone, including yourself.
- Delete all on-line emails containing passwords.
- Install passwords in your LastPass.com account (or save as
Secure Notes).
- Avoid entering a password on a web page until after SSL
(https://) has been established (use the SSLPasswdWarning add-on).
- If forced to enter a password without SSL, consider the account
public.
What about email?
- We should use on-line email (try Google Gmail), since they can
scan better than we can.
- Always connect to on-line email via SSL encrypted connection.
(Set the Gmail option.)
- Do not click on a link in unexpected email.
- Always mouse over links and examine the address before you click.
- Never click on an email link to a financial account.
- Do not download unexpected attachments, since a malware email can
pretend to be from one of your friends.
- In Gmail, view .PDF files online without downloading.
- When browsing, view .PDF files in Google Docs Viewer without downloading.
- Never supply or confirm User ID, Password, or any private data via
email. Never email passwords!
- Emails which do not address you by name are probably not really from
accounts that do have your name.
What about browsing?
- Always mouse over links and examine the address before you click.
- Do not download browser toolbars.
- Any alert that claims your system has malware probably is
itself malware.
- Any page which wants you to download and install something may
be distributing malware.
(The Firefox / Mozilla download pages are generally OK.)
- If you need an update or a player, go to the manufacturer's page
and download it from there.
- Even respected companies can have their pages invaded and used
to distribute malware.
- NoScript is our friend even in Linux since JavaScript code will
run on any browser.
- Avoid using Java online. (JavaScript is not Java.)
What about snooping?
- Currently, most information on the web is sent unencrypted,
in the open, over broadband.
- For wireless, anybody nearby can read what you send unless
WPA2 security has been established.
- But WPA2 security only extends through the air to the router,
and then your data are unprotected again.
- Even with wired (CAT5) connections, anybody on the same
sub-network (e.g., the whole neighborhood or any room in a motel)
might read what you send.
- Avoid snooping by establishing an SSL (https://)
encrypted connection wherever possible.
- Expect a border around an SSL page (from the Safe add-on).
- Never do banking or purchasing without first establishing SSL.
- SSL uses a cryptographic certificate to link a web site to an
issuer whose certificate is included in your browser.
- Never approve a new SSL certificate!.
- It is OK to use an existing SSL certificate that is slightly out of date.
- Let the Certificate Patrol and Perspectives add-ons guide you
on certificate problems.
- Secrecy requires establishing an SSL connection before entering
a password (use the SSLPasswdWarning add-on).
- Instead of establishing SSL with each account, one might
subscribe to a personal VPN service (like WiTopia).
VIII. MALWARE EDUCATION
Many who advocate better security can be accused of using "FUD"
(Fear, Uncertainty and Doubt) to advance their cause.
But if FUD by itself was a bad thing, there would be little reason to
buy insurance, or even door locks, for that matter.
The question is whether the problems are real or just made up,
and whether the cure actually works or is just expensive snake oil.
Computer insecurity is real, and implies levels of technical,
corporate, governmental and national security incompetence that
are almost impossible to believe.
Booting Puppy Linux from DVD is a real solution for increased security.
You need not believe me:
Read the articles, follow them up, and come to your own conclusions:
All Operating Systems are Vulnerable
-
"The trojan was discovered last week and functions as a Java applet.
It was particularly designed to target Windows and Mac OS X users"
"Because of the cross-platform nature of Java, the trojan is also
capable of running on other operating systems like Linux, Solaris
or BSD."
"However, on OSs other than Windows and Mac OS X, it's inoffensive,
because the malicious code was not designed for these platforms."
(Sophos, Softpedia Nov. 2010)
-
"New Koobface Variant Infects Linux Systems"
"new attack is capable of infecting Windows, Mac OS X and Linux systems"
(ParetoLogic, Softpedia Oct. 2010)
-
"Cross-platform Boonana Trojan targets Facebook users"
"it doesn't just infect Windows, but targets Mac OS X and
Linux computers too."
"Visitors to the webpage who want to see more are prompted to give
permission for an applet called JPhotoAlbum.class to be run from
inside a Java Archive (JAR) called JNANA.TSA."
