Protecting Your Home Computer
Your home computer is a popular target for intruders. Why? Because intruders (the bad guys) want what is stored there. They look for, passwords, credit card numbers, bank account information, social security numbers, identity information and anything else they can find. But it's not just money-related information they're after. Intruders also want your computer's resources, meaning your hard disk space, your fast processor, and your Internet connection. They use these resources to attack other computers on the Internet, or, they can disrupt your home computer's ability to perform as intended.
Don't assume that your Internet Service Provider (ISP) will offer all the protections you need against home computer invasion. There are many security tools such as Antivirus and Antispyware, and Web filters that are completely free for home use.
8 Tips to Protect Your Home Computer
1. Patching – patch the operating system and applications monthly
a. Microsoft - Windows Update / Automatic Updates
b. Java, Adobe, iTunes – use a tool such as Secunia to scan monthly
2. Antivirus – current version with daily/weekly updates, real-time scanning
3. Personal Firewall – Windows or third party such as Zone Alarm
4. Antispyware – scan weekly
5. Internet Safety
a. Web Filter– blocks spyware, virus infected and other unwanted sites that can damage your computer and steal your data or identity information. Blocks inappropriate sites.
b. MySpace/Facebook – (Social Networking) – Use caution and become educated. Children must be 14 years old to legally have their own MySpace/Facebook account. Parental permission required. Many viruses and worms come in through Social Networking “invites”. Be careful with URLs, attachments. Also see “Family Meeting” below.
c. Instant Messaging – AOL, Yahoo Messenger, MSN/Windows Live Messenger. Avoid attachments and URL links. “Check out this new screensaver” … or “Pic of Beyonce….” Don’t fall for it.
d. Skype – keep it patched.
e. Have a Family Meeting – Talk to kids/teens about Internet safety. Do not give out personal information of any kind without parental approval! (Address, birthday, phone number, school, age etc.) Predators are out there and pose as children/teens in chat rooms, game rooms, blogs etc.
f. Online Gaming -Xbox / Wii. They support web cams. Form of Social Networking. Who are they playing games with?
6. Email - Attachments: don’t click unless you are sure! Spam – Never click “unsubscribe” unless you know you actually preciously subscribed.
7. Mobile Devices – Smart phones/PDA/iPhone threats increasing slowly. 400 threats.
8. Wireless – secure the connection, WPA. Change default passwords.
Tools & Tips
The below information is presented as a courtesy to conference attendees. The presenters do not recommend, sanction, or promote specific computer security applications and/or tools. Most of the tools noted below are free for home and/or non-commercial use on personal devices.
Home User Computer Security Tips
http://www.cert.org/tech_tips/home_networks.html
Antivirus
Avast! (http://www.avast.com/eng/download-avast-home.html)
AVG (http://free.avg.com)
ClamWin (http://www.clamwin.com)
Antispyware
Spybot Search & Destroy (http://www.safer-networking.org/en/index.html)
SuperAntispyware
Malwarebytes
Internet Filtering
K-9 (Blue Coat, Free)
Bsafe (purchase)
Sandboxie (virtualized browser)
Microsoft Patching
Windows Update – Automatic Updates
Application Patching
Java, Adobe Reader, Adobe Flash, Quicktime, iTunes – update monthly
Secunia – very nice free web tool
Malware Removal Tools
Malwarebytes
HijackThis
OTview
Process Explorer
Autoruns
WhatsRunning?
Msconfig
AV vendor specific removal tools: Symantec, McAfee, F-secure etc.
Password Database
Encrypt passwords and important information. Use a password database tool.
