chip plus nov09

52
PROTECT YOUR FILES AND FOLDERS WITH COOL TOOLS SAVE YOUR DATA FROM BEING STOLEN AND MISUSED KEEP A SAFE DISTANCE FROM HARDWARE THREATS BE ALERT AND STAY SAFE ON THE INTERNET Protect your home network »  Secure your web browser » Monitor USB drives Supplement to CHIP November 2009 SECURE YOUR WORLD OF TECHNOLOGY

Upload: psmkreddy

Post on 29-May-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 1/52

PROTECT YOUR

FILES AND FOLDERS

WITH COOL TOOLS

SAVE YOUR

DATA FROM BEING

STOLEN AND MISUSED

KEEP A SAFE

DISTANCE FROM

HARDWARE THREATS

BE ALERT

AND STAY SAFE

ON THE INTERNET

Protect your home network »  Secure your web browser  » Monitor USB drives

Supplement to CHIP November 2009

SECURE YOUR WORLD

OF TECHNOLOGY

Page 2: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 2/52

FEATURE

4 SECURE YOUR HOMENETWORKKeep your PC secure in a network 

environment

8 PROTECT YOUR SOCIALLIFE, ONLINEStay away rom the perils o social

networking.

12 SECURE YOUR PC FOR

FREEWe give you a list o helpul security

applications that are absolutely ree

 HANDS ON

16 10 TIPS10 precautions you must take to protect

your unds rom being phished

18 10 TIPS10 ways to protect your laptop whileon the go

20 TIPS & TRICKSOptimize the usage o Windows, Word,

Excel and the Web

28 LOCK UP YOURUSB DRIVEProtect the data in your USB drive rom

being stolen

31 ENCRYPT YOURDATALearn to use age old art o cryptography

with the help o SecureCrypt

34 SECURE YOURWEB BROWSERWe teach you how to secure Internet

Explorer 8, Fireox and Chrome

38 PROTECT YOUR FILESAND FOLDERSUniversal Shield is a simple application

that will protect your data

41 STAYING SAFE ONFACEBOOKWe teach you to confgure Facebook's

privacy settings

45 HANDLING INFECTEDPEN DRIVES

Learn how to tackle the 'autorun.in' flethat spreads using USB drives as mediums

 SPECIALS

48  PC DOCTOR Tackle some basic problems that arise

because o Windows Firewall

50 DR. KNOWLearn more about Virtual Firewalls, RAID

and SNMP

51 IN DETAILWe take a deeper look into IP

concealment

CONTENTS

ASSISTANT EDITOR TECHNICAL

 Jamshed Avari

 [email protected]

COPY DESK 

Sharon Khare

WRITERS

Gareth Mankoo,Dolwin Fernandes,

Kamakshi S

ART DIRECTOR

Nirmal Biswas

ILLUSTRATOR

Sachin Pandit

DESIGN

  Jagdish Limbachiya,Brijesh Gajjar,

Hemali Limbachiya

HEAD OFFICE

Intelligent Computing CHIP,

Infomedia 18 Limited

`A' Wing, Ruby House, 2nd Floor,

J.K. Sawant Marg, Dadar (W),

Mumbai - 400 028. INDIA

Phone: (91 22) 3024 5000

Fax: (91 22) 3003 4499

E-mail: fee [email protected]

Page 3: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 3/52

IN the chaos that surrounds our day-to-

day activity on the Internet we seldom

realize the dangers that hover around us

in inconspicuous orms. The great Isaac

Newton stated that there’s always an equal

and opposite orce acting against every

action perormed. Only in the case o you,

the common user, this negative orce is a lot

more than equal. There are threats coming

in rom every corner, be it rom the Internet

or outside.

 This issue o CHIP Plus is a guide to what you

need to do to stay sae in this precarious

environment. We all know that anti-virus

utilities make some really tall claims o 

being one better than the other, but how

can we trust them? We need to build a ew

deenses ourselves, rather than completely

rely on a single application to do this. The

misconception o users that installing

security tools is a waste o money, oten

costs them more dearly in the orm o dataloss. Thankully, developers are kind enough

to provide some security applications or

ree. This acts as a catalyst or users to

download them and make sure that they

have at least a single line o deense ready.

Besides the expected measures we take to

shield data rom being stolen or destroyed,

we also give you a ew quick tips on how

to end o attempts o physical thets

by robbers and burglars. Another look at

physical computer security covered hereincludes the shielding o USB drives against

inections. You will learn how easy it is or

you to lose all your data ater borrowing

that innocent looking pen drive to copy a

presentation. Trust me, it isn’t all that sae

out there.

 

Gareth Mankoo

[email protected]

FOREWORD

Developers are kindenough to provide

some security

applications for free. This acts as a

catalyst for usersto download them

and make surethat they have at

least a single line of defense ready.

Page 4: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 4/52

FEATURE APPLICATION

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

Attackers use tricks such as attractive ads, oers or

ree stu, etc. to tempt you to click on a particular link 

or object on the page. This click could be atal. Thus

we can broadly classiy these attacks based on the

targets that they have. So we call them:

ATTACKS ON OUR INTEGRITY: Our data is being

modifed or destroyed by unauthorized means.

ATTACKS ON OUR CONFIDENTIALITY: Our data

is being viewed by those who do not have the

permission to do so.

ATTACKS ON OUR AVAILABILITY: Not every rightul

user can access the data because it is being denied to

them by an attack/attacker.

WHAT KIND OF ATTACKS ARE WEVULNERABLE TO?

 To get into our systems and access our data, attackers

resort to various means. Some o these trick us into

alling or them by using attractions like ree git

vouchers or ree downloads. Others simply creep

 To begin with, we need to defne the kind

o environment that we are working in.

Networks that have a single administrator

are way saer than those that don't have any. This

is because well administered systems have rules

that allow and deny access o certain components

or computers over a network. In regular peer-to-

peer networks security lapses are quite common.

WHO ATTACKS US AND WHY?

 To avoid threats, we frst need to know who we are

up against. These attackers are called 'hackers' or

'crackers', depending on whether they are meant

to dig into your personal inormation, modiy

it or even destroy it ully. Besides targeting just

your computer, these attackers can also launch

attacks on other computers by using your system

as an access point. By doing this, they can remain

discrete in their actions and end up jeopardizing

your integrity on the network.

SKILL LEVEL

Moderate

NOW YOU CAN

Protect your home network

Keep away common threats

PROJECT TIME

45 Minutes

WHAT YOU WILL NEED

Internet connection

Internet Browser

KEY DETAILS

Secure your homenetworkHere is a quick guide to making sure that your computer is sae whenconnected to a network.

B Y   G A R E T H   M A N K O O

    S   a   c    h    i   n    P   a   n    d

    i   t

Page 5: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 5/52

APPLICATION FEATURE 5

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

into our systems without our knowledge. Attacks like

worms, viruses and Trojans are generally pre-coded

and stored at some point in a website or anywhere on

the Internet. These can be mailed to us, and to several

other targets at a time as an attachment, which, on

clicking, can penetrate our systems.

However, though these are the most common

attacks, we also have some others. All o these are

mentioned in the ollowing points:

WORMS, VIRUSES AND TROJANS: As mentioned

earlier, these programs are pieces o code that aect

some part o our operating system. Worms are known

or replication; viruses cause direct attacks on our

data by deleting, altering or adding data without our

permission. Trojans reside as harmless entities which

later cause problems by picking up our sensitive

inormation like logins and passwords.

DOS ATTACKS: One o the most common attacks

is the DoS (Denial o Service) attack. In this case,

certain or all components o your system are made

unavailable to you. For example, your PC will be

'pinged' over and over again so as to congest your

network tra c. This will deny you using your own

PC over the network. The most common targets

or attackers oten include blocking a certain web

portal or component rom being used. Besides being

annoying, this can also lead to some serious downtime

in your work. Even worse, attackers can ood the

victim's bandwidth with requests rom multiple

systems. This kind o attack is called DDoS (Distributed

Denial o Service). Certain Trojans can also be used to

execute this kind o attack.

BROWSER HACKS: Certain websites and applications

have scripts like JavaScript and ActiveX controls. These

can be used to pick up inormation like login details,

browsing history, etc. and display it to unauthorized

personnel. However, the good news is that there are

means to block these components on your browser.

Most browsers provide you with an option to block 

these attacks. There are other harmul scripts that

can take you by surprise. These appear to be helpul

links and ads on the site that tempt you to click on

them. On clicking, they set to work. So make sure that

you click only on relevant links and objects on your

browser so as to keep away rom harmul scripts such

as these. These links can also be displayed on public

orums as HTML tags and ash ads.

EMAIL THREATS: Emails are the easiest way to get a

fle rom one end to another. The sad part is that it is

used to get some rather fshy fles across sometimes.

Make sure that you do not download fles that have

been sent as attachments rom sources that you do

not know. It can be a virus or another harmul fle that

AVG, Kaspersky, McAfee and Norton are the most common anti-viruses programs used as a first leveldefense. Though they are capable of functioning on their own, it is also very important to update them

regularly to keep them up-to-date with the latest threats.

Page 6: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 6/52

FEATURE APPLICATION

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

will claim to be something else, like a riend's wedding

photograph or a calculator application. Downloading

and installing it can be disastrous or your system.

Spoofng is also a popular technique among

attackers to penetrate a system. Spoofng means

sending an email to a victim by disguising yoursel 

as someone else. This leads to the problem o 

compromising private inormation - by means o a

reply - to the sender, who is actually the attacker in

disguise. Spooed emails are really hard to tell rom

original ones since they can pose as anyone you would

trust sending personal inormation to.

For instance, an attacker may ask you to mail him

your current passwords and login details or even tell

you to change the same, while posing as your network 

administrator. Home networks are sot targets or such

ingenious attacks.

FILE EXTENSIONS: It is a common practice to stay

away rom fles like EXE and COM since they are most

common viruses. However, there are means o ooling

you that can make fles appear to be o a certain

ormat while they actually are o a dierent fle ormat

altogether. So the fles that you will see may appear

to be, or instance, 'love-letter-or-you.txt' when it

is actually 'love-letter-or-you.txt.vbs'. Many viruses

appear in some rather harmless, non-executable

ormats. To tempt you into downloading them, they

may appear as MPEG, AVI or even MP3 fles. In actual

orm, these will be VBS script fles.

SNIFFING: 'Packet sni ng' or 'sni ng' occurs when

attackers capture data that is being sent over a

network, by intercepting it. This can give away

crucial inormation like sensitive mails and login

details. Sni ng is oten used against banking and

e-commerce sites so as to get sensitive monetary

inormation. Encryption and decryption o data

packets is the best way to get data across a network 

without attracting the attention o attackers.

BACKDOOR ATTACKS: These attacks are oten carried

out by well-equipped attackers. Every system has

a backdoor that can easily be penetrated without

much problem. Certain tools such as BackOrifce and

Page 7: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 7/52

APPLICATION FEATURE 7

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

Netbus are easy-to-use tools or those seeking an

entry into a computer network. Home networks are

eeding grounds or such attackers. They can even

dig into administrative systems and change certain

confgurations and use them to their advantage.

 The above mentioned attacks are just broader classes

o more sophisticated actions taken by attackers to

penetrate a system.

HOW DO WE PROTECTOURSELVES?

 The ollowing are some basic precautionary steps to

keep away rom network based attacks.

UPDATE ANTI-VIRUS APPLICATIONS: Make sure that

you update your anti-virus suite oten so as to remain

up-to-date with the latest threats on the network and

the Internet.

ENSURE STRONG ADMINISTRATIVE RIGHTS: I 

you have a network administrator, make sure that

his system is capable o handling the privileges well.

Ensure that your system is saely shielded rom all the

harmul fles on the network.

USE FIREWALLS TO BLOCK PORTS: Firewalls are

great tools to block certain ports rom being accessed.

DO NOT USE UNKNOWN FILES AND APPLICATIONS:  

Avoid using fles and applications that have come to

you rom unknown sources. I they arrive by email, do

not download or open them.

MAKE FILE EXTENSIONS VISIBLE: By deault,

Windows disables the fle viewing o fle extensions.

However, to avoid attacks, it is necessary to see what

ormat a fle actually belongs to. I you use Windows

XP then open 'My Computer'. In that click 'Tools |

Folder Options'. Click the 'View' tab. Uncheck the 'Hide

extensions or known fle types' checkbox. However,

this may not make all the extensions visible.

DISABLE JAVA AND ACTIVEX SCRIPTS: As seen

earlier, scripts like ActiveX can cause executable

viruses to enter your system once they are installed.

Hence disable them i possible.

BACKUP YOUR DATA: It is always critical to maintain

backup copies o your data so that they can be

recovered in case o loss.

TURN YOUR PC OFF WHEN NOT IN USE: There is no

way that a switched o PC can give away any data or

be attacked. Hence, keep it o i you are not using it. I 

you eel that there is something absolutely dangerous

on your network then unplug the network cable ater

consulting your administrator.

KEEP A BOOT DISK FOR EMERGENCIES: The worst

case scenario can be your computer's system fles

being corrupted. Hence it is important to make a boot

disk to recover it at such times.

Firewalls are often bundled with anti-virus sui tes but can be found as st andalone applications as well.They help you keep your PC safe from notorious access points on the network. You need to understand

the concept of using logical ports on your computer before you configure Firewalls.

Page 8: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 8/52

FEATURE APPLICATION

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

As the population o netizens grows at a rapid

pace, the need to be all the more vigilant and careul

about the nature o inormation shared with the world

at large is the need o the hour. Here are a ew simple

things that you can keep in mind to enjoy your online

networking experience in a sae and clean way!

