Showing posts with label Guidelines. Show all posts
Showing posts with label Guidelines. Show all posts

Tuesday, January 27, 2015

Can we speed up Mozilla Firefox? Let's try these tweaks! - Tech Tuesday

Hey there! Been more than a while that I posted something on a Tech Tuesday, isn't it? Well I don't get much time, what can I do? And I miss being here a lot! :/ Anyways, lets get to the business, and I welcome you all to my blog on this wonderful Tuesday afternoon!



So today we are here to discuss certain little "tweaks" which can help you speed up your favorite web browser, Mozilla Firefox! These have been discussed at many places, many a times, but not in detail as we, you and I, shall do today. Why are we discussing Firefox? Well, it's my favorite web browser since last 7 years at least! It has topped the charts for years altogether, and being in close competition with the Google Chrome once it was launched. Though, one will have to agree, it maybe the case that home users are preferring Chrome just because of their "Google-Tainted lenses" but for the developer community and also the "Not Google Blind" users, Mozilla Firefox has ruled the day, ALWAYS! So let's get to the discussion.



Trick one: Pipelining


Perhaps, the most talked about, and the most deserving candidate to be on the top of the list is "Enable Pipelining in your Mozilla Firefox to make it faster." Now the point is, how to do that? And ones we learn that, well, what the hell is that?! O_O

How to enable pipelining?


1. Type about:config in the address bar.

2. Double-click network.http.pipelining and network.http.proxy.pipelining so their values are set to true.

3. Double-click network.http.pipelining.maxrequests and set this to 8.

4. Done!

What will this do?


This will dramatically reduce page download times.

Who should do this?


Those who have a fast Internet Connection and use general purpose Internet, should definitely go for it. Don't set the value beyond 8, since there's no point of setting the value beyond 8, and not less than 4, again which'd be pointless. If you have a slow Internet Connection, or you access traffic sensitive websites, which are unable to handle many request at a time, or ban you for a DoS attack if you try to access them again and again, you should not go for pipelining.

What exactly happens behind the scenes?


Normally, HTTP requests are issued sequentially, with the next request being issued only after the response to the current request has been completely received. Depending on network latencies and bandwidth limitations, this can result in a significant delay before the next request is seen by the server.

HTTP/1.1 allows multiple HTTP requests to be written out to a socket together without waiting for the corresponding responses. The requestor then waits for the responses to arrive in the order in which they were requested. The act of pipelining the requests can result in a dramatic improvement in page loading times, especially over high latency connections.

Now all that simply means, you request a page multiple times in one go, making the server respond to all those, thus the responses are combined as one, giving you a faster result. Now since Firefox is capable of sending 8 requests at a time, you should not set the maxrequest value above 8. And also, since Firefox sends 4 requests by default, never make the value go below 4. Always know what you are doing before you proceed, okay?



Trick two: Block Flash




Yes you heard that right! Rather, read that right. Actually flash is such a disaster to memory. Most of the websites have flash content which is of no use. Of course video websites, like YouTube, and all, won't like if you do so(even though they have the workaround of an non-flash video player, thanks to HTML5), still disabling flash is for your own good. Mostly it would prevent annoying ads, or popups in some cases, save you your data, and blah blah blah! Most importantly it would help you to save your Computer Memory, which would let you have a more easy experience with the web browser. You know how to do that? No? Well simple. Get some extension like Flashblock, or go to Addons(Ctrl+Shift+A) -> Plugins -> Shockwave Flash -> Ask to activate. Now Ask to Activate is a safer option than Disable since on pages where you need Flash, you can simply enable them with the help of a ribbon that would run on top asking you to enable flash. Though disabling on the other hand will make you enable it and disable it whenever needed and not needed respectively. This option will disable flash on all pages unless you click on the ribbon and reactivate it.

