Chip Plus Nov09
Transcript of Chip Plus Nov09
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 1/52
PROTECT YOUR
FILES AND FOLDERS
WITH COOL TOOLS
SAVE YOUR
DATA FROM BEING
STOLEN AND MISUSED
KEEP A SAFE
DISTANCE FROM
HARDWARE THREATS
BE ALERT
AND STAY SAFE
ON THE INTERNET
Protect your home network » Secure your web browser » Monitor USB drives
Supplement to CHIP November 2009
SECURE YOUR WORLD
OF TECHNOLOGY
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 2/52
FEATURE
4 SECURE YOUR HOMENETWORKKeep your PC secure in a network
environment
8 PROTECT YOUR SOCIALLIFE, ONLINEStay away rom the perils o social
networking.
12 SECURE YOUR PC FOR
FREEWe give you a list o helpul security
applications that are absolutely ree
HANDS ON
16 10 TIPS10 precautions you must take to protect
your unds rom being phished
18 10 TIPS10 ways to protect your laptop whileon the go
20 TIPS & TRICKSOptimize the usage o Windows, Word,
Excel and the Web
28 LOCK UP YOURUSB DRIVEProtect the data in your USB drive rom
being stolen
31 ENCRYPT YOURDATALearn to use age old art o cryptography
with the help o SecureCrypt
34 SECURE YOURWEB BROWSERWe teach you how to secure Internet
Explorer 8, Fireox and Chrome
38 PROTECT YOUR FILESAND FOLDERSUniversal Shield is a simple application
that will protect your data
41 STAYING SAFE ONFACEBOOKWe teach you to confgure Facebook's
privacy settings
45 HANDLING INFECTEDPEN DRIVES
Learn how to tackle the 'autorun.in' flethat spreads using USB drives as mediums
SPECIALS
48 PC DOCTOR Tackle some basic problems that arise
because o Windows Firewall
50 DR. KNOWLearn more about Virtual Firewalls, RAID
and SNMP
51 IN DETAILWe take a deeper look into IP
concealment
CONTENTS
ASSISTANT EDITOR TECHNICAL
Jamshed Avari
COPY DESK
Sharon Khare
WRITERS
Gareth Mankoo,Dolwin Fernandes,
Kamakshi S
ART DIRECTOR
Nirmal Biswas
ILLUSTRATOR
Sachin Pandit
DESIGN
Jagdish Limbachiya,Brijesh Gajjar,
Hemali Limbachiya
HEAD OFFICE
Intelligent Computing CHIP,
Infomedia 18 Limited
`A' Wing, Ruby House, 2nd Floor,
J.K. Sawant Marg, Dadar (W),
Mumbai - 400 028. INDIA
Phone: (91 22) 3024 5000
Fax: (91 22) 3003 4499
E-mail: fee [email protected]
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 3/52
IN the chaos that surrounds our day-to-
day activity on the Internet we seldom
realize the dangers that hover around us
in inconspicuous orms. The great Isaac
Newton stated that there’s always an equal
and opposite orce acting against every
action perormed. Only in the case o you,
the common user, this negative orce is a lot
more than equal. There are threats coming
in rom every corner, be it rom the Internet
or outside.
This issue o CHIP Plus is a guide to what you
need to do to stay sae in this precarious
environment. We all know that anti-virus
utilities make some really tall claims o
being one better than the other, but how
can we trust them? We need to build a ew
deenses ourselves, rather than completely
rely on a single application to do this. The
misconception o users that installing
security tools is a waste o money, oten
costs them more dearly in the orm o dataloss. Thankully, developers are kind enough
to provide some security applications or
ree. This acts as a catalyst or users to
download them and make sure that they
have at least a single line o deense ready.
Besides the expected measures we take to
shield data rom being stolen or destroyed,
we also give you a ew quick tips on how
to end o attempts o physical thets
by robbers and burglars. Another look at
physical computer security covered hereincludes the shielding o USB drives against
inections. You will learn how easy it is or
you to lose all your data ater borrowing
that innocent looking pen drive to copy a
presentation. Trust me, it isn’t all that sae
out there.
Gareth Mankoo
FOREWORD
Developers are kindenough to provide
some security
applications for free. This acts as a
catalyst for usersto download them
and make surethat they have at
least a single line of defense ready.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 4/52
FEATURE APPLICATION
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
Attackers use tricks such as attractive ads, oers or
ree stu, etc. to tempt you to click on a particular link
or object on the page. This click could be atal. Thus
we can broadly classiy these attacks based on the
targets that they have. So we call them:
ATTACKS ON OUR INTEGRITY: Our data is being
modifed or destroyed by unauthorized means.
ATTACKS ON OUR CONFIDENTIALITY: Our data
is being viewed by those who do not have the
permission to do so.
ATTACKS ON OUR AVAILABILITY: Not every rightul
user can access the data because it is being denied to
them by an attack/attacker.
WHAT KIND OF ATTACKS ARE WEVULNERABLE TO?
To get into our systems and access our data, attackers
resort to various means. Some o these trick us into
alling or them by using attractions like ree git
vouchers or ree downloads. Others simply creep
To begin with, we need to defne the kind
o environment that we are working in.
Networks that have a single administrator
are way saer than those that don't have any. This
is because well administered systems have rules
that allow and deny access o certain components
or computers over a network. In regular peer-to-
peer networks security lapses are quite common.
WHO ATTACKS US AND WHY?
To avoid threats, we frst need to know who we are
up against. These attackers are called 'hackers' or
'crackers', depending on whether they are meant
to dig into your personal inormation, modiy
it or even destroy it ully. Besides targeting just
your computer, these attackers can also launch
attacks on other computers by using your system
as an access point. By doing this, they can remain
discrete in their actions and end up jeopardizing
your integrity on the network.
SKILL LEVEL
Moderate
NOW YOU CAN
Protect your home network
Keep away common threats
PROJECT TIME
45 Minutes
WHAT YOU WILL NEED
Internet connection
Internet Browser
KEY DETAILS
Secure your homenetworkHere is a quick guide to making sure that your computer is sae whenconnected to a network.
B Y G A R E T H M A N K O O
S a c h i n P a n d
i t
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 5/52
APPLICATION FEATURE 5
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
into our systems without our knowledge. Attacks like
worms, viruses and Trojans are generally pre-coded
and stored at some point in a website or anywhere on
the Internet. These can be mailed to us, and to several
other targets at a time as an attachment, which, on
clicking, can penetrate our systems.
However, though these are the most common
attacks, we also have some others. All o these are
mentioned in the ollowing points:
WORMS, VIRUSES AND TROJANS: As mentioned
earlier, these programs are pieces o code that aect
some part o our operating system. Worms are known
or replication; viruses cause direct attacks on our
data by deleting, altering or adding data without our
permission. Trojans reside as harmless entities which
later cause problems by picking up our sensitive
inormation like logins and passwords.
DOS ATTACKS: One o the most common attacks
is the DoS (Denial o Service) attack. In this case,
certain or all components o your system are made
unavailable to you. For example, your PC will be
'pinged' over and over again so as to congest your
network tra c. This will deny you using your own
PC over the network. The most common targets
or attackers oten include blocking a certain web
portal or component rom being used. Besides being
annoying, this can also lead to some serious downtime
in your work. Even worse, attackers can ood the
victim's bandwidth with requests rom multiple
systems. This kind o attack is called DDoS (Distributed
Denial o Service). Certain Trojans can also be used to
execute this kind o attack.
BROWSER HACKS: Certain websites and applications
have scripts like JavaScript and ActiveX controls. These
can be used to pick up inormation like login details,
browsing history, etc. and display it to unauthorized
personnel. However, the good news is that there are
means to block these components on your browser.
Most browsers provide you with an option to block
these attacks. There are other harmul scripts that
can take you by surprise. These appear to be helpul
links and ads on the site that tempt you to click on
them. On clicking, they set to work. So make sure that
you click only on relevant links and objects on your
browser so as to keep away rom harmul scripts such
as these. These links can also be displayed on public
orums as HTML tags and ash ads.
EMAIL THREATS: Emails are the easiest way to get a
fle rom one end to another. The sad part is that it is
used to get some rather fshy fles across sometimes.
Make sure that you do not download fles that have
been sent as attachments rom sources that you do
not know. It can be a virus or another harmul fle that
AVG, Kaspersky, McAfee and Norton are the most common anti-viruses programs used as a first leveldefense. Though they are capable of functioning on their own, it is also very important to update them
regularly to keep them up-to-date with the latest threats.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 6/52
FEATURE APPLICATION
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
will claim to be something else, like a riend's wedding
photograph or a calculator application. Downloading
and installing it can be disastrous or your system.
Spoofng is also a popular technique among
attackers to penetrate a system. Spoofng means
sending an email to a victim by disguising yoursel
as someone else. This leads to the problem o
compromising private inormation - by means o a
reply - to the sender, who is actually the attacker in
disguise. Spooed emails are really hard to tell rom
original ones since they can pose as anyone you would
trust sending personal inormation to.
For instance, an attacker may ask you to mail him
your current passwords and login details or even tell
you to change the same, while posing as your network
administrator. Home networks are sot targets or such
ingenious attacks.
FILE EXTENSIONS: It is a common practice to stay
away rom fles like EXE and COM since they are most
common viruses. However, there are means o ooling
you that can make fles appear to be o a certain
ormat while they actually are o a dierent fle ormat
altogether. So the fles that you will see may appear
to be, or instance, 'love-letter-or-you.txt' when it
is actually 'love-letter-or-you.txt.vbs'. Many viruses
appear in some rather harmless, non-executable
ormats. To tempt you into downloading them, they
may appear as MPEG, AVI or even MP3 fles. In actual
orm, these will be VBS script fles.
SNIFFING: 'Packet sni ng' or 'sni ng' occurs when
attackers capture data that is being sent over a
network, by intercepting it. This can give away
crucial inormation like sensitive mails and login
details. Sni ng is oten used against banking and
e-commerce sites so as to get sensitive monetary
inormation. Encryption and decryption o data
packets is the best way to get data across a network
without attracting the attention o attackers.
BACKDOOR ATTACKS: These attacks are oten carried
out by well-equipped attackers. Every system has
a backdoor that can easily be penetrated without
much problem. Certain tools such as BackOrifce and
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 7/52
APPLICATION FEATURE 7
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
Netbus are easy-to-use tools or those seeking an
entry into a computer network. Home networks are
eeding grounds or such attackers. They can even
dig into administrative systems and change certain
confgurations and use them to their advantage.
The above mentioned attacks are just broader classes
o more sophisticated actions taken by attackers to
penetrate a system.
HOW DO WE PROTECTOURSELVES?
The ollowing are some basic precautionary steps to
keep away rom network based attacks.
UPDATE ANTI-VIRUS APPLICATIONS: Make sure that
you update your anti-virus suite oten so as to remain
up-to-date with the latest threats on the network and
the Internet.
ENSURE STRONG ADMINISTRATIVE RIGHTS: I
you have a network administrator, make sure that
his system is capable o handling the privileges well.
Ensure that your system is saely shielded rom all the
harmul fles on the network.
USE FIREWALLS TO BLOCK PORTS: Firewalls are
great tools to block certain ports rom being accessed.
DO NOT USE UNKNOWN FILES AND APPLICATIONS:
Avoid using fles and applications that have come to
you rom unknown sources. I they arrive by email, do
not download or open them.
MAKE FILE EXTENSIONS VISIBLE: By deault,
Windows disables the fle viewing o fle extensions.
However, to avoid attacks, it is necessary to see what
ormat a fle actually belongs to. I you use Windows
XP then open 'My Computer'. In that click 'Tools |
Folder Options'. Click the 'View' tab. Uncheck the 'Hide
extensions or known fle types' checkbox. However,
this may not make all the extensions visible.
DISABLE JAVA AND ACTIVEX SCRIPTS: As seen
earlier, scripts like ActiveX can cause executable
viruses to enter your system once they are installed.
Hence disable them i possible.
BACKUP YOUR DATA: It is always critical to maintain
backup copies o your data so that they can be
recovered in case o loss.
TURN YOUR PC OFF WHEN NOT IN USE: There is no
way that a switched o PC can give away any data or
be attacked. Hence, keep it o i you are not using it. I
you eel that there is something absolutely dangerous
on your network then unplug the network cable ater
consulting your administrator.
KEEP A BOOT DISK FOR EMERGENCIES: The worst
case scenario can be your computer's system fles
being corrupted. Hence it is important to make a boot
disk to recover it at such times.
Firewalls are often bundled with anti-virus sui tes but can be found as st andalone applications as well.They help you keep your PC safe from notorious access points on the network. You need to understand
the concept of using logical ports on your computer before you configure Firewalls.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 8/52
FEATURE APPLICATION
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
As the population o netizens grows at a rapid
pace, the need to be all the more vigilant and careul
about the nature o inormation shared with the world
at large is the need o the hour. Here are a ew simple
things that you can keep in mind to enjoy your online
networking experience in a sae and clean way!
ADD THE PEOPLE YOU KNOW: Social networking is
a great way to catch up with your long lost riends,
and even make some new ones. But there are certain
things you need to keep in mind rather than going
on a hunt to make new riends. As a thumb rule, don't
add random people. There is no way o knowing their
real identity since many o these users don't even
upload their own photographs. You might fnd ar
more genuine people at a bar rather than on a social
networking website. Random people don't eel bad
i you reuse their requests. There are also certain
people who add you rom your riend's riend lists.
