www.1001TopWords.com |
Anti-Spyware Protection ? Holes in the Shining Armor
Looking at all the ads which promise to get rid of all spy programs, one may wonder why there is still plenty of them everywhere and the situation is by no means getting better. So let me spoil the advertisers' mood and show some of the "holes" in the majority of software products we expect to protect our data. Speaking about drawbacks of anti-spyware, let's take the word "spyware" in the narrow sense for a change and call "spyware" only software products that really spy, i.e. steal valuable information you want to keep private. Let's leave aside adware -- this motley crew of advertising stuff; information that some of them "steal" isn't valuable enough. It is keylogging programs that we should associate with the term "spyware" first of all. This breed is exceptionally dangerous -- such threats as flourishing online bank fraud and the recent outbreak of keylogger-containing Trojans prove this. Generally speaking, most anti-spyware works like that? Don't stop reading, please. Don't skip over the paragraph. Do you think that if you are not a tech person, it is none of your business? You don't write this software, you just use it -- so what? You haven't made the car you are driving, either (well, there may be some exceptions?). But you do know (at least in general) what makes it move -- and you won't forget to fill up its tank or have it serviced from time to time. You know what will happen if you don't. For the same reason you'd better know a bit about anti-spy software installed on any PC you use. We all should know it to realize what exactly to expect from all these anti-spy products with cool names. Their creators and sellers promise you that these software products will "kill all spyware on your PC" (or something like that). First, is absolute protection possible? Second, what should we expect from a typical anti-spy program and what it is simply unable to do? To answer these questions, we should understand how it works. Generally speaking, most anti-spyware works like that: it scans the operating system in search for suspicious bits of code. Should the program find any, it compares these suspicious pieces with bits of code (they are called signatures), which belong to already detected and "caught" spy programs. Signatures are kept in so-called signature base -- the inseparable part of any anti-spy program. The more signatures it contains, the more spyware such program will detect, so your PC will be protected more effectively. As long as you update your anti-spy software regularly and the system doesn't come across some unknown spyware product, everything is going to be all right. As for me, this pattern looks pretty like police records and works like them, too. But?the problem is just like the one with police records ? the fact that all included there are criminals doesn't at all mean that all the criminals are included into the records. Well, what about the criminals (spy programs) that are not included into the records (signature bases)? There are lots of such programs -- more than that -- some of them will never be in any signature base. Just like with criminals -- some of them haven't been caught yet, and some will never be caught ? because of their "right of inviolability". Anti- spy products based on signature base analysis will never be able to protect against these spies. Don't expect them to. Let's take a quick look on these elusive spy programs. Group 1. Those which hasn't been caught yet, because they are: 1. brand-new ones. They are being constantly written, released, used (for a very short time), detected and, finally, included into signature bases. Anti-spyware developers are now in the vicious circle of endless "spy hunt", trying to include as many spyware signatures (pieces of code) into the bases as possible - and fast! Faster, to outrun the competitors; faster, for new spyware - which is being written and released all the time ? not to spread like a wildfire. That's the way a signature base grows. 2. written to be used only once. These "tailor-made", or should we say, "custom-made", keyloggers are extremely unlikely to be ever detected. As soon as they have done their jobs (stealing data, of course ?often from the particular computer) they simply disappear, never to be seen again. Here belong keyloggers made mostly for such tasks as espionage. The main problem: keylogging software is relatively simple and not too difficult to compile. Even an average computer programmer can write a simple keylogger in a couple of days. More sophisticated one will take longer to make, of course, but not too long. Hackers often compile source code of several keyloggers (it's easy to find them in the Web--for those who know where to look for) -- and get a brand-new one with an unknown signature even faster. If a keylogger can be installed remotely without the victim's knowledge, it gives the hacker great possibility to steal any information he pleases. If there is an opportunity, there always will be one to use it. The period of time when a new spy already exists, but the updates have not been released yet, is the very time when hackers make their biggest profits. Trying to catch them all is a hopeless idea; it looks too similar to catching fleas one by one. Group 2. "Sacred cows". No signature base will ever have their signatures. Here belong mostly monitoring programs, which can be used for spying as well. First, the ones created by (or for) government agencies ? such as the famous Magic Lantern (the brainchild of the Cyber Knight project). No product which uses a signature base will protect against it; an ordinary anti-spy will never detect such a program. The same situation with other monitoring software, which certain agencies utilize. These monitoring products simply "don't exist" for signature-base-using anti-spyware (though they can well exist on any PC--yours included) If you think I'm painting it too black let's recall what happened when code of D.I.R.T. (a covert spying tool developed by Codex Data Systems) leaked