Showing posts with label About Computer. Show all posts
Showing posts with label About Computer. Show all posts

Wednesday, February 17, 2010

Keep Secure your Ubuntu

As a system administrator, one of your chief tasks is dealing with server security. If your server is connected to the Internet, for security purposes, it's in a war zone. If it's only an internal server, you still need to deal with (accidentally) malicious users, disgruntled employees and the guy in accounting who really wants to read the boss's secretary's e-mail.

In general, Ubuntu (and expecially Ubuntu) Server is a very secure platform. The Ubuntu Security Team, the team that produces all official security updates, has one of the best turnaround times in the industry. Ubuntu ships with a no open ports policy, meaning that after you install the machine -- be it an Ubuntu desktop or a server -- no applications will be accepting connections from the Internet by default. Like Ubuntu desktops, Ubuntu Server uses the sudo mechanism for system administration, eschewing the root account. And finally, security updates are guaranteed for at least 18 months after each release (five years for some releases, like Dapper), and are free.

In this section, we want to take a look at filesystem security, system resource limits, dealing with logs and finally some network security. But Linux security is a difficult and expansive topic; remember that we're giving you a crash course here, and leaving a lot of things out -- to be a good administrator, you'll want to learn more.

User Account Administration

Many aspects of user administration on Linux systems are consistent across distributions. Debian provides some convenience tools, such as the useradd command, to make things easier for you. But since Ubuntu fully inherits Debian's user administration model, we won't go into detail about it here. Instead, let us refer you to the O'Reilly Web site for the basics. After reading that page, you'll have full knowledge of the standard model, and we can briefly talk about the Ubuntu difference: sudo.


Ubuntu doesn't enable the root, or administrator, account by default. There is a great deal of security benefit to this approach and incredibly few downsides, all of which are documented at the man pages for sudo_root.

The user that you add during installation is the one who, by default, is placed into the admin group and may use sudo to perform system administration tasks. After adding new users to the system, you may add them to the admin group like this:

$ sudo adduser username admin

Simply use deluser in place of adduser in the above command to remove a user from the group.

One thing to keep in mind is that sudo isn't just a workaround for giving people root access. It can also handle fine-grain permissions, such as saying, "allow this user to execute only these three commands with superuser privileges."

Documentation about specifying these permissions is available in the "sudoers" man page, which can be a bit daunting -- feel free to skip close to the end of it, until you reach the EXAMPLES section. It should take you maybe 10 or 15 minutes to grok it, and it covers a vast majority of the situations for which you'll want sudo. When you're ready to put your new knowledge to use, simply run:

$ visudo

Be careful here -- the sudoers database, which lives in /etc/sudoers, is not meant to just be opened in an editor, because an editor won't check the syntax for you! If you mess up the sudoers database, you might find yourself with no way to become an administrator on the machine.

Filesystem Security

The security model for files is standardized across most Unix-like operating systems, and is called the POSIX model. The model calls for three broad types of access permissions for every file and directory: owner, group and other. It works in exactly the same way on any Linux distribution, which is why we won't focus on it here. For a refresher, consult the man pages for chmod and chown, or browse around the Internet.

We want to actually look at securing partitions through mount options, an oft-neglected aspect of dealing with system security that's rather powerful when used appropriately. When explaining how to partition your system, we extolled the virtues of giving, at the very least, the /home, /tmp and /var directories their own partitions, mentioning how it's possible to use special options when mounting these to the filesystem.

