THIS IS THE TABLE OF CONTENTS

Click on the picture to access the table of contents.

This is default featured post 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured post 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Wednesday, April 6, 2011

How to supervise, monitor, restrict, and respond to unwanted user behaviors on your network in real-time as they occur


As its name implies, Network Enforcer is a network behavior enforcement tool. Network Enforcer monitors, responds to, and prevents unwanted behaviors from happening on your network in real-time. Network Enforcer allows you to prevent and protect your network from inappropriate behavior, and malicious activities in real-time, the instant they occur. If an action occurs on your network that you do not want to happen Network Enforcer can alert you immediately, or it can act on its own and block the action outright. Network Enforcer can monitor, filter, restrict, and respond to the following behaviors: 



Network Enforcer solves the problems that come with traditional user activity monitoring and logging software:


Problem #1: The "needle in the haystack" - trying to find the "bad" in all the "good" activity logs
With Network Enforcer, you will never miss an unwanted behavior that has occurred on your network, while never having to sort through tons of log data to find them. You will never have to search countless logs for a few unwanted behaviors, and possibly overlook them in the process. You will never have to search for that "needle in the haystack" again when trying to find unwanted behaviors hiding within thousands of appropriate user behaviors that occur every day.

Problem #2: Privacy invasion - logging everything users do, good or not
With Network Enforcer, you will not have to worry about violating your network users' privacy, as Network Enforcer only logs behavior filter violations and behaviors that you are concerned with.

Problem #3: Passive security - does not allow you to react immediately high security threats and behaviors
Unlike conventional activity monitoring tools, Network Enforcer allows you to respond IMMEDIATELY to unwanted behaviors and security violations the instant they occur on your network. Would you rather find out a critical document has been leaked days after it happened, or immediately as the user is saving the file?
An example scenario of data theft, protected by conventional activity monitoring software:
An employee accesses a confidential finance report that should not be accessed and sees critical information. The user then closes the file and copies it to a thumb drive and leaves the scene. The network administrator logs in the next morning and views activity logs and luckily catches the event and takes appropriate action, but the damage is done.

The same scenario with Network Enforcer:
The employee opens the confidential finance report and triggers a high-security Network Enforcer behavior filter. The network administrator is alerted in real-time, and via email, the computer is then locked down automatically by Network Enforcer within moments of the user opening the file - without the administrator having to do a thing.
 How It Works
Supervise.

What if you could place a supervisor behind each user on your network that made sure users stayed on task and did not perform unwanted behaviors? Now, what if you could do that in a cost-effective manner, without violating each user's privacy? Ascendant Network Enforcer represents the latest in network trust and security software that allows you to do just that. While running invisibly on each computer on your network, Network Enforcer watches what users do and reacts accordingly depending on what behaviors you have set to be unwanted on your network. Network Enforcer allows you to create behavior filters that apply to every computer on a network, or only specific computers, giving you complete control over user behaviors.

Network Enforcer does not log unnecessary user activity - it only logs events that trigger behavior filters you tell it to watch for. If a user sends an email with an unauthorized attachment, for example, Network Enforcer will only log data relevant to that email. Gone are the days of having to sift through thousands of harmless user activity logs while searching for unwanted behaviors. Network Enforcer assumes users are trustworthy, and only watches for the undesired behaviors you tell it to. Network Enforcer supervises, and allows you to filter the following behaviors:

Programs Executed
Network Enforcer can watch every program and application that is ran by users and respond accordingly. Network Enforcer can tell you what the exact program was that the user ran, and when.

Website Visits
Network Enforcer can watch every website that is visited by users and respond accordingly. Network Enforcer works with all popular browsers including Internet Explorer, Firefox, Mozilla, Opera, AOL, and Netscape.

File and Document Usage
Network Enforcer can watch over and respond to every file action that occurs on your computers - including file creations, modifications, deletions, and openings. If a user connects a portable thumb drive to the computer, Network Enforcer will watch activity on that drive also, as to prevent data theft.

Email Activities
Network Enforcer can watch all POP3 and SMTP email activity and alert you when emails are sent outside of your network domain, when emails contain specific recipients, domains, or senders, when emails contain certain subjects, or even when emails contain unwanted or insecure attachments.

Keystroke Phrases Typed
Network Enforcer can watch and respond to every single keystroke that users type and check to see if they type specific phrases that you want to watch for - such as passwords, names, addresses, top secret information, and more.

Windows Opened
Network Enforcer can watch and respond to every window users interact with on their computer. By specifying window titles or captions to watch for, Network Enforcer can track any window activity.

