The Strickland Group

817-224-2020 Facebook Twitter
  • Home
  • Services
    • Connectivity
    • Consulting
    • Data Protection
    • Managed Services
    • Software Development
  • Products
  • Blog
  • About
  • Contact

The Accidental Hacker

April 14, 2010 by admin Leave a Comment

A couple of weeks ago I was helping a client with an issue with their VPN.  Basically, a vendor that they use for support of a vertical application could no longer remotely connect to their server.  After investigating the issue and making sure that I could VPN into their network, I called the Software Vendor.  I merely stated,”I am calling from company XYZ and you said that our VPN was not working.” This is where it gets interesting.  I ask the vendor if they are able to connect now that we confirmed the VPN worked, so they tested and informed me that they still could not connect.  I asked the technician if he could open telnet and try to connect to the IP address over port 1723.  He did not know how to do this and I was eager to resolve the problem, so I quickly asked, “Do you mind if I connect to your computer and try to troubleshoot the problem?”  To my astonishment the technician said, “Sure”.  I guided the gullible technician to logmeinrescue and proceeded to walk him through letting ME onto HIS computer.  Once on his computer I tried to pull up telnet but it was Windows 7 and by default there was no telnet application available.  I then asked if I could download Putty so that I could test the telnet ability.  He said, “Go for it.”  I was again astonished at the disreguard for the control he was giving me.  I then confirmed through the use of Putty that telnet was immediately getting dropped.  I speculated that it was their firewall blocking PPTP outbound.  He checked  with an IT guy that was strolling by and confirmed that they were blocking outbound PPTP.  They asked for the IP address so that they could add it to the firewall, so I told them the external IP address of the firewall they were trying to connect to.  Now the icing on the cake, the IT guy uses the computer that I am remote controlling to access their CISCO ASA.  He logs into the web management of the ASA and proceeds to create the rule to allow the PPTP to get through.  Now I am mesmerized by the lack of security.  I even corrected the IT guys spelling on the firewall.

Now that the exciting turn of events are over, I reflect on what happened.  How easy was it for me to get on their network?  Pretty easy.  All I needed was 3 pieces of information:

  1. I needed to know the name of the company who was in need of support.
  2. I needed to know the Key Line if Business Application and the company who made it.
  3. I needed to know the problem.

These 3 things are pretty easy to determine and even ask for and easily get the information about.

This is called Social Hacking.  All I needed was a good attitude, frinedly personality, and a few bits of info and I was able to get on their network.  The point here is that it should not be that easy to get on their computer since I called them. It is not like the called me asking for help.  I called them to give help.  They thought the problem was way down stream at their clients firewall.

Simple rule, never give donations to someone that calls you, always call them to give donations AND never accept techincal support remote control from someone that called you to tell you about a problem that you have that you don’t even know.

By the way, once they added the rule to the firewall, the VPN worked.

Filed Under: Uncategorized Tagged With: fraud, hacking, phishing, remote, scam, security

Top 5 Security Programs for Home Users

January 7, 2010 by admin Leave a Comment

As more and more of our lives move online, protecting our personal information becomes ever more important and ever more of a challenge.  Additionally, there are so many different kinds of security risks these days including viruses, malware, spyware, phishing scams, denial of service attacks and many more.  And it’s only going to get worse as hackers and botnets become more sophisticated.

Fortunately, there are many great security products on the market right now.  Personally, I rely on a mixture of security software to keep my computers safe.  Each entry on the list performs a different function or blocks a different type of threat, and I’ll attempt to explain why each item is important.

Antivirus Software: AVG Antivirus

I have used and recommended AVG antivirus for home and corporate users for several years now.  I look for several things when selecting an antivirus solution and the free version of AVG’s software for home users hits every item on my list.  First, it doesn’t slow my computer down unreasonably.  Any software that is running is going to slow down a computer some and antivirus software is notoriously bad about this as it has to scan every file that is opened on a pc to make sure it’s a safe file.  AVG does a good job of scanning the computer but leaving enough processing power that I can continue to work.  Second, AVG keeps itself updated.  As new viruses are released into the wild on an hourly basis, an antivirus software is only able to protect against the viruses that it knows about.  AVG is really good about updating itself automatically with the latest virus database.

