Show of 5-24-2003

  • Tech Talk Guest: Doreen Moriera
    • Doreen is a culinary student and former Medical Doctor
    • She assisted with the Presidential Dinner last Wedneday
  • Hardware Versus Software Firewall (An Update)
    • Response to email from Jean Jalkovski
    • In security, it is all about risk and trade-offs.
    • Hardware firewalls have fewer software errors and require minimal configuration. When individuals are connecting multiple computers to the Internet and don’t have strong technical capability, the Hardware firewall is the best solutions. This is particularly true for DLS, Cable Modem, and T-1 connections that are probed 24/7 for vulnerabilities.
    • If a single computer is connected to the Internet with dial up, a software firewall is adequate. Zone Alarm is the best. It may however conflict with some of the XP firewall functions.
    • If a single computer is connected to the Internet with a high speed connection, I now recommend a hardware firewall. Windows machines, particularly those on Cable/DSL have been targeted by the hacker community. To remain safe, a user with a software firewall must download all security patches (for both the firewall and the operating system). If these precautions are made, the software firewall is OK. However, I have learned that most users don’t really pay attention to security…so I am moving more toward a hardware firewall recommendation.
    • ZoneAlarm is still the best personal firewall on the market. One that I do recommend…with the proviso that all security patches are kept up to date.
  • Check Your Port Security
    • Use Shields Up at?Grc.com to check your port configuration.
    • This is Steve Gibson?s site.
    • Steve is an assembly programmer who developed Spin Right, a low level formatting program.
  • Steve Balmer Sells $1 Billion in Stock
    • Steve Balmer is Microsoft?s CEO
    • He went to college with Bill Gates. Gates dropped out to start a software company
    • Balmer graduated and worked for Proctor and Gamble
    • He joined Microsoft in 1980, then a five year old company
    • Balmer stills owns 432 million shares, 4% of MS and worth $10 Billion
  • Government Targets Internet Scams
    • Dubbed Operation E-Con by Department of Justice.
    • John Ashcroft announced a coordinated, nationwide assault on Internet fraud
    • Targeting fraudulent offers of dates with Russian women to fake bank Web sites. These business are sometimes called dot cons.
    • Effort includes: FBI, Justice Department, FTC, Postal and Immigration Authorities, and State and Local Law Enforcement
  • Profile of an Internet Security Extortion
    • The players
      • Vasiliy Gorshkov, 24 (a would be dot com entrepreneour)
      • Alexey Ivanov, 19 (a talented programmer)
      • They called themselved ?Expert Group for Protection Against Hackers?
    • After the dot com crash and money was scarce, the team applied the mafia ?protection scheme to the Internet
    • They looked for vulnerabilities at e-commerce sites, ISPs, banks and found many
      • Central National Bank in Waca
      • Nara Bank in LA
      • E-Money, Inc
    • They penetrated E-Money?s servers and copies customer credit card information
    • Demanded $500K to ?protect? the information
    • So bagan a long negotiation between Jan Morganstern and ?The Expert Group?
    • Morganstern got the FBI involved
    • The Team ?eventually visited the US for a fake job with Invita Technologies and were captured by the FBI
    • The trend organized crime is Invading the Internet
  • 802.11g Standard To Be Released
    • The IEEE 802.11 Working Group will approved new starndard June 12th
    • Pushed operating speed to 54 Mbps up from 11 Mbps (for 802.11b)
    • Operates at the 2.4 GHz band and is compatible with 802.11b
    • Will further undermine 802.11a acceptance
  • Steganography Can Embed Messages in JPG and MP3 files
    • Steganography Software F5 can be downloaded for free
    • Difficult to detect embedded messages
  • Fed Go After Open Relays in fight against SPAM
    • SMTP Servers that will relay messages without authentication
    • Used by SPAMMERS to get around ISP restrictions
    • Many poorly installed foreign sites are open relays
    • FTC sent letter to 1000 known open relays to request assistance
    • Next step will be to shut them down
    • Open Relay Database tracks all offenders
  • E-mail Filters for Windows
    • SpamPal for Windows
    • SpamAssassin for Windows
    • Mail client filters
    • Outlook/Outlook Express Message Rules
    • Macintosh Jaguar OS has adaptive email filter
  • MailBag
    • How can I set up a community wireless system? (Jim Beller)
    • How can I look up shows on your site? (James Terreli)
    • My computer slowed down and you talked about it (G Mainer)
    • How can I buy the wireless fish finder? (Doug Schaem)
    • What was the port scan URL? (Cindy Kline)
    • Hardware or software firewall. What is your recommendation? (Jean Jalkovski)
  • Stratford Bachelors Degree Programs
    • Industry competencies embedded in program
    • Integrated career transition and placement program
    • Information Systems
    • Business Administration
    • E-Business
    • Hospitality Management
    • Culinary Arts
    • Telecommunications Systems
    • Enterprise Business Management