Trick three: Getting rid of the clutter regularly is a good habit




It would be a good practice to keep your browser clean. Though most of you already do, thanks to tonnes of crap roaming around the Internet keeping your nights busy -_- but still, keeping the cache of firefox clear is a great way to speed up your borwser, your computer, but well, at times reducing the Internet speed at times, because your browser will have to download the old content again just because there was nothing in the cache. But still always keep it clean, it is worth the tradeoff. You know how to do it, if not, it is rather simpler and easier to download CCleaner and let it do the work for you. :)

I guess these are safest tips. I have a huge set of settings that can help you make the performance be even better, but well most of them have associated risks. I will discuss them all in total maybe later when I get more time to do so. For now do these and have fun. These will help you all a little bit, if not a lot.

So now I must take a leave, good day friends. Have fun! :) See you all soon ^_^


Tuesday, April 8, 2014

Guidelines for securing Operating System Part 11 – Wireless Network Connections – Tech Tuesday

Hey all my dear readers! :D I hope you all are doing great! ^_^



Continuing the Security Tips series I started in July '13, today I wish to discuss with you all the topics listed after the following links. Just in case you want to access the last posts in this series, here are the links:

Part 1: General Guidelines - Click Here
Part 2: Microsoft Windows - Click Here
Part 3: Macintosh - Click Here
Part 4: Guest Accounts - Click Here
Part 5: Windows Firewall - Click Here
Part 6: Event Viewer & Netstat - Click Here
Part 7: Antiviruses - Click Here
Part 8: Data Encryption - Click Here
Part 9: Cryptography Tools & True Crypt - Click Here
Part 10: Browser Security - Click Here

Today I am going to discuss with you all certain aspects about Wireless Network Connections & Security.

Let's first consider in brief the structure of this post.

  • Introduction
  • Home Network
  • Steps for Home Networking
  • Wireless Networks
  • Setting up a Wireless Network
  • Common Threats to Wireless Network
  • Wireless Network Security
  • Conclusion/Comments

Introduction


A fast Internet Connection always enhances browsing experience; at the same time, it attracts the attackers seeking someone to play with! So knowledge about setting up a network is necessary, but this knowledge is incomplete without the knowledge about the Network Security.



Home Network


Home computers are widely used to send emails, listen to music, watch videos, download stuff, play games, etc. etc. etc.! And I guess most of the people have more than one computer these days. Many of these people do setup home network, but not all. So I would like to discuss how to do that, how to secure that, and to begin with, why to do that.

With a home network we can optimize the experiences of computers in a home network because:

  • A home network will let the users share Files and Documents
  • A home network will let the users share an Internet Connection
  • A home network will let the users share Printers and Scanners
  • A home network will let the users share Stereos, TV, game systems
  • A home network will let the users share DVD/CD Burners



Steps for Home Networking


Home Networking is the same thing I was telling you earlier, the network setup you use at your home (generally) to connect your personal devices like PCs, laptops, TV, etc.

To setup a home network you require:

  • At least two computers with a LAN card each to setup a network
  • One router to connect the computers (and Internet)
  • Optional: One Internet Subscription Line (If you wish to share an Internet Connection)

To setup a home network:

  • Check the computer’s hardware and make a note of this information
  • Purchase the required hardware, router/hubs/switch. If you wish to share Internet, prefer a switch/router. If you wish to share files, printer, etc. then a hub is good enough. If you wish a wired network, buy LAN Cables, viz. Ethernet cable with RJ-45 socket. If you wish to create a wireless network instead, you’d need additional wireless adapters (or dongles) to connect the devices without the Wi-Fi compatibility.
  • Make sure all the computers have Network Interface Card/LAN Card.
  • Make the connections
  • Select a host computer and connect it to the Internet. You can connect a Router instead.
  • Connect the other devices using the router/switch/hub
  • Install network adapters in all the ocmputers.
  • You might need to restart, though I’d recommend restarting.

Wireless Networks


Wireless networks are used to connect the computers to each other without any cables. They have become popular due to ease of installation and the increasing popularity of mobile devices (laptops, phones, tablets).

The major advantage of this wireless network is user mobility that is of course within a certain range, the range of the wireless network. In order to accommodate enough devices our devices providing this wireless network to the mobile devices should have enough bandwidth.



Setting up a Wireless Network


Now let’s discuss how to setup a wireless network in Windows 7 and Mac OSX.

