You are on page 1of 52

Protect your home network » Secure your web browser » Monitor USB drives

Supplement to CHIP November 2009

PROTECT YOUR
FILES AND FOLDERS
WITH COOL TOOLS

SAVE YOUR
DATA FROM BEING
STOLEN AND MISUSED

KEEP A SAFE
DISTANCE FROM
HARDWARE THREATS

BE ALERT
AND STAY SAFE
ON THE INTERNET

SECURE YOUR WORLD


OF TECHNOLOGY
CONTENTS

FEATURE
4 SECURE YOUR HOME
NETWORK
Keep your PC secure in a network
environment

8 PROTECT YOUR SOCIAL


LIFE, ONLINE
Stay away from the perils of social
networking.

12 SECURE YOUR PC FOR


FREE 4
We give you a list of helpful security
applications that are absolutely free 31 ENCRYPT YOUR 51 IN DETAIL
DATA We take a deeper look into IP
Learn to use age old art of cryptography concealment
HANDS ON with the help of SecureCrypt

16 10 TIPS 34 SECURE YOUR


10 precautions you must take to protect WEB BROWSER
your funds from being phished We teach you how to secure Internet
Explorer 8, Firefox and Chrome ASSISTANT EDITOR  TECHNICAL
18 10 TIPS Jamshed Avari
38 jamshed.avari@chip.in
10 ways to protect your laptop while PROTECT YOUR FILES
on the go AND FOLDERS COPY DESK
Universal Shield is a simple application Sharon Khare
20 TIPS & TRICKS that will protect your data WRITERS
Optimize the usage of Windows, Word, Gareth Mankoo,
Excel and the Web 41 STAYING SAFE ON Dolwin Fernandes,
Kamakshi S
FACEBOOK
28 LOCK UP YOUR We teach you to configure Facebook's ART DIRECTOR
USB DRIVE privacy settings Nirmal Biswas
Protect the data in your USB drive from ILLUSTRATOR
being stolen 45 HANDLING INFECTED Sachin Pandit
PEN DRIVES DESIGN
45
45 Learn how to tackle the 'autorun.inf' file Jagdish Limbachiya,
that spreads using USB drives as mediums Brijesh Gajjar,
Hemali Limbachiya
HEAD OFFICE
SPECIALS Intelligent Computing CHIP,
Infomedia 18 Limited
48 `A' Wing, Ruby House, 2nd Floor,
PC DOCTOR J.K. Sawant Marg, Dadar (W),
Tackle some basic problems that arise Mumbai - 400 028. INDIA
because of Windows Firewall Phone: (91 22) 3024 5000
Fax: (91 22) 3003 4499
50 DR. KNOW E-mail: feedback@chip.in

Learn more about Virtual Firewalls, RAID


and SNMP
FOREWORD
IN the chaos that surrounds our day-to-
day activity on the Internet we seldom
realize the dangers that hover around us
in inconspicuous forms. The great Isaac
Newton stated that there’s always an equal
and opposite force acting against every
action performed. Only in the case of you,
the common user, this negative force is a lot
more than equal. There are threats coming
in from every corner, be it from the Internet
or outside.

This issue of CHIP Plus is a guide to what you


need to do to stay safe in this precarious
environment. We all know that anti-virus
utilities make some really tall claims of
Developers are kind being one better than the other, but how
can we trust them? We need to build a few
enough to provide defenses ourselves, rather than completely
rely on a single application to do this. The
some security misconception of users that installing
security tools is a waste of money, often
applications for costs them more dearly in the form of data
loss. Thankfully, developers are kind enough
free. This acts as a to provide some security applications for
free. This acts as a catalyst for users to
catalyst for users download them and make sure that they
have at least a single line of defense ready.
to download them Besides the expected measures we take to
and make sure shield data from being stolen or destroyed,
we also give you a few quick tips on how
that they have at to fend off attempts of physical thefts
by robbers and burglars. Another look at
least a single line of physical computer security covered here
includes the shielding of USB drives against
defense ready. infections. You will learn how easy it is for
you to lose all your data after borrowing
that innocent looking pen drive to copy a
presentation. Trust me, it isn’t all that safe
out there.

Gareth Mankoo
gareth.mankoo@infomedia18.in
4 FEATURE  APPLICATION

Sachin Pandit
Secure your home
network
Here is a quick guide to making sure that your computer is safe when
connected to a network.
BY GARETH MANKOO

T
KEY DETAILS
o begin with, we need to define the kind Attackers use tricks such as attractive ads, offers for
of environment that we are working in. free stuff, etc. to tempt you to click on a particular link
SKILL LEVEL
Networks that have a single administrator or object on the page. This click could be fatal. Thus

are way safer than those that don't have any. This we can broadly classify these attacks based on the
Moderate
NOW YOU CAN
is because well administered systems have rules targets that they have. So we call them:
 Protect your home network that allow and deny access of certain components ATTACKS ON OUR INTEGRITY: Our data is being
 Keep away common threats or computers over a network. In regular peer-to- modified or destroyed by unauthorized means.
PROJECT TIME peer networks security lapses are quite common. ATTACKS ON OUR CONFIDENTIALITY: Our data
45 Minutes is being viewed by those who do not have the
WHAT YOU WILL NEED WHO ATTACKS US AND WHY? permission to do so.
Internet connection
To avoid threats, we first need to know who we are ATTACKS ON OUR AVAILABILITY: Not every rightful
Internet Browser
up against. These attackers are called 'hackers' or user can access the data because it is being denied to
'crackers', depending on whether they are meant them by an attack/attacker.
to dig into your personal information, modify
it or even destroy it fully. Besides targeting just WHAT KIND OF ATTACKS ARE WE
your computer, these attackers can also launch VULNERABLE TO?
attacks on other computers by using your system To get into our systems and access our data, attackers
as an access point. By doing this, they can remain resort to various means. Some of these trick us into
discrete in their actions and end up jeopardizing falling for them by using attractions like free gift
your integrity on the network. vouchers or free downloads. Others simply creep

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


APPLICATION  FEATURE 5

into our systems without our knowledge. Attacks like


worms, viruses and Trojans are generally pre-coded
and stored at some point in a website or anywhere on
the Internet. These can be mailed to us, and to several
other targets at a time as an attachment, which, on
clicking, can penetrate our systems.
However, though these are the most common
attacks, we also have some others. All of these are
mentioned in the following points:
WORMS, VIRUSES AND TROJANS: As mentioned
earlier, these programs are pieces of code that affect
some part of our operating system. Worms are known
for replication; viruses cause direct attacks on our
data by deleting, altering or adding data without our
permission. Trojans reside as harmless entities which
later cause problems by picking up our sensitive
information like logins and passwords.
DOS ATTACKS: One of the most common attacks
is the DoS (Denial of Service) attack. In this case,
certain or all components of your system are made
unavailable to you. For example, your PC will be
'pinged' over and over again so as to congest your
network traffic. This will deny you using your own
PC over the network. The most common targets
for attackers often include blocking a certain web
portal or component from being used. Besides being
annoying, this can also lead to some serious downtime
in your work. Even worse, attackers can flood the
victim's bandwidth with requests from multiple
systems. This kind of attack is called DDoS (Distributed
Denial of Service). Certain Trojans can also be used to
execute this kind of attack.
BROWSER HACKS: Certain websites and applications
have scripts like JavaScript and ActiveX controls. These
can be used to pick up information like login details,
browsing history, etc. and display it to unauthorized
personnel. However, the good news is that there are
means to block these components on your browser.
Most browsers provide you with an option to block
these attacks. There are other harmful scripts that
can take you by surprise. These appear to be helpful
links and ads on the site that tempt you to click on
them. On clicking, they set to work. So make sure that
you click only on relevant links and objects on your
browser so as to keep away from harmful scripts such
as these. These links can also be displayed on public
forums as HTML tags and flash ads.
EMAIL THREATS: Emails are the easiest way to get a
file from one end to another. The sad part is that it is
used to get some rather fishy files across sometimes.
Make sure that you do not download files that have AVG, Kaspersky, McAfee and Norton are the most common anti-viruses programs used as a first level
defense. Though they are capable of functioning on their own, it is also very important to update them
been sent as attachments from sources that you do regularly to keep them up-to-date with the latest threats.
not know. It can be a virus or another harmful file that

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


6 FEATURE  APPLICATION

will claim to be something else, like a friend's wedding format while they actually are of a different file format
photograph or a calculator application. Downloading altogether. So the files that you will see may appear
and installing it can be disastrous for your system. to be, for instance, 'love-letter-for-you.txt' when it
Spoofing is also a popular technique among is actually 'love-letter-for-you.txt.vbs'. Many viruses
attackers to penetrate a system. Spoofing means appear in some rather harmless, non-executable
sending an email to a victim by disguising yourself formats. To tempt you into downloading them, they
as someone else. This leads to the problem of may appear as MPEG, AVI or even MP3 files. In actual
compromising private information - by means of a form, these will be VBS script files.
reply - to the sender, who is actually the attacker in SNIFFING: 'Packet sniffing' or 'sniffing' occurs when
disguise. Spoofed emails are really hard to tell from attackers capture data that is being sent over a
original ones since they can pose as anyone you would network, by intercepting it. This can give away
trust sending personal information to. crucial information like sensitive mails and login
For instance, an attacker may ask you to mail him details. Sniffing is often used against banking and
your current passwords and login details or even tell e-commerce sites so as to get sensitive monetary
you to change the same, while posing as your network information. Encryption and decryption of data
administrator. Home networks are soft targets for such packets is the best way to get data across a network
ingenious attacks. without attracting the attention of attackers.
FILE EXTENSIONS: It is a common practice to stay BACKDOOR ATTACKS: These attacks are often carried
away from files like EXE and COM since they are most out by well-equipped attackers. Every system has
common viruses. However, there are means of fooling a backdoor that can easily be penetrated without
you that can make files appear to be of a certain much problem. Certain tools such as BackOrifice and

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


APPLICATION  FEATURE 7

Netbus are easy-to-use tools for those seeking an


entry into a computer network. Home networks are
feeding grounds for such attackers. They can even
dig into administrative systems and change certain
configurations and use them to their advantage.
The above mentioned attacks are just broader classes
of more sophisticated actions taken by attackers to
penetrate a system.

HOW DO WE PROTECT
OURSELVES?
The following are some basic precautionary steps to
keep away from network based attacks.
UPDATE ANTI-VIRUS APPLICATIONS: Make sure that
you update your anti-virus suite often so as to remain
up-to-date with the latest threats on the network and
the Internet.
ENSURE STRONG ADMINISTRATIVE RIGHTS: If
you have a network administrator, make sure that
his system is capable of handling the privileges well.
Ensure that your system is safely shielded from all the
harmful files on the network.
USE FIREWALLS TO BLOCK PORTS: Firewalls are
great tools to block certain ports from being accessed.
DO NOT USE UNKNOWN FILES AND APPLICATIONS:
Avoid using files and applications that have come to
you from unknown sources. If they arrive by email, do
not download or open them.
MAKE FILE EXTENSIONS VISIBLE: By default,
Windows disables the file viewing of file extensions.
However, to avoid attacks, it is necessary to see what
format a file actually belongs to. If you use Windows
XP then open 'My Computer'. In that click 'Tools |
Folder Options'. Click the 'View' tab. Uncheck the 'Hide
extensions for known file types' checkbox. However,
this may not make all the extensions visible.
DISABLE JAVA AND ACTIVEX SCRIPTS: As seen
earlier, scripts like ActiveX can cause executable
viruses to enter your system once they are installed.
Hence disable them if possible.
BACKUP YOUR DATA: It is always critical to maintain
backup copies of your data so that they can be
recovered in case of loss.
TURN YOUR PC OFF WHEN NOT IN USE: There is no
way that a switched of PC can give away any data or
be attacked. Hence, keep it off if you are not using it. If
you feel that there is something absolutely dangerous
on your network then unplug the network cable after
consulting your administrator.
KEEP A BOOT DISK FOR EMERGENCIES: The worst
case scenario can be your computer's system files Firewalls are often bundled with anti-virus suites but can be found as standalone applications as well.
They help you keep your PC safe from notorious access points on the network. You need to understand
being corrupted. Hence it is important to make a boot the concept of using logical ports on your computer before you configure Firewalls.
disk to recover it at such times.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


8 FEATURE  APPLICATION

Sachin Pandit

Protect your social


life, online
We have enlisted a few practices that you can follow to ensure a safe
experience while socializing online.
BY KAMAKSHI S

M
KEY DETAILS
an being a social animal, the interaction As the population of netizens grows at a rapid
of like-minded individuals led to the pace, the need to be all the more vigilant and careful
SKILL LEVEL
formation of civilization that we are now a about the nature of information shared with the world

part of. While keeping pace with the technological at large is the need of the hour. Here are a few simple
Moderate
NOW YOU CAN
advancements, the entire world has shrunk things that you can keep in mind to enjoy your online
 Stay safe on social networks tremendously and geographical distances can networking experience in a safe and clean way!
 Share your data safely now be nullified with the mere click of a button. ADD THE PEOPLE YOU KNOW: Social networking is
PROJECT TIME Just like the concept of communicating is as old a great way to catch up with your long lost friends,
45 Minutes as civilization itself, so is the concept of social and even make some new ones. But there are certain
WHAT YOU WILL NEED networking as old as the Internet. things you need to keep in mind rather than going
Internet connection
There were online social exchange mediums on a hunt to make new friends. As a thumb rule, don't
(BBS) like USENET (1979), and LISTSERV (1986) that add random people. There is no way of knowing their
enabled users to communicate with each other real identity since many of these users don't even
through comments and posts, there were also upload their own photographs. You might find far
webhosting services like Yahoo! GeoCities (1994) more genuine people at a bar rather than on a social
which enabled users to air their thoughts online. networking website. Random people don't feel bad
While the former laid a firm foundation for the if you refuse their requests. There are also certain
future world of blogging, the latter helped pave people who add you from your friend's friend lists.
the path for free webhosting services with flexible Make sure you ask your friend who this person is and
content. why he wants you on his list. Also if you feel that your

