Professional Documents
Culture Documents
PROTECT YOUR
FILES AND FOLDERS
WITH COOL TOOLS
SAVE YOUR
DATA FROM BEING
STOLEN AND MISUSED
KEEP A SAFE
DISTANCE FROM
HARDWARE THREATS
BE ALERT
AND STAY SAFE
ON THE INTERNET
FEATURE
4 SECURE YOUR HOME
NETWORK
Keep your PC secure in a network
environment
Gareth Mankoo
gareth.mankoo@infomedia18.in
4 FEATURE APPLICATION
Sachin Pandit
Secure your home
network
Here is a quick guide to making sure that your computer is safe when
connected to a network.
BY GARETH MANKOO
T
KEY DETAILS
o begin with, we need to define the kind Attackers use tricks such as attractive ads, offers for
of environment that we are working in. free stuff, etc. to tempt you to click on a particular link
SKILL LEVEL
Networks that have a single administrator or object on the page. This click could be fatal. Thus
are way safer than those that don't have any. This we can broadly classify these attacks based on the
Moderate
NOW YOU CAN
is because well administered systems have rules targets that they have. So we call them:
Protect your home network that allow and deny access of certain components ATTACKS ON OUR INTEGRITY: Our data is being
Keep away common threats or computers over a network. In regular peer-to- modified or destroyed by unauthorized means.
PROJECT TIME peer networks security lapses are quite common. ATTACKS ON OUR CONFIDENTIALITY: Our data
45 Minutes is being viewed by those who do not have the
WHAT YOU WILL NEED WHO ATTACKS US AND WHY? permission to do so.
Internet connection
To avoid threats, we first need to know who we are ATTACKS ON OUR AVAILABILITY: Not every rightful
Internet Browser
up against. These attackers are called 'hackers' or user can access the data because it is being denied to
'crackers', depending on whether they are meant them by an attack/attacker.
to dig into your personal information, modify
it or even destroy it fully. Besides targeting just WHAT KIND OF ATTACKS ARE WE
your computer, these attackers can also launch VULNERABLE TO?
attacks on other computers by using your system To get into our systems and access our data, attackers
as an access point. By doing this, they can remain resort to various means. Some of these trick us into
discrete in their actions and end up jeopardizing falling for them by using attractions like free gift
your integrity on the network. vouchers or free downloads. Others simply creep
will claim to be something else, like a friend's wedding format while they actually are of a different file format
photograph or a calculator application. Downloading altogether. So the files that you will see may appear
and installing it can be disastrous for your system. to be, for instance, 'love-letter-for-you.txt' when it
Spoofing is also a popular technique among is actually 'love-letter-for-you.txt.vbs'. Many viruses
attackers to penetrate a system. Spoofing means appear in some rather harmless, non-executable
sending an email to a victim by disguising yourself formats. To tempt you into downloading them, they
as someone else. This leads to the problem of may appear as MPEG, AVI or even MP3 files. In actual
compromising private information - by means of a form, these will be VBS script files.
reply - to the sender, who is actually the attacker in SNIFFING: 'Packet sniffing' or 'sniffing' occurs when
disguise. Spoofed emails are really hard to tell from attackers capture data that is being sent over a
original ones since they can pose as anyone you would network, by intercepting it. This can give away
trust sending personal information to. crucial information like sensitive mails and login
For instance, an attacker may ask you to mail him details. Sniffing is often used against banking and
your current passwords and login details or even tell e-commerce sites so as to get sensitive monetary
you to change the same, while posing as your network information. Encryption and decryption of data
administrator. Home networks are soft targets for such packets is the best way to get data across a network
ingenious attacks. without attracting the attention of attackers.
FILE EXTENSIONS: It is a common practice to stay BACKDOOR ATTACKS: These attacks are often carried
away from files like EXE and COM since they are most out by well-equipped attackers. Every system has
common viruses. However, there are means of fooling a backdoor that can easily be penetrated without
you that can make files appear to be of a certain much problem. Certain tools such as BackOrifice and
HOW DO WE PROTECT
OURSELVES?
The following are some basic precautionary steps to
keep away from network based attacks.
UPDATE ANTI-VIRUS APPLICATIONS: Make sure that
you update your anti-virus suite often so as to remain
up-to-date with the latest threats on the network and
the Internet.
ENSURE STRONG ADMINISTRATIVE RIGHTS: If
you have a network administrator, make sure that
his system is capable of handling the privileges well.
Ensure that your system is safely shielded from all the
harmful files on the network.
USE FIREWALLS TO BLOCK PORTS: Firewalls are
great tools to block certain ports from being accessed.
DO NOT USE UNKNOWN FILES AND APPLICATIONS:
Avoid using files and applications that have come to
you from unknown sources. If they arrive by email, do
not download or open them.
MAKE FILE EXTENSIONS VISIBLE: By default,
Windows disables the file viewing of file extensions.
However, to avoid attacks, it is necessary to see what
format a file actually belongs to. If you use Windows
XP then open 'My Computer'. In that click 'Tools |
Folder Options'. Click the 'View' tab. Uncheck the 'Hide
extensions for known file types' checkbox. However,
this may not make all the extensions visible.
DISABLE JAVA AND ACTIVEX SCRIPTS: As seen
earlier, scripts like ActiveX can cause executable
viruses to enter your system once they are installed.
Hence disable them if possible.
BACKUP YOUR DATA: It is always critical to maintain
backup copies of your data so that they can be
recovered in case of loss.
TURN YOUR PC OFF WHEN NOT IN USE: There is no
way that a switched of PC can give away any data or
be attacked. Hence, keep it off if you are not using it. If
you feel that there is something absolutely dangerous
on your network then unplug the network cable after
consulting your administrator.
KEEP A BOOT DISK FOR EMERGENCIES: The worst
case scenario can be your computer's system files Firewalls are often bundled with anti-virus suites but can be found as standalone applications as well.
They help you keep your PC safe from notorious access points on the network. You need to understand
being corrupted. Hence it is important to make a boot the concept of using logical ports on your computer before you configure Firewalls.
disk to recover it at such times.
