Saturday, August 8, 2009

Computer worm


A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some harm to the network, if only by consuming bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.

Wednesday, July 8, 2009

SPAM


How They Attack

SPAMEmail Spam is the electronic version of junk mail. It involves sending unwanted messages, often unsolicited advertising, to a large number of recipients. Spam is a serious security concern as it can be used to deliver Trojan horses, viruses, worms, spyware, and targeted phishing attacks.

How Do You Know

  • Messages that do not include your email address in the TO: or CC: fields are common forms of Spam
  • Some Spam can contain offensive language or links to Web sites with inappropriate content

What To Do

  • Install Spam filtering/blocking software
  • If you suspect an email is Spam, do not respond, just delete it
  • Consider disabling the email’s preview pane and reading emails in plain text
  • Reject all Instant Messages from persons who are not on your Buddy list
  • Do not click on URL links within IM unless from a known source and expected
  • Keep software and security patches up to date

Cut Down on Spam Now

Are you tired of deleting email messages with subject lines like "kulegnji" or "vitriine" from your inbox? If spam has become the bane of your online existence, you’re not alone. According to Symantec’s latest State of Spam report, spam now accounts for 72% of all email messages. But junk mail is not just a nuisance and a waste of your time; it's also become a common way to commit fraud and spread malicious software. Make sure your PC is protected by antispam software. Both Norton Internet Security™ and Norton 360™ offer antispam capability to automatically filter out annoying, dangerous or fraudulent emails from your inbox.

http://www.symantec.com/norton/security_response/spam.jsp

Friday, June 19, 2009

AVG Internet Security


Description for AVG Internet Security


Complete security protection against all of the most serious Internet threats, including viruses, worms, Trojans, spyware, adware, hackers and spam.

Includes *

Anti-Virus protects from viruses, worms and Trojans *
Anti-Spyware protects from spyware, adware and other malicious programs *
Anti-Spam filters spam and protects against phishing attacks *
Firewall protects from hackers Features *
All-in-one, easy to use protection - install and forget *
New program versions and updates, for free, throughout the license duration *
Quality proven by all major antivirus certifications (VB100%, ICSA, West Coast Labs Checkmark) *
24/7 technical support provided at no extra cost *
Improved virus detection based on better heuristics and NTFS data stream scanning *
Unique automatic threat removal antispyware engine *
Automatic firewall profile switching for improved security and usability


http://www.softpicks.net/software/AVG-Internet-Security-36027.htm

Anti Spam

Did you know?


GFI MailEssentials for Exchange/SMTP 14

GFI MailEssentials for Exchange/SMTP/Lotus is a server based anti-spam, anti-phishing and email management solution, which is used by 80,000 customers worldwide. The latest version uses two anti-spam engines, along with advanced spam filtering techniques, to give administrators a high spam capture rate straight out-of-the-box, with minimal configuration. GFI MailEssentials also minimizes false positives, so you do not need to worry about important emails being marked as spam.


With GFI MailEssentials spam is caught before the mail server, eliminating the need to deploy client software. Its advanced detection technology is based on the following key features:
- SpamRazerTM: an additional anti-spam engine boosting capture rate
- Automatic whitelist management to reduce false positives
- Multiple anti-spam technologies including Bayesian and IP filtering

- Eliminates hard to catch NDR, MSNBC and CNN spam
- Precise real-time dashboard


GFI MailEssentials also protects users from phishing emails by detecting and blocking them before they reach the recipient’s mailbox. GFI’s anti-spam solution also adds several email management tools to your mail server including: disclaimers, mail monitoring, Internet mail reporting, list server, server-based auto replies and POP3 downloading.


Now, GFI MailEssentials also includes a real-time dashboard which provided a visual of the software’s status and the server’s email flow. Furthermore, the latest version also includes an in-built reporting function, allowing network administrators to send a daily report illustrating how many emails were received by a user and how many emails were identified as spam and filtered.

