Sunday, 5 April 2009

Protect ur orkut profile from hacking

I am writing this article because recently i saw some of my friends Orkut profile getting hacked.... No need to worry if u r little careful..

Knowledge about on how Hackers Hack orkut profiles will help you to protect yours Orkut Profile from Being Hacked by Hackers,Below are 5 methods through which you can protect yours orkut profile or any other social networking profile from being Hacked by Hackers

1.Phishing Attack is the most popular way of stealing other’s password. Popular by the name of fake . The users land on a page where they are asked for their login information and they enter their username and password thinking it to be a real page but actually it is other way round. It submits all the details entered to the programmer or the coder.

Friends this is the most commonly used method to hack ur profile ..... So please be careful. These r some methods which can be used to identify Fake login page....

* Plz check whether there is lock image in ur browser and https:// when accessing login page.
Lock will be on the bottom of the Firefox browser or on top for IE. This shows ur login page is SSL secured... ie ur web address will be https://

( This is the Best and Secure way to identify Fake login page )

* Don't click on the link in ur email attachments... Copy that URL address and paste it to the address bar of the Browser. This will make sure that u land in real page , not fake page.

2.Community Links: Many times you are provided with a link to a community in a scrap. Read the link carefully, It may be something like http://www.okrut.com/Community.aspx?cmm=22956767673 OKRUT not ORKUT ( look spelling ). Clicking on such link will take you to a fake login page and there you loose up your password.

3.Orkut New Features: I have come across a page that looks like they are giving the user a choice of selecting new features for orkut with your ID and password, of course!! When user submit the page, there goes his ID and password mailed to the coder.

4.Java script: You must have seen the circulating scraps that asks you to paste this code in your address bar and see what happens! Well sometimes they also leak out your information. Check the code and if you are unsure of what to do, then I recommend not to use it.

So Friend please don't use any Java scripts in orkut.....

5.Primary mail address: If by some means a hacker came to know password of your Yahoo mail or Gmail, which users normally keeps as their primary mail address in their Orkut account, then hacker can hack Orkut account by simply using USER ID and clicking on ‘forget password’.This way Google will send link to the already hacked primary email id to change the password of the Orkut account. Hence the email hacker will change your Orkut account’s password. Hence your Orkut account hacked too.



So a better thing would be to keep a very unknown or useless email id of yours as primary email id so that if the hacker clicks on ‘Forgot password’ the password changing link goes to an unknown email id i.e. not known to the hacker.
*****************************

If possible try to avoid Internet Cafe for accessing orkut ( Never do Banking transactions through Internet cafe ).... Because there may be Virus and Keyloggers in that system.. Keyloggers r sofware that will record the key strokes that u make in keyboard.... These softwares will be running hidden and can't be uninstall ed by u easily......

One more: If possible try to use more secure OS like Linux ( Fedora, Ubuntu etc ). And use these OS wisely ( There is no point in blaming OS if u do Stupid mistakes ) ..... Also update ur OS Regularly .

Tuesday, 10 February 2009

Tips to keep your Joomla website secure from hackers

* Use the latest Joomla security update

* Use only secure third party plugins and keep them updated

* Use secure username and password for administrators

* Use an SEF component that makes your Joomla more secure

* Use a secure web host / secure server configuration

* Don’t tell everyone about your configuration

* Write-protect your Joomla configuration file (make unwritable)

* Delete Joomla templates and extensions that you do not use

I have explained most of the above tips in my previous article - Top Ten Joomla Security problems and how to avoid them.
I will go through tips that I have not explained before.

Use an SEF component that makes your Joomla more secure

A SEF component is used to make the url:s of your Joomla website more Search Engine Friendly. But a good SEF component also gives security benefits. A default Joomla url tells the viewer a lot about the page visited; that it is a Joomla page and what components are used to produce that page. A SEF component masks that information and makes it harder for a hacker to find eventual security vulnerabilities.

The SEF component sh404SEF also includes a security component that stops various attacks on your website and sends you a warning whenever your site has been exposed to an attack. It also gives you the option to remove the generator tag from your site. The generator tag tells the world that your site is generated by Joomla. Of course it is a nice thing to give credit to Joomla, but there are other ways to pay back to the Joomla community that does not help hackers. If you do not tell the hacker that your website is built with Joomla, you make it a lot harder for him to know where to start hackning.