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


APPLICATION  FEATURE 9

privacy can be threatened and your confidentiality can


be breached by adding certain known friends, make
a prudent decision to decline their request. If you are
pestered too much after declining requests from a
particular user, feel free to report them.
POST MESSAGES WITH CAUTION: With the
Twitter and Facebook fever rising by the second,
the 'disconnect anxiety' seems to be increasing
significantly especially among the youth. Most of
these social messaging services extend functionalities
to devices like Palm tops, BlackBerrys and cellular
phones, in turn adding to the number of addicts. This
urge of technophiles to keep glued into their account
is a big cause of psychological concern. Several
users subscribe for text alerts alerting them on every
Orkut allows you to restrict people to specific countries and regions to ensure that your surfing
post or comment they receive. Moreover, this kind experience is unaffected.
of technology enables people to update each and
every incident of their life quite intricately and rather
quickly. This kind of behavior poses a threat at many
levels: firstly it shows the psychological well-being
of a person. If you seem low or depressed on your
posts, you can be taken advantage of. There have
also been reported incidents of houses being burgled
by keeping track of tweets and post updates while
people are out on long vacations. Tweets / posts like
'Out on a two week long vacation to the Bahamas',
coupled with a list of your likes-dislikes (an indicative
of your possessions) and coupled with your location
details ensure that you are laying a trap for yourself.
Always remember even if you don't add any direct
personal details like your house address, a small
amount of probing along with your IP address can
reveal a lot about your browsing locations.
PROTECT YOUR PERSONAL PICTURES: If pictures Although you can set the content access parameters from the Settings page directly, these contents
don't include your photo albums.
speak louder than words, what better way to share
memories than with photographs? But when you
upload pictures, make sure you know how safe
they are from prying eyes. Your pictures might
be used without your permission violating copy
right issues. On a more serious note, there have
been many reported instances of how pictures of
unsuspecting social networking users have been
used for pornography, child racketing and other
heinous crimes. Most of the networking web portals
provide you with personalized sharing options. It is
a recommended that you don't share albums with
people out of your friend circle. If your friends are not
comfortable with their pictures appearing in your
album, respect their privacy and take them off your
albums immediately. Always remember, even if you
delete images from your profile you cannot be 100%
sure that those images are not still somewhere on the Click the 'manage' link appearing near the 'Privacy' section of the 'Settings' tab of your account page
to change the privacy settings.
server or have already been misused.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


10 FEATURE  APPLICATION

SECURE YOUR JOB: Business networking sites are the


newest rage among young corporate workers. They
use these as a tool to build social networks for
business building or job hunting. But there is a real
threat if you are joining a rival firm and promptly
upload the details of your new job, you might find it a
bit tough to answer unwarranted questions especially
if your ex-colleagues form a part of your network.
Moreover, the recommendations you receive here may
not be too useful if companies prefer the older and
more traditional type of job references.

SECURE YOUR INTERESTS


ONLINE:
Listed below are a few pointers on how you can set
As one of the most interactive networking sites, MySpace provides auto responders to connect to
your audience even while on vacation.
the privacy option on some of the most popular web
portals around the world.
SECURITY ON ORKUT.COM: In its early days, Orkut
had very few privacy policies. But as time went by and
the nature of security-lapse related crimes came to be
known, Orkut has strengthened its security options.
To alter your security settings, login to your Orkut
account and go to your profile page. Make sure that
you haven't specified details that give out too much
personal information especially your email address as
it is prone to spam attacks. Save the changes and click
the 'Settings' option which is the second last option
on the panel appearing below your uploaded profile
picture. The 'Safety filter' on the website is turned
on by default to protect your account from being
spammed with x-rated content.
Although this is not a recommended practice, you
can go to the 'general' tab of the 'My Settings' page,
Concealing or selective viewing of data becomes all the more essential when you are building a and check the 'show all content' under 'safety filter'
professional network.
instead. Go to the 'privacy' tab of the web page to
manage and monitor who can access the contents
on your profile. Change the listed setting as per your
requirements.
Also note that you can set privacy on uploaded
images for every album individually. Go to the
'notifications' tab to set the way you wish to be
informed of any external activity on your account.
The 'chat' tab enables you to specify how many
people can chat with you. You enable or disable chat
settings for individual users, or for groups as a whole.
PRIVACY ON FACEBOOK.COM: Facebook has been
one of the most popular websites for most youngsters,
as it whizzes past its contemporaries like Twitter, Orkut
and MySpace in terms of popularity. With so many
users to satisfy, it becomes extremely necessary to
keep their privacy intact.
If you tweet incessantly, pay close attention to what you share to keep yourself safe from those You can view and change your Facebook privacy
stalking you online.
settings by logging onto your Facebook account. Once

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


APPLICATION  FEATURE 11

your profile page is displayed, click on the 'Settings' Firstly, know the people who follow you if you
link appearing next to your email ID. On the 'My are twittering about personal details. Log on to your
Account' webpage, click the 'Privacy' tab. You can twitter account and click the 'settings' tab and change
also set notification options under the 'notifications' the settings as required. You can block people from
tab to set the way you wish to be informed of any following you on the website.
external activity on your account. You can monitor However, there are not too many restrictions on
the Facebook 'chat' feature by clicking on its tab and the site and any one can view your tweets irrespective
setting the options under the 'Options' link on the of the fact that they don't follow you. And hence you
pop-up menu. need to be extra cautious before you tweet details
PLAYING IT SAFE ON MYSPACE: Before Facebook relating to your location, residence or other
revolutionized the world of social networking, intimate details. What adds to this problem is the
MySpace took the Internet by storm. Being one of the growing support for Twitter on handheld devices.
first entrants in this field, MySpace also is one of the SECURE YOUR IDENTITY ON HI5! Hi5! is one of the
first websites dedicated to musicians. Keeping in mind oldest social networking websites and is one of the
this specific target audience, the privacy options are earliest of its kind. The privacy settings are the most
scattered across the account's setting page. easily navigable through this web portal. Just log into
Log on to your MySpace account and click the 'My your Hi5! account and click the 'Privacy' link. Click on
Accounts' option. Click the 'Privacy' link to change the each of the sub-links to change the different privacy
general profile level settings. You can control your settings.
notification settings by clicking the 'notifications' tab
to set the way you wish to be informed of any external
STAY PICTURE-PERFECT WITH
activity on your account. Finally for further privacy
PICASAWEB
options, click on the 'Miscellaneous' link and change
the settings as required. PicasaWeb is an online photo sharing tool
SURF CAUTIOUSLY ON LINKEDIN: A relatively newer where you can send invites to your friends
entrant into this market, LinkedIn plans to redefine the to view, save and comment on your photos.
Word business networking. The website encourages Coming from the Google stable, this web
people to create networks with those whom they have service has many fans the world over.
had any type of professional connection. It helps users This website provides two levels of security,
secure recommendations and new jobs as per their namely account level privacy and album level
current profiles. settings. For account privacy settings, log on to
Log on to your LinkedIn account and click the your PicasaWeb account and click the 'Settings'
'Account & Settings' option. Here you can change all link. On the 'Settings' page, click the 'Privacy
the possible options in this page alone. Click on any and Permissions' tab. Set the changes as
links listed under the 'Privacy Settings' section of the required.
page and edit the settings as per your requirements. You can set album level privacy while
TWITTERING WITH CARE: Twitter has revolutionized creating the album itself. For changing settings
the world of social networking by combining the best in existing albums, go to the specific album.
of networking and texting in a brand new genre called Click the 'Edit' option and 'Album Properties'
micro-blogging. Most people get into trouble because from the drop-down list. Since it supports
of the contents of their tweets. Houses get burgled collaborative photo uploading and sharing,
into, young girls have been reportedly molested and you can also create friend groups and change
political careers threatened because of irrational and settings as required.
excessive twittering.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


12 FEATURE  APPLICATION

Sachin Pandit

Secure your PC for


free
If your PC is not secured, it may become vulnerable, thus causing data
loss. Sharing data over the Internet or over internal networks puts the
integrity of your personal information on the line. Let's take a look at
some free tools that can help protect your system.
BY DOLWIN FERNANDES
KEY DETAILS
SKILL LEVEL

AVG 8.5
W
e all need to download various files
Beginner
NOW YOU CAN
from the Internet. Since they are free AVG is a free and well known antivirus application.
 Fortify your PC and small in size they are uploaded on This product is available for free for home users. This
 Download free anti-virus different websites. Now, while downloading a antivirus application gives your system complete
applications file from an unknown website, you may end up security from viruses and worms. It also includes a real-
PROJECT TIME
downloading malware without noticing. Your time shield and a link scanner for safer web surfing. The
45 Minutes
data might be leaked, or your system might get internal virus database updates itself almost everyday
WHAT YOU WILL NEED
Internet connection
infected, if the malware has been executed. Hence by default. The program has a good interface and does
to prevent such disasters, it is advisable to install not slow down your system, since the virus scan utility
security applications. Now, there are plenty of runs in the background.
security suites available at a cost that promises You can download the application from the link
system security. What if you shell out money and www.free.avg.com/download. Once the download
do not get good results? What if your system is has been completed, double-click the setup file. Click
still infected and you're being spied upon? To 'Next' to proceed. Accept the terms and conditions
overcome this problem, we've gathered and tested by clicking the 'Accept' button. The application will
some of the best free security tools available. Let's now run a system check. On the next screen, click the
take a look at how to go about these applications. 'Standard installation' radio button and click 'Next'.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


APPLICATION  FEATURE 13

You will now be able to view a screen prompting


you to install the security toolbar. De-select it if not
required and click 'Next' and then 'Finish' to commence
the installation process. The application will now be
installed on your system
Once the application has been successfully installed,
you will be run through an automated wizard. Click
'Next' to proceed. On the next screen, you will be
asked to set the time for a daily automated scan. Enter
the time in the textbox provided and make sure the
'Enable daily scanning' checkbox is selected. On the
next screen, select the license agreement check box
and click 'Next'.
The application will now search for updates and
install them accordingly. Once done, click 'Next' and
Click the 'Standard installation' radio button and click 'Next' to continue the installation process. The
then 'Finish'. You will now be to view the main interface 'Custom Installation' radio button is recommended for advanced users.
of the application. To scan a particular file or folder,
select the 'Scan selected folder' or 'Scan file' option
from the 'Tools' menu. The scanning process will
commence. If the file or folder has been infected, AVG
will notify you of the same and provide certain options
to deal with the file. You can heal the file or delete it if it
is not healable and not required.
You can also send the file to the Quarantine wherein
it can be healed at a later stage. To scan the entire
computer, from the 'Tools' menu, select 'Scan
computer'. In case there are any infected files on your
system, AVG will notify you of the same by displaying
the infected file list.

ZONE ALARM FIREWALL


Zone Alarm Firewall is an application that protects
your PC from hackers. It includes features like a
Firewall, application control, Interlock and Zone that AVG allows users to set up and schedule a scan time so that your system can be safe and protected
from viruses everyday.
keep your system safe from external attacks. It has an
easy interface and it allows one to configure security
settings using a slider.
A recent update, known as the Game mode is
quite helpful. It lets a user automatically allow or deny
alerts while in the middle of a game. It's also good
at automatically configuring settings for the local
network. Zone Alarm can be downloaded from the link
www.download.cnet.com/ZoneAlarm/3000-10435_4-
10039884.html. Once downloaded, run the setup file
and follow the steps as mentioned.
Click 'Browse' and select a location to install the
application. Enter your name and e-mail address and
click 'Next'. Select relevant checkboxes to receive
updates. Once done, click 'Next' to continue. Select the
terms and conditions check box and click 'Install'.
You will now be able to view the configuration
wizard. Click the 'Scan my computer' radio button and Enter appropriate details in the relevant text box and select the check boxes as shown to receive
updates on the latest threats.
click 'Next'.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


14 FEATURE  APPLICATION

Once done, click 'Finish'. You will now be asked


to reboot your system. Once your system has been
booted, click 'Finish' on the main screen. You
will now be able to view the main interface. Whenever
any program tries to access the Internet, you will be
prompted accordingly with a box. You can click
'More info' if you're uncertain about the program. If
you're sure the program is safe, select the 'Remember
this setting' checkbox and click 'Allow', else simply
click 'Deny'.