Make sure you ask your riend who this person is and
why he wants you on his list. Also i you eel that your
Man being a social animal, the interaction
o like-minded individuals led to the
ormation o civilization that we are now a
part o. While keeping pace with the technological
advancements, the entire world has shrunk
tremendously and geographical distances can
now be nullifed with the mere click o a button.
Just like the concept o communicating is as old
as civilization itsel, so is the concept o social
networking as old as the Internet.
There were online social exchange mediums
(BBS) like USENET (1979), and LISTSERV (1986) that
enabled users to communicate with each other
through comments and posts, there were also
webhosting services like Yahoo! GeoCities (1994)
which enabled users to air their thoughts online.
While the ormer laid a frm oundation or the
uture world o blogging, the latter helped pave
the path or ree webhosting services with exible
content.
SKILL LEVEL
Moderate
NOW YOU CAN
Stay safe on social networks
Share your data safely
PROJECT TIME
45 Minutes
WHAT YOU WILL NEED
Internet connection
KEY DETAILS
Protect your sociallife, onlineWe have enlisted a ew practices that you can ollow to ensure a saeexperience while socializing online.
B Y K A M A K S H I S
Sachin Pandit
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 9/52
APPLICATION FEATURE 9
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
privacy can be threatened and your confdentiality can
be breached by adding certain known riends, make
a prudent decision to decline their request. I you are
pestered too much ater declining requests rom a
particular user, eel ree to report them.
POST MESSAGES WITH CAUTION: With the
Twitter and Facebook ever rising by the second,
the 'disconnect anxiety' seems to be increasing
signifcantly especially among the youth. Most o
these social messaging services extend unctionalities
to devices like Palm tops, BlackBerrys and cellular
phones, in turn adding to the number o addicts. This
urge o technophiles to keep glued into their account
is a big cause o psychological concern. Several
users subscribe or text alerts alerting them on every
post or comment they receive. Moreover, this kind
o technology enables people to update each and
every incident o their lie quite intricately and rather
quickly. This kind o behavior poses a threat at many
levels: frstly it shows the psychological well-being
o a person. I you seem low or depressed on your
posts, you can be taken advantage o. There have
also been reported incidents o houses being burgled
by keeping track o tweets and post updates while
people are out on long vacations. Tweets / posts like
'Out on a two week long vacation to the Bahamas',
coupled with a list o your likes-dislikes (an indicative
o your possessions) and coupled with your location
details ensure that you are laying a trap or yoursel.
Always remember even i you don't add any direct
personal details like your house address, a small
amount o probing along with your IP address can
reveal a lot about your browsing locations.
PROTECT YOUR PERSONAL PICTURES: I pictures
speak louder than words, what better way to share
memories than with photographs? But when you
upload pictures, make sure you know how sae
they are rom prying eyes. Your pictures might
be used without your permission violating copy
right issues. On a more serious note, there have
been many reported instances o how pictures o
unsuspecting social networking users have been
used or pornography, child racketing and other
heinous crimes. Most o the networking web portals
provide you with personalized sharing options. It is
a recommended that you don't share albums with
people out o your riend circle. I your riends are not
comortable with their pictures appearing in your
album, respect their privacy and take them o your
albums immediately. Always remember, even i you
delete images rom your profle you cannot be 100%
sure that those images are not still somewhere on the
server or have already been misused.
Although you can set the content access parameters from the Settings page directly, these contentsdon't include your photo albums.
Click the 'manage' link appearing near the 'Privacy' section of the 'Settings' tab of your account page
to change the privacy settings.
Orkut allows you to restrict people to specific countries and regions to ensure that your surfing
experience is unaffected.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 10/52
0 FEATURE APPLICATION
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
SECURE YOUR JOB: Business networking sites are the
newest rage among young corporate workers. They
use these as a tool to build social networks or
business building or job hunting. But there is a real
threat i you are joining a rival frm and promptly
upload the details o your new job, you might fnd it a
bit tough to answer unwarranted questions especially
i your ex-colleagues orm a part o your network.
Moreover, the recommendations you receive here may
not be too useul i companies preer the older and
more traditional type o job reerences.
SECURE YOUR INTERESTSONLINE:Listed below are a ew pointers on how you can set
the privacy option on some o the most popular web
portals around the world.
SECURITY ON ORKUT.COM: In its early days, Orkut
had very ew privacy policies. But as time went by and
the nature o security-lapse related crimes came to be
known, Orkut has strengthened its security options.
To alter your security settings, login to your Orkut
account and go to your profle page. Make sure that
you haven't specifed details that give out too much
personal inormation especially your email address as
it is prone to spam attacks. Save the changes and click
the 'Settings' option which is the second last option
on the panel appearing below your uploaded profle
picture. The 'Saety flter' on the website is turned
on by deault to protect your account rom being
spammed with x-rated content.
Although this is not a recommended practice, you
can go to the 'general' tab o the 'My Settings' page,
and check the 'show all content' under 'saety flter'
instead. Go to the 'privacy' tab o the web page to
manage and monitor who can access the contents
on your profle. Change the listed setting as per your
requirements.
Also note that you can set privacy on uploaded
images or every album individually. Go to the
'notifcations' tab to set the way you wish to be
inormed o any external activity on your account.
The 'chat' tab enables you to speciy how many
people can chat with you. You enable or disable chat
settings or individual users, or or groups as a whole.
PRIVACY ON FACEBOOK.COM: Facebook has been
one o the most popular websites or most youngsters,
as it whizzes past its contemporaries like Twitter, Orkut
and MySpace in terms o popularity. With so many
users to satisy, it becomes extremely necessary to
keep their privacy intact.
You can view and change your Facebook privacy
settings by logging onto your Facebook account. Once
Concealing or selective viewing of data becomes all the more essential when you are building aprofessional network.
If you tweet incessantly, pay close attention to what you share to keep yourself safe from those
stalking you online.
As one of the most interactive networking sites, MySpace provides auto responders to connect to
your audience even while on vacation.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 11/52
APPLICATION FEATURE 11
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
your profle page is displayed, click on the 'Settings'
link appearing next to your email ID. On the 'My
Account' webpage, click the 'Privacy' tab. You can
also set notifcation options under the 'notifcations'
tab to set the way you wish to be inormed o any
external activity on your account. You can monitor
the Facebook 'chat' eature by clicking on its tab and
setting the options under the 'Options' link on the
pop-up menu.
PLAYING IT SAFE ON MYSPACE: Beore Facebook
revolutionized the world o social networking,
MySpace took the Internet by storm. Being one o the
frst entrants in this feld, MySpace also is one o the
frst websites dedicated to musicians. Keeping in mind
this specifc target audience, the privacy options are
scattered across the account's setting page.
Log on to your MySpace account and click the 'My
Accounts' option. Click the 'Privacy' link to change the
general profle level settings. You can control your
notifcation settings by clicking the 'notifcations' tab
to set the way you wish to be inormed o any external
activity on your account. Finally or urther privacy
options, click on the 'Miscellaneous' link and change
the settings as required.
SURF CAUTIOUSLY ON LINKEDIN: A relatively newer
entrant into this market, LinkedIn plans to redefne the
Word business networking. The website encourages
people to create networks with those whom they have
had any type o proessional connection. It helps users
secure recommendations and new jobs as per their
current profles.
Log on to your LinkedIn account and click the
'Account & Settings' option. Here you can change all
the possible options in this page alone. Click on any
links listed under the 'Privacy Settings' section o the
page and edit the settings as per your requirements.
TWITTERING WITH CARE: Twitter has revolutionized
the world o social networking by combining the best
o networking and texting in a brand new genre called
micro-blogging. Most people get into trouble because
o the contents o their tweets. Houses get burgled
into, young girls have been reportedly molested and
political careers threatened because o irrational and
excessive twittering.
Firstly, know the people who ollow you i you
are twittering about personal details. Log on to your
twitter account and click the 'settings' tab and change
the settings as required. You can block people rom
ollowing you on the website.
However, there are not too many restrictions on
the site and any one can view your tweets irrespective
o the act that they don't ollow you. And hence you
need to be extra cautious beore you tweet details
relating to your location, residence or other
intimate details. What adds to this problem is the
growing support or Twitter on handheld devices.
SECURE YOUR IDENTITY ON HI5! Hi5! is one o the
oldest social networking websites and is one o the
earliest o its kind. The privacy settings are the most
easily navigable through this web portal. Just log into
your Hi5! account and click the 'Privacy' link. Click on
each o the sub-links to change the dierent privacy
settings.
PicasaWeb is an online photo sharing tool
where you can send invites to your friends
to view, save and comment on your photos.
Coming from the Google stable, this web
service has many fans the world over.
This website provides two levels of security,
namely account level privacy and album level
settings. For account privacy settings, log on to
your PicasaWeb account and click the 'Settings'
link. On the 'Settings' page, click the 'Privacy
and Permissions' tab. Set the changes as
required.
You can set album level privacy while
creating the album itself. For changing settings
in existing albums, go to the specific album.
Click the 'Edit' option and 'Album Properties'
from the drop-down list. Since it supports
collaborative photo uploading and sharing,
you can also create friend groups and change
settings as required.
STAY PICTURE-PERFECT WITH
PICASAWEB
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 12/52
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 13/52
APPLICATION FEATURE 13
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
You will now be able to view a screen prompting
you to install the security toolbar. De-select it i not
required and click 'Next' and then 'Finish' to commence
the installation process. The application will now be
installed on your system
Once the application has been successully installed,
you will be run through an automated wizard. Click
'Next' to proceed. On the next screen, you will be
asked to set the time or a daily automated scan. Enter
the time in the textbox provided and make sure the
'Enable daily scanning' checkbox is selected. On the
next screen, select the license agreement check box
and click 'Next'.
The application will now search or updates and
install them accordingly. Once done, click 'Next' and
then 'Finish'. You will now be to view the main interace
o the application. To scan a particular fle or older,
select the 'Scan selected older' or 'Scan fle' option
rom the 'Tools' menu. The scanning process will
commence. I the fle or older has been inected, AVG
will notiy you o the same and provide certain options
to deal with the fle. You can heal the fle or delete it i it
is not healable and not required.
You can also send the fle to the Quarantine wherein
it can be healed at a later stage. To scan the entire
computer, rom the 'Tools' menu, select 'Scan
computer'. In case there are any inected fles on your
system, AVG will notiy you o the same by displaying
the inected fle list.
ZONE ALARM FIREWALLZone Alarm Firewall is an application that protects
your PC rom hackers. It includes eatures like a
Firewall, application control, Interlock and Zone that
keep your system sae rom external attacks. It has an
easy interace and it allows one to confgure security
settings using a slider.
A recent update, known as the Game mode is
quite helpul. It lets a user automatically allow or deny
alerts while in the middle o a game. It's also good
at automatically confguring settings or the local
network. Zone Alarm can be downloaded rom the link
www.download.cnet.com/ZoneAlarm/3000-10435_4-
10039884.html. Once downloaded, run the setup fle
and ollow the steps as mentioned.
Click 'Browse' and select a location to install the
application. Enter your name and e-mail address and
click 'Next'. Select relevant checkboxes to receive
updates. Once done, click 'Next' to continue. Select the
terms and conditions check box and click 'Install'.
You will now be able to view the confguration
wizard. Click the 'Scan my computer' radio button and
click 'Next'.
AVG allows users to set up and schedule a scan time so that your system can be safe and protectedfrom viruses everyday.
Enter appropriate details in the relevant text box and select the check boxes as shown to receive
updates on the latest threats.
Click the 'Standard installation' radio button and click 'Next' to continue the installation process. The
'Custom Installation' radio button is recommended for advanced users.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 14/52
4 FEATURE APPLICATION
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
Once done, click 'Finish'. You will now be asked
to reboot your system. Once your system has been
booted, click 'Finish' on the main screen. You
will now be able to view the main interace. Whenever
any program tries to access the Internet, you will be
prompted accordingly with a box. You can click
'More ino' i you're uncertain about the program. I
you're sure the program is sae, select the 'Remember
this setting' checkbox and click 'Allow', else simply
click 'Deny'.
SPYBOT SEARCH AND DESTROYSpybot is a popular and well known application that
scans or and eliminates spyware and adware. It comes
with a decent interace and the results are displayed in
a tree type structure. The sliding panel allows the user
to take quick decisions or example, quarantine, heal or
delete the inected object. The Immunization eature
blocks various Web-borne threats beore it can reach
your computer. Make sure the 'Enable Internet Explorer
protection' and 'Use system settings protection'
checkbox is selected while installing the application.
Spybot Search and Destroy is a ree application and
can be downloaded rom www.saer-networking.org/
en/download/. Once downloaded, double-click the
setup fle and click ollow the steps as mentioned. Click
the 'I accept the agreement' radio button and click
'Next'. Click 'Browse' on the next screen and select an
appropriate location to install the application. Click
'Next' to proceed. Make sure the 'Use Internet
Explorer protection' and 'Use system settings
protection' checkbox is selected. Once done, click
'Next' and then 'Install'.
Once the installation has been completed, you
are now ready to use the application or protection
against spyware and adware. Let's take a look at how
to go about it. Once the program starts, you will be
prompted to create a registry backup. Click the 'Create
registry' backup button. Once done, click 'Next'. It is
o vital importance to keep the application updated
to ensure complete protection. Click the 'Search or
updates' button. I there are updates available, Spybot
Search and Destroy will notiy you o the same and
keep you updated. Once done, you will be prompted to
immunize your system. Click the 'Immunize this system'
button. Once done, click 'Next' and then click the 'Start
using the program' button. To scan your system, click
the 'Search and Destroy' button on the top right corner
o the screen and then, click 'Check or problems'.
