Showing posts with label internet Security. Show all posts
Showing posts with label internet Security. Show all posts

IMS ( Internet Monitoring Software) for Parents

February 07, 2012 Add Comment

IMS ( Internet Monitoring Software) for Parents



Internet monitoring software helps parents supervise their children’s online activities. There are various ranges of software available that limit access to inappropriate sites, control e-mail use, block chat rooms, and enforce access time. Similarly, schools and public libraries also make use of internet monitoring software.

After all, children are a significant part of society and their upbringing should be perfectly done so that society can prosper in the long run. Following is the range of most popular software for monitoring children’s internet activities:

Parental Control Bar

It is a free service. Parents can use this software to control the internet activities of their children. Along with its free public service, its installation procedure is really simple that consists of only three steps. Therefore, parents can install it even if they are not that used to computers.

If a website address is inserted by your child on the address bar of a browser, the Parental Control Bar compares the website with the settings you made. This way, it finds out whether the website needs to be blocked or allowed.

K9 Web Protection

It is an internet monitoring software that uses an advanced technology for filtering the Web. It is also used by governmental institutions and other organizations worldwide. It offers an interface that is user-friendly so that parents can easily make use of it at home. Its usage means that you will block content that is inappropriate for your children.

SocialShield

Besides tracking your child’s online activities, SocialShield has something more to offer for your child’s social safety. It identifies your child’s online friends. The software compares the names of your child’s friends to a set of databases to ensure that they have no association with unlawful online activities. If your child is involved in such activities, SocialShield sends you alerts so that you can take action.

It posts less threatening issues in the parent dashboard. Although it tracks all discussions your child has, it highlights only those issues that are important for your consideration. This way, you are not required to affect the privacy of your child. Moreover, you can use SocialShield to track pictures that were posted by your child. It will cost you $10 per month.

Big Mother

Big Mother safeguards your children by providing an interface that protects the password along with multifaceted features. By using these features, you can block access to things that tempt your children the most. For instance, some illicit online activities that it can block are to upload and download data, games, e-mail, chats, and websites.

If you think that giving your children limited access to the internet is fine, then you can develop different schedules in which you can allow internet access for some time.  Big Mother has an edge over many of its competitors, i.e. it enables you make restrictions on uploads and downloads according to their size.

NetNanny

NetNanny is considered to be the market leader in terms of internet monitoring software. It has been in the market for over 10 years. Due to its popularity, parents can download it instantly. It costs $39.95. Unlike others, NetNanny had a clear purpose before its development. It was developed with the help of child advocates, law enforcement, and parents. Furthermore, it helps you monitor and control access to the internet.

Although it is available with monitoring features that are set as default, you always have an option to customize your settings according to the unique needs of your family. NetNanny has integration with Safe Search options. It indicates that these options limit your children’s search on a search engine. These options are also found in famous search engines such as Yahoo, MSN, Google, AltaVista, Lycos, Dogpile, and AllTheWeb.

PC Pandora

Like other internet monitoring software, PC Pandora is reliable software that monitors your children’s online activities. Along with that, it sends you warning alerts so that potential problems can be avoided. PC Pandora tracks all those websites your child visited, chat interactions, keystrokes, and emails. Therefore, it lets you have access to all online activities of your child.

Additionally, it also provides you access to Login IDs and their passwords. If you feel something wrong is going on, you can handle the problem immediately. This way, parents are always on track in terms of what their child in up to. PC Pandora will cost you $69.95. It is available from different retailers.

Wireless Security - Kick to Hackers

December 16, 2008 Add Comment

Wireless Security - Kick to Hackers


It may sound strange but is true that several organisations, which have adopted Wireless networking, are open to severe security breaches. Mostly the reasons are that organisations simply plug the access points and go live without bothering to change the default factory settings. Wireless local area networks are open to risk not because the systems are incapable but due to incorrect usage. The biggest problem lies with inadequate security standards and with poorly configured devices. For a start, most of the wireless base stations sold by suppliers come with the in-built security Wired Equivalent Privacy (WEP) protocol turned off. This means that unless you manually reconfigure your wireless access points, your networks will be broadcasting data that is unencrypted.

In the old world of wired local area networks, the architecture provides some inherent security. Typically there is a network server and multiple devices with an Ethernet protocol adapter that connect to each other physically via a LAN backbone. If you are not physically connected, you have no access to the LAN.

Compare it with the new wireless LAN architecture. The LAN backbone of the wired world is replaced with radio access points. The Ethernet adapters in devices are replaced with a radio card. There are no physical connections – anyone with a radio capability of sniffing can connect to the network.

What can go wrong?


Unlike the wired network, the intruder does not need physical access in order to pose the following security threats:

Eavesdropping. This involves attacks against the confidentiality of the data that is being transmitted across the network. In the wireless network, eavesdropping is the most significant threat because the attacker can intercept the transmission over the air from a distance away from the premises of the company.

Tampering. The attacker can modify the content of the intercepted packets from the wireless network and this results in a loss of data integrity.

Unauthorized access. The attacker could gain access to privileged data and resources in the network by assuming the identity of a valid user. This kind of attack is known as spoofing. To overcome this attack, proper authentication and access control mechanisms need to be put up in the wireless network.

Denial of Service. In this attack, the intruder floods the network with either valid or invalid messages affecting the availability of the network resources.