Internet Connections
Network Enforcer can watch every internet connection (incoming and outgoing) established on your computers, and alert you when unwanted connections to/from certain hosts, ports, or protocols are made.


Restrict.

When Network Enforcer sees users violating specific behavior filters by using unwanted programs and applications, websites, windows, chat clients, or even typing a specific keystroke phrase it can instantly restrict the behavior by closing the application, website, window, or chat client causing the violation. Network Enforcer can be configured so only more threatening and severe behaviors are restricted, while less threatening ones are not.

Network Enforcer allows you to restrict and block the following activities:

Block Program and Application Usage
Network Enforcer can block any application you want it to whenever a user runs it, preventing unauthorized application usage and time wasting.

Stop and prevent Website Visits
Network Enforcer can block specific websites from being visited, frequented, and used, preventing wasteful web-browsing, and the presence of indecent material on your network.

Eliminate and Stop Typed Keystroke Phrases
Network Enforcer can detect when specific keystroke phrases are typed and immediately close the window or program they are being typed in, preventing data leaks.

Block and Close Windows Opened
Network Enforcer can block any window containing a specific caption or title and prevent it from being interacted with.

Eliminate and Block Chat Client Usage
Network Enforcer can block popular chat clients from being used at all, preventing and circumventing a common avenue for data and intellectual property leaks.


Respond.

Network Enforcer categorizes all behavior filters under three security levels, allowing you to be alerted when a user has violated a handful of lesser, low security behavior filters, or when a user has violated a single high security filter. Network Enforcer's security thresholds allow you to take action and respond to immediate high security threats, while allowing you to be alerted otherwise only when users are repeatedly violating a number of low security filters. Network Enforcer has various response actions that kick in immediately when a user violates enough behavior filters to meet a security level's threshold. Network Enforcer's management software allows you to react instantly by issuing remote administration commands to the violating computer, in real-time.

Network Enforcer can directly respond in the following ways:

Alert you in Realtime as Filters are Violated
Network Enforcer can alert you via the Network Enforcer management interface in real-time by telling you what user and computer triggered an event, and what security level the event was so you can respond instantly via the remote administration commands within Network Enforcer.

Instantly Lockdown, Shutdown, Reboot, or Logoff the Computer
Network Enforcer can react on its own immediately when a security threshold is met by locking the computer down so the user cannot do anything. It can also shutdown, reboot, or logoff the computer as well, preventing any further filter violations.

Email you an alert message when filters are violated
Network Enforcer can email you, or a list of recipients, when a security threshold is met. Even if you are off-site and not on your network you will be alerted right away when filters are breached.

Alert the user that they violated a behavior filter
Network Enforcer can alert the user that they have just violated a behavior filter and should refrain from doing so again. This message is customizable.

Respond via Realtime Remote Administration Commands
Network Enforcer allows you to respond via various remote administration commands in the Network Enforcer interface. These commands allow you to send a message to a computer (or all computers on your network at once), lock/unlock a computer, shutdown, reboot, or logoff a computer, and view the desktop of the remote computer in real-time.


Report.

Network Enforcer has built-in reporting tools that create easy-to-read portable behavior reports that can be printed and presented. Ranging from brief network-wide computer behavior summaries, to in-depth behavior filter alert reports broken down by security levels, Network Enforcer can quickly create the reports you need for protecting your network. All reports are able to be customized with custom searches and date filtering.

Network Enforcer can create the following reports:
Complete or Brief Overview of All Computers
Network Enforcer can create a brief summary that shows each computer and how many filters they have violated, or a complete report on each computer on your network, detailing every filter violation for each computer, and tying it all together with a table of contents.

Most Active Computers
Network Enforcer can create a report detailing the most active computers on your network in terms of filter violations. The report will rank the computers in order according to how many violations each computer has.

Security Level Reports for All or Individual Computers
Network Enforcer can create reports for all computers, or single computers detailing only specific filter events by security level. These reports can be filtered by date. For example, you can create a report showing all high security events on your network on a specific date.

Detailed and Customizable Computer Reports
Network Enforcer can create reports for all computers, or a single computer, detailing every filter violated. These reports can be customized and filtered by date, search queries, users, and more. For example, you can create a report showing all application filter events for all computers, or a single computer, on a specific date.


  • Windows NT/2000/XP/Vista (32 and 64 bit)
  • 2MB Storage for software installation
  • Admin privs to each computer for remote installation purposes
  • Windows File Sharing Enabled 
 

Detecting Proxy

Proxy Detection Services

So in order to stop such online frauds, Proxy Detection has become a critical component. Today most companies, credit card merchants and websites that deal with e-commerce transactions make use of Proxy Detection Services like MaxMind and FraudLabs to detect the usage of proxy or spoofed IP from users participating online.