"Whether you are running Windows, Mac OS X or Linux on your computer,
if you give permission for the highly obfuscated Java app to run
then the malware will sneakily download a variety of programs from
the internet which it will then execute on your computer."
(Sophos Oct. 2010)
-
"Microsoft Warns of Spike in Java Exploitation Attempts"
(Softpedia Oct. 2010)
-
"Linux bug bestows attackers with 'superuser' powers"
(The Register Oct. 2010)
-
"Google patches Chrome second time this month"
(Computerworld Sep. 2010)
-
"The Linux kernel has been purged of a bug that gave root access
to untrusted users – again."
(The Register Sep. 2010)
-
"More Mac OS X malware discovered"
(Sophos Jun. 2009)
Malware Steals
-
"Zeus hackers may target corporate data"
(Computerworld Oct. 2010)
-
"Credit card fraudsters are increasingly resorting to salami ATM
attacks, that are very difficult to detect and can result in
significant losses."
(Gartner, Softpedia Oct. 2010)
-
"New Banking Trojan Targets Over a Dozen Financial Institutions"
(FireEye, Softpedia Oct. 2010)
-
"Bill Would Give Cities, Towns and Schools Same e-Banking Security Guarantees as Consumers"
(Krebs Oct. 2010)
-
"One in Five Infected Computers Had a ZeuS Variant"
"ZeuS is commonly used by fraudsters to steal sensitive financial
information from victims, such as online banking credentials or
credit card details."
(Microsoft, Softpedia Oct. 2010)
-
"For the first time ever, more companies are suffering from
electronic theft than from physical theft"
(Kroll, cnet Oct. 2010)
-
"if the user deletes their standard HTTP cookies, LSO data, and
all HTML5 storage, the PNG cookie and history cookies will still
exist. Once either of those are discovered, all of the others will
come back "
(Evercookie, Oct. 2010)
-
"computer trojans represent 55% of new malicious samples detected
during the third quarter and are also responsible for 54% of all
infections."
(Panda, Softpedia Sep. 2010)
-
"U.S. Businesses Could Lose Up To $1 Billion In Online Banking
Fraud This Year"
(dark reading Sep. 2010)
-
"East European criminals have managed to infect up to 100,000
UK-based PCs with the feared Zeus malware used to steal online
banking logins"
(Trusteer, PCWorld Aug. 2010)
-
"Texas Firm Blames Bank for $50,000 Cyber Heist"
(Krebs Aug. 2010)
-
"the first malicious program installed is called a downloader.
A downloader's goal is to be installed on the victim's PC and then
to "phone home" to the "mothership" Web server for more instructions."
(Computerworld Aug. 2010)
-
"the malware can wait for the user to conduct a transaction (such
as wiring money to another account). At this time, the malware can
change the transaction submission so that the money is wired to
another account."
"malware that is capable of modifying HTML can simply replace the
details of the transaction displayed to the user by the details of
the transaction expected by the user"
"by hooking/patching the WinInet InternetReadFile family of
functions, the malware can read and manipulate the HTML response
from the web server, just before Microsoft Internet Explorer
receives it."
(Trusteer, perhaps Aug. 2010)
-
“Most of the infected hosts appeared to be home users, [...] but
there were a large number of infected hosts inside of state and
federal government agencies; Fortune 500 and 100 companies; drug
companies and even banks,”
(Sunbelt, Softpedia July 2010)
-
"Organized criminals were responsible for 85 percent of all stolen
data last year and of the unauthorized access incidents, 38 percent
of the data breaches took advantage of stolen login credentials"
(Verizon, cnet July 2010)
-
"Texas Firm Blames Bank for $50,000 Cyber Heist"
(Krebs Aug. 2010)
-
"The basic architecture of online banking was designed without the
idea that the user would encounter this type of malicious Trojan,
he notes, adding, "In that sense, this paradigm of banking is broken."
(SecureWorks, Network World June 2010)
-
"Zeus is a game changer virus for the financial services industry,
and perhaps its most pernicious computer-related threat. It
specifically targets banking information by users and will defeat
strong multi-factor authentication (MFA) methods used by banks
including hardware tokens with one-time random passwords."
