Monday, March 15, 2010

Cm Dry Before Period Pregnant

Go to the bank via the Internet safely (Home Banking) and mitigation


The total security does not exist, starting from this axiom we can start thinking about what might be acceptable solutions which increase the level of safety in the use of its banking services via the Internet.

precautions are not enough when the expense could be your bank account.

The basic rules are quite simple but you'd better keep in mind:
  • Have a good antivirus and antispyware that can prevent infection of your computer.
  • not install cracked software and dubious origin. Each software downloaded from the network that you decide to install you do so at your own risk.
  • disabling the automatic startup of software from removable media (Windows)
  • access their bank always starting from the website of the bank that will keep your bookmarks and never access it through a link provided by someone or in an email .
  • keep the most updated operating system and software in common use (antivirus, PDF reader software for browsing, instant messaging software, etc.).
  • Log on to your computer using a user with reduced privileges, this type of user has the possibility, in case it needs, to elevate their privileges.
  • Close to navigate the program with the 'X' (close the window with the button top right) if you end up on some website of dubious reliability that claims to provide a service / resource after confirmation by the pressure of a few buttons. The closure forced by Activities Manager (Task Manager) is the next choice if the window does not close.
  • not store your password, nor write in any document on your computer.
  • Activate a text message service for transaction allows you to be informed in real time on the movements of their own.
The rules of conduct to help avoid unpleasant surprises, but are only one of many steps that can be use.
a system compromised by some malware could read data access typed and sent to an attacker.
The system should be as "clean." In
network solutions are proposed, more or less valid or feasible: A

emulated in the virtual machine operating system of choice for everyday use is a 'weak', the daily system may be infected with a keylogger any (program that records all keystrokes), and then defeat the isolation of virtual machine Chinese boxes (including sandbox).

Use a virtual machine operating system daily might be a better solution, if you were to access the home banking services you can access a second virtual machine built ad-hoc only for banking transactions. The weakness of the solution is the inherent performance degradation due to emulation; unacceptable in my opinion.

The use of a second operating system loaded on another partition or external support would be good solution as long as the environment does not see daily use and can not write in the environment that you want to "isolate" and make it as safe as possible.

The choice a little 'machine, once turned on the computer, decide which room you want to access it seems to me be a viable alternative to the problematic dealt with;
The solution is a reboot after completion of their transaction banking and a protected isolation environment built for the purpose.

You can use an external hard drive with an operating system other than provided to disconnect when you use the operating system every day; rule also applies to USB flash drives unless they are not equipped with a button that raises the key in a read-only status.

The solution, in my opinion, more comfortable living in a 1 GB USB support from within which there is installed GRUB2 and copied the ISO of Ubuntu without, therefore, require the installation of any operating system.

A computer off the USB stick is inserted configured properly ; When you turn on the computer you are using the mask to select the boot volume from the screen BIOS (by pressing F8 on some computers), selected the USB stick proceed loading UBUNTU, being a complete operating system, allows you to navigate the image installation.
The end use of banking services requires that you turn off your computer and extract the key.
A button key with read-only (read-only) may be connected at all without the protective environment is at risk of being compromised.

0 comments:

Post a Comment