Many of the special mount options are filesystem-dependent, but the ones we want to consider are not. Here are the ones that interest us:

nodev A filesystem mounted with the nodev option will not allow the use or creation of special "device" files. There's usually no good reason to allow most filesystems to allow interpretation of block or character special devices, and allowing them poses potential security risks.

nosuid If you read up about Unix file permissions, you know that certain files can be flagged in a way that lets anyone execute them with the permissions of another user or group, often that of the system administrator. This flag is called the setuid (suid) or the setgid bit, respectively, and allowing this behavior outside of the directories that hold the system binaries is often unnecessary and decreases security. If a user is able to, in any way, create or obtain a suid binary of his own choosing, he has effectively compromised the system.

noexec If a filesystem is flagged as noexec, users will not be able to run any executables located on it.

noatime This flag tells the filesystem not to keep a record of when files were last accessed. If used indiscriminately, it lessens security through limiting the amount of information available in the event of a security incident, particularly when computer forensics is to be performed. However, the flag does provide performance benefits for certain use patterns, so it's a good candidate to be used on partitions where security is an acceptable trade-off for speed.

Deciding which mount options to use on which partition is another fuzzy science, and you'll often develop preferences as you become more accustomed to administering machines. Here's a basic proposal, though, that should be a good starting point:
• /home-nosuid, nodev
• /tmp-noatime, noexec, nodev, nosuid
• /var-noexec, nodev, nosuid

System Resource Limits

By default, Linux will not impose any resource limits on user processes. This means any user is free to fill up all of the working memory on the machine, or spawn processes in an endless loop, rendering the system unusable in seconds. The solution is to set up some of your own resource limits by editing the /etc/security/limits.conf file:

$ sudoedit /etc/security/limits.conf

The possible settings are all explained in the comment within the file, and there are no silver bullet values to recommend, though we do recommend that you set up at least the nproc limit, and possibly also the as/data/_memlock/rss settings.

TIP: A Real-Life Resource Limit Example

Just to give you an idea of what these limits look like on production servers, here is the configuration from the general login server of the Harvard Computer Society at Harvard University:

as 2097152 data 131072 memlock 131072 rss 1013352 hard nproc 128

This limits regular users to 128 processes, with a maximum address space of 2GB, maximum data size and locked-in-memory address space of 128MB, and maximum resident set size of 1GB.

If you need to set up disk quotas for your users, install the quota package, and take a look at its man page.

System Log Files

As a system administrator, the system log files are some of your best friends. If you watch them carefully, you'll often know in advance when something is wrong with the system, and you'll be able to resolve most problems before they escalate.

Unfortunately, your ability to pay close attention to the log files dwindles with every server you're tasked with administering, so administrators often use log processing software that can be configured to alert them on certain events, or write their own tools in languages such as Perl and Python.

Logs usually live in /var/log, and after your server runs for a while, you'll notice there are a lot of increasingly older versions of the log files in that directory, many of them compressed with gzip (ending with the .gz filename extension).

Here are some log files of note:
• /var/log/syslog - general system log
• /var/log/auth.log - system authentication logs
• /var/log/mail.log - system mail logs
• /var/log/messages - general log messages
• /var/log/dmesg - kernel ring buffer messages, usually since system bootup

Your Log Toolbox

When it comes to reviewing logs, there are a few tools of choice that you should become familiar with. The tail utility prints, by default, the last ten lines of a file, which makes it a neat tool to get an idea of what's been happening last in a given log file:

$ tail /var/log/syslog

With the -f parameter, tail launches into follow mode, which means it'll open the file and keep showing you changes on the screen as they're happening. You can now easily recreate the Hollywood hacker movie staple: text furiously blazing across the screen.

Also invaluable are zgrep, zcat and zless, which operate like their analogues that don't begin with a "z" but on gzip-compressed files. For instance, to get a list of lines in all your compressed logs that contain the word "warthog" regardless of case you would issue the following command:

$ zgrep -i warthog /var/log/*.gz

Your toolbox for dealing with logs will grow with experience and based on your preferences, but to get an idea of what's already out there, do an apt-cache search for "log files."

A Sprinkling of Network Security

Network security administration is another feature provided largely by the OS, so it's no different on Ubuntu than on any other modern Linux distribution. That means we won't cover it here but will leave you with a pointer.

