0% found this document useful (0 votes)
16 views

TheCompleteInternetSecurityManualIssue3July2023

The document is a comprehensive manual on cybersecurity, detailing various digital threats such as viruses, malware, and social engineering, while providing guidance on how to protect personal data and devices. It includes tutorials for securing computers and networks, as well as advice for parents on keeping children safe online. The manual emphasizes the importance of being informed and prepared in the face of increasing cyber threats.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views

TheCompleteInternetSecurityManualIssue3July2023

The document is a comprehensive manual on cybersecurity, detailing various digital threats such as viruses, malware, and social engineering, while providing guidance on how to protect personal data and devices. It includes tutorials for securing computers and networks, as well as advice for parents on keeping children safe online. The manual emphasizes the importance of being informed and prepared in the face of increasing cyber threats.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 196

BEAT HACKERS, VIRUSES & MALWARE

The Complete

Manual OVER

710
GUIDES
Your guide to &TIPS
staying safe
online and
protecting
your data

www.pclpublications.com 100% INDEPENDENT


ad The Complete
Re Manual Series
Available on

For a full list of titles available please visit:


www.pclpublications.com
The Complete
Internet
Manual
Viruses, malware, ransomware, phishing, smishing, vishing, social
engineering… the list of digital threats with peculiar names
expands daily and hardly a moment goes by without some form
of attack appearing in the news. We live in interesting times,
where data is worth more than oil or gold and your personal
information is greatly sought after by cybercriminals, scammers
and hackers. How prepared are you for this new age of digital
vandalism and theft? Is your Windows computer secure against
the continual onslaught of the modern online world? We’ll help
you secure your computer, network and devices against such
threats and with easy to follow tutorials, help arm you against
potential threats and attacks. For parents and guardians, we also
cover looking out for your children when online, together with
guides on how best to protect them and advice from industry
experts. You’ll soon be security savvy and prepared for whatever
digital threat looms on the horizon.

www.pclpublications.com
8 Modern Day Security 68 Online Protection & Disaster Recovery
10 Types of Security Risk 70 How Does Information Move Around the Internet?
12 Hackers and You 72 How Can Internet Data be Intercepted?
14 Social Engineering 74 10 Tips to Protect Yourself Against Interception
16 Ransomware: How it Works 76 How to Secure Your Devices
18 The Virus Top Ten 78 How to Secure Yourself on Facebook
20 Phishing, Vishing and Smishing 80 How to Secure Yourself on Twitter
22 Pharming 82 How to Secure Yourself on WhatsApp
24 Windows 10 Security 84 What to Avoid when Creating a Password
26 Digital Security FAQ 86 Password Generators and Tools
88 Top Ten Password Managers

28 Protecting Yourself 90 Shopping Online and Security


92 How to Remove a Virus or Malware from a Windows PC
30 Be Smart
32 Top Ten Antivirus and Security Packages
94 Advanced Security Tips
34 Bitdefender Total Security 2018 Review
36 Kaspersky Total Security 2018 Review 96 Windows 10 Privacy Settings
38 McAfee Total Protection Review 98 How to Check which Apps are Sending Information
40 Setting Up Windows 10 Security 100 What is a firewall?
42 Why Updating is Important 102 Improving the Windows 10 Firewall
44 What to Keep Updated and How 104 Creating a Security Plan
46 How to Secure Your Web Browser 106 Windows Security Checklist
48 How to Secure Your Home Network 108 What is a Sandbox?
50 What are Wireless Security Standards? 110 Running Windows 10 as a Sandbox
52 How to Secure Your Wireless Network 112 Installing VirtualBox
54 What is Encryption? 114 Installing Windows 10 in VirtualBox
56 Encrypting Your Windows 10 Laptop 116 Creating VirtualBox Snapshots of Windows 10
58 Top Ten Encryption Tools for Windows 10 118 Create a Windows 10 Recovery Drive
60 What is a VPN? 120 How to Back Up Windows 10
62 How Can a VPN Improve Windows Security? 122 How to Create a Windows 10 System Image
64 Top Ten VPNs 124 Extreme Windows 10 Lockdown Tips
66 Using a VPN for Added Security and Privacy 126 Cyber and Windows Quiz
128 What the Experts Say

4 ,QWHUQHW6HFXULW\
Contents

130 Online Child Protection 166 Further Protection for Young Adults
132 Children Online: What are the Risks? 168 Staying Safe with Facebook for Teens
134 Social Media & Children 170 Staying Safe with Twitter for Teens
136 Search Engine Safety 172 Staying Safe with Instagram for Teens
138 Online Grooming 174 Staying Safe with WhatsApp for Teens
140 How Safe are the Sites Your Child Can Access? 176 Staying Safe with Snapchat for Teens
142 Email and Child Safety 178 Creating a Child Account in Windows 10
144 Top Child Friendly Email Programs and Services 180 Windows 10 Family Features
146 Cyberbullying 182 Problems with In-app Spending
148 How to Prevent and Deal with Cyberbullying 184 Tips on How to Stop In-app Overspending
150 Helping Your Child Through the Internet 186 Online Child Safety at School
152 Your Child and Online Gaming, is it Safe? 188 Where to Find Help with
154 Staying Safe when Gaming Online – Advice for Your Child Online Child Safety
156 Monitoring What’s Going On 190 What the Experts Say
158 Monitoring Online Activity for Non-Technical 192 Glossary of Terms
Guardians
160 Tips for Technical Guardians to Monitor a Child’s
Online Activity
162 Ten Monitoring Tools to Install and Use
164 Using the Windows Hosts File to Block Sites

,QWHUQHW6HFXULW\ 5
Digital Security In Numbers

I
nformation regarding cyber security doesn’t always have
to be technically heavy. In fact, to make it easier to digest,
and to just show you how virulent and bitterly hostile
computer-borne security threats are, here’s a collection of
statistics to give you the heebie-jeebies; all the more reason
then to keep this manual close to hand.

80% of all cyber crime attacks originate from Russia, China


and North Korea

77% of small businesses don’t regularly back up


important data

75% of the health care industry has been infected with


malware.*

73% of US citizens have fallen victim to some


form of cyber crime

64% of companies have experienced


web-based attacks

61% of malicious websites are genuine


sites that have been compromised

Social Media Users

50 20
***** *****
Haven’t changed Have never changed
their password in the their password
last year
Sources: Symantec Corporation Threat Report ◆ CSO Cybersecurity Business Report ◆ UK National Cyber Security Centre ◆ Security Intelligence ◆ Hackmageddon.com ◆ UK Office for National Statistics ◆ Bitdefender Labs Report ◆ Herjavec Group ◆
* Figures based on 2017 half yearly report.

6 ,QWHUQHW6HFXULW\
Digital Security In Numbers

A member of Devices hacked in RANSOMWARE


the public is LESS THAN: ATTACKS on
HACKED every: BUSINESS every:

39
SECONDS MINUTES
2 40
SECONDS

GLOBALLY: 6 MONTHS*

$ 123 $ 441 $ 271


250,000
NEW VIRUS FIXING LOST PAYING
threats Malware RANSOMS
to Cyber
EVERY DAY ATTACKS
CRIME
to remove malware
OVER

, ,
REPORTED INSTANCES OF FRAUD
through cybercrime against UK banks last year
Statista.com ◆ iQuda.co.uk ◆ Tektonika ◆ Securityaffairs.com ◆ Ic3.gov ◆ Marblesecurity.com ◆ Infosec Institute ◆ IBM ◆ The Linux Foundation ◆ Microsoft ◆ ITworld.com ◆ Javelin Strategy ◆ US Government ◆ NSA.gov ◆ CIA.gov ◆ Whitehouse.gov

,QWHUQHW6HFXULW\ 7
Modern Day Security

8 ,QWHUQHW6HFXULW\
INDEX

The start of the digital age brought with it many advances in the way we
work and interact with each other. It’s estimated there’s 1.2 Zettabytes
(1.3 trillion gigabytes) of data available to someone with access to the
Internet and whilst most of it may be irrelevant, what’s important to you
is somewhere within that mass of raw information.
Sadly, the cold hard light of day reveals that with the growth of this
voluminous data comes the nefarious acts of those who wish to cause
mayhem, panic, theft and other such negative elements. Therefore, as
a user you need to make sure that you’re protected against the ever
increasing digital world of threats, viruses and everything else the
Internet has to offer.
This chapter will help you to recognise some of the threats, what they all
mean and how they work. We can help you to identify and know what to
look out for when online.