Sachin Pandit
M
KEY DETAILS
an being a social animal, the interaction As the population of netizens grows at a rapid
of like-minded individuals led to the pace, the need to be all the more vigilant and careful
SKILL LEVEL
formation of civilization that we are now a about the nature of information shared with the world
part of. While keeping pace with the technological at large is the need of the hour. Here are a few simple
Moderate
NOW YOU CAN
advancements, the entire world has shrunk things that you can keep in mind to enjoy your online
Stay safe on social networks tremendously and geographical distances can networking experience in a safe and clean way!
Share your data safely now be nullified with the mere click of a button. ADD THE PEOPLE YOU KNOW: Social networking is
PROJECT TIME Just like the concept of communicating is as old a great way to catch up with your long lost friends,
45 Minutes as civilization itself, so is the concept of social and even make some new ones. But there are certain
WHAT YOU WILL NEED networking as old as the Internet. things you need to keep in mind rather than going
Internet connection
There were online social exchange mediums on a hunt to make new friends. As a thumb rule, don't
(BBS) like USENET (1979), and LISTSERV (1986) that add random people. There is no way of knowing their
enabled users to communicate with each other real identity since many of these users don't even
through comments and posts, there were also upload their own photographs. You might find far
webhosting services like Yahoo! GeoCities (1994) more genuine people at a bar rather than on a social
which enabled users to air their thoughts online. networking website. Random people don't feel bad
While the former laid a firm foundation for the if you refuse their requests. There are also certain
future world of blogging, the latter helped pave people who add you from your friend's friend lists.
the path for free webhosting services with flexible Make sure you ask your friend who this person is and
content. why he wants you on his list. Also if you feel that your
your profile page is displayed, click on the 'Settings' Firstly, know the people who follow you if you
link appearing next to your email ID. On the 'My are twittering about personal details. Log on to your
Account' webpage, click the 'Privacy' tab. You can twitter account and click the 'settings' tab and change
also set notification options under the 'notifications' the settings as required. You can block people from
tab to set the way you wish to be informed of any following you on the website.
external activity on your account. You can monitor However, there are not too many restrictions on
the Facebook 'chat' feature by clicking on its tab and the site and any one can view your tweets irrespective
setting the options under the 'Options' link on the of the fact that they don't follow you. And hence you
pop-up menu. need to be extra cautious before you tweet details
PLAYING IT SAFE ON MYSPACE: Before Facebook relating to your location, residence or other
revolutionized the world of social networking, intimate details. What adds to this problem is the
MySpace took the Internet by storm. Being one of the growing support for Twitter on handheld devices.
first entrants in this field, MySpace also is one of the SECURE YOUR IDENTITY ON HI5! Hi5! is one of the
first websites dedicated to musicians. Keeping in mind oldest social networking websites and is one of the
this specific target audience, the privacy options are earliest of its kind. The privacy settings are the most
scattered across the account's setting page. easily navigable through this web portal. Just log into
Log on to your MySpace account and click the 'My your Hi5! account and click the 'Privacy' link. Click on
Accounts' option. Click the 'Privacy' link to change the each of the sub-links to change the different privacy
general profile level settings. You can control your settings.
notification settings by clicking the 'notifications' tab
to set the way you wish to be informed of any external
STAY PICTURE-PERFECT WITH
activity on your account. Finally for further privacy
PICASAWEB
options, click on the 'Miscellaneous' link and change
the settings as required. PicasaWeb is an online photo sharing tool
SURF CAUTIOUSLY ON LINKEDIN: A relatively newer where you can send invites to your friends
entrant into this market, LinkedIn plans to redefine the to view, save and comment on your photos.
Word business networking. The website encourages Coming from the Google stable, this web
people to create networks with those whom they have service has many fans the world over.
had any type of professional connection. It helps users This website provides two levels of security,
secure recommendations and new jobs as per their namely account level privacy and album level
current profiles. settings. For account privacy settings, log on to
Log on to your LinkedIn account and click the your PicasaWeb account and click the 'Settings'
'Account & Settings' option. Here you can change all link. On the 'Settings' page, click the 'Privacy
the possible options in this page alone. Click on any and Permissions' tab. Set the changes as
links listed under the 'Privacy Settings' section of the required.
page and edit the settings as per your requirements. You can set album level privacy while
TWITTERING WITH CARE: Twitter has revolutionized creating the album itself. For changing settings
the world of social networking by combining the best in existing albums, go to the specific album.
of networking and texting in a brand new genre called Click the 'Edit' option and 'Album Properties'
micro-blogging. Most people get into trouble because from the drop-down list. Since it supports
of the contents of their tweets. Houses get burgled collaborative photo uploading and sharing,
into, young girls have been reportedly molested and you can also create friend groups and change
political careers threatened because of irrational and settings as required.
excessive twittering.
Sachin Pandit
Sachin Pandit
keep changing your passwords periodically. Most people who these contain their own anti-phishing filters and blacklists to keep
phish into your accounts are not your friends, and they can hack you safe while carrying out online transactions.
into your account without you telling them your password.
UPDATE ANTIVIRUS AND FIREWALL
Make sure that your password is not alternating between two
values alone; your password should not resemble the last
9 PERIODICALLY
three passwords that you had once set. After you change your MOST of the recent anti-virus, anti-spyware and firewall
password take due care to remember it. In most of the credit applications come equipped with upgraded support to tackle
card or Internet banking websites, your account will be blocked fraud related security issues. While the version in your system
if you enter the wrong passwords for more than three attempts is prepared to secure your PC from all the viruses known at the
consecutively, irrespective of the time of your last attempt. time of its creation, the updated packages available add newer
codes to secure your data and online activities from more recent
LOG INTO ACCOUNTS REGULARLY
7 LOG into all your accounts regularly even if you do not
and lesser known threats even more effectively. Most anti-virus
applications post periodic updates on their website which you
want to make any purchases or transactions. Most people take can easily download and incorporate by yourself.
their account statements too lightly. Read and verify each debited
USE STRONG PASSWORDS
and credited amount appearing on your statement. If you find
anything remotely suspicious, report and clarify it with your bank
10 THE cardinal rule of password selection is that you
immediately. If a person has access to your account, he will not should always pick a password that is easy for you to remember
phish into it right away. Staying observant will also help you cut and difficult for anyone else to decode. Also your password
down on unnecessary expenses, and help you keep a tab on your should have a healthy mix of alphabets (both upper and lower
spending habits. cases) and numeric values. That effectively means that you should
avoid using your first name, last name, family name, nickname
USE THE LATEST VERSION OF YOUR
8 WEB BROWSER
or date of birth as passwords. Also avoid using confidential data
like your ATM pins, CVV or social security numbers as passwords
ALWAYS use the latest version of your current web browser. either. Shuffle your passwords well. Don't pick the same username
These browsers come equipped with powerful and updated and password combination for all the websites you sign up to
anti-phishing filters that help you blacklist dubious websites for email accounts. If one gets hacked into, it's not so difficult to
and also avoid browsing to already blacklisted websites. Many guess others. Don't share your passwords with any one. If you are
browsers also have additional add-ons that you can download going to take so much trouble to pick an appropriate password, it
and utilize. Use the latest versions of Internet browsers. Most of is rather wise to keep it to yourself.