Don’t tell everyone about your configurations

* Make sure that no outsider can view php information (server configuration) by phpinfo.
* Hide the generator tag that shows that you use Joomla CMS. Note that we are not suggesting that Joomla would be insecure. This suggestion is just to make it harder for Joomla-specialized hackers to recognize that your website is Joomla-powered.
* Use an SEF component that masks what components are used on your website.


Write-protect your Joomla configuration file (make unwriteable)

You should definitely write-protect your Joomla configuration file. The file is called "configuration.php" and is located in the root folder of your domain. Joomla 1.5 write protects the configuration.php by default, but in Joomla 1.0 you must actively choose to write protect the file. You do that by checking the option "Make unwriteable after saving" in the Joomla Global Configuration. You can also manually CMOD the file to 444.

Use the correct CHMOD for each folder and file

Setting files or folders to a CHMOD of 777 or 707 is only necessary when a script needs to write to that file or directory. All other files should have the following configuration:

* PHP files: 644
* Config files: 666
* Other folders: 755

Check your site for vulnerabilites

There are a number of tools which test your Joomla for corrupt files, and vulnerable files. Amongst these, the following tool is invaluable. Using Joomla Diagnostics ,GuardXT etc you can easily scan for vulnerable files . It will also tell you which files are missing that should be there. Also, it advises you of any security issues which you have in your site. You simply need to upload the two files in the package to your server, access the page http://www.yourdomain.com/diagnostics.php and you will get a list of warnings and security issues you have with your site. Please remember to delete this file after you have used it! Otherwise you will be advising your issues to hackers!

Sunday, 8 February 2009

Top Ten Joomla Security Problems and how to avoid them


Joomla Security is a hot issue. Unfortunately there are some security problems which are done over and over again and which can easily be avoided. The Joomla system is created to provide a great deal of turnkey security, so even a default installation will be fairly secure. However, there are a number of fine adjustments that you can make to tighten up a few Joomla weak points. New security problems arise all the time as hackers devise new methods of breaching security.
Here are the problems and what you should do to avoid them.

10. Cheap Hosting Providers - Never go for the cheapest hosting provider you can find. Typically cheap hosting providers use shared servers that hosts hundreds of other sites, some of which are high-traffic porn sites. Check the list of recommended and Joomla approved hosting providers.

9. No Backups - Make sure you have regular Joomla backups . In case your site gets hacked or something happens, you will be able to rebuild from scratch . Use JoomlaPack component which is an open-source component for the Joomla! CMS that allows for full site backups (files and database).

8. Skipping hardening of PHP and Joomla! settings - Forgetting or skipping the adjusting PHP and Joomla! settings for increased security is a huge no . There are many small settings and tweaks you can do to make your PHP server and Joomla! more secure.

7. Weak Passwords or Same passwords - Using the same username and password for your on-line bank account, Joomla! administrator account, Amazon account, Yahoo account, is another mistake you should avoid like the plague. Always use strong passwords which are different from those for your other accounts. Remember also to change the name of the admin account.

6. Install and forget - After install your brand new beautiful Joomla!-powered site, check it regularly making sure nothing has gone wrong. Lots of things can go wrong if you don't maintain all the components of your Joomla installations.

5. Having no development server - All upgrades and extension installations should be first tried on a development server, before being done on the live site. If something goes wrong on the development server, you can avoid creating the same problem on the server, and you'll make sure your live site stays clean.

4. Trusing all 3rd party extensions - You should only install the barest minimum extensions you require. Not all 3rd party extensions are free from trouble, and some are just plain horrible, buggy and contain vulnerabilites. Each 3rd party extension, is another component which might expose you to vulnerabilities and must be kept up to date. Be wary of the 3rd party extensions you install, preferably go for the professional components from reputable companies.

The Joomla core has been proved to be quite stable, and Joomla sites that contain no 3rd party extensions rarely are vulnerable to hacking. Things are very different when it comes to 3rd party components though. There is a huge number of components on the official Joomla extensions directory, a good number of which are in alpha or beta stages (under development), and have not been fully tested. This means that these components may contain code problems which make them hackable. There are also quite a few components developed by people whose programming skills are "poor", and who do not follow code security recommendations. This results in some components being vulnerable.

So what happens when these components are installed. They sit quietly there ticking away like a bomb, performing their function but still ticking away. Then somebody discovers a vulnerability in a component you are using. There are simple ways and means of using Google to find files which are vulnerable on any site which contains these files (the practive is called Google Hacking). So using a simple query, a lot of people will be able to find your vulnerable site. It is therefore just a matter of time before your site is hacked via this problematic component.

