My Linux choice – Ubuntu (dual boot systems, security myth already)

My Linux choice – Ubuntu (dual boot systems, security myth already)

As Administrator of our Forums, I have chosen the Ubuntu Linux. I began exploring Linux possibilities a few years ago from my Windows Desktop. At that time, Ubuntu one click install over Windows PC was just finished up as a prototype. These few years later and the Ubuntu Linux one click installer (wubi) worked like a charm.

[SOURCE: From our website forum…. http://linuxducks.webs.com/apps/forums/ ]

It has been an amazing experience so far as installed now, Summer 2010. Linux itself is an amazing operating system. I would compare it as being able to ‘do outside the box’ (think outside the box) when you get to that point on Windows when you just wish there was some way to do this, that, or the other thing – and could not. With Linux, you can – I am finding.

I reccomend that on Windows to not use the primary administrator account – but use a second user with administrator privileges (takes a second or two to create another user). The computer administrator of windows seems to interfere in the primary account as launched with things – not specifically Linux, but I have done this and it is running perfect now on – installed from the secondary administrator account on windows pc.

Of course as webmaster of the BlueCollarPC since 2005, I am obviously very, very, very security oriented and share this as a Community Help site – free (Windows OS). We can review original ‘horn locking’ from mid-decade (2000 – 2010) in the several arguments that Firefox browser, Linux OS (operating system) , Apple/Mac were safer than Windows between the two operating system users and conclude that in this new decade Windows users may begin to flock to Linux as a “back up system” to Windows being inoperative due to malwares. This is along the lines that much malware on Windows used the Active X maliciously (like trojans or malware toolbars, etc.) in Internet Explorer browser and the Mozilla Firefox browser operated without it. So the arguements began and the hype and so on that “Firefox is safer than Internet Explorer” and many, many Windows users have installed Firefox as a back up browser to use in the event malware affecting the Internet Explorer in some lock out denial of service manner occurred. In the early days this was working to achieve logging onto the internet when you could not on IE (Microsoft Internet Explorer, part of Windows OS). But cybercrime has evolved greatly in a very, very, very short time and with today’s botnet activities and infections – they can simply block many browsers from navigating to security sites for removal help and software and utilities. There was also a cross-infection that was achieved between the two browsers – Firefox and IE.

So, although this may be true in the Linux add on as a back up system right in the same computer (dual boot) with Windows along those same lines as the ‘back up browser’ – cyber crime no doubt has and is working on some “cross platform” type infection ability – cross operating system malware – to rule this out, meaning as fast as we get there with this idea – they have already seen us coming. Suddenly just a couple years ago, all the Linux and Apple/Mac malwares were discovered and do not forget the other argument – Linux and Apple/Mac were safer simply because 90 percent of the world was on Windows and are the target of the cyber criminal underground meaning Windows users are “where the money is”. This is relating to the malicious ID Theft activity by cyber criminals and other various spyware scenarios and nefarioius use.

In this new decade (2010 – 2020) I obviously predict this occurrence of the cross operating system infection for dual boot observing this – user security options as adding another OS creating a dual boot system computer. It will be exploding with all the ways in a dual boot system using Linux and Windows of how you can use Linux to actually hack back into the infected Windows sytem to get rid of malware infection. This is already possible in various ways. Not long and it is going to be the same with just Windows as with dual boot systems – in worst infections there will be no way in to remove it.

So let’s skip the whole idea of the “back up operating system” , loose a step – they’ve already and are preparing for this obviously – and rather move back onto the idea you want to see and try Linux and maybe surprise yourself and forget Windows forever even and cut yourself a distro or two and ENJOY Linux like your curiosity asked you to. Forget the cyber crime and remain with safe surfing – use Safe Practices and antimalware security softwares and a firewall and you are good to go.