The iptables command is the front end to the very powerful Linux firewall tables. Unfortunately, dealing with iptables can be rather difficult, particularly if you're trying to set up complex firewall policies. To whet your appetite, here's iptables in action, dropping all packets coming from a notorious time-sink domain:

$ sudo iptables -A INPUT -s www.slashdot.org -j DROP

Tutorials, how-tos, and articles about iptables are available on the Internet in large numbers, and the system man pages provide detailed information about all the possible options. Spending some time to learn iptables is well worth it, because it'll let you set up network security on any Linux machine, and will make it pretty easy for you to learn other OS firewall systems if need be.

Final Words on Security

We've barely even scratched the surface of system security in this article, though we've tried to give you good pointers on where to start and where to get the information you need to learn more. But let us give you some sage advice on security in general, since it's a painful truth to learn: There is no such thing as a fully secure system. Securing systems isn't about making it impossible for a breach to occur. It's about making the breach so difficult that it's not worth it to the attacker. This definition is pretty fluid, because if your attacker is a bored 14-year-old sitting in a basement somewhere chewing on cold pizza, you can bet that he'll leave your system alone if it's even marginally secure. But if you're keeping around top secret information, then it's a lot more difficult to have the system be secure enough that breaking into it isn't worth it, from a cost/benefit point of view, to the attackers.

Security is also neat because, as a concept, it permeates the entire idea space of computer science. Getting really good at security requires incredibly deep understanding of the inner workings of computer systems, which has the nonobvious advantage that if you're trying to get a deep understanding of computer systems but don't know where to start, you can start with security and simply follow the trail. Use this to your advantage!

Source: August 24, 2006 (Computerworld) -- This article is excerpted from The Official Ubuntu Book by Benjamin Mako Hill, Jono Bacon, Corey Burger, Jonathan Jesse and Ivan Krstic, copyright Prentice Hall. Reprinted with permission of Prentice Hall, all rights reserved.

Read More

Tuesday, February 16, 2010

ALL Command "DIR" in DOS PROMPT

DIR command is a DOS command that serves to display the files in a drive or folder is active.

This command is similar to the Copy command in the previous posts both on the run from the prompt drive.
This command is most often used for those who are accustomed to dealing with Command Prompt, do not continue to read, but for those who are unfamiliar please read carefully and try to practice the commands I give here.

Before executing the command DIR there are some things that must be understood as an active drive, the current folder.
Active Drive is the drive currently being accessed, as well as the folder is a folder that is used or diakes today.
How to do I know if the folder is active or being accessed at this time? Here's how to explain my logic, Suppose you from windows click Start - Run then type cmd and press enter when the cursor is (the sign minus karakater shaped guide flashing) is at C:\Document and Settings\user> then the current drive is now drive C and the current folder is the folder \Documents and Settings\ and sub folders on the \user>. and \user> usually can be changed to another name as a user in your computer.

So if you give DIR command (the command with a lowercase letter may be all), then all files and directories that display the files and folders in the sub folder \User>.

Various forms of DIR command, try the command (yellow) as the experimental materials and the early exercise to try in windows directory and then run the command below, do type the command: cd \windows and press Enter.

DIR and press command to display all files and all extensions

DIR *.* Enter, the command to display all files and all extensions

DIR? O *.* Enter, the command to display the file name from the left second letter is the letter O and the subsequent extensions free encyclopedia

DIR?? M *.* enter, the command to display the files from the left third letter is the letter m and the free extension

DIR *. c * Enter, the command to display the files and free the file name extension first letter is the letter C

DIR? O *. c * Enter, the command to display the file name both the letter of the file name is the letter O and the first letter of the extension is the letter c

DIR ?????.* Enter command to display the file names that only have 5 (five marks) or smaller letters, and free extensions

DIR *.?? Enter, the command to display files with the file name extensions freely while only 2 (two) letters only.

Maybe that's part of DIR command I can give, for later you can try with variations wildcards (special caracter * and?) On the DIR command to suit your needs.

