Wednesday, March 25, 2009

Should you disinfect your computer keyboard? Will this harm it?

Computer keyboards are a breeding ground for bacteria, especially when keyboards are shared, according to a study published in Infection Control and Hospital Epidemiology in March.

Researchers at the University of North Carolina, Chapel Hill, led by epidemiologist William A. Rutala, swabbed 25 computer keyboards that were used frequently by multiple nurses and other healthcare providers.

As expected, the keyboards were teeming with bacteria, said Rutala. In a second phase of the study, the team then deliberately put certain known strains of bacteria on keyboards to see how well commonly available disinfectants worked.

The team used three products containing quaternary ammonium compounds: Clorox wipes, CaviWipes and Sani-Cloths. All worked well, removing 95 to 100 percent of bacteria. So did three other products, plain old 70 percent isopropyl alcohol; Vesthene, a different germicide; and a chlorine product containing 80 parts of chlorine per million. ``These are all inexpensive, they're just pennies per wipe," said Rutala. All the products can also kill viruses, he said. And even sterile water was able to remove, though not inactivate, keyboard bacteria.

To see if all this disinfecting damaged keyboards, Rutala's team wiped each of the IBM laptop keyboards 300 times with each of the six disinfectants. No damage was done.

Dr. John Halamka , chief information officer for Harvard Medical School, recommended that hospital areas in which many people share keyboards should use ``membrane" keyboards in which a thin layer of plastic covers the keys, making the keyboard easier to clean. It's also essential, he said, for health care providers who share keyboards to be compulsive about hand washing, including before using shared keyboards.

JUDY FOREMAN

How to protect and disinfect your computer

HOW YOU CAN GET INFECTED

Booting the computer from an infected hard disk, cd-rom or diskette.

Opening (by autorun) an infected USB stick.

Executing attached infected files (.exe, .com, .vbs, .dll, .sh, .bat , .scr, .pif and more) you may find inside emails.

Executing infected files (.exe, .com, .doc, .bat, .hlp, .htm, .ini, .js, .php, .pif, .reg, .ppt, .scr, .sh, .shs, .sys, .vbs, .wbt, .xls, .pdf and more)

Previewing emails usually sent by an unknown person, because they possibly contain destructive code in the form of .html, that is automatically executed upon the email preview.

Browsing infected webpages (usually .htm and .html ).

Just by using the internet. To be more specific, almost every operating system, especially Microsoft Windows, have "security holes" which are exploited by a new type of viruses in order to infect the computer, without asking at ANY point the permission of the user to install any type of software.

HOW TO PROTECT YOURSELF

Make a backup of your critical files regularly, after having scanned them with an antivirus program.

Update your antivirus program as often as possible.

Update your internet browser program as often as possible.

Update your email client program as often as possible.

Update the program Adobe Acrobat Reader (if you use it).

Update the programs Microsoft Office and OpenOffice (if you use them).

Scan every file you download from the Internet.

If you use irc chat, make sure you have disabled the auto-accept-dcc-files option.

Do not insert to your computer USB sticks from untrusted sources.

Try to have a real-time antivirus monitor while your computer is operating.

Don't visit every website you are invited to by an unknown person. It may contain a non-visible destructive applet.

Disable the execution of java or active-x scripts within your browser.

Unhide the hide-file-extension-of-known-filetypes option within your hard disk explorer. If someone sends you a file called pic.jpg.vbs, you may think it's a .jpg file and execute it!

Always have a boot disk or boot cd for repairing your computer in case you get infected. Most antivirus programs offer this disk.

Try to use two different antivirus programs, using only one real-time monitor. It would be best if one of the 2 programs is in the top-10 antivirus programs' list you will find in the results of our LATEST Comparative test of antivirus programs. Security is not a matter of money, it's a matter of life-and-death for your computer!

Use a firewall program (we recommend Sygate Personal Firewall -it has been discontinued but you can find its latest version at "www.virus.gr/sygate.zip"- or Outpost Firewall Free or Comodo Personal Firewall or Kerio Personal Firewall, which are absolutely FREE and manage to protect efficiently any personal computer - NOT to be used in corporate network).

