ONLINE SECURITY WITH PUPPY 5 (original) (raw)
ACiphers By Ritter Page
Terry Ritter
ritter@ciphersbyritter.com
2010 November 21
Using free Puppy Linux instead of Microsoft Windows
makes common equipment safe for online banking.
INTRODUCTION
The vast majority of home computers run Microsoft Windows and are not very secure, even with extensive anti-virus add-on programs. Those same computers can be made vastly more secure, essentially for free, by using a Puppy Linux LiveDVD, at least when banking. And Windows would still be available, when desired.
THERE IS A PROBLEM: Malicious software can and does infect personal computersto steal from online bank and brokerage accounts, and to steal identities and online bandwidth. Exceedingly clever and advanced malware cannot be stopped by firewalls, anti-virus or other features, and infections may not even be detected. Trying to "harden" a Windows installation is increasingly irritating, decreasingly effective, and the consequences of failure can be devastating: Your online bank simply cannot distinguish between "the real you" and a malware "bot" infection inside your computer, even with modern "2-factor" "one-time" and external "dongle" authentications.
**THERE IS NOT ALWAYS A SOLUTION: Malware exploits holes in security-unconcious Web standards.**Our Swiss-cheese standards are so intertwined with modern technology that a fundamentally secure approach would require changing every computer and every web site. Standardized weakness applies to all Web browsing platforms: desktop, laptop, netbook, smart phone, tablet and whatever comes next. Antivirus scanning cannot guarantee to detect a modern bot infection.
THERE IS AN OBVIOUS TARGET: About 91 percent of browsing is done from Microsoft Windows, and attackers will exploit anything and anybody to get at that market. The vast majority of malwares are designed to run only in a Windows environment, so most malware can be avoided simply by not using Microsoft Windows online. New cross-platform malwares can be avoided by also not using Java (JavaScript is not Java). Not everyone can avoid using Windows and Java applications online, and not everyone wants to, but stepping away from the target is a move in the right direction.
THERE MAY BE A SOLUTION FOR YOU: You can prevent malware infection provided you can boot your operating system from an optical drive. Malware "infects" by changing the "boot" or run-up data to restart malware on each session. Infection can be prevented by booting from a DVD, which is inherently "difficult or impossible" to infect. Currently, the best solution seems to be Puppy Linux:
- By using free Puppy Linux booted from DVD, every reboot starts a clean, uninfected system.
- By immediately jumping into Firefox, the complexity of Linux is avoided, while providing a familiar and stable browser experience.
- Puppy Linux is unique among LiveDVD packages in providing an easy way to update the boot DVD with browser updates and configuration changes.
**I EXPLAIN HOW: The Puppy Linux process is exposed in detail.**Serious online security is made available to anyone willing to follow directions, provided only that they have a computer with a DVD-writer optical drive. Setting up a Puppy LiveDVD the first time may take 3 or 4 hours, but every time it starts it is bot-free. Serious security means re-booting Puppy and going directly to a financial site, without first reading email or browsing. A configured Puppy DVD can be replicated in 5 or 10 minutes, and may work with only minor changes on different machines.
I. MAKE A PUPPY DVD
You cannot just buy a configured Puppy Linux LiveDVD, but you can make one yourself, by following reasonable choices described here.
**These lists only seem overwhelming.**Most steps are a single keypress. You are not going to "blow up" your computer by making a DVD. If you use the recommended DVD+RW discs and screw up, you can erase the DVD and try again with no loss. Nobody need know.
**If you want, you can still go back to the original Windows system,**which this process does not modify.
FIRST: Find and Download Lucid Puppy 5.1.1
- From Windows, go to one of the Puppy repositories, such as:
- You are looking for the ISO file "lupu-511.iso".
- The file "lupu-511.iso" (129MB) may be in a subdirectory such as"puppy-5.1.1" as just one of various files.
- Typically, a left-click on the "lupu-511.iso" entry will prepare to download the file.
- Have the download file placed where you can find it later.
II. BURN PUPPY ISO TO DVD
Now we have the "lupu-511.iso" file, which is an "ISO" type of file. An ISO file is just the raw sequence of bytes recorded on a CD or DVD. The ISO "image" includes both the files and the file structure which names and locates those files.
For Puppy use, I recommend DVD+RW discs which seem somewhat more reliable than other types. (You do need a DVD writer which supports DVD+RW, of course.) If you make a mistake, you can erase a DVD+RW and start over.
To burn an ISO from Microsoft Windows, you might try CDBurnerXP:
To use CDBurnerXP:
- Run the install.
- Run the program.
- Select the "Burn ISO Image" subprogram.
- At "Select ISO image to burn:" browse to the lupu-511.iso file.
- For "Burn method:" use "choose automatically"
- UNselect "DVD high compatibility"
- UNselect "Mode2XA instead of Mode1" (Mode1 has better error-correction)
- UNselect "Finalize disc" (allows multi-session saves)
- Select "Verify data after burning" The resulting burn, with a DVD+RW at 4x speed, with verify, completes in about 1min 20sec.
III. BOOT PUPPY, CONFIGURE, INSTALL FIREFOX, SAVE TO DVD
Some Things to NOT Install
When used for security, Puppy Linux should not be installed to a hard drive or a USB flash drive, but should instead boot from DVD on every session. Easily-writable boot drives are easily infected.
The Linux program "Wine" which emulates Microsoft Windows shouldnot be installed. Wine has gotten good enough to support a range of Windows malware, which is precisely what we are trying to avoid.
Similarly, the "Java" system also should not be installed, unless absolutely required. ("Java" is not the same as "JavaScript" which is part of the browser and is tamed by the Firefox add-on "NoScript".) Java is extremely dangerous because it expands the 1 percent Linux group (thus, not a target) to the 97 percent Windows + Mac + Linux group (absolutely a target) which may have Java. It is not enough to disable Java in the browser or in NoScript; Java should not even be present unless you cannot work without it.
Tell the BIOS To Boot a CD
The BIOS (Basic Input / Output System) is the computer program in control before an operating system is loaded or "booted." Basically, the BIOS goes down a list of devices to see if they hold a bootable OS to load. The first thing found that can be loaded, is loaded, and becomes the computer OS for that session. Normally, we want the "first boot device" to be "CDROM". The idea is to boot from a CD or DVD when one is present, and otherwise boot from the hard drive.
To enter the BIOS, restart the computer and watch for the message about which key to press to enter the BIOS. Often this will be Del (the delete key), but may be F1 or F2 or even something else. Press the key very quickly, or restart and try again until a BIOS configuration screen opens. Find "Boot / Boot Device Priority" or "Advanced BIOS Features / First Boot Device" or "Boot Sequence", and change the first entry to "CDROM". Move subsequent entries down, including the hard drive entry, "HDD" or "Hard Drive" or "Hard Disk". Then save changes and exit, which will start a reboot.
For BIOS help, see:
Boot Puppy and Configure
Put the Puppy DVD in the DVD reader, close the tray and restart the computer.
This is a tested, working example for my particular equipment--do not follow it blindly!