ADD THE PEOPLE YOU KNOW: Social networking is

a great way to catch up with your long lost riends,

and even make some new ones. But there are certain

things you need to keep in mind rather than going

on a hunt to make new riends. As a thumb rule, don't

add random people. There is no way o knowing their

real identity since many o these users don't even

upload their own photographs. You might fnd ar

more genuine people at a bar rather than on a social

networking website. Random people don't eel bad

i you reuse their requests. There are also certain

people who add you rom your riend's riend lists.

Make sure you ask your riend who this person is and

why he wants you on his list. Also i you eel that your

Man being a social animal, the interaction

o like-minded individuals led to the

ormation o civilization that we are now a

part o. While keeping pace with the technological

advancements, the entire world has shrunk 

tremendously and geographical distances can

now be nullifed with the mere click o a button.

Just like the concept o communicating is as old

as civilization itsel, so is the concept o social

networking as old as the Internet.

 There were online social exchange mediums

(BBS) like USENET (1979), and LISTSERV (1986) that

enabled users to communicate with each other

through comments and posts, there were also

webhosting services like Yahoo! GeoCities (1994)

which enabled users to air their thoughts online.

While the ormer laid a frm oundation or the

uture world o blogging, the latter helped pave

the path or ree webhosting services with exible

content.

SKILL LEVEL

Moderate

NOW YOU CAN

Stay safe on social networks

Share your data safely

PROJECT TIME

45 Minutes

WHAT YOU WILL NEED

Internet connection

KEY DETAILS

Protect your sociallife, onlineWe have enlisted a ew practices that you can ollow to ensure a saeexperience while socializing online.

B Y   K A M A K S H I   S

Sachin Pandit

Page 9: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 9/52

APPLICATION FEATURE 9

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

privacy can be threatened and your confdentiality can

be breached by adding certain known riends, make

a prudent decision to decline their request. I you are

pestered too much ater declining requests rom a

particular user, eel ree to report them.

POST MESSAGES WITH CAUTION: With the

 Twitter and Facebook ever rising by the second,

the 'disconnect anxiety' seems to be increasing

signifcantly especially among the youth. Most o 

these social messaging services extend unctionalities

to devices like Palm tops, BlackBerrys and cellular

phones, in turn adding to the number o addicts. This

urge o technophiles to keep glued into their account

is a big cause o psychological concern. Several

users subscribe or text alerts alerting them on every

post or comment they receive. Moreover, this kind

o technology enables people to update each and

every incident o their lie quite intricately and rather

quickly. This kind o behavior poses a threat at many

levels: frstly it shows the psychological well-being

o a person. I you seem low or depressed on your

posts, you can be taken advantage o. There have

also been reported incidents o houses being burgled

by keeping track o tweets and post updates while

people are out on long vacations. Tweets / posts like

'Out on a two week long vacation to the Bahamas',

coupled with a list o your likes-dislikes (an indicative

o your possessions) and coupled with your location

details ensure that you are laying a trap or yoursel.

Always remember even i you don't add any direct

personal details like your house address, a small

amount o probing along with your IP address can

reveal a lot about your browsing locations.

PROTECT YOUR PERSONAL PICTURES: I pictures

speak louder than words, what better way to share

memories than with photographs? But when you

upload pictures, make sure you know how sae

they are rom prying eyes. Your pictures might

be used without your permission violating copy

right issues. On a more serious note, there have

been many reported instances o how pictures o 

unsuspecting social networking users have been

used or pornography, child racketing and other

heinous crimes. Most o the networking web portals

provide you with personalized sharing options. It is

a recommended that you don't share albums with

people out o your riend circle. I your riends are not

comortable with their pictures appearing in your

album, respect their privacy and take them o your

albums immediately. Always remember, even i you

delete images rom your profle you cannot be 100%

sure that those images are not still somewhere on the

server or have already been misused.

Although you can set the content access parameters from the Settings page directly, these contentsdon't include your photo albums.

Click the 'manage' link appearing near the 'Privacy' section of the 'Settings' tab of your account page

to change the privacy settings.

Orkut allows you to restrict people to specific countries and regions to ensure that your surfing

experience is unaffected.

Page 10: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 10/52

0 FEATURE APPLICATION

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

SECURE YOUR JOB: Business networking sites are the

newest rage among young corporate workers. They

use these as a tool to build social networks or

business building or job hunting. But there is a real

threat i you are joining a rival frm and promptly

upload the details o your new job, you might fnd it a

bit tough to answer unwarranted questions especially

i your ex-colleagues orm a part o your network.

Moreover, the recommendations you receive here may

not be too useul i companies preer the older and

more traditional type o job reerences.

SECURE YOUR INTERESTSONLINE:Listed below are a ew pointers on how you can set

the privacy option on some o the most popular web

portals around the world.

SECURITY ON ORKUT.COM: In its early days, Orkut

had very ew privacy policies. But as time went by and

the nature o security-lapse related crimes came to be

known, Orkut has strengthened its security options.

 To alter your security settings, login to your Orkut

account and go to your profle page. Make sure that

you haven't specifed details that give out too much

personal inormation especially your email address as

it is prone to spam attacks. Save the changes and click 

the 'Settings' option which is the second last option

on the panel appearing below your uploaded profle

picture. The 'Saety flter' on the website is turned

on by deault to protect your account rom being

spammed with x-rated content.

Although this is not a recommended practice, you

can go to the 'general' tab o the 'My Settings' page,

and check the 'show all content' under 'saety flter'

instead. Go to the 'privacy' tab o the web page to

manage and monitor who can access the contents

on your profle. Change the listed setting as per your

requirements.

Also note that you can set privacy on uploaded

images or every album individually. Go to the

'notifcations' tab to set the way you wish to be

inormed o any external activity on your account.

 The 'chat' tab enables you to speciy how many

people can chat with you. You enable or disable chat

settings or individual users, or or groups as a whole.

PRIVACY ON FACEBOOK.COM: Facebook has been

one o the most popular websites or most youngsters,

as it whizzes past its contemporaries like Twitter, Orkut

and MySpace in terms o popularity. With so many

users to satisy, it becomes extremely necessary to

keep their privacy intact.

You can view and change your Facebook privacy

settings by logging onto your Facebook account. Once

Concealing or selective viewing of data becomes all the more essential when you are building aprofessional network.

If you tweet incessantly, pay close attention to what you share to keep yourself safe from those

stalking you online.

As one of the most interactive networking sites, MySpace provides auto responders to connect to

your audience even while on vacation.

Page 11: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 11/52

APPLICATION FEATURE 11

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

your profle page is displayed, click on the 'Settings'

link appearing next to your email ID. On the 'My

Account' webpage, click the 'Privacy' tab. You can

also set notifcation options under the 'notifcations'

tab to set the way you wish to be inormed o any

external activity on your account. You can monitor

the Facebook 'chat' eature by clicking on its tab and

setting the options under the 'Options' link on the

pop-up menu.

PLAYING IT SAFE ON MYSPACE: Beore Facebook 

revolutionized the world o social networking,

MySpace took the Internet by storm. Being one o the

frst entrants in this feld, MySpace also is one o the

frst websites dedicated to musicians. Keeping in mind

this specifc target audience, the privacy options are

scattered across the account's setting page.

Log on to your MySpace account and click the 'My

Accounts' option. Click the 'Privacy' link to change the

general profle level settings. You can control your

notifcation settings by clicking the 'notifcations' tab

to set the way you wish to be inormed o any external

activity on your account. Finally or urther privacy

options, click on the 'Miscellaneous' link and change

the settings as required.

SURF CAUTIOUSLY ON LINKEDIN: A relatively newer

entrant into this market, LinkedIn plans to redefne the

Word business networking. The website encourages

people to create networks with those whom they have

had any type o proessional connection. It helps users

secure recommendations and new jobs as per their

current profles.

Log on to your LinkedIn account and click the

'Account & Settings' option. Here you can change all

the possible options in this page alone. Click on any

links listed under the 'Privacy Settings' section o the

page and edit the settings as per your requirements.

TWITTERING WITH CARE: Twitter has revolutionized

the world o social networking by combining the best

o networking and texting in a brand new genre called

micro-blogging. Most people get into trouble because

o the contents o their tweets. Houses get burgled

into, young girls have been reportedly molested and

political careers threatened because o irrational and

excessive twittering.

Firstly, know the people who ollow you i you

are twittering about personal details. Log on to your

twitter account and click the 'settings' tab and change

the settings as required. You can block people rom

ollowing you on the website.

However, there are not too many restrictions on

the site and any one can view your tweets irrespective

o the act that they don't ollow you. And hence you

need to be extra cautious beore you tweet details

relating to your location, residence or other

intimate details. What adds to this problem is the

growing support or Twitter on handheld devices.

SECURE YOUR IDENTITY ON HI5! Hi5! is one o the

oldest social networking websites and is one o the

earliest o its kind. The privacy settings are the most

easily navigable through this web portal. Just log into

your Hi5! account and click the 'Privacy' link. Click on

each o the sub-links to change the dierent privacy

settings.

PicasaWeb is an online photo sharing tool

where you can send invites to your friends

to view, save and comment on your photos.

Coming from the Google stable, this web

service has many fans the world over.

This website provides two levels of security,

namely account level privacy and album level

settings. For account privacy settings, log on to

your PicasaWeb account and click the 'Settings'

link. On the 'Settings' page, click the 'Privacy

and Permissions' tab. Set the changes as

required.

You can set album level privacy while

creating the album itself. For changing settings

in existing albums, go to the specific album.

Click the 'Edit' option and 'Album Properties'

from the drop-down list. Since it supports

collaborative photo uploading and sharing,

you can also create friend groups and change

settings as required.

STAY PICTURE-PERFECT WITH

PICASAWEB

Page 12: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 12/52

Page 13: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 13/52

APPLICATION FEATURE 13

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

You will now be able to view a screen prompting

you to install the security toolbar. De-select it i not

required and click 'Next' and then 'Finish' to commence

the installation process. The application will now be

installed on your system

Once the application has been successully installed,

you will be run through an automated wizard. Click 

'Next' to proceed. On the next screen, you will be

asked to set the time or a daily automated scan. Enter

the time in the textbox provided and make sure the

'Enable daily scanning' checkbox is selected. On the

next screen, select the license agreement check box

and click 'Next'.

 The application will now search or updates and

install them accordingly. Once done, click 'Next' and

then 'Finish'. You will now be to view the main interace

o the application. To scan a particular fle or older,

select the 'Scan selected older' or 'Scan fle' option

rom the 'Tools' menu. The scanning process will

commence. I the fle or older has been inected, AVG

will notiy you o the same and provide certain options

to deal with the fle. You can heal the fle or delete it i it

is not healable and not required.

You can also send the fle to the Quarantine wherein

it can be healed at a later stage. To scan the entire

computer, rom the 'Tools' menu, select 'Scan

computer'. In case there are any inected fles on your

system, AVG will notiy you o the same by displaying

the inected fle list.

ZONE ALARM FIREWALLZone Alarm Firewall is an application that protects

your PC rom hackers. It includes eatures like a

Firewall, application control, Interlock and Zone that

keep your system sae rom external attacks. It has an

easy interace and it allows one to confgure security

settings using a slider.

A recent update, known as the Game mode is

quite helpul. It lets a user automatically allow or deny

alerts while in the middle o a game. It's also good

at automatically confguring settings or the local

network. Zone Alarm can be downloaded rom the link 

www.download.cnet.com/ZoneAlarm/3000-10435_4-

10039884.html. Once downloaded, run the setup fle

and ollow the steps as mentioned.

Click 'Browse' and select a location to install the

application. Enter your name and e-mail address and

click 'Next'. Select relevant checkboxes to receive

updates. Once done, click 'Next' to continue. Select the

terms and conditions check box and click 'Install'.

You will now be able to view the confguration

wizard. Click the 'Scan my computer' radio button and

click 'Next'.

AVG allows users to set up and schedule a scan time so that your system can be safe and protectedfrom viruses everyday.

Enter appropriate details in the relevant text box and select the check boxes as shown to receive

updates on the latest threats.

Click the 'Standard installation' radio button and click 'Next' to continue the installation process. The

'Custom Installation' radio button is recommended for advanced users.

Page 14: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 14/52

4 FEATURE APPLICATION

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

Once done, click 'Finish'. You will now be asked

to reboot your system. Once your system has been

booted, click 'Finish' on the main screen. You

will now be able to view the main interace. Whenever

any program tries to access the Internet, you will be

prompted accordingly with a box. You can click 

'More ino' i you're uncertain about the program. I 

you're sure the program is sae, select the 'Remember

this setting' checkbox and click 'Allow', else simply

click 'Deny'.

SPYBOT SEARCH AND DESTROYSpybot is a popular and well known application that

scans or and eliminates spyware and adware. It comes

with a decent interace and the results are displayed in

a tree type structure. The sliding panel allows the user

to take quick decisions or example, quarantine, heal or

delete the inected object. The Immunization eature

blocks various Web-borne threats beore it can reach

your computer. Make sure the 'Enable Internet Explorer

protection' and 'Use system settings protection'

checkbox is selected while installing the application.

Spybot Search and Destroy is a ree application and

can be downloaded rom www.saer-networking.org/

en/download/. Once downloaded, double-click the

setup fle and click ollow the steps as mentioned. Click 

the 'I accept the agreement' radio button and click 

'Next'. Click 'Browse' on the next screen and select an

appropriate location to install the application. Click 

'Next' to proceed. Make sure the 'Use Internet

Explorer protection' and 'Use system settings

protection' checkbox is selected. Once done, click 

'Next' and then 'Install'.