Setting up a Wireless Network in Windows 7


I consider that you have got a wireless router, a wireless adapter (to connect your PC to the router, if you have Wi-Fi in that already, then you won’t need the adapter). The Wireless router will be fed with the Internet Connection, and the wireless adapter will help connect your PC to the wireless router, hus giving access to the Internet.

Steps:

  • In Start, in the search box, type Network and select Network and Sharing.
  • Click Set up a Connection or Network.
  • Click Set up a new network and click Next.

You can self-guided further! :P



Now consider you wish to make some modifications in this wireless network:

  • Select Manage Wireless Network from Network and Sharing Center
  • Click Add and select Manually create a network profile.


  • Fill in the details
  • Check the option Start this connection automatically and connect even if the network is not broadcasting and click Next
  • Select Change Connection Settings
  • Uncheck the option Connect to a more preferred network if available in the connection tab.
  • In the security tab, select Microsoft Protected EAP (PEAP) and click Settings.
  • Protected EAP properties popup: Check the option Validate server certificate.
  • In Trusted Root Certification Authorities, check Class 3 Public Primary Certification Authority.



  • In select Authentication Method, select Secure password (EAP-MISCHAP v2) and click the Configure button.
  • Uncheck Automatically use my Windows logon name password (and domain if any) and click OK to dismiss each of the open windows.
  • A balloon will appear near the system tray that reads, Additional Information is required to connect to <NAME that you provided>. Click this balloon.
  • Enter your NETID and password. Once validated, another balloon appears, “Additional Information is required to connect”
  • Click the balloon -> OK to agree and validate the server certificate.
  • After few minutes, you will be connected to your wireless network.






Setting up a wireless network in Mac


  • Click Network Pane in system preferences and choose AirPort entry.
  • Check the Show AirPort Status in Menu Bar check box.
  • Choose the system preferences.
  • Click the AirPort status icon in Menu Bar.
  • Click Create network and enter a name for the network.
  • Check the required password check box.
  • Enter a password for your network and then enter it again to confirm it.
  • Click OK.



  • Go to the upper right Airport icon.
  • Select the UConnect option from the drop down menu
  • Complete the User Name and Password fields, select Automatic for 802.1x, and check Remember this network.
  • Click OK
  • Accept the verification certificate by clicking Continue. Now you will be connected to UConnect shortly. If not, you need to check your profile.
  • Go to system preferences and click Network.
  • Verify that you are connected.
  • Select Airport to the left and click Advanced.
  • Click on the 802.1x tab and select the WPA:UConnect profile.
  • Verify that PEAP is the only protocol checked.
  • Select the Configure Trust buton.
  • Select the Servers tab. Click the + and select one of the available servers. Click OK.
  • Hit OK twice and click Apply



Common Threats to Wireless Network


If an attacker gains access to your wireless network, he/she can exploit this weakness to:

  • Read user email and instant messages as they travel across the network.
  • Monitor the websites visited by you.
  • Copy your usernames and/or passwords.
  • View files on the computers and spread malware.
  • Disclose your confidential information.
  • Interrupt the wireless service and implement unauthorized WLAN.
  • Send spam or perform illegal activities with your Internet connection
  • Slow your Internet and/or computer performance.

Wireless Network Security


I have discusses Antiviruses and firewalls in great detail in my earlier posts, and you should read them and make sure you have an updated copy of both. Other things that you need to take care of include:

  • Turn off the network during extended periods of idling/non-use.
  • Revisit WLAN network design for any incorrect access point placements.
  • Do not connect to unprotected wireless networks in public places.
  • Change the default SSID.
  • Change the default administrator password (and preferably usernames too).
  • Disable or turn off SSID broadcast for the network to make the network invisible to attackers.
  • Enable MAC Address filtering to keep track of all network MAC devices connecting to the router.
  • Data transmitting over wireless networks should be encrypted to prevent eavesdropping, interception, and data modification.
  • Network-level denial of service attacks are prevented by using user authentication.
  • Unauthenticated access to the wireless network can be prevented by using a virtual private network (VPN) connection and IPSEC.
  • VPNs keep communications safe by creating tunnels through which the encrypted data travels.
  • A network should be scanned using software scanning tools to locate and shut down rogue WLANs.
  • If the user is connected to an unprotected wireless network at public places, do not visit a website that requires a password unless the website is encrypted.