Hemali Limbachiya
should avoid carrying your laptop around in the regular carry codes incase the user has forgotten them. However, in case this
cases that make their contents quite obvious (especially those information falls into the wrong hands you can expect trouble.
that come with the laptop from the vendor). Sometimes these Make sure that you handle such data carefully.
cases even have the brand logo of the laptop they contain,
SECURE YOUR LAPTOP WHILE ON
flashing around in order to endorse it. Many laptop bags are
shaped like regular rucksacks, in order to thwart efforts of theft.
9 THE ROAD
Also make sure that you carry it with you while traveling in TRAVELING in a car with your laptop tucked safely beside
mass transit rather than letting it go along with the rest of your you may not seem like an opportunity for a possible attempt
baggage. However, one should make sure that you do not place of robbery, but this isn't always so. There are times when you
your laptop in an absolutely compact bag in order to conceal it. will need to leave your car. Do not keep your laptop near
The bag should be padded and spacious enough. the window. Always make sure that the windows are closed.
However, there have been instances where laptops have been
DISABLE BLUETOOTH AND
7 INFRARED PORTS
stolen by breaking the car window. Resorting to the use of a
cable lock will come in as a great alternative. It will also help in
WE may feel that it isn't necessary to turn off access to your avoiding misplacement or dropping your laptop.
Infrared and Bluetooth ports, when not in use. However, it is a
CAUTION WHILE TRAVELING BY AIR
very good practice to make sure that these ports are disabled
since we may unknowingly accept harmful files, which may not
10 UNLIKE the vulnerabilities that your laptop faces when
always be intended for us, from these ports. It is also possible to in a car, air travel needs more caution since you are under threat,
hack into PCs using Bluetooth or Infrared. The Infrared port can both inside as well as outside the plane. Outside, the airport is a
be disabled from BIOS as well. feeding ground for laptop thieves. It is quite easy for them to lay
hands on your laptop bag by creating a minor distraction or by
DO NOT LEAVE PASSWORDS
8 WRITTEN ANYWHERE
simply picking it up from your baggage check before you can do
so. It is better to carry your laptop with you while flying rather
ONCE you have gone through the stretched, cumbersome than letting it go with the rest of your baggage. Also, while in
process of setting up the security channels for your laptop to the plane, keep your laptop close to you. It is quite possible that
keep it away from possible attacks, you have a whole new task there may be a thief on-board. Passengers often doze off during
of keeping the information safe. For instance, many people long flights, thus giving thieves a good chance to steal their
keep little scraps of paper that have the password or access things. Just keeping your laptop with you is not enough, also
keys scribbled on them. These help in remembering these make sure that you are alert of co-passengers.
TIPS &
TRICKS
Sachin Pandit
WINDOWS
Select a user account on the
resulting screen.
Click the 'On, enforce current
settings' radio button.
Click the 'Windows Vista Web
Filter' link.
Make sure that the 'Block some
websites or content' radio button is
selected.
Click the 'Edit the Allows and Block
list' link.
Enter a website name in the
'Website address' text box.
Click the 'Block' button to block the On the command prompt type SET DEVMGR_SHOW_NONPRESENT_DEVICES=1, run Device Manager, select
02 the 'Show hidden devices' option from the 'View' menu and uninstall hidden drivers as required.
website from being viewed. You can
block any number of websites as
required. hidden devices' option. You will now and select an option as required.
Once done, click 'OK'. be able to view all hidden drivers. Once done, click the 'Save' button to
Right-click the name of a driver
WINDOWS VISTA that is not required and select the WINDOWS XP SP2
'Uninstall' option from the context
WINDOWS VISTA
06
REMOVE OLD DRIVERS DISABLE WRITING TO
USB DRIVES
IF you've recently upgraded your
hardware and installed new drivers,
04 IF your system is being used by
but are still experiencing some DISABLE AUTOPLAY multiple users, then there is a huge
problems, you might need to uninstall possibility of data being leaked
the old drivers to avoid further THE Autoplay option in Windows from your system. Data thieves can
problems. Vista appears whenever a CD/DVD simply plug in a USB device and copy
A major problem here is that these is inserted or an external drive is sensitive data.
drivers are not visible in the Device plugged in via the USB port. This If you're concerned about data
Manager window. In this tip we show feature might be quite helpful but at security, you can disable writing to USB
you how to tweak some system times it may even get really annoying, drives with a simple registry tweak.
settings to get rid of old drivers on especially when it affects your To disable the writing of data to USB
your system. normal work or if you insert optical drives follow these steps:
Follow these simple steps to go discs very often. If you feel that you Go to 'Start | Run', type 'regedit' in
about the same. no longer require the Autoplay the text box and press [Enter].
Go to 'Start | All Programs | function, you can disable it. Simply Browse to the 'HKEY_
Accessories'. follow the steps given below. LOCAL_MACHINE | SYSTEM |
Right-click the command prompt To disable Autoplay for all devices, CurrentControlSet | Control |
and select the 'Run as Administrator' go to 'Start | Control Panel'. StorageDevicePolicies' registry key.
option from the context menu. Under the 'Hardware and Sound' Right-click anywhere on the right
On the command prompt, section click the 'Play CDs or other pane and select the 'DWORD
type in 'SET DEVMGR_SHOW_ media automatically' link. (32-bit) Value' option.