Once the installation has been completed, you

are now ready to use the application or protection

against spyware and adware. Let's take a look at how

to go about it. Once the program starts, you will be

prompted to create a registry backup. Click the 'Create

registry' backup button. Once done, click 'Next'. It is

o vital importance to keep the application updated

to ensure complete protection. Click the 'Search or

updates' button. I there are updates available, Spybot

Search and Destroy will notiy you o the same and

keep you updated. Once done, you will be prompted to

immunize your system. Click the 'Immunize this system'

button. Once done, click 'Next' and then click the 'Start

using the program' button. To scan your system, click 

the 'Search and Destroy' button on the top right corner

o the screen and then, click 'Check or problems'.

 The scanning process will now commence. I threats

have been detected, simply select the checkbox next

to the threat and click the 'Fix selected problems'

button.

You will be prompted, each time an application tires to access your computer or tires to access theinternet from within.

Make sure that the 'Enable Internet Explorer protection' and 'Use system settings protection'

checkboxes are checked.

Click the 'Scan my computer' radio button and click 'Next' to proceed. This is a quick scan and will not

take much time. It is highly recommended that you perform this step.

Page 15: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 15/52

APPLICATION FEATURE 15

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

Page 16: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 16/52

Protect your fundsfrom being phishedPhishing is a technique through which passwords and other conidential details are stolen in order to hack into bank accounts and steal money rom victims. By ollowing these simple tricks, learn how to protect your money during online transactions.

B Y   K A M A K S H I   S

1USING THIRD PARTY

APPLICATIONS

WHILE there are several third party applications which help

you protect your interests while purchasing and perorming

transactions online, there are also several browser specifc

add-ons that you can enable within your browser. One such

tool is the 'Netcrat Toolbar', which is available only or the

Internet Explorer and Mozilla Fireox browsers as o now. These

applications help you to report raudulent sites, and help you

generate lists o the phishiest web hosts, worldwide.

2READ BETWEEN THE LINES

MOST email service providers today have a strong

in-built spam guard. Yet, i a scam mail still manages to make

its way to your inbox, may sure you read the contents twice or

thrice. Every credit company or bank has a specifc pattern o 

correspondence. I you fnd anything out o the ordinary or see

too many spelling mistakes, it is advisable to check with your

bank beore responding to such emails. I you fnd such emails

fshy, delete them without a second thought.

3CHECK THE SENDER NAME AND

ADDRESS TEXT

WHENEVER you get an email rom a clean source, the sender's

name would appear in your inbox. I you fnd an email ID

instead o the sender's name, you can delete the email without

even opening it. Similarly, i the email is addressed to an ID

like '[email protected]' or reects a part o the email ID

like 'Dear john9999' instead, such mails are usually sent rom

unreliable sources which send out bulk mailers as spam. Avoid

opening such emails, and even i you do, don't download the

attachments that are sent along with them.

4VERIFY IF THE EMAIL IS A SCAM

MOST email scam messages are marked as spam and are

diverted away rom your inbox. I they aren't, and the email has

genuine logos o well known companies, there might be a chance

o them deceiving you. I you don't get a convincing response

rom the source itsel, you can check on the Internet whether

these mails are indeed scams. Various web portals like 'www.bi.

gov/cyberinvest/escams.htm ' and 'www.hoax-slayer.com' provide

a comprehensive list o known scam emails. Check them and only

then respond to such emails.

5CLICK ON LINKS WITH CAUTION

THE oldest way to lure unsuspecting victims to submit

their details is by providing links in emails with names and

organizations that appear to be original. Irrespective o whether

the link lands you at a credit card site or an Internet banking site, it

is advisable to practice sae browsing while surfng the net. Never

click on the link rom the emails, instead type the address directly

into address bar o your browser yoursel. You can browse more

saely i you log in to each website through a dierent window.

Make sure that you log out o the site once you are done. Delete

your browsing history and temporary Internet fles periodically to

remain completely sae.

6CHANGE PASSWORDS REGULARLY

ALTHOUGH you have created passwords which are

deemed to be sae and strong, it is a recommended practice to

6 HANDS ON 10 TIPS

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

Page 17: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 17/52

keep changing your passwords periodically. Most people who

phish into your accounts are not your riends, and they can hack 

into your account without you telling them your password.

Make sure that your password is not alternating between two

values alone; your password should not resemble the last

three passwords that you had once set. Ater you change your

password take due care to remember it. In most o the credit

card or Internet banking websites, your account will be blocked

i you enter the wrong passwords or more than three attempts

consecutively, irrespective o the time o your last attempt.

7LOG INTO ACCOUNTS REGULARLY

LOG into all your accounts regularly even i you do not

want to make any purchases or transactions. Most people take

their account statements too lightly. Read and veriy each debited

and credited amount appearing on your statement. I you fnd

anything remotely suspicious, report and clariy it with your bank 

immediately. I a person has access to your account, he will not

phish into it right away. Staying observant will also help you cut

down on unnecessary expenses, and help you keep a tab on your

spending habits.

8USE THE LATEST VERSION OF YOUR

WEB BROWSER

ALWAYS use the latest version o your current web browser.

 These browsers come equipped with powerul and updated

anti-phishing flters that help you blacklist dubious websites

and also avoid browsing to already blacklisted websites. Many

browsers also have additional add-ons that you can download

and utilize. Use the latest versions o Internet browsers. Most o 

these contain their own anti-phishing flters and blacklists to keep

you sae while carrying out online transactions.

9UPDATE ANTIVIRUS AND FIREWALL

PERIODICALLY

MOST o the recent anti-virus, anti-spyware and frewall

applications come equipped with upgraded support to tackle

raud related security issues. While the version in your system

is prepared to secure your PC rom all the viruses known at the

time o its creation, the updated packages available add newer

codes to secure your data and online activities rom more recent

and lesser known threats even more eectively. Most anti-virus

applications post periodic updates on their website which you

can easily download and incorporate by yoursel.

10USE STRONG PASSWORDS

THE cardinal rule o password selection is that you

should always pick a password that is easy or you to remember

and di cult or anyone else to decode. Also your password

should have a healthy mix o alphabets (both upper and lower

cases) and numeric values. That eectively means that you should

avoid using your frst name, last name, amily name, nickname

or date o birth as passwords. Also avoid using confdential data

like your ATM pins, CVV or social security numbers as passwords

either. Shu e your passwords well. Don't pick the same username

and password combination or all the websites you sign up to

or email accounts. I one gets hacked into, it's not so di cult to

guess others. Don't share your passwords with any one. I you are

going to take so much trouble to pick an appropriate password, it

is rather wise to keep it to yoursel.

Sachin Pandit

10 TIPS HANDS ON 17

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

Page 18: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 18/52

Protect your laptop while on the goOne reason people choose laptops over desktop systemsis portability. However, with portability come threats likethet, natural hazards and other external problems. Hereare some helpul tips to make sure that your laptop issae while you're outdoors.

B Y   G A R E T H   M A N K O O

1USE TRACKING AND CALL BACK

APPLICATIONS

TO help you in times o need, in this case, in thet, we have

scores o applications that can ensure that you have some hope

o your laptop being returned to you ater being burgled. To do

so, these programs use techniques like sending inormation o 

the laptop's current location; this helps in tracing them. Other

services include call-back applications that call the owner rom

the laptop, thus giving away its location. Some notable tools

include SecureIT, Stealth Signal and CompuTrace.

2USE CABLE LOCKS

CABLE locks are quite an obvious choice or those who

eel that their laptops are not sae in an o ce or a caé. These

are used especially in cases where you need to leave your laptop

unattended or charging. Most o the laptops available these

days come with a Universal Security Slot (USS). This slot is used

to attach a cable lock or a laptop alarm. These devices aren't

expensive and can keep away small-time thieves.

3USE DOCKING STATIONS

DOCKING stations are another great means o securing

your laptops in your absence. While in an airport, hotel, caé,

train station, a client's o ce or any other place that would

require you to get your laptop out o its bag in order to work on

it, you could always use these to ensure that your laptop is just

where you put it when you let the place. O course, this means

o protection is eective only or a temporary period. Given a

bit more time, any thie can get away with your laptop and your

docking station to top it o.

4PERMANENTLY TAG YOUR LAPTOP

MAKING an impression o your name and the name o 

the organization that you work or can pay o in times o thet or

loss. You can get it embedded or engraved on your laptop rom

a proessional studio or use a label or a sticker with your personal

inormation. I you eel that these measures would be too crude

and would mar the sleek look o your laptop then you can invest

some more money and go in or tamper resistant 'commercial

asset tags'. Since these are made o metal there's little chance o 

them peeling o or tearing. This will also help in recovery i you

leave your laptop lying somewhere. Many people also resort to

putting their address and contact number on the laptop.

5USE SCREEN GUARDS TO HIDE

YOUR DISPLAY

SOMETIMES the inormation we're dealing with on our laptops

is extremely crucial and cannot be shared with others. Such

inormation like bank transaction details, sensitive letters and

notes and other such personal inormation have to be protected

rom those who would like to use it or all the wrong reasons. To

avoid such attacks on your sensitive inormation we have screen

guards. These cover your screen rom the sides and above so that

you do not ace the problem o people peeping into your screen,

over your shoulder. Adding screen guards however, can cause

the weight o your laptop to increase and will also add to the

number o accesories that you have to carry along.

6AVOID USING LAPTOP BAGS

IT is common sense to keep the thieves rom knowing

that you have a laptop with you in the frst place. Hence, you

8 HANDS ON 10 TIPS

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

Page 19: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 19/52

     H   e   m   a    l    i    L    i   m    b   a   c    h    i   y   a

should avoid carrying your laptop around in the regular carry

cases that make their contents quite obvious (especially those

that come with the laptop rom the vendor). Sometimes these

cases even have the brand logo o the laptop they contain,

ashing around in order to endorse it. Many laptop bags are

shaped like regular rucksacks, in order to thwart eorts o thet.

Also make sure that you carry it with you while traveling in

mass transit rather than letting it go along with the rest o your

baggage. However, one should make sure that you do not place

your laptop in an absolutely compact bag in order to conceal it.

 The bag should be padded and spacious enough.

7DISABLE BLUETOOTH AND

INFRARED PORTS

WE may eel that it isn't necessary to turn o access to your

Inrared and Bluetooth ports, when not in use. However, it is a

very good practice to make sure that these ports are disabled

since we may unknowingly accept harmul fles, which may not

always be intended or us, rom these ports. It is also possible to

hack into PCs using Bluetooth or Inrared. The Inrared port can

be disabled rom BIOS as well.

8DO NOT LEAVE PASSWORDS

WRITTEN ANYWHERE

ONCE you have gone through the stretched, cumbersome

process o setting up the security channels or your laptop to

keep it away rom possible attacks, you have a whole new task 

o keeping the inormation sae. For instance, many people

keep little scraps o paper that have the password or access

keys scribbled on them. These help in remembering these

codes incase the user has orgotten them. However, in case this

inormation alls into the wrong hands you can expect trouble.

Make sure that you handle such data careully.

9

SECURE YOUR LAPTOP WHILE ON

THE ROADTRAVELING in a car with your laptop tucked saely beside

you may not seem like an opportunity or a possible attempt

o robbery, but this isn't always so. There are times when you

will need to leave your car. Do not keep your laptop near

the window. Always make sure that the windows are closed.

However, there have been instances where laptops have been

stolen by breaking the car window. Resorting to the use o a

cable lock will come in as a great alternative. It will also help in

avoiding misplacement or dropping your laptop.

10

CAUTION WHILE TRAVELING BY AIR

UNLIKE the vulnerabilities that your laptop aces when

in a car, air travel needs more caution since you are under threat,

both inside as well as outside the plane. Outside, the airport is a

eeding ground or laptop thieves. It is quite easy or them to lay

hands on your laptop bag by creating a minor distraction or by

simply picking it up rom your baggage check beore you can do

so. It is better to carry your laptop with you while ying rather

than letting it go with the rest o your baggage. Also, while in

the plane, keep your laptop close to you. It is quite possible that

there may be a thie on-board. Passengers oten doze o during

long ights, thus giving thieves a good chance to steal their

things. Just keeping your laptop with you is not enough, also

make sure that you are alert o co-passengers.

10 TIPS HANDS ON 19

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

Page 20: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 20/52INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

0 HANDS ON TIPS & TRICKS

TIPS &

TRICKSWINDOWS VISTA

01BLOCK PROGRAMS

THE Internet is loaded with a wide

range o applications that can be

downloaded and installed. There are

also certain kinds o applications like

 TuneUp Utilities that can be useul.

However these applications can also be

used or harmul purposes.

I you have multiple users working

on your computer, using dierent

accounts which have such applications

installed, then your PC is sure to be at

|a risk. To overcome this problem, you

can use the in-built Parental Control

eature in Windows Vista. This can

block the installation and access o 

certain applications on dierent user

accounts.

 To use this utility, ollow these steps:

Go to 'Start | Control Panel '.

Click the 'Setup parental controls or

any user' link.

Select a user account on the

resulting screen.

Click the 'On, enorce current

settings' radio button.

Click the 'Allow and block speciic

programs' link.

Select the 'This account can only use

the programs I allow' radio button.

A list o applications will now be

displayed.

Select the applications that need to

be blocked and click 'OK'.

I the program is not mentioned in

the list, click 'Browse' and select the

required program.

Once the program has appeared in

the list, select it and click 'OK'.

WINDOWS VISTA

02BLOCK WEBSITES

THERE are several websites which give

out malware. Access to such websites

could put your system at risk.

Windows Vista has an amazing eature

known as 'Parental Control' which

allows the administrator to deny

access to certain websites. Other than

this, the administrator can also block 

fle downloads, view user activity,

block specifc applications and a lot

more. Let's take a look at how to go

about it.

Go to 'Start | Control Panel '.

Click the 'Setup parental controls or

any user' link.

