Sunday, January 26, 2014

Surface Web

You think Google and Bing are huge; but those are nothing compared to the internet it self. what you see with normal .com browsers is only 4% ~ 10% of the web. The rest? Well that goes to a place called 'hidden web' or 'deep web' which is going to be one next post.
What you see with your default browser like I.E or Google Chrome, is called The surface world.These browsers have bots or spiders that can only find known URL. The rest of the material on the web are either paid, restricted, or non-conventional formats. one of the most famous format is .Onion. These can be viewed by special browser called TOR. But be careful, not all materials on deep web are legal or safe to view, things can be wild out there.
People using Surface Web are not completely anonymous, the data that is being exchanged are not completely encrypted.  But things are completely different in deep web, almost everybod is completly hidden in the  web.

Thursday, January 16, 2014

Flash Player Settings

As a wrap up to security unit, we'll end it with Flash settings.

Adobe Flash does an important role in your system, from playing Videos and much more. You can change the storage and acceptability of the program.
To start, go to Control Panel, or search for flash player settings, go to System And Security, and look for 'Flash Player' Click on the link and a window with four tabs should pop-up.





  • First tab is used for storage of information. Click on 'Local Storage by Site...' and remove any storage that you don't recognize. 
  • If you only browser only at local trusted sites, then click allow sites to save information.
  • If you surf all around the internet then Click Ask me option since some malware information can be stored without your constant; check storage at least weekly.
  •  You can Click 'Block all', but it's not recommended since some sites need space to run.

  • As for the second tab, which is for Camera and Mic, it's up to you to decide if your Camera and microphone be accessed by sites, but personally it's recommended to block all.
    • Delete any Sites you don't recognize.
  • Same  goes for Playback or peer assisted networking, if you stay at local and trusted site, click ask me option.
    • Delete any Sites you don't recognize.
  • For Advance Settings, you will need administrator permission to change any required settings;
    • You can Delete all storage, change update settings, check your current installed version, and change update settings.
      • For update section, it's recommended to allow the program to install updates automatically. Not updating  may leave the system vulnerable to security threats.
    • If you are donating or selling your computer you should  'Deauthorize' your system to prevent Flash from playing any previously viewed protected  content, such as music or movies that you may have purchased.


Final Security Tips II

Part two of final Security tips
  • Do not fall for FBI or police ransom.lock they will not lock your computer and ask you for money, they will always give you a warning first. 
    • General help:
      • Reboot and press F8 while PC is booting

    • Choose safe mode with networking
    • Launch MSConfig
    • Disable startup items rundll32 launching something from Application Data. Optionally, disable everything you do not recognize.
    • Reboot. FBI ransom-ware should not load.
  •  Pay attention to disk usage light on your computer, if there is no activity going on but the light is still flashing then something must be wrong.
  • If you notice something weird in your computer run it in safe mode. 
    • simply reboot your computer and press F8
    • chose desired option and continue
  • If your computer acts slower than usual you can go to WTM(Windows Task Manager) carefully remove any application process  that you don't recognize. 
  • Back up your computer weekly, [not a security tip but if you lose all of your information by a malware you still would have a secondary  source]
  • Remove cookies from browsers that you don't recognize.
  • When browsing at Deep web always use a proxy, and have maximum safe guards, things can be violent there.
  • Always check sites URL, some phishing sites will fool you by putting similar URL as the original one.
    • w could be changed into vv 
    • HTTPS --> HTTP
    • misspelled sites
    • incorrect domain or .com to .net or .etc
  • Be sure to have latest version of Java and only one version of it. multiple can cause security problems.
  • Check for websites or the newly installed application certificate, does it have a signature? if it doesn't or it has been expired then it's more likely to be a source of malware.
This should cover about everything fairly; next post which is on the 17th, covers about flash settings and should be a wrap up to Security Unit.

Wednesday, January 15, 2014

New updates

With New year comes with new updates! Here's some new general plans for 2014!
  1. New Terms of use and disclaimer! Check it out it has been updated!
  2. end of unit of security hopefully by the 15th 
  3. P.V.C. and new side topics
  4. Hacking and deep web!
  5. Check out January updates for  added features.
  6. former M.E Mill editor will be posting hot topics linking to this Blog, for old fans to keep in touch with new posts!
  7. Change of administration settings!
  8. A.arts galleries update.
  9. More!!! check out Blog's over view for more detailed information.

Final Security Tips I

You have learned to how to prevent your system to be infected in general and important ways; as the end of security topic of this Blog, there are going to be last tips and facts about security of your system.

  • Update all of your applications even if they take time, it's much better than re-installing the operating system because of a malware problem.
  • Get a legitimate Anti Virus + Anti spyware and Firewall program. [Windows fire wall is not as precise.]
  • Don't fall for online ransom and scams, always ask is it too good to be free? Never click on ads say "your Computer is infected, run a free scan". When you run this program it will probably create random files on your computer and call them as harmful, whats next? you got it right! they ask for amount of money to remove them, after math? your computer is not functioning better but all of your personal information has been released by you accepting the terms of service. A good Example of a scam is My Clean PC which has been advertised in media. Here's link of its reviews.
  • Scan your download, especially compressed folders such as .Rar and .Zip folders.
  • Don't click on any links you see, this is especially stressed for E-mails and social networking sites, you don't want them to take control of your account.
  • Do not make same password for everything, If a hacker finds it all of your online services is in their control. Click here for ways to make strong passwords.
  • Do not download by peer to peer, i.e torrent, you never know whats on your host computer until you open or execute it. try to download them from local server
  • The movies and songs that require you to execute a program are probably a malware, There is no .exe[ Executable ] extension for Mp3 and Mp4 files or  any media extensions!
  • Since there are many topics to cover  about this post, it will be divided into two sections.



atlassecurityservices

Friday, January 10, 2014

System Security I, S III

For previous Security sessions of  I and II Your browser is now secure and you know most of the ways that you can protect your self from malware on the internet; Though there are many ways that your system can be infected!


  1. Downloading

  • Stealth Malware/Viruses + backdoor system

 When you are downloading a file from a third party website or potentially harmful, you never can know what's in the file until you open or execute it. Many of them could be the actual program but also installing an hidden virus known as Trojan virus. This programs could be from annoying level to a sever level that your computer could turn into a bot and be controlled from another system. This method is called backdoor, your computer is monitored by other groups of people, so your personal information is in danger of published by them; on a large scale similar event happened to "P.S.N" and "Snap chat".
  • How Can you prevent it?
Well you might have already guessed, one major way is to purchase and Anti malware software that has smart download and insight intelligence, Personally I Recommend Norton Anti virus, It is pre-equipped with all of these editions. Always scan zip folders, and  test your new installed program on a test computer if you don't have one, run it on standard user account so if the program transmitted malware, it didn't have the administrator permission. Pay attention to your computer activities when you are online and offline, have anything changed after installing program?

    2. Exploits
  • Your computer can be attacked frequently if your system firmware is not updated or patched for a while. Average time a computer survives online is with out any security update is One Hour! When you don't update your programs such as windows update, java and adobe, you can have the similar if not the same experience! What could happen is when using those programs a hacker could find your vulnerability soon enough that they can insert malware codes through the opening in the program. Solution? It's easy update your software no matter how long they take. If you don't have the original software,  you can download patches on the internet, but be careful while some of them could be infected by malware.