SPYBOT  SEARCH AND DESTROY


Spybot is a popular and well known application that
scans for and eliminates spyware and adware. It comes
with a decent interface and the results are displayed in
Click the 'Scan my computer' radio button and click 'Next' to proceed. This is a quick scan and will not
take much time. It is highly recommended that you perform this step.
a tree type structure. The sliding panel allows the user
to take quick decisions for example, quarantine, heal or
delete the infected object. The Immunization feature
blocks various Web-borne threats before it can reach
your computer. Make sure the 'Enable Internet Explorer
protection' and 'Use system settings protection'
checkbox is selected while installing the application.
Spybot Search and Destroy is a free application and
can be downloaded from www.safer-networking.org/
en/download/. Once downloaded, double-click the
setup file and click follow the steps as mentioned. Click
the 'I accept the agreement' radio button and click
'Next'. Click 'Browse' on the next screen and select an
appropriate location to install the application. Click
'Next' to proceed. Make sure the 'Use Internet
Explorer protection' and 'Use system settings
protection' checkbox is selected. Once done, click
'Next' and then 'Install'.
You will be prompted, each time an application tires to access your computer or tires to access the Once the installation has been completed, you
internet from within.
are now ready to use the application for protection
against spyware and adware. Let's take a look at how
to go about it. Once the program starts, you will be
prompted to create a registry backup. Click the 'Create
registry' backup button. Once done, click 'Next'. It is
of vital importance to keep the application updated
to ensure complete protection. Click the 'Search for
updates' button. If there are updates available, Spybot
Search and Destroy will notify you of the same and
keep you updated. Once done, you will be prompted to
immunize your system. Click the 'Immunize this system'
button. Once done, click 'Next' and then click the 'Start
using the program' button. To scan your system, click
the 'Search and Destroy' button on the top right corner
of the screen and then, click 'Check for problems'.
The scanning process will now commence. If threats
have been detected, simply select the checkbox next
Make sure that the 'Enable Internet Explorer protection' and 'Use system settings protection' to the threat and click the 'Fix selected problems'
checkboxes are checked.
button.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


APPLICATION  FEATURE 15

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


16 HANDS ON  10 TIPS

Protect your funds


from being phished
Phishing is a technique through which passwords and
other confidential details are stolen in order to hack
into bank accounts and steal money from victims. By
following these simple tricks, learn how to protect your
money during online transactions.
BY KAMAKSHI S

USING THIRD PARTY


1 APPLICATIONS
opening such emails, and even if you do, don't download the
attachments that are sent along with them.
WHILE there are several third party applications which help
VERIFY IF THE EMAIL IS A SCAM
you protect your interests while purchasing and performing
transactions online, there are also several browser specific
4 MOST email scam messages are marked as spam and are
add-ons that you can enable within your browser. One such diverted away from your inbox. If they aren't, and the email has
tool is the 'Netcraft Toolbar', which is available only for the genuine logos of well known companies, there might be a chance
Internet Explorer and Mozilla Firefox browsers as of now. These of them deceiving you. If you don't get a convincing response
applications help you to report fraudulent sites, and help you from the source itself, you can check on the Internet whether
generate lists of the phishiest web hosts, worldwide. these mails are indeed scams. Various web portals like 'www.fbi.
gov/cyberinvest/escams.htm' and 'www.hoax-slayer.com' provide
READ BETWEEN THE LINES
2 MOST email service providers today have a strong
a comprehensive list of known scam emails. Check them and only
then respond to such emails.
in-built spam guard. Yet, if a scam mail still manages to make
CLICK ON LINKS WITH CAUTION
its way to your inbox, may sure you read the contents twice or
thrice. Every credit company or bank has a specific pattern of
5 THE oldest way to lure unsuspecting victims to submit
correspondence. If you find anything out of the ordinary or see their details is by providing links in emails with names and
too many spelling mistakes, it is advisable to check with your organizations that appear to be original. Irrespective of whether
bank before responding to such emails. If you find such emails the link lands you at a credit card site or an Internet banking site, it
fishy, delete them without a second thought. is advisable to practice safe browsing while surfing the net. Never
click on the link from the emails, instead type the address directly
CHECK THE SENDER NAME AND
3 ADDRESS TEXT
into address bar of your browser yourself. You can browse more
safely if you log in to each website through a different window.
WHENEVER you get an email from a clean source, the sender's Make sure that you log out of the site once you are done. Delete
name would appear in your inbox. If you find an email ID your browsing history and temporary Internet files periodically to
instead of the sender's name, you can delete the email without remain completely safe.
even opening it. Similarly, if the email is addressed to an ID
CHANGE PASSWORDS REGULARLY
like 'john9999@mail.com' or reflects a part of the email ID
like 'Dear john9999' instead, such mails are usually sent from
6 ALTHOUGH you have created passwords which are
unreliable sources which send out bulk mailers as spam. Avoid deemed to be safe and strong, it is a recommended practice to

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


10 TIPS  HANDS ON 17

Sachin Pandit

keep changing your passwords periodically. Most people who these contain their own anti-phishing filters and blacklists to keep
phish into your accounts are not your friends, and they can hack you safe while carrying out online transactions.
into your account without you telling them your password.
UPDATE ANTIVIRUS AND FIREWALL
Make sure that your password is not alternating between two
values alone; your password should not resemble the last
9 PERIODICALLY
three passwords that you had once set. After you change your MOST of the recent anti-virus, anti-spyware and firewall
password take due care to remember it. In most of the credit applications come equipped with upgraded support to tackle
card or Internet banking websites, your account will be blocked fraud related security issues. While the version in your system
if you enter the wrong passwords for more than three attempts is prepared to secure your PC from all the viruses known at the
consecutively, irrespective of the time of your last attempt. time of its creation, the updated packages available add newer
codes to secure your data and online activities from more recent
LOG INTO ACCOUNTS REGULARLY
7 LOG into all your accounts regularly even if you do not
and lesser known threats even more effectively. Most anti-virus
applications post periodic updates on their website which you
want to make any purchases or transactions. Most people take can easily download and incorporate by yourself.
their account statements too lightly. Read and verify each debited
USE STRONG PASSWORDS
and credited amount appearing on your statement. If you find
anything remotely suspicious, report and clarify it with your bank
10 THE cardinal rule of password selection is that you
immediately. If a person has access to your account, he will not should always pick a password that is easy for you to remember
phish into it right away. Staying observant will also help you cut and difficult for anyone else to decode. Also your password
down on unnecessary expenses, and help you keep a tab on your should have a healthy mix of alphabets (both upper and lower
spending habits. cases) and numeric values. That effectively means that you should
avoid using your first name, last name, family name, nickname
USE THE LATEST VERSION OF YOUR
8 WEB BROWSER
or date of birth as passwords. Also avoid using confidential data
like your ATM pins, CVV or social security numbers as passwords
ALWAYS use the latest version of your current web browser. either. Shuffle your passwords well. Don't pick the same username
These browsers come equipped with powerful and updated and password combination for all the websites you sign up to
anti-phishing filters that help you blacklist dubious websites for email accounts. If one gets hacked into, it's not so difficult to
and also avoid browsing to already blacklisted websites. Many guess others. Don't share your passwords with any one. If you are
browsers also have additional add-ons that you can download going to take so much trouble to pick an appropriate password, it
and utilize. Use the latest versions of Internet browsers. Most of is rather wise to keep it to yourself.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


18 HANDS ON  10 TIPS

Protect your laptop


while on the go
One reason people choose laptops over desktop systems
is portability. However, with portability come threats like
theft, natural hazards and other external problems. Here
are some helpful tips to make sure that your laptop is
safe while you're outdoors.
BY GARETH MANKOO

PERMANENTLY TAG YOUR LAPTOP


1 USE TRACKING AND CALL BACK
APPLICATIONS
4 MAKING an impression of your name and the name of
TO help you in times of need, in this case, in theft, we have the organization that you work for can pay off in times of theft or
scores of applications that can ensure that you have some hope loss. You can get it embedded or engraved on your laptop from
of your laptop being returned to you after being burgled. To do a professional studio or use a label or a sticker with your personal
so, these programs use techniques like sending information of information. If you feel that these measures would be too crude
the laptop's current location; this helps in tracing them. Other and would mar the sleek look of your laptop then you can invest
services include call-back applications that call the owner from some more money and go in for tamper resistant 'commercial
the laptop, thus giving away its location. Some notable tools asset tags'. Since these are made of metal there's little chance of
include SecureIT, Stealth Signal and CompuTrace. them peeling of or tearing. This will also help in recovery if you
leave your laptop lying somewhere. Many people also resort to
USE CABLE LOCKS
2 CABLE locks are quite an obvious choice for those who
putting their address and contact number on the laptop.

USE SCREEN GUARDS TO HIDE


feel that their laptops are not safe in an office or a café. These
are used especially in cases where you need to leave your laptop
5 YOUR DISPLAY
unattended for charging. Most of the laptops available these SOMETIMES the information we're dealing with on our laptops
days come with a Universal Security Slot (USS). This slot is used is extremely crucial and cannot be shared with others. Such
to attach a cable lock or a laptop alarm. These devices aren't information like bank transaction details, sensitive letters and
expensive and can keep away small-time thieves. notes and other such personal information have to be protected
from those who would like to use it for all the wrong reasons. To
USE DOCKING STATIONS
3 DOCKING stations are another great means of securing
avoid such attacks on your sensitive information we have screen
guards. These cover your screen from the sides and above so that
your laptops in your absence. While in an airport, hotel, café, you do not face the problem of people peeping into your screen,
train station, a client's office or any other place that would over your shoulder. Adding screen guards however, can cause
require you to get your laptop out of its bag in order to work on the weight of your laptop to increase and will also add to the
it, you could always use these to ensure that your laptop is just number of accesories that you have to carry along.
where you put it when you left the place. Of course, this means
AVOID USING LAPTOP BAGS
of protection is effective only for a temporary period. Given a
bit more time, any thief can get away with your laptop and your
6 IT is common sense to keep the thieves from knowing
docking station to top it off. that you have a laptop with you in the first place. Hence, you

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


10 TIPS  HANDS ON 19

Hemali Limbachiya

should avoid carrying your laptop around in the regular carry codes incase the user has forgotten them. However, in case this
cases that make their contents quite obvious (especially those information falls into the wrong hands you can expect trouble.
that come with the laptop from the vendor). Sometimes these Make sure that you handle such data carefully.
cases even have the brand logo of the laptop they contain,
SECURE YOUR LAPTOP WHILE ON
flashing around in order to endorse it. Many laptop bags are
shaped like regular rucksacks, in order to thwart efforts of theft.
9 THE ROAD
Also make sure that you carry it with you while traveling in TRAVELING in a car with your laptop tucked safely beside
mass transit rather than letting it go along with the rest of your you may not seem like an opportunity for a possible attempt
baggage. However, one should make sure that you do not place of robbery, but this isn't always so. There are times when you
your laptop in an absolutely compact bag in order to conceal it. will need to leave your car. Do not keep your laptop near
The bag should be padded and spacious enough. the window. Always make sure that the windows are closed.
However, there have been instances where laptops have been
DISABLE BLUETOOTH AND
7 INFRARED PORTS
stolen by breaking the car window. Resorting to the use of a
cable lock will come in as a great alternative. It will also help in
WE may feel that it isn't necessary to turn off access to your avoiding misplacement or dropping your laptop.
Infrared and Bluetooth ports, when not in use. However, it is a
CAUTION WHILE TRAVELING BY AIR
very good practice to make sure that these ports are disabled
since we may unknowingly accept harmful files, which may not
10 UNLIKE the vulnerabilities that your laptop faces when
always be intended for us, from these ports. It is also possible to in a car, air travel needs more caution since you are under threat,
hack into PCs using Bluetooth or Infrared. The Infrared port can both inside as well as outside the plane. Outside, the airport is a
be disabled from BIOS as well. feeding ground for laptop thieves. It is quite easy for them to lay
hands on your laptop bag by creating a minor distraction or by
DO NOT LEAVE PASSWORDS
8 WRITTEN ANYWHERE
simply picking it up from your baggage check before you can do
so. It is better to carry your laptop with you while flying rather
ONCE you have gone through the stretched, cumbersome than letting it go with the rest of your baggage. Also, while in
process of setting up the security channels for your laptop to the plane, keep your laptop close to you. It is quite possible that
keep it away from possible attacks, you have a whole new task there may be a thief on-board. Passengers often doze off during
of keeping the information safe. For instance, many people long flights, thus giving thieves a good chance to steal their
keep little scraps of paper that have the password or access things. Just keeping your laptop with you is not enough, also
keys scribbled on them. These help in remembering these make sure that you are alert of co-passengers.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


20 HANDS ON  TIPS & TRICKS

TIPS &
TRICKS
Sachin Pandit

WINDOWS

WINDOWS VISTA installed, then your PC is sure to be at 


Select the 'This account can only use
|a risk. To overcome this problem, you the programs I allow' radio button.

01 can use the in-built Parental Control


feature in Windows Vista. This can
block the installation and access of
A list of applications will now be
displayed.

Select the applications that need to
BLOCK PROGRAMS certain applications on different user be blocked and click 'OK'.
accounts. 
If the program is not mentioned in
THE Internet is loaded with a wide To use this utility, follow these steps: the list, click 'Browse' and select the
range of applications that can be  Go to 'Start | Control Panel'. required program.
downloaded and installed. There are  Click the 'Setup parental controls for 
Once the program has appeared in
also certain kinds of applications like any user' link. the list, select it and click 'OK'.
TuneUp Utilities that can be useful.  Select a user account on the
However these applications can also be resulting screen. WINDOWS VISTA
used for harmful purposes.  Click the 'On, enforce current
If you have multiple users working
on your computer, using different
accounts which have such applications

settings' radio button.
Click the 'Allow and block specific
programs' link.
02
BLOCK WEBSITES
THERE are several websites which give
out malware. Access to such websites
could put your system at risk.
Windows Vista has an amazing feature
known as 'Parental Control' which
allows the administrator to deny
access to certain websites. Other than
this, the administrator can also block
file downloads, view user activity,
block specific applications and a lot
more. Let's take a look at how to go
about it.
 Go to 'Start | Control Panel'.
Select a program you would like to block from the list and click 'OK'. The specified user will not be able to use 
01 the application henceforth.
Click the 'Setup parental controls for
any user' link.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


TIPS & TRICKS  HANDS ON 21


Select a user account on the
resulting screen.