One of the first immediate things I realized in Linux land is, hey, this is great for the kids. Install Linux with Windows and let the kids use Linux and adults use Windows – I mean how can you mess up Linux ? Next to impossible. Plus, virtually all the softwares are the free and open source wares that if the kids want to start downloading everything under the sun – how can they get in any trouble ? Right, there are many educational wares available and plenty of games and so on that school age children can really enjoy and use. This is another reason I plainly see and recommend as a security measure for installing Linux – let the kids have a ball with it ! Again, I mean, how can you mess up Linux ? There is virtually absolutely no infections out there (very tiny tiny tiny amount) – is what I mean about how can they mess up Linux ? Got it ? Get it ! Good.

Highly recommended from a simple user on Windows that turned into a Amatuer Forensics person over a botnet infection this past decade. Visit my http://BlueCollarPC.US/ ….. as former Webmaster of the BlueCollarPC.Net serving just over 6 Million users since 2005 (Windows security) and our back up BlueCollarPC.Org (closed, now at .US).

July 28, 2010 at 12:00 AM

Advertisements
Posted in BlueCollarPC WordPress Blog. Tags: , , , , , , , . Comments Off on My Linux choice – Ubuntu (dual boot systems, security myth already)

What is Identity Theft – identity stolen? How? Defenses ?

What is Identity Theft – identity stolen? How? Defenses ?

Two prong… the old fashioned way of “dumpster diving” for account information, sifting your trash for statements etc. The other half is through your computer, generally via spyware threats and some viruses such as a ‘password stealing virus’ – hacking accounts, account break in, impersonation, phishing email threats. Just think of your PC as a great big database and you need to protect it as it moves around the Net in communicating.

Install quality known high detection rated antivirus, antispyware (with Real Time Protection – only ! – free stuff does not do that), and a personal firewall. That is how to protect your computer system and files and communications from snoops. Pretty simple. There are some additional utilities and it is imperative now to finally upgrade to the latest version of Internet Explorer – versions 7, and latest 8, have the latest state of the art Microsoft anti-phishing technologies which block going to phishing sites that steal identities. Another to add is to check any accounts like the credit report scenario for new accounts being opened in your name and criminals maxxing out the account – the other half of stealing info, impersonation. That’s why they highly recommend monitoring all accounts and your name.

How on PC ? Spyware threats and certain crafted viruses as a “password stealing virus”. Spyware threats can add “keyloggers” which transmit everything you type and can add taking screenshots of anything you are looking at on the screen and is transmitted like when transacting, logging into accounts etc.

News … (scope) :
Identity theft costs a record $56.6 billion
http://www.identitytheftdaily.com/index.php/20090223506/Prevention/Identity-theft-costs-a-record-$56.6-billion.html
Identity Theft Daily – San Diego,CA,USA
Deloitte says that 51 percent of external attacks on financial institutions were
phishing followed by spyware at 48 percent. Recent laws in eight states let …MORE

Numbers are about even at 54 Billion a year in the USA – 3 years running ! – and went down to about 45 Billion last year, 2009. About 4 percent of Americans have become “un-people” (Orsin Wells book ? right author ?) as never being able to get credit ever again. These accounts/persons were not able to be fixed to satisfy or prove ID Theft etc. to repair their name and credit. It is a mess and highly scary. Keep diligence online to avoid infection (even with the best of quality security defense products) – dubbed “Safe Practices” (search). Try US CERT for some good help.

Here is a good link to become familiar with the actual threats (malware) that do this…..
Threats FAQs http://bluecollarpc.us/threatsfaq.php

Even more ways they do it are check washing and they have your blank check with signature. Banks, others, sell the anti-water washing checks that cost just a tad more. They even sell the special pens now that block that too, that deeply imprint writing that can’t be check washed. (Check washing is taken a check made out to anything and then put it in a special little tub of chemical that erases the hand written stuff only and then they fill it in again to some amount).

