Šta je novo?

Zastita od hack - napada.

Dark Angel

Čuven
Učlanjen(a)
19.01.2002
Poruke
3,101
Poena
735
Moja oprema  
CPU & Cooler
XEON E5440 mod 775
Matična ploča
ASUS P5B
RAM
6 Gb
GPU
GIGABYTE 1050 TI
Storage
SSD Biostar 240Gb + HDD...
Zvuk
XONAR D 2
PSU
CORSAIR
Monitor
SAMSUNG 32" TV
Miš & tastatura
LOGITECH MX MASTER x2
Ostale periferije
LOGITECH Z-5500
Laptop
ASUS VIVOBOOK OLED 1513, MACBOOK PRO 5.2 + 7.1 + ...
Tablet
ASUS TRANSFORMER
Pristup internetu
  1. Optički internet
Imama na mashini antivirus Kaspersky AVP 4 i interesuje me da li je dovoljno da predupredi neki moguci hackerski napad ili mi je potreban neki Zone Alarm i slicno ?
 
Da ti je KAV dovoljan ne bi Kaspersky pravio Firewall i Spyware programe ;), a navodno ta tri u paketu te kao (skoro) potpuno stite + tvoje navike i pravila (ne)ponasanja...
 
Switch

Pre dve tri nedelje sam dobio jedan switch koji zatvara sve portove. Na autorovom sajtu imas test i posle "okidanja" mozes napraviti probu portova - pingovace ti sve portove. Ovim ti racunar na netu postaje "Stealth". Jedino IP ti ostaje vidljiv (iz poznatih nam razloga). Ovim navodno blokiras ulazak hakera a ujedno i windowsov DCOM koji koristi RPC za ulazak u tvoj racunar... Uostalom:

"What is DCOM?

Windows employs a component-based system to help programmers manage Windows' complexity. This system is called COM for "Component Object Model." Much of Windows itself, and many Windows programs, are assembled from individual COM components. Microsoft thought it would be "cool" if these COM components could find and use each other from different machines across a network, so Distributed COM (DCOM) was created to allow this. DCOM uses an existing networking protocol known as Remote Procedure Call (RPC), usually over Internet port 135, to host COM's distributed operation across a network.

What's the problem?

The problem is that this very powerful DCOM system, which allows pieces of your computer to be remotely activated and used from across a network -- even by any stranger across the Internet -- is always enabled in Windows systems by default. Microsoft's most recent DCOM patch, which fixes another (not the first) remotely exploitable vulnerability in this complex system, continues to defiantly leave the whole DCOM system exposed and enabled . . . and waiting for the next vulnerability to be discovered.

What's the solution?

Just turn it off. No Internet applications use or require DCOM. Some Windows applications support it, but those that do neither use nor require it. As with so many of Windows' easily avoided security vulnerabilities, Microsoft should never have chosen to enable DCOM by default, and they certainly should have had their most recent patch turn it off after the MSBlast worm event. But instead, all Windows systems are still running DCOM and waiting for the next disaster."

Switch je absolutni freeware [no strings attached], kao i ostali na ovom sajtu. Promuvaj se tuda [pogledaj napr NetBiosSharing Switch, Raw Socket Lock...]. Divno je sto ovi switchevi nisu veci od 25kb.

http://grc.com/dcom/ home: www.grc.com

Sve to divno izgleda i oni tvrde da si sada zasticen u potpunosti od hakera ali ovo nije antivirus!
Ja pored svega toga jos uvek ukljucujem ZoneAlarm.

Mada kada bolje razmislim... sto bih ja bio zanimljiv hakeru? Ali opet, uvek se nadje neki jadnik u dokolici... trazeci nekoga nezasticenog...
 
Svakako je firewall "a must" u danasnje vreme.
 
Nazad
Vrh Dno