Click the 'On, enforce current
settings' radio button.

Click the 'Windows Vista Web
Filter' link.

Make sure that the 'Block some
websites or content' radio button is
selected.

Click the 'Edit the Allows and Block
list' link.

Enter a website name in the
'Website address' text box.

Click the 'Block' button to block the On the command prompt type SET DEVMGR_SHOW_NONPRESENT_DEVICES=1, run Device Manager, select
02 the 'Show hidden devices' option from the 'View' menu and uninstall hidden drivers as required.
website from being viewed. You can
block any number of websites as
required. hidden devices' option. You will now and select an option as required.

Once done, click 'OK'. be able to view all hidden drivers. Once done, click the 'Save' button to

Right-click the name of a driver
WINDOWS VISTA that is not required and select the WINDOWS XP SP2
'Uninstall' option from the context

03 menu that appears.

WINDOWS VISTA
06
REMOVE OLD DRIVERS DISABLE WRITING TO
USB DRIVES
IF you've recently upgraded your
hardware and installed new drivers,
04 IF your system is being used by
but are still experiencing some DISABLE AUTOPLAY multiple users, then there is a huge
problems, you might need to uninstall possibility of data being leaked
the old drivers to avoid further THE Autoplay option in Windows from your system. Data thieves can
problems. Vista appears whenever a CD/DVD simply plug in a USB device and copy
A major problem here is that these is inserted or an external drive is sensitive data.
drivers are not visible in the Device plugged in via the USB port. This If you're concerned about data
Manager window. In this tip we show feature might be quite helpful but at security, you can disable writing to USB
you how to tweak some system times it may even get really annoying, drives with a simple registry tweak.
settings to get rid of old drivers on especially when it affects your To disable the writing of data to USB
your system. normal work or if you insert optical drives follow these steps:
Follow these simple steps to go discs very often. If you feel that you  Go to 'Start | Run', type 'regedit' in
about the same. no longer require the Autoplay the text box and press [Enter].
 Go to 'Start | All Programs | function, you can disable it. Simply  Browse to the 'HKEY_
Accessories'. follow the steps given below. LOCAL_MACHINE | SYSTEM |
 Right-click the command prompt  To disable Autoplay for all devices, CurrentControlSet | Control |
and select the 'Run as Administrator' go to 'Start | Control Panel'. StorageDevicePolicies' registry key.
option from the context menu.  Under the 'Hardware and Sound'  Right-click anywhere on the right
 On the command prompt, section click the 'Play CDs or other pane and select the 'DWORD
type in 'SET DEVMGR_SHOW_ media automatically' link. (32-bit) Value' option.
NONPRESENT_DEVICES=1' and  De-select the 'Use Autoplay for all  Double-click the newly created key
hit [Enter]. media and devices' check box. and type '00000001' in the 'Value
 To open device manager from  To disable certain devices and to data' field.
command prompt, type in specify the media type click the  Once done, you will have to
'devmgmt.msc' and hit [Enter]. drop-down list (next to the media restart your system for changes
 From the View menu, select 'Show type or device you want to disable) to take effect.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


22 HANDS ON  TIPS & TRICKS

MICROSOFT WORD
WORD 2003 / 2007

01
TRACKING CHANGES IN
A DOCUMENT
IF your data is critical and you want to
ensure that you give restricted access
on the document, you can either
control formatting or editing changes.
To do so using Word 2007:
 Open the document on which the
restriction needs to be applied. If you click the 'Recommended Minimum' button only the recommended settings will be checked, the rest
01 will be automatically unchecked.
 Go to the 'Review' tab.
 Click the 'Protect Document ' option
appearing under the 'Protect' group WORD 2003 / 2007 If you plan to use Word 2007 instead,
at the end of the tab. carry out the following steps:
 

02
Select the 'Restrict Formatting and Open the document.
Editing' option under the 'Restrict  Go to the 'Insert' tab.
Reviewing Options' section of the  Click the 'Table' option appearing
drop-down menu that appears. PROTECTING TABLE under the 'Tables' group of the tab.
 Check the 'Limit formatting to a VALUES  Click the 'Insert Table' option from
selection of styles' option appearing the drop-down menu.
under the 'Formatting restrictions' IF you are not comfortable with  Create a table by setting the number
section of the dialog box. creating forms in your document, and or rows and columns.
 Click the 'Settings' link and check yet need to take user inputs you can  Next, fill out the details that you
or uncheck the required option. use tables instead. All you need to do is want to keep fixed.
 Click 'OK' to continue. create tables with cells containing fixed  Place your cursor on a cell that you
 Next, check the 'Allow only this type values and editable values. To do so want to leave as editable.
of editing in the document:' option using Word 2003:  Go to the 'Developer' tab.
appearing under the  Open the document to which  Click the 'Legacy Tools' option under
'Editing restrictions' section of the restriction needs to be applied. the 'Controls' group.
dialog box.  Go to 'Table | Insert | Table' menu  Select the 'Text Form Field' option
 Select the 'Tracked changes' option command. from the drop-down list.
from the drop-down list.  Create a table by setting the  Repeat the above steps for all the
 Click the 'Yes, Start Enforcing required number of rows and editable cells.
Protection' button to enforce columns.  Next, click the 'Office' button and
restriction settings.  Next, fill out the details that you click the 'Word Options' button
If you are using Word 2003, carry out want to keep fixed. appearing at the foot of the drop-
the following steps:  Next, go to 'View | Toolbars | Forms' down list.
 Open the document on which a to activate the 'Forms' toolbar.  Click the 'Customize' option from
restriction needs to be applied.  Place your cursor on a cell where the 'Word Options' dialog box.
 Go to the 'Tools | Protect you want the contents to be  Select the 'All Commands' option
Document…' menu command. editable. from the 'Choose commands from:'
 The 'Restrict Formatting and  Click the 'Text Form Field' option drop-down list.
Editing' panel appears on the right from the 'Forms' toolbar.  Scroll down and select the 'Lock'
side of your Word window.  Repeat the above steps for all the command. Click 'Add >>' to add it to
 Once you see the 'Restrict editable cells. the 'Quick Access Toolbar'.
Formatting and Editing' panel  Once done click the 'Protect Form'  Click 'OK' to continue.
simply follow the steps as described option from the 'Forms' toolbar.  Click the 'Lock' button on the
above (while using Word 2007). Now no part of your document can 'Quick Access Toolbar' to secure
be edited except the specified cells. your table.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


TIPS & TRICKS  HANDS ON 23

'Break' dialog box.



Create as many section breaks as
required.

Next, go to the 'Tools | Protect
Document…' menu command.

The 'Restrict Formatting and Editing'
panel appears on the right-side of
your Word window.

Check the 'Allow only this type of
editing in the document:' option
appearing under the 'Editing
restrictions' section.

Now simply follow the steps as
above (while using Word 2007).
Once you lock the file for editing, the sections other than those specifically exempted will not be editable,
03 unless there are forms controls in that section. WORD 2003 / 2007

WORD 2003 / 2007 

04
Select the 'Filling in forms' option
from the drop-down list.


03
Click the 'Select Sections' link that
appears below the drop-down list. PASSWORD PROTECTING
 Select the section (or sections) DOCUMENT
PROTECT SECTIONS OF A you want to lock in the 'Section
DOCUMENT Protection' dialog box IF you are working with confidential
 Click 'OK' to continue. data, it is recommended that you
YOU may have created reports where  Click the 'Yes, Start Enforcing password protect such files. Word lets
you need another reviewer to enter Protection' button. you create separate passwords for
details and not tamper with certain  Set a password if required. opening and editing files. Here's how:
sections of the document. For doing If you are using Word 2003 instead,  Click the 'Office' Button.
this certain parts of the document carry out the following steps:  Click the 'Save As' option from the
should be locked while some parts  Open the document to which drop-down list.
should be left open for editing. To restriction needs to be applied.  Click the 'Tools' option on the 'Save
do so using Word 2007, carry out the  Select the data which needs to be As' dialog box.
following steps: editable.  Click 'General Options' from the
 Open the document to which  Go to the 'Insert | Breaks…' menu drop-down list.
restriction needs to be applied. command.  Set the required passwords as per
 Select the data which needs to be  Check the 'Continuous' option from your requirements. Click 'OK'.
set as editable.
 Go to the 'Page Layout' tab.
 Click the 'Breaks' option appearing
under the 'Page Setup' group of the
tab.
 Select the 'Continuous' option from
drop-down list.
 Create as many section breaks as
required.
 Then, go to the 'Review' tab.
 Click the 'Protect Document' option
appearing under the 'Protect' group
at the end of the tab.
 Check the 'Allow only this type of
editing in the document:' option
appearing under the 'Editing You can set the macro security settings directly from this dialog box apart for setting passwords and making
04 files read-only.
restrictions' section.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


24 HANDS ON  TIPS & TRICKS

MICROSOFT EXCEL
EXCEL 2003 / 2007

01
PASSWORD PROTECTING
DOCUMENT
EXCEL helps you create separate
passwords for opening and editing
files, but unlike Word, you cannot
modify the macros settings from this
option directly. Here's how:
 Click the 'Office' Button in Excel.
 Click the 'Save As' option. You can auto create backups for the file by making sure that you check the 'Always create backup' option on
01 the 'General Options' dialog box
 Click the 'Tools' option on the 'Save
As' dialog box. you need to do is create a range of cells  Check the 'Protect worksheet and
 Click 'General Options' from the containing fixed values and editable contents of locked cells' option in
drop-down list. values. In Excel, the cells are locked the 'Protect Sheet' dialog box.
 Set the required passwords. by default, but the users can still edit  Next, check 'Select unlocked cells'
 Check the 'Read-only their content unless you protect the option from the 'Allow all users of
recommended' option to make your worksheet as explained below. Carry this worksheet to:' section.
file read only by default. out the following steps for Excel 2003:  Type a password if required.
 Click 'OK' to save the settings.  Open the workbook to which  Click 'OK' to continue.
restriction needs to be applied. If you plan to use Excel 2007 instead,
EXCEL 2003 / 2007  Next, fill out the details that you carry out the following steps:
want to keep fixed in the cell range  Open the workbook.


02
of your choice. Fill out the details that you want to
 Select the required cell range that keep fixed in the cell range of your
can be edited. choice.
UNLOCKING SELECTED  Go to the 'Format | Cells'.  Select the required cell range that
CELLS  Go to the 'Protection' tab of the can be edited.
'Format Cells' dialog box.  Go to the 'Home' tab.
IF you are not comfortable with  Uncheck the 'Locked' option for the  Click the 'Format' option appearing
creating forms in your document, and selected range of cells. under the 'Cells' group of the tab.
yet need to take user inputs you can  Next, go to the 'Tools | Protection |  Select the 'Lock Cell' option from the
create a semi-locked range of cells. All Protect Sheet'. drop-down list to unlock the cells.
 Next, click the 'Format' option under
the 'Cells' group of the tab once
again.
 This time select the 'Protect Sheet...'
option from the drop-down list to
unlock the cells.
 Check the 'Protect worksheet and
contents of locked cells' option in
the 'Protect Sheet' dialog box.
 Next, check the 'Select unlocked
cells' option from the 'Allow all users
of this worksheet to:' section of the
dialog box.
 Type a password if required.
 Click 'OK' to continue. Your
Setting a password to unprotect your worksheet makes the data more safe and secure. Make sure that you worksheet is ready to be used.
02 pick a password that is long and hard to guess.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


TIPS & TRICKS  HANDS ON 25

EXCEL 2003 / 2007 merely the locking columns will not carry out the following steps:
be enough. Apart from locking the  Open the workbook and press

03
column contents, you will also need [Ctrl] + [A] to select all the cells in
to hide these locked columns. To do the workbook.
so using Excel 2003, carry out the  Go to the 'Home' tab.
DISABLE RENAMING following steps:  Click the 'Format' option appearing
WORKSHEETS  Open the workbook and press under the 'Cells' group.
[Ctrl] + [A] to select all the cells in  Now, elect the 'Lock Cell' option
IF you are creating reports in Excel, the workbook. from the drop-down list to unlock
which need to be edited by someone  Go to the 'Format | Cells' menu the cells.
else, you might want to make sure that command.  Next, select the columns that need
they do not change the worksheet  Go to the 'Protection' tab of the to be protected.
names. Carry out the following steps 'Format Cells'.  Click the 'Format' option appearing
to do so in Excel 2003:  Uncheck the 'Locked' option. under the 'Cells' group of the tab
 Open the workbook.  Next, select the columns that need once again.
 Go to the 'Tools | Protection | Protect to be protected.  Select the 'Format Cells' option from
Workbook'.  Go to the 'Format | Cells' menu the drop-down list.
 Select the 'Structure' option in the command.  Go to the 'Protection' tab in the
'Protect Workbook' dialog box.  Go to the 'Protection' tab of the 'Custom Lists' dialog box.
 Type in a password in the 'Password' 'Format Cells'.  Select the 'Locked' and 'Hidden'
text box.  Check the 'Locked' and 'Hidden' options.
 Retype the password to secure the options for the selected columns.  Click 'OK' to continue.
workbook.  Keeping the columns selected,  Once again, click the 'Format' option
If you plan to use Excel 2007 instead, select the 'Format | Column | Hide' appearing under the 'Cells' group of
follow these steps: menu command. the tab.
 Go to the 'Review' tab.  Next, go to the 'Tools | Protection |  This time select the 'Protect Sheet...'
 Click the 'Protect Workbook' option Protect Sheet'. option from the drop-down list to
appearing under the 'Changes'  Check the 'Protect worksheet and unlock the cells.
group of the tab. contents of locked cells' option that  Check the 'Protect worksheet and
 Click the 'Protect Structure and you see in the 'Protect Sheet' contents of locked cells' option in
Windows' option from the drop- dialog box. the 'Protect Sheet' dialog box.
down list.  Set a password to secure your  Type a password to secure the
 Select the 'Structure' option in worksheet. worksheet further. Make sure that
'Protect Workbook' dialog box.  Click 'OK' to continue. Your data is your password is strong.
 Type a password in the 'Password' now protected as well as hidden  Click 'OK' to continue. Your
text box. from possible threats. worksheet is ready to be used.
 Retype the password to secure the If you are using Excel 2007 instead,
workbook.
Once protected, other users cannot
change the names of the worksheet
tabs, nor can they create new
worksheets or delete existing ones
without the password.

