Using Windows Home Server

All about Windows Home Server, the Digital Home and Security.

Posts Tagged ‘Security

Black Hat Europe 2009 Next Week

leave a comment »

bh-thumb Black Hat Europe starts next week and will held in Amsterdam. Black Hat has 4 separate briefing tracks, which are Hardware and Embedded Devices, Reverse Engineering and Malware, Client Wars and Application Security, Forensics and Network Protection with lots of different sessions in each track delivering up to date and relevant information on the latest security issues.

For more information about this conference and to register, click here. But hurry, the conference is next week. I will be there and will report back!

Written by Andrew Edney

April 9, 2009 at 7:56 am

Building an Astaro Personal Firewall with Spare or Low End Parts – Part Three now available

leave a comment »

Continuing in his series on how you can build your own Astaro Personal Firewall with either spare or low end parts, and no other cost MVP Pete Stagman had just published part three.

This week’s part is all about DMZ’s – enjoy!

To read part three, click here.

Written by Andrew Edney

March 23, 2009 at 8:35 am

Internet Explorer 8 Released Today

leave a comment »

IE8

Later today see’s the launch of Microsoft’s Internet Explorer 8 browser. IE8 has been available as a beta for quite a while now, but today it’s finally moved to a released version and it is available in 25 different languages.

Some of the new features of IE8 include:

Accelerators. Accelerators make it faster and easier to perform common tasks online by making Web-based services such as ESPN.com, Live Search and Sina available for use directly from the page people are viewing. Users can simply right-click a word or phrase and instantly map, e-mail, or share it.

Web Slices. Web Slices in Internet Explorer 8 makes favourite information from sites such as Digg, Yahoo! Mail, OneRiot, and eBay instantly available wherever someone goes on the Web.

Visual search suggestions. The Instant Search Box in Internet Explorer 8 enables rich, real-time search from sites such as The New York Times, Amazon.com and Wikipedia, as well as sites from people’s own Favourites and History, complete with visuals and detailed information that saves time.

There are also a number of security enhancements in IE8, including:

InPrivate. InPrivate helps to protect people’s data and privacy from being retained locally on the PC they are using. This protects against third parties who might be in a position to track a consumers’ online activities. Consumers have the ability to use either of the features (InPrivate Blocking or InPrivate Filtering) independently.

InPrivate Browsing. When activated, InPrivate Browsing helps ensure that History, temporary Internet files and cookies are not recorded on a PC after browsing. When in InPrivate Browsing, toolbars and extensions are automatically disabled, and browsing History is automatically deleted when the browser is closed.

InPrivate Filtering. InPrivate Filtering helps protect privacy by enabling the consumer to filter content coming from third parties that are in a position to track and aggregate their online behavior. Users are provided with notice, choice and control of which third parties to allow and which ones to filter.

I have been using the beta of IE8 now since the middle of last year and while some of the earlier beta releases had problems, I have to say that I actually do like it. There are some websites that it has problems with, but there is this Compatibility View which you can choose to show those websites instead.

To download Internet Explorer 8 today, click here.

Note: If you are one of those people, like myself, who is running Windows 7 in beta as well, you cannot upgrade to IE8 at this time, you will need to wait for the release candidate of Windows 7.

Written by Andrew Edney

March 19, 2009 at 8:32 am

Building an Astaro Personal Firewall with Spare or Low End Parts – Part Two now available

leave a comment »

Last week I posted that my friend, and fellow MVP Pete Stagman had just published the first in a series of articles on how you can build your own Astaro Personal Firewall with either spare or low end parts, and no other cost.

Well this week he has posted part two which includes how to connect your new Astaro firewall to your network, an explanation on IP addressing and subnet masks, and even information on if you want to run a Web server or a Windows Home Server on the network.

To read part two, click here.

Written by Andrew Edney

March 16, 2009 at 9:42 pm

Building an Astaro Personal Firewall with Spare or Low End Parts

with 2 comments

My friend, and fellow MVP, Pete Stagman has just published the first in a series of articles on how you can build your own Astaro Personal Firewall with either spare or low end parts, and no other cost.

Running a firewall is very important, in fact critical, just see my post here, although you wouldn’t run this on your laptop and take it with you (the requirement for three network cards might be a problem on your laptop).

Part one includes hardware requirements, registering, downloading and installing the software, and some basic configuration.

Additional parts will include advanced configurations and much more.

To read the part one, click here.

I will be trying this myself, so I will report back on how I get on.

Written by Andrew Edney

March 9, 2009 at 1:20 am

Posted in Security

Tagged with , , ,

Why You Should Always Run Anti Virus Software and Firewalls

with 6 comments

Earlier today I was sitting in the lounge of a major International airport and I connected my computer up to their free Internet service, via a wired connection, which is provided to all visitors of the lounge.

Literally within minutes my computer was being attacked, and fortunately I am running both Anti Virus software and a Firewall, which meant in this case, the attack was blocked. The software I am running also performs continual updates which means as long as I have a connection to the Internet I am updated with whatever updates and definition files are available.

Even so, I decided to remove my computer from their network as it was badly configured and unprotected!

The moral of the story is this, no matter where you are, no matter if you think your computer will be safe, always, always, always make sure that you are protected as best as possible. And always think before connecting to an unknown network, even if you would think that something provided by a reputable airline would be safe.

Written by Andrew Edney

March 7, 2009 at 2:55 am

Posted in Security

Tagged with , , ,

Firefox Releases version 3.0.7 – with Five Security Fixes

leave a comment »

Today (March 6th), the new version of Firefox, version 3.0.7 was released to the world.

This release has a number of bug fixes and updates in it, but the really important reason to download this release and update your existing installation of Firefox is that it contains 5 security fixes, three of which are classified as Critical and one as High. They are as follows:

MFSA 2009-11 URL spoofing with invisible control characters (LOW)
MFSA 2009-10 Upgrade PNG library to fix memory safety hazards (CRITICAL)
MFSA 2009-09 XML data theft via RDFXMLDataSource and cross-domain redirect (HIGH)
MFSA 2009-08 Mozilla Firefox XUL Linked Clones Double Free Vulnerability (CRITICAL)
MFSA 2009-07 Crashes with evidence of memory corruption (rv:1.9.0.7) (CRITICAL)

Mozilla define Critical as “Vulnerability can be used to run attacker code and install software, requiring no user interaction beyond normal browsing.”

So for all of you Firefox user’s out there, download and update your Firefox installation now to ensure you are protected from these vulnerabilities.

Written by Andrew Edney

March 6, 2009 at 2:20 am