Select a program you would like to block from the list and click 'OK'. The specified user will not be able to use

the application henceforth.01

WINDOWS

    S   a   c    h    i   n    P   a   n    d    i   t

Page 21: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 21/52

TIPS & TRICKS HANDS ON 21

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

Select a user account on the

resulting screen.

Click the 'On, enorce current

settings' radio button.

Click the 'Windows Vista Web

Filter' link.

Make sure that the 'Block some

websites or content' radio button is

selected.

Click the 'Edit the Allows and Block 

list' link.

Enter a website name in the

'Website address' text box.

Click the 'Block  ' button to block the

website rom being viewed. You can

block any number o websites as

required.

Once done, click 'OK  '.

WINDOWS VISTA

03REMOVE OLD DRIVERS

IF you've recently upgraded your

hardware and installed new drivers,

but are still experiencing some

problems, you might need to uninstall

the old drivers to avoid urther

problems.

A major problem here is that these

drivers are not visible in the Device

Manager window. In this tip we show

you how to tweak some system

settings to get rid o old drivers on

your system.

Follow these simple steps to go

about the same.

Go to 'Start | All Programs |

Accessories'.

Right-click the command prompt

and select the 'Run as Administrator'

option rom the context menu.

On the command prompt,

type in 'SET DEVMGR_SHOW_

NONPRESENT_DEVICES=1' and

hit [Enter].

 To open device manager rom

command prompt, type in

'devmgmt.msc' and hit [Enter].

From the View menu, select 'Show

hidden devices' option. You will now

be able to view all hidden drivers.

Right-click the name o a driver

that is not required and select the

'Uninstall' option rom the context

menu that appears.

WINDOWS VISTA

04DISABLE AUTOPLAY

THE Autoplay option in Windows

Vista appears whenever a CD/DVD

is inserted or an external drive is

plugged in via the USB port. This

eature might be quite helpul but at

times it may even get really annoying,

especially when it aects your

normal work or i you insert optical

discs very oten. I you eel that you

no longer require the Autoplay

unction, you can disable it. Simply

ollow the steps given below.

 To disable Autoplay or all devices,

go to 'Start | Control Panel'.

Under the 'Hardware and Sound '

section click the 'Play CDs or other

media automatically' link.

De-select the 'Use Autoplay or all

media and devices' check box.

 To disable certain devices and to

speciy the media type click the

drop-down list (next to the media

type or device you want to disable)

and select an option as required.

Once done, click the 'Save' button to

WINDOWS XP SP2

06DISABLE WRITING TO

USB DRIVES

IF your system is being used by

multiple users, then there is a huge

possibility o data being leaked

rom your system. Data thieves can

simply plug in a USB device and copy

sensitive data.

I you're concerned about data

security, you can disable writing to USB

drives with a simple registry tweak.

 To disable the writing o data to USB

drives ollow these steps:

Go to 'Start | Run', type 'regedit ' in

the text box and press [Enter].

Browse to the 'HKEY_

LOCAL_MACHINE | SYSTEM |

CurrentControlSet | Control |

StorageDevicePolicies' registry key.

Right-click anywhere on the right

pane and select the 'DWORD

(32-bit) Value' option.

Double-click the newly created key

and type '00000001' in the 'Value

data' ield.

Once done, you will have to

restart your system or changes

to take eect.

On the command prompt type SET DEVMGR_SHOW_NONPRESENT_DEVICES=1, run Device Manager, selectthe 'Show hidden devices' option from the 'View' menu and uninstall hidden drivers as required.02

Page 22: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 22/52INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

2 HANDS ON TIPS & TRICKS

WORD 2003 / 2007

01TRACKING CHANGES INA DOCUMENT

IF your data is critical and you want to

ensure that you give restricted access

on the document, you can either

control ormatting or editing changes.

 To do so using Word 2007:

Open the document on which the

restriction needs to be applied.

Go to the 'Review ' tab.

Click the 'Protect Document ' option

appearing under the 'Protect' group

at the end o the tab.

Select the 'Restrict Formatting and

Editing' option under the 'Restrict

Reviewing Options' section o the

drop-down menu that appears.

Check the 'Limit ormatting to a

selection o styles' option appearing

under the 'Formatting restrictions'

section o the dialog box.

Click the 'Settings ' link and check 

or uncheck the required option.

Click 'OK  ' to continue.

Next, check the 'Allow only this type

o editing in the document:' option

appearing under the

'Editing restrictions' section o the

dialog box.

Select the 'Tracked changes ' option

rom the drop-down list.

Click the 'Yes, Start Enorcing

Protection' button to enorce

restriction settings.

I you are using Word 2003, carry out

the ollowing steps:

Open the document on which a

restriction needs to be applied.

Go to the 'Tools | Protect

Document…' menu command.

 The 'Restrict Formatting and

Editing' panel appears on the right

side o your Word window.

Once you see the 'Restrict

Formatting and Editing' panel

simply ollow the steps as described

above (while using Word 2007).

WORD 2003 / 2007

02PROTECTING TABLE

VALUES

IF you are not comortable with

creating orms in your document, and

yet need to take user inputs you can

use tables instead. All you need to do is

create tables with cells containing fxed

values and editable values. To do so

using Word 2003:

Open the document to which

restriction needs to be applied.

Go to 'Table | Insert | Table ' menu

command.

Create a table by setting the

required number o rows and

columns.

Next, ill out the details that you

want to keep ixed.

Next, go to 'View | Toolbars | Forms '

to activate the 'Forms' toolbar.

Place your cursor on a cell where

you want the contents to be

editable.

Click the 'Text Form Field ' option

rom the 'Forms' toolbar.

Repeat the above steps or all the

editable cells.

Once done click the 'Protect Form '

option rom the 'Forms' toolbar.

Now no part o your document can

be edited except the speciied cells.

I you plan to use Word 2007 instead,

carry out the ollowing steps:

Open the document.

Go to the 'Insert ' tab.

Click the 'Table ' option appearing

under the 'Tables' group o the tab.

Click the 'Insert Table ' option rom

the drop-down menu.

Create a table by setting the number

or rows and columns.

Next, ill out the details that you

want to keep ixed.

Place your cursor on a cell that you

want to leave as editable.

Go to the 'Developer ' tab.

Click the 'Legacy Tools ' option under

the 'Controls' group.

Select the 'Text Form Field ' option

rom the drop-down list.

Repeat the above steps or all the

editable cells.

Next, click the 'Oice ' button and

click the 'Word Options' button

appearing at the oot o the drop-

down list.

Click the 'Customize ' option rom

the 'Word Options' dialog box.

Select the 'All Commands ' option

rom the 'Choose commands rom:'

drop-down list.

Scroll down and select the 'Lock  '

command. Click 'Add >>' to add it to

the 'Quick Access Toolbar'.

Click 'OK  ' to continue.

Click the 'Lock  ' button on the

'Quick Access Toolbar' to secure

your table.

If you click the 'Recommended Minimum' button only the recommended settings will be checked, the restwill be automatically unchecked.01

MICROSOFT WORD

Page 23: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 23/52

TIPS & TRICKS HANDS ON 23

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

WORD 2003 / 2007

03PROTECT SECTIONS OF A

DOCUMENT

YOU may have created reports where

you need another reviewer to enter

details and not tamper with certain

sections o the document. For doing

this certain parts o the document

should be locked while some parts

should be let open or editing. To

do so using Word 2007, carry out the

ollowing steps:

Open the document to which

restriction needs to be applied.

Select the data which needs to be

set as editable.

Go to the 'Page Layout ' tab.

Click the 'Breaks ' option appearing

under the 'Page Setup' group o the

tab.

Select the 'Continuous ' option rom

drop-down list.

Create as many section breaks as

required.

 Then, go to the 'Review ' tab.

Click the 'Protect Document ' option

appearing under the 'Protect' group

at the end o the tab.

Check the 'Allow only this type o 

editing in the document:' option

appearing under the 'Editing

restrictions' section.

Select the 'Filling in orms ' option

rom the drop-down list.

Click the 'Select Sections ' link that

appears below the drop-down list.

Select the section (or sections)

you want to lock in the 'Section

Protection' dialog box

Click 'OK  ' to continue.

Click the 'Yes, Start Enorcing

Protection' button.

Set a password i required.

I you are using Word 2003 instead,

carry out the ollowing steps:

Open the document to which

restriction needs to be applied.

Select the data which needs to be

editable.

Go to the 'Insert | Breaks… ' menu

command.

Check the 'Continuous ' option rom

'Break' dialog box.

Create as many section breaks as

required.

Next, go to the 'Tools | Protect

Document…' menu command.

 The 'Restrict Formatting and Editing '

panel appears on the right-side o 

your Word window.

Check the 'Allow only this type o 

editing in the document:' option

appearing under the 'Editing

restrictions' section.

Now simply ollow the steps as

above (while using Word 2007).

WORD 2003 / 2007

04PASSWORD PROTECTING

DOCUMENT

IF you are working with confdential

data, it is recommended that you

password protect such fles. Word lets

you create separate passwords or

opening and editing fles. Here's how:

Click the 'Oice ' Button.

Click the 'Save As ' option rom the

drop-down list.

Click the 'Tools ' option on the 'Save

As' dialog box.

Click 'General Options ' rom the

drop-down list.

Set the required passwords as per

your requirements. Click 'OK'.

You can set the macro security settings directly from this dialog box apart for setting passwords and making

files read-only.04

Once you lock the file for editing, the sections other than those specifically exempted will not be editable,unless there are forms controls in that section. 03

Page 24: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 24/52INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

4 HANDS ON TIPS & TRICKS

EXCEL 2003 / 2007

01PASSWORD PROTECTINGDOCUMENT

EXCEL helps you create separate

passwords or opening and editing

fles, but unlike Word, you cannot

modiy the macros settings rom this

option directly. Here's how:

Click the 'Oice ' Button in Excel.

Click the 'Save As ' option.

Click the 'Tools ' option on the 'Save

As' dialog box.

Click 'General Options ' rom the

drop-down list.

Set the required passwords.

Check the 'Read-only

recommended' option to make your

ile read only by deault.

Click 'OK  ' to save the settings.

EXCEL 2003 / 2007

02UNLOCKING SELECTED

CELLS

IF you are not comortable with

creating orms in your document, and

yet need to take user inputs you can

create a semi-locked range o cells. All

you need to do is create a range o cells

containing fxed values and editable

values. In Excel, the cells are locked

by deault, but the users can still edit

their content unless you protect the

worksheet as explained below. Carry

out the ollowing steps or Excel 2003:

Open the workbook to which

restriction needs to be applied.

Next, ill out the details that you

want to keep ixed in the cell range

o your choice.

Select the required cell range that

can be edited.

Go to the 'Format | Cells '.

Go to the 'Protection ' tab o the

'Format Cells' dialog box.

Uncheck the 'Locked ' option or the

selected range o cells.

Next, go to the 'Tools | Protection |

Protect Sheet'.

Check the 'Protect worksheet and

contents o locked cells' option in

the 'Protect Sheet' dialog box.

Next, check 'Select unlocked cells '

option rom the 'Allow all users o 

this worksheet to:' section.

 Type a password i required.

Click 'OK  ' to continue.

I you plan to use Excel 2007 instead,

carry out the ollowing steps:

Open the workbook.

Fill out the details that you want to

keep ixed in the cell range o your

choice.

Select the required cell range that

can be edited.

Go to the 'Home ' tab.

Click the 'Format ' option appearing

under the 'Cells' group o the tab.

Select the 'Lock Cell ' option rom the

drop-down list to unlock the cells.

Next, click the 'Format ' option under

the 'Cells' group o the tab once

again.

 This time select the 'Protect Sheet... '

option rom the drop-down list to

unlock the cells.

Check the 'Protect worksheet and

contents o locked cells' option in

the 'Protect Sheet' dialog box.

Next, check the 'Select unlocked

cells' option rom the 'Allow all users

o this worksheet to:' section o the

dialog box.

 Type a password i required.

Click 'OK  ' to continue. Your

worksheet is ready to be used.Setting a password to unprotect your worksheet makes the data more safe and secure. Make sure that you

pick a password that is long and hard to guess.02

MICROSOFT EXCEL

01You can auto create backups for the file by making sure that you check the 'Always create backup' option onthe 'General Options' dialog box

Page 25: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 25/52

TIPS & TRICKS HANDS ON 25

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

EXCEL 2003 / 2007

03DISABLE RENAMINGWORKSHEETS

IF you are creating reports in Excel,

which need to be edited by someone

else, you might want to make sure that

they do not change the worksheet

names. Carry out the ollowing steps

to do so in Excel 2003:

Open the workbook.

Go to the 'Tools | Protection | Protect

Workbook'.

Select the 'Structure ' option in the

'Protect Workbook' dialog box.

 Type in a password in the 'Password '

text box.

Retype the password to secure the

workbook.

I you plan to use Excel 2007 instead,

ollow these steps:

Go to the 'Review ' tab.

Click the 'Protect Workbook  ' option

appearing under the 'Changes'

group o the tab.

Click the 'Protect Structure and

Windows' option rom the drop-

down list.

Select the 'Structure ' option in

'Protect Workbook' dialog box.

 Type a password in the 'Password '

text box.

Retype the password to secure the

workbook.

Once protected, other users cannot

change the names o the worksheet

tabs, nor can they create new

worksheets or delete existing ones

without the password.

EXCEL 2003 / 2007

04PROTECTING

WORKSHEET COLUMNS

IF you have confdential data that you

need to protect rom prying eyes,

merely the locking columns will not

be enough. Apart rom locking the

column contents, you will also need

to hide these locked columns. To do

so using Excel 2003, carry out the

ollowing steps:

Open the workbook and press

[Ctrl] + [A] to select all the cells in

the workbook.

Go to the 'Format | Cells ' menu

command.