Even though some components are not visible by most of your users, if you did not uninstall the component, then the code still exists on your website. Therefore any problems in these components still exist on your site, and can be exploited even if the actual component is not published / visible. Also maybe a new version which addresses a security issue is available but you forgot to apply it to your site, because you forgot that the component still exists on your site!

To take full advantage of new security features, ensure that all third party extensions are Joomla! 1.5 native. Download extensions from trusted sites, and compare the file's MD5 hash to detect download errors. This suggestions applies to both versions.

what to do?

  • Use as few components as possible. This ensures that there are fewer possibilites of components being vulnerable.
  • Uninstall completely any 3rd party components or other extensions which you are not using and which are not required for your site.Simply removing the menu links to an extension, or unpublishing a module is NOT enough to protect your site! As long as the extension's files exist on your server, you are vulnerable.
  • Keep yourself subscribed to the Joomla Security Forum , and keep yourself updated with any new component vulnerabilities . Subscribe to Joomla! Security Announcements - Click Here
  • Always upgrade your components to the latest versions. New versions of components typically contain bug and security fixes.
  • Use the Joomla Tools Suite to perform an Extensions Audit to determine which components you have installed, and check if there is a new version of the components installed. Remove any components which your site can live without.
  • Be minimalistic - keep the number of components installed down to the barest minimum. Each additional components installed, is an additional risk.
  • Always review the code of the extensions to find whether there is malicious code in it.
How to Choose Joomla Extensions?

These are general recommendations, and may not apply in all cases.

  • For production sites you should be sticking to Stable releases as much as possible. If you cannot wait until a Stable release has been made available, Release Candidates are the only other option you should consider.Try to avoid components which are in alpha or beta stages unless absolutely necessary. If they are still under development, make sure you subscribe to the author's newsletter when this exists, to ensure that any vulnerabilities are removed if they surface.

  • Use popular components, marked as Hot or Editor's pick. These are usually stable components.
  • Use commercial components when possible. When you have paid for a component, you expect a certain level of coding and service which is not always availabe in free components. Also, if a vulnerability is found, a fix will be issued and users notified in a much faster manner in commercial components.
  • Use common sense. If you install a component which contains a lot of bugs, do not use it because this is a sign that the developer is careless. If their site looks careless and unmaintained, avoid the component.
  • If the extension has been over a year ( ie without any updates ), consider the project abandoned and find something else. Do not install old components.
  • Go through User's comment about the extension, so that u can understand whether the extension is good or not.
  • If there is a support community for an extension there is a better chance of security issues being known and dealt with. A support community means that people would like to continue using the extension and that they care about the extension. This furthers the chance that security issues will be found, disclosed, and dealt with promptly.
3. Forgetting to keep your Joomla! site updated - after install your brand new beautiful Joomla!-powered site, keep yourself up to date with any stable releases, and update with each stable release. Most stable releases fix problems and vulnerabilites. Forgetting to upgrade will leave your site exposed to problems. This also applies for any 3rd party extensions you install.

2. Lack of infomation when asking for help - If your site gets hacked / cracked, go to the Joomla forums, and before you start posting away like crazy, make sure you have all relevant information available, such as the version of Joomla you have installed, what version of 3rd party extensions you have installed. This information will help to identify what could have caused your hack, and how to fix and avoid it happening again.

1. Fix and cracked file and forget it - Once your site's been cracked, fixing the defaced file is not enough. Check your site's logs, change your old passwords, remove the entire directory and rebuild it from clean backups, and take all precautionary actions!

If u are little careful, you can build a beautiful & Stable website with Joomla

Wednesday, 11 June 2008

Protecting Your Workplace: 10 Anti-Virus Rules

Regardless of how one makes his or her living, computers and the Internet are becoming an increasingly important part of our daily professional lives. When it comes to protection against viruses, worms and Trojans, there is little real difference between the needs of an accountant, a an entreprenuer, a tradesman or any other professional working with a computer. No matter what the work, the fact remains viruses and other malicious code can be enormously destructive to the vital information and the computing systems that individuals and businesses rely on for their success.
Despite all the advances in anti-virus technology, malicious code remains a constant threat. However, if users learn these fundamental rules, and follow them diligently, they can rest assured that they will as well-protected as possible.