10 Types of Security Risk 20 Phishing, Vishing and Smishing


12 Hackers and You 22 Pharming
14 Social Engineering 24 Windows 10 Security
16 Ransomware: How it Works 26 Digital Security FAQ
18 The Virus Top Ten

,QWHUQHW6HFXULW\ 9
Modern Day Security

Types of Security Risk


There are more security risks for your computer than just the common, run-of-the-mill virus. The
amount of digital use the average person has over the course of a week has increased significantly
in just a few years, and with it comes a legion of security related issues.

Here Be Dragons
This isn’t a definitive list of the possible threats available for the Windows
user but here are ten modern risks that you face every time you power up
your PC.

Viruses Trojans
Viruses have been around for as long as computers. The Trojan horse, as the name suggests, is a program that
They’ve moved on from simply displaying the name of masquerades as a legitimate application but in actual

01 the coder on the monitor, a kind of virtual vandalism,


and now can disable and wipe the data off a hard drive
in mere seconds.
04 fact contains code that allows a hacker remote access
to your computer. Like the legend of the wooden horse
the Greeks used to gain access to Troy, once inside your
computer it opens and creates an opening for the hacker.

Ransomware
Earlier in the year the UK was gripped in the clutches
of the WannaCry ransomware infection. This particular

02 infection exploited a vulnerability in Windows,


and quickly spread throughout the NHS and other
organisations, locking and encrypting the data on
a computer until money was sent to those who
unleashed it to the world.

Worms Spyware
Although a worm is a type of virus, it behaves Spyware invades computers usually through freeware
differently in that it’s goal isn’t to alter or destroy or shareware downloads, which is why you should

03 system files. Rather, it’s designed to replicate itself


continuously until all the resources and space on the
system are consumed. A bit of a nightmare for the
system administrator.
05 always download a program from a reputable source.
The intent of spyware is to collect information about
the user and report it back to those who wrote it.

10 ,QWHUQHW6HFXULW\
Types of Security Risk

Adware
Adware is very similar to spyware, in that one of its goals
is to monitor the user. However, adware usually goes one

06 step further and bombards the user with Internet pop-up


advertising, usually when they open their browser or a
new tab. The advertising can be tame, such as gardening
equipment, or it can be extremely offensive.

Hacking
While Hollywood would have you visualise the lifestyle
of a hacker as something that’s quite alluring, in truth it’s

07 quite the opposite. The average user is generally under


the radar where a hacker is concerned. They’re mostly
after the corporations, or famous people, but you can
have your computer hacked by a neighbour, for example.

Social Engineering
A relatively modern term in the history of computer
security, social engineering will have the user deceived

08 into giving away personal information or allowing a


scammer into their systems. The recent spate of calls
from people claiming to be from the likes of Microsoft
or a security firm are a prime example.

Phishing
Much in the same vein as social engineering, phishing
is the act of obtaining sensitive information (bank

09 details usually) about a user by being disguised as a


trustworthy source. Phishing on social media sites
such as Facebook, Twitter, etc. is on the rise.

Rootkits
Rootkits are virus-like programs that are activated
before the computer’s anti-virus and security suites

10 are started when booting Windows. They can change


the way a security suite looks at files, allowing a virus
to hide in plain sight and not be detected by the
system’s security measures.

,QWHUQHW6HFXULW\ 11
Modern Day Security

We’re probably all familiar with the term


‘hacker’, and what it suggests, but do we
really know what a hacker wants from
us? More to the point, how are we
perceived in the eyes of a hacker?Zombie Apocalyp
Let’s have a look at what the
modern hacker wants from the
average user.

Being on the end of


a successful hack
has been likened to
having your house
robbed. There’s a

You’ve
been
hacked!

feeling of invasion,
that someone
has rifled through
your personal
belongings and
stolen what’s yours.

12 ,QWHUQHW6HFXULW\
Hackers and You

Monetary Motivation Access to Your Webcam


As with most hacks the world over, money is the driving force Webcam hacking has become more popular in recent years. What
behind an attack. A hacker will want to enter your system through happens here is, a hacker manages to gain access to your computer
various means and obtain your bank or credit card details in order and activates the webcam in order to view what you’re doing; and
pse
to get access to your money. It’s plain and simple theft. as long as the computer is up and running, they can see everything
the webcam can, and they can do so without you even knowing.
Personal Information
Personal information can be extremely valuable to a hacker. Those Access to Your Microphone
who manage to obtain information about you, from date of birth, To expand on the previous hack, along with a webcam hack an
address, social security number and countless other trivial details, attacker can also activate a computer or device’s microphone. Doing
can then use your identity to open bank accounts, start a loan and so will allow them to listen in on anything that’s being said, so perhaps
so on. In the end, it is your name that’s linked to the fraud. it’s worth covering up your microphone during any future meetings.

Parasitic Infection Zombie Apocalypse


Sometimes a hacker will use you to get some other target. There are instances whereby you become the target of a larger
Perhaps you work at a bank, or something similar, the hacker scale hack. In this case the hacker isn’t targeting you specifically,
will then identify you as a target that can be used to transfer a they’re simply using your computer as a zombie, a collection of
program from your laptop to the work’s server. You unwittingly machines connected to the Internet that runs malicious programs
become the carrier of malware, allowing a hacker to gain access against a target. Zombies are often used to conduct DDoS attacks.
to your work.
Cyber Vandalism
Exploitation Often you can be the target of an attack that doesn’t seem to
Exploitation is becoming a common theme among modern make any sense. The hacker doesn’t want money, they don’t
hackers. In this scenario a hacker will gain access to your personal want your personal information either. It’s just a case of cyber
information and hold it to ransom. They can then demand vandalism. Perhaps the hacker wants their name known in the
anything from money, to more personal acts. wider world, or just likes to see chaos reign. Who knows why they
do it?
Stealing Bandwidth
Rather than targeting a user purely for financial gain, or something Distributing Illegal Material
else, a hacker can also want to use your home bandwidth. Finally, a hacker can use your computer as a source or a node for
Generally speaking, the hacker doesn’t need to be on the other the distribution of illegal material. You won’t even be aware of the
side of the world, they could be a neighbour who’s using your fact but your computer is successfully trafficking illegal material
Internet connection to download copyright material. together with others on the Internet.

,QWHUQHW6HFXULW\ 13
Modern Day Security

Engineering
With the rise of wider forms of communication, through social media
and so on, comes a new wave of threats called social engineering.
There are many forms of social engineering, so let’s have a look at
what you’re up against, and how to combat it.

S
ocial engineering is the new modern way of
manipulating people to give up their personal and
confidential information. It comes in many guises
and under different sub-headings, such as Phishing
and the like, but it’s essentially all a form of social engineering.
Essentially, the scammer will take your human nature and
responses and turn it against you for their own gain. You may think you’re
The kind of information the scammer is after does vary, depending not the sort of person
on the type of scam being used, but for the most part they’re to be fooled by a
usually after your passwords, bank and credit card details, or login scam but often the
information in order to gain any sort of financial data. Foreign offers are fake
You’re probably more familiar with social engineering that If you’ve received an email or a pop-up
you suspect, even if you’re new to the term. Recall the emails on a website offering you some financial
from someone, usually based in Nigeria, who has come into a reward, then it’s more than likely to be
fortune in the billions and for some inexplicable reason wants
to put the money in your bank account. Needless to say, the Scam, fake. Likewise, lottery funds from other
countries are fake too, as is money from
money was never there in the first place and should you go
through the process you will eventually be persuaded to hand scam, so called Uncle Charlie who lives in
Outer Mongolia.
over some banking information which the scammer can then
use to steal from you.
and
There aren’t too many Nigerian scams these days, mostly you more
get a phone call from someone claiming to be from Microsoft
or some other well-known company, who insists that they
scam
are tracking a virus or other harmful malware that’s currently
residing on your computer. They ask you to visit a webpage
and download a piece of software that will allow them remote
Slow down
access to your computer. When in, they run a script that
displays a wealth of useless information on the screen whilst Many scammers want you to react quickly, as
scammers have
in the background they run keylogging and hacking software a matter of urgency. Take a moment to figure
employed subtle
to obtain your online banking details. They can even ask you out what’s going on and don’t fall for any high-
to log into your bank while connected to make sure everything
ways and means in pressure tactics. Ask for half an hour to call a friend
is working. which to bait you. for advice.
Other common social engineering tactics include emails
from a friend, who has been hacked, with the scammer
masquerading as them. It could be an email claiming to be
from your bank, an urgent request for help or someone asking
for a donation to a charitable organisation. Be wary, and
question everything.