NONPRESENT_DEVICES=1' and De-select the 'Use Autoplay for all Double-click the newly created key
hit [Enter]. media and devices' check box. and type '00000001' in the 'Value
To open device manager from To disable certain devices and to data' field.
command prompt, type in specify the media type click the Once done, you will have to
'devmgmt.msc' and hit [Enter]. drop-down list (next to the media restart your system for changes
From the View menu, select 'Show type or device you want to disable) to take effect.
MICROSOFT WORD
WORD 2003 / 2007
01
TRACKING CHANGES IN
A DOCUMENT
IF your data is critical and you want to
ensure that you give restricted access
on the document, you can either
control formatting or editing changes.
To do so using Word 2007:
Open the document on which the
restriction needs to be applied. If you click the 'Recommended Minimum' button only the recommended settings will be checked, the rest
01 will be automatically unchecked.
Go to the 'Review' tab.
Click the 'Protect Document ' option
appearing under the 'Protect' group WORD 2003 / 2007 If you plan to use Word 2007 instead,
at the end of the tab. carry out the following steps:
02
Select the 'Restrict Formatting and Open the document.
Editing' option under the 'Restrict Go to the 'Insert' tab.
Reviewing Options' section of the Click the 'Table' option appearing
drop-down menu that appears. PROTECTING TABLE under the 'Tables' group of the tab.
Check the 'Limit formatting to a VALUES Click the 'Insert Table' option from
selection of styles' option appearing the drop-down menu.
under the 'Formatting restrictions' IF you are not comfortable with Create a table by setting the number
section of the dialog box. creating forms in your document, and or rows and columns.
Click the 'Settings' link and check yet need to take user inputs you can Next, fill out the details that you
or uncheck the required option. use tables instead. All you need to do is want to keep fixed.
Click 'OK' to continue. create tables with cells containing fixed Place your cursor on a cell that you
Next, check the 'Allow only this type values and editable values. To do so want to leave as editable.
of editing in the document:' option using Word 2003: Go to the 'Developer' tab.
appearing under the Open the document to which Click the 'Legacy Tools' option under
'Editing restrictions' section of the restriction needs to be applied. the 'Controls' group.
dialog box. Go to 'Table | Insert | Table' menu Select the 'Text Form Field' option
Select the 'Tracked changes' option command. from the drop-down list.
from the drop-down list. Create a table by setting the Repeat the above steps for all the
Click the 'Yes, Start Enforcing required number of rows and editable cells.
Protection' button to enforce columns. Next, click the 'Office' button and
restriction settings. Next, fill out the details that you click the 'Word Options' button
If you are using Word 2003, carry out want to keep fixed. appearing at the foot of the drop-
the following steps: Next, go to 'View | Toolbars | Forms' down list.
Open the document on which a to activate the 'Forms' toolbar. Click the 'Customize' option from
restriction needs to be applied. Place your cursor on a cell where the 'Word Options' dialog box.
Go to the 'Tools | Protect you want the contents to be Select the 'All Commands' option
Document…' menu command. editable. from the 'Choose commands from:'
The 'Restrict Formatting and Click the 'Text Form Field' option drop-down list.
Editing' panel appears on the right from the 'Forms' toolbar. Scroll down and select the 'Lock'
side of your Word window. Repeat the above steps for all the command. Click 'Add >>' to add it to
Once you see the 'Restrict editable cells. the 'Quick Access Toolbar'.
Formatting and Editing' panel Once done click the 'Protect Form' Click 'OK' to continue.
simply follow the steps as described option from the 'Forms' toolbar. Click the 'Lock' button on the
above (while using Word 2007). Now no part of your document can 'Quick Access Toolbar' to secure
be edited except the specified cells. your table.
04
Select the 'Filling in forms' option
from the drop-down list.
03
Click the 'Select Sections' link that
appears below the drop-down list. PASSWORD PROTECTING
Select the section (or sections) DOCUMENT
PROTECT SECTIONS OF A you want to lock in the 'Section
DOCUMENT Protection' dialog box IF you are working with confidential
Click 'OK' to continue. data, it is recommended that you
YOU may have created reports where Click the 'Yes, Start Enforcing password protect such files. Word lets
you need another reviewer to enter Protection' button. you create separate passwords for
details and not tamper with certain Set a password if required. opening and editing files. Here's how:
sections of the document. For doing If you are using Word 2003 instead, Click the 'Office' Button.
this certain parts of the document carry out the following steps: Click the 'Save As' option from the
should be locked while some parts Open the document to which drop-down list.
should be left open for editing. To restriction needs to be applied. Click the 'Tools' option on the 'Save
do so using Word 2007, carry out the Select the data which needs to be As' dialog box.
following steps: editable. Click 'General Options' from the
Open the document to which Go to the 'Insert | Breaks…' menu drop-down list.
restriction needs to be applied. command. Set the required passwords as per
Select the data which needs to be Check the 'Continuous' option from your requirements. Click 'OK'.
set as editable.
Go to the 'Page Layout' tab.
Click the 'Breaks' option appearing
under the 'Page Setup' group of the
tab.
Select the 'Continuous' option from
drop-down list.
Create as many section breaks as
required.
Then, go to the 'Review' tab.
Click the 'Protect Document' option
appearing under the 'Protect' group
at the end of the tab.
Check the 'Allow only this type of
editing in the document:' option
appearing under the 'Editing You can set the macro security settings directly from this dialog box apart for setting passwords and making
04 files read-only.
restrictions' section.
MICROSOFT EXCEL
EXCEL 2003 / 2007
01
PASSWORD PROTECTING
DOCUMENT
EXCEL helps you create separate
passwords for opening and editing
files, but unlike Word, you cannot
modify the macros settings from this
option directly. Here's how:
Click the 'Office' Button in Excel.
Click the 'Save As' option. You can auto create backups for the file by making sure that you check the 'Always create backup' option on
01 the 'General Options' dialog box
Click the 'Tools' option on the 'Save
As' dialog box. you need to do is create a range of cells Check the 'Protect worksheet and
Click 'General Options' from the containing fixed values and editable contents of locked cells' option in
drop-down list. values. In Excel, the cells are locked the 'Protect Sheet' dialog box.
