473,378 Members | 1,122 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,378 software developers and data experts.

how to secure network and computers

I have task assigned to me that my boss want the best security software that prevent from the hackers, spammers, spy, and any kinds of viruses. What is the best software to use?

Before, my boss experience that his account was hacked. So, thats why he assigned me this kind of tasks.

Additionally, I want to know how the network and computers for a company to be secured? How our network system will secure from a hacker?
May 18 '10 #1
3 2033
sicarie
4,677 Expert Mod 4TB
Security isn't a program - it's a mindset. It's educating yourself and keeping that knowledge up to date.

I'd recommend starting with 3 things:

1) anti-virus AND anti-spyware
This usually causes managers and financial people to cringe, but you can find good free options out there for both. The two anti-virus I've heard the most about are Avast and ClamAV

For spyware I've used previous versions of AdAware (there is a free link on there somewhere), and liked it, though I haven't used it recently

2) computer patching and 'hardening'
I would recommend updating/patching all desktops to the 'latest and greatest' versions. This is, of course, after testing such updates/patches on a low-priority system to ensure it won't break any of your applications.

Windows systems can be updated from here
Linux/Unix systems differ per version, but you can google '<version> linux update' and find good links

Hardening each computer merely means doing 'standard preventative measures' (like having fire exits clearly marked in buildings). There are many methods, and the important things are to pick the ones that apply to your systems. I'd recommend starting here

3) Knowledge
Passwords - Write down a clever sentence or phrase that you use frequently. Mash it all together so there are no spaces. Use 'leet' speak to play with the combination of letters/numbers/capitalization. Pick out noticeable fragments.

For example:

The TV show Chuck is hysterical
TheTVshowChuckishysterical
7heTVsh0wChuck!shyst3r!c@l
7TVsh0wC!hy

I have several of such passwords for different uses (accounts I don't care about I re-use one of such passwords) That's 10 characters, mix of letters, numbers, and capitalization, and will be a good standard password, plus is a show I've watched for 3 years and thoroughly enjoy.

SSL - if a website doesn't use SSL, it's probably not secure (though there are exceptions such as VPN). Research what SSL is and what makes it secure - what certificates are good/bad, and how to look for 'phishing' attacks that use common misspellings or similar-looking letters

As an example, yourbank.com yovrbank.com - one letter difference, but also the difference between losing your identity and not

The last thing for a 'quick' education I can recommend is NEVER click links or enter info into an email. Even if a friend sends me something, I type the URL in manually and then search the site for the link they want me to see. A person can link ANYTHING to a set of text. For example http://www.chase.com does not go to chase.com, but rather disney.com. Hackers can get even more complicated and do various things like URL masking (if you see instead something like htp://10.129.186.58, but chase.com loads - it's a compromised copy of the site), or redirection where it'll show chase.com/abunchofstuff and then after the 'abunchofstuff' scrolls off the screen there is a 'redirect' command to the compromised site, or even use the method I showed earlier about sending to a similar site

My final recommendation is to assume your boss' computer has been compromised. I'd suggest having him write down for 3 days everything he uses to ensure that you've got everything, and the folder path to all such information. Backup that information, and any other 'known' info on the box, and completely reinstall everything - that'll wipe out the virus (hopefully), and get him going on a 'hardened' system

There are lots more things I could recommend, but those are the basics I recommend starting with - I'm sure other people can chime in and post suggestions as well
May 18 '10 #2
Denburt
1,356 Expert 1GB
Very well put Sicarie as an FYI (maybe I shouldn't put this but hey) I haven't used spyware since forever. I have never particularly cared for them but I do use a host file (basically a blacklist) and I find that takes care of most of the spyware and many other issues (should I knock on wood now?) I will say that it knocks out most of the advertisements when you are surfing and some links but I usually don't want to visit them anyhow and if I do I would type in their site manually as Sicarie suggested. If you would like more info on a host file the site I prefer to visit keeps the host file updated quite well and they are very informative on this topic. http://www.mvps.org/winhelp2002/hosts.htm

BTW this file is great if you have children and you want to keep them off of a certain site 127.0.0.1 redirect is awesome .
May 18 '10 #3
thank for all your help, both of you. it really helps!
May 19 '10 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

10
by: MHenry | last post by:
Hi, We were going merrily along for 6 years using this database to record all client checks that came into our office, including information about what the checks were for. Suddenly, network...
0
by: Oshadha | last post by:
Hi All I'm trying to query and get a list of all reachable computers in a network. I also heard that you can query active directory and find domain pc list. but my need is not to query active...
4
by: Ram Baruch | last post by:
Hi, I'm looking for a simple directory picker. I need both local drives directories and directories in the computers in the network neighborhood. Does anyone know if there is something ready in...
2
by: hillah | last post by:
Hi, I am running a VB application from an asp page.. I mean that when pressing a button in the asp page the asp runs a vb application. The problem is that this VB Application is supposed to...
0
by: n. Smith | last post by:
Hello, I was wondering if there is any native support in vb.net for connecting to a web server such as IIS 6 using SSL (with a homemade certificate), soley for the purpose of allowing users to...
8
by: Santy | last post by:
Hello Friends, I am making an application in which i need to list all the computers in my network. can anyone suggest any code to accomplish this task. Thanks Santosh
0
by: NoWhereMan | last post by:
Hello, I'm trying to get the list of shared folders of a network computer and add them to a combo box. I'm using the bellow code in VB .NET. Code ==== Private Sub EnumShares(ByVal Machine As...
0
by: shad3jd | last post by:
Alright, now I'm sure this is 'simple' for most seasoned .NET programmers, but I am still in the process of learning both VB & .NET... I have a console application that has to access a network...
1
by: twazok | last post by:
Please help I am new to VB and only very rarely use it to create useful tools. i am trying to write an app that needs to build a list of computer names into an array for every machine currently...
0
by: =?Utf-8?B?UGhpbCBKb2huc29u?= | last post by:
Hi, We have a legacy asp application that uses a third party component to upload a file and saves it to a secure network share. The code sets the credentials for the secure network share on the...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: taylorcarr | last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.