Good luck with your practice with DOS commands
Read More

Thursday, February 11, 2010

How to disable Autorun In Drive Computer

we must have a lot of what's known computer viruses and computer viruses are often spread through a kind of intermediary data traveler flash disk or CD games and the like. computer viruses are very dangerous if we are not able to control its spread. and now all that can be a bit overcome by disabling the autorun in flash disk or a frequent traveler data connected with our computers.

The following are steps to disable this autorun:

Disable Auto Run drive cd rom or flash disk


1. Click the Start button - Run.
2. Type gpedit.msc and press OK.
3. Click on User Configuration - Administrative Templates - System.
4. Click 2x on the Turn Off Autoplay.
5. Click on the Enable option.
6. At the option Turn off Autoplay on, select All drives.
7. Click OK.
8. Done.

good luck guys :)
Read More

Monday, February 8, 2010

Repair registry editor in Your Computer

Your PC is just like a machine, the defense needs to be working in perfect condition. And, one of the most significant jobs you have to do is regular maintenance to repair your registry. Windows Registry on your computer is a file cabinet, storing all the information the Windows operating system plus application system. But as the filing system, when the cabinet is often dismantled pairs of its contents, at some point he will become a mess and rubbish everywhere. If it so it becomes increasingly difficult to detect computer information necessary to do the job efficiently. Archiving registry repair computer software, identify the files that are no longer required is routine work to be done.

Windows already has a way to remove the garbage that is not valid in the registry, called the Registry Editor or regedit. This application allows you to view and delete registry entires that are not valid anymore. Unfortunately, unlike the clear office files are labeled, is not easy to know and often have strange names such as HKEY_CURRENT_USER MicrosoftWord Applications that do not indicate if they are needed or not, then you do not know if it is safe or not to delete it. In fact, even more profesionalpun computer users will not use regedit to clean the registry. They rely on software from third-party developers.

Registry repair software is best to not only to remove rubbish from the registry, it must also correct errors that always arise. Such errors occur when, for example, a program installed and uninstalled but uninstalled junk files are still there, aka accumulate. When finished scanning, the software should indicate the file is invalid and obvious errors, so you can make good decisions if the key is removed or left alone.

When deciding which registry repair software is best for you, you should use criteria such as user-friendly, easy installation and a short time, feature set and support and help available in everyday language understandable to the user. And most significantly, the use of cleaning must have security features such as backup function that allows you to restore the registry to a previous state in case of important files accidentally deleted.

Some registry repair software best available as a free download, so you do not need to invest money to make this vital maintenance tasks. But if you're willing to take the commercial registry software is also good because it'll make other important system changes, there are free trial versions that you can get to test. If you find a registry cleaner that allows you to run a scan of their site without downloading, you may be able to test their software. After you finally select the registry repair software is best and right for your computer skill level, always make sure you have backed up your registry and all the important information in your drive.
In conclusion, treating the registry was not easy then you need software registry. Good luck!
Read More

Showing the screen saver tab is hidden

While my blog suddenly appeared a short message on my Hanphone coming from one of our friend loyal blog visitors Computer Science Learning which was about to ask a question that occurs to the laptop.

The problems presented by him that the screen saver on his laptop missing alias does not appear in the display properties.

Problems like this myself yet know exactly what caused the problem but the truth is a screen saver may be lost due to accidentally disabled person may also own a friend who was idly toying with you. If the screen savernya accidentally or lost due to accidental by the person to return the matter was simple.
What is meant by a screen saver here is the Screen Saver tab is shown in the Display properties window is not a screen saver view or display a screen saver.

Screen Saver tab can be displayed or it can also be hidden, it is very helpful in keeping our computers not as good for people to change the settings of personal computers let alone computers. What if the screen saver is modified by someone else using the object, image or pornographic images or images that are not feasible. It's changed back to display the screen saver is not difficult, but if this will be done in the workplace by fellow idle and eventually it caught the boss can be a big deal.