Use an anti-spyware program (you can find a list of good and freeware ones in the "FREE antivirus software" section of the website).

Try to update the operating system of your computer often (especially Microsoft Windows), so that all known security holes are fixed. We should mention that certain Microsoft operating systems do NOT allow the user to install updates if they have not been purchased!

WHAT YOU SHOULD DO IF YOU GET INFECTED

Avoid installing an antivirus program if you are sure you have been infected by a computer virus. As a first choise, we advise you to use the "Free Antivirus Tools Collection" available in our website and remove the virus.

If your antivirus program detects the virus but cannot repair it, do NOT delete the file! Try using another antivirus program, maybe it will be able to repair the infected file. None of the antivirus programs is perfect, still, the difference among them may be huge!

Do NOT format your hard disk! Formatting is NEVER a 100% guaranteed solution in order to face a computer virus. Have patience, faith in the antivirus program you have chosen and ... a bit of good luck!

Remember that you can always make a post at the forum section of our website and seek help from us, free of charge of course.

Disinfecting Viruses/Spyware/Adware from Your Computer

If you have virus or spyware/adware problems, these instructions will guide you through the process of removing them from your computer. You can obtain virus removal software through your SNAP network connection going to a web browser and entering http://lbis.kenyon.edu/antivirus. If you cannot access the network, you can bring your computer to the HelpLine for assistance.

Spyware/adware removal software (such as Spybot and Adaware) is available from the Internet. Their web addresses are listed in the section Remove spyware and adware below. Although the HelpLine does not disinfect viruses and spyware/adware on your computer, we will answer questions and offer guidance in removing them.

Note: If your network port was disconnected by LBIS:

  • If you were notified by LBIS that your network port has been disconnected because of virus-like activity, you must disinfect your computer before you can be reconnected to the network. If you need assistance, bring you computer to the HelpLine.
  • Once it is cleaned off, you must bring your computer to the HelpLine to have it confirmed clean by an LBIS staff member.
  • At the HelpLine you will have to run a virus scan to confirm that it is clean, so plan to come least one hour before the HelpLine closes (by 3:30pm weekdays, 4:00pm weekends) to allow time for scanning, which can possibly take an hour.
  • Once your computer is verified clean by a member of the LBIS staff, a request will be sent to the LBIS security systems manager to have your port reconnected to the network, which may take a day or two.

Software tools needed for addressing virus/spyware/adware problems:

In order to remove viruses or spyware/adware and to maintain your computer's security, it is essential that you have certain software installed (listed below):
  • Kenyon's antivirus software: Symantec (Norton) AntiVirus Corporate Edition (SAVCE)
  • Up-to-date virus definitions
  • Critical software updates from the Internet (for Windows or Macs)that are set for automatic updating on your computer
  • Up-to-date spyware/adware removal software: Spybot and/or Adaware
Follow the instructions in the following sections. If you already have some of the software installed, just skip those sections. You may want to print out this document before beginning.

Install Symantec (Norton) AntiVirus Corporate Edition (SAVCE):

Note: If unable to access the network to download (SAVCE), bring your computer to the HelpLine for assistance.

  • Locate the software: Login to the network. Go to Installing Kenyon Antivirus for Students at http://internal.kenyon.edu/patches/antivirus/index.htm
  • Print these installation instructions there before actually downloading the software.
  • Download Symantec (Norton) AntiVirus Corporate Edition (SAVCE) from the network by selecting the Mac or Windows ddownload link.
  • Disconnect your network cable or disable your wireless connection. (If using wireless with Windows XP Home, you must disable the radio).
  • Important!! After you download SAVCE but before you install it, you must uninstall any existing anti-virus software on your computer. (Instructions for uninstalling this software are in the installation instructions you just printed.
  • Install SAVCE using the above installation instructions.

Note: If you are unable to install SAVCE or access it once it is installed, you may have spyware/adware on your computer that is causing your problem. You will have to remove it first before continuing. See later section Remove spyware and adware from your computer for instructions.