(Invincea May 2010)
-
"Fire Alarm Company Burned by e-Banking Fraud"
(Krebs Apr. 2010)
-
"e-Banking Guidance for Banks & Businesses"
(Krebs Apr. 2010)
-
"N.Y. Firm Faces Bankruptcy from $164,000 E-Banking Loss"
(Krebs Mar. 2010)
-
"eBanking Victim? Take a Number."
(Krebs Mar. 2010)
-
"Organized Crooks Hit NJ Town, Ark. Utility"
(Krebs Mar. 2010)
-
"AVprofit: Rogue AV + Zeus = $"
(Krebs Mar. 2010)
-
"Man in the Browser a.k.a MITB is a new breed of attacks whose
primary objective is to spy on browser sessions (mostly banking)
and in that process intercept and modify the web page contents
transparently in the background. In a classic MITB attack, It's
a very likely that what the user is seeing on his/her browser
window is not something which the actual server sent. Similarly,
what server sees on the other end might not be what user was
intending to send."
(FireEye Feb. 2010)
-
"Texas Bank Sues Customer Hit by $800,000 Cyber Heist"
(Krebs Feb. 2010)
-
"Zeus Trojan found on 74,000 PCs in global botnet"
"In addition to stealing specific data, Zeus can be used to search
for and steal any file on the computer, download and execute
programs and allow someone to remotely control the computer."
(cnet Feb. 2010)
-
"PC Invader Costs Ky. County $415,000"
(Krebs, Wash. Post July 2009)
-
"Web Fraud 2.0: Franchising Cyber Crime"
(Krebs, Wash. Post June 2009)
-
"Massive Profits Fueling Rogue Antivirus Market"
(Krebs, Wash. Post Mar. 2009)
Malware Targets Microsoft Windows
-
"Windows malware dominates Mac malware detection chart"
(The Register Nov. 2010)
-
"World's most advanced rootkit penetrates 64-bit Windows"
(The Register Nov. 2010)
-
"G-Data reckons 99.4 per cent of all new malware of the first half
of 2010 targeted Microsoft’s operating system. Just 0.6 per cent
of the 1,017,208 new malware programs discovered in 1H2010 targeted
other systems, such as Apple Mac boxes and servers running Unix."
(G-Data, The Register Sep. 2010)
-
"no Mac or Linux users are affected by the alert. According to a pie
chart released by Trsuteer, all the affected computers run versions
of Windows, particularly Windows XP and to a lesser extent Vista."
(Trusteer, PCWorld Aug. 2010)
-
Since the known banking Trojan malware is Windows-based — "there
are no Mac banking Trojans yet," Stewart says — he views the
situation today as largely one centering on Windows-based machines.
"I wouldn't recommend banking online with Windows."
(SecureWorks, Network World June 2010)
-
"Windows, Mac or Linux: Which is the most secure?"
"People have tried to attack Microsoft's products because of the
(huge) market share. If I'm an attacker, and I want to make the
most profit from my attacks, I'm better off going for the company
with the most machines out there."
(Computerworld June 2010)
-
"Mac OS malware threat still low"
(ZDNet May 2010)
-
"Question: Why switch to Linux or a Mac?"
"Answer: Because, you can't keep Windows secure even if you do the
right things."
"I did think that even though Windows is defective by design, you
could keep it relatively safe by installing patches quickly and using
anti-virus software religiously. I was wrong."
(IT World Apr. 2010)
-
"Time to ditch Windows for online banking and shopping"
(ZDNet Oct. 2009)
-
"Avoid Windows Malware: Bank on a Live CD"
(Krebs, Wash. Post Oct. 2009)
-
"Crimeware gets worse - How to avoid being robbed by your PC"
"when it comes to your computer, there is one obviously best solution.
Do online banking from Linux using Firefox."
(Computerworld Sep. 2009)
Passwords
Email and SSL Security
-
"Of the major webmail providers in the U.S., only Gmail is secure
against sidejacking attacks. Yahoo Mail and HotMail are insecure,
and can be compromised quickly."