In order not to get to the green table mending the Screen Saver tab to hide it. To hide or display the Screen Saver tab again please follow the following way:

  1. Click the Start menu and select Run
  2. Type gpedit.msc and press ENTER / OK to enter the Group Policy window
  3. Click the sign + (plus) on the left User Configuration
  4. Click the + sign on the left Administrative Templates
  5. Click the + sign on the left Control Panel
  6. Click Dipsplay
  7. In the right window double-click on the Hide Screen Saver tab to go to the Hide Screen Saver Tab Properties
  8. Select Enabled to display the Screen Saver tab
  9. Select Disabled to hide the Screen Saver tab (select sala one no. 8 or No. 9)
  10. Click OK
  11. Close the window Tab Screen Saver Hide Properties
  12. Close the Group Policy window
  13. Done
Easy is not how to display the screen saver tab is missing or hide screen saver tab. Good luck hopefully useful. [compsecured.blogspot.com]
Read More

How To Booting From CD-Rom change BIOS Setup

Once the software installation on computers made by using the floppy, but this time was much different that using the compact disk (CD). Cd can be stored in many kinds of programs and drivers.

Because now all programs are stored on the CD then the boot process must also be through the cd, but the problem is setting the BIOS (basic input / output system) to the default state does not lead to a cd rom boot, so there are still many who do not know how to change the boot order in the BIOS so the CD is the first priority when booting.

To enter the BIOS menu different way someone using DEL key is using the F2 function key and others are using a variation of 2 key on the keyboard, but it can be seen in the bios first read and seen on the monitor.

If the boot process too quickly, so you do not have time to read or even press the button to enter the bios then you should press the Pause / Break on your keyboard to pause the boot process, this is done so that we could read the instructions that can be done to get into Hereinafter in the BIOS menu.

In this article we use the DEL key is more common today.
Initial steps to enter the BIOS menu is blaming a computer, by pressing the computer power, note the blinking lights on the keyboard then press the DEL key multiple times with the intention that you are not late pressing the DEL.

Once inside the BIOS menu menu note Advanced BIOS Features option, there are First Boot Device option. Drag the cursor and place it on the First Boot Device selection and do a boot media by using a plus sign (+) or minus (-). Because at this time we practice to boot using the cd then choose the CD-ROM as first boot media.

The next step is to click Esc on your keyboard to exit the BIOS menu Advaced Feature and primary human return to the BIOS. From the BIOS main menu select Save & Exit Setup and then select Y (yes) and press Enter to exit the BIOS menu and do Booting.

Now your computer will always read the cd-rom as the boot process on your computer that you made the change, if you want to restore booting from the cd-rom to your hard disk, then step into the same setupnya BIOS and change the First Boot Device to Hard disk.
Read More

How To Hide Drive Computer? Check This Out

There are many ways to secure data is not easily found by other computer users. Let's say there is no data in the form of photographs or documents for adults who do not deserve shown to the children would have to hide it so as not easily be found by the children. The father of a laptop may be used by the children but of course there is a limit not to the father discovered the secret of all.
Frequently used way is by protection of file or folder by giving password, but this way is still considered very inconvenient because every time you open a file or folder must be busy with typing a password.

for us computer users is very important data so that every person who has the data will always try to keep data safe from interference perceived hands ignorant. Moreover, these data are confidential data.

Here is one way to avoid the reach of children from the secret files in order not to consume the children.


Follow these steps to hide a hard disk drive.

Prior to hide drives are advised to make a special drive to store files that are considered confidential, which will be hidden drive let's say the drive is drive D: \>

Suppose that the computer has 3 fruits such as drive A drive (Floppy disk), drive C (Hard Disk C) and Drive D (Hard Disk D)

Of the three drives that would be hidden on the D drive (hard disk D).

