what's happening is the page you are visiting has an ad for one of the
firewall providers, and when the page calls the ad site it sends them
your ip so it knows where to send the data for the ad.  most ads work
this way, even the ones not pushing security.  your machine is not
broadcasting it's existence to every machine on the planet, just to the
sites you visit and any ads etc. they serve from another machine, your
ip tells them where to send the data.  now people can randomly scan ip
numbers looking for machines, and it's particularly common on cable.  

your machine will normally confirm it's presence and that whatever port
they pinged is available.  software firewall will block those attempts
and keep your machine from answering random people, effectively it looks
like there is no machine there when they probe you.  this is very good
because a response from an unprotected machine is fast, however if there
is no answer they have to wait long enough to be sure the response isn't
coming and it slows them down while they wait to see if anyone answers
the door.  a software firewall is always a good thing.  i've also got
mine set up to block most of the "legitimate" ad servers and tracking
servers.  it's been my experience that the ad servers are grossly
overloaded and the main slow down on many web pages.  i'm on a 26k
dialup connection and can tell the difference.  

the grc.com site explains it pretty well and will test your firewall
very nicely.  i check mine occasionally just to double check it's
working.  it's free, they want to sell you their software so they
provide the service and explanation of testing your vulnerability.  macs
aren't completely immune, you should have file sharing off when you surf
for instance.  

mostly macs are relatively safe because they are a small population
segment, most of the machines out there are pc's running windows so
that's what crackers (as opposed to legit hackers like myself who don't
try to steal things but just to play with their machines and software)
spend thier time with, also windows is notoriously insecure.  microsoft
doesn't do security right, until very recently exploiter didn't even
verify site certificates, it just blindly trusted every one which was a
significant security problem, but in typical microsoft fashion they
claimed it was obscure and eventually released a patch.  

even on a mac, if your browser has a known weakness you can be attacked.
 netscape 3. something had a java script bug that would let people
access your drives, a couple of days before it made the news and was
fixed i was attacked just that way through my dialup connection.  i was
sending allot of data (i like the lights on my modem!) while viewing a
static page.  i logged off and discovered they had also left me a cookie
with the name of my boot drive just to make it easier for them next time
they broke in!  a good firewall will at least log everything so you know
after the fact and possibly know where the attack came from.  in any
case it's always nice to know when and if you've been cracked.  the same
goes for any other web capable app you may be running, i.e. fetch etc.
and there's always the possibility that the web extensions themselves
(i.e. tcp/ip etc.) have bugs.  even the latest version of netbsd (which
is very well screened for security holes) had some in the beta release. 
it's fixed now, but unlike microsoft that tries to hide thier security
faults netbsd.org immediately publishes that there is a problem and
greets you with a warning when you browse thier site about current or
recently fixed security bugs.

does any one have something good to say about any particular firewall? 
i've been meaning to get a better one as the one i'm using doesn't log
things as thoroughly as i'd like (i.e. scan ports etc. should be logged,
but the data packets should be logged as well).  even on my dialup line
i've had several port scans and other intrusion attempts.  on a cable
modem most people get scanned 3 or 4 times a day.  

once the crackers find a susceptible machine they come back later to
break in (i.e. they use programs to search for weak machines, log thier
ip # and then the cracker goes back later and tries to break in).  this
is another advantage of a dynamic ip, your machine won't be in the same
place as when it was scanned.  you may now be at an ip# that was
previously logged as susceptible, but now it's a different machine there
and they have to reprobe it and hope it's another weak machine.  other
than getting a virus in it's nearly impossible for someone to find your
machine again with a dynamic ip, they have to scan the ip# range again
looking for you.  if you dial in from another town chances are you'll be
reaching a different server that uses a different block of ip#'s so it
can be rather hard for them to track you down again.  it's also nice to
have a dynamic ip so that the advertisers can't monitor your browsing
habits and know it's you again.  they sell the statistics, the list of
users and what they are interested in (a great help for spammers, or if
they manage to get your mail address (from a site you gave it to that
turns out to be untrustworthy) they can target you for conventional junk
mail, because they know what you're interested in)

it also really helps to leave javascript off when you don't need it,
both for security and speed.  of course some sites just won't work
without javascript, but i've also seen sights that won't work with
netscape 4.75 with java on.  i did try the v 7 beta, it lacks most of
the important security options etc. under the preferences.  aol
apparently wants every one to run any random javascript in email for
instance, i never, never want java to run in my mail!  java script in
email is a fine way for someone to track you and try to get a virus in,
possibly a very nosey virus, possibly one that's just malicious.  

corporate espionage has always been big (bigger than any large company
will admit, though they're usually in it as well as thier competitors)
which means there can be a financial reward to cracking into the right
machine.  a freelance cracker can offer to sell the data to a
competitor, or try to blackmail you etc.  some of the crackers are real
pro's that are in it for the $$, others are just "script kiddies" out to
have fun by messing things up.

sorry if this is an overblown ramble, i am getting a migraine so please
excuse any grammar and other errors.

security and privacy are big deals, unfortunately most don't realize how
important they are until they been victimized.


------
> [EMAIL PROTECTED]
> 
> Paul Shand wrote:
> 
> > Hi  On my internet travels I notice warnings that my computer is
> > broadcasting an IP Address and that my computer can be attacked (my S900).
> >
> > System 9.1.
--------

-- 
"For six years, John O'Neill was the FBI's leading expert on Al Qaeda. 
He warned of it's threat to the U.S.  But to the people at FBI
headquarters, O'Neill was too much of a maverick, and they stopped
listening to him.  He left the FBI in the summer of 2001 and took a new
job as head of security at the World Trade Center." 
<http://www.pbs.org/wgbh/pages/frontline/shows/knew/>.  Why did 911
happen?  Politics, in the broad sense and at the FBI, that's what makes
it a tragedy in the truest sense.  O'Neil's body was found in the
stairwell of what had been the south tower.

-- 
SuperMacs is sponsored by <http://lowendmac.com/> and...

 Small Dog Electronics    http://www.smalldog.com  | Refurbished Drives |
 Service & Replacement Parts   [EMAIL PROTECTED]  |  & CDRWs on Sale!  |

      Support Low End Mac <http://lowendmac.com/lists/support.html>

SuperMacs list info:    <http://lowendmac.com/supermacs/list.shtml>
  --> AOL users, remove "mailto:";
Send list messages to:  <mailto:[EMAIL PROTECTED]>
To unsubscribe, email:  <mailto:[EMAIL PROTECTED]>
For digest mode, email: <mailto:[EMAIL PROTECTED]>
Subscription questions: <mailto:[EMAIL PROTECTED]>
Archive: <http://www.mail-archive.com/supermacs%40mail.maclaunch.com/>

Using a Mac? Free email & more at Applelinks! http://www.applelinks.com

Reply via email to