Rule 1: Update your anti-virus program regularly
Anti-virus scanners are only able to detect and delete a computer virus that is found in its anti-virus database. (There are anti-virus programs that are capable of identifying and deleting recently developed viruses that are not described in the current edition of the anti-virus database. However, even this is not enough to ensure absolute protection from computer viruses.) That is why it is very important to update your anti-virus database regularly. The more often you update the database, the more viruses your anti-virus software will be equipped to detect, and the more securely protected your workplace will be. The best solution is to update your anti-virus software on a regular basis, either weekly or daily.

Rule 2: Do not open unexpected attachments
Increasingly, viruses are sent as attachments to e-mails. This is a particularly insidious method of transmission because often people will open attachments that have been sent by acquaintances, co-workers, or friends, only to find that the attachment is in fact a virus. As a result, the best rule for protection is to never open an unexpected attachment. Sadly, this rule even applies to attachments sent by otherwise trusted sources, such as friends and family. Attachments sent by your trusted parties may be infected without their knowledge. More importantly, your acquaintance's computer may have been used by another person without their permission.
Users should never open attachments with executable files, which carry the .EXE file extension. No less important is the fact that files with "absolutely safe" formats may also contain viruses. If you think that files with the extensions .PIF, .GIF, .TXT cannot carry malware, you are mistaken. Even these formats can hide a virus. Better yet, do not execute any attachment until it has been processed by your anti-virus scanner.

Rule 3: Limit the number of people that are authorised to use your computer
Ideally, you should be the only person to use your computer. However, if this is not possible, you should assign limited access rights to others using your computer, clearly defining which operations may be performed by them. This is especially true if people are likely to be using mobile media, such as floppy disks and CDs, in your machine.
The only way that you can truly control the security of your computer is to know who has been using them, what they have been using them for, and how they have been using them. If you follow each of these ten anti-virus rules, you can be reasonably sure that your risk of infection is acceptably low; however, another user on your computer may not follow the necessary rules of security, in which case, he or she will be placing your computer and your vital information at risk of infection.

Rule 4: Install patches for the software you use in a timely manner
There are viruses that exploit 'holes' or vulnerabilities in operating systems and applications. Anti-virus programs are generally able to protect you from this kind of 'malware' even if you have not installed the appropriate patch for that vulnerability. However, it is still recommended that you visit your software manufacturer's Web site regularly to download and install new patches in a timely fashion. Remember, the less weaknesses that exist in your defences, the more secure your system will be.

Rule 5: Always scan floppy disks and CDs for viruses before using them
Despite the fact that approximately 85% of all registered cases of computer infection are transmitted through e-mail, we should not ignore the traditional transport for malware: the mobile media (diskettes, compact disks, etc.) Floppy disks and CDs offer an opportunity for viruses to be carried from an infected machine around the defences of another machine, exposing it to subsequent infection. Users should always check these external media for viruses before using it on their computers. It is a simple, straightforward procedure to scan a disk with an anti-virus program. It takes just a few seconds, and can save hours of aggravation.

Rule 6: Be careful with software, even from a credible source
It is not just pirated software that may be infectious. Sometimes even licensed CDs with software from well-established, credible vendors may contain viruses. As well, software downloaded from Internet may carry a virus. You may be certain that the site you are visiting is virus-proof, since a very famous software or hardware company owns it. But it may not be. Sometimes, mistakenly, these sites offer infected software to their visitors. Users may recall the case when Microsoft's site, for several weeks, contained a Word document that was infected with the macro-virus called Concept.
Another source of infection may be a computer that has been taken in for maintenance that may be returned to its owner with a hard drive that is infected with a virus. As a rule, repair shop technicians use the same diskettes to install software and test the hardware of all computers being serviced. In this way, viruses may be transferred from one computer to another. So, if you have just had your computer in for servicing, remember to check it for viruses.

Rule 7: Combine various anti-virus technologies
Do not limit your anti-virus protection to an anti-virus scanner, which can be started manually or automatically by the built-in task scheduler. There are a number of other technologies that, if applied in combination with an anti-virus scanner, can ensure the anti-virus protection of your data. These technologies include:
  1. Anti-virus monitor: a memory-resident program that checks all your files before they are opened, executed or installed in real time;
  2. Integrity checker: checks files, folders and disk sectors for any modification that may indicate a virus infection and informs the user of any such occurrence;
  3. Behavioural guard: searches for viruses, not according to their unique code, but according to the sequence of their actions.