The scanning process will now commence. I threats
have been detected, simply select the checkbox next
to the threat and click the 'Fix selected problems'
button.
You will be prompted, each time an application tires to access your computer or tires to access theinternet from within.
Make sure that the 'Enable Internet Explorer protection' and 'Use system settings protection'
checkboxes are checked.
Click the 'Scan my computer' radio button and click 'Next' to proceed. This is a quick scan and will not
take much time. It is highly recommended that you perform this step.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 15/52
APPLICATION FEATURE 15
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 16/52
Protect your fundsfrom being phishedPhishing is a technique through which passwords and other conidential details are stolen in order to hack into bank accounts and steal money rom victims. By ollowing these simple tricks, learn how to protect your money during online transactions.
B Y K A M A K S H I S
1USING THIRD PARTY
APPLICATIONS
WHILE there are several third party applications which help
you protect your interests while purchasing and perorming
transactions online, there are also several browser specifc
add-ons that you can enable within your browser. One such
tool is the 'Netcrat Toolbar', which is available only or the
Internet Explorer and Mozilla Fireox browsers as o now. These
applications help you to report raudulent sites, and help you
generate lists o the phishiest web hosts, worldwide.
2READ BETWEEN THE LINES
MOST email service providers today have a strong
in-built spam guard. Yet, i a scam mail still manages to make
its way to your inbox, may sure you read the contents twice or
thrice. Every credit company or bank has a specifc pattern o
correspondence. I you fnd anything out o the ordinary or see
too many spelling mistakes, it is advisable to check with your
bank beore responding to such emails. I you fnd such emails
fshy, delete them without a second thought.
3CHECK THE SENDER NAME AND
ADDRESS TEXT
WHENEVER you get an email rom a clean source, the sender's
name would appear in your inbox. I you fnd an email ID
instead o the sender's name, you can delete the email without
even opening it. Similarly, i the email is addressed to an ID
like '[email protected]' or reects a part o the email ID
like 'Dear john9999' instead, such mails are usually sent rom
unreliable sources which send out bulk mailers as spam. Avoid
opening such emails, and even i you do, don't download the
attachments that are sent along with them.
4VERIFY IF THE EMAIL IS A SCAM
MOST email scam messages are marked as spam and are
diverted away rom your inbox. I they aren't, and the email has
genuine logos o well known companies, there might be a chance
o them deceiving you. I you don't get a convincing response
rom the source itsel, you can check on the Internet whether
these mails are indeed scams. Various web portals like 'www.bi.
gov/cyberinvest/escams.htm ' and 'www.hoax-slayer.com' provide
a comprehensive list o known scam emails. Check them and only
then respond to such emails.
5CLICK ON LINKS WITH CAUTION
THE oldest way to lure unsuspecting victims to submit
their details is by providing links in emails with names and
organizations that appear to be original. Irrespective o whether
the link lands you at a credit card site or an Internet banking site, it
is advisable to practice sae browsing while surfng the net. Never
click on the link rom the emails, instead type the address directly
into address bar o your browser yoursel. You can browse more
saely i you log in to each website through a dierent window.
Make sure that you log out o the site once you are done. Delete
your browsing history and temporary Internet fles periodically to
remain completely sae.
6CHANGE PASSWORDS REGULARLY
ALTHOUGH you have created passwords which are
deemed to be sae and strong, it is a recommended practice to
6 HANDS ON 10 TIPS
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 17/52
keep changing your passwords periodically. Most people who
phish into your accounts are not your riends, and they can hack
into your account without you telling them your password.
Make sure that your password is not alternating between two
values alone; your password should not resemble the last
three passwords that you had once set. Ater you change your
password take due care to remember it. In most o the credit
card or Internet banking websites, your account will be blocked
i you enter the wrong passwords or more than three attempts
consecutively, irrespective o the time o your last attempt.
7LOG INTO ACCOUNTS REGULARLY
LOG into all your accounts regularly even i you do not
want to make any purchases or transactions. Most people take
their account statements too lightly. Read and veriy each debited
and credited amount appearing on your statement. I you fnd
anything remotely suspicious, report and clariy it with your bank
immediately. I a person has access to your account, he will not
phish into it right away. Staying observant will also help you cut
down on unnecessary expenses, and help you keep a tab on your
spending habits.
8USE THE LATEST VERSION OF YOUR
WEB BROWSER
ALWAYS use the latest version o your current web browser.
These browsers come equipped with powerul and updated
anti-phishing flters that help you blacklist dubious websites
and also avoid browsing to already blacklisted websites. Many
browsers also have additional add-ons that you can download
and utilize. Use the latest versions o Internet browsers. Most o
these contain their own anti-phishing flters and blacklists to keep
you sae while carrying out online transactions.
9UPDATE ANTIVIRUS AND FIREWALL
PERIODICALLY
MOST o the recent anti-virus, anti-spyware and frewall
applications come equipped with upgraded support to tackle
raud related security issues. While the version in your system
is prepared to secure your PC rom all the viruses known at the
time o its creation, the updated packages available add newer
codes to secure your data and online activities rom more recent
and lesser known threats even more eectively. Most anti-virus
applications post periodic updates on their website which you
can easily download and incorporate by yoursel.
10USE STRONG PASSWORDS
THE cardinal rule o password selection is that you
should always pick a password that is easy or you to remember
and di cult or anyone else to decode. Also your password
should have a healthy mix o alphabets (both upper and lower
cases) and numeric values. That eectively means that you should
avoid using your frst name, last name, amily name, nickname
or date o birth as passwords. Also avoid using confdential data
like your ATM pins, CVV or social security numbers as passwords
either. Shu e your passwords well. Don't pick the same username
and password combination or all the websites you sign up to
or email accounts. I one gets hacked into, it's not so di cult to
guess others. Don't share your passwords with any one. I you are
going to take so much trouble to pick an appropriate password, it
is rather wise to keep it to yoursel.
Sachin Pandit
10 TIPS HANDS ON 17
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 18/52
Protect your laptop while on the goOne reason people choose laptops over desktop systemsis portability. However, with portability come threats likethet, natural hazards and other external problems. Hereare some helpul tips to make sure that your laptop issae while you're outdoors.
B Y G A R E T H M A N K O O
1USE TRACKING AND CALL BACK
APPLICATIONS
TO help you in times o need, in this case, in thet, we have
scores o applications that can ensure that you have some hope
o your laptop being returned to you ater being burgled. To do
so, these programs use techniques like sending inormation o
the laptop's current location; this helps in tracing them. Other
services include call-back applications that call the owner rom
the laptop, thus giving away its location. Some notable tools
include SecureIT, Stealth Signal and CompuTrace.
2USE CABLE LOCKS
CABLE locks are quite an obvious choice or those who
eel that their laptops are not sae in an o ce or a caé. These
are used especially in cases where you need to leave your laptop
unattended or charging. Most o the laptops available these
days come with a Universal Security Slot (USS). This slot is used
to attach a cable lock or a laptop alarm. These devices aren't
expensive and can keep away small-time thieves.
3USE DOCKING STATIONS
DOCKING stations are another great means o securing
your laptops in your absence. While in an airport, hotel, caé,
train station, a client's o ce or any other place that would
require you to get your laptop out o its bag in order to work on
it, you could always use these to ensure that your laptop is just
where you put it when you let the place. O course, this means
o protection is eective only or a temporary period. Given a
bit more time, any thie can get away with your laptop and your
docking station to top it o.
4PERMANENTLY TAG YOUR LAPTOP
MAKING an impression o your name and the name o
the organization that you work or can pay o in times o thet or
loss. You can get it embedded or engraved on your laptop rom
a proessional studio or use a label or a sticker with your personal
inormation. I you eel that these measures would be too crude
and would mar the sleek look o your laptop then you can invest
some more money and go in or tamper resistant 'commercial
asset tags'. Since these are made o metal there's little chance o
them peeling o or tearing. This will also help in recovery i you
leave your laptop lying somewhere. Many people also resort to
putting their address and contact number on the laptop.
5USE SCREEN GUARDS TO HIDE
YOUR DISPLAY
SOMETIMES the inormation we're dealing with on our laptops
is extremely crucial and cannot be shared with others. Such
inormation like bank transaction details, sensitive letters and
notes and other such personal inormation have to be protected
rom those who would like to use it or all the wrong reasons. To
avoid such attacks on your sensitive inormation we have screen
guards. These cover your screen rom the sides and above so that
you do not ace the problem o people peeping into your screen,
over your shoulder. Adding screen guards however, can cause
the weight o your laptop to increase and will also add to the
number o accesories that you have to carry along.
6AVOID USING LAPTOP BAGS
IT is common sense to keep the thieves rom knowing
that you have a laptop with you in the frst place. Hence, you
8 HANDS ON 10 TIPS
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 19/52
H e m a l i L i m b a c h i y a
should avoid carrying your laptop around in the regular carry
cases that make their contents quite obvious (especially those
that come with the laptop rom the vendor). Sometimes these
cases even have the brand logo o the laptop they contain,
ashing around in order to endorse it. Many laptop bags are
shaped like regular rucksacks, in order to thwart eorts o thet.
Also make sure that you carry it with you while traveling in
mass transit rather than letting it go along with the rest o your
baggage. However, one should make sure that you do not place
your laptop in an absolutely compact bag in order to conceal it.
The bag should be padded and spacious enough.
7DISABLE BLUETOOTH AND
INFRARED PORTS
WE may eel that it isn't necessary to turn o access to your
Inrared and Bluetooth ports, when not in use. However, it is a
very good practice to make sure that these ports are disabled
since we may unknowingly accept harmul fles, which may not
always be intended or us, rom these ports. It is also possible to
hack into PCs using Bluetooth or Inrared. The Inrared port can
be disabled rom BIOS as well.
8DO NOT LEAVE PASSWORDS
WRITTEN ANYWHERE
ONCE you have gone through the stretched, cumbersome
process o setting up the security channels or your laptop to
keep it away rom possible attacks, you have a whole new task
o keeping the inormation sae. For instance, many people
keep little scraps o paper that have the password or access
keys scribbled on them. These help in remembering these
codes incase the user has orgotten them. However, in case this
inormation alls into the wrong hands you can expect trouble.
Make sure that you handle such data careully.
9
SECURE YOUR LAPTOP WHILE ON
THE ROADTRAVELING in a car with your laptop tucked saely beside
you may not seem like an opportunity or a possible attempt
o robbery, but this isn't always so. There are times when you
will need to leave your car. Do not keep your laptop near
the window. Always make sure that the windows are closed.
However, there have been instances where laptops have been
stolen by breaking the car window. Resorting to the use o a
cable lock will come in as a great alternative. It will also help in
avoiding misplacement or dropping your laptop.
10
CAUTION WHILE TRAVELING BY AIR
UNLIKE the vulnerabilities that your laptop aces when
in a car, air travel needs more caution since you are under threat,
both inside as well as outside the plane. Outside, the airport is a
eeding ground or laptop thieves. It is quite easy or them to lay
hands on your laptop bag by creating a minor distraction or by
simply picking it up rom your baggage check beore you can do
so. It is better to carry your laptop with you while ying rather
than letting it go with the rest o your baggage. Also, while in
the plane, keep your laptop close to you. It is quite possible that
there may be a thie on-board. Passengers oten doze o during
long ights, thus giving thieves a good chance to steal their
things. Just keeping your laptop with you is not enough, also
make sure that you are alert o co-passengers.
10 TIPS HANDS ON 19
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 20/52INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
0 HANDS ON TIPS & TRICKS
TIPS &
TRICKSWINDOWS VISTA
01BLOCK PROGRAMS
THE Internet is loaded with a wide
range o applications that can be
downloaded and installed. There are
also certain kinds o applications like
TuneUp Utilities that can be useul.
However these applications can also be
used or harmul purposes.
I you have multiple users working
on your computer, using dierent
accounts which have such applications
installed, then your PC is sure to be at
|a risk. To overcome this problem, you
can use the in-built Parental Control
eature in Windows Vista. This can
block the installation and access o
certain applications on dierent user
accounts.
To use this utility, ollow these steps:
Go to 'Start | Control Panel '.
Click the 'Setup parental controls or
any user' link.
Select a user account on the
resulting screen.
Click the 'On, enorce current
settings' radio button.
Click the 'Allow and block speciic
programs' link.
Select the 'This account can only use
the programs I allow' radio button.
A list o applications will now be
displayed.
Select the applications that need to
be blocked and click 'OK'.
I the program is not mentioned in
the list, click 'Browse' and select the
required program.
Once the program has appeared in
the list, select it and click 'OK'.
WINDOWS VISTA
02BLOCK WEBSITES
THERE are several websites which give
out malware. Access to such websites
could put your system at risk.
Windows Vista has an amazing eature
known as 'Parental Control' which
allows the administrator to deny
access to certain websites. Other than
this, the administrator can also block
fle downloads, view user activity,
block specifc applications and a lot
more. Let's take a look at how to go
about it.
Go to 'Start | Control Panel '.
Click the 'Setup parental controls or
any user' link.
Select a program you would like to block from the list and click 'OK'. The specified user will not be able to use
the application henceforth.01
WINDOWS
S a c h i n P a n d i t
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 21/52
TIPS & TRICKS HANDS ON 21
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
Select a user account on the
resulting screen.
