It’s likely that you’ll at least install a free software firewall after reading this article, but how will you know if it’s working? There’s really no good way to probe your PC without advanced network knowledge, so it’s best to let one of the many automated security audit Web sites do all your work for you. These sites use a variety of standard techniques to scan your Internet ports for weaknesses and most can generate helpful reports that show your connection’s weaknesses and provide tips on how to plug the holes.
Some sites may ask you for an IP address before you begin. We would normally tell you to never divulge this information, but in the cases of the sites profiled below everything is kosher. These sites need the information because if they scan the wrong IP address you will see the test results for another computer. As long as you are using Windows 9x or Windows Millennium Edition (WinMe) you can easily find out your IP address: Click Start, Run, and type WINIPCFG in the Open box. Click OK and use the drop-down box in the IP Configuration window to ensure that your dial-up adapter or modem is selected. The number you are looking for is in the IP Autoconfiguration Address box. Write it down for future reference, and note that it may change the next time you connect to the Internet (this is especially true for dial-up modem connections).
Your first stop should be Gibson Research’s Shields UP! at http://www.grc.com/. Follow the Shields UP! links until you get to a Web page with Test My Shields and Probe My Ports buttons and use them to initiate a battery of tests that will give you a good idea of how secure you really are. Try running it with and without your firewall enabled to see what a major difference it makes.
For an even more complete scan, head to Wallyware’s HackerWhacker site at http://www.hackerwhacker.com/. Click the Quick Scan link to start the process and have a legitimate e-mail address ready. You can only get one free scan at the site before you have to pay for their services, and we recommend leaving your firewall on during the free test so you can see if it has any weak spots. The company also offers a far less involved firewall test that can be used at no cost as often as you would like at http://www.networkscan.com/. You may want to use the free service first without your firewall enabled so you can find any weaknesses with your system. Then you can enable your firewall and try the more involved scan to see if it cured all your security problems.
Finally, try E-Soft’s Security Space tools at http://www.securityspace.com/. You can sign up for free to access either their gratis or fee-based tests, and they go far beyond the basic port scan. It also is possible to probe your firewall for specific weaknesses, see if your browser is secure from a variety of common attacks, and check the integrity of your Web server if you run a Web site from your computer. If you want to get serious the company offers a variety of fee-based services that will give your entire computer and all connections a thorough workout.
Terms To Know
header-A small bit of information attached to each packet that includes at minimum the source and destination address for the packet.
intranet-An internal network in a single office or throughout a company with several offices. These networks are used to share resources such as laser printers, as well as common files and storage space on file servers. Intranets use the same network technologies, such as (TCP/IP), as the Internet and are often connected to the Internet.
IP (Internet Protocol) address-Every computer connected to the Internet has to have a unique IP (Internet Protocol) address; otherwise requested information will not know what computer it is supposed to be delivered to.
log-A file that is automatically updated each time an attack is made on your computer so it can be permanently recorded and reviewed at your leisure.
packet-The IP that forms the basis of the Internet requires that all files transmitted between computers be chopped up into tiny pieces called packets. The packets contain address information that gets them routed to their ultimate destinations, where they are reassembled into carbon copies of the original file.
protocols-Standardized "languages" that let hardware devices (and software applications) communicate with one another.
TCP/IP(TransmissionControl Protocol/Internet Protocol-IP is the fundamental data protocol of the Internet, but the Transmission Control Protocol (TCP) rides on top of it and lays down the rules for most of the data transfers that take place on the Internet. TCP temporarily creates a direct link between two computers and ensures that packets arrive in the order they were sent.
What It Protects You From
There are many creative ways that unscrupulous people use to access or abuse unprotected computers:
- Remote login:
When someone is able to connect to your computer and control it in some form. This can range from being able to view or access your files to actually running programs on your computer.
- Application backdoors:
Some programs have special features that allow for remote access. Others contain bugs that provide a backdoor, or hidden access, that provides some level of control of the program.
- SMTP session hijacking:
SMTP is the most common method of sending e-mail over the Internet. By gaining access to a list of e-mail addresses, a person can send unsolicited junk e-mail (spam) to thousands of users. This is done quite often by redirecting the e-mail through the SMTP server of an unsuspecting host, making the actual sender of the spam difficult to trace.
- Operating system bugs:
Like applications, some operating systems (http://www.howstuffworks.com/operating-system.htm) have backdoors. Others provide remote access with insufficient security controls or have bugs that an experienced hacker can take advantage of.
- Denial of service:
You have probably heard this phrase used in news reports on the attacks on major Web sites. This type of attack is nearly impossible to counter. What happens is that the hacker sends a request to the server to connect to it. When the server responds with an acknowledgement and tries to establish a session, it cannot find the system that made the request. By inundating a server with these unanswerable session requests, a hacker causes the server to slow to a crawl or eventually crash.
- E-mail bombs:
An e-mail bomb is usually a personal attack. Someone sends you the same e-mail hundreds or thousands of times until your e-mail system cannot accept any more messages.
- Macros:
To simplify complicated procedures, many applications allow you to create a script of commands that the application can run. This script is known as a macro. Hackers have taken advantage of this to create their own macros that, depending on the application, can destroy your data or crash your computer.
- Viruses:
Probably the most well-known threat is computer viruses. A virus is a small program that can copy itself to other computers. This way it can spread quickly from one system to the next. Viruses range from harmless messages to erasing all of your data.
- Spam:
Typically harmless but always annoying, spam is the electronic equivalent of junk mail. Spam can be dangerous though. Quite often it contains links to Web sites. Be careful of clicking on these because you may accidentally accept a cookie (http://www.howstuffworks.com/cookie.htm) that provides a backdoor to your computer.
- Redirect bombs:
Hackers can use ICMP to change (redirect) the path information takes by sending it to a different router. This is one of the ways that a denial of service attack is set up.
- Source routing:
In most cases, the path a packet travels over the Internet (or any other network) is determined by the routers along that path. But the source providing the packet can arbitrarily specify the route that the packet should travel. Hackers sometimes take advantage of this to make information appear to come from a trusted source or even from inside the network! Most firewall products disable source routing by default.
Some of the items in the list above are hard, if not impossible, to filter using a firewall. While some firewalls offer virus protection, it is worth the investment to install anti-virus software on each computer. And, even though it is annoying, some spam is going to get through your firewall as long as you accept e-mail.
The level of security you establish will determine how many of these threats can be stopped by your firewall. The highest level of security would be to simply block everything. Obviously that defeats the purpose of having an Internet connection. But a common rule of thumb is to block everything, then begin to select what types of traffic you will allow. You can also restrict traffic that travels through the firewall so that only certain types of information, such as e-mail, can get through. This is a good rule for businesses that have an experienced network administrator that understands what the needs are and knows exactly what traffic to allow through. For most of us, it is probably better to work with the defaults provided by the firewall developer unless there is a specific reason to change it.
One of the best things about a firewall from a security standpoint is that it stops anyone on the outside from logging onto a computer in your private network. While this is a big deal for businesses, most home networks will probably not be threatened in this manner. Still, putting a firewall in place provides some peace of mind.