(Errata Security, Nov. 2010)
-
"Understanding the TLS Renegotiation Attack"
(Educated Guesswork, Nov. 2009)
-
"My take on the SSL MITM Attacks – part 1 – the HTTPS attack"
"These aren’t the same as old-style MITM attacks, which relied on
the attacker somehow pretending strongly to be the secure site being
connected to – those attacks allowed the attacker to get the entire
content of the transmission, but they required the attacker to
already have some significant level of access. The access required
included that the attacker had to be able to intercept and change
the network traffic as it passed through him, and also that the
attacker had to provide a completely trusted certificate representing
himself as the secure server."
"The current SSL MITM attack follows a different pattern....
The attacker still needs to be able to intercept and modify the
traffic between client and server, but does not get to see the
content of traffic between client and server. All the attacker gets
to do is to submit data to the server before the client gets its turn."
(Tales from the Crypto, Nov. 2009)
-
"SSL doesn't stop you from being conned with a MITM using his own
(or acquired) server to perpetrate a fraud assuming he redirected
you to his server"
(WebmasterWorld, July 2008)
-
"Even SSL Gmail can get sidejacked"
(ZDNet Jan. 2008)
Patching is Increasingly Tedious and Ineffective
Windows Has 91 Percent Browsing Share
Everybody Has a Malware Problem
-
"McAfee: Spam down, but malware up"
"malware has reached an all-time high, according to the security
technology company, which identified an average of 60,000 new
threats each day in the third quarter, almost quadrupling since
2007. For 2010 so far, McAfee has discovered 14 million unique
pieces of malware, a million more than this time last year."
(McAfee, cnet Nov. 2010)
-
"Cyber security by the numbers: Malware surges, spam declines in third quarter"
(ZDNet Nov. 2010)
-
"Even though overall spam volumes were down slightly during the
month of September, we saw a huge increase in malware distributions
beginning mid-month with a peak of nearly 11 million pieces delivered
in one day,"
(AppRiver, Softpedia Oct. 2010)
-
"Report: Half of apps have security problems"
(Veracode, cnet Sep. 2010)
-
"Avoid Scripting.
This may be the one piece of advice that will do most to keep you
the safe on the Web: Steer clear of JavaScript, especially on sites
you don't trust."
(PCWorld July 2010)
-
"Report: 48% of 22 million scanned computers infected with malware"
(ZDNet Jan. 2010)
-
"the average number of PCs hit by malware now stands around 59 percent"
(Panda Security, cnet Sep. 2009)
Avoiding Dangerous Sites Cannot Protect You
-
"Compromised Websites Use Java Flaws, Hit Japanese Users"
(Trend Micro. Nov. 2010)
-
"After years of burying malicious software in email and portable
storage media, attackers now favor quick downloads via legitimate websites"
(dark reading Nov. 2010)
-
"Malicious PDFs find a novel way of running JavaScript"
(Sophos Nov. 2010)
-
"websites hosted at Go Daddy are currently targeted in mass injection
attacks, that add rogue code to their pages and direct visitors to scareware."
(Securi, Softpedia Nov. 2010)
-
"The attack starts with users visiting a legitimate site, that was
compromised and had rogue JavaScript code injected into its Web pages."
(Trend Micro, Softpedia Nov. 2010)
-
"one in eight malware attacks, out of the 700,000 recorded during
the last week of October, came from USB devices."
(Avast, Softpedia Nov. 2010)
-
"A new critical vulnerability in Flash and Adobe Reader and Acrobat
9.x is being exploited to attack computers running the popular PDF
viewer software"
(cnet Oct. 2010)
-
"a new variant of a computer worm sends itself attached to fake
emails that appear to originate from Google, Facebook, Twitter,
hi5, Amazon or Hallmark."
(Softpedia Oct. 2010)
-
"XSS Flaw Found on Secure American Express Site"
(Softpedia Oct. 2010)
-
"a recent Panda survey of more than 10,000 small- and medium-sized
firms found that 27% of those victimized by a malware infection in
the last year reported that the attack had originated with infected
USB hardware, primarily flash drives."