14 ,QWHUQHW6HFXULW\
Social Engineering

Research everything
Locate your bank or credit card company’s webpage and follow
any links to known social engineering scams. Read all the
information you can gather about the techniques and tricks
Don’t engage used and arm yourself with that knowledge prior to any contact
from a scammer. The more you know, the less likely you are to
Whilst it’s fun to lead a scammer on the other end of the
being hoodwinked.
telephone, telling them that the only computer you own is
a Commodore 64, it’s really not worth it. They know they’re
scamming, you know they’re scamming, so just put the phone
down and ignore them.

Never give your password


Beware of attachments A bank never asks you for your password, they never call you up
or send a text message requesting to enter your password, nor
Email attachments are an excellent way of distributing malware,
will they ask you for other personal information relating to your
viruses and hacking scripts to your computer. If you receive
account. Treat all requests as suspect and don’t give out any of
an email claiming to be offering you a deal of a lifetime, and
your passwords.
requesting you open the attached file, then it’s likely a virus.
Research the sender, and best to delete the email.

,QWHUQHW6HFXULW\ 15
Modern Day Security

How it Works
The first instance of an extortion attack is credited
to Joseph Popp back in 1989. Since then the
frequency, delivery and scale of ransomware
attacks has increased significantly; so what is
ransomware and how does it work?

R
ansomware is a particularly nasty form of malware and How do you
digital threat. There’s usually some kind of ransomware avoid getting
headlining in the news around the world and those who are
ransomware on
the victims are often at a loss as to what to do next.
your computer
Essentially, ransomware will infect an individual computer and one and what happens
of two things can happen: first, it locks the computer, stopping all
if you’re unlucky
access to it from the keyboard, then it starts to search for data and
encrypt the contents of the hard drive. Lastly it infects the boot
sector of the computer and displays a message detailing the type
of ransomware and how the individual will pay for the release of
the data; the message can even have fake FBI warnings included
with it. Alternatively, and the second thing that may happen once
a system is infected, the ransomware will lay in wait until a set time
What
and date, then do all of the above and lock the computer. Waiting
for a set time will ensure that numerous machines are infected
to do
before any fix can be discovered; also if all the infected machines
are activated at the same time then there’s more of a chance of the
attacker getting their ransom paid.
You normally have a set time in which to pay the ransom, usually enough to be the
72-hours. If the victim doesn’t pay in time, the attacker can target of such an
introduce a second phase into the ransomware code that will attack? Here are
either increase the amount demanded or completely destroy the
some hints and
files that are being held at ransom.
tips for you.
Ransomware can be spread in a number of ways. The more
Enha
popular choice of delivery is via an infected web page, some form
Whils
n ce yo
of Flash script that has been hijacked and now contains a link to t us ur se
a remote server where the browser will unwittingly download the Defen in
der a g the
curit
accep nti-m b y
ransomware code. More recently there are instances of Drive-by table alwar uilt-in W
it’s n unde e agen in dows
attacks, where the ransomware code locates any USB sticks a user ot as r t
dedic good normal cir is perfect
may have in their system and transfer itself in the knowledge that ated at de cums ly
look Intern fendin tance
the stick will be inserted into a work’s computer. at so et sec g you a s,
for a m
highe e later on urity suit sa
to pro r end ). Con e (w
The WannaCry ransomware attack earlier in the year was by far one tect y AV an sider e’ll
our c d sec payin
of the most prevalent in recent years. It’s estimated that more than ompu urity g
ter. softw
250,000 computers across 200 countries were infected, rendering are
the likes of big companies such as FedEx, Nissan Motor Co and
Telefonica SA under siege from its demands. The National Health
Service in the UK was hit too, resulting in weeks of chaos and
disorder for the staff and patients alike.

16 ,QWHUQHW6HFXULW\
Ransomware: How it Works

Upda
The tes Neve
preve
single
If you
r inser
n most ’ve fo t a ra
make ting a ran importan temp u ndom
s t fac tation nd a USB
latest sure that y omware t stick USB
up d our c attac or of your
comp
is stro
ng to s omew stick
code ates ompu k is t sorts uter. se e h er
u a t o o Not o w e,
weak sually look pplied. R er has the confid f malware nly co hat’s on it although
nesse s for v ansom entia , uld it , don the
if the s in the ulner ware secur l data it could a b ’t stic
y’r abilit ity ex . Eith lso co e infected k in
it’s diff e up to d operating ies an
d pert a er de ntain with
icult f ate a s t wor stroy all
or it t n ystem k. it or h sensitive
o activ d patched but and it and
ate. , then over
to a

Neve
Your
r pay
data
be d is lo
on cked
recom e by an , and
the
mend yone
ten, t ed to to sa re’s noth
he at p a ve it ing t
the d tacke y the r , so hat c
ata a r will anso it’s r an
nywa tak e the m . Nine e ally no
malw mon t t
are b y. Th ey an im es ou
eing ere’s d nev t of
activ also er un
ated the t
after hreat lock
paym of m
ent. ore

Back
Set y
u p
ours
netw elf a d
ork r aily b
esou ac
If yo
ur d rce th kup sche
ranso ata is at’s sep dule
secu arate , to a
mwa rely USB,
com re at back from cloud
pute tack, e your or
save r, re-in then d up com
d da stall you , and pute
ta ba W c an y o r.
ck ov indo happ u ge
ws a ily w t
er. gain, ipe y a
then our
copy
the

,QWHUQHW6HFXULW\ 17
Modern Day Security

The

Viruses are constantly evolving thanks to more ingenious


methods of delivery and due to the developers and
hackers tweaking their code to sniff out operating system
vulnerabilities. It’s difficult to say what the next big virus
will be but some scary ones have already appeared on
the Internet.

Just to give you an idea of


what the future could hold
for the computing world,

Digital
Destruction

here are the top ten most


destructive viruses unleashed
over the last decade into the
digital domain.

18 ,QWHUQHW6HFXULW\
The Virus Top Ten

1 Storm Worm 2 Conficker


Storm Worm was released in 2007 and was rumoured to Conficker was a 2008 worm that infected an estimated 15 million
have hailed from Russia. It came in the form of an email Windows computers worldwide. The French Navy, UK Ministry of
link, usually with an important headline to grab the victim’s Defence, hospitals and local police forces were affected. It was spread
attention. When the victim clicks the link the code is inserted and payload via Facebook, Skype and mail services, and infected networked computers with a
keylogger that the hacker could use to record your keyboard strokes.
with a backdoor into the system is opened. It infected over 10 million
computers worldwide.
5 Duqu
3 Daprosy Worm Duqu was released in 2011 and shared many
2009 saw the release of the Daprosy Worm characteristics with Stuxnet. However, Duqu had
whereby an estimated 20 million computers different roles: it would work as a keylogger, to
were infected with a keylogger. What made steal digital certificates, gather information about an infected
this such a dangerous virus was that it remained active PC, or completely wipe the contents of any connected hard
in Windows Safe Mode, so it was very difficult to remove. drives. Interestingly, parts of the Duqu code were written in an
unknown high level programming language.

4 Stuxnet
Stuxnet was rumoured to have been a US Intelligence
6 Shamoon
created virus that was designed to infect Iranian nuclear Shamoon was discovered in 2012 and
power plants, thus stopping them from potentially developed to infect the Windows kernel,
creating weapons grade material. Whether you believe that or not, it the core code of the operating system. It
was one of the worst viruses to appear in modern times. successfully managed to wipe the contents of millions
of hard drives and was rumoured to be used in cyber
espionage in the energy industry.

7 CryptoLocker
CryptoLocker is a ransomware infection
that first appeared in 2013. As with most
ransomware code it locks and encrypts
your entire hard drive and offers to unlock them if
the victim pays up to $300. Remarkably, the code
was able to delete itself whilst still keeping the files
encrypted and locked.

8 Regin
2014’s Regin virus was spread via fake websites and infected tens of
millions of computers. Rumour has it that it was a joint US and UK
intelligence created virus for global digital surveillance but we’ll leave
that for the conspiracy theorists to argue over. Nevertheless, it managed to send
information of the victim’s computer back to an unknown location.