Conclusion/Comments


I hope you find all the relevant information you must know about the topic of security I discussed with you all today. For any queries or suggestions please feel free to comment here.

I hope you all have a great day ahead! :) Happy Tuesday :) See you all soon! :D


Tuesday, April 1, 2014

Guidelines for securing Operating System Part 10 - Browser Security - Tech Tuesday

Hey all my dear readers! :D I hope you all are doing great! ^_^



Continuing the Security Tips series I started in July '13, today I wish to discuss with you all the topics listed after the following links. Just in case you want to access the last posts in this series, here are the links:

Part 1: General Guidelines - Click Here
Part 2: Microsoft Windows - Click Here
Part 3: Macintosh - Click Here
Part 4: Guest Accounts - Click Here
Part 5: Windows Firewall - Click Here
Part 6: Event Viewer & Netstat - Click Here
Part 7: Antiviruses - Click Here
Part 8: Data Encryption - Click Here
Part 9: Cryptography Tools & True Crypt - Click Here

Let's first consider in brief the structure of this post.

  • Introduction
  • Cookies
  • Internet Explorer Security Settings
    • Internet Explorer Security Settings: Internet Zone
    • Internet Explorer Security Settings: ActiveX Control
    • Internet Explorer Security Settings: Local Intranet Zone
    • Internet Explorer Security Settings: Trusted Zone
    • Internet Explorer Security Settings: Restricted Zone
    • Internet Explorer Privacy Settings
    • Securing Files Downloads
  • Mozilla Firefox
    • Mozilla Firefox Security Settings
    • Mozilla Firefox Privacy Settings
    • Securing File Downloads
  • Google Chrome
    • Google Chrome: Privacy Settings
    • Google Chrome: Security Settings
  • Apple Safari
    • Apple Safari: Security Settings
  • Conclusion/Comments

Introduction


Internet Security involves basic security measures to protect a user’s account from attacks when connected to the Internet. It explains security elements that are necessary for the user to use the Internet safely.



Coming to more precise and detailed thing, Internet Security involves protecting the user’s data and information from unauthorized access (through Internet attacks), apart from the various viruses, and other malware.

Attacks on the Internet are common through (but not restricted to) the following:

  • Emails: An important means of communication, and traditionally a great way to spread viruses. The email attachments and the stupid links are the most common way how the attackers spread the viruses. At times they’d use the fake email IDs which’d resemble some real email ID and an inattentive user will fall prey.
  • IM: Although the days of Yahoo! Messenger, gtalk, etc. are gone, but facebook and skype messengers have gain huge interest of the users, and thus the attackers. Those who have used the Yahoo! Messenger, know how the chat rooms are infected with spam bots who keep spreadin the malware all the time.
  • File Sharing and Downloads: Ultimately virus comes from some file you downloaded, intentionally, unintentionally, yourself, or some automated script on a malicious website did that. Thus be careful of what you download on the Internet.

Cookies


A cookie is information provided by a web server to a web browser and then sent back unchanged by the browser to that server when the browser access that server. Your sessions are managed using cookies on most websites. You must have noticed the ‘Keep me signed in’ or ‘Remember me’ checkbox on 99.99% websites at the login form. That actually generates a cookie with a large session time (typically 30-60 days) with the user login credentials (encrypted). Thus when you open that website next time, the web browser automatically logs you into that website by checking that cookie with the server.

Cookies are not viruses, and they have encrypted information. Still they are dangerous. Why? They hold your important information, like your login credentials. Try this: Delete your cookies and open my blog again. You’ll see totally different kind of ads! Why? Because the advertising websites generate a cookie that tracks your internet activity broadly. I mean they track the “type” of website visited by your browser. This information is then used to target ads which they think are of your interest based on the types of websites you visited.

Though this ad-racking thing is not risky, and sometimes helps us getting good and relevant ads (for a change), but the cookies still hold your login credentials and session information, even though the information is encrypted. Thus, you must keep them clear off your computer.