EXCEL 2003 / 2007

04
PROTECTING
WORKSHEET COLUMNS
IF you have confidential data that you This technique is not completely foolproof. The data contents can be viewed using cell reference in an
04 unlocked cell.
need to protect from prying eyes,

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


26 HANDS ON  TIPS & TRICKS

WEB
INTERNET EXPLORER 8 
To look for more Accelerators browser allows you to customize your
for Internet Explorer 8 click 'Find security to a level that you find suitable

01
More Accelerators' under the 'All in the formidable Web environment
Accelerators' menu. The browser will that has scores of viruses and other
open up a page that contains links threats floating around. It's called WOT
USE IE8 ACCELERATORS to an add-ons page that contain (Web Of Trust) and is available as a
various Accelerators that can be Firefox add-on. The representation
Internet Explorer 8 has an exciting added to the browser. Simply click of threatening sites is quite easy to
new feature called Accelerators, that the 'Add to Internet Explorer' button understand while using WOT since
can solve your browsing problems. beside the ones you would like it color codes the sites based on the
Accelerators basically quicken your to add. A dialog box will appear levels that you set. Follow these steps
'website search' by giving you direct on your screen asking you for a to install WOT into Firefox,
links to popular web search tools that confirmation of the same. Click 'Add'.  Visit https://addons.mozilla.org/
can be opened with a mouse click. The add-on link will be added to en-US/firefox/addon/3456
When you install Internet Explorer 8 your list of installed Accelerators.  Click 'Add to Firefox'.
you are provided with Accelerators 
To configure it, again right-click on  Click 'Install' on the dialog box that
that provide you with only those sites the page and click 'All Accelerators | appears on your screen.
that are affiliated to Microsoft, such as Manage Accelerators'. A new dialog  After the add-on is installed you will
Windows Live. Here's how to go about box will appear on your screen. have to restart Firefox.
with using Accelerators: Simply click on the one you installed  Once you restart the browser you
 Open up any webpage on Internet and click the 'Set as default' button will be redirected to the 'welcome'
Explorer 8. Make sure that it is a if you want to set this as the default page of the WOT site. You will come
site that has various elements like Accelerator. You can also 'Disable', across four radio buttons that ask
images and textual information. The 'Enable' and 'Remove' Accelerators you to select the level of protection
best example would be a Google from here. that WOT should use.
search results page. 
Click 'Close' to exit.  Select your level and click 'Finish'.
 Right-click on a link on the page  A green circular logo of the
and in the context menu, you will MOZILLA FIREFOX application will appear on your
see the 'All Accelerators' option. A Navigation toolbar, beside the

02
tray will open up with an option of address bar. Click this button and
Accelerators that are available. click on the rating meter to mark the
 Using these Accelerators you can 'Trustworthiness', 'Vendor reliability',
receive a direct translation of the VIEW TRUSTED SITES 'Privacy' and 'Child safety'. You can
page to the language of your choice. do this by clicking on the color-
You can also blog the article that Mozilla Firefox has an in-built defense coded rating bars.
you are on as well as e-mail it to mechanism that decides which sites  To view the overall score of the site
your contacts. are safe to visit and which aren't. The as per rating of users simply click the
'View scorecard for ratings detail' in
the dropdown box.
WOT can thus help you gain a better
understanding of what risks you
run into whenever you visit certain
websites.

MOZILLA FIREFOX

03
MANAGE YOUR
PASSWORDS SMARTLY
One of the most useful things you can do with Accelerators is translating a webpage in real-time. By default Passwords are always a problem
01 IE8 translates using 'Live Search'.
to handle. Firstly, picking the right

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


TIPS & TRICKS  HANDS ON 27

indicating the strength of the


password. The strongest password
is that which is filled with color.
Click 'Create an Account' again to
proceed.
 Just to make sure that you do not
forget the master password that
you set earlier, LastPass will ask
you to reenter the password. Do
this and click 'Create an Account' to
continue.
 The next options are crucial. Select
the first radio button that lets you
choose the items that you want to
Click on the color-coded ratings bar to let other users know how safe it is to visit a site. To view all results import.
02 click 'View scorecard for rating details'.  Click 'Continue'.
 A smaller dialog box will appear
password always makes us scratch our 
This will launch the setup window. with the list of logins that are
heads, and then comes the problem Select your language of choice and registered to the email address that
of remembering these passwords click 'Create an account'. you had entered. Click 'Import' after
over a period of time. This problem 
On the next form enter the details selecting all.
arises because most of us have multiple that are asked like your email  Keep clicking 'Continue' on the
IDs (or logins) on different sites, and address, master password and following steps to complete the
with all the hype of keeping away other fields. Your master password registration process.
from using the same password in will help you take control of all Once you have done this, the
multiple sites. the information you share with completion of your registration process
There is however something that LastPass, such as passwords of will be confirmed. Make sure that you
can help us out of this mess without various sites that you sign up for. do not share your master password
asking for much. It's called 'LastPass Check all the checkboxes at the with anyone. Every time you visit a
Password Manager'. bottom, especially 'I have read and page that requires you to log in simply
It is a Mozilla Firefox add-on agree with the terms of service ensure that you have signed into
that supports versions from 2.0 to and privacy statement' and 'I LastPass. The application asks you
3.7. Follow these steps to install understand that my encrypted data to enter only the master password.
and configure your passwords with will be sent to LastPass'. The rest is taken care of as your email
LastPass. 
As you fill in the master password, address and password is entered
 Visit https://addons.mozilla you will notice that the bar automatically after a brief reference to
.org/en-US/firefox/addon/8542. below the field is filled with color the application's list of log ins.
 Click the 'Add to Firefox (Windows)'
button.
 The installation dialog box will
open up. Once the installation is
complete, restart Firefox for the
changes to take effect.
 Click the logo on the far right corner
of the navigation toolbar. It can be
found on the right of the search
box. It is shaped like a black square
with a white password character
embedded on it. You will be asked
for your email address and for a
master password.
 Click the 'Create an account' link After selecting the language click 'Create an account'. You will be redirected to the next form where you
on the 'LastPass Master Login' 04 have to enter details.
dialog box.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


28 HANDS ON  WORKSHOP

Lock up your
USB drive
There is always a chance of you losing your USB
flash drives with confidential data in them. Hence,
Hemali Limbachiya

it is a good practice to lock it up with a password.


Here's how you can do it using U3 LaunchPad
on your SanDisk drives.
BY KAMAKSHI S

KEY DETAILS
SKILL LEVEL
STEP 1

Moderate
DOWNLOADING AND INSTALLING
ALTHOUGH U3 LaunchPad comes free of cost with most SanDisk flash drives, you can still
WHAT YOU WILL NEED
download a copy of the drivers. To use the application, carry out the following steps
 SanDisk Flash Drive
 Windows OS
1. Visit 'www.sandisk.in/
 Internet Connection
Retail/DriverDownloads.
WHAT YOU CAN LEARN
aspx'.
 Securing your flash drive
 Safely ejecting USB drives 2. Click the 'U3 LaunchPad
HOW LONG IT WILL TAKE Installer' link.
T30 Minutes
3. Click the 'Download
Drivers (.exe)' on the
next page and save the
'LPInstaller.exe' file.

4. Plug your flash drive


into the system and
complete the installation
as directed.
5. Double-click the exe file
to begin the installation.
Click 'Next' to proceed.
6. Select 'Accept' and click
'Next' on the subsequent
window.
7. If your flash drive already
contains data, check the
'Yes, backup and restore
all data.' Option and click
'Next' to proceed.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


WORKSHOP  HANDS ON 29

8. A summary of options CHIP PLUS TIP


will appear. Check your
SETTING USB
Internet connection and
PREFERENCES
click 'Next' to proceed.
You can change or modify the
9. Follow the listed steps to settings for your USB drive
complete the installation using U3 LaunchPad. To do so,
process. carry out the following steps:
[1] Click the 'U3' icon
NOTE: The application uses appearing in the
a web installation file which Status Bar.
does not work with proxy web [2] Click the 'Settings' link in
servers. the U3 browser window.
[3] Click the 'U3 LaunchPad
Settings' link from the
pop up options of the U3
browser window.
[4] Change the settings in the
'Preferences' and 'Autorun'
sections of the dialog box.
[5] Click 'Close' to close the
dialog box.
STEP 2
CHIP PLUS TIP
SECURING YOUR FLASH DRIVE
ONCE you have installed the application, the next step is to secure your flash drive with a password. UNINSTALLING THE
To do so, carry out the following steps: APPLICATION
Since the application is not
1. Double-click the new installed on your hard disk, a
shortcut in the Start Menu is
drive called 'U3 System
not created among the other
(drive name)'. This is
'Programs'. Hence, you cannot
created after installation. uninstall the application
NOTE: This virtual drive is a directly. To uninstall it, carry
part of your USB drive itself. out the following steps:
[1] Click the 'U3' icon on the
The part where the application
Status Bar.
files are installed is converted
[2] Click the 'Settings' link in
into a Read-only drive and is
the U3 browser window.
displayed as a separate drive. [3] Click the 'U3 LaunchPad
Settings' link from the
pop up options of the U3
browser window.
[4] Change the settings in the
'Uninstall' option from the
dialog box.
2. Click 'Enable Security' [5] Click the 'Uninstall U3
in the 'U3 LaunchPad' LaunchPad' button to
window. remove the read only
partition from your
NOTE: You can also launch the USB drive.
application by clicking the 'U3' [6] Click 'Close' to close the
icon on the Status Bar. dialog box.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


30 HANDS ON  WORKSHOP

CHIP PLUS TIP 3. Type and retype a


password to lock your USB
MONITORING A NON-
drive.
SANDISK DRIVE
If you are using a USB drive 4. If you forget your
which is a not a SanDisk password you will have no
device, you can use alternative option but to format your
applications to monitor it. flash drive.
One such freeware is the 'USB
5. You can type an optional
Locker'. To use the application,
hint question to remind
carry out the following steps:
[1] Visit 'http://bytescout. you of your password if
com/usblocker.html' and you forget it.
click the 'Download USB 6. U3 LaunchPad is
Locker (EXE installer, direct compatible with Windows
download link)' link. OS only. It doesn't work
[2] Save the exe file and install on MAC or Linux OS.
the application.
[3] Go to 'Start | All Programs
| Bytescout USB Locker |
Bytescout USB Locker.exe'.
[4] Click the 'Disable Writing
to USB flash drives' option.
[5] Ensure that 'Use password
STEP 3
protection' is checked. SAFELY EJECTING YOUR FLASH DEVICE
[6] Type a password in the AFTER your work with the USB drive is done, you need to ensure that you unplug it safely for future
dialog box that pops up use. To eject your USB device safely, carry out the following steps:
and click 'OK'.
[7] Click 'Enable Writing to 1. Click the 'U3' icon on the
USB flash drives' and
Status Bar.
retype the password to
unblock your USB drive. 2. Click the 'Eject' button to
remove the drive safely.

3. If you encounter some


error while ejecting click
'Download Programs'.
4. Click 'USB Safely Remove
for PC' in the U3 browser
window.
5. Save and install the
application.

6. Double-click the 'USB


Safely Remove' icon on
the desktop.
7. Select the USB device
appearing under the
'Displayed in the menu'
section.
8. Click 'Stop USB Device' to
eject safely.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


WORKSHOP  HANDS ON 31

Encrypt your
data
Data encryption is a smarter way to secure data as
compared to password protecting files. Learn how

Hemali Limbachiya
you can make your data and other files safe using
SecureCrypt.
BY KAMAKSHI S

STEP 1 KEY DETAILS


SKILL LEVEL

DOWNLOADING AND INSTALLING 


Beginner
SECURECRYPT is a free tool available over the Internet which enables you to encrypt text data in a
WHAT YOU WILL NEED
file as well as data not saved in the text format. To download and use this application, carry out the
 SecureCrypt UE
following steps:
WHAT YOU CAN LEARN
 Encrypting text files
1. Visit 'www.securecrypt.
 Encrypting non-text files
co.nr'.
 Using files as encryption keys
2. Click the 'Download' HOW LONG IT WILL TAKE
button to continue. T30 Minutes

3. Click the 'Download


SecureCrypt Ultimate
Edition (3.0.0)' link.
4. Save the 'sc3_setup_2.
exe' file.