9 Rombertik’s Endless Loop


Rombertik’s Endless Loop is an interesting, if somewhat deadly,
virus to have sprung up in 2015. When infected, the virus will alter
10 Tiny Banker and delete key boot files for Windows computers then force them to
reboot. With the boot files missing or altered the Windows PC will continually boot
Tiny Banker is an information and and reboot itself until you re-install the OS.
packet sniffer virus that will record
any online banking details the victim
enters in their computer. That information is then
sent back to several servers which the hackers
can then use to access your bank accounts. It’s
estimated that hundreds of millions were stolen
in 2016 thanks to Tiny Banker.

,QWHUQHW6HFXULW\ 19
Modern Day Security

Phishing,
It’s tempting to think we’ve made up the words
Phishing, Vishing and Smishing but in actual fact they’re
all forms of social engineering scams. Whilst we’ve
covered social engineering already, it’s worth looking at
these three modern day threats individually.

S
ocial engineering, the act Social engineering Phishing is the attempt to obtain Clone and Whaling. Spear phishing
of getting information fraud comes in information from a potential victim is designed to specifically target an
from a person based through emails, messaging, social individual, gathering information
many guises, with
on their human instinct media and auction sites. They can such as the above Facebook
to react, help or be entrapped
oddly sounding come in the form of an email, for ‘game’ whereby the scammer can
into some form of false promise, names and example, claiming to have some personalise their attack on the victim.
isn’t as modern as the name methods. In the money available for you or pretending
Clone phishing is an attack type that
suggests. Although the term ‘social to be from your bank or credit card
uses a previously delivered, legitimate
engineering’ is in fact relatively new, company. Social media phishing
email containing an attachment but
the process of obtaining sensitive includes individuals befriending
with the details changed and the
information from a victim has been you, or pretending to be someone
attachment swapped for a virus or
around for a very long time.
The digital age, of course, has
Gone you may know, then asking for
information. Similarly a phishing
keylogger. To the victim the email
looks real, since it’s cloned from a real
increased the attacks and how
they’re delivered. No longer is a
Phishing attack can come in the form of a
Facebook seemingly friendly test,
email, and when the attachment is
opened it infects the computer.
such as ‘name the top five things
victim beguiled by post, now they’re
about yourself and tag ten friends…’. Whaling is when a phishing attack
bombarded by false websites,
The unwitting victim will happily targets senior executives of a
emails and a string of other cleverly
reveal their date of birth, where they company or a high-profile individual
disguised mediums.
end, the scammers were born, pets names, names of any or business. The attack is a finely
Let’s break down the three main, are after your data, children and so on. The attackers will crafted email or web address that’s
modern methods of how a scammer but what do these gather all that information and use it created to look business-like and
will attempt to obtain your personal to their advantage. containing information specific to the
three in particular
and sensitive information: Phishing, company or individual.
mean? Interestingly there are also three
Vishing and Smishing.
different phishing types: Spear,

20 ,QWHUQHW6HFXULW\
Phishing, Vishing and Smishing

Vishing
Vishing is voice phishing, using a meantime, they’re secretly running a
Smishing
Smishing is an SMS form of phishing. One way or another, each of these
telephone call to commit some keylogger in the background. In these cases you receive a text from scams are designed to bait the
form of social engineering attack. a seemingly legitimate source, usually victim, hence the phishing element,
In some circumstances they can then
The victim will, as we’ve explained your bank or credit card company a homophone of the word fishing.
claim to have fixed the so called issue
previously, receive a call from a but also in the form of a competition The best defence is to ignore, delete
but ask you to log into your bank
legitimate sounding call centre with winner or something free, asking or hang up on anything that’s even
to double-check all is well. With a
the person on the line claiming to be you to confirm your details. There’s remotely suspicious. Microsoft
keylogger in place, they can then see
from a well-known computer related often a link for you to follow, which doesn’t know if you have a virus, and
your username and password on
company. Usually the caller will be leads to a false website that logs your nor will it telephone you. Your bank
their screen; after which they log in
led to believe that there’s a virus on keystrokes and records your data. won’t email you for your account
and steal from your account.
their computer or that some form details and don’t be tempted to
Some smishing attacks will ask you
of security vulnerability has been Alternatively an automated call can fill in any Facebook games with
to send a return SMS to approve
detected. The victim will then be ask you to enter your credit card personal information. In short, be
an action, such as a delivery of
guided to a website where the caller number into the phone’s keypad, savvy about baiting techniques and
some goods. The return message
can make a remote connection to as it’s been reported as being used remain vigilant.
is designed to cost significantly
their computer. Once on the victim’s elsewhere. Of course it hasn’t but as
more than the usual SMS rate,
computer, the caller will then run soon as you enter the details they’re
with the money going straight to
a script that will display reams of recorded and your card can be used
the scammers.
data on the screen designed to by the scammers.
confuse and baffle the victim. In the

,QWHUQHW6HFXULW\ 21
Modern Day Security

Whilst on the subject of homophones,


another recently added word to the
long list of security threats is Pharming.
Pharming falls within the online fraud
layer of security and although in reality Pharming has become quite
it’s been around for as long as web sophisticated in recent years,
pages have, the methods of deception and with the rise of connected
are continually evolving. devices that offer Internet

S
o what exactly is pharming? In short, this
is the criminal act of producing a fake
website and redirecting the victims to it.
The website could be anything from a reasonably
popular online shopping store, to one of the well- Harvesting
known high street banks. The victim, unaware
that the web site is fake, as the front end apes
Time
the real thing, even down to the small print at the
bottom of the page, will login with their details.
After the user has logged in several options are
available to the ‘pharmer’. They can collect the
username and login details and simply leave the access it’s quickly become
victim with a blank web page; this is usually a one of the more popular
method used by an amateur pharmer or those
who want a quick username and password grab
criminal cyber activities.
before disappearing into the darkened corners
of the Internet. Otherwise, they can redirect the
victim to the real site where they need to enter their
login details again. The latter is a more convincing
method of pharming, as the victim rarely questions
why the bank has asked for their login credentials
twice; they often put this down to a mistaken entry
on their part.
Either way, the pharmer now has a considerable
list of valid usernames and passwords for the bank
or online shop they faked, which they can then
sell via the Dark Web or use themselves. How do
they, the pharmers, get away with being able to do
this? Interestingly, there are several ways in which
someone can fake a legitimate website.

22 ,QWHUQHW6HFXULW\
Pharming

http:// DNS http:// Fake Naming http:// Hosts

DNS cache poisoning is the primary method Fake naming relies on the attacker seconding their One method that’s more difficult to pull off,
of creating a fake website with the view pharming attempts with a phishing email. The email though if successful is remarkably effective,
to setup a pharming scam. This involves can look legitimate and contain relevant information is to alter the victim’s Hosts file on their
the criminal attacking the Internet naming about the person in general. There’s often a link at the computer. The Hosts file is located in C:\
system, which is responsible for creating bottom that although is spelt correctly in the email, Windows\System32\drivers\etc\hosts on
readable names for websites, such as www. is in actual fact a hyperlink to a pharming website Windows computers, /private/etc/hosts on
ebay.com and so on, rather than a string that’s similar to the real thing but spelt somewhat macOS, and /etc/hosts on Linux computers.
of numbers in the form of the IP address, differently. For example, the email could say ‘your Its function is to map hostnames to IP
such as www.184.232.124.65 or similar. overdraft is nearing its limit, please login to www. addresses, translating the readable websites
The Internet naming system relies on DNS bank.com to transfer funds…’ The www.bank.com to IP addresses on a local network. However,
servers to provide the conversion between part is correct, but the hyperlink and the resulting it can also be used to circumvent the Internet
IP addresses and readable web site names. website may be taking you to www.bnak.com, which lookup of a legitimate web site, redirecting
The attacker can mount an attack on the DNS although subtly misspelt is often difficult to miss you to a fake one. It’s not often that the Hosts
cache, thus changing the way in which traffic when you’re concentrating on the website content. file can be altered, as it’s a system file that
moves on the Internet. Effectively, instead of requires elevated permission in order to edit,
the user’s request to go to www.ebay.com, but a cleverly written virus can do the trick.
they’re taken to the attacker’s fake website
instead. Thankfully, these kind of attacks
generally don’t last for long, as the DNS cache
is monitored frequently by many different
engineers and companies.

,QWHUQHW6HFXULW\ 23
Modern Day Security

Windows 10
Microsoft is often accused of developing insecure and ‘broken’ operating
systems. However, what the Redmond company delivers is an easy to use
system that’s as secure as it can be without compromising its use. It’s a
difficult balance to maintain and security can suffer in the long run.