Set the required passwords. by default, but the users can still edit Next, check 'Select unlocked cells'
Check the 'Read-only their content unless you protect the option from the 'Allow all users of
recommended' option to make your worksheet as explained below. Carry this worksheet to:' section.
file read only by default. out the following steps for Excel 2003: Type a password if required.
Click 'OK' to save the settings. Open the workbook to which Click 'OK' to continue.
restriction needs to be applied. If you plan to use Excel 2007 instead,
EXCEL 2003 / 2007 Next, fill out the details that you carry out the following steps:
want to keep fixed in the cell range Open the workbook.
02
of your choice. Fill out the details that you want to
Select the required cell range that keep fixed in the cell range of your
can be edited. choice.
UNLOCKING SELECTED Go to the 'Format | Cells'. Select the required cell range that
CELLS Go to the 'Protection' tab of the can be edited.
'Format Cells' dialog box. Go to the 'Home' tab.
IF you are not comfortable with Uncheck the 'Locked' option for the Click the 'Format' option appearing
creating forms in your document, and selected range of cells. under the 'Cells' group of the tab.
yet need to take user inputs you can Next, go to the 'Tools | Protection | Select the 'Lock Cell' option from the
create a semi-locked range of cells. All Protect Sheet'. drop-down list to unlock the cells.
Next, click the 'Format' option under
the 'Cells' group of the tab once
again.
This time select the 'Protect Sheet...'
option from the drop-down list to
unlock the cells.
Check the 'Protect worksheet and
contents of locked cells' option in
the 'Protect Sheet' dialog box.
Next, check the 'Select unlocked
cells' option from the 'Allow all users
of this worksheet to:' section of the
dialog box.
Type a password if required.
Click 'OK' to continue. Your
Setting a password to unprotect your worksheet makes the data more safe and secure. Make sure that you worksheet is ready to be used.
02 pick a password that is long and hard to guess.
EXCEL 2003 / 2007 merely the locking columns will not carry out the following steps:
be enough. Apart from locking the Open the workbook and press
03
column contents, you will also need [Ctrl] + [A] to select all the cells in
to hide these locked columns. To do the workbook.
so using Excel 2003, carry out the Go to the 'Home' tab.
DISABLE RENAMING following steps: Click the 'Format' option appearing
WORKSHEETS Open the workbook and press under the 'Cells' group.
[Ctrl] + [A] to select all the cells in Now, elect the 'Lock Cell' option
IF you are creating reports in Excel, the workbook. from the drop-down list to unlock
which need to be edited by someone Go to the 'Format | Cells' menu the cells.
else, you might want to make sure that command. Next, select the columns that need
they do not change the worksheet Go to the 'Protection' tab of the to be protected.
names. Carry out the following steps 'Format Cells'. Click the 'Format' option appearing
to do so in Excel 2003: Uncheck the 'Locked' option. under the 'Cells' group of the tab
Open the workbook. Next, select the columns that need once again.
Go to the 'Tools | Protection | Protect to be protected. Select the 'Format Cells' option from
Workbook'. Go to the 'Format | Cells' menu the drop-down list.
Select the 'Structure' option in the command. Go to the 'Protection' tab in the
'Protect Workbook' dialog box. Go to the 'Protection' tab of the 'Custom Lists' dialog box.
Type in a password in the 'Password' 'Format Cells'. Select the 'Locked' and 'Hidden'
text box. Check the 'Locked' and 'Hidden' options.
Retype the password to secure the options for the selected columns. Click 'OK' to continue.
workbook. Keeping the columns selected, Once again, click the 'Format' option
If you plan to use Excel 2007 instead, select the 'Format | Column | Hide' appearing under the 'Cells' group of
follow these steps: menu command. the tab.
Go to the 'Review' tab. Next, go to the 'Tools | Protection | This time select the 'Protect Sheet...'
Click the 'Protect Workbook' option Protect Sheet'. option from the drop-down list to
appearing under the 'Changes' Check the 'Protect worksheet and unlock the cells.
group of the tab. contents of locked cells' option that Check the 'Protect worksheet and
Click the 'Protect Structure and you see in the 'Protect Sheet' contents of locked cells' option in
Windows' option from the drop- dialog box. the 'Protect Sheet' dialog box.
down list. Set a password to secure your Type a password to secure the
Select the 'Structure' option in worksheet. worksheet further. Make sure that
'Protect Workbook' dialog box. Click 'OK' to continue. Your data is your password is strong.
Type a password in the 'Password' now protected as well as hidden Click 'OK' to continue. Your
text box. from possible threats. worksheet is ready to be used.
Retype the password to secure the If you are using Excel 2007 instead,
workbook.
Once protected, other users cannot
change the names of the worksheet
tabs, nor can they create new
worksheets or delete existing ones
without the password.
04
PROTECTING
WORKSHEET COLUMNS
IF you have confidential data that you This technique is not completely foolproof. The data contents can be viewed using cell reference in an
04 unlocked cell.
need to protect from prying eyes,
WEB
INTERNET EXPLORER 8
To look for more Accelerators browser allows you to customize your
for Internet Explorer 8 click 'Find security to a level that you find suitable
01
More Accelerators' under the 'All in the formidable Web environment
Accelerators' menu. The browser will that has scores of viruses and other
open up a page that contains links threats floating around. It's called WOT
USE IE8 ACCELERATORS to an add-ons page that contain (Web Of Trust) and is available as a
various Accelerators that can be Firefox add-on. The representation
Internet Explorer 8 has an exciting added to the browser. Simply click of threatening sites is quite easy to
new feature called Accelerators, that the 'Add to Internet Explorer' button understand while using WOT since
can solve your browsing problems. beside the ones you would like it color codes the sites based on the
Accelerators basically quicken your to add. A dialog box will appear levels that you set. Follow these steps
'website search' by giving you direct on your screen asking you for a to install WOT into Firefox,
links to popular web search tools that confirmation of the same. Click 'Add'. Visit https://addons.mozilla.org/
can be opened with a mouse click. The add-on link will be added to en-US/firefox/addon/3456
When you install Internet Explorer 8 your list of installed Accelerators. Click 'Add to Firefox'.
you are provided with Accelerators
To configure it, again right-click on Click 'Install' on the dialog box that
that provide you with only those sites the page and click 'All Accelerators | appears on your screen.
that are affiliated to Microsoft, such as Manage Accelerators'. A new dialog After the add-on is installed you will
Windows Live. Here's how to go about box will appear on your screen. have to restart Firefox.
with using Accelerators: Simply click on the one you installed Once you restart the browser you
Open up any webpage on Internet and click the 'Set as default' button will be redirected to the 'welcome'
Explorer 8. Make sure that it is a if you want to set this as the default page of the WOT site. You will come
site that has various elements like Accelerator. You can also 'Disable', across four radio buttons that ask
images and textual information. The 'Enable' and 'Remove' Accelerators you to select the level of protection
best example would be a Google from here. that WOT should use.
search results page.