A combination of anti-virus technologies as described above can successfully protect your computer against any kind of malware.

Rule 8: Create a virus-free start-up disk for your computer and keep it in a safe place

Sometimes an infected computer cannot be started. This does not mean that a virus has deleted data from your hard drive; it only means that your operating system cannot be loaded any more. To solve this problem, you should use a virus-free start-up diskette containing an anti-virus program that has been developed for your operating system. This diskette will help you to start your computer and delete any viruses in your operating system.

Rule 9: Back up your files regularly

Although this rule will not protect against virus infection, it will allow you to protect your valuable data in case your computer becomes infected (or, as an added bonus, if you have any other problems with your hardware). Whether or not it was a virus that caused your system to malfunction, the only thing that matters is that unless you back up important data, you may lose years of hard work. That is why it is advisable to back up your most valuable data using external media, such as diskettes, MO disks, magnetic tapes, CDs, etc. In this case, whatever might happen, you will always be prepared. (For added protection, the back-up copies should always be stored in a separate location away from the working copy. That way, in case of fire, or other destructive occurrence, the back-up copy will still be safe.)

Rule 10: Do not panic!

Viruses are computer programs, just like the Windows Calculator or NotePad. The only difference is that viruses can replicate themselves, penetrate files computer systems and network resources, causing them to perform tasks as dictated by the virus without a user's permission. Viruses are created by ordinary people and do not have any supernatural attributes. Much more dangerous is your reaction to a virus; i.e., you may panic and make hasty decisions trying to disinfect your computer.

If you believe your computer contains or is infected by a virus, you should do one of the following: if you are a corporate network user, you should immediately contact your network administrator; if you are working at home, make sure to contact the company that sold you the anti-virus program. You must allow professionals to remedy the problem. After all, that is their job, and it is a service for which you have paid.

Furthermore, as part of a comprehensive information security policy, you should have a pre-established procedure that you can fall back on in case of a suspected infection. This will give you a framework to follow that will minimize the potential for panic and, consequently, minimize the damage that a virus can inflict on your information.

Some may find this to be an exaggeration of the danger; however, in practice, caution is mandatory for the safety of your computer and the vital information that is stored on it. Fortunately, steps can be taken to minimize the risks that are inherent in using computers. While, it would be negligent to suggest that anyone who uses a computer is ever 100% safe from malicious code, by following these ten anti-virus rules, users can protect themselves, as much as possible, against all types of viruses.

A Brief History of The Worm

The first active Internet worm that required no human intervention to spread was the Morris worm released in 1988. It spread very rapidly, infecting all vulnerable machines in a matter of hours. Most recent active worms use the techniques pioneered by Robert Morris. The Morris Worm infected multiple types of machines (Sun 3s and VAXes), attacked multiple security holes (including a buffer overflow in fingerd, debugging routines in Sendmail, and password cracking), and used multiple streams of execution to improve its throughput when attacking other machines.

Although intended to be a benign proof of concept, the Morris worm had a significant impact due to a bug in the code. When it reinfected a machine, there was a fixed chance that the new infection wouldn't quit, causing the number of running worms on a machine to build up, thereby causing a heavy load on many systems. Even on a modern machine, such bugs would have a similar effect of overwhelming the system. This caused the worm to be quickly noticed and caused significant disruption. Most subsequent worms have mechanisms to prevent this from happening.


In 1996, the first Word macro virus appeared and became quickly widespread. This was due to two reasons: the far greater tendency for people to exchange documents, as opposed to executables, and the accidental inclusion of the virus on at least two Microsoft CDs. For the most part these were just annoyances, but they showed how the blurring of data and programs could create fertile ground for mobile code.


All this changed in 1999 when the Melissa worm appeared. Unlike previous macro viruses, this one would spread in a semi-active manner. When an infected file was opened for the first time, it looked through all Outlook address books and sent a copy of itself to the first 50 individuals. This was the first major e-mail worm and it quickly spread around the globe. The Melissa worm clearly illustrated the dangers of mixing code and data: items perceived by the user as benign data could contain malware.

After Melissa, mail worms have become annoyingly common, complete with toolkits. There have been some improvements in social engineering (ILOVEYOU and AnnaKornikova showed how proper subject choice can make a difference in the successful proliferation of a worm,) more comprehensive searches for new addresses, included SMTP routines.