KeePass Password Safe (http://keepass.info)
AnyPassword
Browser Sandbox/Virtualization
Sandboxie (http://sandboxie.com)
VMWare Player
Microsoft VirtualPC
Common Malware Load Points:
Symantec tutorial: http://community.norton.com/norton/board/message?board.id=Announcements&thread.id=11
C:\Documents and Settings\All Users\Start Menu\Programs\Startup
C:\Documents and Settings\[user name]\Start Menu\Programs\Startup
C:\Documents and Settings\Administrator\Start Menu\Programs\Startup
C:\Documents and Settings\Default User\Start Menu\Programs\Startup
C:\WinNT\Profiles\All Users\Start Menu\Programs\Startup
C:\WinNT\Profiles\[user name]\Start Menu\Programs\Startup
C:\WinNT\Profiles\Administrator\Start Menu\Programs\Startup
C:\WinNT\Profiles\Default User\Start Menu\Programs\Startup
C:\Windows\Start Menu\Programs\Startup
C:\Windows\All Users\Start Menu\Programs\Startup
HKEY_CURRENT_USER\Software\Microsoft\Windows\currentversion\Run
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\currentversion\runonce
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\currentversion\runservices
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\currentversion\runservicesonce
HKEY_CURRENT_USER\Software\Microsoft\Windows\currentversion\Policies\Explorer\Run
HKEY_CURRENT_USER\Software\Microsoft\windowsnt\currentversion\Windows
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\currentversion\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\currentversion\runonce
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\currentversion\runonceex
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\currentversion\runservices
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\currentversion\runservicesonce
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\currentversion\Policies\Explorer\Run
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\windowsnt\currentversion\Windows
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\windowsnt\currentversion\Winlogon
HKEY_LOCAL_MACHINE\Software\Microsoft\windowsnt\currentversion\Windows\appinit_dlls
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\currentversion\Explorer\sharedtaskscheduler
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify
HKEY_LOCAL_MACHINE\Software\Microsoft\SharedTools\MSConfig\startupfolder
HKEY_LOCAL_MACHINE\Software\Microsoft\SharedTools\MSConfig\startupreg
Task Scheduler
System.ini
Win.ini
BHO – Browser Helper Objects
Infected file Submission
http://www.virustotal.com/
http://www.cwsandbox.org/
https://submit.symantec.com/websubmit/retail.cgi
Tools for dissecting a computer virus:
• Vtrap (Virus Trap) – Virus honey pot
• ClamWin – Antivirus
• Avast! – Antivirus
• AVG – Antivirus
• Sysinternal’s Process Explorer – Locating the virus, looking at the threads tree and reading strings in DLL (dynamic link library) files
• Anywhere PE Viewer – Viewing strings compiled into the virus and finding registry (Windows’ configuration database) keys
• Sysinternal’s Autoruns – Locating/disabling the virus at system auto load points
• Windows Scheduled Tasks, Services.msc, appwizard.cpl and msconfig.exe – Locating/disabling the virus
• Regedit – Exploring registry keys to identify virus activity
• IDA Pro Free Edition – Decompiling to assembly code, strings and function calls; running the virus in debug mode
• Boomerang – Decompiling to assembly code, exporting functions and decompiling to C code
• GNU C Compiler (gcc) – Compiling a custom version of the virus
Process for dissecting a computer virus:
Look for signs of viral infection (sluggish, popup ads, home page or default search page changed, strange error messages)
Update anti-virus signatures
Run anti-virus and look at the report. If anything was found, was it deleted successfully?
Look for unusual system activity and strange programs/tasks/services that are running
o Two factors can facilitate and speed up this process: experience (quickly recognizing what an unusual activity or program would look like), and a baseline of the system (knowing with certainty what the standard programs and services are, so that anything above the baseline can be considered unusual)
Look at user and system auto load points for anything unusual
o User auto load points include Explorer/Internet Explorer browser helper objects, ActiveX controls, registry run and runonce keys, Start Up folder in the Start Menu, etc.
o System auto load points include scheduled tasks, registry run and runonce keys, services, drivers, environment variables, system startup files, etc.
o Again, both previous experience and baselines can increase the rate of success and speed of this process
Once the virus is located, attempt to identify it through virus databases, virus reports, help forums and similar sites on the Internet
Search the virus files for strings, import libraries (DLLs it uses) and registry keys to determine what it could possibly be doing to the system and where it could be doing it
Decompile the virus to assembly code to identify:
o Function calls and the sequence in which they occur
o Possible information about the author (user ID, language spoken, programming language used, geographic location, computer configuration such as logical drives, OS, etc.)
o Intended users (based on the language and grammar in user messages, if any)
o Files touched, read, updated and/or created, as well as DLLs used for gaining the appropriate file permissions
o Registry keys used and information stored in the registry (load points, timestamps for last time the virus ran or the next time it should run, icons, URLs, IP addresses, etc.)
o Network DLLs, IP addresses, URLs used to upload or download data, port numbers (important for worms), and any functions to support incoming connections (which would be the case for a Trojan horse or botnet)
o User information accessed (cookies, profile paths, user ID, user name, password databases)
o Antivirus, firewall and anti-spyware signatures (common in resident viruses that avoid detection)
o Run mode (if a virus can run in MS-DOS mode, chances are it will load before the system boots, infect a Master Boot Record, or load as fake hardware driver)
o Images and icons (used by spyware, logic bombs and Trojan horses to disguise themselves as innocent files or valid system or antivirus software)
o Use this information to identify what the virus is doing, how to stop it and how to catch the bad guy who created it.
Reverse engineer the virus to C, C++ or another high-level language if needed to customize it (be careful -- this may not be ethical nor legal!) or to create a removal tool. Compile back to object code with the compiler appropriate for that language (e.g., GCC)
Dissecting a Computer Virus - Protecting Your Home Computer Plus Tips and Tools
Labels: Computer VirusThe finance Minister, in his budget speech, announced marginal tax benefits for individual tax payers. He increased the basic exemption limit for male taxpayers and female taxpayers by Rs 10,000 and that of senior citizens by Rs 15,000. There is no change in the Corporate Tax rates while there has been a modest hike in the exemption limit on personal Income Tax. The exemption limit for Senior Citizens has been increased from Rs. 2.25 lakh to Rs. 2.40 lakh. For Women tax payers the exemption limit has been increased by Rs.10,000 to from Rs.1.80 lakh to Rs. 1.90 lakh and from Rs. 1.50 lakh to Rs.1.60 lakh for all other categories of individual taxpayers. He abolished the surcharge of 10% on income over Rs 10 lakh.