5. Double-click the file to


begin installation.
6. Keep clicking 'Next'
till you reach the final
installation window.
7. Click 'Install'.
8. Click 'Finish' to launch the
application.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


32 HANDS ON  WORKSHOP

REFERENCE
WHAT DOES DATA STEP 2
ENCRYPTION MEAN?
Encryption is a process of
ENCRYPTING AND DECRYPTING TEXT FILES
converting normal text into IF you have important and confidential details in a Word document, then it is always better to
what seems like a sequence encrypt the contents rather than depend on a password. A password can be cracked and the file
of random text also known as can be hacked into. To encrypt a text file, carry out the following steps:
cipher text. The conversion of 1. Double-click the
data into cipher text requires application shortcut
certain formula known as
appearing on the desktop
algorithms. There are several
to start the application (if
algorithms available to help
with this conversion. The
it is not already running).
amount of time taken to 2. Click the 'Encrypt or
encrypt the data forms the Decrypt' logo on the
basis of the encryption. The application window.
Advanced Encryption Standard
(AES) was made available to
the public in around 1998 and
was used by the military. It is
a 256-bit encryption standard
and can encrypt and decrypt
at a mean speed of around 36
mbps. AES-Twofish-Serpent is
a very strong encryption and
can encrypt and decrypt only
6.6 mbps on an average. This 3. Next, click the 'Password
also depends on the system; a Key' button appearing
faster processor will perform under the 'Please select
the task much faster. The RAM what Encryption or
is also a major factor.
Decryption Technique you
wish to use:' dialog box.
4. Click 'OK' on the 'Select
the file that you want
Encrypted/Decrypted'
dialog box.
5. Browse and select the file
from the 'Open' dialog
box and click 'Open' to
load the file.

6. Enter a password in the


'Enter a password key
to Encrypt/Decrypt the
file with...' dialog box as
shown here.
7. Click 'OK'.
8. Carry out the same
process to decrypt the file.
Load the same file and
type the same password
to retrieve file contents.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


WORKSHOP  HANDS ON 33

CHIP PLUS TIP


STEP 3 CUSTOMIZING PDF FILES
Since the application does not
ENCRYPTING AND DECRYPTING NONTEXT FILES create a shortcut in5 the Start
IF you have video files or image files which are not text based, it can be quite cumbersome to
Menu, you cannot uninstall
encrypt such files. Also if you are not comfortable remembering too many complex passwords, you
the application directly. You
can encrypt files by following the steps mentioned below:
can uninstall the application
1. Click the 'Encrypt or either from the Control Panel
Decrypt' logo as before. directly or from the application
itself. If you uninstall it from
2. Click the 'File Key' button
the application, you will
in the dialog box that have to manually delete the
appears. desktop shortcut. Carry out the
3. Click 'OK' on the 'Select following steps:
the file that you want [1] Start the application.
Encrypted/Decrypted' [2] Click the 'Uninstaller' icon.
dialog box. [3] Click 'Next' in the
'uninstaller' window till
4. Browse and select the file you have completed the
from the 'Open' dialog process.
box and click 'Open' to [4] Click 'Finish' and proceed
load the file. to delete the Desktop
shortcut. The application
will be uninstalled.

5. Next, Click 'OK' in the CHIP PLUS TIP


'Select a file that will be REPORTING BUGS
used as the Encryption/ You can report these bugs with
Decryption the file key..' the help of SecureCrypt UE.
to set a key file. Make sure you are connected
to the Internet for reporting
6. Browse and select the key bugs. Once you are ready, carry
file from the 'Open' dialog out the following steps:
box and click 'Open' to [5] Start the application.
load the file. [6] Click the 'Report a Bug'
option on the application
NOTE: The key file should be
window.
a separate file. It can be of any
[7] Your default browser
type. window will open with the
'Bug Report' page of the
software website.
[8] Enter the required details
and enter the characters
appearing in the captcha
7. Click 'OK' to complete the image at the foot of
process. window.
8. Carry out the same [9] Click the 'Submit' button
process to decrypt the file. to log the errors.
Load the same file and
type the same password
to retrieve file contents.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


34 HANDS ON  WORKSHOP

Secure your
web browser
Most popular Internet browsers come along with
Hemali Limbachiya

security features that help you browse safely. Let’s


take a look at these options and how to configure
them accordingly.
BY DOLWIN FERNANDES

KEY DETAILS
SKILL LEVEL
STEP 1

Moderate
CONFIGURING INTERNET EXPLORER
INTERNET Explorer 8 is Microsoft's latest Internet browser. However, its predecessors too have
WHAT YOU WILL NEED
some common security options that can be configured for maximum security. Let's see how to go
 Windows XP or later
about it.
 Internet explorer, Mozilla Firefox or
Google Chrome
WHAT YOU CAN LEARN 1. Run Internet Explorer and
 Configure browser security options press the [Alt] key to view
HOW LONG IT WILL TAKE the menu bar.
T30 Minutes
2. Select 'Internet Options'
from the 'Tools' menu.
3. Click the 'Security' tab.
4. Under the 'Security level
for this zone' section, set
the slider bar to 'High'.
Click a zone, for example
'Internet'.

5. Click the 'Custom level'


button.
6. Scroll down until you see
'Run ActiveX controls and
plug-ins'.
7. Click the 'Disable' radio
button.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


WORKSHOP  HANDS ON 35

8. To add a website to the CHIP PLUS TIP


trusted list, in the 'Internet
USE INPRIVATE
Options' dialog box, click
BROWSING MODE
the 'Security' tab.
IN IE8
9. Click the 'Trusted Sites' If you're using the Internet
icon. from another computer, it
is necessary to clear your
10. Click the 'Sites' button.
surfing history or delete saved
11. Enter a site name in the credentials since it may be
text box and click 'Add'. misused. IE8 comes along
with the InPrivate browsing
NOTE: The 'Trusted Sites' zone
mode option that deletes
contains a list of websites that,
temporary Internet files, form
you feel, are safe for browsing. data, cookies, usernames
You can add a website to the and passwords as well as the
'Trusted Sites' list as and when search history that is normally
required. saved by the browser. Note
that if you're using Windows
Vista and Parental Controls are
activated, InPrivate browsing
mode is disabled by default.
12. To change cookie settings, To browse using InPrivate
click the 'Privacy tab' browsing mode, follow the
from the 'Internet Option' steps below.
dialog box. [1] Click the 'Safety' option.
[2] From the resulting menu,
13. Click the 'Advanced'
select the 'InPrivate
button.
Browsing mode' option.
14. Select the 'Override
automatic cookie REFERENCE
handling' checkbox.
15. Click the 'Prompt' radio WHAT ARE COOKIES?
Whenever you browse a
button for both first and
website, certain data is stored
third party cookies.
on your system. This data is
known as cookie. It can contain
any data that the website
places in it. They are actually
designed to be readable by
the website that stored the
data. There are two types of
cookies i.e. Session cookies
16. You can also manage and Persistent cookies. Session
cookies are cleared as soon as
cookie settings for
the browser is closed whereas
certain websites. To do
Persistent cookies remain on
so, in the 'Internet your system until the specified
Options' dialog box, expiration date. These pose
click the 'Privacy' tab. threat as they stay for a long
17. Click the 'Sites' button. period. These cookies help the
website to uniquely identify
18. Enter the name of the
the visitor which some may
address in the text box
consider as a privacy violation.
and click the 'Allow' or Hence setting cookie options
'Block' button as required. for websites is recommended.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


36 HANDS ON  WORKSHOP

REFERENCE
WHAT IS ACTIVEX?
STEP 2
ActiveX is basically a
CONFIGURING MOZILLA FIREFOX
technology that is used by
FIREFOX has gained popularity over the years and is being used by many. But like Internet Explorer,
Internet Explorer. It allows
it comes with security options that need to be configured for optimum security. To configure
applications to be used by
security settings, follow the steps below.
the browser. An ActiveX
component may already
1. Run Firefox and select
reside on a Windows system
'Options' from the
or it may be provided as a
'Tools' menu.
downloadable object. This
enhances the functionality 2. Click the 'Always ask me
of web browsing. On the where to save files' radio
other hand, it may also pose button under the 'Main
as a security threat if it's tab'. This would make
not properly implemented. you aware of files being
Though it's quite useful, it
downloaded, since some
also increases the chances
files are downloaded
of you being attacked.
without your notice.
Also, installing a Windows
application introduces the 3. Click 'OK' to save changes.
possibility of ActiveX controls
being installed on the system.
Hence one should be aware
of or completely block these
applications from being
installed through the browser.

4. Now, click the 'Security'


tab.
5. Deselect the 'Remember
passwords for sites'
checkbox.
6. If you have saved
passwords previously,
click the 'Save Passwords'
button.
7. Select the credentials
from the list and click
'Remove'.

8. Under the security tab,


make sure the 'Warn me
when sites try to install
add-ons' checkbox is
selected.
9. If you would like to add
exceptions for websites,
click 'Exceptions'.
10. In the resulting window,
enter the name of the
website in the text box
and click 'Allow'.
11. Once done, click 'Close'.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


WORKSHOP  HANDS ON 37

STEP 3 REFERENCE
WHAT ARE BROWSER
CONFIGURING GOOGLE CHROME PLUG-INS?
Plug-ins are extra applications
GOOGLE'S first ever web browser was successfully launched a few months ago and is currently
that can be used by a web
being used by many. Like other browsers, Chrome also comes with security options that are not
browser. By default most
configured by default. Let's take a look at some of these options and implement them accordingly.
plug-ins are not installed since
it may not be required by the
1. Run Google Chrome and
user and at the same time it
click the wrench menu.
also keeps the browser light.
2. Select the 'Options'. Most plug-ins are (by default)
3. In the resulting dialog created by the browser owner
box, click the 'Under the themselves. On the other hand
Hood' tab. there are plug-ins created by
third party users to extend the
4. Select the 'Ask where browser's functionality. They
to save each file before are similar to ActiveX controls.
downloading' checkbox The only difference is they
to be notified of file cannot be executed outside
downloads. the web browser. Adobe Flash
player is an example of a
plug-in. Downloading plug-ins
from a third party might put
your information at stake since
the plug-in may contain code
to steal private information or
even harm your system. Hence
downloading a plug-in, only
5. Click the 'Personal from the browser's default
Stuff' tab. website is recommended.
6. Under the 'Passwords'
section, click the 'Never
save passwords' radio
button.
7. Under the 'Form autofill'
section, click the 'Never
save text from forms'
radio button.

8. Click the 'Clear browsing


data' button.
9. On the resulting window
that appears, select the
checkboxes as required.
10. Make sure the 'Clear saved
passwords' checkbox is
selected.
11. From the 'Clear data
from this period', select
'Everything'.
12. Finally, click the 'Clear
Browsing Data' button.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


38 HANDS ON  WORKSHOP

Protect your files


and folders
Windows operating systems do come with security
features that keep one's system safe. But it does not
include security features that can protect individual
files and folders. Let's see how Universal Shield can
take us to the next level of security by helping us
Brijesh Gajjar

protect individual files and folders.


BY DOLWIN FERNANDES

KEY DETAILS
SKILL LEVEL
STEP 1

Moderate
DOWNLOAD AND INSTALL
UNIVERSAL Shield is a shareware and can be evaluated for 30 days. This application can be
WHAT YOU WILL NEED
downloaded from the link www.everstrike.com/download/ushield.exe Once downloaded, run the
 Windows XP or later
setup file and follow the steps below.
 Universal Shield 4.3
WHAT YOU CAN LEARN
1. Double-click the setup
 Password Protect files and folders
file, select the language as
 Lock Windows folders
HOW LONG IT WILL TAKE
required and click 'Next'.
T30 Minutes 2. Agree with the terms and
conditions by selecting
the checkbox and click
'Next' to continue.
3. You would require
entering a password to
protect the software
from being misused.
Enter the password for
the application and click
'Next'.

4. Click 'Browse' and select


an appropriate folder to
install the application.
5. Clicking the 'View' button
gives you a quick view
of how much space is
remaining on each drive.
6. Click 'Next' to proceed.
7. Once the installation is
completed, click 'Yes,
reboot my computer
now' radio button.
8. Click 'Next' and then
'Finish'.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


WORKSHOP  HANDS ON 39

STEP 2 REFERENCE
WHAT IS UNIVERSAL
USING UNIVERSAL SHIELD SHIELD?
At times you might require
ONCE the installation has been completed, you can now set permissions for files and folders,
sharing your PC with different
encrypt files and lock them. Let's take a look at how to go about this.
users. For security purposes,
you can create separate user
accounts. But what if the user
1. To hide a file or folder,
has to use the main account
run application and
for some or the other reason?
click the 'Hide files'
By allowing the user access
radio button. to the main, you might put
2. Click 'Next' and 'I want confidential information at
to hide a file' or 'I want stake. Hence for additional
to hide a folder' radio security, Universal Shield
button. can come in handy. Using
this application, you can
3. On the next window, click password protect files, folders
the 'Add to list' button or an entire group of files of a
and browse for files or particular file type. Moreover,
folders to be hidden. you can also hide drives and
4. Click 'Next' and then prevent access to certain
'Finish'. objects like the Control Panel
and My Documents.