- WAIT to Configure Internet
On my systems, Lucid Puppy sets up a wired (CAT5) Internet connection automatically, and I have not tried to set up Wi-Fi. However, some sort of Web connection will be needed to download a video driver and also Firefox. Ideally one would plug in by wire to get things going before taking on a Wi-Fi configuration.- on the desktop, click connect
- click on internet by network or wireless LAN
- select an interface (like eth0) and click
- click on Auto DHCP (connection succeeds)
- save configuration
- click Done to move on
- Set Up Firewall
- follow Menu / Network to Linux-Firewall firewall and click
- select OK, press Enter (confirm default install)
- press Enter to move on
- Install Intel Graphics
- on the desktop, click quickpet
- select "Drivers"
- click Xorg High icon (download occurs)
- click OK to confirm install
- follow Menu / Shutdown to Restart X Server and click
- Click the "Classic Configuration Experience" icon on the first startup panel
- select "us" keyboard layout and press Enter
- select "US/Central timezone" and "OK" then press Enter
- select "Local" time and press Enter
- select "Probe" (video display) and press Enter
- select 1024x768x24 or 1280x800x24 and "TEST", then press Enter
- select "TEST_X_NOW" and press Enter
- use control-alt-backspace to recover, if necessary
- select "FINISHED" and press Enter to move on
Install Firefox
- Get Firefox
- on the desktop, click quickpet
- select Internet Pets
- click on Firefox icon (download occurs)
- click OK to confirm install
- Update Firefox
- on desktop, click browse to start Firefox
- in Firefox, follow Help to select "Check for Updates"
- click "Update Firefox" (download occurs)
- click "Restart Firefox"
- click "Restart"
- Update Flash
- on Firefox update screen, click on "Update Adobe Flash Player"
- select Linux version ".deb for Ubuntu..."
- click "Download Now"
- click OK to confirm "Open with" petget (download occurs)
- click "OK" to confirm install
Save to DVD
- Save Changes to DVD+RW, then Reboot
- follow Menu / Shutdown to Power-off computer and click
- select "SAVE TO CD" then press Enter
- select "SAVE" then press Enter (save occurs)
- select "OK" and press Enter to power down
- wait 5 seconds then restart computer
- Puppy comes back up
IV. INSTALL SECURITY ADD-ONS
Firefox add-ons provide security features which other browsers do not have. When other browsers get those features, or similar add-ons, then we can discuss whether they are as secure as Firefox.
- on desktop, click browse to start Firefox
- in Firefox, follow Tools to "Add-ons" and click
- select "Get Add-ons"
- search for and select each desired add-on and download into Firefox:
- if not updated on Mozilla, go to author's site for the latest version
- if apparently unavailable, keep looking. If necessary, use a general Google search for "Firefox addon" and the add-on name to find it somewhere on the Mozilla site.
- click "add to Firefox..." (site contacted)
- after a delay, click "Install Now" (download occurs)
- WAIT! do not click "Restart Firefox" just yet
- it is faster to add all desired add-ons before restarting Firefox
- at least get important / security add-ons, shown in bold
- Adblock Plus -- hide ads to improve speed
- BetterPrivacy -- clear Flash cookies and DOM storage
- Cert Viewer Plus -- certificate viewer enhancements
- Certificate Patrol -- track certificate changes to expose SSL man-in-the-middle
- CipherFox -- show current cipher and keysize
- CoLT -- allow selecting link text, location, or both
- Cookie Monster -- control cookies
- CopyAllUrls -- save tab URL's as text, recover tabs from text
- Down Them All -- fast download manager
- Extension List Dumper -- save add-on names as text
- JSView -- expose external stylesheets and JavaScripts
- Google Docs Viewer -- view .PDF files safely
- LastPass -- cross-platform syncing encrypted passwords in the cloud
- MD5 Reborned Hasher -- check hash in normal downloads
- MultipleTabHandler -- close multiple tabs
- NoScript -- whitelist for scripts, XSS protect, etc.
Options / Advanced / HTTPS can demand an SSL connection and block a site otherwise. - NoSquint -- page and text sizing per site
- PageDiff -- show differences between HTML pages
- Perspectives -- notaries expose SSL man-in-the-middle
- Safe -- colored outline around SSL pages
- Save Complete -- File / Save Page As... improved
- SearchMenu -- fast dictionary, thesaurus (keep disabled until needed)
- Shooter -- capture screen or entire page as graphic
- ShowIP -- show page IP address
- SSLPasswdWarning -- warns when sending password w/o SSL
- Tab Mix Plus -- tab setup / crash protect (also Bookmark All Tabs)
- Uppity -- URL up-one-level
- URL Tooltip -- expose link URL with mouse
- WOT -- (Web Of Trust) danger colors on search result links
- each can be uninstalled or just disabled later from Firefox Tools / Add-ons...
- when done, on the Add-ons panel, click "Restart Firefox"
- when Firefox comes up:
- use Tab Mix Plus Session Manager
- click "No Thanks" on LastPass
- click "Enable only Multiple Tab Handler's Features"
- click "Decline" on WOT
- in the browser, select the Adblock Plus page and click "Add Subscription"
I have once had Firefox lock up before all add-ons installed. In response, I started the process manager fromMenu / System / System Status andConfig / pprocess process manager.Then I selected the bottom-most Firefox process and clicked "End process" which killed the remaining Firefox window on the desktop. Subsequently clicking the desktop "browse" started Firefox again which then continued from where it left off. This appears to be rare Firefox issue. Nothing was lost.
V. CONFIGURING FIREFOX AND ADD-ONS
These are suggestions for people just getting started. If you can configure Firefox on your own, do so.
Configure Firefox
- Follow View / Toolbars to deselect "Bookmarks Toolbar"
- Follow Edit to Preferences and select the "General" tab.
- Set up a Home Page URL.
- In Downloads, select "Save files to" and browse to the bottom of the file system to select "/archive".
- In the Tabs tab, UNselect all warnings.
- In the Content tab, if "Enable Java" exists, UNselect it. (Java is NOT JavaScript!)
- In the Privacy tab,
- at "Firefox will:" choose "Use custom settings for history".
- UNselect "Accept third-party cookies"
- Select "Clear history when Firefox closes", click "Settings..." and select everything EXCEPT "NoSquint Site History, "Site Preferences" and "Tab Mix Plus Saved Sessions" then click "OK".
- In the Security tab,
- UNselect "Remember passwords for sites" (never allow any browser to manage passwords).
- at "Warning Messages" click "Settings...", check only "I submit information that's not encrypted."
- Click "Close" to move on.
Configure Tab Mix Plus
- In Firefox, follow "Tools" to "Tab Mix Plus Options" and select.
- In the "Events" tab,
- under "Tab Closing", for "When closing current tab, focus", select "Last selected tab".
- under "Tab Features", "Max number of closed tabs to remember" enter 50 and select.
- In the "Display" tab, under "Tab Bar"
- Select "New tab button" and "on Left Side".
- Select "Close tab button".
- UNselect "All..." and "Extra..." options.
- For Hide the tab bar, select "Never".
- For When tabs don't fit width, select "Multi-row".
- For Max number of rows to display, select "5".
- In the "Display" tab, under "Tab"
- under "Highlight" select "Current tab" only.
- under "Show on Tab" UNselect "Close tab button".
- for "Tab width" use 25 to 250.
- In the "Session" tab,
- select "Enable Session Manager" and "Enable Crash Recovery" only.