Click the 'On, enorce current
settings' radio button.
Click the 'Windows Vista Web
Filter' link.
Make sure that the 'Block some
websites or content' radio button is
selected.
Click the 'Edit the Allows and Block
list' link.
Enter a website name in the
'Website address' text box.
Click the 'Block ' button to block the
website rom being viewed. You can
block any number o websites as
required.
Once done, click 'OK '.
WINDOWS VISTA
03REMOVE OLD DRIVERS
IF you've recently upgraded your
hardware and installed new drivers,
but are still experiencing some
problems, you might need to uninstall
the old drivers to avoid urther
problems.
A major problem here is that these
drivers are not visible in the Device
Manager window. In this tip we show
you how to tweak some system
settings to get rid o old drivers on
your system.
Follow these simple steps to go
about the same.
Go to 'Start | All Programs |
Accessories'.
Right-click the command prompt
and select the 'Run as Administrator'
option rom the context menu.
On the command prompt,
type in 'SET DEVMGR_SHOW_
NONPRESENT_DEVICES=1' and
hit [Enter].
To open device manager rom
command prompt, type in
'devmgmt.msc' and hit [Enter].
From the View menu, select 'Show
hidden devices' option. You will now
be able to view all hidden drivers.
Right-click the name o a driver
that is not required and select the
'Uninstall' option rom the context
menu that appears.
WINDOWS VISTA
04DISABLE AUTOPLAY
THE Autoplay option in Windows
Vista appears whenever a CD/DVD
is inserted or an external drive is
plugged in via the USB port. This
eature might be quite helpul but at
times it may even get really annoying,
especially when it aects your
normal work or i you insert optical
discs very oten. I you eel that you
no longer require the Autoplay
unction, you can disable it. Simply
ollow the steps given below.
To disable Autoplay or all devices,
go to 'Start | Control Panel'.
Under the 'Hardware and Sound '
section click the 'Play CDs or other
media automatically' link.
De-select the 'Use Autoplay or all
media and devices' check box.
To disable certain devices and to
speciy the media type click the
drop-down list (next to the media
type or device you want to disable)
and select an option as required.
Once done, click the 'Save' button to
WINDOWS XP SP2
06DISABLE WRITING TO
USB DRIVES
IF your system is being used by
multiple users, then there is a huge
possibility o data being leaked
rom your system. Data thieves can
simply plug in a USB device and copy
sensitive data.
I you're concerned about data
security, you can disable writing to USB
drives with a simple registry tweak.
To disable the writing o data to USB
drives ollow these steps:
Go to 'Start | Run', type 'regedit ' in
the text box and press [Enter].
Browse to the 'HKEY_
LOCAL_MACHINE | SYSTEM |
CurrentControlSet | Control |
StorageDevicePolicies' registry key.
Right-click anywhere on the right
pane and select the 'DWORD
(32-bit) Value' option.
Double-click the newly created key
and type '00000001' in the 'Value
data' ield.
Once done, you will have to
restart your system or changes
to take eect.
On the command prompt type SET DEVMGR_SHOW_NONPRESENT_DEVICES=1, run Device Manager, selectthe 'Show hidden devices' option from the 'View' menu and uninstall hidden drivers as required.02
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 22/52INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
2 HANDS ON TIPS & TRICKS
WORD 2003 / 2007
01TRACKING CHANGES INA DOCUMENT
IF your data is critical and you want to
ensure that you give restricted access
on the document, you can either
control ormatting or editing changes.
To do so using Word 2007:
Open the document on which the
restriction needs to be applied.
Go to the 'Review ' tab.
Click the 'Protect Document ' option
appearing under the 'Protect' group
at the end o the tab.
Select the 'Restrict Formatting and
Editing' option under the 'Restrict
Reviewing Options' section o the
drop-down menu that appears.
Check the 'Limit ormatting to a
selection o styles' option appearing
under the 'Formatting restrictions'
section o the dialog box.
Click the 'Settings ' link and check
or uncheck the required option.
Click 'OK ' to continue.
Next, check the 'Allow only this type
o editing in the document:' option
appearing under the
'Editing restrictions' section o the
dialog box.
Select the 'Tracked changes ' option
rom the drop-down list.
Click the 'Yes, Start Enorcing
Protection' button to enorce
restriction settings.
I you are using Word 2003, carry out
the ollowing steps:
Open the document on which a
restriction needs to be applied.
Go to the 'Tools | Protect
Document…' menu command.
The 'Restrict Formatting and
Editing' panel appears on the right
side o your Word window.
Once you see the 'Restrict
Formatting and Editing' panel
simply ollow the steps as described
above (while using Word 2007).
WORD 2003 / 2007
02PROTECTING TABLE
VALUES
IF you are not comortable with
creating orms in your document, and
yet need to take user inputs you can
use tables instead. All you need to do is
create tables with cells containing fxed
values and editable values. To do so
using Word 2003:
Open the document to which
restriction needs to be applied.
Go to 'Table | Insert | Table ' menu
command.
Create a table by setting the
required number o rows and
columns.
Next, ill out the details that you
want to keep ixed.
Next, go to 'View | Toolbars | Forms '
to activate the 'Forms' toolbar.
Place your cursor on a cell where
you want the contents to be
editable.
Click the 'Text Form Field ' option
rom the 'Forms' toolbar.
Repeat the above steps or all the
editable cells.
Once done click the 'Protect Form '
option rom the 'Forms' toolbar.
Now no part o your document can
be edited except the speciied cells.
I you plan to use Word 2007 instead,
carry out the ollowing steps:
Open the document.
Go to the 'Insert ' tab.
Click the 'Table ' option appearing
under the 'Tables' group o the tab.
Click the 'Insert Table ' option rom
the drop-down menu.
Create a table by setting the number
or rows and columns.
Next, ill out the details that you
want to keep ixed.
Place your cursor on a cell that you
want to leave as editable.
Go to the 'Developer ' tab.
Click the 'Legacy Tools ' option under
the 'Controls' group.
Select the 'Text Form Field ' option
rom the drop-down list.
Repeat the above steps or all the
editable cells.
Next, click the 'Oice ' button and
click the 'Word Options' button
appearing at the oot o the drop-
down list.
Click the 'Customize ' option rom
the 'Word Options' dialog box.
Select the 'All Commands ' option
rom the 'Choose commands rom:'
drop-down list.
Scroll down and select the 'Lock '
command. Click 'Add >>' to add it to
the 'Quick Access Toolbar'.
Click 'OK ' to continue.
Click the 'Lock ' button on the
'Quick Access Toolbar' to secure
your table.
If you click the 'Recommended Minimum' button only the recommended settings will be checked, the restwill be automatically unchecked.01
MICROSOFT WORD
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 23/52
TIPS & TRICKS HANDS ON 23
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
WORD 2003 / 2007
03PROTECT SECTIONS OF A
DOCUMENT
YOU may have created reports where
you need another reviewer to enter
details and not tamper with certain
sections o the document. For doing
this certain parts o the document
should be locked while some parts
should be let open or editing. To
do so using Word 2007, carry out the
ollowing steps:
Open the document to which
restriction needs to be applied.
Select the data which needs to be
set as editable.
Go to the 'Page Layout ' tab.
Click the 'Breaks ' option appearing
under the 'Page Setup' group o the
tab.
Select the 'Continuous ' option rom
drop-down list.
Create as many section breaks as
required.
Then, go to the 'Review ' tab.
Click the 'Protect Document ' option
appearing under the 'Protect' group
at the end o the tab.
Check the 'Allow only this type o
editing in the document:' option
appearing under the 'Editing
restrictions' section.
Select the 'Filling in orms ' option
rom the drop-down list.
Click the 'Select Sections ' link that
appears below the drop-down list.
Select the section (or sections)
you want to lock in the 'Section
Protection' dialog box
Click 'OK ' to continue.
Click the 'Yes, Start Enorcing
Protection' button.
Set a password i required.
I you are using Word 2003 instead,
carry out the ollowing steps:
Open the document to which
restriction needs to be applied.
Select the data which needs to be
editable.
Go to the 'Insert | Breaks… ' menu
command.
Check the 'Continuous ' option rom
'Break' dialog box.
Create as many section breaks as
required.
Next, go to the 'Tools | Protect
Document…' menu command.
The 'Restrict Formatting and Editing '
panel appears on the right-side o
your Word window.
Check the 'Allow only this type o
editing in the document:' option
appearing under the 'Editing
restrictions' section.
Now simply ollow the steps as
above (while using Word 2007).
WORD 2003 / 2007
04PASSWORD PROTECTING
DOCUMENT
IF you are working with confdential
data, it is recommended that you
password protect such fles. Word lets
you create separate passwords or
opening and editing fles. Here's how:
Click the 'Oice ' Button.
Click the 'Save As ' option rom the
drop-down list.
Click the 'Tools ' option on the 'Save
As' dialog box.
Click 'General Options ' rom the
drop-down list.
Set the required passwords as per
your requirements. Click 'OK'.
You can set the macro security settings directly from this dialog box apart for setting passwords and making
files read-only.04
Once you lock the file for editing, the sections other than those specifically exempted will not be editable,unless there are forms controls in that section. 03
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 24/52INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
4 HANDS ON TIPS & TRICKS
EXCEL 2003 / 2007
01PASSWORD PROTECTINGDOCUMENT
EXCEL helps you create separate
passwords or opening and editing
fles, but unlike Word, you cannot
modiy the macros settings rom this
option directly. Here's how:
Click the 'Oice ' Button in Excel.
Click the 'Save As ' option.
Click the 'Tools ' option on the 'Save
As' dialog box.
Click 'General Options ' rom the
drop-down list.
Set the required passwords.
Check the 'Read-only
recommended' option to make your
ile read only by deault.
Click 'OK ' to save the settings.
EXCEL 2003 / 2007
02UNLOCKING SELECTED
CELLS
IF you are not comortable with
creating orms in your document, and
yet need to take user inputs you can
create a semi-locked range o cells. All
you need to do is create a range o cells
containing fxed values and editable
values. In Excel, the cells are locked
by deault, but the users can still edit
their content unless you protect the
worksheet as explained below. Carry
out the ollowing steps or Excel 2003:
Open the workbook to which
restriction needs to be applied.
Next, ill out the details that you
want to keep ixed in the cell range
o your choice.
Select the required cell range that
can be edited.
Go to the 'Format | Cells '.
Go to the 'Protection ' tab o the
'Format Cells' dialog box.
Uncheck the 'Locked ' option or the
selected range o cells.
Next, go to the 'Tools | Protection |
Protect Sheet'.
Check the 'Protect worksheet and
contents o locked cells' option in
the 'Protect Sheet' dialog box.
Next, check 'Select unlocked cells '
option rom the 'Allow all users o
this worksheet to:' section.
Type a password i required.
Click 'OK ' to continue.
I you plan to use Excel 2007 instead,
carry out the ollowing steps:
Open the workbook.
Fill out the details that you want to
keep ixed in the cell range o your
choice.
Select the required cell range that
can be edited.
Go to the 'Home ' tab.
Click the 'Format ' option appearing
under the 'Cells' group o the tab.
Select the 'Lock Cell ' option rom the
drop-down list to unlock the cells.
Next, click the 'Format ' option under
the 'Cells' group o the tab once
again.
This time select the 'Protect Sheet... '
option rom the drop-down list to
unlock the cells.
Check the 'Protect worksheet and
contents o locked cells' option in
the 'Protect Sheet' dialog box.
Next, check the 'Select unlocked
cells' option rom the 'Allow all users
o this worksheet to:' section o the
dialog box.
Type a password i required.
Click 'OK ' to continue. Your
worksheet is ready to be used.Setting a password to unprotect your worksheet makes the data more safe and secure. Make sure that you
pick a password that is long and hard to guess.02
MICROSOFT EXCEL
01You can auto create backups for the file by making sure that you check the 'Always create backup' option onthe 'General Options' dialog box
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 25/52
TIPS & TRICKS HANDS ON 25
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
EXCEL 2003 / 2007
03DISABLE RENAMINGWORKSHEETS
IF you are creating reports in Excel,
which need to be edited by someone
else, you might want to make sure that
they do not change the worksheet
names. Carry out the ollowing steps
to do so in Excel 2003:
Open the workbook.
Go to the 'Tools | Protection | Protect
Workbook'.
Select the 'Structure ' option in the
'Protect Workbook' dialog box.
Type in a password in the 'Password '
text box.
Retype the password to secure the
workbook.
I you plan to use Excel 2007 instead,
ollow these steps:
Go to the 'Review ' tab.
Click the 'Protect Workbook ' option
appearing under the 'Changes'
group o the tab.
Click the 'Protect Structure and
Windows' option rom the drop-
down list.
Select the 'Structure ' option in
'Protect Workbook' dialog box.
Type a password in the 'Password '
text box.
Retype the password to secure the
workbook.
Once protected, other users cannot
change the names o the worksheet
tabs, nor can they create new
worksheets or delete existing ones
without the password.
EXCEL 2003 / 2007
04PROTECTING
WORKSHEET COLUMNS
IF you have confdential data that you
need to protect rom prying eyes,
merely the locking columns will not
be enough. Apart rom locking the
column contents, you will also need
to hide these locked columns. To do
so using Excel 2003, carry out the
ollowing steps:
Open the workbook and press
[Ctrl] + [A] to select all the cells in
the workbook.