Active worms have recently returned to prominence. The first one that attracted major attention, Code Red, demonstrated how swiftly a relatively simple worm can spread on the current Internet infrastructure: it effectively achieved complete infection in a little over twelve hours, even with the aborted early release of a buggy version. Code Red exploited a recently discovered (but patchable) buffer overflow attack in Microsoft's Internet Information Server.


Code Red 2 ended up being significantly more disruptive then Code Red even if the change in infection strategy was relatively mild. Instead of searching only randomly selected addresses, Code Red 2 preferentially probed for machines on the same subnet and nearby subnets. As a result, once a single machine within a corporate firewall was infected, it would quickly probe virtually every machine within the firewall and since it was attacking an on-by-default service, Code Red 2 quickly infested entire corporate networks.

Nimda
The latest worm of note, Nimda, did not really bring anything new to the table. It simply resurrected the idea of multimode operation: it was an e-mail worm, it attacked old bugs in Explorer and Outlook, spread through Windows shares, and an old buffer overflow in IIS. It also borrowed Code Red 2's preference for logically adjacent IP addresses in its scanning routines. The net result was a highly virulent, highly effective worm that revealed that several old bugs can be used even if each hole is patched by most machines: one needs all patches and vulnerabilities closed to stop a Nimda-like worm. Such a worm is also somewhat easier to write, as one can use many well-known exploits to get wide distribution instead of discovering new attacks.

The biggest lesson from both Code Red and Nimda is the sheer speed with which these fairly simple active worms can spread. By the time humans detect the presence of worms on the Net, through firewall activity or probes of monitoring IP ranges, they may well have spread worldwide.

Minimizing the Spread


The best way to defend against worms is obviously to prevent infection - once a single machine within a local subnet is infected it may be too late. One obvious defense is diversity, using less common operating systems and servers. Assuming there is no way to directly find vulnerable machines, the rate at which a worm spreads is directly proportional to the number of vulnerable hosts. This is because with fewer potential targets any given random probe is less likely to find a vulnerable machine, limiting the rate of spread. Thus, if one only has a few machines open to the wide internet, using a less common (i.e., non-Windows) OS offers an advantage, as there are less likely to be worms written for less common platforms, and those which are created will spread more slowly.

For example, Linux has had it's own fair share of worms, such as Ramen, Lion, and Cheese. But since the Ramen worm only attacked Red Hat 6.2 and 7.0 systems, it couldn't spread very fast when compared to Code Red, simply because the odds of any particular scan finding a vulnerable target are so much lower when compared to Windows worms. As an additional side benefit, most attempts to construct a worm for the purpose of wholesale information terrorism will target the most common platform, currently Windows, to increase the spread and damage done.


Firewalls are also essential to prevent both active worms as well as human intrusion. But external firewalls are not sufficient for larger institutions. With multimode worms like Nimda and local scanning worms such as Code Red, it becomes critical to split large internal networks with internal firewalls. Such a design is akin to how ships are designed with watertight compartments, the result being that a single intrusion should not allow a worm free reign in the corporate network.

Similarly, all executable content which crosses the firewall should be regarded as suspicious, especially e-mail. All macros and programs sent in e-mail should be quarantined to prevent future mail worms from spreading. There should be severe limits on what is allowed to cross firewalls, with a general attitude of "that which is not explicitly allowed is forbidden." If available, operating system options which only allow cryptographically signed code should be exercised, executable stacks should be disabled, and bounds-checking modifications should be used at all times.
Finally, there needs to be continued development of firewalls and anti-virus systems that detect and autonomously respond to new attacks. Since new viruses can spread much faster than humans can respond, the defenses need to be automated. Pure pattern matching methods, suitable against file and macro viruses or human-run exploit scripts, are not sufficient to defend against worms because worms can spread faster than updates are created. For the same reason anti-worms are not generally effective since by the time an anti-worm is ready for release it will be far too late.
Conclusions
Once a system is infected, there is not much that can be done to mitigate the damage. Regular backups are critical, as a malicious worm could easily overwrite or corrupt the existing data. Any reflashable BIOSes should be write-protected while software control of voltages, overtemperature set points, and clock rates should be disabled to prevent a malicious program from stressing a CPU through overtemperature and overvoltage conditions. Machines containing particularly sensitive information need to be completely isolated from the Net to prevent a SirCam-style worm or determined hacker from extracting information.