CHIP PLUS TIP


CHANGE THE MAIN
5. To hide an entire drive PASSWORD
select the 'I want to hide a It is a good practice to change
disk' radio button. the main password of any
6. To hide a group of files, application frequently. While
installing Universal Shield, you
click the first radio button
were asked to enter the main
and then click 'I want to
password for the application
hide a group of files using
so as to protect the application
masking'. itself from being misused.
7. On the next screen, click Also, the main password would
'Add to list' and enter the be required if a user tries to
mask symbol. For eg. to uninstall the application.
hide Word files, enter You can change this
main password as and when
'.doc' and click 'Finish'.
required. To do so, follow the
steps below.
[1] Run the application
8. You can also set files as and select the 'Change
read only. To do so, on the password' option from the
main interface, click 'Set 'Security' menu.
read only access mode for [2] On the resulting screen,
enter the current
objects'.
password and the new
9. On the next screen, select password.
an appropriate radio [3] Confirm the new
button. You can set the password.
read only permission to a [4] Click 'OK' to save changes.
file, folder or a group of
files using masks.
10. Browse for the file/folder
or enter the extension of
files and click 'Finish'.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


40 HANDS ON  WORKSHOP

CHIP PLUS TIP 11. To encrypt a file or folder,


click the 'Encrypt selected
USING THE STEALTH
files and folders' radio
MODE
button on the main
The Stealth mode option in
Universal Shield hides the interface.
entire program including the 12. On the next screen select
files and icons from being whether you want to
displayed on your system. By encrypt a file or folder
doing so, one wouldn't be and browse for it.
aware that the application is
installed on the system. If the
13. On the next screen
program is in Stealth mode, you will have to enter a
you would require using 'hot password for the file or
keys' to start the application. folder and confirm it.
Hence we would first have to
set hot keys. Let's take a look at
how to go about it.
[1] Run Universal Shield and
select the 'Set hot keys'
option from the 'Options'
menu.
[2] Select the 'Enable hot 14. On the next screen select
keys' checkbox. an appropriate option
[3] Click on the 'Open from the drop-down list
Universal Shield' and click 'Finish'.
textbox and press a key
15. To later decrypt the file,
combination. For example
run the application and
'Ctrl + Shift + U' and click
'OK'.
select the file from the
[4] Now to run the application main interface.
in stealth mode, select the 16. From the 'Encryption'
'Stealth mode' option from menu, select 'Decrypt'.
the 'Security' menu.
17. Enter the password for the
file and click 'Start'.

18. Other than simply


protecting particular
files and folder, you can
also lock objects like My
Documents, Favorites,
History, Control Panel,
date and time settings
as well as the desktop.
To lock these items, from
the 'File' menu, select
'Universal Shield Wizard'.
19. Select the 'Security
tricks' radio button and
click 'Next'.
20. Once done, click 'Finish'.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


WORKSHOP  HANDS ON 41

Staying safe on
Facebook
With all the good things we have on Facebook,
Hemali Limbachiya

there's a fair share of threats that can make life on


the website quite difficult. Here we will see some
basic steps to protect yourself from possible attacks.
BY GARETH MANKOO

KEY DETAILS
SKILL LEVEL
STEP 1

Moderate
PICKING A STRONG PASSWORD
THOUGH Facebook has its share of precautionary measures to keep your privacy intact, there
WHAT YOU WILL NEED
are always a bunch of hackers who are a step further than your protectors. Hence it is important
 Internet connection
to strengthen the first level of security to keep away the most common threat of all: hackers. For
WHAT YOU CAN LEARN
this to be made possible, the attacker should have your password, using which he can log into
 Change your password
your account and do all the damage he wants. So picking a good password, that's hard to guess,
 Block contacts
is always important. The following step will help you reset your password to a stronger one, if you
 Customize privacy
feel that your current password isn't strong enough,
HOW LONG IT WILL TAKE
T30 Minutes
1. Log into your Facebook
account using your
current ID and password.
2. Once you are on your
home page click 'Settings'
on the top bar.
3. By default you will be
directed to the 'Settings'
tab. Under this, look for
the 'Password' section and
click 'Change'.

4. You will be asked to enter


your old password once
again. Enter your old
password correctly here.
5. The next textbox will
ask you to enter the new
password that you want
to set. Once the password
strength is 'Medium', it
means that you have a
fairly strong password.
6. Click 'Change Password'
once you're done.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


42 HANDS ON  WORKSHOP

STEP 2 CHIP PLUS TIP


SECURITY QUESTION
Like most other sites that
KEEPING A TAB ON YOUR PRIVACY
require you to create a login
THOUGH it may seem as a very safe platform to maintain your contacts, Facebook has its share
ID and password, Facebook
of villains who may act as harmless members. They can use your images, videos and personal
too has a special section
information to tarnish your image or for their own personal gain. The following steps help you
that requires you to enter
ensure that you have complete protection to your privacy.
a security question. The
1. Firstly, make sure that you importance of this question is
do not reveal any kind often undermined since it is
of personal information rarely required. However, this
misconception can get us into
like phone numbers,
serious trouble if our account
addresses and other
has been hacked into or if we
details that can be used have forgotten the password
against you. that we had set.
2. If you have photographs Facebook's administrators
uploaded that you would can help us get our lost
like to protect from or stolen account back if
unwelcome viewers then we remember the security
question. There is a way to set
click the 'Privacy' link on
this question. Make sure that
the bottom of the page.
you enter a question wisely. It
would be best if the answer to
the question is a little known
fact to others. Here's how you
can set the question,
[1] Click 'Settings'.
3. If you do not see it the [2] Click the 'Change' link in
click the 'Settings' link on the 'Security Question'
the top bar of the site. section.
[3] Select the question from
4. Look for 'Privacy' and click the dropdown box and
the 'Manage' link that's enter the answer to it
alongside it. in the textbox provided
5. You will be redirected below.
to the 'Privacy' page of [4] Click 'Change Security
Question'.
Facebook. Once there
click 'Profile'.

6. Click the dropdown box


beside each entry and
select if you wish to
share that part of your
profile with 'Only Friends',
'Friends of Friends' or with
'Everyone'.
7. Click 'Save Changes'.
8. After the changes are
saved you will remain on
the same page. Stay on
this page in order to carry
out the next steps.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


WORKSHOP  HANDS ON 43

CHIP PLUS TIP


RECEIVE FREE PHONE
STEP 3
NOTIFICATIONS BLOCKING CERTAIN CONTACTS
There may be times when you
FIRSTLY it is important to ensure that you do no upload photographs that could be misused in the
cannot access your Facebook
hands of random people across Facebook. Do not upload obscene or personal photographs since
account. Taking advantage
they may entice suspects to portray a wrong image of you on the Internet. If you are still on the
of this situation, certain
page from the previous step then carry out the following,
pranksters or other nuisances
may resort to posting some 1. Click 'Edit Photo Albums
rather lewd comments on Privacy Settings'.
your recent activity. You can
2. You will see the albums
keep track of all this activity
by subscribing to cell phone that you have uploaded.
notifications. With this you can Select who you wish to
be well aware of what people share these albums with.
are posting on your Wall as 3. To set customized settings
well as the comments posted click 'Customize'.
on your activity.
Follow these steps to 4. A dialog box will appear
activate these notifications: on your screen that will
[1] Click 'Settings' on your display the similar privacy
Facebook profile. options for your photo
[2] Click the 'Mobile' tab. albums in addition to a
[3] Click 'Register for section called 'Except
Facebook Mobile Texts'. These People'.
[4] A dialog box will appear
within your browser.
Select the name of your
country and the carrier 5. Enter the names of
(network service provider) contacts in your friends
that you use. list. The name will
[5] Click 'Next'.
appear as you type it
[6] You will receive a message:
by a character match.
'Using your mobile phone,
send a text message
Simply click the name of
containing only the letter the contact and it will be
'f' (without quotes) to added to the list of entries
********** (**FACEBOOK).*' for which that particular
[7] Click 'Next'. album will be blocked.
[8] You will receive an 6. Once you are done
activation code which you
specifying your settings
will need to enter into the
click 'Okay'
textbox provided.
[9] Click 'Confirm'.

7. Click 'Save Settings' to


finalize your changes.
8. Click the 'Privacy' link on
the top to go back to the
privacy page.
9. Here you will come across
a 'Block List'. This list
will allow you to block
individual members.
Simply enter their names
or their email addresses in
the textbox provided and
click the 'Block' button.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


44 HANDS ON  WORKSHOP

STEP 4 CHIP PLUS TIP


REMOVE FRIENDS FROM
BLOCKING SEARCHES AND APPLICATIONS YOUR LIST
If you are being harassed by
FACEBOOK has some very helpful applications and games that are quite addictive as well as fun.
someone on your list you can
Some of these applications retrieve information from your profile such as your images and personal
block them by following the
data. This can cause some personal information to land up at in the hands of the wrong people.
procedure described in 'Step 3'
However, at the same time, our personal information can be mined out from search engines that
of this story or you can simply
scan through Facebook. Hence it is necessary that we follow these steps to keep our profiles away
remove them from your list.
from such problems.
There is however a difference
in what happens after each of
1. Click 'Settings' on the top these steps. Simply removing
bar. contacts from your Facebook
2. Click the 'Manage' link in friend list still gives them the
the 'Privacy' section. liberty to add you again or
send you messages. Blocking,
3. Click 'Search'. on the other hand, ensures
4. Select your 'Search good riddance of your
visibility' and also check problems.
or uncheck the visibility To remove a contact, simply
on search engines outside visit the profile of the contact
Facebook by clicking the by looking him/her up from
the 'Search' textbox. Scroll
last checkbox.
down to the bottom of the
5. Click 'Save Changes'. contact's profile till you spot
the 'Remove from Friends'
link. Click this link to remove
the contact from your list and
confirm your actions.

CHIP PLUS TIP


CHANGE YOUR IDENTITY
It is quite simple to change
your identity on Facebook if at
all you feel that you are stalked
by someone. By doing so you
can put in your pet name or
6. Go back to the 'Privacy'
nickname, instead of your real
page by following the name, and just your initial as
above steps or by simply the second name. You need to
clicking the 'Back' button remember that impersonation
on your browser. of someone else is treated as
7. Now that we have hidden a serious crime. Hence, avoid
doing so.
our profile from searches,
You can also change your
we will now see how
email address to prevent you
we can isolate it from
from being found in searches.
applications that access Follow these steps to do
our personal information. the same:
Click 'Applications'. [1] Click 'Settings'.
8. You will come across a [2] Under the 'Settings'
brief overview of what tab you will see 'Name',
'Username' and 'Email'
the implications of using
with 'Change' links beside
applications can be. Click
them.
the 'Settings' tab.
[3] Click the respective links
9. Uncheck those elements to change your profile
in your profile that you name and your email
do not wish to share with address.
applications.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


WORKSHOP  HANDS ON 45

Handling infected
pen drives
It has always been a constant threat to copy data
from a pen drive that has been used on an infected
PC. We teach you how to keep safe from infected

Brijesh Gajjar
pen drives.
BY GARETH MANKOO

STEP 1 KEY DETAILS


SKILL LEVEL

FORMATTING USING LINUX 


Intermediate
THERE are several means of formatting your pen drive without letting the virus infect your PC. The
WHAT YOU WILL NEED
most popular technique is to format it using operating systems other than Windows, such as Linux.
 Internet connection
 An infected pen drive
1. The reason we use Linux
WHAT YOU CAN LEARN
as the primary means of
 Formatting your pen
virus elimination is that drive
there aren't too many  Getting rid of infections
threats that can affect a HOW LONG IT WILL TAKE

Linux machine. T45 Minutes

2. Insert your pen drive,


locate the 'autorun.inf'
file that is infected and
simply delete it from
your pen drive.

STEP 2
TACKLING THE INFECTED 'AUTORUN.INF' FILE
VIRUSES often travel across computers on USB drives by taking the form of the 'autorun.inf' file.
This file is used to launch the 'Autorun' dialog box when the pen drive is inserted into the USB port.
Once infected by such a virus, a copy of the same is made on all drives of the affected PC. Every
time the drive is inserted, the virus is executed. Hence it is best to prevent the 'Autorun' feature in
the first place. After doing that we will see some tools that can help avoid infections.

1. The first step is to disable


the Autorun feature. Click
'Start | Run'. Enter 'gpedit.
msc' and hit [Enter].
2. On the left pane of the
'Group Policy' window
that opens up, navigate to
'Computer Configuration |
Administrative Templates
| System'.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


46 HANDS ON  WORKSHOP

CHIP PLUS TIP 3. Under the 'System' section


look for the entry called
PANDA USB VACCINE
Another, very helpful 'Turn off Autoplay'. By
application that keeps away default, this entry has its
threats from infected USB 'State' as 'Not configured'.
drives is Panda USB Vaccine. It 4. Double-click 'Turn off
can be downloaded from here: Autoplay'.
http://research.pandasecurity.
com/archive/Panda-USB-
5. Click the 'Enabled' radio
Vaccine-with-NTFS-Support. button on the dialog box
aspx. The application deals that opens up.
with your file systems smartly. 6. From the 'Turn off
Once you download the Autoplay on:' dropdown
application and launch the list select 'All drives'.
installation process, you will
come across the 'Configuration 7. Click 'OK' to save the
Settings' dialog box. Select the settings.
'Run USBVaccine automatically
when computer boots' and
the 'Enable NTFS file system
support' checkbox.
Once installed, make sure 8. Besides blocking 'Autorun'
that the vaccination of your PC we can also take the aid
is done so that you aren't faced of external software that
with any future threats from help us tackle the most
infected pen drives. Open the common problems faced
main interface after installing
with USB.
your drive. Select the name
of the drive from the 'Select 9. Visit the site 'http://
an USB drive' dropdown box download.cnet.
and click the 'Vaccinate USB' com/Autorun-Virus-
button. Remover/3000-2239_4-
10862968.html'.
10. Click the 'Download the
latest version' link.