- On "Start / Exit", for "When Browser Starts", select "Ask Before Restoring".
- For "When Browser Exits", select "Save Session".
- For "Startup Session", select "Last Session".
- In Preserve tab, select everything.
- Click "OK" to move on.
Save Changes
- if you have favorite sites or browser tabs you want to open on each session, set them up
- set up your configurations the way you want them saved
- close Firefox and any open windows
- on desktop, find "save" button and click
- click "SAVE"
- select "SAVE" and press Enter (save occurs, then tray opens)
- press Enter to move on.
VI. ADJUST TO PUPPY AND FIREFOX
Booting Puppy Linux from DVD is the best approach to get a believably uninfected OS.
Most people probably will start out on an existing Windows system, and Puppy does support use of Windows drives. However, Puppy does not need a hard drive, and when no hard drive is present, there is no hard drive to damage or expose. Personally, after getting beyond the traumatic change, I appreciate the increased security more than I miss having massive local storage. When necessary, I can use (and remove) USB flash drives.
Using Windows Drives
When Puppy comes up it will look for system drives (hard drives, floppies, CD's, etc.), and can use normal Windows drives. It is easy to read Windows files, and write files that Windows can use. But Puppy does not need a hard drive, and the best security is to not have one.
At first, the drive names in Linux will be unfamiliar, but it is easy to see what files are on any drive. A single click on a drive "mounts" that drive, and a directory window will appear. A mounted drive will have a name like "sr0" and some sort of indication on the drive icon as a reminder that it is mounted.
It is normal for an OS to "buffer" or temporarily store data being sent to a drive while waiting for the drive to catch up. It is important to not just yank out a USB plug for an external drive until the data have been fully stored. To "unmount" a drive, right-click-and-hold to select "Unmount sr0" (for example) and wait for the "mounted" indication to go away.
Using NoScript
NoScript is a browser add-on that disables JavaScript and also most other scripting languages, but allows scripting to be enabled for any particular web site and remembered for future use. Scripting is a problem because scripts are executable program code which the browser downloads and runs as part of a displayed page. Not enabling scripts can cause awkward page problems, but enabling a malware script can cause serious security problems. Of course, with Puppy Linux on DVD, we can restart the machine and get a clean OS with minimal effort.
Many sites can be used without JavaScript. Other sites need Flash, which is also protected by NoScript, and the site may say you need to download Flash, when you really just need to enable that site in NoScript. JavaScript can be enabled for a particular page by clicking on the "S" at the bottom of the browser window and selecting sites to allow. It can be illuminating to see how many different sites are being promoted from what seems to be a single page, and that is part of the browsing security problem. Note that a save is necessary for a new configuration to survive the next DVD boot.
Using LastPass
The user is responsible for having good passwords. A good password cannot be short and it cannot be words or names. The best password is a machine-generated sequence of random characters. A 15-random-character password should be good enough, with more brute-force security than any other part of the system. We need a different long, random password for every site, account and piece of equipment (such as a Wi-Fi router). We cannot remember such passwords, so we need a password manager to save them for us. Passwords are saved in a little database protected by cryptography done right.
The password manager LastPass.com works as a browser add-on, as a website, or as a stand-alone portable program. Normally, the browser add-on is most convenient. Alternately, users can access their passwords from the website using any uninfected computer. Or one can save the little encrypted password database, then use the standalone program to access passwords.
Starting to use password management can seem like being out of control. Only the password manager knows the actual passwords, and if it dies, what then?
- A copy of the encrypted password database is saved on the LastPass website. If a disaster affects your machine, you can still get your passwords online from a different machine.
- The browser add-on stores a copy of the encrypted database locally, for use if the LastPass site is down.
- The encrypted database can be exported to a local file as backup or for use by a stand-alone LastPass program.
Using LastPass can seem scary, because it tries to be automatic. New sites are included by signing in and letting LastPass create an entry. Sometimes the automatic way fails, and sometimes the web site changes their login page. A manual login option is available by clicking on the LastPass icon, and then selecting the current site. The Username or Password can be copied to the clipboard, which then can be pasted into the desired location.
Correcting a login sequence can seem daunting, but there are relaxing options. When I edited an entry and changed the name, the old entry was not lost but the new entry was added. That meant I could change the new entry as desired without losing the password.
LastPass also has a "Secure Notes" feature which saves little text files in the encrypted database:
- Secure Notes is good for saving text lists of everyday tabs (URL's) as created by the Copy All URLs add-on "Copy", and then placed in a Secure Note using "Paste". Later, perhaps on a different machine, I can highlight that list in the Secure Note, copy it to clipboard with Ctrl-C, then use Edit / Copy All URLs "Paste" to open that whole list of tabs. That avoids the need for normal bookmarks and local storage (which would require a DVD write after every addition), but also makes the list available on any machine I use, since LastPass will be open anyway.
- Secure Notes is also good for holding a text list of the installed add-ons created by the Extension List Dumper add-on. From Tools / Add-ons, click the "Dump list" button, then click "Copy to clipboard" and paste that into a Secure Note. Unfortunately, I know of no way to use that list to automatically load all the add-ons, but I can use it on a new install to remind me what add-ons are needed.
- Secure Notes is a good way to save the authentication security questions and answers needed for access from a different computer. This will be crucial if you become incapacitated and someone has to handle your affairs for you. It is important that your spouse or someone responsible have your LastPass password, and, thus, all your account access information. We are not in this life alone.
Saving Files to DVD
Most new or modified files are automatically saved when we save a session to the DVD, preferably a DVD+RW. For some reason, the desktop "save" button seems more reliable than an update triggered by Menu / Shutdown. The "save" button copies all changed files to a new session or directory on the DVD, but does not mark them as saved, so clicking "save" again will save all the same files again! Ending the session by Menu / Shutdown will offer to save those files yet again! Just say no, by selecting "NO SAVE", then press Enter and press Enter again (to "close drive tray"). Each startup boot will complain about an "unclean exit" for "x", but just select "Ignore" and move on.
I try to limit my DVD saves to once every couple of weeks or so, and then just after a clean startup and immediately after the desired updates or configuration changes. It is easy to archive files on the DVD by placing them in the "my-documents" directory before a save. Files in my-documents will be loaded from DVD to the in-memory file system in every subsequent runup, and thus be available (unless deleted and that system saved).
Saving files on the DVD rarely seems helpful to me:
- I often send files to myself as email attachments, and also create text in Gmail, which provides automatic real-time editing backup.
- I use Google bookmarks extensively.
- I almost never need local storage, and my Web computers are very usable and even comfortable with no hard drive at all. Obviously, I do have extensive storage on the Microsoft Windows boxes, but those are generally aimed at offline use.
Files in the Puppy /tmp directory are not saved to DVD. Files in the /archive directory are saved to DVD, but not recovered in the next boot. Changed files are saved to DVD without overwriting the older versions, and only the most recent version recovered on boot.
In most file systems, a new file replaces the old one. But each time Puppy Linux saves to DVD, it creates a new DVD directory for that save. So the DVD can contain many different versions of the same file, as it was each time it was saved. This will automatically archive the progress of a writing or programming project over time in a way that does not occur in normal computer file systems. Each DVD session, and each archived file version, can be read from DVD under Linux or Windows.
DVD Issues
As an online security system, Puppy Linux should be booted from DVD, and run in memory. The unique Puppy Linux ability to update the DVD is what makes a DVD boot practical. But updates do need to be written to the DVD, and optical storage simply is not as reliable as hard drive storage.
Since all storage systems are somewhat unreliable, our Puppy response is just to be more rigorous than usual. For example, I manually back up an important local work (like this article, during development) before the end of every session. I may copy my file to a USB flash drive (1 minute), or send the file to myself as an email attachment (2 minutes), and save it to a Windows drive (1 minute), if present. Even if I work "in the cloud" using Google Docs, I still "Download as" the file and attach it to an email to myself, thus creating a project archive without writing to the DVD.
Sometimes upon restart Puppy comes up (the splash screen shows), but then fails upon reading the last saved session. We can permanently void the last session by starting Puppy again and entering the command "puppy pfix=1" at the splash screen input.
Rarely, we can find that the last session save has made the disc completely unreadable, at least for boot purposes. Then we need to start over with a new disc we have cleverly made in advance. Or we get to start over from scratch, which may be irritating but not really a disaster.
Making a configured boot DVD
Puppy does have a "remaster" process, at Menu / Setup / Remaster Puppy live-CD, but that seems overly complex and I have had problems with it (in 4.3.1).
An alternative way to "copy" a configured Puppy DVD is to first boot from a fully-configured DVD, then save that session to a different disc. It would be nice to simply put in a blank DVD and click "save", but that does not appear to work. Puppy asks for the original boot DVD, which is immediately updated with a new session, instead of reading the system for transfer to another disc.
What has worked for me requires another Puppy ISO DVD. We can make that in Puppy:
- download the puppy ISO again, or copy from USB flash drive into Puppy memory, perhaps /tmp
- put a clean DVD in the burner tray and close tray
- follow Menu / Multimedia to "Burniso2cd burn iso file to CD/DVD" and click
- select DVD and click "OK"
- select drive and click "OK"
- browse to lupu-511.iso and click "OK"
- click "MULTI"
- set burn speed at 4 and click "OK" (burn occurs, tray opens)
- "Would you like to verify...?" click "Yes"
- manually close tray
- wait for burner LED to settle down
- click "OKAY" (verify process occurs)
- "the burn has been verified as good"
- click "OKAY" (tray opens)
- click "FINISHED" to move on
- manually close tray
When we have a Puppy ISO DVD, we can save our current configured state:
- on the desktop, click "save"
- click "SAVE" (DVD tray opens)
- IGNORE "Please insert the Puppy live-CD/DVD media that you booted from..."
- INSTEAD, insert (or do not remove) Lucid Puppy 5.1.1. ISO DVD
- close tray
- wait for the burner LED to settle down
- press Enter (burn process occurs)
- "Have saved session to live-DVD (unless it has not, which is an error)."
Sadly, The cuteness of that message evaporates rather quickly when things do not work, since there is no indication about what went wrong or what the user could do about it.
This process usually does work and can be used to:
- Manufacture a few mostly-configured DVDs for a group, a class, or a family, much easier than configuring each one by hand.
- Make a backup, in case something goes wrong and a boot disc is damaged.
- Combine accumulated boot sessions into a single session for faster loading.
- Possibly update to a new Puppy version just by saving to a DVD with the new ISO.
Difficult or Impossible to Infect
The huge advantage of a LiveDVD is that it is "difficult or impossible" for malware to change data on the DVD.
The presence of an easily-infected and immediately-writable boot drive (or even a boot USB flash drive) is what turns a successful malware "attack" into "infection." Hard drive infection happens in the blink of an eye and often cannot be detected afterwards. These infections are vastly expensive because simply deleting malware files is no longer enough for recovery. Once modern malware starts to operate, it "calls home" and then there are no limits to what it might do on the hard drive. After that, nobody can possibly know what to do to put things right. The only secure way to recover from modern malware on a boot hard drive is to re-install the OS (or recover an uninfected system image).
The alternative of a hard-to-infect and slowly-writable boot DVD makes stealth infection very difficult, and actually_impossible_ when there is no DVD in the drive. Puppy Linux normally loads completely into RAM so the boot DVD can be removed to play music or videos -- or to prevent infection. Even if DVD infection does occur, the latest sessions can be voided by Puppy before startup, or a brand new DVD created at low cost and minimal effort (when a configured backup is available).
In practice, the ability to save security updates to the boot DVD makes a DVD boot practical. There is no perfect security, but we can make vast improvements while still retaining some shreds of practicality.
Video Issues
In the older Puppy 4.3.1 version, it was hard to take a configured Puppy DVD to another computer because the video selections generally would not work on a different system. Dealing with this generally involved trying to somehow invoke the Video Wizard by menu selections without being able to see the menus.
The current Lucid Puppy 5.1.1 seems to detect being on a different computer and automatically starts the Video Wizard, at least on the machines I have tried. This is a big, big improvement. It may be possible in general to take a configured Puppy DVD to another computer and expect to get it to work fairly easily and quickly.
- see "Welcome to the Puppy Video Wizard" panel
- select "Probe" and press Enter
- select appropriate format (in my case, 1024x768x24 or 1360x768x24 or 1440x900x24)
- select "OK" or "TEST" and press Enter
- select "TEST_X_NOW" and press Enter
- use control-alt-backspace to recover, if necessary
- select "FINISHED" and press Enter to move on
When moving to a new machine, if you cannot trust the hardware, you also cannot fully trust Puppy on that hardware. A hardware keystroke logger will not disappear simply by booting Puppy. External penlight-cell-size in-line loggers for PS/2 or USB keyboards are commonly available and might be installed by users. Internal laptop logger boards are uncommon, but are known to exist for laptops having a MiniPCI slot, as typically manufactured before 2008.
Connection Issues
In general, networking hardware will be different on different computers, so a configured Puppy may need new configuration.
- on the desktop, click "connect"
- find "Internet by wired or wireless LAN" and click that icon
- find "Simple Network Setup" and click that icon
- select an interface (like eth0) and click
- click "OK"
- click "YES SET AS DEFAULT"
- click "OK" to move on
Actually, I would prefer for Puppy to not automatically log into the Net, but instead wait until and unless I want that. Currently I do not know how to get that.
Power-Down
In a system without a hard drive, we can just turn the power off. Power failure cannot damage a hard drive when there is no hard drive.
If the system has a hard drive, we need to follow Menu / Shutdown to "Power off computer" and click. Select "NO SAVE" and press Enter (DVD tray opens), then press Enter to finish.
VII. SECURE USE
Just getting Puppy, booting it from a DVD, and using Firefox with security add-ons covers a whole lot of computing weakness. As one might expect, there are other issues:
What about passwords?
- Even the most basic security requires us to use long random values for passwords.
- We need to make and use a different long random password for every device and every site and every account.
- Never save passwords in a browser.
- Instead, use the LastPass password add-on.
- LastPass works in Firefox, for both Windows and Linux, and also has website access via SSL.
- Do not email passwords to anyone, including yourself.
- Delete all on-line emails containing passwords.
- Install passwords in your LastPass.com account (or save as Secure Notes).
