Saturday, September 18, 2010

case # 7

WAYS TO SECURE COMPUTER SYSTEM FROM BEING COMPROMISED


  • Consult your system support personnel if you work from home
  • If you use your broadband access to connect to your employer's network via a Virtual Private Network (VPN) or other means, your employer may have policies or procedures relating to the security of your home network. Be sure to consult with your employer's support personnel, as appropriate, before following any of the steps outlined in this document.

  • Don't open unknown email attachments
  • Before opening any email attachments, be sure you know the source of the attachment. It is not enough that the mail originated from an address you recognize. The Melissa virus spread precisely because it originated from a familiar address. Malicious code might be distributed in amusing or enticing programs.

    If you must open an attachment before you can verify the source, we suggest the following procedure:

    1. be sure your virus definitions are up-to-date (see "Use virus protection software" above)
    2. save the file to your hard disk
    3. scan the file using your antivirus software
    4. open the file

    For additional protection, you can disconnect your computer's network connection before opening the file.

    Following these steps will reduce, but not wholly eliminate, the chance that any malicious code contained in the attachment might spread from your computer to others.

  • Don't run programs of unknown origin
  • Never run a program unless you know it to be authored by a person or company that you trust. Also, don't send programs of unknown origin to your friends or coworkers simply because they are amusing -- they might contain a Trojan horse program.

  • Disable hidden filename extensions
  • Windows operating systems contain an option to "Hide file extensions for known file types". The option is enabled by default, but you can disable this option in order to have file extensions displayed by Windows. After disabling this option, there are still some file extensions that, by default, will continue to remain hidden.

    There is a registry value which, if set, will cause Windows to hide certain file extensions regardless of user configuration choices elsewhere in the operating system. The "NeverShowExt" registry value is used to hide the extensions for basic Windows file types. For example, the ".LNK" extension associated with Windows shortcuts remains hidden even after a user has turned off the option to hide extensions.

    Specific instructions for disabling hidden file name extensions are given in

  • Keep all applications, including your operating system, patched
  • Vendors will usually release patches for their software when a vulnerability has been discovered. Most product documentation offers a method to get updates and patches. You should be able to obtain updates from the vendor's web site. Read the manuals or browse the vendor's web site for more information.

    Some applications will automatically check for available updates, and many vendors offer automatic notification of updates via a mailing list. Look on your vendor's web site for information about automatic notification. If no mailing list or other automated notification mechanism is offered you may need to check periodically for updates.

  • Turn off your computer or disconnect from the network when not in use
  • Turn off your computer or disconnect its Ethernet interface when you are not using it. An intruder cannot attack your computer if it is powered off or otherwise completely disconnected from the network.

  • Disable Java, JavaScript, and ActiveX if possible
  • Be aware of the risks involved in the use of "mobile code" such as ActiveX, Java, and JavaScript. A malicious web developer may attach a script to something sent to a web site, such as a URL, an element in a form, or a database inquiry. Later, when the web site responds to you, the malicious script is transferred to your browser.

    The most significant impact of this vulnerability can be avoided by disabling all scripting languages. Turning off these options will keep you from being vulnerable to malicious scripts. However, it will limit the interaction you can have with some web sites.

    Many legitimate sites use scripts running within the browser to add useful features. Disabling scripting may degrade the functionality of these sites.

    More information on ActiveX security, including recommendations for users who administer their own computers, is available in

    More information regarding the risks posed by malicious code in web links can be found in

  • Disable scripting features in email programs
  • Because many email programs use the same code as web browsers to display HTML, vulnerabilities that affect ActiveX, Java, and JavaScript are often applicable to email as well as web pages. Therefore, in addition to disabling scripting features in web browsers (see "Disable Java, JavaScript, and ActiveX if possible", above), we recommend that users also disable these features in their email programs.

  • Make regular backups of critical data
  • Keep a copy of important files on removable media such as ZIP disks or recordable CD-ROM disks (CD-R or CD-RW disks). Use software backup tools if available, and store the backup disks somewhere away from the computer.

  • Make a boot disk in case your computer is damaged or compromised
  • To aid in recovering from a security breach or hard disk failure, create a boot disk on a floppy disk which will help when recovering a computer after such an event has occurred. Remember, however, you must create this disk before you have a security event.

    case # 6

    CONSUMER ACT OF THE PHILIPPINES


    ☺MY REACTION☺

    This act helps consumer regarding against business policy,helps to have privacy. This act helps to caught those who are not abiding the law regarding in the business cause as said the one who prevails to abide the law could be penalized.

    case # 5

    HOW NEW TECHNOLOGY REWIRING OUR BRAINS?


    Yου rесkοn your car radio іѕ broken bесаυѕе it doesn't display the name of the song аnd the artist. Yου tap a word οn a paperback аnd wonder why the definition doesn't automatically pop up. Yου smack a digit асrοѕѕ the cover of your cell phone аnd all уου get are fingerprint smudges.

    then уου remember: Thаt isn't a satellite radio. Yου're reading аn actual book, nοt a Kindle. It's nοt a smart phone, іt's a dumb one. Yου were expecting the сοοl capabilities of nеw technology–frοm ancient technology.

    “It used to be wе wanted to keep up with the Joneses,” ѕауѕ Christine Louise Hohlbaum, author of Thе Power of slow: 101 Ways to Save Time in our 24/7 World. “Now all wе want іѕ to keep up with our gadgets. Technology pervades еνеrу position of our lives. our touchscreen existence has literally rewired our brains. our behavior іѕ аlѕο informed by the technology wе υѕе. Wе tap, ping, аnd Skype [download], all day long.”

    Sο sometimes wе get a little flummoxed whеn confronted by something thаt isn't digital–lіkе a door thаt really requires a key, or a book whose pages don't turn by themselves, or a TV thаt plays shows in real time with nο skipping past the commercials.

    Iѕ thіѕ a common problem, or are wе just spoiled geeks? Wе asked around. Turns out wе're nοt the only ones who regularly have out-οf-technology experiences. Here are some typical ones.

    case # 5