INLS 461 Loose Ends - PowerPoint PPT Presentation

1 / 14
About This Presentation
Title:

INLS 461 Loose Ends

Description:

On Isis: /afs/isis/pkg/isis/bin/protect. Web editors (Spring '05 INLS 50) ... Worm gathers data from your computer like email addresses, account numbers, ... – PowerPoint PPT presentation

Number of Views:28
Avg rating:3.0/5.0
Slides: 15
Provided by: ils2
Category:
Tags: inls | ends | loose

less

Transcript and Presenter's Notes

Title: INLS 461 Loose Ends


1
INLS 461Loose Ends

2
Housekeeping
  • Access quiz today (about 130)
  • Then final exam (May 4th), then were done
  • (Todays material will not be on the final exam)
  • Any questions about material so far?

3
For Next Class
  • Review your own work
  • Projects 1 - 11
  • Quizzes on Internet, UNIX, HTML, Excel
  • Access quiz will be returned that day
  • Anything you didnt understand?
  • Bring to class, ask about it
  • Well review explain

4
Today
  • Odds ends (relevant to 461)
  • Personal Internet security
  • Future directions (some)

5
Odds Ends
  • Password protect a web subdirectory
  • On Ruby man htpasswd
  • On Isis /afs/isis/pkg/isis/bin/protect
  • Web editors (Spring '05 INLS 50)
  • Access OLE data type (example)
  • Access compact repair

6
Internet Security
  • Have a plan
  • Threats
  • Wireless
  • Security resources
  • http//www.microsoft.com/security/
  • http//www.apple.com/support/security/

7
Have a Plan
  • Backups
  • Software updates
  • Anti-virus
  • Anti-spyware
  • Firewall
  • Reinstall

8
Threats Port Scans
  • Statistics Ryan Bebeau, ATT Labs

9
Threats Are You Infected?
  • WHAT YOU MAY NOT SEE
  • Worm gathers data from your computer like email
    addresses, account numbers, images, then emails
    data to the attacker.
  • Your system connects to irc at apredetermined
    time, and transmits your password file and IP
    address. Your system may sit on irc waiting for
    the command to do something to another computer
    system.
  • Your system sending UBE forV1_at_gr_at_ or C1_at_1is
  • WHAT YOU MAY SEE
  • Computer Rebooting
  • Slow Computer/Network
  • Suspicious System Processes
  • netstat al output
  • nmap your system for suspicious listening ports.
  • netcat/telnet to suspicious ports
  • PubStr0s
  • Irc bots/bouncers
  • Backdoor Shell Accounts

10
Threats Self Inflicted
  • You Click on innocent-looking link
  • Its your computer
  • Software knows the owner just clicked
  • Software is going to do what its told ?
  • Uh oh, bad people wrote the code in that link
  • Example W32.Myfip

11
Wireless Overview
  • Laptop use personal firewall (software)
  • Wired Equivalent Privacy (WEP) (not)
  • Wi-Fi Protected Access (WPA)
  • Temporary (keeps old hardware), adds TKIP
  • WPA2 (AES)
  • Use if available (relatively new)

12
Special Environments
  • Knoppix
  • Runs in disposable environment (memory)
  • Available in many custom versions (distros)
  • VMware
  • Runs in isolated (protected) environment
  • Configurable so that restart fresh install

13
Cheap Computers
14
Future Directions
  • Web Content Management
  • XML / XHTML / mashups
  • Virtual machines
  • Portable environment
  • (Run your USB drive, using any computer )
Write a Comment
User Comments (0)
About PowerShow.com