Check virus definition date and update if necessary:

  • Once SAVCE is installed, reconnect to the network by plugging in your network cable or enabling wireless.
  • Immediately open SAVCE by double-clicking the gold shield icon in the bottom right corner of screen.
  • Check if your SAVCE virus definitions are up to date. If they are more than a week old, you must update the definitions by running LiveUpdate. See Running LiveUpdate at http://lbis.kenyon.edu/antivirus/liveupdate
  • Note: If unable to access the network, contact the HelpLine on how to proceed with updating your virus definitions.

Download critical software updates from the Internet

Scan hard drive for viruses:

  • Scanning the hard drive can take an hour or more, depending on the number of files you have, so don't start until you have the time!
  • To run a virus scan, see Perform a Full System Scan at http://lbis.kenyon.edu/antivirus/winavcescan. You may want to print this out for reference because you will have to disconnect from the network to run the virus scan.
  • Disconnect your network cable or disable your wireless connection. (If using wireless with Windows XP Home, you must disable the radio).
  • Before running a virus scan, it is recommended that you backup your data on the hard drive.
  • Then start your computer in Safe Mode as follows:
    • Shut down and power off your computer. Wait 30 seconds and then turn the computer on.
    • Immediately start tapping the F8 key every half second. You will soon see the black-and-white Starting Windows moving bar at the bottom of screen. The black Windows Advance Option screen will appear after that.
    • Make sure that the Safe Mode option is selected on this screen. In most cases it is. The computer will then start in Safe Mode, which takes a few minutes.
  • Once the desktop appears, open SAVCE through the Start | Programs menu (When in Safe Mode, there is no SAVCE gold shield icon in the bottom right corner of screen).
  • If any viruses are found by the scan, they will show up in the Scan Results or Virus History. If their status is "quarantined," they have been rendered inactive. After the scan completes, you can safely delete them by highlighting their names and clicking on the red "X" at top of window.
  • Scan your hard drive a second time to confirm that the computer is clean. There should be no viruses remaining in the Scan Results screen after the second scan.

  • If any viruses still remain, check their status. If it is "active" or "quarantine failed," you will have to manually remove them. You may have to come to the HelpLine or a public lab to print out the manual removal instructions for those viruses, which can be found at www.symantec.com. Also print out If SAVCE Reports Your Computer is Infected at http://lbis.kenyon.edu/antivirus/wininf.
  • Do not reconnect your computer to the network until all viruses are completely cleaned off!!!
  • When finished with virus removal, restart your computer as you normally do. You can now reconnect to the network unless your room's network port has been disconnected and you must first have LBIS verify your computer is clean.

Note: If your computer still exhibits strange symptoms or poor performance after checking and clearing any viruses, you may have adware or spyware on your computer. They must be removed before your computer will work properly. (See next section).

Remove spyware and adware from your computer:

  • If you run spyware/adware removal software on your computer, you must understand that there is some risk of unpredictable consequences to your computer. However, we have used Spybot and Adaware at the HelpLine for some time and find that they have been reliable removal tools.

  • Download and install Spybot and Adaware:
    • Spybot (freeware) and Adaware SE Personal Edition (free version) can be downloaded from the Internet (www.spybot.info and www.lavasoftusa.com).
    • Consult their websites and especially the Help sections for details on how to use these spyware/adware removal tools to scan your computer. You can also bring your computer to the HelpLine for assistance.
    • After downloading them, double-click their Setup icons on your desktop to install each program. When the Install Wizard opens, follow the instructions, accepting the defaults.
    • Note: If you can't access the Internet to download this software, you can bring your computer to the HelpLine for assistance. If you bring your computer in, we cannot remove the spyware/adware for you, but we can advise you in installing and running the spyware/adware removal software.
    • Because of licensing restrictions, we cannot offer Adaware. However, you download the "personal" version yourself from the Internet. Once you run Spybot, it often cleans off enough spyware that you can get to the Internet to download Adaware and run it.