Go to the 'Format | Cells ' menu
command.
Go to the 'Protection ' tab o the
'Format Cells'.
Uncheck the 'Locked ' option.
Next, select the columns that need
to be protected.
Go to the 'Format | Cells ' menu
command.
Go to the 'Protection ' tab o the
'Format Cells'.
Check the 'Locked ' and 'Hidden'
options or the selected columns.
Keeping the columns selected,
select the 'Format | Column | Hide'
menu command.
Next, go to the 'Tools | Protection |
Protect Sheet'.
Check the 'Protect worksheet and
contents o locked cells' option that
you see in the 'Protect Sheet'
dialog box.
Set a password to secure your
worksheet.
Click 'OK ' to continue. Your data is
now protected as well as hidden
rom possible threats.
I you are using Excel 2007 instead,
carry out the ollowing steps:
Open the workbook and press
[Ctrl] + [A] to select all the cells in
the workbook.
Go to the 'Home ' tab.
Click the 'Format ' option appearing
under the 'Cells' group.
Now, elect the 'Lock Cell ' option
rom the drop-down list to unlock
the cells.
Next, select the columns that need
to be protected.
Click the 'Format ' option appearing
under the 'Cells' group o the tab
once again.
Select the 'Format Cells ' option rom
the drop-down list.
Go to the 'Protection ' tab in the
'Custom Lists' dialog box.
Select the 'Locked ' and 'Hidden'
options.
Click 'OK ' to continue.
Once again, click the 'Format ' option
appearing under the 'Cells' group o
the tab.
This time select the 'Protect Sheet... '
option rom the drop-down list to
unlock the cells.
Check the 'Protect worksheet and
contents o locked cells' option in
the 'Protect Sheet' dialog box.
Type a password to secure the
worksheet urther. Make sure that
your password is strong.
Click 'OK ' to continue. Your
worksheet is ready to be used.
This technique is not completely foolproof. The data contents can be viewed using cell reference in an
unlocked cell.04
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 26/52INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
6 HANDS ON TIPS & TRICKS
INTERNET EXPLORER 8
01USE IE8 ACCELERATORS
Internet Explorer 8 has an exciting
new eature called Accelerators, that
can solve your browsing problems.
Accelerators basically quicken your
'website search' by giving you direct
links to popular web search tools that
can be opened with a mouse click.
When you install Internet Explorer 8
you are provided with Accelerators
that provide you with only those sites
that are a liated to Microso t, such as
Windows Live. Here's how to go about
with using Accelerators:
Open up any webpage on Internet
Explorer 8. Make sure that it is a
site that has various elements like
images and textual inormation. The
best example would be a Google
search results page.
Right-click on a link on the page
and in the context menu, you will
see the 'All Accelerators' option. A
tray will open up with an option o
Accelerators that are available.
Using these Accelerators you can
receive a direct translation o the
page to the language o your choice.
You can also blog the article that
you are on as well as e-mail it to
your contacts.
To look or more Accelerators
or Internet Explorer 8 click 'Find
More Accelerators' under the 'All
Accelerators' menu. The browser will
open up a page that contains links
to an add-ons page that contain
various Accelerators that can be
added to the browser. Simply click
the 'Add to Internet Explorer' button
beside the ones you would like
to add. A dialog box will appear
on your screen asking you or a
conirmation o the same. Click 'Add'.
The add-on link will be added to
your list o installed Accelerators.
To conigure it, again right-click on
the page and click 'All Accelerators |
Manage Accelerators'. A new dialog
box will appear on your screen.
Simply click on the one you installed
and click the 'Set as deault' button
i you want to set this as the deault
Accelerator. You can also 'Disable',
'Enable' and 'Remove' Accelerators
rom here.
Click 'Close ' to exit.
MOZILLA FIREFOX
02VIEW TRUSTED SITES
Mozilla Firefox has an in-built deense
mechanism that decides which sites
are sae to visit and which aren't. The
browser allows you to customize your
security to a level that you fnd suitable
in the ormidable Web environment
that has scores o viruses and other
threats oating around. It's called WOT
(Web O Trust) and is available as a
Fireox add-on. The representation
o threatening sites is quite easy to
understand while using WOT since
it color codes the sites based on the
levels that you set. Follow these steps
to install WOT into Fireox,
Visit https://addons.mozilla.org/
en-US/ireox/addon/3456
Click 'Add to Fireox '.
Click 'Install ' on the dialog box that
appears on your screen.
Ater the add-on is installed you will
have to restart Fireox.
Once you restart the browser you
will be redirected to the 'welcome'
page o the WOT site. You will come
across our radio buttons that ask
you to select the level o protection
that WOT should use.
Select your level and click 'Finish '.
A green circular logo o the
application will appear on your
Navigation toolbar, beside the
address bar. Click this button and
click on the rating meter to mark the
'Trustworthiness', 'Vendor reliability',
'Privacy' and 'Child saety'. You can
do this by clicking on the color-
coded rating bars.
To view the overall score o the site
as per rating o users simply click the
'View scorecard or ratings detail' in
the dropdown box.
WOT can thus help you gain a better
understanding o what risks you
run into whenever you visit certain
websites.
MOZILLA FIREFOX
03MANAGE YOUR
PASSWORDS SMARTLY
Passwords are always a problem
to handle. Firstly, picking the right
WEB
One of the most useful things you can do with Accelerators is translating a webpage in real-time. By default
IE8 translates using 'Live Search'.01
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 27/52
TIPS & TRICKS HANDS ON 27
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
password always makes us scratch our
heads, and then comes the problem
o remembering these passwords
over a period o time. This problem
arises because most o us have multiple
IDs (or logins) on dierent sites, and
with all the hype o keeping away
rom using the same password in
multiple sites.
There is however something that
can help us out o this mess without
asking or much. It's called 'LastPass
Password Manager'.
It is a Mozilla Fireox add-on
that supports versions rom 2.0 to
3.7. Follow these steps to install
and confgure your passwords with
LastPass.
Visit https://addons.mozilla
.org/en-US/freox/addon/8542.
Click the 'Add to Fireox (Windows)'
button.
The installation dialog box will
open up. Once the installation is
complete, restart Fireox or the
changes to take eect.
Click the logo on the ar right corner
o the navigation toolbar. It can be
ound on the right o the search
box. It is shaped like a black square
with a white password character
embedded on it. You will be asked
or your email address and or a
master password.
Click the 'Create an account' link
on the 'LastPass Master Login'
dialog box.
This will launch the setup window.
Select your language o choice and
click 'Create an account'.
On the next orm enter the details
that are asked like your email
address, master password and
other ields. Your master password
will help you take control o all
the inormation you share with
LastPass, such as passwords o
various sites that you sign up or.
Check all the checkboxes at the
bottom, especially 'I have read and
agree with the terms o service
and privacy statement' and 'I
understand that my encrypted data
will be sent to LastPass'.
As you ill in the master password,
you will notice that the bar
below the ield is illed with color
indicating the strength o the
password. The strongest password
is that which is illed with color.
Click 'Create an Account' again to
proceed.
Just to make sure that you do not
orget the master password that
you set earlier, LastPass will ask
you to reenter the password. Do
this and click 'Create an Account' to
continue.
The next options are crucial. Select
the irst radio button that lets you
choose the items that you want to
import.
Click 'Continue'.
A smaller dialog box will appear
with the list o logins that are
registered to the email address that
you had entered. Click 'Import' ater
selecting all.
Keep clicking 'Continue' on the
ollowing steps to complete the
registration process.
Once you have done this, the
completion o your registration process
will be confrmed. Make sure that you
do not share your master password
with anyone. Every time you visit a
page that requires you to log in simply
ensure that you have signed into
LastPass. The application asks you
to enter only the master password.
The rest is taken care o as your email
address and password is entered
automatically ater a brie reerence to
the application's list o log ins.
After selecting the language click 'Create an account'. You will be redirected to the next form where youhave to enter details.04
Click on the color-coded ratings bar to let other users know how safe it is to visit a site. To view all resultsclick 'View scorecard for rating details'.02
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 28/52
8 HANDS ON WORKSHOP
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
SKILL LEVEL
Moderate
WHAT YOU WILL NEED
SanDisk Flash Drive
Windows OS
Internet Connection
WHAT YOU CAN LEARN
Securing your flash drive
Safely ejecting USB drives
HOW LONG IT WILL TAKE
T30 Minutes
KEY DETAILS
Lock up your
USB driveThere is always a chance o you losing your USBlash drives with conidential data in them. Hence,it is a good practice to lock it up with a password.Here's how you can do it using U3 LaunchPad on your SanDisk drives.
B Y K A M A K S H I S H
e m a l i L i m b a c h i y a
STEP 1
DOWNLOADING AND INSTALLING
ALTHOUGH U3 LaunchPad comes ree o cost with most SanDisk ash drives, you can stilldownload a copy o the drivers. To use the application, carry out the ollowing steps
Visit '1. www.sandisk.in/
Retail/DriverDownloads.
aspx'.
Click the 'U3 LaunchPad2.
Installer' link.
Click the 'Download3.
Drivers (.exe)' on the
next page and save the
'LPInstaller.exe' ile.
Plug your lash drive4.
into the system and
complete the installation
as directed.
Double-click the exe ile5.
to begin the installation.
Click 'Next' to proceed.
Select 'Accept6. ' and click
'Next' on the subsequent
window.
I your lash drive already7.
contains data, check the
'Yes, backup and restore
all data.' Option and click
'Next' to proceed.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 29/52
WORKSHOP HANDS ON 29
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
SETTING USB
PREFERENCES
You can change or modiy the
settings or your USB drive
using U3 LaunchPad. To do so,
carry out the ollowing steps:
Click the 'U3[1] ' iconappearing in the
Status Bar.
Click the 'Settings[2] ' link in
the U3 browser window.
Click the 'U3 LaunchPad[3]
Settings' link rom the
pop up options o the U3
browser window.
Change the settings in the[4]
'Preerences' and 'Autorun'
sections o the dialog box.
Click 'Close[5] ' to close the
dialog box.
UNINSTALLING THE
APPLICATION
Since the application is not
installed on your hard disk, a
shortcut in the Start Menu is
not created among the other
'Programs'. Hence, you cannot
uninstall the application
directly. To uninstall it, carry
out the ollowing steps:Click the 'U3[1] ' icon on the
Status Bar.
Click the 'Settings[2] ' link in
the U3 browser window.
Click the 'U3 LaunchPad[3]
Settings' link rom the
pop up options o the U3
browser window.
Change the settings in the[4]
'Uninstall' option rom the
dialog box.
Click the 'Uninstall U3[5]
LaunchPad' button to
remove the read only
partition rom your
USB drive.
Click 'Close[6] ' to close the
dialog box.
CHIP PLUS TIP
CHIP PLUS TIP
STEP 2
SECURING YOUR FLASH DRIVE
ONCE you have installed the application, the next step is to secure your ash drive with a password. To do so, carry out the ollowing steps:
A summary o options8.
will appear. Check your
Internet connection and
click 'Next' to proceed.
Follow the listed steps to9.
complete the installation
process.
NOTE: The application uses
a web installation fle which
does not work with proxy web
servers.
Double-click the new1.
drive called 'U3 System
(drive name)'. This is
created ater installation.
NOTE: This virtual drive is a
part o your USB drive itsel. The part where the application
fles are installed is converted
into a Read-only drive and is
displayed as a separate drive.
Click 'Enable Security2. '
in the 'U3 LaunchPad'window.
NOTE: You can also launch the
application by clicking the 'U3'
icon on the Status Bar.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 30/52
0 HANDS ON WORKSHOP
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
MONITORING A NON-
SANDISK DRIVE
I you are using a USB drive
which is a not a SanDisk
device, you can use alternative
applications to monitor it.
One such reeware is the 'USBLocker'. To use the application,
carry out the ollowing steps:
Visit '[1] http://bytescout.
com/usblocker.html ' and
click the 'Download USB
Locker (EXE installer, direct
download link)' link.
Save the exe fle and install[2]
the application.
Go to 'Start | All Programs[3]
| Bytescout USB Locker |
Bytescout USB Locker.exe'.
Click the 'Disable Writing[4]to USB ash drives' option.
Ensure that 'Use password[5]
protection' is checked.
Type a password in the[6]
dialog box that pops up
and click 'OK'.
Click 'Enable Writing to[7]
USB ash drives' and
retype the password to
unblock your USB drive.
CHIP PLUS TIP
STEP 3
SAFELY EJECTING YOUR FLASH DEVICE
AFTER your work with the USB drive is done, you need to ensure that you unplug it saely or utureuse. To eject your USB device saely, carry out the ollowing steps:
Type and retype a3.
password to lock your USB
drive.
I you orget your4.
password you will have no
option but to ormat your
lash drive.
You can type an optional5.
hint question to remind
you o your password i
you orget it.
U3 LaunchPad is6.
compatible with Windows
OS only. It doesn't work
on MAC or Linux OS.
Click the 'U31. ' icon on the
Status Bar.
Click the 'Eject2. ' button to
remove the drive saely.
I you encounter some3.
error while ejecting click
'Download Programs'.
Click 'USB Saely Remove4.
or PC' in the U3 browser
window.
Save and install the5.
application.
Double-click the 'USB6.
Saely Remove' icon on
the desktop.
Select the USB device7.
appearing under the
'Displayed in the menu'
section.