GFI MailEssentials ships at the best price on the market, making it the ideal server anti-spam solution for small to medium sized businesses. With over 80,000 installations and over 60 awards, GFI MailEssentials is the #1 server anti-spam software, available at an unbeatable price!

Security



IT Live Ltd

Security


At IT Live we are well aware of the importance of security, be it at network, physical access or internet level. With our help and the adequate solution in place, you, the client, can focus on your business and need not worry about your systems being vulnerable and open.


http://www.itlive.co.nz/Products/Security/tabid/89/Default.aspx

Barracuda (Anti Spam and Anti virus)

The Barracuda Spam Firewall is an integrated hardware and software solution for complete protection of your email server. It provides a powerful, easy to use, and affordable solution to eliminating spam and virus from your organization by providing the following protection: Anti-spam, Anti-virus, Anti-spoofing, Anti-phishing, Anti-spyware and Denial of Service.

Barracuda Protection Overview


Models

Model 200
Model 300
Model 400
Model 600
Model 800

Barracuda Spamwall 300



Juniper Networks (Netscreen Firewalls)

The Juniper Networks family of purpose-built security solutions are designed to satisfy customer networking and security requirements that range from small branch office and telecommuter locations to high speed carrier and data centre environments.

Juniper Protection Overview


Netscreen Firewall

NetScreen 5 Series
NetScreen 25/50
NetScreen 500/GPRS
NetScreen 5200/5400





Netscreen NS-5GT





Netscreen NS-25








Detecting spam





Detecting spam

People tend to be much less bothered by spam slipping through filters into their mail box (false negatives), than having desired e-mail ("ham") blocked (false positives). Trying to balance false negatives (missed spams) vs false positives (rejecting good e-mail) is critical for a successful anti-spam system. Some systems let individual users have some control over this balance by setting "spam score" limits, etc. Most techniques have both kinds of errors, to varying degrees. So, for example, anti-spam systems may use techniques that have a high false negative rate (miss a lot of spam), in order to reduce the number of false positives (rejecting good e-mail),

Detecting spam based on the content of the e-mail, either by detecting keywords such as "viagra" or by statistical means, is very popular. Such methods can be very accurate when they are correctly tuned to the types of legitimate email that an individual gets, but they can also make mistakes such as detecting the keyword "cialis" in the word "specialist"; see also Internet censorship#"By-catch". The content also doesn't determine whether the email was either unsolicited or bulk, the two key features of spam. So, if a friend sends you a joke that mentions "viagra", content filters can easily mark it as being spam even though it is neither unsolicited nor sent in bulk.

The most popular DNSBLs (DNS Blacklists) are lists of IP addresses of known spammers, open relays, zombie spammers etc.

Spamtraps are often email addresses that were never valid or have been invalid for

a long time that are used to collect spam. An effective spamtrap is not announced and is only found by dictionary attacks or by pulling addresses off hidden webpages. For a spamtrap to remain effective the address must never be given to anyone. Some black lists, such as spamcop, use spamtraps to catch spammers and blacklist them.

Enforcing technical requirements of the Simple Mail Transfer Protocol (SMTP) can be used to block mail coming from systems that are not compliant with the RFC standards. A lot of spammers use poorly written software or are unable to comply with the standards because they do not have legitimate control of the computer sending spam (zombie computer). So by setting restrictions on the mail transfer agent (MTA) a mail administrator can reduce spam significantly, such as by enforcing the correct fall back of Mail eXchange (MX) records in the Domain Name System, or the correct handling of delays (Teergrube).

Anti-spam techniques



Anti-spam techniques

To prevent e-mail spam, both end users and administrators of e-mail systems use various anti-spam techniques. Some of these techniques have been embedded in products, services and software to ease the burden on users and administrators. No one technique is a complete solution to the spam problem, and each has trade-offs between incorrectly rejecting legitimate e-mail vs. not rejecting all spam, and the associated costs in time and effort.

Anti-spam techniques can be broken into four broad categories: those that require actions by individuals, those that can be automated by e-mail administrators, those that can be automated by e-mail senders and those employed by researchers and law enforcement officials.