Internet Explorer Security Settings


Let’s start by configuring Internet Explorer for security. I’d suggest you all that, in case you use Internet Explorer, try to transfer to some other web browser which is safer. Internet Explorer is a good browser, but unfortunately, quite unsafe.

Let’s first open the security settings, and then I shall discuss in details how to configure them. I am discussing Internet Explorer in more detail than the other web browser. With a proper mapping, you can find most things are common to all browsers.

Launch Internet Explorer -> Click the Tools button -> select Internet Options.



Select the Security Tab and see what all are the zones different websites can be classified into. You can use these settings to make yourself more secure, block certain websites, etc.



Internet Explorer Security Settings: Internet Zone


The Internet Explorer includes predefined zones: Internet, Local Intranet, Trusted Sites, and Restricted Sites. A user can set the security options for each zone and add or remove websites from the zones by estimating the level of trust or risk in a particular website. The Internet zone is for all websites except those listed in the trusted or restricted zones.



Just select a zone for which you’d like to configure the settings. Then use the slider to adjust the security levels. The information displayed to the right of the slider clearly explains what happens at that security level set by the slider. You can click the custom level… button to set certain different criteria.

Internet Explorer Security Settings: ActiveX Controls


ActiveX controls are the building blocks of a small program that distribute applications through the web browser. By default, Microsoft has set the security settings for it to medium. Thus by default you can run signed ActiveX controls.

Now since you are free to change this default behaviour, you can set the security level for ActiveX to low/medium/high/custom. Why would you like to do that? It is because these ActiveX controls can be used to install software on your system, like Windows Update does. But some malicious person might use them to install viruses on your system. So staying on guard, is better. To protect yourself from such threats you can do the following:



  • Disable the ActiveX Controls and Plugins options in the Security Settings. With Windows XP gone, we don’t need browser to update, right? Windows 7 onwards has got that Update Utility.
  • Enable the Automatic prompting for ActiveX controls option so that the browser prompts when an ActiveX control or plug-in needs to be enabled.
  • Click Ok to apply the settings

You have got more options if you wish to customize more. But I am sharing the common ones that are sufficient for a nice level of security. Alternatively, use the High level from the drop down list.

Internet Explorer Security Settings: Local Intranet Zone


The Local Intranet Zone covers the sites on the Intranet. To add websites to the Local Intranet Zone:



  • Select Security -> Local Intranet
  • Click Sites.
  • Click the Advanced button.
  • Enter the URL into the Add this website to the zone: column and click Add.
  • Click OK to apply the settings.

Internet Explorer Security Settings: Trusted Zone


A trusted zone contains those websites that a user believes will not damage his or her computers or data.
To add websites to the trusted site zone:



  • Select Security -> Trusted Sites
  • Click the Sites button
  • Enter the URL into the Add this website to the zone: column and click Add.
  • Click OK to apply the settings.

Internet Explorer Security Settings: Restricted Zone


The restricted zone restricts access to the websites that might damage a computer. Users can avoid accessing a restricted site by adding it to the restricted zone. The Restricted Sites zone will help prevent the installation of unwanted applications, reduce unwanted pop-ups, and not allow sites to run unwanted scripts. This setting also protects the privacy by not sending cookies to sites in the Restricted Sites Zone.



To add websites to the restricted site zone:

  • Select Security -> Restricted Sites
  • Click the Sites button
  • Enter the URL into the Add this website to the zone: column and click Add.
  • Click OK to apply the settings.

Internet Explorer Privacy Settings


Information stored in a cookie is limited in such a manner that it cannot carry a virus. But the information is good enough to be of use for someone who knows how to use it for bad things, like session hijacking.

So keeping the cookies clear is a good idea. I have time and again stressed upon the use of CCleaner. The free version does most of the tasks.

To configure cookie settings in Internet explorer:
  • Choose Internet Options from the Tools menu on the browser.
  • Select the Privacy tab and use the slider to set the level to low, medium, medium-high, or high.



  • Block all or accept all cookies, depending on the requirements. Though for a home user who access so many websites that need cookies, I guess you’ll have to stick to accepting the cookies.