Go to the 'Protection ' tab o the

'Format Cells'.

Uncheck the 'Locked ' option.

Next, select the columns that need

to be protected.

Go to the 'Format | Cells ' menu

command.

Go to the 'Protection ' tab o the

'Format Cells'.

Check the 'Locked ' and 'Hidden'

options or the selected columns.

Keeping the columns selected,

select the 'Format | Column | Hide'

menu command.

Next, go to the 'Tools | Protection |

Protect Sheet'.

Check the 'Protect worksheet and

contents o locked cells' option that

you see in the 'Protect Sheet'

dialog box.

Set a password to secure your

worksheet.

Click 'OK  ' to continue. Your data is

now protected as well as hidden

rom possible threats.

I you are using Excel 2007 instead,

carry out the ollowing steps:

Open the workbook and press

[Ctrl] + [A] to select all the cells in

the workbook.

Go to the 'Home ' tab.

Click the 'Format ' option appearing

under the 'Cells' group.

Now, elect the 'Lock Cell ' option

rom the drop-down list to unlock 

the cells.

Next, select the columns that need

to be protected.

Click the 'Format ' option appearing

under the 'Cells' group o the tab

once again.

Select the 'Format Cells ' option rom

the drop-down list.

Go to the 'Protection ' tab in the

'Custom Lists' dialog box.

Select the 'Locked ' and 'Hidden'

options.

Click 'OK  ' to continue.

Once again, click the 'Format ' option

appearing under the 'Cells' group o 

the tab.

 This time select the 'Protect Sheet... '

option rom the drop-down list to

unlock the cells.

Check the 'Protect worksheet and

contents o locked cells' option in

the 'Protect Sheet' dialog box.

 Type a password to secure the

worksheet urther. Make sure that

your password is strong.

Click 'OK  ' to continue. Your

worksheet is ready to be used.

This technique is not completely foolproof. The data contents can be viewed using cell reference in an

unlocked cell.04

Page 26: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 26/52INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

6 HANDS ON TIPS & TRICKS

INTERNET EXPLORER 8

01USE IE8 ACCELERATORS

Internet Explorer 8 has an exciting

new eature called Accelerators, that

can solve your browsing problems.

Accelerators basically quicken your

'website search' by giving you direct

links to popular web search tools that

can be opened with a mouse click.

When you install Internet Explorer 8

you are provided with Accelerators

that provide you with only those sites

that are a liated to Microso t, such as

Windows Live. Here's how to go about

with using Accelerators:

Open up any webpage on Internet

Explorer 8. Make sure that it is a

site that has various elements like

images and textual inormation. The

best example would be a Google

search results page.

Right-click on a link on the page

and in the context menu, you will

see the 'All Accelerators' option. A

tray will open up with an option o 

Accelerators that are available.

Using these Accelerators you can

receive a direct translation o the

page to the language o your choice.

You can also blog the article that

you are on as well as e-mail it to

your contacts.

 To look or more Accelerators

or Internet Explorer 8 click 'Find

More Accelerators' under the 'All

Accelerators' menu. The browser will

open up a page that contains links

to an add-ons page that contain

various Accelerators that can be

added to the browser. Simply click 

the 'Add to Internet Explorer' button

beside the ones you would like

to add. A dialog box will appear

on your screen asking you or a

conirmation o the same. Click 'Add'.

 The add-on link will be added to

your list o installed Accelerators.

 To conigure it, again right-click on

the page and click 'All Accelerators |

Manage Accelerators'. A new dialog

box will appear on your screen.

Simply click on the one you installed

and click the 'Set as deault' button

i you want to set this as the deault

Accelerator. You can also 'Disable',

'Enable' and 'Remove' Accelerators

rom here.

Click 'Close ' to exit.

MOZILLA FIREFOX

02VIEW TRUSTED SITES

Mozilla Firefox has an in-built deense

mechanism that decides which sites

are sae to visit and which aren't. The

browser allows you to customize your

security to a level that you fnd suitable

in the ormidable Web environment

that has scores o viruses and other

threats oating around. It's called WOT

(Web O Trust) and is available as a

Fireox add-on. The representation

o threatening sites is quite easy to

understand while using WOT since

it color codes the sites based on the

levels that you set. Follow these steps

to install WOT into Fireox,

Visit https://addons.mozilla.org/

en-US/ireox/addon/3456

Click 'Add to Fireox '.

Click 'Install ' on the dialog box that

appears on your screen.

Ater the add-on is installed you will

have to restart Fireox.

Once you restart the browser you

will be redirected to the 'welcome'

page o the WOT site. You will come

across our radio buttons that ask 

you to select the level o protection

that WOT should use.

Select your level and click 'Finish '.

A green circular logo o the

application will appear on your

Navigation toolbar, beside the

address bar. Click this button and

click on the rating meter to mark the

'Trustworthiness', 'Vendor reliability',

'Privacy' and 'Child saety'. You can

do this by clicking on the color-

coded rating bars.

 To view the overall score o the site

as per rating o users simply click the

'View scorecard or ratings detail' in

the dropdown box.

WOT can thus help you gain a better

understanding o what risks you

run into whenever you visit certain

websites.

MOZILLA FIREFOX

03MANAGE YOUR

PASSWORDS SMARTLY

Passwords are always a problem

to handle. Firstly, picking the right

WEB

One of the most useful things you can do with Accelerators is translating a webpage in real-time.  By default

IE8 translates using 'Live Search'.01

Page 27: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 27/52

TIPS & TRICKS HANDS ON 27

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

password always makes us scratch our

heads, and then comes the problem

o remembering these passwords

over a period o time. This problem

arises because most o us have multiple

IDs (or logins) on dierent sites, and

with all the hype o keeping away

rom using the same password in

multiple sites.

 There is however something that

can help us out o this mess without

asking or much. It's called 'LastPass

Password Manager'.

It is a Mozilla Fireox add-on

that supports versions rom 2.0 to

3.7. Follow these steps to install

and confgure your passwords with

LastPass.

Visit https://addons.mozilla

.org/en-US/freox/addon/8542.

Click the 'Add to Fireox (Windows)'

button.

 The installation dialog box will

open up. Once the installation is

complete, restart Fireox or the

changes to take eect.

Click the logo on the ar right corner

o the navigation toolbar. It can be

ound on the right o the search

box. It is shaped like a black square

with a white password character

embedded on it. You will be asked

or your email address and or a

master password.

Click the 'Create an account' link 

on the 'LastPass Master Login'

dialog box.

 This will launch the setup window.

Select your language o choice and

click 'Create an account'.

On the next orm enter the details

that are asked like your email

address, master password and

other ields. Your master password

will help you take control o all

the inormation you share with

LastPass, such as passwords o 

various sites that you sign up or.

Check all the checkboxes at the

bottom, especially 'I have read and

agree with the terms o service

and privacy statement' and 'I

understand that my encrypted data

will be sent to LastPass'.

As you ill in the master password,

you will notice that the bar

below the ield is illed with color

indicating the strength o the

password. The strongest password

is that which is illed with color.

Click 'Create an Account' again to

proceed.

Just to make sure that you do not

orget the master password that

you set earlier, LastPass will ask 

you to reenter the password. Do

this and click 'Create an Account' to

continue.

 The next options are crucial. Select

the irst radio button that lets you

choose the items that you want to

import.

Click 'Continue'.

A smaller dialog box will appear

with the list o logins that are

registered to the email address that

you had entered. Click 'Import' ater

selecting all.

Keep clicking 'Continue' on the

ollowing steps to complete the

registration process.

Once you have done this, the

completion o your registration process

will be confrmed. Make sure that you

do not share your master password

with anyone. Every time you visit a

page that requires you to log in simply

ensure that you have signed into

LastPass. The application asks you

to enter only the master password.

 The rest is taken care o as your email

address and password is entered

automatically ater a brie reerence to

the application's list o log ins.

After selecting the language click 'Create an account'. You will be redirected to the next form where youhave to enter details.04

Click on the color-coded ratings bar to let other users know how safe it is to visit a site. To view all resultsclick 'View scorecard for rating details'.02

Page 28: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 28/52

8 HANDS ON    WORKSHOP

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

SKILL LEVEL

Moderate

WHAT YOU WILL NEED

SanDisk Flash Drive

Windows OS

Internet Connection

WHAT YOU CAN LEARN

Securing your flash drive

Safely ejecting USB drives

HOW LONG IT WILL TAKE

T30 Minutes

KEY DETAILS

Lock up your

USB driveThere is always a chance o you losing your USBlash drives with conidential data in them. Hence,it is a good practice to lock it up with a password.Here's how you can do it using U3 LaunchPad on your SanDisk drives.

B Y   K A M A K S H I   S     H

   e   m   a    l    i    L    i   m    b   a   c    h    i   y   a

 STEP 1

DOWNLOADING AND INSTALLING

ALTHOUGH U3 LaunchPad comes ree o cost with most SanDisk ash drives, you can stilldownload a copy o the drivers. To use the application, carry out the ollowing steps

Visit '1. www.sandisk.in/

Retail/DriverDownloads.

aspx'.

Click the 'U3 LaunchPad2.

Installer' link.

Click the 'Download3.

Drivers (.exe)' on the

next page and save the

'LPInstaller.exe' ile.

Plug your lash drive4.

into the system and

complete the installation

as directed.

Double-click the exe ile5.

to begin the installation.

Click 'Next' to proceed.

Select 'Accept6. ' and click 

'Next' on the subsequent

window.

I your lash drive already7.

contains data, check the

'Yes, backup and restore

all data.' Option and click 

'Next' to proceed.

Page 29: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 29/52

WORKSHOP   HANDS ON 29

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

SETTING USB

PREFERENCES

You can change or modiy the

settings or your USB drive

using U3 LaunchPad. To do so,

carry out the ollowing steps:

Click the 'U3[1] ' iconappearing in the

Status Bar.

Click the 'Settings[2] ' link in

the U3 browser window.

Click the 'U3 LaunchPad[3]

Settings' link rom the

pop up options o the U3

browser window.

Change the settings in the[4]

'Preerences' and 'Autorun'

sections o the dialog box.

Click 'Close[5] ' to close the

dialog box.

UNINSTALLING THE

APPLICATION

Since the application is not

installed on your hard disk, a

shortcut in the Start Menu is

not created among the other

'Programs'. Hence, you cannot

uninstall the application

directly. To uninstall it, carry

out the ollowing steps:Click the 'U3[1] ' icon on the

Status Bar.

Click the 'Settings[2] ' link in

the U3 browser window.

Click the 'U3 LaunchPad[3]

Settings' link rom the

pop up options o the U3

browser window.

Change the settings in the[4]

'Uninstall' option rom the

dialog box.

Click the 'Uninstall U3[5]

LaunchPad' button to

remove the read only

partition rom your

USB drive.

Click 'Close[6] ' to close the

dialog box.

CHIP PLUS TIP

CHIP PLUS TIP

 STEP 2

SECURING YOUR FLASH DRIVE

ONCE you have installed the application, the next step is to secure your ash drive with a password. To do so, carry out the ollowing steps:

A summary o options8.

will appear. Check your

Internet connection and

click 'Next' to proceed.

Follow the listed steps to9.

complete the installation

process.

NOTE: The application uses

a web installation fle which

does not work with proxy web

servers.

Double-click the new1.

drive called 'U3 System

(drive name)'. This is

created ater installation.

NOTE: This virtual drive is a

part o your USB drive itsel. The part where the application

fles are installed is converted

into a Read-only drive and is

displayed as a separate drive.

Click 'Enable Security2. '

in the 'U3 LaunchPad'window.

NOTE: You can also launch the

application by clicking the 'U3'

icon on the Status Bar.

Page 30: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 30/52

0 HANDS ON    WORKSHOP

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

MONITORING A NON-

SANDISK DRIVE

I you are using a USB drive

which is a not a SanDisk 

device, you can use alternative

applications to monitor it.

One such reeware is the 'USBLocker'. To use the application,

carry out the ollowing steps:

Visit '[1] http://bytescout.

com/usblocker.html ' and

click the 'Download USB

Locker (EXE installer, direct

download link)' link.

Save the exe fle and install[2]

the application.

Go to 'Start | All Programs[3]

| Bytescout USB Locker |

Bytescout USB Locker.exe'.

Click the 'Disable Writing[4]to USB ash drives' option.

Ensure that 'Use password[5]

protection' is checked.

 Type a password in the[6]

dialog box that pops up

and click 'OK'.

Click 'Enable Writing to[7]

USB ash drives' and

retype the password to

unblock your USB drive.

CHIP PLUS TIP

 STEP 3

SAFELY EJECTING YOUR FLASH DEVICE

AFTER your work with the USB drive is done, you need to ensure that you unplug it saely or utureuse. To eject your USB device saely, carry out the ollowing steps:

 Type and retype a3.

password to lock your USB

drive.

I you orget your4.

password you will have no

option but to ormat your

lash drive.

You can type an optional5.

hint question to remind

you o your password i 

you orget it.

U3 LaunchPad is6.

compatible with Windows

OS only. It doesn't work 

on MAC or Linux OS.

Click the 'U31. ' icon on the

Status Bar.

Click the 'Eject2. ' button to

remove the drive saely.

I you encounter some3.

error while ejecting click 

'Download Programs'.

Click 'USB Saely Remove4.

or PC' in the U3 browser

window.

Save and install the5.

application.

Double-click the 'USB6.

Saely Remove' icon on

the desktop.

Select the USB device7.

appearing under the

'Displayed in the menu'

section.

Click 'Stop USB Device8. ' to

eject saely.