  • Run Spybot and Adaware:
    • Before running these removal tools, it is recommended that you backup your data on the hard drive.
    • It is advisable to run both Spybot and Adaware for the most complete removal of unwanted spyware/adware. They should both be run regularly on a weekly basis to keep your computer relatively clean.
    • All spyware/adware removal software will require periodic updating, similar in concept to updating virus definitions, so always check for updates before scanning your computer.
    • If asked to Create a backup of the registry, Immunize, etc., do so.
    • After scanning is done, a list of "problem" files will display. Checkmark them for deletion and then delete them.

    Note: If you are unable to install or run Spybot or Adaware, or if the computer still exhibits performance problems, you may have to get further help from one of the local repair services in the area. See:

Install an Alternative Web Brower

  • As an extra security measure, the HelpLine strongly recommends that you install and use a web browser other than Internet Explorer, which is vulnerable to virus/spyware/adware problems.
  • The Mozilla Suite or Firefox are both acceptable web browsers, available for downloading from Alternative Internet Browsers at http://internal.kenyon.edu/patches/browser/index.htm.
  • If you cannot access the Internet, you can bring your computer to the HelpLine and ask to use our Mozilla or FireFox CD.

Monday, March 23, 2009

How to configure Remote Access VPN using ASA?

Remote Access VPN (Easy VPN) provides a secure tunnel over the public network to the off-site users. Easy VPN is a proper client-server model, that is why we will try to perform maximum configurations on the sever end and use Cisco VPN client software at user end to establish connection.

Basic steps for Easy VPN Configuration:

1- First configure the ASA interface

  • Interface name

  • Security level

  • IP address

  • Enable crypto isakmp on ASA

2- Configure IP pool

  • Pool name

  • Range of IP addresses to be used in pool


3- Configure user accounts

  • Username

  • Password

3- First define the ISAKMP Policy.

  • Authentication

  • Hash

  • Encryption

  • Group

4- Establish IPsec transform set.

  • Esp-des

  • Esp-md5-hmac

  • Esp-aes

  • Asp-sha-hmac

5- Configure tunnel group

  • Group name

  • Group policies

6- Now apply crypto map on the outside interface.

  • Used to verify the outgoing interface traffic

Configuration of ASA

ASA(config)#interface GigabitEthernet 0/1
ASA(config-if)# no shutdown
ASA(config-if)# nameif outside
ASA(config-if)# ip address 20.1.1.50 255.0.0.0 
ASA(config-if)#exit
 

ASA(config)# crypto isakmp enable outside

(To enable crypto isakmp on ASA)

ASA(config)# ip local poolname 30.1.1.1-30.1.1.50

(define IP pool)

ASA(config)# route outside 0 0 20.0.0.0

 
ASA(config)# username Mark password Cisco
(define username and password)
  

Now defined the IKE polices on ASA

ASA-(config)#crypto isakmp policy 10

(10 is isakmp policy number)

ASA(config-isakmp)#encryption des

(enable encryption des)

ASA(config-isakmp)#hash md5

(enable algorithm md5 for hashing)

ASA(config-isakmp)#authentication pre-share

(enable Pre-shared method)

ASA(config-isakmp)#group 2

(enable diffie-Helman group 2)

ASA(config-isakmp)#exit

(Exit from crypto isakmp mode)

 

ASA(config)#crypto ipsec transform-set ts2 esp-des esp-md5-hmac

(Here encryption type is des and hashing technique is md5-hmac)

 

ASA(config)# crypto dynamic-map dmap 10 set transform-set ts2

(apply the transform set)

ASA(config)#crypto map imap 10 ipsec-isakmp dynamic dmap

(call dynamic-map in crypto map name imap)

ASA(config)# tunnel-group marketing type ipsec-ra

(create a group for marketing department)

ASA(config)# tunnel-group marketing general-attributes

ASA(config-general)# address-pool poolname

ASA(config-general)# exit
 
ASA(config)# tunnel-group marketing ipsec-attributes
ASA(config-ipsec)# pre-shared-key Cisco 

ASA(config-ipsec)# exit

ASA-B(config)# crypto map imap interface outside

(Apply crypto map on outside interface)

Now to verify the secure tunnel, dial connection from user end using Cisco VPN client.


How can I make my blog load faster?