(Panda, Computerworld Aug. 2010)
-
"New obfuscation technique using JavaScript in legitimate sites"
(Sophos Aug. 2010)
-
"a new mass injection attack affecting websites hosted at Rackspace
and Media Temple. The compromises result in rogue JavaScript code
being added to legit .js files used by the affected websites."
(Softpedia Aug. 2010)
-
"New Bank of America Phishing Scheme Abuses Legit Websites"
(Softpedia Jul. 2010)
-
"Spam SEO: Use of Java/Flash leads to more dangerous exploits"
"Over the past 3 days, we've seen some even more dangerous websites
using Java exploits and Flash vulnerabilities. These malicious pages
do not require any user interaction to infect users. They are also
very difficult to detect - the exploits are hidden behind several
layers of Javascript redirects and use obfuscation."
(Zscaler June 2010)
-
"New research pours scorn on the comforting but erroneous belief
that Windows surfers who avoid smut and wares on the web are
likely to avoid exposure to malware.
A study by free anti-virus firm Avast found 99 infected legitimate
domains for every infected adult web site."
(Avast, The Register June 2010)
-
"Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware"
(Sophos Mar. 2010)
-
"Ads--the new malware delivery format"
"Instead of hacking into major online sites to embed malware,
malicious hackers are going in through the front door by
exploiting security holes in systems for delivering ads."
(ZDNet Sep. 2009)
-
"Attackers inserted malware into ads in an apparent attempt to get
users to download rogue anti-virus software"
(eWEEK Feb. 2009)
Authentication Cannot Protect You
Anti-Virus Cannot Protect You
-
"According to the ZeuS Tracker project, the average signature-based
detection for ZBot binaries is somewhere around 40 percent."
(Softpedia Oct. 2010)
-
"ZeuS Variant Tries to Evade Heuristic Detection and Sandbox Analysis.
"[…] Common ZeuS 2.0 variants contain relatively few imported external
APIs. By contrast, TSPY_ZBOT.BYZ imports many external APIs.
"To a heuristic scanner, this changes the appearance of the file and
lowers the possibility of detection,"
(Trend Micro, Softpedia Oct. 2010)
-
Jaquith says security has three elements: prevention, detection, and
response. "If you put all of your eggs in the prevention basket, you
find a surprise when those protections fail,"
Instead of just trying to stop everything at the "front door," he
says, "survivability and recoverability should be what's emphasized."
(dark reading Sep. 2010)
-
"until a patch is released, that hole--known as a zero-day
vulnerability--in effect makes your computer a sitting duck for
anyone who writes an exploit for it and bothers to distribute
it via e-mails and drive-by downloads on Web sites."
(cnet Sep. 2010)
-
"The malware industry has published nearly four new viruses per
minute in the first half of the year. We expect the two million
barrier to be broken in the second half of the year,"
(G Data, Sep. 2010)
-
"Zeus Virus Malware – Most Software Cannot Detect This Trojan."
"In a recent study by Trusteer, it has been revealed that as much
as as 55% of all the tested 10,000 computers, which were equipped
with the latest updated security software and antivirus, were not
able to detect and remove the traces of Zeus Virus."
"no software, howsoever smart, intelligent and pricey, can buy you
the absolute PC Security and Privacy. The safety of your computer
is within your own hands. You MUST exercise caution before you
click on any link."
(Trusteer, PC Security Aug. 2010)
-
"Malware hit an all-time high in the first half of this year, at
10 million new samples, according to a new McAfee report, with
the top two being AutoRun malware and password-stealing Trojans."
(McAfee, dark reading Aug. 2010)
-
"A study by web intelligence firm Cyveillance found that, on
average, vendors detect less than 19 per cent of malware attacks
on the first day malware appears in the wild. Even after 30 days,
detection rates improved to just 61.7 per cent, on average."
(Cyveillance, The Register Aug. 2010)
-
"Recent studies from Trusteer and other fraud detection vendors
show that antivirus solutions detect only 10 percent of active
financial malware."
(Trusteer July 2010)
-
"Bank customers are being targeted by criminals using regional
specific malware that flies under the radar of most antivirus
technology to steal peoples online banking credentials and
commit fraud. Detection rates for regional malware are between
zero and 20%, suggesting that the majority of these attacks go
undetected."