Security leaks, holes and flaws in


development code appear all the
time, for every operating system.
Windows 10 has the bad luck of

Windows 10
Security
Improvements

being at the top of the security flaw


news pile. However, here are ten
reasons why it’s actually a secure
OS to use.

24 ,QWHUQHW6HFXULW\
Windows 10 Security

Virtualisation-based Credential Guard


Security Windows 10 Credential Guard protects the user details and
Windows authentication keys within the VBS layer. This
VBS is an improvement to the core Windows security, it isolates the authentication service against network and local
stands for Virtualisation-based Security and uses a mixture attacks, stopping keyloggers and other worms from gaining
of hardware and software enforced developments to create your login details.
an isolated, hypervisor restricted subsystem for securing the
OS core data. Nothing unsigned by Microsoft is allowed to be
injected into the kernel or executed.
Device Guard
Windows 10 has introduced Device Guard, a highly secure
Secure Booting tool that determines which programs and scripts should be
allowed to run on the computer. It utilises the VBS layer to
Secure Booting utilises the new UEFI (Unified Extensible protect the core system files and with a list of what’s allowed
Firmware Interface), the replacement for the older and more and not allowed to run it can prevent most malicious content
vulnerable BIOS, along with Windows Trusted Boot code from being executed on your system.
integrity and ELAM (Early Launch Anti-Malware) capabilities,
to protect the computer as soon as you power it up.
Rolling Upgrade
Windows Hello Windows 10’s unique method of upgrades now ensures
that the latest versions to software, tools and applications
Windows Hello may seem like a glamorous feature rather are continually upgraded on the computer. The new rolling
than a security feature but it’s really quite an impressive upgrade process has been widely criticised by many, as there’s
layer of protection. Hello supports passwordless biometric no opt-out for upgrades available. On the flip side, you’re
authentication methods, such as iris, facial and fingerprint, always up to date.
together with a PIN code to help protect access to
Windows 10.
Windows Defender
Microsoft Passport Security Centre
Windows 10 uses the Microsoft Passport single sign on Windows Defender Security Centre is significantly
solution that supports the open FIDO Alliance security improved over previous versions of the software. The new
authentication standard (www.fidoalliance.org) and Fall Creators Edition version offers virus, ransomware and
utilises cryptographic keys to secure access to network threat protection, device health, firewall protection, app
and local resources. and browser control and family options all under the
one roof.
Trusted Platform
Module Protection Features
Among the aforementioned security elements,
If your computer has a TPM chip (Trusted Windows 10 offers User Account Control,
Platform Module), Windows 10 can utilise Kerberos Armouring, Smartscreen, TPM
the hardware cryptographic key therein Key Attestation, Advanced Auditing
to link Passport and Windows Hello to Settings, Mandatory Integrity Controls,
authenticate the user and operating Virtual Smartcards, EMET enabled
system with local, network and protection and many more
Internet resources. impressive protection features.

,QWHUQHW6HFXULW\ 25
Modern Day Security

Whilst it’s all fine and well learning


about the different security risks
you face every time you boot up
your computer, often questions
can go unanswered. We’ve
put together ten popular
digital security questions
that we hope will help fill in
any blanks.

Understanding Security
Trying to understand the digital security world can be hard
work. There’s so much to take in, that it’s easy to become lost
in the quagmire of acronyms and homophones. Hopefully
we can help you out with these ten FAQs.

26 ,QWHUQHW6HFXULW\
Digital Security FAQ

Most of the security changes you


Do I need Does having extra can adopt don’t cost anything,
an antivirus Without a doubt, yes. Windows just you being more aware and
security cost? knowledgeable about what’s
program? 10 uses the built-in Windows
going on. In terms of an antivirus
Defender program to help protect
you online. It’s more than ample product, most of the better total
for most users but often better security suites will cost you an
security is required. annual subscription.

How often do I Windows 10 keeps a continual


Viruses and need to update update cycle in operation,
No, sorry. Even legitimate websites
malware are can be infected with a virus or everything? delivering the latest updates in the
only on dodgy background. However, it’s always
some other form of malware.
best to do a daily check for any
sites, right? Remember too, a computer virus
updates for both Windows and any
can enter your system in other
programs you regularly use.
ways, not just online.

That’s a difficult question to answer.


How do I know if More often than not, if it’s too good
Online banking is remarkably something being
Is online to be true then it’s likely to be a
safe and utilises the latest and offered is a scam? scam of some form or another.
banking safe? continually evolving security There are times though when
encryption methodologies. There’s genuine offers are made. It’s best
military grade security at every to research as much as possible
level of the online process, and it’s before committing to anything.
highly unlikely to be hacked.

If you think you’ve been scammed,


I think I’ve just you need to quickly make some
Are hackers Whilst it’s true that most hackers been scammed, changes: change your Windows
after me? aren’t interested in the average what do I do? password, inform your bank that your
user, they’re after bigger targets,
details may be compromised, email
there are instances where you
friends and relatives that you’ve been
could be targeted for one reason
scammed, file a police report, scan
or another. Generally speaking, the
your computer for threats and check
average user will only be targeted
your credit card reports.
en masse in a country-wide
phishing or similar attack.

I’ve opened a scam There’s a good chance you may


email attachment, have a virus on your computer.
Yes, there’s nothing stopping you. what do I do now? Close all open programs, open
Can I keep a A school of thought is that while Windows Defender and do a Full
phishing phone you keep them on the line, turning Scan of the system. If anything
it into a mock-prank call, you’re
scammer on is detected Defender will tell you
saving someone else from being
the line? duped. However, it’s best to simply
what to do. Then, consider a
third-party AV suite and scan the
tell them you know they’re trying computer again.
to scam you and hang up.

,QWHUQHW6HFXULW\ 27
Protecting Yourself

28 ,QWHUQHW6HFXULW\
INDEX

Being able to recognise a scam or virus is one thing but you need to
know how to protect yourself against possible attacks. We look at the
top Internet security packages, from Bitdefender, Kaspersky and McAfee,
as well as what encryption is and how to make it work for you.
Using a Virtual Private Network is an excellent way to improve your
Windows security, we’ll look at how a VPN works, what the best VPNs are
and how to install and use one on your PC.

30 Be Smart 50 What are Wireless Security Standards?


32 Top Ten Antivirus and 52 How to Secure Your Wireless
Security Packages Network
34 Bitdefender Total Security 54 What is Encryption?
2018 Review
56 Encrypting Your Windows 10 Laptop
36 Kaspersky Total Security
58 Top Ten Encryption Tools for
2018 Review
Windows 10
38 McAfee Total Protection Review
60 What is a VPN?
40 Setting Up Windows 10 Security
62 How Can a VPN Improve
42 Why Updating is Important Windows Security?
44 What to Keep Updated and How 64 Top Ten VPNs
46 How to Secure Your Web Browser 66 Using a VPN for Added Security
48 How to Secure Your Home Network and Privacy

,QWHUQHW6HFXULW\ 29
Protecting Yourself

Be Smart
We’ve looked at some of the many varied ways in which you can be compromised by a digital
attacker and some of the ways in which you can help protect yourself. However, it’s often more
beneficial to be able to recognise the signs of a digital security issue.

Weakest Links
In terms of digital security, you’re only as strong as the weakest link in your security chain. You can tick all the security boxes but if you don’t know what to
look for in the first place you’re still vulnerable.

A good sign of a breach in your digital BANK ACTIVITY If you check your bank activity regularly and you’ve
PASSWORD CHANGE
security is the sudden changing of a noticed some odd, small transactions that you fail to
password. It can be for a random site, webmail or just something small to begin identify, then your account could already be hacked. Sometimes hackers will
with. Sometimes a hacker with a keylogger in place will test the water before take small amounts or purchase inexpensive items to check the validity of an
accessing your bank, in which case you need to virus scan your PC immediately. account before emptying the vault as it were. Contact your bank immediately.

PERSONAL SPAM We all receive spam emails of some form or another. SLOW PC One of the many signs of your computer being infected by a
However, if you suddenly start getting emails of a virus is the sudden slowing down of the overall system. Most
more personal nature, then you need to look at where that information could be operating systems, Windows in particular, slow down over time but if you power
coming from. The details could be your full name, date of birth, knowledge of any up your computer one day and it’s noticeably slower than usual we’d
children or even a recent accident you may have been involved with. recommend you run a virus scan.

