Вы находитесь на странице: 1из 2

JULY TUTOR ■

SAFE SURFING

safe
surfing
Making your Web connection secure and private while maintaining your system’s functionality is no small
task, especially considering the current vogue for electronic evil-doers. As news of Net-related bugs and
hack attacks abound, so have the letters from readers seeking shelter from the storm. Here are some of
the important questions raised about Internet security and, of course, the answers.

udging from the response to our ing is a connection between network com-

J article “Internet Security” (Janu-


ary 2000), readers are definitely
concerned about security while
ponents, both hard w a re and software .
These components include such things as
adapters, protocols, services and clients.
connected to the Internet. They sent in For example, your Ethernet adapter might
some important questions, so here’s a fol- be bound to the NetB E U Ip rotocol, and that
low-up with the answers. a d a p t e r / p rotocol combination might in
turn be bound to the File and Print Shar-

Q : How do I disable File and Print Shar-


ing for my Internet connection with-
out disabling File and Print Sharing on my
ing service.
These network components and their
bindings show up in the information you
local area network? see when you run the Network applet from

A: According to Microsoft, you must un-


bind the File and Print Sharing service
f rom the T C P / I P p rotocol stack that’s
Control Panel. From here, you have a con-
siderable amount of control over binding
and unbinding, which you must exercise
bound to the hardware adapter used for with care. A default set of bindings ap-
your Internet connection. That’s a mouth- propriate to your hardware is created dur-
ful for sure, so let’s take a look at what it ing the Windows installation process. Af-
means. ter that, changes are usually made only
In the magical world of Windows 98’s by your system or network administrator.
multi-protocol networking, the network For more information on Windows 98
bindings are what count. A network bind- networking, refer to the Networking and

88 July 2000 www.DITnet.co.ae ■ www.pcmag-mideast.com


■ JULY TUTOR
SAFE SURFING

Intranets section of the Windows 98 Re-


source Kit or the excellent overview of
adapter, protocol and service binding avail-
Q: You suggested telling the browser to
accept only signed downloads and to
examine the digital certificate of each.
able in the Shields UP! section on the Gib- What does that mean and how do I do
son Research Web site, www.grc.com. that?
Because you want to protect the Internet
connection and because that connection
uses the T C P / I Pp rotocol, you need to find
A: The downloads referred to here are
of ActiveX components. These pre-
sent a danger because they have access to
the unique binding of hardware adapter your system the same way a program you
and TCP/IP protocol used for your Inter- run locally does. If you’re using the current
net connection. You must then disable its version of Internet Explorer 5, you prob-
access to the File and Print Sharing service. ably don’t need to do anything. IE5 defaults
That will shut off File and Print access to a medium security setting that specifies
from the Internet. As long as File and Print accepting only signed ActiveX downloads.
S h a r in g r e m a i n e n a b l e d on t h e When your browser attempts to download
adapter/protocol binding used for your signed content, you’ll be prompted to ac-
local area network, you’ll continue to have cept or reject the download and you’ll see
LAN-based file and print sharing capabil- the digital certificate information of the
FIGURE 1: To keep File and Print Sharing on your
ities. LAN and disable it on your Internet connection, un- signing author.
Here are the steps to take in order to bind File and Print Sharing from the TCP/IP proto- If the browser shows you the digital cer-
disable File and Print Sharing on your In- col stack that’s bound to the hardware adapter tificate information, then the downloaded
used for your Internet connection.
ternet connection: first, click on the Start code was successfully decrypted using the
button, select Settings and Control Panel signing author’s public key, which the
and then run the Network applet. In the browser obtains from a trusted certificate
Configuration tab, scroll down in the main authority. Because the code was original-
list until you find the component for the ly encrypted using the signing author’s
TCP/IP protocol that’s bound to the hard- private key, you can be assured that the
ware adapter you use for Internet access. code has not been altered since it was
My computer uses a V.90 modem with signed (encrypted). This assurance goes a
dial-up networking for Internet access, so long way because you know the code has
the item reads TCP/IP g Dial-Up Adapter. not been tampered with since its creation.
If you’re using a cable modem or DSL for That does not mean the creator has no
I n t e rnet access, you’ll have a diff e re n t malicious intent. Rather, it means that the
adapter. code’s been delivered intact and has not
Next, select that item and choose Prop- been altered since it was signed. At this
erties. If you get a TCP/IP Properties In- point, you must decide whether to trust the
f o rmation warning box, dismiss it by software publisher or not.
choosing OK. When you reach the TCP/IP There’s an introduction to digital certifi-
Properties dialog, select the Bindings tab. FIGURE 2: You can use the ShieldsUP! feature on cates and a wealth of related articles un-
This tab lists the network components that the Gibson Research Web site (www.grc.com) to der the Digital Certificates topic on the
test your own system for Internet connection secu-
will communicate using TCP/IP over your rity weaknesses. Microsoft Security Advisor Web site (cur-
adapter. At this point, make sure the check rently www.microsoft.com/security/tech/
box next to File and Print Sharing for Micro- certificates).
soft Networks is not checked (see Figure dress translation (NAT) to let multiple com- To check your browser security settings,
1). If there are any other components called puters share an Internet connection. Be- click on the Start button, select Settings, se-
File and Print Sharing, uncheck those, too. cause NAT presents only the shared IP ad- lect Control Panel, run Internet Options
Then press OK to close the dialog and dress of the ICS server to the external In- and then click on the Security tab.
press OK to close the Network applet. If t e rnet, the other machines sharing the
you are asked to reboot the machine or in-
sert the Windows 98 CD-ROM, follow the
instructions.
connection are hidden from view by out-
siders. Hackers sometimes use spoofing
techniques, however, to flesh out those
Q:
ticle?
Where can I learn more about the
security issues mentioned in your ar-

Note that while turning off File and Print


Sharing on your Internet connection is im-
portant, you really need a personal firewall
internal, “private” IP addresses.
I recommend using BlackICE Defender
(www.networkice.com) or some other per-
A: One of the most useful sources of in-
formation is the Gibson Research Web
site, www.grc.com. Steve Gibson, author
product for complete protection. sonal firewall product on the ICS server. of the indispensable SpinRite disk utility,
You’ll have to list the IP addresses of the has done a great job assembling, organis-

Q: How do I protect myself and detect


intrusions if I’m using the Internet
Connection Sharing (ICS) feature of Win-
ICS client computers as Trusted Address-
es in BlackICE for things to work correct-
ly. To do so, right click on the BlackI C ED e-
ing and presenting the story behind Inter-
net connection security in the ShieldsUP!
section of the Web site. In addition, you can
dows 98 to share Internet access over my fender tray icon and choose Configure use the Web site to test-probe your own PC
local area network? B l a c kI C E. Then select the Trusted Ad- and generate a report showing the results

A: You have a layer of protection al-


ready, in that you’re using Internet
Connection Sharing. ICS uses network ad-
dresses tab and add the IP addresses. When
you’re finished adding addresses, press
OK.
(see Figure 2). This feature is very useful
and it can help you see whether you’ve fi-
nally battened down the hatches.

www.DITnet.co.ae ■ www.pcmag-mideast.com July 2000 89

Вам также может понравиться