AntiSpyware software: Spybot Search and Destroy

Spybot is great software for analyzing every file on your computer and detecting unwanted adware of spyware.  It’s also very good at preventing spyware from being added to your PC.  We’ve probably all seen computers infested with spyware or adware – they usually get internet windows pop up on their screens either at random times or every time you do an internet search.  They make computing miserable.  It comes with a large database of known spyware or adware and the makers keep it up to date with the latest threats.

AntiMalware software: Malware Bytes

I cannot count the number of times this program has saved me from having to wipe and reload a computer.  Malware is a general term for malicious software including viruses, Trojans or worms.  Periodically, I’ll come across a computer infected with so much malware that is unuseable.  In some cases, the computer will boot and work for 5 or 10 minutes and then come to a crawl where the Start button will not even work.  In those cases, I turn to MalwareBytes to remove the bad software.  It usually is able to resuscitate a compromised PC.  You can also install malware bytes on a clean computer and it will run as a background process and prevent malicious software from being installed.

Microsoft Windows Defender

Windows defender is very similar to Spybot or malware bytes.  It is a great free product that runs in the background and protects your PC from programs that cause Pop-ups, slowdowns or other security threats.

Firewall software: Comodo Firewall Pro

This software is essential for laptops that connect to public wireless networks.  Every time your computer connects to the internet, it is at risk.  I read an article years ago that said that a computer with an internet connection and no security software can be compromised in 4 minutes.  Most offices or home networks have a router that have a built in firewall that is sufficient to protect your computers.  However, if you take your computer away from that firewall, Comodo can fill the void.  It scans every packet that comes in to your computer from the internet and blocks the undesirable stuff.  It’s also really easy to install, which is a major plus for most users.

Links:
AVG antivirus (http://free.avg.com)
Spybot Search and Destroy (http://www.safer-networking.org/en/index.html)
Malware Bytes (http://www.malwarebytes.org)
Microsoft Windows Defender (http://www.microsoft.com/windows/products/winfamily/defender/default.mspx)
Comodo Firewall Pro (http://personalfirewall.comodo.com/)

Filed Under: Uncategorized Tagged With: free, internet, PC, security, software

Dangers of the Wild, Wild Web

December 29, 2009 by admin Leave a Comment

I read an article recently that said that FBI director Robert Mueller doesn’t use online banking at all because he almost fell for a classic “phishing” scam.  According to the article, he received an email that appeared to be from his bank and began following the instructions in the email.  Fortunately for his credit score, he caught on to the scam at the last minute.  In a classic knee jerk reaction, he now refuses to use internet banking at all.  What does this say about the state of internet security if someone with as much access to world-class security software as the director of the FBI is susceptible to internet fraud?

I certainly understand there are high risks to using internet banking.  I’ve read tons of horror stories about people whose financial lives have been ruined by identity theft.  We’ve all seen the fake emails from our bank, or from the IRS that look almost legitimate.  Even so, the convenience of internet banking outweighs the risks for me – as long as my wife and I practice safe computing.

Here are some tips for safe browsing:

  • Don’t click on links or attachments in emails you aren’t expecting.  If you need to do something at yoyr bank, go directly to your bank’s website.
  • Assume any message from your bank informing you that you need to sign in to update your information is junk.  Because of the prevalence of scans, most banks won’t use email to communicate this type of information.  You’ll get a letter in the mail or a pop-up on the website when you sign in.
  • Patch, patch, patch.  Keep your operating system and security software up to date.
  • Watch your account activity.  The best way to know if your accounts are compromised is to keep a close watch on the transactions.  The sooner you know about traffic that’s not yours, the better.
  • Use your annual free credit report.  We all get one free report a year.  Use it to see if any repair needs to be done.
  • If you have wi-fi at your house, don’t leave your computers on.  Wi-fi is a leaky vessel and embarassingly easy to compromise.  If you leave your computers sitting idle, connected to the internet for huge amounts of time, you’re asking for trouble.
  • Everyone needs a good firewall and good antivirus software.  There are plenty of free or cheap options available that do a pretty good job.

Filed Under: Uncategorized Tagged With: fraud, internet, phishing, scam, security, www

Tags

apple apps backups bandwidth citrix cloud cloud_computing cool datto fraud free graph hacking hyper-v internet ipad iphone microsoft monitoring netbook oftware p2v PC phishing remote restore scam security server migration software solutions statistics tablet technology terminal virtualization www xenapp

Twitter Feed

Tweets by @TSGNetworking

© 2025 · The Strickland Group