30 ,QWHUQHW6HFXULW\
Be Smart

SLOW BROWSER In relation to the previous tip, a browser slow RANSOMWARE WARNING In the case of a ransomware attack,
down can also indicate that something is you don’t often get much warning
potentially going on. Browser hijacking can adversely affect the speed at which that something is about to happen. Generally speaking, a sudden and inexorable
pages load, as it’s sending information to a remote source. Naturally it’s not slowing down of your computer will be a key element, as the ransomware is
always a digital security issue but to make sure, check your system. frantically encrypting your files in the background.

POP-UPS Furthering the browser issue, if you suddenly notice a lot ROUTER LOGS It’s always recommended to check your router’s
more advertising, pop-ups or similar, then it’s usually a good logs frequently. Although hackers are generally
sign that you’re infected with some form of adware or Trojan tracker. anonymous groups or individuals on the other side of the world, often a
hacker could simply be a neighbour leeching your broadband connection.
Check the logs for any unidentifiable computers attaching to the router.

INFECTED CONTENT Viruses want to be spread from one


computer to another and they can infect
your email or social media platforms. If you suddenly have your friends
asking you why you’re posting adverts for pharmaceutical enhancements,
BANK STATEMENTS Keeping an eye on your credit card statements
then there’s a good chance you’re infected with something.
will reveal any compromising security leaks.
Just as with bank statements, small transactions are usually the first indicator, then
once the hacker knows the card is valid they can then blitz it until you’ve run up a
huge debt. Always check your statements and mark any suspicious transactions.

,QWHUQHW6HFXULW\ 31
Protecting Yourself

Top Ten Antivirus and


Security Packages
While the built-in Windows Defender is a great antivirus and security tool, it’s nowhere near as
capable as one of the many third-party security suites. The likes of Bitdefender, McAfee and
Symantec have years of security specialism behind their products.

Better Protection
A third-party security suite offers much than virus scanning. With one of these, you’re covered against most, if not all, digital threats. Here are ten security
suites worth considering if you’re serious about your digital protection.

BITDEFENDER Bitdefender Total Security 2019 is the latest security SYMANTEC Norton Security Premium is Symantec’s top choice for
suite from one of the world’s leading security the home user. With it, you can protect up to ten PCs,
specialists. This version offers unrivalled levels of protection and performance for Macs, smartphones, or tablets and it’ll keep you safe when shopping online,
Windows, macOS and Android platforms. There’s even an advanced ransomware general surfing, or when conducting transactions.
protection element to help protect your folders.

MCAFEE McAfee Total Protection offers a 100% guarantee of virus WEBROOT Out of the three possible solutions available from Webroot,
removal, or you get your money back. There are three main Webroot Internet Security Complete is the one to consider
versions available: Antivirus Plus, Total Protection and Livesafe, each has its own for home users. With it, you’re protected from virtually any threat, as well as
particular twist, but all offer excellent security features and benefits. offering 25GB of secure online cloud storage.

32 ,QWHUQHW6HFXULW\
Top Ten Antivirus and Security Packages

KASPERSKY Kaspersky’s Total Security 2019 is one of the best go-to ESET ESET Internet/Cyber Security is a comprehensive protection
products available on the market. It’s great value for package for everyday users. It offers online banking protection,
money and offers superb protection for your PC and other devices. You get alerts for any malicious attempts to control your webcam and a fine-tuned
parental controls, secure password storage, encryption and identity protection balance between security and privacy.
all under a single security suite.

AVAST Avast has offered free antivirus software for many years, but its F-SECURE F-Secure has been in the security and protection business
other products: Internet Security and Premier, are also well worth for a lot of years and as such, its products are often
looking into. With both versions, you’ll get online banking protection, identity considered one of the best available. F-Secure Total is the top choice for the
protection and email protection, all for a reasonable cost too. home user, as not only does it provide superb antivirus protection, it also offers
a Virtual Private Network (VPN) for added privacy when online.

TREND MICRO Trend Micro Maximum Security offers superlative


EMSISOFT Emsisoft Internet Security is an award-winning security protection for up to five different devices along with
suite that offers plenty of great features and elements. It’s extended protection for children, Internet passwords and privacy on social
quick, easy to use, cost effective and does an excellent job at protection you media sites. It’s great value for money and performs excellently too.
and your devices from modern security threats.

,QWHUQHW6HFXULW\ 33
Protecting Yourself

Bitdefender Total Security


Review
Bitdefender is regarded as one of the best antivirus and security companies in the world. Its products
have won numerous awards and have been proved time and time again to be efficient and effective
whilst offering cutting edge technology.

The Ultimate Protection


There’s a lot to offer from Bitdefender’s Total Security. It’s one of the leading security suites available and is cited as possibly the best total protection
package in the world. Let’s see what it has to offer.

Total Security is Bitdefender’s flagship product and offers comprehensive dashboard will inform you of your child’s online activity, visited sites and social
security packages for Windows, macOS and Android users, all under a single media behaviour.
web portal. Pricing does alter slightly, depending on what special deal may be
Ransomware is handled by an independent module that requires activation,
available, but expect to pay somewhere in the region of £69.99 for a single year
once enabled it’ll automatically protect files in your Documents folders, with the
license for up to five devices.
option to include other folders, too. Any attempt to edit one these protected files
What do you get for your money? Well, Bitdefender has upped the ante with results in a message appearing, allowing you to confirm the action. This makes
regards to its protection suite, not an easy task for a company with a long it increasingly difficult for ransomware to start encrypting and messing around
history of already providing the leading security suite on the market. Total with your valued data.
Security is quick, easy to install and understand, with the unboxing to
On top of all the superb features though, is the excellent scanning engine. The
installation and a complete system scan taking no more than half an hour.
Bitdefender scan is quick and doesn’t slow your computer down while being
Most of the problem with modern security suites is the heavy interface that active in the background or while conducting a full system scan.
comes with the package. A modern suite must include a wealth of elements to
In short, if you’re in the market for a complete and fully featured security suite,
make it even slightly competitive in an already saturated and quite aggressive
then Bitdefender Total Security is the one you should most definitely consider.
marketplace. This in turn creates an interface that’s often too cluttered and a little
overwhelming for the newcomer. Bitdefender though, has managed to package
together a clean and sleek setup, with the most prominent features available,
with just a click or a couple of clicks of the mouse.
Naturally you can dig much deeper into the settings, selecting pre-defined
profiles and modes, or tweaking the core to either lighten the security,
without compromising the overall defences, or tightening everything
up to an almost NSA-level of security clearance.
It’s packed full of interesting and useful features, some of which
you never thought you’d appreciate until you actually had
them to hand. For example, the vulnerability scanner will “Bitdefender Total
hunt down any missing Windows updates, issues with Wi-Fi Security is one of the best
security and even weak passwords. Integration with your AV and protection
browser is excellent, offering clearly defined green ticks next products available today”
to search results that are classed as safe to visit, including
integration with Facebook. You can also set up a secure vault
for files that you want to mark as ultra-private and keep away
from any prying eyes.
You’ll command everything from the Bitdefender Central Activity
Dashboard, which will display the current subscription, to the status
of your Bitdefender installed devices, alerts, reports and so on. It’s a
simple interface that keeps the stuff you want to see prominent, while
gently hiding the deeper information that only the more advanced user
may be interested in viewing. Of course, should anything untoward happen to
any of the Bitdefender installed devices, you’ll receive the appropriate warning.
Interestingly, should you activate the parental features on any of the devices, the

34 ,QWHUQHW6HFXULW\
Bitdefender Total Security Review

“One of its many splendid features is a “The scanning engine is quick and
vulnerability scanner that informs you efficient and doesn’t unnecessarily
of any weaknesses in your system.” slow your computer down.”

“Once installed it
automatically updates
and keeps you safe from
digital threats.”

,QWHUQHW6HFXULW\ 35
Protecting Yourself

Kaspersky Total Security


Review
Kaspersky was one of the first security companies to offer the end-user a cross platform AV
protection suite, some years ago now. Since then, the company has improved its products
staggeringly and as such is now one of the leading security suites available.

