Currently Viewing Posts Tagged security

Twelve Ways to protect yourself from Identity Theft

I read the Twelve Ways to protect yourself from Identity Theft on “Digital Home”.
It shows about 25% Canadian have either themselves personally (4%), or know someone who has (20%), been subject to identity theft.
What is Identity Theft?
The federal office of the Privacy Commissioner of Canada defines identity theft as the unauthorized collection and use of your personal information, usually for criminal purposes. The government says that every year, thousands of people are victims of identity theft.
Why do criminals want this information? Your name, date of birth, address, credit card, Social Insurance Number (SIN) and other personal identification numbers can all be used to open credit card and bank accounts, redirect mail, establish cellular phone service, rent vehicles, equipment, or accommodation, and even secure employment.
If a thief gets a hold of your personal information, then they can rack up huge bills, charges, bad cheques, and taxes that would become your responsibility.
In 2004, PhoneBusters National Call Centre, the national call centre dedicated to the prevention of deceptive telemarketing, received 11,001 identity theft complaints by Canadians, amounting to more than $18.3 million in fraud losses.

Continue reading “Twelve Ways to protect yourself from Identity Theft”

Protect Your Identity in Stores and Online

I received my free Consumer Reports 2006 buying guide last week.
This article, “Protect Your Identity in Stores and Online”, is very helpfull for everyone, I think.
The following is the excerpt of it.
It is very hard to go shopping without worrying about identity theft. Credit cards, debit cards, personal checks, and registrations can put you at risk of joining the estimated 10 million people who have been victimized in the past year. Fortunately, there are some simple steps you can take to reduce your vulnerability to identity theft.
One of the best shields against ID theft is being vigilantly aware of the status of your finances and your credit report.
Keep an eye on your accounts.
Check every items on your monthly statement.
Watch for monthly utility bills.
Check with your utility companies if a bill doesn’t arrive on time.
In USA, everyone has the right to a free copy of their credit report once every 12 months from the each of the three credit reporting agencies – Equifax, Experian, and TransUnion. To order copies of your reports, go to the site authorized by the Federal Trade Commission, www.annualcreditreport.com. or call 877-322-8228.
Freeze your credit.
Some states have security-freeze laws that require credit reporting agencies to lock up your credit reports upon your request. This prevents anyone from seeing your report without your unfreezing it.
Keep your data to yourself.
Take care of your own security information.

Continue reading “Protect Your Identity in Stores and Online”

No Mail Relay

I saw a lot of spamers use my email server to send their Junk mails.
To stop it. I have to set up my IMail server to No Mail Relay.
Previously I wrote Stop third party email relay
Now, I stop the third party mail relay totally.
No Mail Relay
With this option, IMail will not relay mail through the server unless the sending user authenticates. On the SMTP Security tab, make sure that ‘Disable SMTP “AUTH” reporting’ is NOT selected. (In version 8 and higher, this option is on the SMTP Advanced tab).
No Mail Relay is the best solution for customers who are unable to choose ‘Relay mail for Addresses’ because their users connect using dynamic IP Addresses.
After setup in the server side, inform all email users to config their email client software.
How to Enable SMTP Authentication in Eudora:
1.) Go to Tools -> Internet Options.
2.) Select the “Sending Mail” category from the list on the left.
Make sure the “Allow Authentication” option is checked.
3.) Click OK
4.) Restart Eudora for these changes to take effect.
How to Enable SMTP Authentication in Outlook Express:
1.) Go to Tools -> Accounts.
2.) Choose the email account, click “properties” button.
3.) Select “Servers” Tab.
4.) Under “Outgoing mail Server”, check option “My server requires Authentication”.
5.) Click OK, then close the “internet accounts”.

Privacy Pioneer Promises Secure VOIP

LAS VEGASPhil Zimmermann, the celebrated cryptographer who created PGP (Pretty Good Privacy) for e-mail encryption, is taking a shot at securing VOIP communications.
Zimmermann took the stage at the Black Hat Briefings here to show off Zfone, a prototype application that encrypts voice-over-IP calls to thwart man-in-the-middle eavesdroppers.
Using the open-source, cross-platform softphone Shtoom and the Diffie-Hellman key agreement protocol, Zimmermann has developed a session-based encryption tool that lets two users on a SIP (Session Initiation Protocol)-based VOIP connection verify each other’s identity to avoid snooping.
“I don’t think I have to make the case too much as to why you need secure VOIP,” Zimmermann said in a chat with reporters after his presentation. “As we move our phone calls from the relative safety of PSTN [public switched telephone networks], we will have to deal with the weaknesses and vulnerabilities associated with the Internet.”
“Every day, I look at my server console, I see attempts to break in. It’s nonstop. As our phone calls move from the PSTNs to the Internet, not to protect those calls seems like a very bad idea,” he added.
Zimmermann is no stranger to securing voice communications. In the early 1990s, he created the PGPfone software package, which combined speech compression and cryptography protocols to secure voice calls. But the idea never took off, because, as Zimmermann explains it, “the Internet just wasn’t ready for it.”

Continue reading “Privacy Pioneer Promises Secure VOIP”

Wireless Network Concern

Now more and more network build by wireless equipments.
There are still something concern.
1) What is the range of wireless?
improve_02

Types of Wi-Fi Network
Protocol Maximum Speed Average Speed Wireless Range
802.11a 54Mbps 27Mbps 12m indoors, 30m line-of-sight outdoors
802.11b 11Mbps 4.5Mbps 30m indoors, 120m line-of-sight outdoors
802.11g 54Mbps 7Mbps (in compatibility mode), 16Mbps (with other 802.11g devices) 30m indoors, 120m line-of-sight outdoors

Standard construction walls can reduce the transmission distance by as much as 50%.

So, put the wireless router in the center of the house.

Continue reading “Wireless Network Concern”

  • Archives