open All Channels
seplocked EVE General Discussion
blankseplocked For CCP Fallout RE: Protect Your Accounts thread
 
This thread is older than 90 days and has been locked due to inactivity.


 
Pages: 1 [2]

Author Topic

Omal Oma
Shadowed Command
Fatal Ascension
Posted - 2010.01.23 04:35:00 - [31]
 

Originally by: Atnal
http://www.techsupportalert.com/pc/security-tools.html

Check out this list. The new combo to use is Malwarebytes and SuperAntiSpyware. I've heard both do a decent job.
This is what I do, also Clamwin is my favorite antivirus.

Avast is my favorite suite.

KaarBaak
Minmatar
Seatec Astronomy
Posted - 2010.01.23 05:59:00 - [32]
 


Using AV software means you are letting the terrorists win.

KB

Roemy Schneider
Vanishing Point.
Posted - 2010.01.23 06:11:00 - [33]
 

ah i don't pay all that much attention to this fear-mongering anymore.

CCP posts these every time the servers hit the fan...

Lussac Trigalle
Posted - 2010.01.23 21:36:00 - [34]
 

Edited by: Lussac Trigalle on 23/01/2010 22:07:27
In advance: sorry for the wall of text (I am slightly drunk and home alone while my missus is out getting wasted!) but some possibly useful knowledge for the 'putely (yes I made that word up) challenged.

tl;dr: ex-pro software designer says - CCP are (and should be) protecting themselves from frivolous litigation; rootkits are bad;computer licenses are required; no-one is safe

From CCP's point of view recommending any software will always expose them to possible litigation when someone gets hacked and says "CCP said I would be safe if I use x,y and z!" These days it doesn't matter how highly paid your lawyer is if you have to roll the dice in court to see if you get a judge that has the slightest idea of the nuances of modern technology.

Furthermore it doesn't matter how much advice you give there will always be users who CBA to learn 'compooter'.

Personally I really do think that there should be a license required for use of a user programmable net connected device. Let the CBAs use consoles & locked down devices without a license, but if you want to run a net connected programmable device, make them pass a test!!

Windows rootkits: <aargh> alas there is very little you can do about this. If you have a rootkit you are very unlikely to ever know about it. Although I have seen a few posts on the forums which suggest some eve players may have acquired one. Where they maintain (and I believe quite a few of them) that they haven't clicked stupid links or bought isk, and keep their machines well protected, yet still have their accounts compromised.

There are rootkit scanners available, but there are two main problems.
1) Your machine will be out of action for a long time for any scan with a reasonable chance of spotting the rootkit to be successful.
2) There is no guarantee that a negative scan means no rootkit.

Your best bet for spotting a rootkit is to check router logs or use something like wireshark from a second machine to monitor packets. Even then you won't know if a kit is installed but not currently net active.

for instance if I was going to go to the trouble of writing a rootkit, I would make it check the timezone defined for the OS & schedule it to connect to C&C when anyone in that TZ is likely to be asleep...etc.. or monitor CPU load & do its evil deeds when the machine is idle. With a successful rootkit there really are no limitations on what you can do since you own the OS competely, including the task manager, AV and anti-malware.
However unless you are defragging your drives and cleaning the registry regularly, you should be re-installing XP (As yet I haven't had any need to move to vista or 7) every six months or so. It's a sad defence, but still forces extra constraints on the malware and gives you an opportunity to feel clean occasionally!

Even if the technology were flawlessly coded & miraculously watertight security-wise, the wet-ware will always be a weak point.

As a Software Engineer for nearly 15 years (with an actual Soft. Eng. degree rather than a meaningless job title) I have been responsible for the design of industry software (fecking windows based<sigh>) that has sold for anything from 40k to 300k per license (optimisation software) many of the world's largest oil companies are running several applications designed in part by me. I may also be partly to blame for the brilliance or otherwise of your mobile company's network coverage. So take it from me that paranoia is always the best policy.

unfortunately more to come!...

[edite] spelling

Lussac Trigalle
Posted - 2010.01.23 22:03:00 - [35]
 

With all that experience and knowledge I couldn't hack a table let alone a website. My degree never covered security exploits, most of the people I have ever worked with never ever considered security. Most of them have never considered methodology, quality or extensibility either.