Next Generation Protection


There are a lot of features to like about Kaspersky Total Security, all of which help you not only be protected from whatever’s out there, but also better
manage your system.
Kaspersky’s Total Security is the mega-product of the company’s AV and In terms of speed of operation and the performance hit on the
protection utilities for home users. It’s reasonably priced at around £39.99 for system, Kaspersky Total Security is about on par with that of
one device plus a year’s subscription, rising to a maximum of £109 for five devices Bitdefender. Admittedly, It’s not as fast at completing a full system scan,
and a two-year subscription. Obviously prices can change, so check the but it’s only a minute or so out. The performance hit on the system is
Kaspersky website for the latest guide. negligible; in fact, you’ll be hard-pressed to notice any negative impact once
the software is installed and continually scanning.
Much like the Bitdefender entry, Kaspersky has gone to great lengths to provide
an easy to use and simple to understand interface. While, again like One last component worth mentioning is the Parental Control feature. With this,
Bitdefender, you’re able to delve deeper into the inner workings, the average user Kaspersky offers a method of keeping children safe while they use their devices.
isn’t instantly bewildered by pages upon pages of technical jargon, icons and You can create usage scheduling, GPS safe zones and receive notifications should
sub-menus. It’s handy too that everything starts from the Kaspersky online anything suspicious attempt to access your child’s device when they’re using it.
portal, where you’ll download your purchased software, alongside installers for Beyond that, there are also filters to stop children accessing adult sites, or sites
other modules that eventually all fall under the same control centre. that can feature disturbing content.
The front-end categories that are available via the control centre are: Kaspersky Total Security is an impressive product and one that the
Scan, Database Update, Safe Money, Password Manager, Privacy Protection, home user can certainly feel confident about. It’s quick, easy to use, regularly
Backup and Restore, Protection for all devices and Parental Control. Most are updated and ticks all the right boxes from the point of view of a user, parent
fairly self-explanatory, however, components such as Safe Money and Privacy and someone who wants to make sure they’re as secure as possible on the
Protection deserve a little more detail. modern Internet.
Safe Money utilises Kaspersky’s unique protection engine, whereby your online
transactions are safely behind the product’s security web. This feature takes care
of protecting your shopping, as well as online banking, so it’s an impressive
weapon in the already ample Kaspersky arsenal.
Privacy covers a range of different features. The core component
protects you while surfing, guarding your online identity and
information, while also actively blocking malicious websites
and preventing any form of tracking or monitoring. It also
includes an element that blocks any attempts to access your
“Kaspersky Total
computer’s webcam, which is certainly a handy feature and
Security is one of the
it’ll block any attempts to access your stored data while you
leading AV and security
browse the Internet.
products for the home
Needless to say, the features available are certainly impressive. user”
Beyond the few we’ve mentioned above, there’s also controls
to improve browser security, protection for any cloud access,
a vulnerability scanner and a trusted application mode that
will only allow white-listed programs to be executed. You can
create a Kaspersky Rescue Disk, which you’re able to boot from
should something ever go wrong, allowing you to scan and clean your
computer without it needing to access Windows. The list goes on and
covers pretty much everything you would want from an all-encompassing
security suite.

36 ,QWHUQHW6HFXULW\
Kaspersky Total Security Review

“Components such as Privacy “There’s a lot to like about Kaspersky’s


Protection are welcomed and flagship product. It’s quick, easy to use
remarkably useful to the end user.” and ticks all the right boxes.”

“The control centre


interface is uncluttered
and easy to follow
with plenty of options
available.”

,QWHUQHW6HFXULW\ 37
Protecting Yourself

McAfee Total Protection


Review
The name McAfee has been synonymous with antivirus and security since the late ‘80s and is
considered as the granddaddy of the computer security world. Its latest complete protection
package, Total Protection, has a lot to offer the end user, as you’ll soon see.

McAfee For Consumers


McAfee is now a part of Intel Security and as such it’s backed by the latest generation of hardware level security as well as it’s award winning software
scanning engine.

The name McAfee has seen some interesting press over the last decade, not just The Password Management feature is an interesting addition to the McAfee
from the security software itself, but also with regards to the company founder, suite of tools. In reality, it’s Intel’s True Key Security component that, although
John McAfee. The founder’s colourful lifestyle aside, McAfee Total Protection is not the top of the league password management program, does boast a multi-
a singularly impressive suite of tools. The cost is a little higher than the previous factor authentication process. In addition, you can set individual True Key
entries, priced at £89.99 for a year’s subscription (though, regional and special passwords for all members of family - up to five users.
offers will reduce that amount considerably). However, one highlighted feature
Among the multitude of features, you’ll find File Lock an interesting addition.
is the Virus Protection Pledge, whereby your money is refunded should McAfee
This is an impressive encryption mechanism that’ll lock your files behind an
not be able to remove a virus that’s already on your computer.
impenetrable, military grade encryption wall. It’s not activated by default,
It’s worth mentioning that the annual subscription includes installation on which is understandable as encryption does still carry with it a higher level
an unlimited number of devices; which is certainly worth considering if you’re of user knowledge and it’s not something the average user will immediately
one of the many modern households that owns countless Internet-connected consider adopting when setting up their computer security.
devices, computers and everything in-between. It’s without doubt, an excellent
As for performance, we’ve already mentioned that McAfee is somewhat slower
choice for the home user.
than that of Bitdefender or Kaspersky, but as with the other entries, you won’t
Both installation and the initial full system scan were slower than that of notice any perceivable slowdown in the computer’s operation with it installed.
Bitdefender and Kaspersky, but only by about five minutes. If you’re constantly McAfee Total Protection does an excellent job of keeping your files and personal
in a rush you may want to consider the other suites, however, most users will information safe when online and with its added features it’s certainly worth
be satisfied with the result from McAfee – at any rate, it gives you time to make looking into at greater depth.
a cup of tea while you’re waiting for the scan to finish.
As with the other products we’ve looked at, the interface is simple to
understand and navigate, with the core and most used functions within
easy reach of the mouse pointer, while the more advanced options are
neatly tucked away for those who are a little more knowledgeable
about such things. In short, it works well and keeps the wealth of
available options at bay until the user requests them. Needless
to say, the settings are extensive, allowing the advanced user a
higher degree of control over the way the suite of tools works
within the system on which it’s installed. “McAfee Total
McAfee’s three-tiered approach to system protection is Protection, now a
worthy of mentioning. First, the scanning technology does part of Intel Security,
a thorough, fine-toothed comb inspection of the files on is certainly worth
the system. Heuristic analysis then takes over, monitoring: considering for the
behaviour of files, functions and even code inspection, to home user.”
check for possible unknown viruses based on the way they
work. Lastly, anything that’s even remotely suspicious is
automatically uploaded to the McAfee Global Threat Intelligence
Lab for analysis. Should the code prove to be a new form of virus,
the team behind the impressive sounding lab will create a fix and
push it out to the other two hundred million plus McAfee users. It’s not
nice getting a computer virus, but at least with McAfee you can be assured
that your misfortune is helping others.

38 ,QWHUQHW6HFXULW\
McAfee Total Protection Review

“There are ample features to explore


“McAfee is simple to use, update and and utilise to improve your security
monitor. Plus the added bonus of when online.”
unlimited device installation is an
alluring factor.”

“The scanning isn’t as quick as


the other products we’ve looked
at but it’s certainly as effective.”

,QWHUQHW6HFXULW\ 39
Protecting Yourself

Setting Up Windows 10
Security
Before we dig deeper into the many levels of Windows 10 security features, it’s worth taking a
moment to check that the initial security features are in indeed up and running, and doing what
they’re supposed to.

Are You Secure?


Remarkably, despite having an antivirus client installed, some users aren’t even aware of the default Windows 10 security features. Here’s a quick ten step
process to check everything is working as it should.

Start by clicking on the Windows Start Button or pressing the STEP 3 Should any of the options display No, then you’ll need to check
STEP 1
Windows key on your keyboard. Enter security into the search bar the setting relating to that particular feature. For example, if your
and click the first option that appears in the results, Security and Maintenance. User Account Control (UAC) is set to Off, click the Change Settings link under the
UAC option. The other features can be found via a search from the Windows
Start Button.

STEP 2 This will open the Security and Maintenance section of the STEP 4 UAC will warn you of any attempt to access a system critical file. If
Control Panel. There are two main sections within this page, click any malware wants to alter a file, then you’re asked if you want to
on the Security section to expand it. Ideally all the options within the Security proceed; obviously you don’t, so you can say no and investigate the issue. There
section should be displaying On, with the exception of Internet Security Settings are various settings to choose from but the second step down from the top is
which will display OK. the recommended.

40 ,QWHUQHW6HFXULW\
Setting Up Windows 10 Security

STEP 5 Close down the Security and Maintenance window, then click the STEP 8 If you click the Virus & Threat Protection Settings option, you
Windows Start Button and search for Defender. Click the resulting can further opt to improve the system protection. Make sure
Windows Defender Security Centre option. that all the sub-options are set to On and scroll down to define the program’s
default Notifications.