Another way even more are the “phisher emails” that are fake emails that look like any financial type communication but are actually fake and have some lead line like “your account needs to be updated, changed, new password reset, etc.” When you hit the link they provide to go to that (you’ve been phished) it generally leads to a data colecting site invisible to the eye. See Pharming too. Internet Explorer Version 7 and newest 8 both have the Microsoft anti-phishing technologies that block almost all of this to aid the community and is why it has always been mandatory to have the latest greatest version of any browser because the newest has the top tech available in browser security.

Always set all browsers to delete all “temporary internet files” every time you close it. These areas are hacked into by badware to retrieve info in. These show all the graphics of every where you go with the browser and also cookies so that they know what site you actually logged into. Java should be set to not store temporary internet files because it is the area trojans hack into to avoid detection. Various Java applications will reveal your browsing history as well. Access Java settings at Start / Control Panel / Java… and double click it or right click – open… click the “Do Not Store temporary files on computer”.

“Social Enginneering” means they hunt around social networking destinations and forums and boards for “chatty cathys” blabbering away about these sensitive personal things to figure out how to trick a User into clicking something to infect with the above mentioned crimewares and scenarios.
http://www.microsoft.com/protect/terms/socialengineering.aspx (Obviously Facebook is now the largest target with over 400 million users and is too, too public for this)

A plague right now has been the fake security products (scareware) which are actually the above infections doing the same but tricking into buying it from fake pop ups of “Your Computer is infefected with such and click here to buy this super duper malware removal to clean the infection” etc.

Keep Windows Updates on Automatic for all critical and important Updates issued every second Tuesday of the month dubbed “Patch Tuesday” and currents…..
http://www.networkworld.com/news/2010/060310-microsoft-plans-gigantic-patch-tuesday.html?source=nww_rss (Windows Updates is your computer “lifeline” for latest programming vernabilities Updates/Fixes – blocking enabling hackers and crimeware to snoop and take over the computer itself. As well, top optimization and “make overs”, Upgrades/Updates, Service Packs, additional driver updates, etc. are retrieved here and available for installation. Use the “Custom Scan” option for these.)
More …. (current threat)
http://www.us-cert.gov/current/index.html#adobe_releases_security_advisory_for2

Keep all software up to date fully patched and try popular recomended Secunia PSI (personal software inspector) from well known Secunia.com http://secunia.com/vulnerability_scanning/personal/ used by millions.

Just like Windows, all other outdated unpatched softwares can be hacked into by these crimewares – the new “soft target” for crimeware entry (crimeware – viruses and worms are illegal and spyware according to laws). PSI will scan fast all software and presents the links for the free updates issued by the software companies and makers – many times also posted at their product website. Many newer softwares have an Update button (not talking about buying Upgrades – but updates) and can be set to check for updates like daily, weekly monthly. This is how you know you have a higher quality software, and security attended, as opposed to some free do-dad thingy somewhere from off some download destination and become outdated and dangerous in this manner – spring clean ! Dump old outdated unattended softwares not used often or ever (forgotten installation) if you can live without it, as is an unattended potentially dangerous entry point. For instance, it may be a utility of software from way back in the decade and is completely dangerous as obsolete in current threats – the product coding security-wise was not even invented yet and is an easy target for break in and even take over the computer system eventually.

Happy and Safe Computing !
Webmaster, http://www.bluecollarpc.org/

SOURCES..
http://en.wikipedia.org/wiki/Rogue_security_software
http://www.spywarewarrior.com/rogue_anti-spyware.htm
http://www.lavasoft.com/mylavasoft/rogues/latest
http://www.us-cert.gov/current/index.html#fbi_releases_warning_about_scareware

From our New Project ….
PC Security Helper
https://sites.google.com/site/pcsecurityhelper/
Posted by PC Security Helper Blog
http://pcsecurityhelper.blogspot.com/
Posted by BlueCollarPC.Org BlogCasts at 6/10/2010 4:22 AM
Categories: BlueCollarPC.Org Blog
Tags: riskware BlueCollarPC.Org Blog Windows Updates temporary internet files scareware stolen identity Security cyber crime crimeware ID Theft

%d bloggers like this: