Privacy and Spyware

    Listed below, following the URL list, are several messages relating to computer security and privacy invasions.  I am NOT the author of anything below the URL list.  The questions asked and the information provided however is very well worth while reading if you value your privacy and security.

    Several URLs are listed in this pack of messages.  To give you a much better idea of how your computer security can be compromised and your electronic privacy invaded, I would strongly recommend the first two URLs.

http://www.tiac.net/users/smiths/privacy/banads.htm
http://www.tiac.net/users/smiths/privacy/wbfaq.htm
http://www.grc.com
http://www.networkice.com
http://www.jerrypournelle.com/
http://zonelabs.com


I read an article in the Post this weekend saying one should not become
to complacent using firewalls.  Apparently, some commercial software and
freeware have embedded programs which not only search your drive and
transmit contents, but also encrypts the information (some of these
remain even after you deleted the host application!!!).  Apparently,
many firewalls are set to sort and block certain types of information,
but if they can't read the coded sections, they go through.

Not being a techie I cannot speak to the veracity of this or the
intricacies involved, but just something (else) to look out for.

See also:

http://www.tiac.net/users/smiths/privacy/banads.htm

Check the Web Bug FAQ:

http://www.tiac.net/users/smiths/privacy/wbfaq.htm

I first read about it on Jerry Pournelle's site.


>Close.  True enough, that using a firewall should not make one >become
complacent about PC security.

But, it isn't the firewall >software that has
the spyware ("embedded programs which not >only search your drive and
transmit contents") in it.  Rather, it is >other software that you want to
use, but has spyware in it.

I wasn't saying that the firewall software had the spyware in it
(although, who knows, some might).  I was saying that some embedded
spyware programs encrypt data before it is transmitted and that some
firewall programs (according to the article) let the transmission
through because they cannot read it.  Not saying this is the case; only
that that is what the article claimed.

…………………………….

For instance, Gozilla and GetRight are popular mass downloaders.  When you
get the software, Aureate (the parent company) has included the spyware
within it.  You want to download a copy of PGP, so you use GetRight (it
has a 'resume broken download' feature which is really nice for long
d/ls).  GetRight tries to go get the d/l but bumps into the firewall.
The firewall asks you is you want to let GetRight through, so you click
OK.  GetRight goes through and reports back to Aureate
at the same time as it gets you your d/l -- because you let it past your
firewall.

Nope, a good firewall is not a be-all, end-all, but it does contribute
to your overall infosecurity requirements.  Cleaning your cache regularly,
kill your cookies or make them read-only, make sure that you don't take
candy from strangers.



The threat of being probed while on-line, especially if you use a high-speed
connection, is very real. You can log onto Steve Gibson's web site for
background, and also enable a utility there to probe your defenses and report
on the result (www.grc.com). I just tried the site and got a connection failure,
so maybe it is kaput today.
(Note: When I tried it, it worked fine.  JP)

Now for my secret defense. I use a Macintosh computer on my cable modem
line.  My alpha geek network guru told me it was a toss-up  between installing
a firewall and continuing to use just the Mac. The Mac imposes programming
impediments to the hackers, so they just look for easier systems to
break into. Which are mostly Windows machines.

You can buy a firewall for up to $1,000, or you can assemble one. It is wise
to have a separate machine for the firewall so it does not have other duties
in your system. Pretty much all you need is a 486 or better machine with two
network cards. It can be hard diskless. My guru recommends Free BSD for the
OS, but you need unix smarts or a friend to help with set up. The hardware
hot set up here in San Diego for a while was a bunch of machines from a
package delivery service which were replaced en mass. They were selling
for about $90. I understand there are several firewall programs to run on
your new appliance.



 
It's possible to probe your machine anytime you are on the internet. While
most such attacks are the work of be-zitted male social misfits, some are
done by pros who know to go for your accounting files, password files,
etc.  You can defend

-- by going online only when you need to.  This greatly abates your
exposure, as compared to a 24-7 DSL connect.

-- by reverting to paper for important personal transactions, records,
etc.  This has but little appeal to me, but it works.

-- by using an ISP which changes your address from time to time behind
the scenes, so if you are hacked they can't come back later.

-- by using linux.  Most alpha geeks I know refer to Windows as 'a
porous piece of crap.'  Vivid image, that.

-- by getting a personal firewall which monitors, defeats, and writes
evidence of hacks that can be used by your ISP to defeat them later, or
even in court.

(One guy got a personal firewall and the first attack came
when he logged as Remote into his company, which immediately probed his
computer.  He was furious and called the help desk: "What right have YOU
got to probe MY personal computer without telling us in advance, etc...."
They were furious: "When YOU log into OUR system, we have a perfect
right to... and we don't have to announce every security move we make....")
This was not the only attack he received; none of which he would ever have
known about without....

The address below sells a personal firewall.  I'm not advising you to get
it, but I am advising you to ask around about these things and consider
this or some other product.

www.networkice.com


I have been using ZoneAlarm as my firewall for awhile now and am quite
pleased with how it operates.  It was easy to configure and
works well.  One feature I like is the ability to click on "Internet
lock" which blocks my "always on" cable modem from passing
traffic in both ways when I'm not actively using it.

ZA (a beta, but a stable, good one) is available at
http://www.zonelabs.com

And, to get control over your cookies.txt file without having to get a
piece of specialized software, just convert it to read only
and leave your machine setting to accept cookies.  they'll only remain
until you log off.


Back to Index Page