Click 'Stop USB Device8. ' to
eject saely.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 31/52
WORKSHOP HANDS ON 31
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
SKILL LEVEL
Beginner
WHAT YOU WILL NEED
SecureCrypt UE
WHAT YOU CAN LEARN
Encrypting text files
Encrypting non-text files
Using files as encryption keys
HOW LONG IT WILL TAKE
T30 Minutes
KEY DETAILS
Encrypt your
dataData encryption is a smarter way to secure data ascompared to password protecting iles. Learn how you can make your data and other iles sae usingSecureCrypt.
B Y K A M A K S H I S H e m a l i L i m b a c h i y a
STEP 1
DOWNLOADING AND INSTALLING
SECURECRYPT is a ree tool available over the Internet which enables you to encrypt text data in afle as well as data not saved in the text ormat. To download and use this application, carry out theollowing steps:
Visit '1. www.securecrypt.
co.nr'.
Click the 'Download2. '
button to continue.
Click the 'Download3.
SecureCrypt Ultimate
Edition (3.0.0)' link.
Save the 'sc3_setup_2.4.
exe' ile.
Double-click the ile to5.
begin installation.Keep clicking 'Next6. '
till you reach the inal
installation window.
Click 'Install7. '.
Click 'Finish8. ' to launch the
application.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 32/52
2 HANDS ON WORKSHOP
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
WHAT DOES DATA
ENCRYPTION MEAN?
Encryption is a process o
converting normal text into
what seems like a sequence
o random text also known as
cipher text. The conversion o data into cipher text requires
certain ormula known as
algorithms. There are several
algorithms available to help
with this conversion. The
amount o time taken to
encrypt the data orms the
basis o the encryption. The
Advanced Encryption Standard
(AES) was made available to
the public in around 1998 and
was used by the military. It is
a 256-bit encryption standardand can encrypt and decrypt
at a mean speed o around 36
mbps. AES-Twofsh-Serpent is
a very strong encryption and
can encrypt and decrypt only
6.6 mbps on an average. This
also depends on the system; a
aster processor will perorm
the task much aster. The RAM
is also a major actor.
REFERENCE
STEP 2
ENCRYPTING AND DECRYPTING TEXT FILES
IF you have important and confdential details in a Word document, then it is always better toencrypt the contents rather than depend on a password. A password can be cracked and the flecan be hacked into. To encrypt a text fle, carry out the ollowing steps:
Double-click the1.application shortcut
appearing on the desktop
to start the application (i
it is not already running).
Click the 'Encrypt or2.
Decrypt' logo on the
application window.
Next, click the 'Password3.
Key' button appearing
under the 'Please select
what Encryption or
Decryption Technique you
wish to use:' dialog box.
Click 'OK 4. ' on the 'Select
the ile that you want
Encrypted/Decrypted'
dialog box.
Browse and select the ile5.
rom the 'Open' dialog
box and click 'Open' to
load the ile.
Enter a password in the6.
'Enter a password key
to Encrypt/Decrypt the
ile with...' dialog box as
shown here.
Click 'OK 7. '.
Carry out the same8.
process to decrypt the ile.
Load the same ile and
type the same password
to retrieve ile contents.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 33/52
WORKSHOP HANDS ON 33
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
CUSTOMIZING PDF FILES
Since the application does not
create a shortcut in5 the Start
Menu, you cannot uninstall
the application directly. You
can uninstall the application
either rom the Control Paneldirectly or rom the application
itsel. I you uninstall it rom
the application, you will
have to manually delete the
desktop shortcut. Carry out the
ollowing steps:
Start the application.[1]
Click the 'Uninstaller[2] ' icon.
Click 'Next[3] ' in the
'uninstaller' window till
you have completed the
process.
Click 'Finish[4] ' and proceedto delete the Desktop
shortcut. The application
will be uninstalled.
REPORTING BUGS
You can report these bugs with
the help o SecureCrypt UE.
Make sure you are connected
to the Internet or reporting
bugs. Once you are ready, carry
out the ollowing steps:Start the application.[5]
Click the 'Report a Bug[6] '
option on the application
window.
Your deault browser[7]
window will open with the
'Bug Report' page o the
sotware website.
Enter the required details[8]
and enter the characters
appearing in the captcha
image at the oot o
window.
Click the 'Submit[9] ' button
to log the errors.
CHIP PLUS TIP
STEP 3
ENCRYPTING AND DECRYPTING NONTEXT FILES
IF you have video fles or image fles which are not text based, it can be quite cumbersome toencrypt such fles. Also i you are not comortable remembering too many complex passwords, youcan encrypt fles by ollowing the steps mentioned below:
Click the 'Encrypt or1.Decrypt' logo as beore.
Click the 'File Key2. ' button
in the dialog box that
appears.
Click 'OK 3. ' on the 'Select
the ile that you want
Encrypted/Decrypted'
dialog box.
Browse and select the ile4.
rom the 'Open' dialog
box and click 'Open' toload the ile.
Next, Click 'OK 5. ' in the
'Select a ile that will be
used as the Encryption/
Decryption the ile key..'
to set a key ile.
Browse and select the key6.
ile rom the 'Open' dialog
box and click 'Open' to
load the ile.
NOTE: The key fle should be
a separate fle. It can be o any
type.
Click 'OK 7. ' to complete the
process.
Carry out the same8.
process to decrypt the ile.
Load the same ile and
type the same password
to retrieve ile contents.
CHIP PLUS TIP
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 34/52
4 HANDS ON WORKSHOP
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
SKILL LEVEL
Moderate
WHAT YOU WILL NEED
Windows XP or later
Internet explorer, Mozilla Firefox or
Google Chrome
WHAT YOU CAN LEARN
Configure browser security options
HOW LONG IT WILL TAKE
T30 Minutes
KEY DETAILS
Secure your
web browserMost popular Internet browsers come along withsecurity eatures that help you browse saely. Let’stake a look at these options and how to conigurethem accordingly.
B Y D O L W I N F E R N A N D E S H
e m a l i L i m b a c h i y a
STEP 1
CONFIGURING INTERNET EXPLORER
INTERNET Explorer 8 is Microsot's latest Internet browser. However, its predecessors too havesome common security options that can be confgured or maximum security. Let's see how to goabout it.
Run Internet Explorer and1.
press the [Alt] key to view
the menu bar.
Select 'Internet Options2. '
rom the 'Tools' menu.
Click the 'Security3. ' tab.
Under the 'Security level4.
or this zone' section, set
the slider bar to 'High'.
Click a zone, or example
'Internet'.
Click the 'Custom level5. '
button.
Scroll down until you see6.'Run ActiveX controls and
plug-ins'.
Click the 'Disable7. ' radio
button.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 35/52
WORKSHOP HANDS ON 35
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
USE INPRIVATE
BROWSING MODE
IN IE8
I you're using the Internet
rom another computer, it
is necessary to clear your
surfng history or delete savedcredentials since it may be
misused. IE8 comes along
with the InPrivate browsing
mode option that deletes
temporary Internet fles, orm
data, cookies, usernames
and passwords as well as the
search history that is normally
saved by the browser. Note
that i you're using Windows
Vista and Parental Controls are
activated, InPrivate browsing
mode is disabled by deault. To browse using InPrivate
browsing mode, ollow the
steps below.
Click the 'Saety[1] ' option.
From the resulting menu,[2]
select the 'InPrivate
Browsing mode' option.
WHAT ARE COOKIES?
Whenever you browse a
website, certain data is storedon your system. This data is
known as cookie. It can contain
any data that the website
places in it. They are actually
designed to be readable by
the website that stored the
data. There are two types o
cookies i.e. Session cookies
and Persistent cookies. Session
cookies are cleared as soon as
the browser is closed whereas
Persistent cookies remain on
your system until the specifed
expiration date. These pose
threat as they stay or a long
period. These cookies help the
website to uniquely identiy
the visitor which some may
consider as a privacy violation.
Hence setting cookie options
or websites is recommended.
CHIP PLUS TIP
REFERENCE
To add a website to the8.
trusted list, in the 'Internet
Options' dialog box, click
the 'Security' tab.
Click the 'Trusted Sites9. '
icon.
Click the 'Sites10. ' button.
Enter a site name in the11.
text box and click 'Add'.
NOTE: The 'Trusted Sites' zone
contains a list o websites that,
you eel, are sae or browsing.
You can add a website to the
'Trusted Sites' list as and when
required.
To change cookie settings,12.
click the 'Privacy tab'
rom the 'Internet Option'
dialog box.
Click the 'Advanced13. '
button.
Select the 'Override14.
automatic cookie
handling' checkbox.
Click the 'Prompt15. ' radio
button or both irst and
third party cookies.
You can also manage16.
cookie settings or
certain websites. To do
so, in the 'Internet
Options' dialog box,click the 'Privacy' tab.
Click the 'Sites17. ' button.
Enter the name o the18.
address in the text box
and click the 'Allow' or
'Block' button as required.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 36/52
6 HANDS ON WORKSHOP
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
WHAT IS ACTIVEX?
ActiveX is basically a
technology that is used by
Internet Explorer. It allows
applications to be used by
the browser. An ActiveX
component may alreadyreside on a Windows system
or it may be provided as a
downloadable object. This
enhances the unctionality
o web browsing. On the
other hand, it may also pose
as a security threat i it's
not properly implemented.
Though it's quite useul, it
also increases the chances
o you being attacked.
Also, installing a Windows
application introduces thepossibility o ActiveX controls
being installed on the system.
Hence one should be aware
o or completely block these
applications rom being
installed through the browser.
REFERENCE
STEP 2
CONFIGURING MOZILLA FIREFOX
FIREFOX has gained popularity over the years and is being used by many. But like Internet Explorer,it comes with security options that need to be confgured or optimum security. To confguresecurity settings, ollow the steps below.
Run Fireox and select1.
'Options' rom the
'Tools' menu.
Click the 'Always ask me2.
where to save iles' radio
button under the 'Main
tab'. This would make
you aware o iles being
downloaded, since some
iles are downloaded
without your notice.
Click 'OK 3. ' to save changes.
Now, click the 'Security4. '
tab.
Deselect the 'Remember5.
passwords or sites'
checkbox.
I you have saved6.
passwords previously,
click the 'Save Passwords'
button.
Select the credentials7.
rom the list and click
'Remove'.
Under the security tab,8.
make sure the 'Warn mewhen sites try to install
add-ons' checkbox is
selected.
I you would like to add9.
exceptions or websites,
click 'Exceptions'.
In the resulting window,10.
enter the name o the
website in the text box
and click 'Allow'.
Once done, click 'Close11. '.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 37/52
WORKSHOP HANDS ON 37
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
STEP 3
CONFIGURING GOOGLE CHROME
GOOGLE'S frst ever web browser was successully launched a ew months ago and is currentlybeing used by many. Like other browsers, Chrome also comes with security options that are notconfgured by deault. Let's take a look at some o these options and implement them accordingly.
Run Google Chrome and1.
click the wrench menu.
Select the 'Options2. '.
In the resulting dialog3.
box, click the 'Under the
Hood' tab.
Select the 'Ask where4.
to save each ile beore
downloading' checkbox
to be notiied o ile
downloads.
Click the 'Personal5.
Stu' tab.
Under the 'Passwords6. '
section, click the 'Never
save passwords' radio
button.
Under the 'Form autoill7. '
section, click the 'Never
save text rom orms'
radio button.
Click the 'Clear browsing8.
data' button.On the resulting window9.
that appears, select the
checkboxes as required.
Make sure the 'Clear saved10.
passwords' checkbox is
selected.
From the 'Clear data11.
rom this period', select
'Everything'.
Finally, click the 'Clear12.
Browsing Data' button.
WHAT ARE BROWSER
PLUG-INS?
Plug-ins are extra applications
that can be used by a web
browser. By deault most
plug-ins are not installed since
it may not be required by theuser and at the same time it
also keeps the browser light.
Most plug-ins are (by deault)
created by the browser owner
themselves. On the other hand
there are plug-ins created by
third party users to extend the
browser's unctionality. They
are similar to ActiveX controls.
The only dierence is they
cannot be executed outside
the web browser. Adobe Flash
player is an example o aplug-in. Downloading plug-ins
rom a third party might put
your inormation at stake since
the plug-in may contain code
to steal private inormation or
even harm your system. Hence
downloading a plug-in, only
rom the browser's deault
website is recommended.
REFERENCE
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 38/52
8 HANDS ON WORKSHOP
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
SKILL LEVEL
Moderate
WHAT YOU WILL NEED
Windows XP or later
Universal Shield 4.3
WHAT YOU CAN LEARN
Password Protect files and folders
Lock Windows folders
HOW LONG IT WILL TAKE
T30 Minutes
KEY DETAILS
Protect your files
and foldersWindows operating systems do come with security eatures that keep one's system sae. But it does not include security eatures that can protect individual iles and olders. Let's see how Universal Shield cantake us to the next level o security by helping us protect individual iles and olders.
B Y D O L W I N F E R N A N D E S B
r i j e s h G a j j a r
STEP 1
DOWNLOAD AND INSTALL
UNIVERSAL Shield is a shareware and can be evaluated or 30 days. This application can bedownloaded rom the link www.everstrike.com/download/ushield.exe Once downloaded, run thesetup fle and ollow the steps below.
Double-click the setup1.
ile, select the language as
required and click 'Next'.
Agree with the terms and2.
conditions by selecting
the checkbox and click
'Next' to continue.
You would require3.
entering a password to
protect the sotware
rom being misused.
Enter the password or
the application and click
'Next'.