Page 31: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 31/52

WORKSHOP   HANDS ON 31

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

SKILL LEVEL

Beginner

WHAT YOU WILL NEED

SecureCrypt UE

WHAT YOU CAN LEARN

Encrypting text files

Encrypting non-text files

Using files as encryption keys

HOW LONG IT WILL TAKE

T30 Minutes

KEY DETAILS

Encrypt your

dataData encryption is a smarter way to secure data ascompared to password protecting iles. Learn how  you can make your data and other iles sae usingSecureCrypt.

B Y   K A M A K S H I   S    H   e   m   a    l    i    L    i   m    b   a   c    h    i   y   a

 STEP 1

DOWNLOADING AND INSTALLING

SECURECRYPT is a ree tool available over the Internet which enables you to encrypt text data in afle as well as data not saved in the text ormat. To download and use this application, carry out theollowing steps:

Visit '1. www.securecrypt.

co.nr'.

Click the 'Download2. '

button to continue.

Click the 'Download3.

SecureCrypt Ultimate

Edition (3.0.0)' link.

Save the 'sc3_setup_2.4.

exe' ile.

Double-click the ile to5.

begin installation.Keep clicking 'Next6. '

till you reach the inal

installation window.

Click 'Install7. '.

Click 'Finish8. ' to launch the

application.

Page 32: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 32/52

2 HANDS ON    WORKSHOP

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

WHAT DOES DATA

ENCRYPTION MEAN?

Encryption is a process o 

converting normal text into

what seems like a sequence

o random text also known as

cipher text. The conversion o data into cipher text requires

certain ormula known as

algorithms. There are several

algorithms available to help

with this conversion. The

amount o time taken to

encrypt the data orms the

basis o the encryption. The

Advanced Encryption Standard

(AES) was made available to

the public in around 1998 and

was used by the military. It is

a 256-bit encryption standardand can encrypt and decrypt

at a mean speed o around 36

mbps. AES-Twofsh-Serpent is

a very strong encryption and

can encrypt and decrypt only

6.6 mbps on an average. This

also depends on the system; a

aster processor will perorm

the task much aster. The RAM

is also a major actor.

REFERENCE

 STEP 2

ENCRYPTING AND DECRYPTING TEXT FILES

IF you have important and confdential details in a Word document, then it is always better toencrypt the contents rather than depend on a password. A password can be cracked and the flecan be hacked into. To encrypt a text fle, carry out the ollowing steps:

Double-click the1.application shortcut

appearing on the desktop

to start the application (i 

it is not already running).

Click the 'Encrypt or2.

Decrypt' logo on the

application window.

Next, click the 'Password3.

Key' button appearing

under the 'Please select

what Encryption or

Decryption Technique you

wish to use:' dialog box.

Click 'OK 4. ' on the 'Select

the ile that you want

Encrypted/Decrypted'

dialog box.

Browse and select the ile5.

rom the 'Open' dialog

box and click 'Open' to

load the ile.

Enter a password in the6.

'Enter a password key

to Encrypt/Decrypt the

ile with...' dialog box as

shown here.

Click 'OK 7. '.

Carry out the same8.

process to decrypt the ile.

Load the same ile and

type the same password

to retrieve ile contents.

Page 33: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 33/52

WORKSHOP   HANDS ON 33

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

CUSTOMIZING PDF FILES

Since the application does not

create a shortcut in5 the Start

Menu, you cannot uninstall

the application directly. You

can uninstall the application

either rom the Control Paneldirectly or rom the application

itsel. I you uninstall it rom

the application, you will

have to manually delete the

desktop shortcut. Carry out the

ollowing steps:

Start the application.[1]

Click the 'Uninstaller[2] ' icon.

Click 'Next[3] ' in the

'uninstaller' window till

you have completed the

process.

Click 'Finish[4] ' and proceedto delete the Desktop

shortcut. The application

will be uninstalled.

REPORTING BUGS

You can report these bugs with

the help o SecureCrypt UE.

Make sure you are connected

to the Internet or reporting

bugs. Once you are ready, carry

out the ollowing steps:Start the application.[5]

Click the 'Report a Bug[6] '

option on the application

window.

Your deault browser[7]

window will open with the

'Bug Report' page o the

sotware website.

Enter the required details[8]

and enter the characters

appearing in the captcha

image at the oot o 

window.

Click the 'Submit[9] ' button

to log the errors.

CHIP PLUS TIP

 STEP 3

ENCRYPTING AND DECRYPTING NONTEXT FILES

IF you have video fles or image fles which are not text based, it can be quite cumbersome toencrypt such fles. Also i you are not comortable remembering too many complex passwords, youcan encrypt fles by ollowing the steps mentioned below:

Click the 'Encrypt or1.Decrypt' logo as beore.

Click the 'File Key2. ' button

in the dialog box that

appears.

Click 'OK 3. ' on the 'Select

the ile that you want

Encrypted/Decrypted'

dialog box.

Browse and select the ile4.

rom the 'Open' dialog

box and click 'Open' toload the ile.

Next, Click 'OK 5. ' in the

'Select a ile that will be

used as the Encryption/

Decryption the ile key..'

to set a key ile.

Browse and select the key6.

ile rom the 'Open' dialog

box and click 'Open' to

load the ile.

NOTE: The key fle should be

a separate fle. It can be o any

type.

Click 'OK 7. ' to complete the

process.

Carry out the same8.

process to decrypt the ile.

Load the same ile and

type the same password

to retrieve ile contents.

CHIP PLUS TIP

Page 34: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 34/52

4 HANDS ON    WORKSHOP

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

SKILL LEVEL

Moderate

WHAT YOU WILL NEED

Windows XP or later

Internet explorer, Mozilla Firefox or

Google Chrome

WHAT YOU CAN LEARN

Configure browser security options

HOW LONG IT WILL TAKE

T30 Minutes

KEY DETAILS

Secure your

web browserMost popular Internet browsers come along withsecurity eatures that help you browse saely. Let’stake a look at these options and how to conigurethem accordingly.

B Y   D O L W I N   F E R N A N D E S     H

   e   m   a    l    i    L    i   m    b   a   c    h    i   y   a

 STEP 1

CONFIGURING INTERNET EXPLORER

INTERNET Explorer 8 is Microsot's latest Internet browser. However, its predecessors too havesome common security options that can be confgured or maximum security. Let's see how to goabout it.

Run Internet Explorer and1.

press the [Alt] key to view

the menu bar.

Select 'Internet Options2. '

rom the 'Tools' menu.

Click the 'Security3. ' tab.

Under the 'Security level4.

or this zone' section, set

the slider bar to 'High'.

Click a zone, or example

'Internet'.

Click the 'Custom level5. '

button.

Scroll down until you see6.'Run ActiveX controls and

plug-ins'.

Click the 'Disable7. ' radio

button.

Page 35: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 35/52

WORKSHOP   HANDS ON 35

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

USE INPRIVATE

BROWSING MODE

IN IE8

I you're using the Internet

rom another computer, it

is necessary to clear your

surfng history or delete savedcredentials since it may be

misused. IE8 comes along

with the InPrivate browsing

mode option that deletes

temporary Internet fles, orm

data, cookies, usernames

and passwords as well as the

search history that is normally

saved by the browser. Note

that i you're using Windows

Vista and Parental Controls are

activated, InPrivate browsing

mode is disabled by deault. To browse using InPrivate

browsing mode, ollow the

steps below.

Click the 'Saety[1] ' option.

From the resulting menu,[2]

select the 'InPrivate

Browsing mode' option.

WHAT ARE COOKIES?

Whenever you browse a

website, certain data is storedon your system. This data is

known as cookie. It can contain

any data that the website

places in it. They are actually

designed to be readable by

the website that stored the

data. There are two types o 

cookies i.e. Session cookies

and Persistent cookies. Session

cookies are cleared as soon as

the browser is closed whereas

Persistent cookies remain on

your system until the specifed

expiration date. These pose

threat as they stay or a long

period. These cookies help the

website to uniquely identiy

the visitor which some may

consider as a privacy violation.

Hence setting cookie options

or websites is recommended.

CHIP PLUS TIP

REFERENCE

 To add a website to the8.

trusted list, in the 'Internet

Options' dialog box, click 

the 'Security' tab.

Click the 'Trusted Sites9. '

icon.

Click the 'Sites10. ' button.

Enter a site name in the11.

text box and click 'Add'.

NOTE: The 'Trusted Sites' zone

contains a list o websites that,

you eel, are sae or browsing.

You can add a website to the

'Trusted Sites' list as and when

required.

 To change cookie settings,12.

click the 'Privacy tab'

rom the 'Internet Option'

dialog box.

Click the 'Advanced13. '

button.

Select the 'Override14.

automatic cookie

handling' checkbox.

Click the 'Prompt15. ' radio

button or both irst and

third party cookies.

You can also manage16.

cookie settings or

certain websites. To do

so, in the 'Internet

Options' dialog box,click the 'Privacy' tab.

Click the 'Sites17. ' button.

Enter the name o the18.

address in the text box

and click the 'Allow' or

'Block' button as required.

Page 36: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 36/52

6 HANDS ON    WORKSHOP

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

WHAT IS ACTIVEX?

ActiveX is basically a

technology that is used by

Internet Explorer. It allows

applications to be used by

the browser. An ActiveX

component may alreadyreside on a Windows system

or it may be provided as a

downloadable object. This

enhances the unctionality

o web browsing. On the

other hand, it may also pose

as a security threat i it's

not properly implemented.

 Though it's quite useul, it

also increases the chances

o you being attacked.

Also, installing a Windows

application introduces thepossibility o ActiveX controls

being installed on the system.

Hence one should be aware

o or completely block these

applications rom being

installed through the browser.

REFERENCE

 STEP 2

CONFIGURING MOZILLA FIREFOX

FIREFOX has gained popularity over the years and is being used by many. But like Internet Explorer,it comes with security options that need to be confgured or optimum security. To confguresecurity settings, ollow the steps below.

Run Fireox and select1.

'Options' rom the

'Tools' menu.

Click the 'Always ask me2.

where to save iles' radio

button under the 'Main

tab'. This would make

you aware o iles being

downloaded, since some

iles are downloaded

without your notice.

Click 'OK 3. ' to save changes.

Now, click the 'Security4. '

tab.

Deselect the 'Remember5.

passwords or sites'

checkbox.

I you have saved6.

passwords previously,

click the 'Save Passwords'

button.

Select the credentials7.

rom the list and click 

'Remove'.

Under the security tab,8.

make sure the 'Warn mewhen sites try to install

add-ons' checkbox is

selected.

I you would like to add9.

exceptions or websites,

click 'Exceptions'.

In the resulting window,10.

enter the name o the

website in the text box

and click 'Allow'.

Once done, click 'Close11. '.

Page 37: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 37/52

WORKSHOP   HANDS ON 37

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

 STEP 3

CONFIGURING GOOGLE CHROME

GOOGLE'S frst ever web browser was successully launched a ew months ago and is currentlybeing used by many. Like other browsers, Chrome also comes with security options that are notconfgured by deault. Let's take a look at some o these options and implement them accordingly.

Run Google Chrome and1.

click the wrench menu.

Select the 'Options2. '.

In the resulting dialog3.

box, click the 'Under the

Hood' tab.

Select the 'Ask where4.

to save each ile beore

downloading' checkbox

to be notiied o ile

downloads.

Click the 'Personal5.

Stu' tab.

Under the 'Passwords6. '

section, click the 'Never

save passwords' radio

button.

Under the 'Form autoill7. '

section, click the 'Never

save text rom orms'

radio button.

Click the 'Clear browsing8.

data' button.On the resulting window9.

that appears, select the

checkboxes as required.

Make sure the 'Clear saved10.

passwords' checkbox is

selected.

From the 'Clear data11.

rom this period', select

'Everything'.

Finally, click the 'Clear12.

Browsing Data' button.

WHAT ARE BROWSER

PLUG-INS?

Plug-ins are extra applications

that can be used by a web

browser. By deault most

plug-ins are not installed since

it may not be required by theuser and at the same time it

also keeps the browser light.

Most plug-ins are (by deault)

created by the browser owner

themselves. On the other hand

there are plug-ins created by

third party users to extend the

browser's unctionality. They

are similar to ActiveX controls.

 The only dierence is they

cannot be executed outside

the web browser. Adobe Flash

player is an example o aplug-in. Downloading plug-ins

rom a third party might put

your inormation at stake since

the plug-in may contain code

to steal private inormation or

even harm your system. Hence

downloading a plug-in, only

rom the browser's deault

website is recommended.

REFERENCE

Page 38: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 38/52

8 HANDS ON   WORKSHOP

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

SKILL LEVEL

Moderate

WHAT YOU WILL NEED

Windows XP or later

Universal Shield 4.3

WHAT YOU CAN LEARN

Password Protect files and folders

Lock Windows folders

HOW LONG IT WILL TAKE

T30 Minutes

KEY DETAILS

Protect your files

and foldersWindows operating systems do come with security eatures that keep one's system sae. But it does not include security eatures that can protect individual iles and olders. Let's see how Universal Shield cantake us to the next level o security by helping us protect individual iles and olders.

B Y   D O L W I N   F E R N A N D E S     B

   r    i    j   e   s    h    G   a    j    j   a   r

 STEP 1

DOWNLOAD AND INSTALL

UNIVERSAL Shield is a shareware and can be evaluated or 30 days. This application can bedownloaded rom the link www.everstrike.com/download/ushield.exe Once downloaded, run thesetup fle and ollow the steps below.

Double-click the setup1.

ile, select the language as

required and click 'Next'.

Agree with the terms and2.

conditions by selecting

the checkbox and click 

'Next' to continue.

You would require3.

entering a password to

protect the sotware

rom being misused.

Enter the password or

the application and click 

'Next'.

Click 'Browse4. ' and select

an appropriate older to

install the application.Clicking the 'View5. ' button

gives you a quick view

o how much space is

remaining on each drive.