- Avoid entering a password on a web page until after SSL (https://) has been established (use the SSLPasswdWarning add-on).
- If forced to enter a password without SSL, consider the account public.
What about email?
- We should use on-line email (try Google Gmail), since they can scan better than we can.
- Always connect to on-line email via SSL encrypted connection. (Set the Gmail option.)
- Do not click on a link in unexpected email.
- Always mouse over links and examine the address before you click.
- Never click on an email link to a financial account.
- Do not download unexpected attachments, since a malware email can pretend to be from one of your friends.
- In Gmail, view .PDF files online without downloading.
- When browsing, view .PDF files in Google Docs Viewer without downloading.
- Never supply or confirm User ID, Password, or any private data via email. Never email passwords!
- Emails which do not address you by name are probably not really from accounts that do have your name.
What about browsing?
- Always mouse over links and examine the address before you click.
- Do not download browser toolbars.
- Any alert that claims your system has malware probably is itself malware.
- Any page which wants you to download and install something may be distributing malware. (The Firefox / Mozilla download pages are generally OK.)
- If you need an update or a player, go to the manufacturer's page and download it from there.
- Even respected companies can have their pages invaded and used to distribute malware.
- NoScript is our friend even in Linux since JavaScript code will run on any browser.
- Avoid using Java online. (JavaScript is not Java.)
What about snooping?
- Currently, most information on the web is sent unencrypted, in the open, over broadband.
- For wireless, anybody nearby can read what you send unless WPA2 security has been established.
- But WPA2 security only extends through the air to the router, and then your data are unprotected again.
- Even with wired (CAT5) connections, anybody on the same sub-network (e.g., the whole neighborhood or any room in a motel) might read what you send.
- Avoid snooping by establishing an SSL (https://) encrypted connection wherever possible.
- Expect a border around an SSL page (from the Safe add-on).
- Never do banking or purchasing without first establishing SSL.
- SSL uses a cryptographic certificate to link a web site to an issuer whose certificate is included in your browser.
- Never approve a new SSL certificate!.
- It is OK to use an existing SSL certificate that is slightly out of date.
- Let the Certificate Patrol and Perspectives add-ons guide you on certificate problems.
- Secrecy requires establishing an SSL connection before entering a password (use the SSLPasswdWarning add-on).
- Instead of establishing SSL with each account, one might subscribe to a personal VPN service (like WiTopia).
VIII. MALWARE EDUCATION
Many who advocate better security can be accused of using "FUD" (Fear, Uncertainty and Doubt) to advance their cause. But if FUD by itself was a bad thing, there would be little reason to buy insurance, or even door locks, for that matter. The question is whether the problems are real or just made up, and whether the cure actually works or is just expensive snake oil.
Computer insecurity is real, and implies levels of technical, corporate, governmental and national security incompetence that are almost impossible to believe. Booting Puppy Linux from DVD is a real solution for increased security. You need not believe me: Read the articles, follow them up, and come to your own conclusions:
All Operating Systems are Vulnerable
- "The trojan was discovered last week and functions as a Java applet. It was particularly designed to target Windows and Mac OS X users" "Because of the cross-platform nature of Java, the trojan is also capable of running on other operating systems like Linux, Solaris or BSD." "However, on OSs other than Windows and Mac OS X, it's inoffensive, because the malicious code was not designed for these platforms." (Sophos, Softpedia Nov. 2010)
- "New Koobface Variant Infects Linux Systems" "new attack is capable of infecting Windows, Mac OS X and Linux systems" (ParetoLogic, Softpedia Oct. 2010)
- "Cross-platform Boonana Trojan targets Facebook users" "it doesn't just infect Windows, but targets Mac OS X and Linux computers too." "Visitors to the webpage who want to see more are prompted to give permission for an applet called JPhotoAlbum.class to be run from inside a Java Archive (JAR) called JNANA.TSA." "Whether you are running Windows, Mac OS X or Linux on your computer, if you give permission for the highly obfuscated Java app to run then the malware will sneakily download a variety of programs from the internet which it will then execute on your computer." (Sophos Oct. 2010)
- "Microsoft Warns of Spike in Java Exploitation Attempts" (Softpedia Oct. 2010)
- "Linux bug bestows attackers with 'superuser' powers" (The Register Oct. 2010)
- "Google patches Chrome second time this month" (Computerworld Sep. 2010)
- "The Linux kernel has been purged of a bug that gave root access to untrusted users � again." (The Register Sep. 2010)
- "More Mac OS X malware discovered" (Sophos Jun. 2009)
Malware Steals
- "Zeus hackers may target corporate data" (Computerworld Oct. 2010)
- "Credit card fraudsters are increasingly resorting to salami ATM attacks, that are very difficult to detect and can result in significant losses." (Gartner, Softpedia Oct. 2010)
- "New Banking Trojan Targets Over a Dozen Financial Institutions" (FireEye, Softpedia Oct. 2010)
- "Bill Would Give Cities, Towns and Schools Same e-Banking Security Guarantees as Consumers" (Krebs Oct. 2010)
- "One in Five Infected Computers Had a ZeuS Variant" "ZeuS is commonly used by fraudsters to steal sensitive financial information from victims, such as online banking credentials or credit card details." (Microsoft, Softpedia Oct. 2010)
- "For the first time ever, more companies are suffering from electronic theft than from physical theft" (Kroll, cnet Oct. 2010)
- "if the user deletes their standard HTTP cookies, LSO data, and all HTML5 storage, the PNG cookie and history cookies will still exist. Once either of those are discovered, all of the others will come back " (Evercookie, Oct. 2010)
- "computer trojans represent 55% of new malicious samples detected during the third quarter and are also responsible for 54% of all infections." (Panda, Softpedia Sep. 2010)
- "U.S. Businesses Could Lose Up To $1 Billion In Online Banking Fraud This Year" (dark reading Sep. 2010)
- "East European criminals have managed to infect up to 100,000 UK-based PCs with the feared Zeus malware used to steal online banking logins" (Trusteer, PCWorld Aug. 2010)
- "Texas Firm Blames Bank for $50,000 Cyber Heist" (Krebs Aug. 2010)
- "the first malicious program installed is called a downloader. A downloader's goal is to be installed on the victim's PC and then to "phone home" to the "mothership" Web server for more instructions." (Computerworld Aug. 2010)
- "the malware can wait for the user to conduct a transaction (such as wiring money to another account). At this time, the malware can change the transaction submission so that the money is wired to another account." "malware that is capable of modifying HTML can simply replace the details of the transaction displayed to the user by the details of the transaction expected by the user" "by hooking/patching the WinInet InternetReadFile family of functions, the malware can read and manipulate the HTML response from the web server, just before Microsoft Internet Explorer receives it." (Trusteer, perhaps Aug. 2010)
- �Most of the infected hosts appeared to be home users, [...] but there were a large number of infected hosts inside of state and federal government agencies; Fortune 500 and 100 companies; drug companies and even banks,� (Sunbelt, Softpedia July 2010)