(Trusteer, Help Net July 2010)
-
"malware authors routinely submit their creations to online
scanners. They repeat this process over and over again, until
they've successfully created a virus, worm, or Trojan that the
scanner won't detect. And that's the one they'll use to attack
your system.
This means the vast majority of new viruses, worms, Trojans and
other malicious software may not be detected by most antivirus
or antispyware scanners until after (a) it's been discovered and
(b) you've applied the necessary updates."
(About.com Jun 2010)
-
"even the most popular AV signature-based solutions detect on average
less than 19% of malware threats. That detection rate increases only
to 61.7% after 30 days."
(Cyveillance, Net Security Apr. 2010)
-
"Traditional means of detecting malware are failing at finding
advanced, targeted bots, and backdoors."
(dark reading Mar. 2010)
-
"Installing an anti-virus product and maintaining it up to date
reduces the probability to get infected by Zeus by 23%"
(Trusteer, ZDNet Sep. 2009)
-
"McAfee said that this is over double the 500,000 unqiue pieces
of malware it identified in the same period in 2008. In total,
the security firm identified 1.5 milliion types of malware in
2008, and it expects the 2009 figure to top this."
(McAffe, PCWorld July 2009)
Removing Malware Cannot Protect You
-
"Licat has the characteristics of a traditional virus, as it adds
malicious code to all EXE, DLL and HTML files detected on an infected
system."
(Trend Micro, Softpedia Oct. 2010)
-
"the average compromised machine is home to 13 infected files as well
as malicious programs from three different malware families."
(ESET, eWeek Sep. 2009)
-
"Rebuilding Your System Is the Safest Road to Recovery after a
Malware Attack."
"Information Security recommends formatting one's hard drive
followed by a complete software reinstallation in response to a
system compromise. The success rate of virus/malware cleanup and
recovery tools is quite low due in large part to malware writers
development of strategies to evade such tools. Incomplete or
ineffective removal means the attacker may regain control of the
computer.
Complete reinstallation is usually necessary: A reinstallation
includes not only the operating system, but also application
software."
(UWM InfoSec, Aug. 2009)
-
"The only way to be absolutely positive that you've removed any and
all viruses is: * Backup, * Reformat, * Reinstall, * Update,
* Restore, * Learn."
(Ask Leo, July 2009)
-
"If you discover malware on your system, don't mess around. Back up
your data, format your hard drive, and begin again"
(InfoWorld Feb. 2009)
-
"Instead of replying to every single "I have a virus" post, I am
going to say this once."
"The best current practice for cleaning up a system on which malware
has been executed is to reinstall the operating system cleanly."
"...the only way to be certain that your system is clean is to
reinstall it."
(Windows Security June 2008)
-
"Microsoft Says Recovery from Malware Becoming Impossible"
"A Microsoft security official recommends that big businesses
invest in an automated process to wipe hard drives and reinstall
malware-infested operating systems."
(Baseline Apr. 2006)
Your Equipment Cannot Protect You
-
"The firewall was designed to block someone from the outside
connected to servers on inside," Zuk said. "Web applications
have changed that so that the traditional stateful inspection
firewall - invented by Check Point 15 years ago - doesn't do
anything any more."
(Palo Alto Networks, The Register Oct. 2010)
-
"Saving website logic credentials is a user controlled option in all
browsers, often enabled by default. But the practice is frowned upon
by security researchers, who point to the risk that passwords left
in browsers might easily be extracted by password-stealing Trojans,
such as Zeus."
(The Register Oct. 2010)
-
"IE users most at risk from DLL hijacking attacks"
(Acros, Computerworld Sep. 2010)
-
"Newest Adobe zero-day PDF exploit 'scary,' says researcher.
Bypasses Windows DEP and ASLR defenses, comes with valid digital
certificate"
(Computerworld, Sep. 2010)
-
"How to Hack Millions of Routers"
"DNS rebinding first appeared 15 years ago. It was a clever
penetration technique until Web browsers were fixed. It now
appears there is a workaround for the fix and residential
gateway devices are the targets."
"Prevention is simple. This attack requires knowing the username
and password to access the gateway device's configuration Web pages.
