Is your computer secure against hackers/snoopers/thieves?
Aug 11, 2010 at 4:26 AM Thread Starter Post #1 of 12

helicopter34234

100+ Head-Fier
Joined
Sep 7, 2008
Posts
153
Likes
11
 
Hi everyone.  I finally got around to doing an overhaul of my personal computer security policies.  Considering that I use my computer as a filing cabinet for all of my important and personal documents as well as doing my banking and many transactions over the computer, it is imperative that it is secure.  I am by no means a computer/networking export.  However, I thought some of the things I learned through my literature search would be relevant to the general community.  Computer and networking gurus, please correct anything that you find incorrect or add anything that you think worth noting.
 
Quick summary:
-Use WPA2 router encryption with a huge random password or assume anyone can see your wireless traffic or hijack your router.
-Always use a VPN and a software firewall (e.g. Comodo) on your laptop when using public Wi-Fi unless you are just surfing the web.
-It’s a good idea to have a software firewall (e.g. Comodo) even though your home router has an inbound firewall.
-Obviously have a good anti-virus software
-Most passwords are easily cracked.  Consider better password use policies.
-If someone stole your home computer or laptop they could access all of your files.  Is there anything in there you would want to protect?  If so, you should store them on an encrypted volume on your HD.
 
 
More detailed version: kind of long but I think this is important information
 
 
-Wireless internet is inherently insecure to people snooping within the vicinity of the signal.  I have read several stories of people living in completely remote areas, yet still having someone snoop or hijack their router for illegal activity.  It is particularly scary that people have ended in jail for someone else's hijacked activity.  This is obviously a bigger concern for someone like me, who is in signal range from many people.  I believe that at the moment, if you use WPA2 on your router with a huge key (at least 20-30 random characters, no dictionary words or repeated patterns), you should generally be safe from snoopers and hijackers.  Otherwise, most encryption methods with weak passwords can be cracked within minutes to days.  Most secure websites (banks, credit cards, etc.) use https, which provides an additional level of security.  However in general, emails are not secure, and someone could still use your internet connection for illegal activity if your wireless is not secured.
 
-Public WiFi - You have to be very careful when you connect to a Wi-Fi hotspot (hotel, airport, cafe).  There is almost never any encryption used on those connections.  Someone could be sitting next to you listening to all of your traffic without any effort.  Additionally, some times those hotspots are traps set up by people wanting to sift through your traffic.  The best way to use a public or insecure hotspot is to VPN into a reliable network (e.g., business or university network).  Additionally, you should always use a software firewall on your laptop (Comodo is free and supposed to be better and more lightweight than ZoneAlarm) since you don't have the benefit of being behind the hardware firewall in your home router.
 
-Firewalls - Your home router generally provides a very good firewall against inbound traffic.  However, it doesn't stop malicious outbound traffic (nor does Window's Firewall).  For example, if a Trojan or virus somehow gets into your computer, many of them mine data (stored website passwords, documents, etc.) and send them out to a third party on the internet.  Although people debate its necessity, I think a lightweight software firewall is useful to have on top of your hardware firewall to protect against such unauthorized events.
 
-You obviously need a good antivirus system.
 
-Passwords - probably >95% of the passwords people use can be cracked by brute force or dictionary attacks within minutes to days.  Most websites only allow a number of attempts per minute, so this generally protects you against these attacks.  However, if someone gets access to the hash value of your password (it happens) then they can decrypt it using those techniques.  Also, if you have a password protected file or program on your computer and someone gains access to your computer, they can generally access the passwords hash values and do the same type of cracking.  To avoid this, you need strong passwords that cannot be cracked easily (large number of random characters, no words from dictionary, no repeating patterns, no birthdays, telephone numbers, etc.).  Doing so generally means you would never be able to memorize it.  There are two ways that are recommended by the experts to go about this: (1) Randomly generate a relatively large password and write it down in your wallet or (2) Think of a song or speech and use the first letter of each word.  The problem is I have 20-40 different websites/accounts, each of which has a different password length requirement/limitation.  Plus you shouldn't use the same password on multiple sites because if one is compromised then they all will.  So what I do is use a password management program with one very secure main password, and then store all of the different individual passwords within.  I also just ordered a fingerprint scanner ($43 Eikon Digital Privacy Manager), which you can set up to automatically fill in your passwords for websites/programs/windows accounts with a finger swipe.  This is better than storing passwords in IE/Firefox/Chrome because anyone with access to your comp can easily access your stored passwords (unless you set up a master password).  Optical fingerprint scanners can be fooled by a picture of your fingerprint.  But, someone who lifts your laptop/desktop in the night or hacks into your computer generally will not have access to your prints.
 