out couple of years ago and was found in the Web (merely by accident, by the way). Once a top-secret project, it did become an open secret -- but the signature of this powerful monitoring software hasn't been included in any signature bases. That's what worries me the most; after this information leak nobody knows for sure WHO can be using it --and WHAT FOR. What if some other government monitoring program trickles into the Internet, too? Monitoring programs for parental control or workplace surveillance are very common and easily available from the Web. However, they can be used not only for those absolutely legitimate purposes. Any monitoring program is actually a double-edged sword because it almost always contains a keylogging module. It is up to an end user to utilize them--perhaps for spying. Legitimate monitoring programs are sometimes not included into signature bases, so one can use an anti-spy program and be spied on anyway. Now the last (but not the least) threat -- spy modules incorporated into viruses and Trojan horse programs. Unfortunately, all malware, including viruses, Trojan horses, worms and other fauna, "evolves" (due to their malicious creators). There already are so many hybrids between one another that it's hard to find, say, a "pure" virus like ones used only several years ago. Lots of this fauna can contain a keylogger -- like MyDoom (sure you remember this virus). They multiply and evolve, becoming more and more malicious. So, what conclusions could we draw out of this entire story (sorry if it turned to be too pessimistic)? Is absolute anti-spy protection possible? With existing anti-spy software which uses signature bases - no. However, there is a relatively new trend in software development -- not to use signature base analysis at all. This approach is rather promising; it means that such software--it already exists--can counteract even brand-new and custom-made spies. You may read more about it if you follow the link in my signature. What should we expect from an average anti-monitoring or anti-spy program? It does protect from spy software which it "knows". If it has the particular signature in its base, it protects your PC from this particular program. If anti-spyware uses a signature base, it will never "kill all spies on your PC--"whatever the salesperson promises you. Don't expect complete security-- there is no such thing anymore. The only hope is for entirely new technologies. If developers can't succeed in fighting spyware, they should try something else. Alexandra Gamanenko currently works at the Raytown Corporation, LLC -- an independent software developing company.Visit its website http://www.anti-keyloggers.com
|
RELATED ARTICLES
What is Fleet Maintenance Management? Fleet Maintenance Management is a critical position in any company that has a number of commercial vehicles. The individual responsible for the management and maintenance of fleet vehicles performs a variety of functions. It is imperative that companies such as delivery drivers or even taxi services know what is going on with their vehicles at all times. Preventative maintenance, order/vendor logging and fuel economy are among a few of the issues that fleet maintenance managers deal with on a daily basis. Basic Steps To Optimize Your Internet Security After seeing many people complain about their weak Internet security I decided to write down some things that will help you for your Internet security. Managing Stress in the Computer Industry - Five Steps to a Stress-free Life It would be easy to think, like most people apparently do, that stress and the computing (and especially programming) industry were unlikely bedfellows. The habitual image of long-haired young "geek" programmers churning out 'software' from their teenage bedrooms is one that many still associate with mainstream programmers. Stereotype or not, this image is still commonly held, and the armies of deadline-bound, overworked and stressed-out programmers in the real World are all but forgotten in the melee that is the result of the technological age. netstat - Linux Command to Display Networking Information In linux, one of great commands for finding out information about your network connections is "netstat". It provides you interface information, statistics, connections, and a lot of other really great information about your computer. Internet Security Threats: Who Can Read Your Email? Before being able to choose a secure Internet communication system, you need to understand the threats to your security. Industry Experts Answer the One Million-dollar Question - Why Genie Backup Manager? Many reasons made GBM a unanimous choice for experts, one of them is the fact that with the set of features it offers, it's definitely the easiest to use. Anti-Virus Software Anti-virus software is used to find, remove or fix files that are infected with computer viruses. Most anti-virus companies release weekly updates of their databases to help keep you safe. Your anti-virus software uses these weekly updates (also known as virus signatures or definitions file) to identify newly discovered viruses. ERP Software Financing: the Future? ? Overview for Company Owner In our case ? we serve Microsoft Business Solutions ERP and CRM products: Microsoft Great Plains, Microsoft CRM, Navision, Microsoft RMS, as well as we do customization and integration to these products. We would like to share with you our experience with financing through Microsoft Financial Corporation, the entity handling software financing for Great Plains, CRM, Solomon, Navision & Axapta. Is Your Small Business Ready For A CRM Software Solution? I have yet to see a business that, sometimes in spite of themselves, didn't benefit from implementing a Customer Relationship Management (CRM) or a simpler Contact Management software solution. Microsoft Business Solutions VAR/Partner Selection ? Overview for IT Director/Manager/Controller Microsoft Great Plains and Microsoft CRM become more and more popular, partly because of Microsoft muscles behind them. Now Great Plains is targeted to the