  • Check the Turn on Popup Blocker option to block pop-ups that appear while visiting websites.

Deleting the Browser History


That sounds familiar right? You have done that sometime because some forum suggested, or to protect your privacy from others, or your ISP customer support said, your Internet is slow due to Temporary and Cache data, so you need to clear it. Clearing the browsing history protects your privacy, a little step to clearing your Internet footprints (at your PC atleast!) and also saves you Hard Disk Space. Here by history I not only mean the browsing history, but also the micro caches of the browser, cookies, private data, temporary files, etc. You should clean your Internet temp monthly, or once in three months atleast. Again you can use the CCleaner to automate the job for you. For better results, you may try TuneUp Utilities.

  • Choose Internet Options from Tools menu.



  • Go to the Browsing History section
  • Check the desired options in Delete Browsing History window. I suggest cleaning everything (not just history) once in three months atleast.
  • Click Delete to delete browsing history.




A personal suggestion is don’t save your passwords on your browsers! They are really risky if someone gets access to your PC. I don’t mean just a friend playing a prank on you, but the viruses too, who can get access to the passwords that you might have saved.

Securing File Downloads


Sometimes the file download starts automatically, or the location of the download is not asked. This should be taken care of and thus all downloads should prompt and on user’s acceptance should be downloaded. Users can configure the download settings in the Internet Explorer to set permissions to download files from the Internet. This setting controls whether Internet Explorer should allow downloads or not. File downloads can either be enabled or disabled.



  • To configure the download settings for Internet Explorer, click Tools -> Internet Options -> Security.
  • Select the Custom level button in the Security Settings window.
  • In the Downloads settings, enable the File Download, and Font Download options.
  • Click OK to save the settings.

Mozilla Firefox


Firefox is a secure, fast, and customizable web browser. Securing Firefox Settings is easy just like the Internet Explorer. Launch Mozilla Firefox. Click Tools -> Select Options.








Mozilla Firefox: Security Settings


A user can control the level security. You can customize settings like passwords, cookies, popups, etc. Following are the steps:

  • Select Security from the Options window.





  • Check the option Warn me when sites try to install add-ons so that the browser prompts before installing add-ons to the browser.
  • Click the Exceptions button and enter the URL into the Address of Website field and click Allow to specify the websites allowed to install add-ons.



  • Check the Block reported attack sites option to prevent the user from visiting malicious websites.
  • Check the Block reported web forgeries option for Firefox to actively check whether the sites visited may be an attempt to mislead the user to provide personal information.
  • Uncheck the Remember Passwords for sites options to prevent the browser from remembering passwords for login pages visited.

Mozilla Firefox: Privacy Settings


To set the privacy settings in the browser, follow these steps:

  • Select Privacy in the Options window.



  • Firefox allows the user to choose if they want the browser to remember their history. The user may select the option Never remember history to maintain privacy.
  • Click Clear your recent history.
  • Select the time range to clear the history.



  • Check the options required to clear the history and click Clear Now.

Securing File Downloads


Just like we did for Internet Explorer, we need to secure file downloads for Firefox too. But it is pretty simple.



  • In Firefox, files are downloaded by default to Documents -> Downloads. We must change the setting such that it asks every time where to save the file.
  • Navigate to Tool -> Options -> General
  • Check the option Always ask me where to save the file to allow the browser to ask before downloading a file to the desired location.

Google Chrome


Another popular browser we have by the name of Google Chrome, developed by Google. TO change the security/privacy settings:

  • Launch Google Chrome.
  • Navigate to http://chrome:settings



  • Click Advanced Button at the end of the page

Google Chrome: Privacy Settings


  • Scroll down to Privacy Settings.






Google Chrome: Security Settings


In the Google Chrome Settings:

  • Secure Sockets Layer(SSL) is an Internet Protocol used by many websites to ensure safe data encryption and transmission. The SSL setting in the web browser is turned on by default.



  • Some websites require the older version, SSL 2.0, so check the Use SSL 2.0 checkbox too.
  • Check the Check for server certificate revocation option to turn on real-time verification for the validity of a website’s certificate for extra security.