I do know however, that if all inputs are sanitised, all bounds are checked and your design gracefully handles unexpected paths & errors and you've got a decent set of coders who have pride in their work and are given enough free time to talk about what they might do to girls if they ever got the chance to meet them and occasionaly allowed to wander in late because they have a morning head-cold <ahem> then you're doing more than most.

My impression of CCP is that it began with a few dedicated people doing all they could to make it work, but has very quickly grown into a company that attempts to embrace engineering principles whilst balancing against ROI. All companies do this of course, but CCP really seems to be trying to use the best from the various methodologies to improve quality and attract decent coders, actually employees in general, and try to make them happy in their jobs.

I can't think of any other company that places the [game/code] designers in front of huge packs of users every year for a good grilling.

..er back to security....

I am lucky enough to have quite a few machines lying around the house and these days I run different AV/AM software on several of them.

This is how I found that AVG had lost the plot when it started failing to spot iframe injection exploits on webistes whereas avast was catching them, for example. So, if you can, try to use more than one form of protection <fnar fnar!>

second or third summary: if you're still using AVG you might want to check who the webs think is currently best and run some kind of comparative test yourself.
If you have done everything right AV and malware-wise and your account has been compromised then bite the bullet, backup data, wipe OS and re-install. I recommend you do some earching about cleaning rootkits though because it is possible to 'clean' a machine incorrectly and still be compromised.

PS.Obviously! No-one would post this with their main!

hakkiew365
Muffin Munchers
Muffy Inc.
Posted - 2010.01.24 01:27:00 - [36]
 

Holy wall of text Shocked

Lussac Trigalle
Posted - 2010.01.24 03:07:00 - [37]
 

er...I'm pretty sure I warned you. and already apologised. Is this not enough :( <sob>

yfz3r0
Caldari
Perkone
Posted - 2010.01.24 08:19:00 - [38]
 

Originally by: Lussac Trigalle
er...I'm pretty sure I warned you. and already apologised. Is this not enough :( <sob>


To be honest man, to be a decent hacker you gotta have 3 things. Knowledge of networking, programming and curiosity.

Brandrsun
Caldari
Posted - 2010.01.28 14:03:00 - [39]
 

Edited by: Brandrsun on 28/01/2010 14:07:49
Edited by: Brandrsun on 28/01/2010 14:05:35
Useually hackers get lucky.. only rarely is an hack a targeted attack like with google/Aurora ( the chinees didnt do it btw ) Useually its user error, weak passwords or ftp credentials that are intercepted and lead to a system breach. SQL is famous for being a point of entry to and Im not even starting about FLASH.. FLASH yer system allright. iframes and driveby downloads are a nice way of owning some sheep to.

Basically anything thats plugged in can be hacked it only depends on the hackers determination. Oh and forget about SSL it is not secure
ps, ALT Posting lol

Sephy'Ra
Posted - 2010.01.28 18:33:00 - [40]
 

Originally by: Minchurra
Originally by: Implying Implications
how do i compootar


I think I read somewhere it has something to do with sacrificing a goat to the mighty god Ra.


Wrong! I don't want your goats. Instead you may sacrifice it to the mighty and honourable Spiderchicken and be spared when her poultry glory calls upon the end of days (again). [/RP]

Anyways, I believe it doesn't actually matter what kind of precautions you take to fend-off malware, viruses etc, eventually you'll skip an update and (since Murphy sees what you did there) catch something nasty.
The only real protection that I know of are disposable OSs that you simply trash when you get infected. Virtual machines are especially good for that if you got the hardware to run multiple OSs at once.



Descendant from the god Ra,
Sephy

Draco Argen
Posted - 2010.02.02 20:02:00 - [41]
 

What are theese Virus and keyloggers you speak of?
*irony*
--
Avid Fedora and Ubuntu Linux user since 2002
Zero viruses, 4 popups and an uptime that just wont quit.

Anneesh Rynn
Posted - 2010.02.04 15:32:00 - [42]
 

lol if you believe that all the problems are only being caused by keyloggers than you likely also believe they will still find those WMD's too.

But hey it's their story and they can say whatever they want to.


Pages: 1 [2]

This thread is older than 90 days and has been locked due to inactivity.


 


The new forums are live

Please adjust your bookmarks to https://forums.eveonline.com

These forums are archived and read-only