Click 'Close' to exit. Select your level and click 'Finish'.
Right-click on a link on the page A green circular logo of the
and in the context menu, you will MOZILLA FIREFOX application will appear on your
see the 'All Accelerators' option. A Navigation toolbar, beside the
02
tray will open up with an option of address bar. Click this button and
Accelerators that are available. click on the rating meter to mark the
Using these Accelerators you can 'Trustworthiness', 'Vendor reliability',
receive a direct translation of the VIEW TRUSTED SITES 'Privacy' and 'Child safety'. You can
page to the language of your choice. do this by clicking on the color-
You can also blog the article that Mozilla Firefox has an in-built defense coded rating bars.
you are on as well as e-mail it to mechanism that decides which sites To view the overall score of the site
your contacts. are safe to visit and which aren't. The as per rating of users simply click the
'View scorecard for ratings detail' in
the dropdown box.
WOT can thus help you gain a better
understanding of what risks you
run into whenever you visit certain
websites.
MOZILLA FIREFOX
03
MANAGE YOUR
PASSWORDS SMARTLY
One of the most useful things you can do with Accelerators is translating a webpage in real-time. By default Passwords are always a problem
01 IE8 translates using 'Live Search'.
to handle. Firstly, picking the right
Lock up your
USB drive
There is always a chance of you losing your USB
flash drives with confidential data in them. Hence,
Hemali Limbachiya
KEY DETAILS
SKILL LEVEL
STEP 1
Moderate
DOWNLOADING AND INSTALLING
ALTHOUGH U3 LaunchPad comes free of cost with most SanDisk flash drives, you can still
WHAT YOU WILL NEED
download a copy of the drivers. To use the application, carry out the following steps
SanDisk Flash Drive
Windows OS
1. Visit 'www.sandisk.in/
Internet Connection
Retail/DriverDownloads.
WHAT YOU CAN LEARN
aspx'.
Securing your flash drive
Safely ejecting USB drives 2. Click the 'U3 LaunchPad
HOW LONG IT WILL TAKE Installer' link.
T30 Minutes
3. Click the 'Download
Drivers (.exe)' on the
next page and save the
'LPInstaller.exe' file.
Encrypt your
data
Data encryption is a smarter way to secure data as
compared to password protecting files. Learn how
Hemali Limbachiya
you can make your data and other files safe using
SecureCrypt.
BY KAMAKSHI S
REFERENCE
WHAT DOES DATA STEP 2
ENCRYPTION MEAN?
Encryption is a process of
ENCRYPTING AND DECRYPTING TEXT FILES
converting normal text into IF you have important and confidential details in a Word document, then it is always better to
what seems like a sequence encrypt the contents rather than depend on a password. A password can be cracked and the file
of random text also known as can be hacked into. To encrypt a text file, carry out the following steps:
cipher text. The conversion of 1. Double-click the
data into cipher text requires application shortcut
certain formula known as
appearing on the desktop
algorithms. There are several
to start the application (if
algorithms available to help
with this conversion. The
it is not already running).
amount of time taken to 2. Click the 'Encrypt or
encrypt the data forms the Decrypt' logo on the
basis of the encryption. The application window.
Advanced Encryption Standard
(AES) was made available to
the public in around 1998 and
was used by the military. It is
a 256-bit encryption standard
and can encrypt and decrypt
at a mean speed of around 36
mbps. AES-Twofish-Serpent is
a very strong encryption and
can encrypt and decrypt only
6.6 mbps on an average. This 3. Next, click the 'Password
also depends on the system; a Key' button appearing
faster processor will perform under the 'Please select
the task much faster. The RAM what Encryption or
is also a major factor.
Decryption Technique you
wish to use:' dialog box.
4. Click 'OK' on the 'Select
the file that you want
Encrypted/Decrypted'
dialog box.
5. Browse and select the file
from the 'Open' dialog
box and click 'Open' to
load the file.
Secure your
web browser
Most popular Internet browsers come along with
Hemali Limbachiya
KEY DETAILS
SKILL LEVEL
STEP 1
Moderate
CONFIGURING INTERNET EXPLORER
INTERNET Explorer 8 is Microsoft's latest Internet browser. However, its predecessors too have
WHAT YOU WILL NEED
some common security options that can be configured for maximum security. Let's see how to go
Windows XP or later
about it.
Internet explorer, Mozilla Firefox or
Google Chrome
WHAT YOU CAN LEARN 1. Run Internet Explorer and
Configure browser security options press the [Alt] key to view
HOW LONG IT WILL TAKE the menu bar.
T30 Minutes
2. Select 'Internet Options'
from the 'Tools' menu.
3. Click the 'Security' tab.
4. Under the 'Security level
for this zone' section, set
the slider bar to 'High'.
Click a zone, for example
'Internet'.
REFERENCE
WHAT IS ACTIVEX?
STEP 2
ActiveX is basically a
CONFIGURING MOZILLA FIREFOX
technology that is used by
FIREFOX has gained popularity over the years and is being used by many. But like Internet Explorer,
Internet Explorer. It allows
it comes with security options that need to be configured for optimum security. To configure
applications to be used by
security settings, follow the steps below.
the browser. An ActiveX
component may already
1. Run Firefox and select
reside on a Windows system
'Options' from the
or it may be provided as a
'Tools' menu.
downloadable object. This
enhances the functionality 2. Click the 'Always ask me
of web browsing. On the where to save files' radio
other hand, it may also pose button under the 'Main
as a security threat if it's tab'. This would make
not properly implemented. you aware of files being
Though it's quite useful, it
downloaded, since some
also increases the chances
files are downloaded
of you being attacked.
without your notice.