Way as follows:

Click the Start menu, Run and type gpedit.msc and press ENTER or click OK.
Click the + (plus) on the left User Configuration
Click the + sign on the left Administrative Templates
Click the + sign next to the left of the Windows Components
Click Windows Explorer
Double-click thesive Hide specified drives in My Computer
On the Settings tab select the Enable
Click OK

Close Windows Explorer and refresh or restart your computer and reopen Windows Explorer, then dive which had been hidden will not be visible.
Even if the file does not seem to drive but to open the drive is not difficult because only with type D: and then press ENTER then the D drive will appear.

A few tips from the blog Learning Computer Science this time to hide the drive and hopefully useful.
Read More

Thursday, February 4, 2010

Partition Magic 8.0, How to increase hard disk partitions?

Partitioning your hard disk by using the operating system was used and was often done while to partition the hard disk after the operating system is installed there are still newbies who have not tried it from that article is very useful for beginners who want to add a partition on the computer hard disk using Partition Magic 8.0 .

To get started, please create a new partition start partition magic 8.0 in your PC.

Once inside the Window Partition Magic, the next step is to click the C drive partition and then the Operations tab click the Partition Resize / Move partition resizing windows so that they appear / Move Partition as the following picture :




type size of space (MB) is needed in Free Space Free Space Before or After. To use free space free space before or after depending on whether we plan to place the new partition before or after the c drive c drive, where to put the new partition before the c drive then type the amount of space to free space before and when to put the new partition after c drive then type the amount of space on the free space after.

For example here I put a new partition after my drive c then type in the amount space for 15,000 MB of Free Space After then click OK.




after typing a number of bytes the size of hard disk partition view would be like the following picture:



Click on the partition that had just added and then click Create Partition to Partition Operations tab so that the Create Partition window appears.
Change the options in accordance with needs such as Primary Partition or Logical Partition, Drive Letter, Partition Type (FAT / NTFS), Size. Here I explain to create a logical drive so just click OK without making any changes to create the windows partition.



After click OK then the overall result of the hard disk partition will look like the following picture which has added a new drive called the drive G.



After the partition is complete next mark is the last operation is to click Apply at the Pending Operations tab so that all pending operations is completed. When you click Apply then the message will appear Apply Changes consisting of 3 choices are Yes if you agree to continue the process, then select No if you did not continue the process and select the details to see a detailed process that we have done and are still in pending. Click Yes because we want to continue the process ..





If you Need to restart your computer, you can restart now for take new effect. now! The process adding a new partition on a computer that already installed windows operating system is complete. good luck!!
Read More

Sunday, December 21, 2008

How to Make a Backup of Registry Using Regedit

How to Make a Backup of Your Registry Using Regedit

Computer users who are seeking a way to produce a backup copy of their Windows registry can easily accomplish this task from within Windows, and without any third party software.
Users need to make backup copies of the Windows registry because it is a large file that contains information about the settings of your computer and the programs.

A lot of users don't exactly understand what exactly the Windows registry is, and why they should backup copies of the data. You see, the Windows Registry is basically a vault of the various settings Windows and other programs use. It's where programs get information from. As I said before, the Windows Registry is basically a giant vault for data.

The reason why users need to make backup copies of their registry is rather simple; one little mistake in your registry can basically stop Windows from loading at startup.
It is essential for users to produce backup copies of their registry because every program you install or download has the ability to modify, even destroy it.

It's important for users to remember that every program you install on your system has access to your system's registry. A lot of adware and spyware applications will modify your system's registry in order to take over your web browser.

Making weekly backup copies of your data is not only a smart thing to do, but takes only a few seconds to successfully make a backup copy. As mentioned before, users do not require a third party utility to backup their registry. A tool, entitled RegEdit is installed on every Windows PC, and although it looks quite complicated, making backup copies of your system's registry is actually rather easy.

To start out, click the Start button and select Run. Type in regedit and press the enter key. A few seconds later you will be presented with a two pane window that resembles the Windows Explorer.