whole spectrum of horizontal and vertical market clientele. Small companies use Small Business Manager (which is based on the same technology ? Great Plains Dexterity dictionary and runtime), Great Plains Standard on MSDE is for small to midsize clients, and then Great Plains serves the rest of the market up to big corporations. Microsoft CRM is extremely scalable and fits to all the market niches. RSS: Get Notified When Your Favorite Websites Are Updated RSS (Really Simple Syndication) is a way for a site to publish it's updates. RSS readers can read these notifications and display a listing of the updates to you, the user. Databases ? How We Love to Hate Them! You've finally created databases that you can actually use to store and manipulate all your critical data. That's great news and quite an accomplishment. But in your rush to get your employees to start entering information into these databases, you skipped the training process and let them go at it alone. Microsoft CRM Custom Design & Development: SDK, C#, SQL, Exchange, Integration, Crystal Reports Microsoft CRM is new player on the CRM software market. The whole conception behind CRM seems to be different. In case of traditional CRM software (Siebel, Oracle) - the application was designed with platform independence in mind. Microsoft CRM is dedicated to Microsoft technology and so deploys all the Microsoft tools: Windows Active Directory, Microsoft Exchange 2003/2000, SQL Server, Crystal Reports Enterprise, Biztalk server, Microsoft Outlook, Internet Explorer, Microsoft Great Plains as backend, etc.If you are software developer, database administrator or web designer who is asked: how do we customize Microsoft CRM ? we are giving you directions in this article.Microsoft CRM SDK ? this is software development kit with C# and partly VB.net code samples ? it is supported by Microsoft Business Solutions technical support. It is based on web service calls, if you are C# .NET developer ? you are excellently positioned to do this type of customizations. This is the preferred modification scenario and this should be easily upgradeable customization. VB.Net examples will be available soon. Legacy SQL Data integration. This is also easy and safe. If you have SQL database, sitting on the same or linked SQL Server ? you can create ASPX .Net application and simply integrate it into CRM. You can place it on the navigation bar or menu in isv.config ? please refer to MS CRM SDK Legacy ASP integration ? this is somewhat more sophisticated. You have to deploy HTTP handler to be a middle party between CRM which is .Net based and ASP which is legacy IIS. The trick is ? you have to have INI file with security settings to penetrate into MS CRM with proper credentials, calling web service. Microsoft Exchange Programming. Microsoft CRM has Exchange connector ? which moves CRM incoming email to MS if it has GUID in its subject. You can alter this logic (for instance - move email to CRM if it doesn't have GUID but it is from the sender who is contact or account in MS CRM). Refer to MS Exchange SDK onsyncsave event handling. Then simply apply some MS CRM SDK programming - you need some COM+ objects creation and VB programming experience. Direct SQL touch ? in #4 above I described you the scenario with MS Exchange handlers ? this would be ideal world if MS CRM SDK does the job. But ? in real world this is not always true ? you have to do direct flags correction in CRM database (like making Activity closed, moving email attachments/octet streams, etc). This is not supported by MBS technical support ? but you can rescue to this technique if you have to get job done. MS CRM Customization tool ? this is rather end-user tool and we don't describe it here ? read the manual. We've described above the options to use when this tool doesn't do the job Crystal Reports - feel free to create Crystal report - tables and views structure is self explanatory. Try to avoid the temptation to create your own SQL view or stored procedure in MS CRM database, instead - create custom database and place your view and stored proc in it. Happy modifying! If you want us to do the job - give us a call 1-866-528-0577! help@albaspectrum.com Interactive Mapping Brings Information to Life What is Interactive Mapping? The Death of Windows I have always regretted how Microsoft price gouges and rips off computer users. I really regret Windows XP activation. I have always intended to convert to Linux, but it isn't easy for a Windows user since version 3.0. Windows Screensavers Explained In this article you will find some background information about screensavers and their history. You will also learn how Windows screensavers differ from other programs and how you can use it to your own advantage. Also there are some tips for users owning laptops, notebooks or CD-burning devices. Great Plains Dynamics on Pervasive/Ctree support ? overview for consultant All of us know that Microsoft bought former Great Plains Software and formed Microsoft (Great Plains) Business Solutions in the earlier 21st century. It was total success for GPS, we guess, but for Great Plains Dynamics / eEnterprise / Dynamics C/S+ clients it was the time of change. First of all ? Great Plains Software, as being independent corporation in 1990th had to stake on certain future predictions. They decided that future should be based on these two basic principles: Introduction To ISDN, Part III: PAP Introduction To ISDN, Part III: Configuring PPP PAP Authentication .NET :Solving the Multiple Inheritance Issue Under .NET Platform .NET platform does not support multiple inheritance. Do not confuse multilevel inheritance with multiple inheritance. With multiple inheritance we can have a subclass that inherits from two classes at the same time. Linux Secrets The first thing that you will notice about Linux Red Hat (using the Gnome Interface) is that it looks a lot like Windows 95/98/NT. But that's where the similarity ends. Linux requires a whole new set of commands as well as a new way of thinking about things. |
© Athifea Distribution LLC - 2013 |