- "Organized criminals were responsible for 85 percent of all stolen data last year and of the unauthorized access incidents, 38 percent of the data breaches took advantage of stolen login credentials" (Verizon, cnet July 2010)
- "Texas Firm Blames Bank for $50,000 Cyber Heist" (Krebs Aug. 2010)
- "The basic architecture of online banking was designed without the idea that the user would encounter this type of malicious Trojan, he notes, adding, "In that sense, this paradigm of banking is broken." (SecureWorks, Network World June 2010)
- "Zeus is a game changer virus for the financial services industry, and perhaps its most pernicious computer-related threat. It specifically targets banking information by users and will defeat strong multi-factor authentication (MFA) methods used by banks including hardware tokens with one-time random passwords." (Invincea May 2010)
- "Fire Alarm Company Burned by e-Banking Fraud" (Krebs Apr. 2010)
- "e-Banking Guidance for Banks & Businesses" (Krebs Apr. 2010)
- "N.Y. Firm Faces Bankruptcy from $164,000 E-Banking Loss" (Krebs Mar. 2010)
- "eBanking Victim? Take a Number." (Krebs Mar. 2010)
- "Organized Crooks Hit NJ Town, Ark. Utility" (Krebs Mar. 2010)
- "AVprofit: Rogue AV + Zeus = $" (Krebs Mar. 2010)
- "Man in the Browser a.k.a MITB is a new breed of attacks whose primary objective is to spy on browser sessions (mostly banking) and in that process intercept and modify the web page contents transparently in the background. In a classic MITB attack, It's a very likely that what the user is seeing on his/her browser window is not something which the actual server sent. Similarly, what server sees on the other end might not be what user was intending to send." (FireEye Feb. 2010)
- "Texas Bank Sues Customer Hit by $800,000 Cyber Heist" (Krebs Feb. 2010)
- "Zeus Trojan found on 74,000 PCs in global botnet" "In addition to stealing specific data, Zeus can be used to search for and steal any file on the computer, download and execute programs and allow someone to remotely control the computer." (cnet Feb. 2010)
- "PC Invader Costs Ky. County $415,000" (Krebs, Wash. Post July 2009)
- "Web Fraud 2.0: Franchising Cyber Crime" (Krebs, Wash. Post June 2009)
- "Massive Profits Fueling Rogue Antivirus Market" (Krebs, Wash. Post Mar. 2009)
Malware Targets Microsoft Windows
- "Windows malware dominates Mac malware detection chart" (The Register Nov. 2010)
- "World's most advanced rootkit penetrates 64-bit Windows" (The Register Nov. 2010)
- "G-Data reckons 99.4 per cent of all new malware of the first half of 2010 targeted Microsoft�s operating system. Just 0.6 per cent of the 1,017,208 new malware programs discovered in 1H2010 targeted other systems, such as Apple Mac boxes and servers running Unix." (G-Data, The Register Sep. 2010)
- "no Mac or Linux users are affected by the alert. According to a pie chart released by Trsuteer, all the affected computers run versions of Windows, particularly Windows XP and to a lesser extent Vista." (Trusteer, PCWorld Aug. 2010)
- Since the known banking Trojan malware is Windows-based � "there are no Mac banking Trojans yet," Stewart says � he views the situation today as largely one centering on Windows-based machines. "I wouldn't recommend banking online with Windows." (SecureWorks, Network World June 2010)
- "Windows, Mac or Linux: Which is the most secure?" "People have tried to attack Microsoft's products because of the (huge) market share. If I'm an attacker, and I want to make the most profit from my attacks, I'm better off going for the company with the most machines out there." (Computerworld June 2010)
- "Mac OS malware threat still low" (ZDNet May 2010)
- "Question: Why switch to Linux or a Mac?" "Answer: Because, you can't keep Windows secure even if you do the right things." "I did think that even though Windows is defective by design, you could keep it relatively safe by installing patches quickly and using anti-virus software religiously. I was wrong." (IT World Apr. 2010)
- "Time to ditch Windows for online banking and shopping" (ZDNet Oct. 2009)
- "Avoid Windows Malware: Bank on a Live CD" (Krebs, Wash. Post Oct. 2009)
- "Crimeware gets worse - How to avoid being robbed by your PC" "when it comes to your computer, there is one obviously best solution. Do online banking from Linux using Firefox." (Computerworld Sep. 2009)
Passwords
Email and SSL Security
- "Of the major webmail providers in the U.S., only Gmail is secure against sidejacking attacks. Yahoo Mail and HotMail are insecure, and can be compromised quickly." (Errata Security, Nov. 2010)
- "Understanding the TLS Renegotiation Attack" (Educated Guesswork, Nov. 2009)
- "My take on the SSL MITM Attacks � part 1 � the HTTPS attack" "These aren�t the same as old-style MITM attacks, which relied on the attacker somehow pretending strongly to be the secure site being connected to � those attacks allowed the attacker to get the entire content of the transmission, but they required the attacker to already have some significant level of access. The access required included that the attacker had to be able to intercept and change the network traffic as it passed through him, and also that the attacker had to provide a completely trusted certificate representing himself as the secure server." "The current SSL MITM attack follows a different pattern.... The attacker still needs to be able to intercept and modify the traffic between client and server, but does not get to see the content of traffic between client and server. All the attacker gets to do is to submit data to the server before the client gets its turn." (Tales from the Crypto, Nov. 2009)
- "SSL doesn't stop you from being conned with a MITM using his own (or acquired) server to perpetrate a fraud assuming he redirected you to his server" (WebmasterWorld, July 2008)
- "Even SSL Gmail can get sidejacked" (ZDNet Jan. 2008)
Patching is Increasingly Tedious and Ineffective
- "35% of his readers were running outdated Flash plug-ins" (ZDNet Nov. 2010)
- "Zero Day readers, why aren't you patching Flash Player?" (ZDNet Nov. 2010)
Windows Has 91 Percent Browsing Share
- "Mac OS usage share down worldwide, up in the US" (ZDNet Nov. 2010)
- "Windows 91.09%, Mac 5.00%" (NetMarketShare, Nov. 2010)
- "computers used for web browsing are dominated by Microsoft Windows, which has a usage share estimated to be around 90%, while Linux is quoted to have a share around 1%" (Wikipedia, Oct. 2010)
- "Microsoft - quarantine infected PCs!" (Sophos Oct. 2010)
Everybody Has a Malware Problem
- "McAfee: Spam down, but malware up" "malware has reached an all-time high, according to the security technology company, which identified an average of 60,000 new threats each day in the third quarter, almost quadrupling since 2007. For 2010 so far, McAfee has discovered 14 million unique pieces of malware, a million more than this time last year." (McAfee, cnet Nov. 2010)
- "Cyber security by the numbers: Malware surges, spam declines in third quarter" (ZDNet Nov. 2010)
- "Even though overall spam volumes were down slightly during the month of September, we saw a huge increase in malware distributions beginning mid-month with a peak of nearly 11 million pieces delivered in one day," (AppRiver, Softpedia Oct. 2010)
- "Report: Half of apps have security problems" (Veracode, cnet Sep. 2010)
- "Avoid Scripting. This may be the one piece of advice that will do most to keep you the safe on the Web: Steer clear of JavaScript, especially on sites you don't trust." (PCWorld July 2010)
- "Report: 48% of 22 million scanned computers infected with malware" (ZDNet Jan. 2010)
- "the average number of PCs hit by malware now stands around 59 percent" (Panda Security, cnet Sep. 2009)
Avoiding Dangerous Sites Cannot Protect You
- "Compromised Websites Use Java Flaws, Hit Japanese Users" (Trend Micro. Nov. 2010)