Go into the File menu, and select Export. Find the location of where you wish to store the registry backup file, and type in a name for the file. Click on the Save button, and you are finished. You now have a nice backup of your Windows registry.
Remember that registry backups take a large amount of data, so if you make daily backups remember to delete the older copies.

If you decide to make registry backups every day, remember to delete the older copies. Because of the large amounts of data stored in the registry the files can be very large (fifty to a hundred megabytes).

When you find the need to restore a backup copy of your registry, the process is simply. Locate the backup file, and double click it. You will be presented with a dialog asking you if you are sure you wish to add the data to your registry. Click on Yes and your registry will be restored within seconds.

Using backup copies of your registry is a great idea whenever you stumble across a program that takes control of your web browser, or if you are having problems with an installed application that was working file whenever you produced the backup.
Read More

Thursday, December 18, 2008

Safend Data Leakage Prevention Solutions

Susan Callahan, senior vice president of business development and marketing at Safend, is seeing a change in trends. In the past, corporations were looking to check a box on compliance. Now, data is their most important asset. CEOs are no longer looking to fill a checkbox; they now want a granular solution, she said. According to a recent study by the IDC, 60 percent of all corporate data is accessed via an endpoint. As the perimeter continues to expand, encryption is no longer enough protection for company data.

Safends solutions offer a fix to data leakage prevention. The acronym DLP has several definitions depending on who you ask: data loss prevention, data leakage prevention, or create other acronyms such as information leak detection and prevention (ILDP) and information leak prevention (ILP). Callahan said, How much of DLP is a process versus a process? Its such a complex problem to protect data. Its a process or methodology that needs to be adopted within a corporation. Technology enables you to accomplish it. If there is no way of enforcing it, its not going to happen. Technology is the means to an end.

Safend offers three solutions to address DLP and regulatory compliance: Safe Auditor, Protector and Reporter. Their solutions protect an organizations data in motion, data in use and data at rest. Safend Auditor provides detailed audit logs of all devices currently or historically connected to your endpoints. Download an evaluation copy of Safend Auditor at Safend.com for a free trial. It will reveal how many USB sticks have been used on your machine. It also has a client list utility for IT admin to see who is connected on what devices in the network. According to EOM partners market survey, 72 percent of people within a corporation use at least one USB stick, and many use up to seven different USB sticks. Its important to know who and what devices are connecting to your environment. Safend Auditor is built within regulatory compliance for HIPAA, SOX, PCI and other state privacy laws.

Safend Protector guards against data breaches by applying granular security policies over removable storage devices. Safend Protector offers endpoint monitoring, device identification and blocking based on administrator-defined policies with automatic data encryption. It protects all ports including USB, WiFi, Bluetooth and all removable storage devices. Safend conducted an endpoint security and data leakage threat survey that included responses from enterprise executives and IT administrators. Nearly 60 percent of all respondents were unaware or unsure of how many devices connect to their corporate endpoints. Also, nearly 25 percent have no policies for endpoint and port security at all.

Safend Reporter is an add-on module that provides reporting and analysis on security incidents and operations status. The tool reports on data accessed by removable storage devices and wireless ports that further enables data security and compliance.

Callahan recounted an event where a student used a key logger to get access to his teachers password. He then had access to the answers to his teachers exams before each test. When the student performed exceedingly well, to the point of writing his answers almost word for word from the teachers answers, the compromise was discovered. If kids can do that with a key logger, imagine what can be done to steal company secrets.

With the average cost of a data breach being $6.3 million per company, its too expensive to leave to chance, said Callahan.

------------------
Kristen Romonovich is Associate Editor at the Computer Security Institute. She is dedicated to secure green computing, compliance in the cloud and the security of mobile devices. Learn more at our upcoming conference CSI SX: Security Exchange, csisx.com, May 17-21 in Las Vegas.
Read More
Designed By Seo Blogger Templates