Click 'Browse4. ' and select
an appropriate older to
install the application.Clicking the 'View5. ' button
gives you a quick view
o how much space is
remaining on each drive.
Click 'Next6. ' to proceed.
Once the installation is7.
completed, click 'Yes,
reboot my computer
now' radio button.
Click 'Next8. ' and then
'Finish'.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 39/52
WORKSHOP HANDS ON 39
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
WHAT IS UNIVERSAL
SHIELD?
At times you might require
sharing your PC with dierent
users. For security purposes,
you can create separate user
accounts. But what i the userhas to use the main account
or some or the other reason?
By allowing the user access
to the main, you might put
confdential inormation at
stake. Hence or additional
security, Universal Shield
can come in handy. Using
this application, you can
password protect fles, olders
or an entire group o fles o a
particular fle type. Moreover,
you can also hide drives andprevent access to certain
objects like the Control Panel
and My Documents.
CHANGE THE MAIN
PASSWORD
It is a good practice to change
the main password o any
application requently. While
installing Universal Shield, you
were asked to enter the mainpassword or the application
so as to protect the application
itsel rom being misused.
Also, the main password would
be required i a user tries to
uninstall the application.
You can change this
main password as and when
required. To do so, ollow the
steps below.
Run the application[1]
and select the 'Change
password' option rom the
'Security' menu.
On the resulting screen,[2]
enter the current
password and the new
password.
Confrm the new[3]
password.
Click 'OK [4] ' to save changes.
REFERENCE
CHIP PLUS TIP
STEP 2
USING UNIVERSAL SHIELD
ONCE the installation has been completed, you can now set permissions or fles and olders,encrypt fles and lock them. Let's take a look at how to go about this.
To hide a ile or older,1.
run application and
click the 'Hide iles'
radio button.
Click 'Next2. ' and 'I want
to hide a ile' or 'I want
to hide a older' radio
button.
On the next window, click 3.
the 'Add to list' button
and browse or iles or
olders to be hidden.Click 'Next4. ' and then
'Finish'.
To hide an entire drive5.
select the 'I want to hide a
disk' radio button.
To hide a group o iles,6.
click the irst radio button
and then click 'I want tohide a group o iles using
masking'.
On the next screen, click 7.
'Add to list' and enter the
mask symbol. For eg. to
hide Word iles, enter
'.doc' and click 'Finish'.
You can also set iles as8.
read only. To do so, on themain interace, click 'Set
read only access mode or
objects'.
On the next screen, select9.
an appropriate radio
button. You can set the
read only permission to a
ile, older or a group o
iles using masks.
Browse or the ile/older10.
or enter the extension o
iles and click 'Finish'.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 40/52
0 HANDS ON WORKSHOP
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
USING THE STEALTH
MODE
The Stealth mode option in
Universal Shield hides the
entire program including the
fles and icons rom being
displayed on your system. Bydoing so, one wouldn't be
aware that the application is
installed on the system. I the
program is in Stealth mode,
you would require using 'hot
keys' to start the application.
Hence we would frst have to
set hot keys. Let's take a look at
how to go about it.
Run Universal Shield and[1]
select the 'Set hot keys'
option rom the 'Options'
menu.Select the 'Enable hot[2]
keys' checkbox.
Click on the 'Open[3]
Universal Shield'
textbox and press a key
combination. For example
'Ctrl + Shit + U' and click
'OK'.
Now to run the application[4]
in stealth mode, select the
'Stealth mode' option rom
the 'Security' menu.
CHIP PLUS TIP To encrypt a ile or older,11.
click the 'Encrypt selected
iles and olders' radio
button on the main
interace.
On the next screen select12.
whether you want to
encrypt a ile or olderand browse or it.
On the next screen13.
you will have to enter a
password or the ile or
older and conirm it.
On the next screen select14.
an appropriate option
rom the drop-down list
and click 'Finish'.
To later decrypt the ile,15.
run the application and
select the ile rom the
main interace.
From the 'Encryption16. '
menu, select 'Decrypt'.
Enter the password or the17.
ile and click 'Start'.
Other than simply18.
protecting particular
fles and older, you can
also lock objects like My
Documents, Favorites,History, Control Panel,
date and time settings
as well as the desktop.
To lock these items, rom
the 'File' menu, select
'Universal Shield Wizard'.
Select the 'Security19.
tricks' radio button and
click 'Next'.
Once done, click 'Finish20. '.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 41/52
WORKSHOP HANDS ON 4
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
SKILL LEVEL
Moderate
WHAT YOU WILL NEED
Internet connection
WHAT YOU CAN LEARN
Change your password
Block contacts
Customize privacy
HOW LONG IT WILL TAKE
T30 Minutes
KEY DETAILS
Staying safe on
FacebookWith all the good things we have on Facebook,there's a air share o threats that can make lie onthe website quite diicult. Here we will see somebasic steps to protect yoursel rom possible attacks.
B Y G A R E T H M A N K O O H
e m a l i L i m b a c h i y a
STEP 1
PICKING A STRONG PASSWORD
THOUGH Facebook has its share o precautionary measures to keep your privacy intact, thereare always a bunch o hackers who are a step urther than your protectors. Hence it is importantto strengthen the frst level o security to keep away the most common threat o all: hackers. Forthis to be made possible, the attacker should have your password, using which he can log intoyour account and do all the damage he wants. So picking a good password, that's hard to guess,is always important. The ollowing step will help you reset your password to a stronger one, i youeel that your current password isn't strong enough,
Log into your Facebook 1.
account using your
current ID and password.
Once you are on your2.
home page click 'Settings'
on the top bar.
By deault you will be3.
directed to the 'Settings'
tab. Under this, look or
the 'Password' section and
click 'Change'.
You will be asked to enter4.your old password once
again. Enter your old
password correctly here.
The next textbox will5.
ask you to enter the new
password that you want
to set. Once the password
strength is 'Medium', it
means that you have a
airly strong password.
Click 'Change Password6. '
once you're done.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 42/52
2 HANDS ON WORKSHOP
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
STEP 2
KEEPING A TAB ON YOUR PRIVACY
THOUGH it may seem as a very sae platorm to maintain your contacts, Facebook has its shareo villains who may act as harmless members. They can use your images, videos and personalinormation to tarnish your image or or their own personal gain. The ollowing steps help youensure that you have complete protection to your privacy.
SECURITY QUESTION
Like most other sites that
require you to create a login
ID and password, Facebook
too has a special section
that requires you to enter
a security question. Theimportance o this question is
oten undermined since it is
rarely required. However, this
misconception can get us into
serious trouble i our account
has been hacked into or i we
have orgotten the password
that we had set.
Facebook's administrators
can help us get our lost
or stolen account back i
we remember the security
question. There is a way to setthis question. Make sure that
you enter a question wisely. It
would be best i the answer to
the question is a little known
act to others. Here's how you
can set the question,
Click 'Settings[1] '.
Click the 'Change[2] ' link in
the 'Security Question'
section.
Select the question rom[3]
the dropdown box and
enter the answer to itin the textbox provided
below.
Click 'Change Security[4]
Question'.
CHIP PLUS TIP
Firstly, make sure that you1.
do not reveal any kind
o personal inormation
like phone numbers,
addresses and other
details that can be used
against you.
I you have photographs2.
uploaded that you would
like to protect rom
unwelcome viewers then
click the 'Privacy' link onthe bottom o the page.
I you do not see it the3.
click the 'Settings' link on
the top bar o the site.
Look or 'Privacy4. ' and click
the 'Manage' link that's
alongside it.
You will be redirected5.
to the 'Privacy' page o
Facebook. Once there
click 'Proile'.
Click the dropdown box6.
beside each entry andselect i you wish to
share that part o your
proile with 'Only Friends',
'Friends o Friends' or with
'Everyone'.
Click 'Save Changes7. '.
Ater the changes are8.
saved you will remain on
the same page. Stay on
this page in order to carry
out the next steps.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 43/52
WORKSHOP HANDS ON 43
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
RECEIVE FREE PHONE
NOTIFICATIONS
There may be times when you
cannot access your Facebook
account. Taking advantage
o this situation, certain
pranksters or other nuisancesmay resort to posting some
rather lewd comments on
your recent activity. You can
keep track o all this activity
by subscribing to cell phone
notifcations. With this you can
be well aware o what people
are posting on your Wall as
well as the comments posted
on your activity.
Follow these steps to
activate these notifcations:
Click 'Settings[1] ' on yourFacebook profle.
Click the 'Mobile[2] ' tab.
Click 'Register or[3]
Facebook Mobile Texts'.
A dialog box will appear[4]
within your browser.
Select the name o your
country and the carrier
(network service provider)
that you use.
Click 'Next[5] '.
You will receive a message:[6]
'Using your mobile phone,send a text message
containing only the letter
'' (without quotes) to
********** (**FACEBOOK).*'
Click 'Next[7] '.
You will receive an[8]
activation code which you
will need to enter into the
textbox provided.
Click 'Confrm[9] '.
CHIP PLUS TIP
STEP 3
BLOCKING CERTAIN CONTACTS
FIRSTLY it is important to ensure that you do no upload photographs that could be misused in thehands o random people across Facebook. Do not upload obscene or personal photographs sincethey may entice suspects to portray a wrong image o you on the Internet. I you are still on thepage rom the previous step then carry out the ollowing,
Click 'Edit Photo Albums1.
Privacy Settings'.
You will see the albums2.
that you have uploaded.
Select who you wish to
share these albums with.
To set customized settings3.
click 'Customize'.
A dialog box will appear4.
on your screen that will
display the similar privacyoptions or your photo
albums in addition to a
section called 'Except
These People'.
Enter the names o 5.
contacts in your riends
list. The name will
appear as you type it
by a character match.
Simply click the name o the contact and it will be
added to the list o entries
or which that particular
album will be blocked.
Once you are done6.
speciying your settings
click 'Okay'
Click 'Save Settings7. ' to
inalize your changes.Click the 'Privacy8. ' link on
the top to go back to the
privacy page.
Here you will come across9.
a 'Block List'. This list
will allow you to block
individual members.
Simply enter their names
or their email addresses in
the textbox provided and
click the 'Block' button.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 44/52
4 HANDS ON WORKSHOP
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
STEP 4
BLOCKING SEARCHES AND APPLICATIONS
FACEBOOK has some very helpul applications and games that are quite addictive as well as un.Some o these applications retrieve inormation rom your profle such as your images and personaldata. This can cause some personal inormation to land up at in the hands o the wrong people.However, at the same time, our personal inormation can be mined out rom search engines thatscan through Facebook. Hence it is necessary that we ollow these steps to keep our profles awayrom such problems.
REMOVE FRIENDS FROM
YOUR LIST
I you are being harassed by
someone on your list you can
block them by ollowing the
procedure described in 'Step 3'
o this story or you can simplyremove them rom your list.
There is however a dierence
in what happens ater each o
these steps. Simply removing
contacts rom your Facebook
riend list still gives them the
liberty to add you again or
send you messages. Blocking,
on the other hand, ensures
good riddance o your
problems.
To remove a contact, simply
visit the profle o the contactby looking him/her up rom
the 'Search' textbox. Scroll
down to the bottom o the
contact's profle till you spot
the 'Remove rom Friends'
link. Click this link to remove
the contact rom your list and
confrm your actions.
CHANGE YOUR IDENTITY
It is quite simple to change
your identity on Facebook i atall you eel that you are stalked
by someone. By doing so you
can put in your pet name or
nickname, instead o your real
name, and just your initial as
the second name. You need to
remember that impersonation
o someone else is treated as
a serious crime. Hence, avoid
doing so.
You can also change your
email address to prevent you
rom being ound in searches.
Follow these steps to do
the same:
Click 'Settings[1] '.
Under the 'Settings[2] '
tab you will see 'Name',
'Username' and 'Email'
with 'Change' links beside
them.
Click the respective links[3]
to change your profle
name and your email
address.
CHIP PLUS TIP
Click 'Settings1. ' on the top
bar.
Click the 'Manage2. ' link in
the 'Privacy' section.
Click 'Search3. '.
Select your 'Search4.
visibility' and also check
or uncheck the visibility
on search engines outsideFacebook by clicking the
last checkbox.
Click 'Save Changes5. '.
Go back to the 'Privacy6. '
page by ollowing the
above steps or by simply
clicking the 'Back' button
on your browser.
Now that we have hidden7.
our proile rom searches,
we will now see how
we can isolate it rom
applications that accessour personal inormation.
Click 'Applications'.
You will come across a8.
brie overview o what
the implications o using
applications can be. Click
the 'Settings' tab.
Uncheck those elements9.
in your proile that you
do not wish to share with
applications.
CHIP PLUS TIP
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 45/52
WORKSHOP HANDS ON 45
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
SKILL LEVEL
Intermediate
WHAT YOU WILL NEED
Internet connection
An infected pen drive
WHAT YOU CAN LEARN
Formatting your pen
drive
Getting rid of infections
HOW LONG IT WILL TAKE
T45 Minutes
KEY DETAILS
Handling infected
pen drivesIt has always been a constant threat to copy datarom a pen drive that has been used on an inected PC. We teach you how to keep sae rom inected pen drives.
B Y G A R E T H M A N K O O B r i j e s h G a j j a r
STEP 1
FORMATTING USING LINUX
THERE are several means o ormatting your pen drive without letting the virus inect your PC. Themost popular technique is to ormat it using operating systems other than Windows, such as Linux.