Proxy Detection web services allow instant detection of anonymous IP addresses. Even though the use of proxy address by users is not a direct indication of fraudulent behaviour, it can often indicate the intention of the user to hide his or her real IP. In fact, some of the most used ISPs like AOL and MSN are forms of proxies and are used by both good and bad consumers.
 
How Proxy Detection Works?

Proxy detection services often rely on IP addresses to determine whether or not the IP is a proxy. Merchants can obtain the IP address of the users from the HTTP header on the order that comes into their website. This IP address is sent to the proxy detecting service in real time to confirm it’s authenticity.
The proxy detection services on the other hand compare this IP against a known list of flagged IPs that belong to proxy services. If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy. These proxy detection services work continuously to grab a list or range of IPs that are commonly used for proxy services. With this it is possible to tell whether or not a given IP address is a proxy or spoofed IP.
 
How to Tell Whether a given IP is Real or a Proxy?

There are a few free sites that help you determine whether or not a given IP is a proxy. You can use free services like WhatisMyIPAddress to detect proxy IPs. Just enter the suspected IP in the field and click on “Lookup IP Address” button to check the IP address. If it is a suspected proxy then you will see the results something as follows.
Detect Anonymous Proxy

So for all those who think that they can escape by using a spoofed IP, this post is the answer. I hope this information helps. Pass your comments.

Using Proxy


Enter a URL to visit via proxy:

A proxy is a web page that provides Internet users with the ability to browse web sites that may be blocked by a content filter, such as WebSense or SmartFilter. By making use of the proxy as the portal to the blocked site, it is possible to circumvent the work of whatever content filter is in place. At the same time, the proxy site also helps to mask the visit to the site, so that there is less evidence that the content filter was not successful in preventing the visit.


How Does A Proxy Work?

Essentially, the proxy will provide the same ability to browse the Internet as any other web browser. A proxy site allows the user to key in a specific web address and be directed to that specific page in a window. This accomplishes two things. First, the window is coded as part of the proxy site address and not the actual web site the user is visiting. Second, any information cached on in the temporary Internet files will appear to be information related to the proxy site, and not the blocked web site.
 
Why Use A Proxy?

One of the legitimate uses of a proxy site is to get around blocked content that may contain one or two words that the filter has identified as inappropriate for viewing. Many companies make use of filters to limit the ability of employees to spend time looking at web pages that are not related to job functions in some manner. This is usually accomplished with the use of key words that are programmed into the filter, which in turn blocks any page or site with those words present. While this does block access to a number of sites that have nothing to do with work, they can also inhibit access to pages and glossaries that are designed to be helpful.

When this is the case, an employee may choose to use a proxy site to get around the block and be able to get to a page that he or she legitimately needs to view in order to accomplish a work related task. Since using a proxy site does not take much longer than using a browser window, it is much faster than calling technical support and trying to get authorization to remove a given site from the filter list.

Many totalitarian nations also use content filters to block their residents from finding information on the world wide web which may not be approved by the regime in power. Residents of those nations can use proxy sites to access news and information from the free world.

Another advantage of using the proxy site is that the IP address of the user is not logged. This helps to ensure the privacy and anonymity of Internet users.

What does your IP address reveal about you?

Your IP address reveals your point of entry to the Internet and can be used to trace your communications back to your ISP, your employer's network, your school, a public terminal. Though your IP address may not identify you personally, an IP is a unique identifier which represents your computer's digital ID while you are online.

It is possible to disguise your IP address on the Web by using an anonymous proxy server. A proxy acts as an intermediary, routing communications between your computer and the Internet. A proxy specializing in anonymous surfing, however, uses its own IP address in place of yours in every outgoing request.

* Web-based Proxies: Web-based Proxies are powered by server-side softwares such as CGIProxy, PHProxy, Glype, and custom proxy scripts. These proxies work entirely through a Web browser. Usually all that is needed to hide your IP address and surf anonymously is to visit the service's homepage in a Web browser and enter a URL (website address) in the form provided. There is no requirement to download or install software or reconfigure your computer. To work, a CGI based proxy must manipulate the document you've requested and all its associated elements and objects. This can be tricky, and not all proxies are as efficient or effective as others. Some services are slow and may produce errors while rendering the many variations of Web page code. But they are popular, numerous, and easy to use. See this page for a complete list of Web proxies.





