If there was ever a need to give your desktop security a
boost, it is now. Take, for example, the e-mail worms. Despite all sorts of
network protection, they still manage to get inside and do their deeds.
Navidad.exe, Kak.hta, LoveLetter… the list is endless. When the desktops
themselves are not secure, then the security of their communication channels
also becomes questionable. How do you know that your e-mail is not being
captured and read elsewhere? It may be fine if your mail is any regular mail,
but what if it contains the details of a critical project, or your financial
data? Web browser security, too, has been an issue for sometime. There’s a
plethora of Websites that can run malicious script on your machine the moment
you click on a link. Then, of course, the safety of desktop hardware itself is
becoming an issue. A computer is made up of so many small parts that anyone can
easily put one in the pocket and walk off. Notebooks are even easier to swipe as
they’re light and easy to carry. In the pages that follow we analyze most of
these issues and talk about how you can secure your desktop and communication.
Security
Threats to your Desktop
Any PC is prone to attack, so let's analyze the gaps and plug themOf
Worms and Trojans
These usually enter your system through e-mail. Find out how you can
safeguard yourself from themWhat
Digital Certificates Do
In the virtual world even your signature is not sufficient proof of your
identity. Your e-mail can easily be read by prying eyes. Digital
certificates are solutions to both these problemsObtaining
Digital Certificates
An easy to follow step-by-step guide to getting one
Safe with Digital Certificates
Digitally Signing your e-mail in Outlook Express will verify you as the
sender. Encrypt it so that only the intended receipient can read itSecurity
Alert
Two worms that are wreaking havoc through e-mail, incompatibilities in
Windows Me, and vulnerability in Windows 2000Are
you Secure When Someone Seeks you?
Some desktop security issues with the popular instant messenger, ICQThe
Browser as a Security Threat
How malicious are cookies, JavaScript, Java applets, and ActiveX
componentsLinux
Password Policies
How to set up password aging, and make Linux secureSecure
with PGP
A Step-by-step guide on communicating safely by encrypting your e-mailSecure
Mail on Linux
Use Kmail e-mail client and PGP to send and receive encrypted messagesProtect
Data During Remote Sessions
The Linux Secure Shell provides safe remote login services by encrypting
the data flowSecurity
Algorithms
The techniques involved in authentication and conducting secure
e-transactionsNorton
Ghost 2001
A simple backup solution for network and standalone PCsSophos
AntiVirus
This product works with many operating systems, and offers good customer
supportA
Personal Firewall
NPF protects your system from infiltration and monitors the flow of
private information
PCQ Labs