Social networking spam on the rise

Four out five social network users have received unwanted 'friend' invitations, messages or postings over the past year, new research suggests.

Messaging security firm Cloudmark said that this rise in 'spam' threatens growth and membership retention at the popular networking sites.The attacks work in much the same way as traditional email spam in that they target users with unsolicited product messages or attempt to redirect them to a phishing site or one hosting malware.Users have reported receiving an average of 64 unwanted communications in the past 12 months, and 37 per cent have noticed an increase in the number of unwanted messages in the past six months."The results of this survey should be of concern to social network operators and users," said Neil Cook, vice president of technology services at Cloudmark in EMEA.

"Social networking sites need to be concerned about the proliferation of spam and phishing attacks and the impact it could have on their ability to grow and retain members.
"Social networking providers must address the security issue head-on or risk declining usage and revenues."
Although not nearly as big a problem as spam email, two-thirds of users said that they would consider switching to another social network if they received a lot of unwanted messages.
Figures suggest that nearly half of the online adult population has at least one social or professional networking website account.

Common Mistakes By Web Designers Forms

A call-to-action is often the most important thing on a website. You want the visitor to do something and many times that something is to email you. Back in the day, web designers could just publish an email address on the site.

However, this led to problems with spam filtering and limited the visitors that used web-based email services. Most often, when a visitor did send an email, it contained very little detail. These problems can now be resolved by implementing a contact form, instead.


Contact forms allow the website visitor to fill in as much information as you require of them. Then, the user simply hits the Submit button and the form data is sent directly to your email address. Currrently, forms are a website must-have to get a response from site visitors. Many web designers, however, overlook critical issues and make common, yet costly mistakes.
The Thank You Page
There have been countless times where I have submitted a form and was taken back to either the homepage or an ugly page that showed only the form output. Be sure to create a response page that matches your website template. A Thank You page should also tell the user that the form was submitted successfully and when to expect a reply. Keeping the user informed should be a top priority.
Form Validation
It is terribly annoying when I submit a form and am presented with an error page that tells me to hit Back and fill out fields that I left blank. Be sure to use JavaScript or AJAX to provide validation when the form is submitted on the original form page. This way the user isn’t directed to a page telling them to hit the Back button. Alternatively, you can perform server-side validation that will take the user back to the form page and explain what areas need to be corrected so that the information can be successfully submitted.
CAPTCHAs


Spam control is important when it comes to contact forms. There are numerous types of auto submission software that will post random bits of information on contact forms. Many are setup to post comments on blogs to advertise their products or to gain backlinks for search engine ranking purposes. This is where a CAPTCHA comes in handy. A CAPTCHA is a puzzle that will check to see if there is an actual human being on the other end submitting the form. These “puzzles” can range from words to simple math equations.
Hijacking Prevention
A majority of online contact forms can be hacked and used for evil purposes. Hackers can change the recipient, who the email is from and the message of the email. The spam sent using a hacked form can be traced back to you, which could result in your web host kicking you off their servers or even lead to a legal dispute. Make certain that your form processing has filters that will detect, prevent and notify you when a form hijacking has occurred.
Testing Out The Forms
Testing is one of the most overlooked things when it comes to contact forms. I have seen web sites with absolutely fantastic designs, but contact forms that do not work. It’s not unusual for a designer to check a form in only one web browser. More often than not, the form code may be poorly written and interpreted differently in other web browsers. Test, test, test.
Print Only Forms
Some inexperienced web designers have no clue how to make a contact form work or how to prevent hijacking and spam attacks. So, they create a form just for printing. Do you think that any online visitor will visit a site, fill out a form, print it out and send through regular mail?
Missing “Submit” Buttons
Have you ever filled out a long contact form only to find out that there are no “Send” or “Submit” buttons for it? This frustrates visitors and doesn’t give them a good reason to return. It’s shocking to know that one of the most important parts of a form can be one of the most overlooked. Prevent this by thorough testing.

In the web world, contact forms are a necessity. but common mistakes that web designers make when it comes to forms happen every day. So let’s review: make sure your forms have “Submit” buttons, don’t make your form print-only, thoroughly test forms in different browsers, make sure that your form processing has hijacking prevention, use CAPTCHAs to kill spam, provide on-page form validation and always supply the user with a “Thank You” or confirmation page.
By correcting these ever so common mistakes, you can ensure a better web site performance for you and a better experience for your visitors.