Also, installing a Windows
application introduces the 3. Click 'OK' to save changes.
possibility of ActiveX controls
being installed on the system.
Hence one should be aware
of or completely block these
applications from being
installed through the browser.
STEP 3 REFERENCE
WHAT ARE BROWSER
CONFIGURING GOOGLE CHROME PLUG-INS?
Plug-ins are extra applications
GOOGLE'S first ever web browser was successfully launched a few months ago and is currently
that can be used by a web
being used by many. Like other browsers, Chrome also comes with security options that are not
browser. By default most
configured by default. Let's take a look at some of these options and implement them accordingly.
plug-ins are not installed since
it may not be required by the
1. Run Google Chrome and
user and at the same time it
click the wrench menu.
also keeps the browser light.
2. Select the 'Options'. Most plug-ins are (by default)
3. In the resulting dialog created by the browser owner
box, click the 'Under the themselves. On the other hand
Hood' tab. there are plug-ins created by
third party users to extend the
4. Select the 'Ask where browser's functionality. They
to save each file before are similar to ActiveX controls.
downloading' checkbox The only difference is they
to be notified of file cannot be executed outside
downloads. the web browser. Adobe Flash
player is an example of a
plug-in. Downloading plug-ins
from a third party might put
your information at stake since
the plug-in may contain code
to steal private information or
even harm your system. Hence
downloading a plug-in, only
5. Click the 'Personal from the browser's default
Stuff' tab. website is recommended.
6. Under the 'Passwords'
section, click the 'Never
save passwords' radio
button.
7. Under the 'Form autofill'
section, click the 'Never
save text from forms'
radio button.
KEY DETAILS
SKILL LEVEL
STEP 1
Moderate
DOWNLOAD AND INSTALL
UNIVERSAL Shield is a shareware and can be evaluated for 30 days. This application can be
WHAT YOU WILL NEED
downloaded from the link www.everstrike.com/download/ushield.exe Once downloaded, run the
Windows XP or later
setup file and follow the steps below.
Universal Shield 4.3
WHAT YOU CAN LEARN
1. Double-click the setup
Password Protect files and folders
file, select the language as
Lock Windows folders
HOW LONG IT WILL TAKE
required and click 'Next'.
T30 Minutes 2. Agree with the terms and
conditions by selecting
the checkbox and click
'Next' to continue.
3. You would require
entering a password to
protect the software
from being misused.
Enter the password for
the application and click
'Next'.
STEP 2 REFERENCE
WHAT IS UNIVERSAL
USING UNIVERSAL SHIELD SHIELD?
At times you might require
ONCE the installation has been completed, you can now set permissions for files and folders,
sharing your PC with different
encrypt files and lock them. Let's take a look at how to go about this.
users. For security purposes,
you can create separate user
accounts. But what if the user
1. To hide a file or folder,
has to use the main account
run application and
for some or the other reason?
click the 'Hide files'
By allowing the user access
radio button. to the main, you might put
2. Click 'Next' and 'I want confidential information at
to hide a file' or 'I want stake. Hence for additional
to hide a folder' radio security, Universal Shield
button. can come in handy. Using
this application, you can
3. On the next window, click password protect files, folders
the 'Add to list' button or an entire group of files of a
and browse for files or particular file type. Moreover,
folders to be hidden. you can also hide drives and
4. Click 'Next' and then prevent access to certain
'Finish'. objects like the Control Panel
and My Documents.
Staying safe on
Facebook
With all the good things we have on Facebook,
Hemali Limbachiya
KEY DETAILS
SKILL LEVEL
STEP 1
Moderate
PICKING A STRONG PASSWORD
THOUGH Facebook has its share of precautionary measures to keep your privacy intact, there
WHAT YOU WILL NEED
are always a bunch of hackers who are a step further than your protectors. Hence it is important
Internet connection
to strengthen the first level of security to keep away the most common threat of all: hackers. For
WHAT YOU CAN LEARN
this to be made possible, the attacker should have your password, using which he can log into
Change your password
your account and do all the damage he wants. So picking a good password, that's hard to guess,
Block contacts
is always important. The following step will help you reset your password to a stronger one, if you
Customize privacy
feel that your current password isn't strong enough,
HOW LONG IT WILL TAKE
T30 Minutes
1. Log into your Facebook
account using your
current ID and password.
2. Once you are on your
home page click 'Settings'
on the top bar.
3. By default you will be
directed to the 'Settings'
tab. Under this, look for
the 'Password' section and
click 'Change'.
Handling infected
pen drives
It has always been a constant threat to copy data
from a pen drive that has been used on an infected
PC. We teach you how to keep safe from infected
Brijesh Gajjar
pen drives.
BY GARETH MANKOO
STEP 2
TACKLING THE INFECTED 'AUTORUN.INF' FILE
VIRUSES often travel across computers on USB drives by taking the form of the 'autorun.inf' file.
This file is used to launch the 'Autorun' dialog box when the pen drive is inserted into the USB port.
Once infected by such a virus, a copy of the same is made on all drives of the affected PC. Every
time the drive is inserted, the virus is executed. Hence it is best to prevent the 'Autorun' feature in
the first place. After doing that we will see some tools that can help avoid infections.
Windows Firewall
Windows Firewall is a great security application, however
there are times when this helpful tool can turn hostile
against us and bring out problems rather than solutions.
BY GARETH MANKOO
+ CONFIGURING
WINDOWS FIREWALL
Firewall for their smooth functioning.
This does pose a threat for those who do
and click 'OK'.
3. The 'Windows Security Center'
not have any other security applications window will open up.
PROBLEM: or anti-virus suites installed on their 4. Click the 'Windows Firewall' logo
I had earlier disabled Windows Firewall systems; since Windows Firewall is the at the bottom under the 'Manage
on my Windows XP system because I default, first level security provided by security settings for:' section.
found it quite annoying. However, I have Microsoft for its operating systems. 5. The 'Windows Firewall' window
been advised that it is quite an important It is best advised not to disable the will open up. Click the 'On
tool and that it will help in maintaining firewall but rather configure it to suit (recommended)' radio button to
a first level of security for my computer. your needs. This also includes adding enable your firewall again.