The new tax slabs now stand as follows:
Male taxpayers
Income Level | Tax Rate |
Upto 1,60,000 | Nil |
1,60,001 to 3,00,000 | 10% |
3,00,001 to 5,00,000 | 20% |
Above 5,00,000 | 30% |
Female taxpayers
Income Level | Tax Rate |
Upto 1,90,000 | Nil |
1,90,001 to 3,00,000 | 10% |
3,00,001 to 5,00,000 | 20% |
Above 5,00,000 | 30% |
Senior citizens
Income Level | Tax Rate |
Upto 240000 | Nil |
240000 to 300000 | 10% |
300001 to 500000 | 20% |
Above 500000 | 30% |
In addition to this, an education cess of 3% on the tax amount continues. But a 10% surcharge on income over Rs 10 lakh has been abolished.
Saving from revised Tax rates
With the help of below given Table you can understand, what will be your saving from the revision
For men and women
Taxable income (Rs) | Tax - before budget | Tax -after budget | Difference | | | |
| Male | Female | Male | Female | Male | Female |
2,00,000 | 5150 | 2060 | 4120 | 1029 | 1030 | 1031 |
5,00,000 | 56650 | 53560 | 55620 | 52529 | 1030 | 1031 |
10,00,000 | 211150 | 208060 | 210120 | 207029 | 1030 | 1031 |
12,00,000 | 300245 | 296845 | 271919 | 268829 | 28326 | 28016 |
15,00,000 | 402215 | 398815 | 364619 | 361529 | 37596 | 37286 |
20,00,000 | 572165 | 568765 | 519119 | 516029 | 53046 | 52736 |
25,00,000 | 742115 | 738715 | 673619 | 670529 | 68496 | 68186 |
40,00,000 | 1251965 | 1248565 | 1137119 | 1134029 | 114846 | 114536 |
For senior citizens
Taxable income (Rs) | Tax before budget | Tax after budget | Difference |
2,00,000 | Nil | Nil | Nil |
5,00,000 | 49875 | 47379 | 2496 |
10,00,000 | 203424 | 201879 | 1545 |
12,00,000 | 291746 | 263679 | 28067 |
15,00,000 | 393716 | 356379 | 37337 |
20,00,000 | 563667 | 510879 | 52788 |
25,00,000 | 733617 | 665379 | 68238 |
40,00,000 | 1243467 | 1128879 | 114588 |
Below given are the changes announced in Budget 2009 - 2010 that will have some impact on your personal taxation.
1. Marginal Increase in Tax Exemption: Personal income tax exemption limit raised for senior citizens by Rs 15,000 and for all others by Rs 10,000.
2. Higher Deduction under Section 80DD: Annual deduction relating to maintenance, including medical treatment, for a dependent with severe disability (more than 80%) has been raised to Rs 1 lakh from the current Rs 75,000.
3. Expanded Scope of Section 80E: Annual deduction in respect of interest on loans taken for higher education purposes has been expanded from the current limited list of courses to cover all fields of studies, including vocational studies, pursued after completion of schooling.
4. Elimination of Surcharge: The 10% surcharge on taxes for those earning annual income above Rs 10 lakhs will no longer exist. This will lead to a tax saving for higher income earners
5. Abolishment of Fringe Benefit Tax (FBT): FBT on the value of fringe benefits provided by employers to employees has been abolished. Reimbursements will be taxed as perquisites at the marginal tax rate. This might increase the tax burden on employees.
6. Increase in Wealth Tax Exemption: The exemption limit for wealth tax has been increased from Rs 15 lakhs to Rs 30 lakhs.
7. Automation of Tax Filing Procedure: Reiteration of the re-engineering of the key business processes around the filing of direct taxes. Expect simplified tax filing in the near future, with the prospect of quicker refunds.
Corporate Tax rates
- Corporate Tax rates - No Changes in corporate Tax, it continues to stand at 30% plus surcharge of 10% of the corporate tax (for companies with profits above Rs 10 million) along with an education cess that amounts to 3% of corporate tax, totalling to 33.9%.
- Fringe Benefit Tax (FBT) - Fringe Benefit Tax is abolished
- Minimum Alternate Tax (MAT) - Increased to 15% of book profit
- Commodity transaction tax (CTT) – CTT is cancelled
- Goods and Services Tax (GST) – GST is to be implemented by April 2010, cumulative incidence of GST expected to be around 18%