11. The file that will be


downloaded will be in ZIP
format. Right-click the file
and extract it.
12. Double-click the 'Setup.
exe' file and install the
application.
13. Click 'Start' after making
sure that the 'Removable
Media' checkbox is
checked. This application
is quite effective in
eliminating the most
common threats that we
face via USB.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


WORKSHOP  HANDS ON 47

CHIP PLUS TIP


STEP 3 DISABLE USB PORT
FROM BIOS
FORMATTING USING DOS If you do not want your
JUST like we had removed the infection with the help of Linux, we can do the same with the help
USB port to be used in your
of DOS. However, this process is more diagnostic in nature. It is best to use it when you are sure that
absence you can simply
the infection is already in your PC. Here's how to go about it,
disable it by tweaking a few
1. After detecting an BIOS settings. Simply restart
infection in your pen drive your computer and press the
restart your computer. [Del] key to go to your BIOS
setup. Once in the BIOS setup
2. Keep pressing [F8] during simply go through the menus
the boot-up process. and look for the option that
3. From the menu that lets you disable the USB port
comes up, select the 'Safe from BIOS. This is mostly under
Mode with Command the 'Integrated Peripherals'
Prompt' option using section. Simply set this as
'Disabled' and save your
your arrow keys and press
settings before quitting so
[Enter].
that the changes take effect.
4. In the DOS prompt type Adding a BIOS password after
'C:' and press [Enter]. that can also help.
You can also disable the
port from Windows by right-
clicking on 'My Computer' and
selecting 'Manage' from the
5. To display files that are context menu. Look for 'Device
hidden type in 'DIR /AH' Manager'. Make sure that
and hit [Enter]. If you do you disable all the 'Universal
not see the file called Serial Bus Controllers' in the
'autorun.inf' then your list by right-clicking them and
system is not infected. selecting 'Disable'.
6. If you do then type in
'TYPE autorun.inf' in the
next line and hit [Enter].
7. Type in 'DEL C:\autorun.
inf'. This will delete the
infection from 'C:' drive.

8. Once done, type in


'MSCONFIG'.
9. This will open up the
'System Configuration
Utility' dialog box.
10. Click the 'Startup' tab
and uncheck the entry
'sample-virus'. Click 'OK'
and restart your machine.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


48 SPECIALS  PC DOCTOR

Help! I do not want


Sachin Pandit

Windows Firewall
Windows Firewall is a great security application, however
there are times when this helpful tool can turn hostile
against us and bring out problems rather than solutions.
BY GARETH MANKOO

+ CONFIGURING
WINDOWS FIREWALL
Firewall for their smooth functioning.
This does pose a threat for those who do
and click 'OK'.
3. The 'Windows Security Center'
not have any other security applications window will open up.
PROBLEM: or anti-virus suites installed on their 4. Click the 'Windows Firewall' logo
I had earlier disabled Windows Firewall systems; since Windows Firewall is the at the bottom under the 'Manage
on my Windows XP system because I default, first level security provided by security settings for:' section.
found it quite annoying. However, I have Microsoft for its operating systems. 5. The 'Windows Firewall' window
been advised that it is quite an important It is best advised not to disable the will open up. Click the 'On
tool and that it will help in maintaining firewall but rather configure it to suit (recommended)' radio button to
a first level of security for my computer. your needs. This also includes adding enable your firewall again.
How do I enable it again and reconfigure frequently used applications to the 6. Make sure that the 'Don't allow
it to function normally? Also, I would exception list of firewalls so that it doesn't exceptions' checkbox is not
like to know how to add programs to the interfere with their smooth functioning checked.
'exception list' of the firewall so that it anymore. Follow these steps to 7. Click 'OK'.
doesn't block these applications without reconfigure Windows Firewall and create This step will enable the previously
my permission in the future. an exception list: disabled firewall. Now if you want to
Make sure that you are logged into the add exceptions to the firewall so that
SOLUTION: administrator account on your computer. it doesn't block any application in the
One of the main reasons we have Windows Firewall can be handled by future, follow these steps:
people disabling Windows Firewall is its administrators only. Guest accounts do 1. Follow the above procedure to open
interference with certain, commonly-used no have access to its settings by default. up the 'Windows Firewall' window.
applications. In fact, some applications 1. Click 'Start | Run'. 2. Once it opens up click the 'Exceptions'
even advise users to disable Windows 2. In the textbox, type in 'wscui.cpl' tab.
3. In this, click the 'Add Programs' tab.
4. A list of programs will be displayed
in the next dialog box that appears.
Select the name of any application
that you use frequently or one that is
often blocked by Windows Firewall.
If you cannot find the name of the
program in the list of applications,
click 'Browse' and manually locate it.
5. Click 'OK' once you're done.
Now run the application to check if
Windows Firewall still interferes with it.
If you still experience problems with the
application running then you will have to
When you open the Windows Security Center window, you are notificed if the firewall is 'ON' or 'OFF'. Click the 'Windows resort to the cumbersome procedure of
Firewall' logo to open up the firewall settings dialog box.
disabling Windows Firewall while using

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


PC DOCTOR  SPECIALS 49

specified in the DOS prompt.


8. In the 'Tasklist' file, look for the name
of the program that was causing
problems. Beside it, you will notice
the column that enlists the PID (port
identifier) that it uses. In this example
(below), you will see that it is a
program called 'myprog.exe' and that
the PID is 680.
9. Look for the similar PID in the 'Netstat'
file. If the port numbers used is
more than or equal to 1024, then it
is evident that the application uses
After clicking 'Add Program' a dialog box with a list of applications will appear on your screen. Click 'Browse' if you more than just a single port. It pretty
cannot find the application you are looking for.
much means that you will not be
it and then enabling it again once accessed by third party applications able to resolve the issue by opening
you're done. even when it is running. However, to individual ports.
It's better to get yourself a complete address this problem you need to first If in the above steps, you notice that the
third party firewall that is compatible determine which ports are required by port number is lesser than 1024 then
with your application. the application that you're running. carry with these steps to block individual
You may also need to add a port to There are a couple of means by ports:
the list of allowed exceptions. Refer to which you can find out which of the 1. Click 'Start | Run'.
the next problem for an elaboration on ports (which are normally blocked by 2. In the textbox, type in 'wscui.cpl' and
the same. Windows Firewall) are needed to be click 'OK'.
opened. You can contact your program 3. In the 'Windows Security Center'

+ ADDING PORT
EXCEPTIONS
vendor for assistance on which ports
should be enabled or use a simple DOS
window that opens up click the
'Windows Firewall' logo at the bottom
command to find out which ports are under the 'Manage security settings
PROBLEM: being accessed. Follow these steps for for:' section.
I have Windows Firewall enabled on my the same: 4. The 'Windows Firewall' window
PC but because of this certain ports are 1. Launch the application that's will open up. In this, click the
blocked. A software application I use does causing you problems. 'Exceptions' tab.
not work, since it requires a particular 2. Click 'Start | Run'. 5. Click 'Add Port'.
port to be opened. Does Windows 3. Type in 'command' and hit [Enter]. 6. Type in the details of the port that
Firewall have a provision to allow only 4. In the command prompt enter 'netstat you got either from your vendor or
particular ports to be enabled? How can I -ano > netstat.txt'. by using the procedure above.
tell which ports are being used? 5. Hit [Enter]. 7. Click 'OK'.
SOLUTION: 6. Similarly, enter 'tasklist > tasklist.txt ' 8. The program should work fine now
Yes, Windows Firewall allows you to 7. Open both the files, 'Tasklist.txt' even with Windows Firewall enabled
specify individual ports that can be and 'Netstat.txt' from the location and running.

Look for the common port identification number 'PID' in both the 'netstat' as well as the Enter the name of the application, the port number and the type of protocol (TCP/UDP)
'tasklist'. This will help you determine the port in the 'netstat' file. and click 'OK'.

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


50 SPECIALS  DR. KNOW

Dr. KNOW
Get to know what a Virtual Firewall is. Also learn
more about RAID and SNMP.
Sachin Pandit

BY DOLWIN FERNANDES

What is SNMP? Q WHAT IS RAID?


SNMP stands for Simple Network A RAID is an acronym for
Management Protocol. It is basically Redundant Array of Inexpensive
used for network management Disks. It is a technology that allows
purposes. It can monitor devices computer users to gain a high level
attached to a network. It is basically of reliable storage space from
a component of the Internet Protocol low-cost PC-class disk-drive
Suite as defined by the Internet components. This is done by
Engineering Task Force. This protocol arranging devices into arrays for
consists of a set of standards that is redundancy. It is basically used as a
used for managing the network within term for computer data storage
an organization. In an SNMP scenario, schemes that can divide and
one or more computers having replicate data across different hard
administrative privileges have the task disk drives. There are different
of monitoring or managing a group schemes for example, RAID 0, RAID 1, etc. Its design generally involves achieving two
of hosts or devices on the network. goals. The first being increasing data reliability and the second, improving the input/
The SNMP protocol operates in the output performance. When there are multiple physical disks set up to use RAID
Application Layer of the OSI model. technology, they are usually said to be placed in a RAID array. This array thus gives out
SNMP uses ports 161 for the agent and data across different disks, but the array that is used is seen as a single disk. The best
162 for the manager. The manager can part is that RAID can be used to serve several different purposes.
send requests from any source port
to port 161 i.e. the destination port. Q WHAT IS A VIRTUAL FIREWALL
The agent will then respond with a
reply to the source port. The manager A FEW years ago, when virtualization was used for development and test
receives notifications like TRAPs and organizations, security was not an issue. It was used for easy access to multiple
INFORMs on port 162. The agent can operating systems that were installed on a single server. Since it was successful,
then generate notifications from any virtualization spread to production-oriented
free port. data centers within major corporations. It
helped create networks of virtual machines
within physical servers. Today as we see that
virtualization has moved to the cloud, there
is a high risk for exploits. Virtual firewalls are
built specifically to lessen the risks of virtual
networks. It is basically a packet filtering
firewall that is installed as a software in a
virtual environment. It also provides control
of inter-VM traffic. Hence it can protect and
lessen the risks of viruses, worms and Trojans
in a virtual environment.

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT | NOVEMBER 2009


IN DETAIL  SPECIALS 51

More on IP concealment
We are all aware of what IP addresses are. Let’s get to know the different methods for IP
concealment and how it works.

Although different users use different available, even the user name and log-in since the connection changes every ten
technologies, all anonymizers have one password for the VPN client. Theoretically, minutes. Even then, monitoring one
thing in common. Whoever wants to surf even the authorities have it easy here. The session would suffice to obtain
anonymously needs an anonymous IP. Data Retention makes it mandatory for sensitive data.
Here, the user can pick between three German VPN operators to hoard up the IP Mix cascades are also configured like
methods i.e. VPN (Virtual Private Network), addresses. Whether and in which scope the Onion Routing, for e.g. John Doe
Onion Routing and Mix cascades. they need to release the IPs of the user where the user connects to a server (Mix)
In the case of VPN, the user must first has not yet been explained conclusively. that encrypts the enquiry and forwards it
install a client software, which latches Just two months ago, the District Court to other servers (mix cascades). But instead
itself on to the system and automatically of Bamberg decided that an anonymizer of using free nodes here, the operators
intercepts all packages sent in the service cannot indiscriminately be forced back specific providers. All users that surf
network. Thus, the enquiries first go to a to give out the data of its clients, it is using the same mix cascades are also
server via an encrypted tunnel and this compelled to do that only in the case of forwarded over the same route. Thus,
server forwards the user to the respective severe criminal offences. it is possible for the server to mix the
website with a new IP. The accessed URL The Onion Routing, for instance the connection data of all users to additionally
remains invisible for the private provider. Tor network has a completely different complicate the traceability of a person.
Only an anonymous IP is forwarded to approach than that by VPN. Here, the user The data retention problem also
the website operator. VPN servers are does not use a fixed server but many free principally applies to the mix cascades.
extremely quick but have a fundamental proxy servers. A website enquiry is sent However, it can be dealt with, if the client
disadvantage. The client must be able via three Tor servers that are constantly can determine the location and the
to trust his provider. This is because changed and re-encrypted at every operator of the mix. If he uses three servers
although the user surfs anonymously station. Identifying a particular user in this from three different providers for instance,
outwardly from there on, his complete network is barely possible. The connection tracing back would only be possible with
data is available on the servers of the VPN can be monitored if the invader keeps a a lot of effort. Moreover, if the mixes are in
service. If a hacker ferrets out this server, check on the first and last node. But this three different countries, the chances of
he gets the IP address of the user and, if does not lead to a complete user profile the data snooper are almost nil.

USER
A client encrypts
the request,
when a user WEBSITE
calls a website

w
w
IP w.c
es .in

-A hi ip
dd p.in .ch r
s

res w d
s ww -Ad
IP
PROVIDER
No traceability
PROXY SERVER
www.chip.in
of the IP-Address The proxy server
Concealed requested assigns a
website new IP and
Open
forwards the user

NOVEMBER 2009 | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT


RNIRNI
Registration No. No.
Registration MAHENG/2003/12687
MAHENG/2003/12687

You might also like