The speed at which your blog loads is critical to attracting more readers to your blog. If your blog takes a long time to load, many readers may leave your blog before they have the chance to read it. Here are a few tips and tricks that will help your blog load faster and attract more users:

Posts

Your blog's load time can be affected by the number of posts you display on your main page. You can easily edit the number of posts displayed of the main page from the Settings | Formatting tab. You can then select the number of posts you want to display on the main page. We recommend displaying 10 or fewer posts on the main page.

Third Party JavaScript and Links

For optimal blog load speed, we recommend using Google/Blogger widgets, JavaScipt and links. However, if you need to use third party JavaScipt and links, your blog will load much faster if you put all JavaScript at the bottom of your blog. If you have third party JavaScript and links in your sidebar, put them in at the bottom of the sidebar.

Images and Media

The more images, videos and other multi-media you have on your blog the longer it will take to load. However, images and other multimedia are important to attracting users to your blog, so it is important to optimize the load speed of your images and media. Here are a few tips to increase the load speed of your media:

  • Decrease the size of your images or use thumbnails that link to the full-size image.
  • If you use third party images, consider uploading them to Picasa Web Albums via the Blogger post editor.
  • If you have a large number of images to display, you can upload all your images (from a vacation or event) to a Picasa Web Album and link to the album in your post or sidebar.

Other suggestions

  • If you've added any custom CSS to your blog, make sure you put it at the top of the page.
  • The most important content of your blog that catches readers attention should load the quickest. To help you identify which items are taking the longest to load you can use Stopwatch. To use Stopwatch, enter your blog's URL into the text box and click "Start StopWatch". Stopwatch will then open your blog in a frame and will record the time it takes for everything on your blog to load, including images, videos, widgets, etc. Take note of the items that take the longest to load and modify them appropriately using our suggestions.

How to control the windows startup time?


Using this tip, you can handle the auto run computer programs to minimize the windows booting time. You can disable some optional windows applications like windows messenger, Yahoo messenger, QuickTime and many others auto startup programs that run automatically when you start your computer. These programs are the main reason to slow down your computer boot process because they use system resources.

Follow the given steps to disable the windows auto run applications:

To use this feature, you will need to be logged into your computer with administrative rights.

Click Start button and type msconfig in Run option then press Enter for next.


A small System Configuration Utility dialog box will appear with many options like General, System.ini Win.ini, Boot.ini, Services, Startup and Tools.

Now select Startup tab and uncheck the applications that you want to disable to run automatically at windows startup.

Now click on Apply button to implement the changes then click on Ok button to end the configuration process.

Again close the all program and restart your computer after any changes to go into effect.


How to configure the Cisco IOS IDS step by step?

IDS stand for Intrusion Detection System. IDS use to monitor the network traffic and calculate the detail information about network attacks also. When the IDS system identifies any malicious traffic, it reports an alert to the management system (for example, kiwi Syslog service Manager). IDS generates the different types of information against network attacks (for example, alerts, Critical conditions, Debugging messages, System is unusable, Warning conditions, Normal but significant conditions and other informational messages) and then you can set the alarm or reset action against the matching signatures.

Follow the given lab for IDS to detect malicious traffic:

Configurations on Router

In global configuration Mode:

Router(config)# logging on

Router(config)# logging console

(enable logging on router console)

Router(config)# logging host 40.1.1.2

(mention the syslog server address; here we are using kiwi Syslog service Manager as a logging manager)

Router(config)# logging trap 7

(logging severity level)

Router(config)# ip audit name AGENT attack action alarm

(set the alarm action against the matching signatures, and AGENT is the name of audit specification)

Now implement the all above configurations on router inside interface.

Router(config)# interface Ethernet 0/0

Router(config-if)# ip audit AGENT in

(implementation on router inside interface)

Now you can create a network attack using ICMP service (denial of service attack), for example run a long Ping command from your laptop to remote router.

Ping 40.1.1.1 -t -l 60000

Now you can verify the detail information about this ICMP DOS attack using any syslog server, here we are using kiwi Syslog service Manager as a logging manager. In the given figure, you can view the information about the ICMP DOS attack.


How to enable the Hibernation feature in windows XP?