Apple Safari


By default, Safari is set to display a few web features, such as some movies, animation, and web applications. A user may wish to turn off these features to help protect privacy from possible security risks on the Internet. The Safari browser contains features equivalent to those in Firefox, with some differences. To change the security settings in Apple Safari:

  • Launch Safari
  • Click on the gear icon and select preferences.




Apple Safari: Security Settings


To configure security settings in Safari web browser:

  • Select the Security Tab in the preferences window.
  • The Web content section permits the user to enable or disable various forms of scripting and active content.
  • It is recommended to accept cookies only from sites visited.
  • Check Ask before sending a non-secure form to a secure website option, which allows the browser to warn the user before opening any website that is not secure.





Conclusion/Comments


I hope you find all the relevant information you must know about the topic of security I discussed with you all today. For any queries or suggestions please feel free to comment here.

I hope you all have a great day ahead! :) Happy Tuesday :) See you all soon! :D


Tuesday, February 4, 2014

Guidelines for securing Operating System Part 9 – Cryptography Tools & TrueCrypt - Tech Tuesday

Hey all my dear readers! :D I hope you all are doing great! ^_^



Continuing the Security Tips series I started in July '13, today I wish to discuss with you all the topics listed after the following links. Just in case you want to access the last posts in this series, here are the links:

Part 1: General Guidelines - Click Here
Part 2: Microsoft Windows - Click Here
Part 3: Macintosh - Click Here
Part 4: Guest Accounts - Click Here
Part 5: Windows Firewall - Click Here
Part 6: Event Viewer & Netstat - Click Here
Part 7: Antiviruses - Click Here
Part 8: Data Encryption - Click Here

Let's first consider in brief the structure of this post.

  • Introduction
  • Cryptography Tools
  • TrueCrypt
  • Conclusion/Comments

Since my last post was quite long, so I decided to discuss Cryptography Tools and TrueCrypt in this post. So here you go! :)

Introduction


Personal computers and portable computing devices often contain confidential data such as payment information, personal files, bank account details, and more, which must be shielded from preying eyes in the event of theft or loss of the device. I’ll be talking about encryption and how can we as users use this superb technique to protect our data.



Plaintext: In cryptography, plaintext is the ordinary, readable text from before being encryption into cypher text and is the result of decryption.
Cipher Text: Cipher text is the encrypted text that is unreadable until it has been decrypted to plaintext with a key. It is used to securely send messages over the Internet.
Encryption Key: A key is a piece of information that can encrypt, decrypt, or perform both functions, depending on the type of encryption being used.

But that’s what we discussed last time, then why today too? Well it’s just an introduction, just doing it for the sake of making the article, a good article you see! :D But there’s more to this introduction this time, don’t worry! :D

A cryptography tool is the one which provides various features to help encrypt your data/messages to prevent eavesdroppers to get hold of it. So first I am going to discuss some popular tools used for this purpose with a brief description of them. Then, I’ll talk about TrueCrypt in detail, where to download, how to use, etc.

Cryptography Tools


  1. Secret Data Manager: It helps computer users to keep their secret files encrypted to protect data from being stolen. It integrates encryption, compression, hiding files and folders, a file shredder, smart open and automatic updates, and intelligent close through an easy Windows-style user interface.
    URL
  2. AxCrypt: It is a file encryption software for Windows. It integrates with Windows to compress, encrypt, decrypt, store, send, and work with individual files.
    URL
  3. File Waster: FileWaster protects the file from prying eyes with secure encryption technology. It can encrypt and decrypt files while securely wiping the originals, recurse sub-directories, and compress files before encryption.
    URL
  4. MAXA Text2Exe: MAXA Text2Exe hides serial numbers, passwords, phone numbers, and everyday notes in a safe place with a 256-bit AES encryption algorithm. It allows for saving text encrypted as an executable file.
    URL
  5. PixelCryptor: PixelCryptor offers an easy-to-use wizard to guide users through the process of encryption and decryption.
    URL
  6. EncryptOnClick: EncryptOnClick enables keeping data secure. The encryption and decryption method used is 256-bit AES encryption. It will encrypt, decrypt, compress, and decompress files that can also be opened and decrypted using third-party programs like WinZip 9.
    URL
  7. Encrypt Files: It is a free desktop computer software that protects your files and folders from unauthorized viewing. Some of its features include encrypting entire folders, shredding original files, and hiding files after encryption.
    URL
  8. Zero Footprint Crypt: It allows users to view encrypted files without having to decrypt them to the hard disk. This allows for maximum security as the file remains in its encrypted state on the hard disk (leaving no footprint on the drive). It allows users to choose either “decrypt to file” or “decrypt to memory”.
    URL

