Navigate This Site

Philip Ramsey Headlines

Wednesday, March 23, 2011

W5: Investigating Canada's big cyber security problem

Computer Security: Principles and PracticeW5's segment on Investigating Canada's big cyber security problem only highlights the tip of the iceberg. In my articles on Wednesday, January 13, 2010 Google vs China - Googles response to attacks by China, Friday, January 15, 2010 Internet Explorer Flaw Implicated in Chinese Attacks and Monday, February 22, 2010 Technology Review: Corporations, agencies infiltrated by 'botnet' I provided my insight into how computer security breaches may be easily avoided - DO NOT USE MICROSOFT PRODUCTS.

Information Security : Principles and PracticeIf you absolutely have to use Microsoft Windows, ensure you are using x86_64 Windows Professional (x86_64 is also known as 64 bit processor) or higher version. Also, ensure the hidden Administrator user account has a password, create a secondary administrator account - admin - to be used exclusively to (un)install software and configure devices. All other user accounts must belong to the Restricted user group. This will prevent any user from accidentally installing any virus, Trojans, spyware or other malware. The best way to access the hidden Administrator user account is to start Windows in Safe Mode. All Home versions of Windows prevents the main Administrator user account from being accessed locally but is still accessible from the internet. I also recommend turning off Windows Automatic Updates and only install the patches released on Patch Tuesday or the Service Packs which are released once every few years.

For true security and safe browsing, users need to have a computer with a 64 bit processor and 64 bit operating system like openSUSE Linux, Fedora Linux, Ubuntu or CentOS. My preference is openSUSE Linux. First of all, the 64 bit processor has a special security system hard wired into chip. This security system prevents most malicious code, including malicious JavaScript code, from being executed by standard users. However, this special security system can only be accessed by a 64 bit operating system. N.B. 64 bit Windows systems are very buggy and prone to crash when running 32 bit programs. Also, there are very few 64 bit programs written for Windows. For this reason 64 bit Windows is not an option. On the other hand, 64 bit Linux has been around for at least four years and has a vast repository of 64 bit applications. Linux also has a special library of files for running 32 bit applications in the 64 bit environment without crashing.

Computer Security Made Easy - Essential Guide To Protect Your Computer From Malicious AttackHaving a very secure system still means nothing if the computer user is operating the computer in an insecure manner i.e. runs the computer with administrator (root in Linux/Unix systems) priviliges, users on the computer have no password protection (Linux will not install or create users unless passwords are assigned). 64 bit system users also need to accept the fact that websites that has malicious code embedded in it's web pages will be inaccessible. Sites like will be difficult to navigate due to the fact that Yahoo is adopting Microsoft technologies. It also means that will become more easily hacked by the Russian Mafia that are working with the Chinese Secret Service. They should also avoid Hotmail or websites that uses ASP.NET (a Microsoft technology).

I hope you watch W5: Investigating Canada's big cyber security problem and follow my suggestions - use x86_64 Linux, run the computer as a standard user and have all users password protected.

Network Security Principles and Practices (CCIE Professional Development)
Powered by ScribeFire.
Enhanced by Zemanta

No comments:

Post a Comment