In windows environment, the hibernation is a built-in feature used to increases your work performance and also minimizes the windows startup time. For example, if you have to keep open a lot of files and windows applications then you can leave you system in hibernate mode without closing the open programs. When you restart computer after hibernation, all the running files and applications will be restore as you have left them. Windows store the all hibernated information in the Hiberfil.sys file using system root folder. The size of this file is roughly equal to the RAM of your system.

Follow the given steps to activate the hibernation in windows XP:

To use this feature, you will need to be logged into your computer with administrative rights.

First click on Start button> Control Panel, click on Performance and Maintenance then click on Power Options.

A new "Power Options Properties" dialog box will appear, select Hibernate tab and then select the "Enable hibernation" check box to enable the hibernate feature.

If you system does not support the hibernation feature then the hibernation tab will not available there.

Now click on Apply button to implement the changes then click on Ok button to end the configuration process.

After enabling the hibernation feature click on Start button then click on "Turn off Computer". In the "Turn off Computer" dialog box, press the "Shift" for some time and click on Hibernate button. Your system will take some time to complete the hibernation process.


How to enable the hidden files and folders function in XP?

Today tip will help you to solve the problem with hidden files and folders in windows XP. Normally in windows XP, you can view the hidden files and folders using the path, Tool>Folder Options>View, and then check the "Show hidden files and folders" radio box. But sometime due to some spyware/trojan attacks, this radio box is unchecked automatically and you could not show the system hidden files and folders.

Follow the given steps to visible the hidden files and folders:

To edit the computer registry, first you should log onto your computer with administrative rights.

Click Start button and type regedit in Run option then press Enter for next.

Navigate to HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\
Advanced\Folde r\Hidden\SHOWALL

Now in right side panel, double click on the DWORD value "CheckedValue", here a small dialog box will appear with the title "Edit Dword Value".

To modify the "Value data" information as DWORD Value to 1 then click on Ok button to finish the process.

Now you can easily view the hidden files and folders using the path, Tool>Folder Options>View and then check "Show hidden files and folders" radio box.

But next time, if you want to disable this functionality then simply change the value of data box to old value.

How to move your mouse cursor without mouse?

You can control your mouse pointer with keyboard keys in all windows versions. When your mouse stops working, you can enable this keyboard feature to complete your important work. This keyboard mouse can performs all tasks same like a normal mouse.

Follow the given steps to activate the keyboard mouse:

To edit this feature, first you should log onto your computer with administrative rights.

To activate this feature, press Alt+Shift+NumLock keys at once and you will receive a small MouseKey box.

To keep MouseKeys on, click on Ok button or click on cancel button to cancel MouseKeys box.

Click on Settings button, if you want to adjust the mouse cursor detail settings.

Here a new dialog box will appear with the title “Settings for MouseKeys", now you can manage all mouse settings for example mouse cursor speed, acceleration and some other features.

Now using Numeric keypad, you can move your mouse pointer. The controls are:

  • 1,2,3,4,6,7,8 and 9 keys are used to move the mouse cursor into different directions.

  • Key 5 is used as mouse click button.

  • Insert key used to hold down mouse button.

  • + Sign used to double click on any object.

  • Delete button used to release the mouse.

  • Click on NumLock button to disable this keyboard mouse feature.

How to recover corrupted PowerPoint file using TEMP folder?

Today tip will help you to recover the unreadable and corrupted file of Microsoft PowerPoint. Normally PowerPoint open files can become corrupted when you are trying to save it or if you were working on it and your PowerPoint application or windows crashed due to power failure. Windows saves a duplicate copy of working file as a temporary version. There is no need to use any third party software to manage these types of corrupted files, because you can recover them from TEMP folder.

Follow the given steps to recover the corrupted files in MS PowerPoint:

First click on Start button then click on Search option to start your search process.

Here type the *.TMP in "All or part of the file name" box then choose the "Local Hard Drives" option in "Look in" box.

Now click on Search button to start the search process of temporary files on your system local drives.

After some time, windows locate the list to temporary files. Here arrange the all temp files as Date modified.

Now open the PowerPoint and try to open these temp files or double click on that file to run in PowerPoint.