- "After years of burying malicious software in email and portable storage media, attackers now favor quick downloads via legitimate websites" (dark reading Nov. 2010)
- "Malicious PDFs find a novel way of running JavaScript" (Sophos Nov. 2010)
- "websites hosted at Go Daddy are currently targeted in mass injection attacks, that add rogue code to their pages and direct visitors to scareware." (Securi, Softpedia Nov. 2010)
- "The attack starts with users visiting a legitimate site, that was compromised and had rogue JavaScript code injected into its Web pages." (Trend Micro, Softpedia Nov. 2010)
- "one in eight malware attacks, out of the 700,000 recorded during the last week of October, came from USB devices." (Avast, Softpedia Nov. 2010)
- "A new critical vulnerability in Flash and Adobe Reader and Acrobat 9.x is being exploited to attack computers running the popular PDF viewer software" (cnet Oct. 2010)
- "a new variant of a computer worm sends itself attached to fake emails that appear to originate from Google, Facebook, Twitter, hi5, Amazon or Hallmark." (Softpedia Oct. 2010)
- "XSS Flaw Found on Secure American Express Site" (Softpedia Oct. 2010)
- "a recent Panda survey of more than 10,000 small- and medium-sized firms found that 27% of those victimized by a malware infection in the last year reported that the attack had originated with infected USB hardware, primarily flash drives." (Panda, Computerworld Aug. 2010)
- "New obfuscation technique using JavaScript in legitimate sites" (Sophos Aug. 2010)
- "a new mass injection attack affecting websites hosted at Rackspace and Media Temple. The compromises result in rogue JavaScript code being added to legit .js files used by the affected websites." (Softpedia Aug. 2010)
- "New Bank of America Phishing Scheme Abuses Legit Websites" (Softpedia Jul. 2010)
- "Spam SEO: Use of Java/Flash leads to more dangerous exploits" "Over the past 3 days, we've seen some even more dangerous websites using Java exploits and Flash vulnerabilities. These malicious pages do not require any user interaction to infect users. They are also very difficult to detect - the exploits are hidden behind several layers of Javascript redirects and use obfuscation." (Zscaler June 2010)
- "New research pours scorn on the comforting but erroneous belief that Windows surfers who avoid smut and wares on the web are likely to avoid exposure to malware. A study by free anti-virus firm Avast found 99 infected legitimate domains for every infected adult web site." (Avast, The Register June 2010)
- "Poisoned search results: How hackers have automated search engine poisoning attacks to distribute malware" (Sophos Mar. 2010)
- "Ads--the new malware delivery format" "Instead of hacking into major online sites to embed malware, malicious hackers are going in through the front door by exploiting security holes in systems for delivering ads." (ZDNet Sep. 2009)
- "Attackers inserted malware into ads in an apparent attempt to get users to download rogue anti-virus software" (eWEEK Feb. 2009)
Authentication Cannot Protect You
- "researchers found a new ZeuS component in the form of a malicious mobile application, designed to steal two-factor authentication tokens sent via SMS." (Trend Micro, Softpedia Oct. 2010)
- "Want my autograph? The use and abuse of digital signatures by malware" (Sophos Sep. 2010)
- "Are signed files safer than others?" (Sophos Sep. 2010)
- "Can you trust signed code? No, you can't!" "there are literally tens of thousands of instances of malware in the wild that are signed." (F-Secure, ZDNet June 2010)
- "Modern banker malware undermines two-factor authentication" "Once pitched as an additional layer of security for E-banking transactions, two-factor authentication is slowly becoming an easy to bypass authentication process" (ZDNet Sep. 2009)
- "Attacks on banks." "the increased usage of two-factor authentication by financial organizations has resulted in an increase in malware capable of defeating this type of authentication. This means that the eventual adoption of two-factor authentication will not have any significant long-term effect. It will simply raise the benchmark for financial malware." "Unfortunately, the experience of the anti-virus industry shows that user education has a limited effect," (Securelist, Oct. 2008)
Anti-Virus Cannot Protect You
- "According to the ZeuS Tracker project, the average signature-based detection for ZBot binaries is somewhere around 40 percent." (Softpedia Oct. 2010)
- "ZeuS Variant Tries to Evade Heuristic Detection and Sandbox Analysis. "[�] Common ZeuS 2.0 variants contain relatively few imported external APIs. By contrast, TSPY_ZBOT.BYZ imports many external APIs. "To a heuristic scanner, this changes the appearance of the file and lowers the possibility of detection," (Trend Micro, Softpedia Oct. 2010)
- Jaquith says security has three elements: prevention, detection, and response. "If you put all of your eggs in the prevention basket, you find a surprise when those protections fail," Instead of just trying to stop everything at the "front door," he says, "survivability and recoverability should be what's emphasized." (dark reading Sep. 2010)
- "until a patch is released, that hole--known as a zero-day vulnerability--in effect makes your computer a sitting duck for anyone who writes an exploit for it and bothers to distribute it via e-mails and drive-by downloads on Web sites." (cnet Sep. 2010)
- "The malware industry has published nearly four new viruses per minute in the first half of the year. We expect the two million barrier to be broken in the second half of the year," (G Data, Sep. 2010)
- "Zeus Virus Malware � Most Software Cannot Detect This Trojan." "In a recent study by Trusteer, it has been revealed that as much as as 55% of all the tested 10,000 computers, which were equipped with the latest updated security software and antivirus, were not able to detect and remove the traces of Zeus Virus." "no software, howsoever smart, intelligent and pricey, can buy you the absolute PC Security and Privacy. The safety of your computer is within your own hands. You MUST exercise caution before you click on any link." (Trusteer, PC Security Aug. 2010)
- "Malware hit an all-time high in the first half of this year, at 10 million new samples, according to a new McAfee report, with the top two being AutoRun malware and password-stealing Trojans." (McAfee, dark reading Aug. 2010)
- "A study by web intelligence firm Cyveillance found that, on average, vendors detect less than 19 per cent of malware attacks on the first day malware appears in the wild. Even after 30 days, detection rates improved to just 61.7 per cent, on average." (Cyveillance, The Register Aug. 2010)
- "Recent studies from Trusteer and other fraud detection vendors show that antivirus solutions detect only 10 percent of active financial malware." (Trusteer July 2010)
- "Bank customers are being targeted by criminals using regional specific malware that flies under the radar of most antivirus technology to steal peoples online banking credentials and commit fraud. Detection rates for regional malware are between zero and 20%, suggesting that the majority of these attacks go undetected." (Trusteer, Help Net July 2010)
- "malware authors routinely submit their creations to online scanners. They repeat this process over and over again, until they've successfully created a virus, worm, or Trojan that the scanner won't detect. And that's the one they'll use to attack your system. This means the vast majority of new viruses, worms, Trojans and other malicious software may not be detected by most antivirus or antispyware scanners until after (a) it's been discovered and (b) you've applied the necessary updates." (About.com Jun 2010)
- "even the most popular AV signature-based solutions detect on average less than 19% of malware threats. That detection rate increases only to 61.7% after 30 days." (Cyveillance, Net Security Apr. 2010)