Hard drives- I have many personal/financial documents on my home desktop hard drive that I really would not want someone to able to access in the event they stole my computer.  To avoid this, I am going to create an encrypted volume on my hard drive using TrueCrypt (also the Fingerprint scanner software claims similar functionality).  This produces an encrypted file on the hard drive, which you can mount using the software as a normal windows drive.  However, to mount the drive you need to type in your password (or swipe your finger).  The data is only decrypted within the ram, but you can still play large files (e.g. music/movies) seamlessly.  This is particularly important for work files on a laptop, which has a greater likelihood for being stolen/accessed.
 
Aug 11, 2010 at 8:07 AM Post #2 of 12
I would consider all of the above points as being common sense type good info.
 
 
Firewall: Software firewall is personal preference, but a properly configured router will do the job for most folks. I personally don't use a software firewall on my desktop and use a hardware firewall in the router with plans to eventually upgrade to a full standalone firewall.
 
Anti-Virus: Microsoft Security Essentials is a very good (and free!) antivirus software.
 
Password management: I would highly recommend KeePass.
 
Encryption: Truecrypt is a must for any laptop with important information. I would recommend using the full disk encryption to encrypt the entire drive, that way there's only one password to worry about and the entire drive is secured.
 
Another option with both Truecrypt and KeePass is ability to use key files. Using a file or multiple files in addition to a strong password significantly strengthens your security. Only you know what file you used for the key file(s).
 
One major security risk is having Adobe Reader installed; Adobe is slow to update their software and they have had more than a few instances of remote execution vulnerabilities so install an alternative like Foxit reader instead. I also highly recommend using a browser other than IE, though the latest IE is better than the past versions relatively speaking.
 
One VERY important note that's not quite security is the necessity of a backup. For data that is very important it's a very good idea to have an onsite and off-site backup. Online cloud storage services like dropbox or cloud backup services like Mozy are convenient, though simply backing up your important information and taking it to a relative's house or a bank safe deposit box can work as well.
 
Aug 11, 2010 at 10:15 AM Post #4 of 12
So...you're basically doing what I said earlier :wink: Still a good post though. It's worth noting that RAID isn't a substitute for a backup.
 
 
One way of making up a secure password is to substitute numbers and symbols in to a phrase or set of words that you can memorize.
 
Hello world -> H3ll0w0r!d is an example.
 
A password doesn't have to be completely random, it just needs not be from a dictionary and have numbers, upper/lowercase letters, and symbols along with a decent length.
 
Aug 12, 2010 at 10:23 PM Post #5 of 12
No matter the protection scheme, someone somehow will be able to hack or phish you. Recently, Cory Doctorow, who encrypts everything, uses a very paranoid linux system and runs his system through more firewalls and brickwalls than most networks, got phished. Now his computer is probably pretty secure, but you have to add that people, the very weakest link, are behind their machines. 
 
Even if you have a 100% secure machine, you can make a silly mistake somewhere and it will be costly. Also, really secure systems are built on sources that everyone knows. If someone wants to crack your box, they will. The key is not letting that far.
 
Aug 12, 2010 at 11:24 PM Post #6 of 12
I keep a bear trap inside my computer case, just in case.
 
I take the above average, but not government level, steps to ensure security and thankfully my store throws some good anti-virus/internet security programs at me during our annual product fair so I don't have to pay some jerk of a company for security.
 
Aug 13, 2010 at 12:25 PM Post #7 of 12
I use Tor Router with Vidalia setup with Firefox portable, just for security.. not talking about security against virus im way past that.
 
Worst case scenario i have to burn my hard drive and submerge it in with water same with my ram chips. fud process safe from the blackhat /feds
 
Aug 13, 2010 at 2:56 PM Post #9 of 12


Quote:
Just FYI, submerging a hard drive and ram chips isn't a proper destruction technique. /feds :p


This is true. However, running them through the "Will it Blend" blender is indeed a proper destruction technique.
 

 

Users who are viewing this thread

Back
Top