The bad guys are hoping the default settings are still in use. So,
make it hard for them. Change the user name if possible and replace
the default password with a nasty and hard to figure out one."
(ZDNet Aug. 2010)
-
"Millions of routers vulnerable to hack attack - Is yours?"
"The hack relies on tricking people to visit a malicious website.
From that point on, the router itself can be hijacked and the poor
user redirected pretty much anywhere the hacker wants them to go.
The hack relies on a hack known as “DNS rebinding,” something that
has been around for nearly 15 years:"
(ZDNet July 2010)
-
"Hidden Threat: NTFS Alternate Data Streams (ADS)."
"files with ADS are almost impossible to be detected by native
file browsing techniques like Windows Explorer or the command
line; software that can identify them are few and far in between... "
"The ability to hide executable code in an invisible form inside
ADS can also make viruses difficult to be detected within a file
system, because most virus scanners only verify the default data
stream of files. Major Anti-virus vendors point out that ADS must
be loaded into the memory before execution and thus will be
detected with real-time scanning"
(Think Digit Aug. 2009)
-
"The NT File System allows alternate data streams to exist attached
to files but invisible to some file-handling utilities"
"In 2009, the alternate data stream was used by a click fraud
Trojan named FFSearcherWeb Link. the Trojan implanted a DLL file
that contained the Trojan's code. The registry was changed to point
to the ADS DLL instead so it ran instead of the normal DLL file."
(Computer Knowledge May 2009)
-
"Joanna Rutkowska and Rafal Wojtczuk today published a research paper
describing a proof-of-concept rootkit that a hacker can install on a
system through a vulnerability in Intel CPUs' caching memory."
(InternetNews Mar. 2009)
-
"Researchers demo BIOS attack that survives hard-disk wipe"
"a BIOS level malware attack capable of surviving even a hard-disk wipe."
(Core Security, ZDNet Mar. 2009)
You Need a Password Manager
Wi-Fi is Trickier than You Think
-
"Firesheep’s Real Lesson: Take Wi-Fi Security Seriously"
(ZDNet Oct. 2010)
-
"Surfers who install Firesheep can capture the credentials of
anyone who happens to be using the same open network."
(The Register Oct. 2010)
-
"How to Crack a Wi-Fi Network's WEP Password with BackTrack"
(lifehacker Oct. 2010)
-
"Hole 196 WPA2 Vulnerability - Who Cares?"
"the bad guy must be authenticated and authorized on the WPA2
network to begin with."
"Remember, once the data is dumped off onto a wired connection,
the vast majority of the time wired traffic is not encrypted at
the network level unless you are tunneling it using something
like IPSec or GRE. So with this new vulnerability, your internal
users can possibly sniff and manipulate traffic...just like they
can now on your wired connection."
"If you want securely encrypted applications, why don't you look
at securing the applications? Have your applications developers
ever heard of SSH or SSL?".
(EzineArticles July 2010)
-
"WPA2 Vulnerability Allows for Man-in-the-Middle Attacks"
(AirTight, July 2010)
-
"Wi-Fi key-cracking kits sold in China mean free Internet"
"To crack a WEP key, the applications exploit weaknesses in the
protocol that have been known for years. For WPA, they capture
data being transmitted over the wireless network and target it
with a brute-force attack to guess the key."
(Computerworld May 2010)
-
"How to hack WPA wireless security in one minute.
Switch to WPA2, users urged."
(ComputerWorldUK Aug. 2009)
-
"Networking nerds claim to have devised a way of breaking Wi-Fi
Protected Access (WPA) encryption within 60 seconds."
"The technique...involves making minor changes to packets encrypted
with TKIP - Temporal Key Integrity Protocol, a WPA security
mechamism - and then sending those packets back to the access point."
"...[the] technique doesn’t work in WPA 2 – the AES-based successor
to WPA."
(The Register Aug. 2009)
-
"YOUR Unsecured Wireless Internet is the Dangerous Weak Link"
(IdahoFallsToday Mar. 2007)
-
"How Secure Is Your Wi-Fi Connection?"
(Pogue's Posts, Jan. 2007)
Related Articles