How to protect?


There are 3 types of security options – basic, active and hardened. Depending upon your organisation needs, you can adopt any of the above.

Basic

You can achieve the basic security by implementing Wired Equivalent Standard 128 or WEP 128. The IEEE 802.11 task group has established this standard. WEP specifies generation of encryption keys. The information source and information target uses these keys to prevent any eavesdroppers (who do not have these keys) to get access to the data.

Network access control is implemented by using a Service Set Identifier (SSID – a 32 character unique identifier) associated with an access point or a group of access points. The SSID acts as a password for network access.

Another additional type of security is Access Control List (ACL). Each wireless device has a unique identifier called Media Access Control address (MAC). A MAC list can be maintained at an access point or a server of all access points. Only those devices are allowed access to the network that have their MAC address specified.

The above implementations are open to attack. Even when you do turn on WEP, there are still problems inherent within it. The problem lies in the protocol's encryption key mechanism, which is implemented in such a way that the key can be recovered by analysing the data flow across the network over a period of time. This has been estimated at between 15 minutes and several days. The SSID attached to the header of packets sent over a wireless Lan - is sent as unencrypted text and is vulnerable to being sniffed by third parties. Unfortunately most supplier equipment is configured to broadcast the SSID automatically, essentially giving new devices a ticket to join the network. While this is useful for public wireless networks in places such as airports and retail establishments - in the US for example, Starbucks is offering 802.11b access in some of its stores - it represents another security loophole for corporates that do not switch it off. Finally any MAC address can be change!

d to another (spoofed), so the use of ACL is not foolproof either.

Active

To implement an Active type of security, you need to implement the IEEE 802.1x security standard. This covers two areas – network access restriction through mutual authentication and data integration through WEP key rotation. Mutual authentication between the client station and the access points helps ensure that clients are communicating with known networks and dynamic key rotation reduces exposure to key attacks.

Due to weaknesses in WEP, some standard alternatives to WEP have emerged. Most of the Wi-Fi manufacturers have agreed to use a temporary standard for enhanced security called Wi-Fi Protected Access (WPA).

In WPA, the encryption key is changed after every frame using Temporary Key Integrity Protocol (TKIP). This protocol allows key changes to occur on a frame-by-frame basis and to be automatically synchronized between the access point and the wireless client. The TKIP is really the heart and soul of WPA security. TKIP replaces WEP encryption. And although WEP is optional in standard Wi-Fi, TKIP is required in WPA. The TKIP encryption algorithm is stronger than the one used by WEP but works by using the same hardware-based calculation mechanisms WEP uses.

Hardened


There are organisations like banks, which have very stringent security requirements. They need to implement the hardened type of security systems. These are solutions certified in accordance with the Federal Information Protection Standard (FIPS 1.40). Products in this category offer point-to-point security for wireless information communication and include offerings such as AirFortress and IPSec Virtual Private Networks (VPNs). A VPN will increase the cost of your network, but you can base your decision on whether to implement it by using the same course of action that you should be taking with all other parts of your infrastructure. Map the risks against the business data that you will be passing over radio, and assess the financial impact of a breach. If the data is too critical, reassess what should be passed over the network, or use a VPN to enhance your protection.

Summary


The vendors are working towards implementing newer standards and this year we should see products implementing IEEE 802.11i that will further the authentication and encryption gains implemented by WPA. Most notably, it will add a ground up encryption standard known as Advanced Encryption Standard (AES) as well as various other enhancements.

Newer standards apart, organisations must understand that achieving wireless security is essential and the good part is that it is easy. An organisation must define its security needs and use the features available in the systems accordingly. Choose a good vendor who can help you implement your requirements through standards based solutions. A good implementation must be supported by a security policy, which is well understood by everyone in the organisation. Make your employees aware that they all are responsible for security and share the cost of security breaches. Assign authority & ownership to few employees for the various parts in the security policy and make periodic reviews of their performance. Most important is to monitor your systems for any possible breaches and adapt if necessary. Never sleep well.

Keep Privacy online : Security Tips

February 04, 2008 Add Comment

Keep Privacy online : Security Tips


Nobody wants their private information all over the internet. If a hacker gets a hold of some of your personal information, it can ruin your life. Did you know that many websites collect your personal information without your permission and without you even knowing it?

They collect this information for a variety of reasons. They like to get information and send you spam, adware, and junk mail. Sometimes hackers can get this personal information and use it for identity theft or to infiltrate your computer. But I know you are wondering “how do they get my private information through the Internet?”

It is actually quite easy. First of all, every computer has an IP address. When you visit someone’s website, the website owner can track you through your IP address. All IP addresses are logged into the website’s server. You IP address can give away details many private details like, where you live.

It can be quite a scary thought, but there is a solution. The solution is an anonymous proxy server. So, what is an anonymous proxy server? An anonymous proxy server is a machine that is between your computer and the server you are accessing to view the web page you want to look at. They provide the best privacy and hide your IP address so you can surf anonymously and securely. No one will even be able to tell that you are using an anonymous proxy server!

FindProxy.org is one of the best tools for hiding your identity from online scammers. It is your guide to private online surfing. They have a huge list of fresh proxy servers. The best thing about Findproxy.org is that they are 100% free and that they are always up to date. Being updated frequently is very important because eventually all proxies get blocked.