- "Traditional means of detecting malware are failing at finding advanced, targeted bots, and backdoors." (dark reading Mar. 2010)
- "Installing an anti-virus product and maintaining it up to date reduces the probability to get infected by Zeus by 23%" (Trusteer, ZDNet Sep. 2009)
- "McAfee said that this is over double the 500,000 unqiue pieces of malware it identified in the same period in 2008. In total, the security firm identified 1.5 milliion types of malware in 2008, and it expects the 2009 figure to top this." (McAffe, PCWorld July 2009)
Removing Malware Cannot Protect You
- "Licat has the characteristics of a traditional virus, as it adds malicious code to all EXE, DLL and HTML files detected on an infected system." (Trend Micro, Softpedia Oct. 2010)
- "the average compromised machine is home to 13 infected files as well as malicious programs from three different malware families." (ESET, eWeek Sep. 2009)
- "Rebuilding Your System Is the Safest Road to Recovery after a Malware Attack." "Information Security recommends formatting one's hard drive followed by a complete software reinstallation in response to a system compromise. The success rate of virus/malware cleanup and recovery tools is quite low due in large part to malware writers development of strategies to evade such tools. Incomplete or ineffective removal means the attacker may regain control of the computer. Complete reinstallation is usually necessary: A reinstallation includes not only the operating system, but also application software." (UWM InfoSec, Aug. 2009)
- "The only way to be absolutely positive that you've removed any and all viruses is: * Backup, * Reformat, * Reinstall, * Update, * Restore, * Learn." (Ask Leo, July 2009)
- "If you discover malware on your system, don't mess around. Back up your data, format your hard drive, and begin again" (InfoWorld Feb. 2009)
- "Instead of replying to every single "I have a virus" post, I am going to say this once." "The best current practice for cleaning up a system on which malware has been executed is to reinstall the operating system cleanly." "...the only way to be certain that your system is clean is to reinstall it." (Windows Security June 2008)
- "Microsoft Says Recovery from Malware Becoming Impossible" "A Microsoft security official recommends that big businesses invest in an automated process to wipe hard drives and reinstall malware-infested operating systems." (Baseline Apr. 2006)
Your Equipment Cannot Protect You
- "The firewall was designed to block someone from the outside connected to servers on inside," Zuk said. "Web applications have changed that so that the traditional stateful inspection firewall - invented by Check Point 15 years ago - doesn't do anything any more." (Palo Alto Networks, The Register Oct. 2010)
- "Saving website logic credentials is a user controlled option in all browsers, often enabled by default. But the practice is frowned upon by security researchers, who point to the risk that passwords left in browsers might easily be extracted by password-stealing Trojans, such as Zeus." (The Register Oct. 2010)
- "IE users most at risk from DLL hijacking attacks" (Acros, Computerworld Sep. 2010)
- "Newest Adobe zero-day PDF exploit 'scary,' says researcher. Bypasses Windows DEP and ASLR defenses, comes with valid digital certificate" (Computerworld, Sep. 2010)
- "How to Hack Millions of Routers" "DNS rebinding first appeared 15 years ago. It was a clever penetration technique until Web browsers were fixed. It now appears there is a workaround for the fix and residential gateway devices are the targets." "Prevention is simple. This attack requires knowing the username and password to access the gateway device's configuration Web pages. The bad guys are hoping the default settings are still in use. So, make it hard for them. Change the user name if possible and replace the default password with a nasty and hard to figure out one." (ZDNet Aug. 2010)
- "Millions of routers vulnerable to hack attack - Is yours?" "The hack relies on tricking people to visit a malicious website. From that point on, the router itself can be hijacked and the poor user redirected pretty much anywhere the hacker wants them to go. The hack relies on a hack known as �DNS rebinding,� something that has been around for nearly 15 years:" (ZDNet July 2010)
- "Hidden Threat: NTFS Alternate Data Streams (ADS)." "files with ADS are almost impossible to be detected by native file browsing techniques like Windows Explorer or the command line; software that can identify them are few and far in between... " "The ability to hide executable code in an invisible form inside ADS can also make viruses difficult to be detected within a file system, because most virus scanners only verify the default data stream of files. Major Anti-virus vendors point out that ADS must be loaded into the memory before execution and thus will be detected with real-time scanning" (Think Digit Aug. 2009)
- "The NT File System allows alternate data streams to exist attached to files but invisible to some file-handling utilities" "In 2009, the alternate data stream was used by a click fraud Trojan named FFSearcherWeb Link. the Trojan implanted a DLL file that contained the Trojan's code. The registry was changed to point to the ADS DLL instead so it ran instead of the normal DLL file." (Computer Knowledge May 2009)
- "Joanna Rutkowska and Rafal Wojtczuk today published a research paper describing a proof-of-concept rootkit that a hacker can install on a system through a vulnerability in Intel CPUs' caching memory." (InternetNews Mar. 2009)
- "Researchers demo BIOS attack that survives hard-disk wipe" "a BIOS level malware attack capable of surviving even a hard-disk wipe." (Core Security, ZDNet Mar. 2009)
You Need a Password Manager
Wi-Fi is Trickier than You Think
- "Firesheep�s Real Lesson: Take Wi-Fi Security Seriously" (ZDNet Oct. 2010)
- "Surfers who install Firesheep can capture the credentials of anyone who happens to be using the same open network." (The Register Oct. 2010)
- "How to Crack a Wi-Fi Network's WEP Password with BackTrack" (lifehacker Oct. 2010)
- "Hole 196 WPA2 Vulnerability - Who Cares?" "the bad guy must be authenticated and authorized on the WPA2 network to begin with." "Remember, once the data is dumped off onto a wired connection, the vast majority of the time wired traffic is not encrypted at the network level unless you are tunneling it using something like IPSec or GRE. So with this new vulnerability, your internal users can possibly sniff and manipulate traffic...just like they can now on your wired connection." "If you want securely encrypted applications, why don't you look at securing the applications? Have your applications developers ever heard of SSH or SSL?". (EzineArticles July 2010)
- "WPA2 Vulnerability Allows for Man-in-the-Middle Attacks" (AirTight, July 2010)
- "Wi-Fi key-cracking kits sold in China mean free Internet" "To crack a WEP key, the applications exploit weaknesses in the protocol that have been known for years. For WPA, they capture data being transmitted over the wireless network and target it with a brute-force attack to guess the key." (Computerworld May 2010)
- "How to hack WPA wireless security in one minute. Switch to WPA2, users urged." (ComputerWorldUK Aug. 2009)
- "Networking nerds claim to have devised a way of breaking Wi-Fi Protected Access (WPA) encryption within 60 seconds." "The technique...involves making minor changes to packets encrypted with TKIP - Temporal Key Integrity Protocol, a WPA security mechamism - and then sending those packets back to the access point." "...[the] technique doesn�t work in WPA 2 � the AES-based successor to WPA." (The Register Aug. 2009)
- "YOUR Unsecured Wireless Internet is the Dangerous Weak Link" (IdahoFallsToday Mar. 2007)
- "How Secure Is Your Wi-Fi Connection?" (Pogue's Posts, Jan. 2007)