How do I enable it again and reconfigure frequently used applications to the 6. Make sure that the 'Don't allow
it to function normally? Also, I would exception list of firewalls so that it doesn't exceptions' checkbox is not
like to know how to add programs to the interfere with their smooth functioning checked.
'exception list' of the firewall so that it anymore. Follow these steps to 7. Click 'OK'.
doesn't block these applications without reconfigure Windows Firewall and create This step will enable the previously
my permission in the future. an exception list: disabled firewall. Now if you want to
Make sure that you are logged into the add exceptions to the firewall so that
SOLUTION: administrator account on your computer. it doesn't block any application in the
One of the main reasons we have Windows Firewall can be handled by future, follow these steps:
people disabling Windows Firewall is its administrators only. Guest accounts do 1. Follow the above procedure to open
interference with certain, commonly-used no have access to its settings by default. up the 'Windows Firewall' window.
applications. In fact, some applications 1. Click 'Start | Run'. 2. Once it opens up click the 'Exceptions'
even advise users to disable Windows 2. In the textbox, type in 'wscui.cpl' tab.
3. In this, click the 'Add Programs' tab.
4. A list of programs will be displayed
in the next dialog box that appears.
Select the name of any application
that you use frequently or one that is
often blocked by Windows Firewall.
If you cannot find the name of the
program in the list of applications,
click 'Browse' and manually locate it.
5. Click 'OK' once you're done.
Now run the application to check if
Windows Firewall still interferes with it.
If you still experience problems with the
application running then you will have to
When you open the Windows Security Center window, you are notificed if the firewall is 'ON' or 'OFF'. Click the 'Windows resort to the cumbersome procedure of
Firewall' logo to open up the firewall settings dialog box.
disabling Windows Firewall while using
+ ADDING PORT
EXCEPTIONS
vendor for assistance on which ports
should be enabled or use a simple DOS
window that opens up click the
'Windows Firewall' logo at the bottom
command to find out which ports are under the 'Manage security settings
PROBLEM: being accessed. Follow these steps for for:' section.
I have Windows Firewall enabled on my the same: 4. The 'Windows Firewall' window
PC but because of this certain ports are 1. Launch the application that's will open up. In this, click the
blocked. A software application I use does causing you problems. 'Exceptions' tab.
not work, since it requires a particular 2. Click 'Start | Run'. 5. Click 'Add Port'.
port to be opened. Does Windows 3. Type in 'command' and hit [Enter]. 6. Type in the details of the port that
Firewall have a provision to allow only 4. In the command prompt enter 'netstat you got either from your vendor or
particular ports to be enabled? How can I -ano > netstat.txt'. by using the procedure above.
tell which ports are being used? 5. Hit [Enter]. 7. Click 'OK'.
SOLUTION: 6. Similarly, enter 'tasklist > tasklist.txt ' 8. The program should work fine now
Yes, Windows Firewall allows you to 7. Open both the files, 'Tasklist.txt' even with Windows Firewall enabled
specify individual ports that can be and 'Netstat.txt' from the location and running.
Look for the common port identification number 'PID' in both the 'netstat' as well as the Enter the name of the application, the port number and the type of protocol (TCP/UDP)
'tasklist'. This will help you determine the port in the 'netstat' file. and click 'OK'.
Dr. KNOW
Get to know what a Virtual Firewall is. Also learn
more about RAID and SNMP.
Sachin Pandit
BY DOLWIN FERNANDES
More on IP concealment
We are all aware of what IP addresses are. Let’s get to know the different methods for IP
concealment and how it works.
Although different users use different available, even the user name and log-in since the connection changes every ten
technologies, all anonymizers have one password for the VPN client. Theoretically, minutes. Even then, monitoring one
thing in common. Whoever wants to surf even the authorities have it easy here. The session would suffice to obtain
anonymously needs an anonymous IP. Data Retention makes it mandatory for sensitive data.
Here, the user can pick between three German VPN operators to hoard up the IP Mix cascades are also configured like
methods i.e. VPN (Virtual Private Network), addresses. Whether and in which scope the Onion Routing, for e.g. John Doe
Onion Routing and Mix cascades. they need to release the IPs of the user where the user connects to a server (Mix)
In the case of VPN, the user must first has not yet been explained conclusively. that encrypts the enquiry and forwards it
install a client software, which latches Just two months ago, the District Court to other servers (mix cascades). But instead
itself on to the system and automatically of Bamberg decided that an anonymizer of using free nodes here, the operators
intercepts all packages sent in the service cannot indiscriminately be forced back specific providers. All users that surf
network. Thus, the enquiries first go to a to give out the data of its clients, it is using the same mix cascades are also
server via an encrypted tunnel and this compelled to do that only in the case of forwarded over the same route. Thus,
server forwards the user to the respective severe criminal offences. it is possible for the server to mix the
website with a new IP. The accessed URL The Onion Routing, for instance the connection data of all users to additionally
remains invisible for the private provider. Tor network has a completely different complicate the traceability of a person.
Only an anonymous IP is forwarded to approach than that by VPN. Here, the user The data retention problem also
the website operator. VPN servers are does not use a fixed server but many free principally applies to the mix cascades.
extremely quick but have a fundamental proxy servers. A website enquiry is sent However, it can be dealt with, if the client
disadvantage. The client must be able via three Tor servers that are constantly can determine the location and the
to trust his provider. This is because changed and re-encrypted at every operator of the mix. If he uses three servers
although the user surfs anonymously station. Identifying a particular user in this from three different providers for instance,
outwardly from there on, his complete network is barely possible. The connection tracing back would only be possible with
data is available on the servers of the VPN can be monitored if the invader keeps a a lot of effort. Moreover, if the mixes are in
service. If a hacker ferrets out this server, check on the first and last node. But this three different countries, the chances of
he gets the IP address of the user and, if does not lead to a complete user profile the data snooper are almost nil.
USER
A client encrypts
the request,
when a user WEBSITE
calls a website
w
w
IP w.c
es .in
-A hi ip
dd p.in .ch r
s
res w d
s ww -Ad
IP
PROVIDER
No traceability
PROXY SERVER
www.chip.in
of the IP-Address The proxy server
Concealed requested assigns a
website new IP and
Open
forwards the user