STEP 2
TACKLING THE INFECTED 'AUTORUN.INF' FILE
VIRUSES oten travel across computers on USB drives by taking the orm o the 'autorun.in' fle. This fle is used to launch the 'Autorun' dialog box when the pen drive is inserted into the USB port.Once inected by such a virus, a copy o the same is made on all drives o the aected PC. Everytime the drive is inserted, the virus is executed. Hence it is best to prevent the 'Autorun' eature inthe frst place. Ater doing that we will see some tools that can help avoid inections.
The reason we use Linux1.
as the primary means o
virus elimination is that
there aren't too many
threats that can aect a
Linux machine.
Insert your pen drive,2.
locate the 'autorun.in'ile that is inected and
simply delete it rom
your pen drive.
The irst step is to disable1.
the Autorun eature. Click
'Start | Run'. Enter 'gpedit.
msc' and hit [Enter].
On the let pane o the2.
'Group Policy' window
that opens up, navigate to
'Computer Coniguration |
Administrative Templates
| System'.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 46/52
6 HANDS ON WORKSHOP
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
PANDA USB VACCINE
Another, very helpul
application that keeps away
threats rom inected USB
drives is Panda USB Vaccine. It
can be downloaded rom here:
http://research.pandasecurity.com/archive/Panda-USB-
Vaccine-with-NTFS-Support.
aspx. The application deals
with your fle systems smartly.
Once you download the
application and launch the
installation process, you will
come across the 'Confguration
Settings' dialog box. Select the
'Run USBVaccine automatically
when computer boots' and
the 'Enable NTFS fle system
support' checkbox.Once installed, make sure
that the vaccination o your PC
is done so that you aren't aced
with any uture threats rom
inected pen drives. Open the
main interace ater installing
your drive. Select the name
o the drive rom the 'Select
an USB drive' dropdown box
and click the 'Vaccinate USB'
button.
CHIP PLUS TIP Under the 'System3. ' section
look or the entry called
'Turn o Autoplay'. By
deault, this entry has its
'State' as 'Not conigured'.
Double-click 'Turn o 4.
Autoplay'.
Click the 'Enabled5. ' radio
button on the dialog box
that opens up.
From the 'Turn o 6.
Autoplay on:' dropdown
list select 'All drives'.
Click 'OK 7. ' to save the
settings.
Besides blocking 'Autorun8. '
we can also take the aid
o external sotware that
help us tackle the most
common problems aced
with USB.
Visit the site '9. http://
download.cnet.
com/Autorun-Virus-
Remover/3000-2239_4-
10862968.html'.
Click the 'Download the10.latest version' link.
The fle that will be11.
downloaded will be in ZIP
ormat. Right-click the fle
and extract it.
Double-click the 'Setup.12.
exe' ile and install the
application.
Click 'Start13. ' ater making
sure that the 'Removable
Media' checkbox is
checked. This application
is quite eective in
eliminating the most
common threats that we
ace via USB.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 47/52
WORKSHOP HANDS ON 47
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
DISABLE USB PORT
FROM BIOS
I you do not want your
USB port to be used in your
absence you can simply
disable it by tweaking a ew
BIOS settings. Simply restartyour computer and press the
[Del] key to go to your BIOS
setup. Once in the BIOS setup
simply go through the menus
and look or the option that
lets you disable the USB port
rom BIOS. This is mostly under
the 'Integrated Peripherals'
section. Simply set this as
'Disabled' and save your
settings beore quitting so
that the changes take eect.
Adding a BIOS password aterthat can also help.
You can also disable the
port rom Windows by right-
clicking on 'My Computer' and
selecting 'Manage' rom the
context menu. Look or 'Device
Manager'. Make sure that
you disable all the 'Universal
Serial Bus Controllers' in the
list by right-clicking them and
selecting 'Disable'.
CHIP PLUS TIP
STEP 3
FORMATTING USING DOS
JUST like we had removed the inection with the help o Linux, we can do the same with the helpo DOS. However, this process is more diagnostic in nature. It is best to use it when you are sure thatthe inection is already in your PC. Here's how to go about it,
Ater detecting an1.inection in your pen drive
restart your computer.
Keep pressing [F8] during2.
the boot-up process.
From the menu that3.
comes up, select the 'Sae
Mode with Command
Prompt' option using
your arrow keys and press
[Enter].
In the DOS prompt type4.'C:' and press [Enter].
To display iles that are5.
hidden type in 'DIR /AH'
and hit [Enter]. I you do
not see the ile called
'autorun.in' then your
system is not inected.
I you do then type in6.
'TYPE autorun.in' in thenext line and hit [Enter].
Type in 'DEL C:\autorun.7.
in'. This will delete the
inection rom 'C:' drive.
Once done, type in8.
'MSCONFIG'.
This will open up the9.
'System Coniguration
Utility' dialog box.
Click the 'Startup10. ' tab
and uncheck the entry
'sample-virus'. Click 'OK'
and restart your machine.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 48/52
8 SPECIALS PC DOCTOR
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
Help! I do not want
Windows Firewall
+ CONFIGURINGWINDOWS FIREWALL
PROBLEM:
I had earlier disabled Windows Firewall
on my Windows XP system because I
ound it quite annoying. However, I have
been advised that it is quite an important
tool and that it will help in maintaining
a frst level o security or my computer.
How do I enable it again and reconfgure
it to unction normally? Also, I would
like to know how to add programs to the
'exception list' o the frewall so that it
doesn't block these applications without
my permission in the uture.
SOLUTION:
One o the main reasons we have
people disabling Windows Firewall is its
intererence with certain, commonly-used
applications. In act, some applications
even advise users to disable Windows
Firewall or their smooth unctioning.
This does pose a threat or those who do
not have any other security applications
or anti-virus suites installed on their
systems; since Windows Firewall is the
deault, frst level security provided by
Microsot or its operating systems.
It is best advised not to disable the
frewall but rather confgure it to suit
your needs. This also includes adding
requently used applications to the
exception list o frewalls so that it doesn't
interere with their smooth unctioning
anymore. Follow these steps to
reconfgure Windows Firewall and create
an exception list:
Make sure that you are logged into the
administrator account on your computer.
Windows Firewall can be handled by
administrators only. Guest accounts do
no have access to its settings by deault.
Click 'Start | Run'.1.
In the textbox, type in 'wscui.cpl2. '
and click 'OK'.
The 'Windows Security Center3. '
window will open up.
Click the 'Windows Firewall4. ' logo
at the bottom under the 'Manage
security settings or:' section.
The 'Windows Firewall5. ' window
will open up. Click the 'On
(recommended)' radio button to
enable your irewall again.
Make sure that the 'Don't allow6.
exceptions' checkbox is not
checked.
Click 'OK'.7.
This step will enable the previously
disabled frewall. Now i you want to
add exceptions to the frewall so that
it doesn't block any application in the
uture, ollow these steps:
Follow the above procedure to open1.
up the 'Windows Firewall' window.
Once it opens up click the 'Exceptions2. '
tab.
In this, click the 'Add Programs3. ' tab.
A list o programs will be displayed4.
in the next dialog box that appears.
Select the name o any application
that you use requently or one that is
oten blocked by Windows Firewall.
I you cannot ind the name o the
program in the list o applications,
click 'Browse' and manually locate it.
Click 'OK 5. ' once you're done.
Now run the application to check i
Windows Firewall still intereres with it.
I you still experience problems with the
application running then you will have to
resort to the cumbersome procedure o
disabling Windows Firewall while using
Windows Firewall is a great security application, however there are times when this helpul tool can turn hostileagainst us and bring out problems rather than solutions.
B Y G A R E T H M A N K O O
S a c h
i n P a n d i t
When you open the Windows Security Center window, you are notificed if the firewall is 'ON' or 'OFF'. Click the 'Windows
Firewall' logo to open up the firewall settings dialog box.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 49/52
PC DOCTOR SPECIALS 49
NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT
it and then enabling it again once
you're done.
It's better to get yoursel a complete
third party frewall that is compatible
with your application.
You may also need to add a port to
the list o allowed exceptions. Reer to
the next problem or an elaboration on
the same.
+ ADDING PORTEXCEPTIONS
PROBLEM:
I have Windows Firewall enabled on my
PC but because o this certain ports are
blocked. A sotware application I use does
not work, since it requires a particular
port to be opened. Does Windows
Firewall have a provision to allow only
particular ports to be enabled? How can I
tell which ports are being used?
SOLUTION:
Yes, Windows Firewall allows you to
speciy individual ports that can be
accessed by third party applications
even when it is running. However, to
address this problem you need to frst
determine which ports are required by
the application that you're running.
There are a couple o means by
which you can fnd out which o the
ports (which are normally blocked by
Windows Firewall) are needed to be
opened. You can contact your program
vendor or assistance on which ports
should be enabled or use a simple DOS
command to fnd out which ports are
being accessed. Follow these steps or
the same:
Launch the application that's1.
causing you problems.
Click 'Start | Run'.2.
Type in 'command3. ' and hit [Enter].
In the command prompt enter 'netstat4.
-ano > netstat.txt'.
Hit [Enter].5.
Similarly, enter 'tasklist > tasklist.txt6. '
Open both the iles, 'Tasklist.txt7. '
and 'Netstat.txt' rom the location
speciied in the DOS prompt.
In the 'Tasklist8. ' ile, look or the name
o the program that was causing
problems. Beside it, you will notice
the column that enlists the PID (port
identiier) that it uses. In this example
(below), you will see that it is a
program called 'myprog.exe' and that
the PID is 680.
Look or the similar PID in the 'Netstat9. '
ile. I the port numbers used is
more than or equal to 1024, then it
is evident that the application uses
more than just a single port. It pretty
much means that you will not be
able to resolve the issue by opening
individual ports.
I in the above steps, you notice that the
port number is lesser than 1024 then
carry with these steps to block individual
ports:
Click 'Start | Run'.1.
In the textbox, type in 'wscui.cpl2. ' and
click 'OK'.
In the 'Windows Security Center3. '
window that opens up click the
'Windows Firewall' logo at the bottom
under the 'Manage security settings
or:' section.
The 'Windows Firewall4. ' window
will open up. In this, click the
'Exceptions' tab.
Click 'Add Port'.5.
Type in the details o the port that6.
you got either rom your vendor or
by using the procedure above.
Click 'OK'.7.
The program should work ine now8.
even with Windows Firewall enabled
and running.
After clicking 'Add Program' a dialog box with a list of applications will appear on your screen. Click 'Browse' if youcannot find the application you are looking for.
Enter the name of the application, the port number and the type of protocol (TCP/UDP)
and click 'OK'.
Look for the common port identification number 'PID' in both the 'netstat' as well as the
'tasklist'. This will help you determine the port in the 'netstat' file.
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 50/52
0 SPECIALS DR. KNOW
INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009
0 SPECIALS R.KNOW
Q WHAT IS RAID?
A RAID is an acronym or
Redundant Array o Inexpensive
Disks. It is a technology that allows
computer users to gain a high level
o reliable storage space rom
low-cost PC-class disk-drive
components. This is done by
arranging devices into arrays or
redundancy. It is basically used as a
term or computer data storage
schemes that can divide and
replicate data across dierent hard
disk drives. There are dierent
schemes or example, RAID 0, RAID 1, etc. Its design generally involves achieving two
goals. The frst being increasing data reliability and the second, improving the input/
output perormance. When there are multiple physical disks set up to use RAID
technology, they are usually said to be placed in a RAID array. This array thus gives out
data across dierent disks, but the array that is used is seen as a single disk. The best
part is that RAID can be used to serve several dierent purposes.
Q WHAT IS A VIRTUAL FIREWALL
A FEW years ago, when virtualization was used or development and test
organizations, security was not an issue. It was used or easy access to multiple
operating systems that were installed on a single server. Since it was successul,
virtualization spread to production-oriented
data centers within major corporations. It
helped create networks o virtual machines
within physical servers. Today as we see that
virtualization has moved to the cloud, there
is a high risk or exploits. Virtual frewalls are
built specifcally to lessen the risks o virtual
networks. It is basically a packet fltering
frewall that is installed as a sotware in a
virtual environment. It also provides control
o inter-VM tra c. Hence it can protect and
lessen the risks o viruses, worms and Trojans
in a virtual environment.
Get to know what a Virtual Firewall is. Also learnmore about RAID and SNMP.
B Y D O L W I N F E R N A N D E S
Dr. KNOW
SNMP stands or Simple Network
Management Protocol. It is basically
used or network management
purposes. It can monitor devices
attached to a network. It is basically
a component o the Internet Protocol
Suite as defned by the Internet
Engineering Task Force. This protocol
consists o a set o standards that is
used or managing the network within
an organization. In an SNMP scenario,
one or more computers having
administrative privileges have the task
o monitoring or managing a group
o hosts or devices on the network.
The SNMP protocol operates in the
Application Layer o the OSI model.
SNMP uses ports 161 or the agent and
162 or the manager. The manager can
send requests rom any source port
to port 161 i.e. the destination port.
The agent will then respond with a
reply to the source port. The manager
receives notifcations like TRAPs and
INFORMs on port 162. The agent can
then generate notifcations rom any
ree port.
S a c h i n P a n d i t
What is SNMP?
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 51/52
8/9/2019 Chip Plus Nov09
http://slidepdf.com/reader/full/chip-plus-nov09 52/52
RNI Registration No. MAHENG/2003/12687NI Registration No. MAHENG/2003/12687