Click 'Next6. ' to proceed.

Once the installation is7.

completed, click 'Yes,

reboot my computer

now' radio button.

Click 'Next8. ' and then

'Finish'.

Page 39: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 39/52

WORKSHOP   HANDS ON 39

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

WHAT IS UNIVERSAL

SHIELD?

At times you might require

sharing your PC with dierent

users. For security purposes,

you can create separate user

accounts. But what i the userhas to use the main account

or some or the other reason?

By allowing the user access

to the main, you might put

confdential inormation at

stake. Hence or additional

security, Universal Shield

can come in handy. Using

this application, you can

password protect fles, olders

or an entire group o fles o a

particular fle type. Moreover,

you can also hide drives andprevent access to certain

objects like the Control Panel

and My Documents.

CHANGE THE MAIN

PASSWORD

It is a good practice to change

the main password o any

application requently. While

installing Universal Shield, you

were asked to enter the mainpassword or the application

so as to protect the application

itsel rom being misused.

Also, the main password would

be required i a user tries to

uninstall the application.

You can change this

main password as and when

required. To do so, ollow the

steps below.

Run the application[1]

and select the 'Change

password' option rom the

'Security' menu.

On the resulting screen,[2]

enter the current

password and the new

password.

Confrm the new[3]

password.

Click 'OK [4] ' to save changes.

REFERENCE

CHIP PLUS TIP

 STEP 2

USING UNIVERSAL SHIELD

ONCE the installation has been completed, you can now set permissions or fles and olders,encrypt fles and lock them. Let's take a look at how to go about this.

 To hide a ile or older,1.

run application and

click the 'Hide iles'

radio button.

Click 'Next2. ' and 'I want

to hide a ile' or 'I want

to hide a older' radio

button.

On the next window, click 3.

the 'Add to list' button

and browse or iles or

olders to be hidden.Click 'Next4. ' and then

'Finish'.

 To hide an entire drive5.

select the 'I want to hide a

disk' radio button.

 To hide a group o iles,6.

click the irst radio button

and then click 'I want tohide a group o iles using

masking'.

On the next screen, click 7.

'Add to list' and enter the

mask symbol. For eg. to

hide Word iles, enter

'.doc' and click 'Finish'.

You can also set iles as8.

read only. To do so, on themain interace, click 'Set

read only access mode or

objects'.

On the next screen, select9.

an appropriate radio

button. You can set the

read only permission to a

ile, older or a group o 

iles using masks.

Browse or the ile/older10.

or enter the extension o 

iles and click 'Finish'.

Page 40: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 40/52

0 HANDS ON    WORKSHOP

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

USING THE STEALTH

MODE

 The Stealth mode option in

Universal Shield hides the

entire program including the

fles and icons rom being

displayed on your system. Bydoing so, one wouldn't be

aware that the application is

installed on the system. I the

program is in Stealth mode,

you would require using 'hot

keys' to start the application.

Hence we would frst have to

set hot keys. Let's take a look at

how to go about it.

Run Universal Shield and[1]

select the 'Set hot keys'

option rom the 'Options'

menu.Select the 'Enable hot[2]

keys' checkbox.

Click on the 'Open[3]

Universal Shield'

textbox and press a key

combination. For example

'Ctrl + Shit + U' and click 

'OK'.

Now to run the application[4]

in stealth mode, select the

'Stealth mode' option rom

the 'Security' menu.

CHIP PLUS TIP  To encrypt a ile or older,11.

click the 'Encrypt selected

iles and olders' radio

button on the main

interace.

On the next screen select12.

whether you want to

encrypt a ile or olderand browse or it.

On the next screen13.

you will have to enter a

password or the ile or

older and conirm it.

On the next screen select14.

an appropriate option

rom the drop-down list

and click 'Finish'.

 To later decrypt the ile,15.

run the application and

select the ile rom the

main interace.

From the 'Encryption16. '

menu, select 'Decrypt'.

Enter the password or the17.

ile and click 'Start'.

Other than simply18.

protecting particular

fles and older, you can

also lock objects like My

Documents, Favorites,History, Control Panel,

date and time settings

as well as the desktop.

 To lock these items, rom

the 'File' menu, select

'Universal Shield Wizard'.

Select the 'Security19.

tricks' radio button and

click 'Next'.

Once done, click 'Finish20. '.

Page 41: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 41/52

WORKSHOP   HANDS ON 4

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

SKILL LEVEL

Moderate

WHAT YOU WILL NEED

Internet connection

WHAT YOU CAN LEARN

Change your password

Block contacts

Customize privacy

HOW LONG IT WILL TAKE

T30 Minutes

KEY DETAILS

Staying safe on

FacebookWith all the good things we have on Facebook,there's a air share o threats that can make lie onthe website quite diicult. Here we will see somebasic steps to protect yoursel rom possible attacks.

B Y   G A R E T H   M A N K O O     H

   e   m   a    l    i    L    i   m    b   a   c    h    i   y   a

 STEP 1

PICKING A STRONG PASSWORD

THOUGH Facebook has its share o precautionary measures to keep your privacy intact, thereare always a bunch o hackers who are a step urther than your protectors. Hence it is importantto strengthen the frst level o security to keep away the most common threat o all: hackers. Forthis to be made possible, the attacker should have your password, using which he can log intoyour account and do all the damage he wants. So picking a good password, that's hard to guess,is always important. The ollowing step will help you reset your password to a stronger one, i youeel that your current password isn't strong enough,

Log into your Facebook 1.

account using your

current ID and password.

Once you are on your2.

home page click 'Settings'

on the top bar.

By deault you will be3.

directed to the 'Settings'

tab. Under this, look or

the 'Password' section and

click 'Change'.

You will be asked to enter4.your old password once

again. Enter your old

password correctly here.

 The next textbox will5.

ask you to enter the new

password that you want

to set. Once the password

strength is 'Medium', it

means that you have a

airly strong password.

Click 'Change Password6. '

once you're done.

Page 42: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 42/52

2 HANDS ON    WORKSHOP

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

 STEP 2

KEEPING A TAB ON YOUR PRIVACY

THOUGH it may seem as a very sae platorm to maintain your contacts, Facebook has its shareo villains who may act as harmless members. They can use your images, videos and personalinormation to tarnish your image or or their own personal gain. The ollowing steps help youensure that you have complete protection to your privacy.

SECURITY QUESTION

Like most other sites that

require you to create a login

ID and password, Facebook 

too has a special section

that requires you to enter

a security question. Theimportance o this question is

oten undermined since it is

rarely required. However, this

misconception can get us into

serious trouble i our account

has been hacked into or i we

have orgotten the password

that we had set.

Facebook's administrators

can help us get our lost

or stolen account back i 

we remember the security

question. There is a way to setthis question. Make sure that

you enter a question wisely. It

would be best i the answer to

the question is a little known

act to others. Here's how you

can set the question,

Click 'Settings[1] '.

Click the 'Change[2] ' link in

the 'Security Question'

section.

Select the question rom[3]

the dropdown box and

enter the answer to itin the textbox provided

below.

Click 'Change Security[4]

Question'.

CHIP PLUS TIP

Firstly, make sure that you1.

do not reveal any kind

o personal inormation

like phone numbers,

addresses and other

details that can be used

against you.

I you have photographs2.

uploaded that you would

like to protect rom

unwelcome viewers then

click the 'Privacy' link onthe bottom o the page.

I you do not see it the3.

click the 'Settings' link on

the top bar o the site.

Look or 'Privacy4. ' and click 

the 'Manage' link that's

alongside it.

You will be redirected5.

to the 'Privacy' page o 

Facebook. Once there

click 'Proile'.

Click the dropdown box6.

beside each entry andselect i you wish to

share that part o your

proile with 'Only Friends',

'Friends o Friends' or with

'Everyone'.

Click 'Save Changes7. '.

Ater the changes are8.

saved you will remain on

the same page. Stay on

this page in order to carry

out the next steps.

Page 43: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 43/52

WORKSHOP   HANDS ON 43

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

RECEIVE FREE PHONE

NOTIFICATIONS

 There may be times when you

cannot access your Facebook 

account. Taking advantage

o this situation, certain

pranksters or other nuisancesmay resort to posting some

rather lewd comments on

your recent activity. You can

keep track o all this activity

by subscribing to cell phone

notifcations. With this you can

be well aware o what people

are posting on your Wall as

well as the comments posted

on your activity.

Follow these steps to

activate these notifcations:

Click 'Settings[1] ' on yourFacebook profle.

Click the 'Mobile[2] ' tab.

Click 'Register or[3]

Facebook Mobile Texts'.

A dialog box will appear[4]

within your browser.

Select the name o your

country and the carrier

(network service provider)

that you use.

Click 'Next[5] '.

You will receive a message:[6]

'Using your mobile phone,send a text message

containing only the letter

'' (without quotes) to

********** (**FACEBOOK).*'

Click 'Next[7] '.

You will receive an[8]

activation code which you

will need to enter into the

textbox provided.

Click 'Confrm[9] '.

CHIP PLUS TIP

 STEP 3

BLOCKING CERTAIN CONTACTS

FIRSTLY it is important to ensure that you do no upload photographs that could be misused in thehands o random people across Facebook. Do not upload obscene or personal photographs sincethey may entice suspects to portray a wrong image o you on the Internet. I you are still on thepage rom the previous step then carry out the ollowing,

Click 'Edit Photo Albums1.

Privacy Settings'.

You will see the albums2.

that you have uploaded.

Select who you wish to

share these albums with.

 To set customized settings3.

click 'Customize'.

A dialog box will appear4.

on your screen that will

display the similar privacyoptions or your photo

albums in addition to a

section called 'Except

 These People'.

Enter the names o 5.

contacts in your riends

list. The name will

appear as you type it

by a character match.

Simply click the name o the contact and it will be

added to the list o entries

or which that particular

album will be blocked.

Once you are done6.

speciying your settings

click 'Okay'

Click 'Save Settings7. ' to

inalize your changes.Click the 'Privacy8. ' link on

the top to go back to the

privacy page.

Here you will come across9.

a 'Block List'. This list

will allow you to block 

individual members.

Simply enter their names

or their email addresses in

the textbox provided and

click the 'Block' button.

Page 44: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 44/52

4 HANDS ON    WORKSHOP

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

 STEP 4

BLOCKING SEARCHES AND APPLICATIONS

FACEBOOK has some very helpul applications and games that are quite addictive as well as un.Some o these applications retrieve inormation rom your profle such as your images and personaldata. This can cause some personal inormation to land up at in the hands o the wrong people.However, at the same time, our personal inormation can be mined out rom search engines thatscan through Facebook. Hence it is necessary that we ollow these steps to keep our profles awayrom such problems.

REMOVE FRIENDS FROM

YOUR LIST

I you are being harassed by

someone on your list you can

block them by ollowing the

procedure described in 'Step 3'

o this story or you can simplyremove them rom your list.

 There is however a dierence

in what happens ater each o 

these steps. Simply removing

contacts rom your Facebook 

riend list still gives them the

liberty to add you again or

send you messages. Blocking,

on the other hand, ensures

good riddance o your

problems.

 To remove a contact, simply

visit the profle o the contactby looking him/her up rom

the 'Search' textbox. Scroll

down to the bottom o the

contact's profle till you spot

the 'Remove rom Friends'

link. Click this link to remove

the contact rom your list and

confrm your actions.

CHANGE YOUR IDENTITY

It is quite simple to change

your identity on Facebook i atall you eel that you are stalked

by someone. By doing so you

can put in your pet name or

nickname, instead o your real

name, and just your initial as

the second name. You need to

remember that impersonation

o someone else is treated as

a serious crime. Hence, avoid

doing so.

You can also change your

email address to prevent you

rom being ound in searches.

Follow these steps to do

the same:

Click 'Settings[1] '.

Under the 'Settings[2] '

tab you will see 'Name',

'Username' and 'Email'

with 'Change' links beside

them.

Click the respective links[3]

to change your profle

name and your email

address.

CHIP PLUS TIP

Click 'Settings1. ' on the top

bar.

Click the 'Manage2. ' link in

the 'Privacy' section.

Click 'Search3. '.

Select your 'Search4.

visibility' and also check 

or uncheck the visibility

on search engines outsideFacebook by clicking the

last checkbox.

Click 'Save Changes5. '.

Go back to the 'Privacy6. '

page by ollowing the

above steps or by simply

clicking the 'Back' button

on your browser.

Now that we have hidden7.

our proile rom searches,

we will now see how

we can isolate it rom

applications that accessour personal inormation.

Click 'Applications'.

You will come across a8.

brie overview o what

the implications o using

applications can be. Click 

the 'Settings' tab.

Uncheck those elements9.

in your proile that you

do not wish to share with

applications.

CHIP PLUS TIP

Page 45: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 45/52

WORKSHOP   HANDS ON 45

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

SKILL LEVEL

Intermediate

WHAT YOU WILL NEED

Internet connection

An infected pen drive

WHAT YOU CAN LEARN

Formatting your pen

drive

Getting rid of infections

HOW LONG IT WILL TAKE

T45 Minutes

KEY DETAILS

Handling infected

pen drivesIt has always been a constant threat to copy datarom a pen drive that has been used on an inected PC. We teach you how to keep sae rom inected  pen drives.

B Y   G A R E T H   M A N K O O    B   r    i    j   e   s    h    G   a    j    j   a   r

 STEP 1

FORMATTING USING LINUX

THERE are several means o ormatting your pen drive without letting the virus inect your PC. Themost popular technique is to ormat it using operating systems other than Windows, such as Linux.