TrueCrypt


TrueCrypt is free, open-source, disk encryption software for Windows 7/Vista/XP, Mac OS X, and Linux. This implies, virtually all the systems support it! :) TrueCrypt is a software system for establishing and maintaining an encrypted volume (data storage device). Using this tool, data is automatically encrypted or decrypted before it is loaded or saved, without any user intervention.

TrueCrypt Features


  • It creates a virtual encrypted disk within a file and mounts it as a real disk.
  • It encrypts an entire partition or storage device such as a USB flash drive or a hard drive.
  • It encrypts a partition or drive where Windows is installed(pre-boot authentication).
  • Encryption is automatic, real-time, and transparent.
  • Parallelization and pipelining allow data to be read and written as fast as if the drive were not encrypted.
  • The encryption can be hardware-accelerated on modern processors.
  • It provides plausible deniability in case an adversary forces you to reveal the password – hidden volume(steganography) and hidden operating system.

Let’s first download TrueCrypt before I tell you how to use various features of this nice software.

”TrueCrypt”/

Okay, done? Good. Now install! :P I am not including the screens for installing since it is a simple wizard based installation, OK? Now I am considering you have already installed the software and now I’ll tell you how to use it.

  1. Run TrueCrypt. Select the desired volume to be encrypted and click Create Volume.


  2. Volume Creation Wizard Window appears.
  3. Select the Create an encrypted file container option. This option creates a virtual encrypted disk within a file.
  4. By default, the Create an encrypted file container option is selected. Click Next to proceed.


  5. In the next step of the wizard, choose the type of volume.
  6. Select the Standard TrueCrypt Volume(if you have some non-crucial data to be secured) else, Hidden TrueCrypt Volume(If you are scared that the encrypted volume if seen by someone can force you to tell the password).


  7. Click next to proceed
  8. Now select the location of the volume and choose where to save the encrypted locker.


  9. Then select the Encryption options, i.e. the algorithm, etc. and click Next


  10. Now choose the size of the encrypted volume. Now click Next


  11. Then choose the volume password


  12. The volume format option appears. Select the filesystem for your encrypted volume. This can be FAT/NTFS, etc. Set the cluster to default
  13. Now move your mouse randomly as fats and randomly as you can for around 30 seconds or so. I don’t know what they do, but somehow the encryption keys are better hardened that way. Maybe they take some values of the mouse locations, MAYBE!


  14. Now click Format


  15. Now your volume is created at your specified path. The time taken by this creation step depends on the size of your volume and the filesystem type


  16. Now on the main TrueCrypt Window, click Select File, and choose the path of your encrypted container.
  17. Now click Mount


  18. A password prompt would appear. Key-in your password and click OK


  19. Your encrypted container will be mounted as a volume which you can use in “My Computer”. Just double click the drive and use it like any other volume.


  20. Once done, select your drive in the TrueCrypt main Window and Click Dismount



Once you dismount your files in the container are saved successfully in the security of true crypt! The best thing is that this tool is completely free and extremely easy to use apart from being just too secure.

Conclusion/Comments


TrueCrypt is a great tool to secure and hide your personal data from other people. You must use it to safeguard your sensitive information.

Today we discussed about a great Cryptography tool and I also listed a few cool ones. I hope you guys download these tools and get your sensitive secure asap!



I hope you find all the relevant information you must know about the topic of security I discussed with you all today. For any queries or suggestions please feel free to comment here. I love to solve problems :D

I hope you all have a great day ahead! :) Happy Tuesday :) See you all soon! :D