* Open Proxies: So-called "open proxies" are HTTP or SOCKS type proxy servers that are accidentally or maliciously left "open" and accessible on the Internet. HTTP or SOCKS type proxy servers require that you configure your browser's proxy settings in order to use them. These proxies have the advantage of being compatible with almost all webpages since they do not have to modify the requested page to keep you anonymous. However, there are several major disadvantages to using open proxies. Many utilize computers that are compromised, operated by government agencies, or operated by malicious individuals. Often when an attacker obtains control of an end-user's computer they will install a proxy server so the machine can be exploited to launch further attacks on other machines. It is also commonplace for open proxies to be operated as "honey pots", where all actions are logged for forensic research. Open proxies are easy to abuse and there are many people using them to commit credit card fraud, pay-per-click fraud, attack or break into computers, and hundreds of other illegal activities. We strongly discourage the use of open proxies as they provide no privacy or security and using them can result in increased exposure and liability.

* Proxy networks: Various proxy networks (Freenet, I2P, JAP, and TOR) feature layered encryption (sometimes called "onion routing") and peer-to-peer networking to allow their users to communicate anonymously with each other. Rather than operate their own equipment, most rely on end-users to donate bandwidth and other resources to the network. They do not control the servers in their network and certainly a percentage of them are operated by malicious individuals for malicious reasons. Therefore any promises of privacy and security should be evaluated with this in mind. Also, these services have developed a reputation for being relatively slow.

* Proxy Software: Other subscription-based services offer client-side application software to automatically configure your browser's proxy settings. Do not be fooled by these services as most are merely open proxies dressed up with a fancy interface.

Tuesday, April 5, 2011

How to Monitor a Remote Computer

Most of the time, it becomes necessary for us to monitor our own computer or a remote computer to keep track of the activities going on. This may be for several reasons. Especially it is most necessary for the parents to monitor their computer to keep track of their children’s activities during their absence. Some people may also require to monitor their computer to keep an eye on the activities of their spouse or partner.
Today, with the advancement in the field of software technology, it is possible to easily monitor any given computer. For this all you have to do is, use a PC Monitoring Software.

But the job doesn’t end here. This is because, there exists tons of such monitoring softwares on the market and many times people often get confused which one to choose and how to use them. So I have decided to make this job simpler for you, by writing this post. In this post I’ll give a detailed information about computer monitoring softwares which include their features, advantages, installation, usage procedure and so on. To make this post interesting, let’s take up each topic in the form of a question and answer.

What exactly is a Monitoring Software and how can it help me?

A computer monitoring software is just like any other software (program) which when installed, secretly monitors each and every activity that takes place on the computer. The activities such as web browsing, chatting, gaming etc. are all recorded and saved. These monitoring softwares can record each and every keystroke. So it is possible to capture usernames and passwords very easily with minimum effort. Monitoring softwares are also commonly known as Keyloggers.

How can I install a monitoring software?

Installing a monitoring software is too simple. During the installation, you need to setup a secret password and hotkey combination which is required later to see the recorded data ( logs). After the installation is complete the software goes invisible, but keeps running in the background. Whenever you want to see the logs, just press the hotkey combination (ex. Shift+Ctrl+F10). Now a small window will popup asking for a password. Here you need to enter the password that was setup during the installation time. After you enter the password you’ll be able to see all the activities that took place on the computer during your absence.

Can the person using the computer come to know about the presence of the Monitoring Software?

Most of the time it becomes impossible to detect the presence of the monitoring software. This is because, once installed it hides itself from Start menu, Program Files, Control Panel, Task manager etc. Because of it’s stealth behaviour the user can never come to know that he/she is under the presence of monitoring.

Which Monitoring Software should I use?

There exists different flavours of these softwares and you have to choose the one that best match your needs. Here is a list of some of the best monitoring programs that I recommend.

For Monitoring a Local PC:


If you want to monitor a local PC (may be your own PC) then the following program is recommended.

Spy Agent Stealth

You can find a Complete Installation Guide for Spy Agent Stealth HERE

For Monitoring a Remote PC (Also works on local PC):


If you want to monitor a remote PC  you may use the following programs. These programs works for remote PC as well as local PC.
SniperSpy

For Monitoring a Network:


The following program can be used to monitor an Entire Network of computers from one central location. This becomes handy to monitor the staff in a company or students in a school/college.

NetVizor

You can find a Complete Installation Guide for NetVizor HERE


For monitoring a Cell Phone from your PC:


If you want to monitor a Cell Phone from your PC you can refer the following link:

Cell Phone Spy

Twitter Delicious Facebook Digg Stumbleupon Favorites More