STEP 2

TACKLING THE INFECTED 'AUTORUN.INF' FILE

VIRUSES oten travel across computers on USB drives by taking the orm o the 'autorun.in' fle. This fle is used to launch the 'Autorun' dialog box when the pen drive is inserted into the USB port.Once inected by such a virus, a copy o the same is made on all drives o the aected PC. Everytime the drive is inserted, the virus is executed. Hence it is best to prevent the 'Autorun' eature inthe frst place. Ater doing that we will see some tools that can help avoid inections.

 The reason we use Linux1.

as the primary means o 

virus elimination is that

there aren't too many

threats that can aect a

Linux machine.

Insert your pen drive,2.

locate the 'autorun.in'ile that is inected and

simply delete it rom

your pen drive.

 The irst step is to disable1.

the Autorun eature. Click 

'Start | Run'. Enter 'gpedit.

msc' and hit [Enter].

On the let pane o the2.

'Group Policy' window

that opens up, navigate to

'Computer Coniguration |

Administrative Templates

| System'.

Page 46: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 46/52

6 HANDS ON    WORKSHOP

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

PANDA USB VACCINE

Another, very helpul

application that keeps away

threats rom inected USB

drives is Panda USB Vaccine. It

can be downloaded rom here:

http://research.pandasecurity.com/archive/Panda-USB-

Vaccine-with-NTFS-Support.

aspx. The application deals

with your fle systems smartly.

Once you download the

application and launch the

installation process, you will

come across the 'Confguration

Settings' dialog box. Select the

'Run USBVaccine automatically

when computer boots' and

the 'Enable NTFS fle system

support' checkbox.Once installed, make sure

that the vaccination o your PC

is done so that you aren't aced

with any uture threats rom

inected pen drives. Open the

main interace ater installing

your drive. Select the name

o the drive rom the 'Select

an USB drive' dropdown box

and click the 'Vaccinate USB'

button.

CHIP PLUS TIP Under the 'System3. ' section

look or the entry called

'Turn o Autoplay'. By

deault, this entry has its

'State' as 'Not conigured'.

Double-click 'Turn o 4.

Autoplay'.

Click the 'Enabled5. ' radio

button on the dialog box

that opens up.

From the 'Turn o 6.

Autoplay on:' dropdown

list select 'All drives'.

Click 'OK 7. ' to save the

settings.

Besides blocking 'Autorun8. '

we can also take the aid

o external sotware that

help us tackle the most

common problems aced

with USB.

Visit the site '9. http://

download.cnet.

com/Autorun-Virus-

Remover/3000-2239_4-

10862968.html'.

Click the 'Download the10.latest version' link.

 The fle that will be11.

downloaded will be in ZIP

ormat. Right-click the fle

and extract it.

Double-click the 'Setup.12.

exe' ile and install the

application.

Click 'Start13. ' ater making

sure that the 'Removable

Media' checkbox is

checked. This application

is quite eective in

eliminating the most

common threats that we

ace via USB.

Page 47: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 47/52

WORKSHOP   HANDS ON 47

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

DISABLE USB PORT

FROM BIOS

I you do not want your

USB port to be used in your

absence you can simply

disable it by tweaking a ew

BIOS settings. Simply restartyour computer and press the

[Del] key to go to your BIOS

setup. Once in the BIOS setup

simply go through the menus

and look or the option that

lets you disable the USB port

rom BIOS. This is mostly under

the 'Integrated Peripherals'

section. Simply set this as

'Disabled' and save your

settings beore quitting so

that the changes take eect.

Adding a BIOS password aterthat can also help.

You can also disable the

port rom Windows by right-

clicking on 'My Computer' and

selecting 'Manage' rom the

context menu. Look or 'Device

Manager'. Make sure that

you disable all the 'Universal

Serial Bus Controllers' in the

list by right-clicking them and

selecting 'Disable'.

CHIP PLUS TIP

 STEP 3

FORMATTING USING DOS

 JUST like we had removed the inection with the help o Linux, we can do the same with the helpo DOS. However, this process is more diagnostic in nature. It is best to use it when you are sure thatthe inection is already in your PC. Here's how to go about it,

Ater detecting an1.inection in your pen drive

restart your computer.

Keep pressing [F8] during2.

the boot-up process.

From the menu that3.

comes up, select the 'Sae

Mode with Command

Prompt' option using

your arrow keys and press

[Enter].

In the DOS prompt type4.'C:' and press [Enter].

 To display iles that are5.

hidden type in 'DIR /AH'

and hit [Enter]. I you do

not see the ile called

'autorun.in' then your

system is not inected.

I you do then type in6.

'TYPE autorun.in' in thenext line and hit [Enter].

 Type in 'DEL C:\autorun.7.

in'. This will delete the

inection rom 'C:' drive.

Once done, type in8.

'MSCONFIG'.

 This will open up the9.

'System Coniguration

Utility' dialog box.

Click the 'Startup10. ' tab

and uncheck the entry

'sample-virus'. Click 'OK'

and restart your machine.

Page 48: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 48/52

8 SPECIALS    PC DOCTOR

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

Help! I do not want

Windows Firewall

+ CONFIGURINGWINDOWS FIREWALL

PROBLEM:

I had earlier disabled Windows Firewall 

on my Windows XP system because I 

ound it quite annoying. However, I have

been advised that it is quite an important 

tool and that it will help in maintaining

a frst level o security or my computer.

How do I enable it again and reconfgure

it to unction normally? Also, I would 

like to know how to add programs to the

'exception list' o the frewall so that it 

doesn't block these applications without 

my permission in the uture.

SOLUTION:

One o the main reasons we have

people disabling Windows Firewall is its

intererence with certain, commonly-used

applications. In act, some applications

even advise users to disable Windows

Firewall or their smooth unctioning.

 This does pose a threat or those who do

not have any other security applications

or anti-virus suites installed on their

systems; since Windows Firewall is the

deault, frst level security provided by

Microsot or its operating systems.

It is best advised not to disable the

frewall but rather confgure it to suit

your needs. This also includes adding

requently used applications to the

exception list o frewalls so that it doesn't

interere with their smooth unctioning

anymore. Follow these steps to

reconfgure Windows Firewall and create

an exception list:

Make sure that you are logged into the

administrator account on your computer.

Windows Firewall can be handled by

administrators only. Guest accounts do

no have access to its settings by deault.

Click 'Start | Run'.1.

In the textbox, type in 'wscui.cpl2. '

and click 'OK'.

 The 'Windows Security Center3. '

window will open up.

Click the 'Windows Firewall4. ' logo

at the bottom under the 'Manage

security settings or:' section.

 The 'Windows Firewall5. ' window

will open up. Click the 'On

(recommended)' radio button to

enable your irewall again.

Make sure that the 'Don't allow6.

exceptions' checkbox is not

checked.

Click 'OK'.7.

 This step will enable the previously

disabled frewall. Now i you want to

add exceptions to the frewall so that

it doesn't block any application in the

uture, ollow these steps:

Follow the above procedure to open1.

up the 'Windows Firewall' window.

Once it opens up click the 'Exceptions2. '

tab.

In this, click the 'Add Programs3. ' tab.

A list o programs will be displayed4.

in the next dialog box that appears.

Select the name o any application

that you use requently or one that is

oten blocked by Windows Firewall.

I you cannot ind the name o the

program in the list o applications,

click 'Browse' and manually locate it.

Click 'OK 5. ' once you're done.

Now run the application to check i 

Windows Firewall still intereres with it.

I you still experience problems with the

application running then you will have to

resort to the cumbersome procedure o 

disabling Windows Firewall while using

Windows Firewall is a great security application, however there are times when this helpul tool can turn hostileagainst us and bring out problems rather than solutions.

B Y   G A R E T H   M A N K O O

     S   a   c    h

    i   n    P   a   n    d    i   t

When you open the Windows Security Center window, you are notificed if the firewall is 'ON' or 'OFF'. Click the 'Windows

Firewall' logo to open up the firewall settings dialog box.

Page 49: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 49/52

PC DOCTOR   SPECIALS 49

NOVEMBER 2009  | INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT

it and then enabling it again once

you're done.

It's better to get yoursel a complete

third party frewall that is compatible

with your application.

You may also need to add a port to

the list o allowed exceptions. Reer to

the next problem or an elaboration on

the same.

+ ADDING PORTEXCEPTIONS

PROBLEM:

I have Windows Firewall enabled on my 

PC but because o this certain ports are

blocked. A sotware application I use does

not work, since it requires a particular 

 port to be opened. Does Windows

Firewall have a provision to allow only 

 particular ports to be enabled? How can I 

tell which ports are being used? 

SOLUTION:

Yes, Windows Firewall allows you to

speciy individual ports that can be

accessed by third party applications

even when it is running. However, to

address this problem you need to frst

determine which ports are required by

the application that you're running.

 There are a couple o means by

which you can fnd out which o the

ports (which are normally blocked by

Windows Firewall) are needed to be

opened. You can contact your program

vendor or assistance on which ports

should be enabled or use a simple DOS

command to fnd out which ports are

being accessed. Follow these steps or

the same:

Launch the application that's1.

causing you problems.

Click 'Start | Run'.2.

 Type in 'command3. ' and hit [Enter].

In the command prompt enter 'netstat4.

-ano > netstat.txt'.

Hit [Enter].5.

Similarly, enter 'tasklist > tasklist.txt6. '

Open both the iles, 'Tasklist.txt7. '

and 'Netstat.txt' rom the location

speciied in the DOS prompt.

In the 'Tasklist8. ' ile, look or the name

o the program that was causing

problems. Beside it, you will notice

the column that enlists the PID (port

identiier) that it uses. In this example

(below), you will see that it is a

program called 'myprog.exe' and that

the PID is 680.

Look or the similar PID in the 'Netstat9. '

ile. I the port numbers used is

more than or equal to 1024, then it

is evident that the application uses

more than just a single port. It pretty

much means that you will not be

able to resolve the issue by opening

individual ports.

I in the above steps, you notice that the

port number is lesser than 1024 then

carry with these steps to block individual

ports:

Click 'Start | Run'.1.

In the textbox, type in 'wscui.cpl2. ' and

click 'OK'.

In the 'Windows Security Center3. '

window that opens up click the

'Windows Firewall' logo at the bottom

under the 'Manage security settings

or:' section.

 The 'Windows Firewall4. ' window

will open up. In this, click the

'Exceptions' tab.

Click 'Add Port'.5.

 Type in the details o the port that6.

you got either rom your vendor or

by using the procedure above.

Click 'OK'.7.

 The program should work ine now8.

even with Windows Firewall enabled

and running.

After clicking 'Add Program' a dialog box with a list of applications will appear on your screen. Click 'Browse' if youcannot find the application you are looking for.

Enter the name of the application, the port number and the type of protocol (TCP/UDP)

and click 'OK'.

Look for the common port identification number 'PID' in both the 'netstat' as well as the

'tasklist'. This will help you determine the port in the 'netstat' file.

Page 50: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 50/52

0 SPECIALS    DR. KNOW

INTELLIGENT COMPUTING CHIP PLUS SUPPLEMENT |  NOVEMBER 2009

0 SPECIALS  R.KNOW

Q WHAT IS RAID?

A RAID is an acronym or

Redundant Array o Inexpensive

Disks. It is a technology that allows

computer users to gain a high level

o reliable storage space rom

low-cost PC-class disk-drive

components. This is done by

arranging devices into arrays or

redundancy. It is basically used as a

term or computer data storage

schemes that can divide and

replicate data across dierent hard

disk drives. There are dierent

schemes or example, RAID 0, RAID 1, etc. Its design generally involves achieving two

goals. The frst being increasing data reliability and the second, improving the input/

output perormance. When there are multiple physical disks set up to use RAID

technology, they are usually said to be placed in a RAID array. This array thus gives out

data across dierent disks, but the array that is used is seen as a single disk. The best

part is that RAID can be used to serve several dierent purposes.

Q WHAT IS A VIRTUAL FIREWALL

A FEW years ago, when virtualization was used or development and test

organizations, security was not an issue. It was used or easy access to multiple

operating systems that were installed on a single server. Since it was successul,

virtualization spread to production-oriented

data centers within major corporations. It

helped create networks o virtual machines

within physical servers. Today as we see that

virtualization has moved to the cloud, there

is a high risk or exploits. Virtual frewalls are

built specifcally to lessen the risks o virtual

networks. It is basically a packet fltering

frewall that is installed as a sotware in a

virtual environment. It also provides control

o inter-VM tra c. Hence it can protect and

lessen the risks o viruses, worms and Trojans

in a virtual environment.

Get to know what a Virtual Firewall is. Also learnmore about RAID and SNMP.

B Y   D O L W I N   F E R N A N D E S

Dr. KNOW

SNMP stands or Simple Network 

Management Protocol. It is basically

used or network management

purposes. It can monitor devices

attached to a network. It is basically

a component o the Internet Protocol

Suite as defned by the Internet

Engineering Task Force. This protocol

consists o a set o standards that is

used or managing the network within

an organization. In an SNMP scenario,

one or more computers having

administrative privileges have the task 

o monitoring or managing a group

o hosts or devices on the network.

 The SNMP protocol operates in the

Application Layer o the OSI model.

SNMP uses ports 161 or the agent and

162 or the manager. The manager can

send requests rom any source port

to port 161 i.e. the destination port.

 The agent will then respond with a

reply to the source port. The manager

receives notifcations like TRAPs and

INFORMs on port 162. The agent can

then generate notifcations rom any

ree port.

     S   a   c    h    i   n    P   a   n    d    i   t

What is SNMP?

Page 51: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 51/52

Page 52: Chip Plus Nov09

8/9/2019 Chip Plus Nov09

http://slidepdf.com/reader/full/chip-plus-nov09 52/52

RNI Registration No. MAHENG/2003/12687NI Registration No. MAHENG/2003/12687