STEP 6 If you’re not using a third-party security and AV suite, then you STEP 9 Returning to the main Virus & Threat Protection page, you can
need to make sure that Windows Defender is activated and click the shield icon from the strip to the left of the screen; then
working. There are numerous options available in the new-look Creators Edition click on the Advanced Scan link, located under the Quick Scan button. Within are
Windows update of Defender. Each can be selected with a mouse click and options to run a Full System scan, a Custom scan (of a network location, for
viewed separately. example) or an Offline scan.

STEP 10 Lastly, click on the Firewall & Network Protection from the icon
STEP 7 Click the Virus & Threat Protection option. This will open a new strip to the left. Again, if you’re not using a dedicated, third-party
window allowing you to perform a Quick or Full Scan of the security suite, make sure that the Private and Public Firewalls are set to on, thus
system that details the number of threats found and the number of files scanned. protecting your system from unwanted intrusion.

,QWHUQHW6HFXULW\ 41
Protecting Yourself

Why Updating is Important


Continual updates, rebooting after an update has been installed, then the inevitable second reboot
straight after the first to apply the update: it’s little wonder people stray from the regular update
checks. Whilst it can be a pain though, keeping things up to date is a top priority.

Update, reboot, update, reboot


Updates may well be the bane of the modern computer user but they are there for a reason. It’s not the 8-bit era anymore, we need those updates to help
protect our security. Here are 10 reasons why they’re important.

PATCH VULNERABILITIES Windows updates patch recognised BROWSER UPDATES Windows 10 comes with many different
security holes in the core system. Many programs to make it a more appealing
of the viruses around today exploit a vulnerability in the Windows code that environment. They include Internet Explorer and Edge browsers. As a part of
hasn’t been fixed yet. So when an update comes along, that potential flaw will be Microsoft, these will need to be in tip-top working order to help prevent any
ironed out. modern Internet-borne viruses from entering the system. Daily update checks
will keep things in shape.

EXTRA SECURITY In addition to potential security glitches in the


code, often an update can contain an extra level of
security that’s been programmed in by the developers. For example, the code DEFENDER UPDATES Windows Defender and its other security
that handles remote desktop requests has had a security patch but another code elements will require at least one update a
that handles the authentication is hardened as a result. day to keep up with the latest virus definitions. This is a much needed aspect of
updating, as even if you only go online once every so often, being protected from
locally spread malware (USB drives etc.) is equally important.

42 ,QWHUQHW6HFXULW\
Why Updating is Important

FIREWALL UPDATES To expand the last reason, the Windows GENUINE SOFTWARE Non-genuine copies of Windows have been
Firewall is one of the first layers of security on a thorn in Microsoft’s side since illegal file
your system. With it, access to your computer from another source is monitored sharing on the Internet gained popularity. These days the act of downloading
and even blocked, stopping potential threats before they even hit the virus something illegal is rampant. Windows 10 updates ensure that you’re using a
defence layer. Updates make sure that the Firewall is up to scratch for the job. genuine copy of the OS, which will ultimately secure you PC against threats
from pirated copies.

OFFICE PATCHING It’s not just the Windows core files that require
regular updates, if you use Microsoft Office that FUTURE UPDATING Microsoft has big plans for the future of
can be a part of the overall Windows 10 update schedule. There are Windows 10, it’s often mentioned that this will
vulnerabilities in Office too, which when exploited can allow malicious code in be the last full version of the OS as they will be running Windows 10 as a service
the system. Tick the Give me updates for other Microsoft products box in as opposed to different versions over time. This means it will be a constant
Windows Update’s Advanced Options. update cycle with adding or removing of features. Updates ensure you’re running
the latest versions.

STREAMLINING CODE Updates not only patch any vulnerability,


they can also free up system resources by
improving the code and streamlining the available resources. In short, if your
SIGNED DRIVERS As well as Office, Microsoft provides base-level computer is performing better, then it can easily handle background virus and
drivers for most of the hardware available today. threat scans without affecting what you’re doing.
These drivers are signed and verified as safe, so any new piece of hardware
installed will work and will be safe according to the driver protection engine.

,QWHUQHW6HFXULW\ 43
Protecting Yourself

What to Keep Updated


and How
Discussing updates is one thing but how do you go about making sure that you have the latest
updates and that all the necessary components are being updated correctly? Thanks to the
improved update process of Windows 10, this is surprisingly easy.

Keeping Up To Date
Whilst it’s easy to update Windows 10, there are elements that can be missed. We’ve already mentioned that it’s not only Windows that needs updating but
also software and drivers.

The first port of call is undoubtedly Windows Update. Click on the STEP 3 If you click on the Advanced Options link under the Update
STEP 1
Windows Start button followed by Settings, the cog icon just Settings section, you can then tick a box that enables Windows
above the power icon on the strip to the side. This will open the Windows to automatically check for updates for other Microsoft products, such as Office
Settings interface, locate the last entry, Update & Security and click it. and so on. It’s recommended to make sure the box is ticked, for better security
and protection.

STEP 2 By default Windows Update will automatically check for, STEP 4 Within the Advanced Options page click the link for Choose how
download and install updates for the core Windows 10 files. You updates are delivered. This page details the way Windows
can check for any on the spot by clicking the Check for updates button; and you updates can be pushed to other computers on your network, or even the
can see what’s already been updated by clicking the Update history link under Internet. Whilst it’s a grand idea, there are concerns over privacy from some
the update button. factors of the community. It’s your choice but we prefer this option is Off.

44 ,QWHUQHW6HFXULW\
What to Keep Updated and How

STEP 5 Hardware drivers are usually automatically updated by Windows STEP 8 Third-party programs and applications also require regular
Update but whilst signed by Microsoft the drivers themselves update checks. Again, this is usually done automatically; when
aren’t always the latest versions. Therein lies a problem: even though signed, the you launch the program in question it often checks for the latest version. If
MS drivers won’t utilise the hardware as well as the driver developed by the not, look for links such as Check for Updates or similar, usually in the Help,
hardware manufacturer. About or even under the File menus of your favourite app.

STEP 9 If you’ve attached some hardware and Windows 10 hasn’t been


able to load a driver for it, and there isn’t any documentation
In such cases it’s often best to use the hardware manufacturer’s detailing the driver (this often happens with hardware purchased from eBay and
STEP 6 the like), then you’ll need to hunt one down. Start by locating the device’s
driver, as this is more up to date and features security patches as
well as performance updates. For example, if you own an Nvidia graphics product name and number and enter it into a search engine.
card right-click the Nvidia icon in the taskbar and select Open Nvidia
GeForce Experience.

STEP 10 You can often force Windows 10 to locate a driver by right-


clicking the Windows Start button and choosing Device
Manager from the menu. In the Device Manager window, select the hardware you
want updating, right-click it and select Update Driver.
STEP 7 The Nvidia GeForce Experience allows you to improve in-game
graphics and check for the latest drivers. Usually this is done
automatically, and you are notified of any available drivers. However, If you want
to check manually, click on the Drivers tab followed by Check for Updates.

,QWHUQHW6HFXULW\ 45
Protecting Yourself

How to Secure Your


Web Browser
The web browser is possibly the weakest link in the entire security chain. It’s the software product
that’s on the front line, the one that will inevitably bear the brunt of any Internet attacks and as such,
attackers focus a lot of effort on making the browser a portal into your system.

Safer Surfing
Securing your web browser isn’t too difficult. There are plenty of options available, including some third-party add-ons you can use to improve security. For
this tutorial, we’re using Chrome.

Start by opening Chrome and clicking on the three vertical dots in STEP 3 With the Advanced Sync Settings box open, select the option for
STEP 1
the top right of the browser window. This is the link to the Encrypt all synced data with your own sync passphrase. Enter a
available options; from the list choose Settings. secure passphrase you can remember in the boxes provided and this will
enhance the security of all data synced between Chrome and the Internet.

STEP 2 It’s generally recommended that you sign into Chrome using a STEP 4 Look to the bottom of the Settings page and click the link for
Google account, as this can greatly improve the overall security of Show Advanced Settings. The first new section to appear under
the browser. For example, when you sign in, under the Sign In section in Settings, the Advanced settings is Privacy. Start by clicking on the Content Settings button.
click on the Advanced Sync Settings button, the first option available.

46 ,QWHUQHW6HFXULW\
How to Secure Your Web Browser

STEP 5 Content Settings allows a greater degree of control over Cookies, STEP 8 Under the Downloads section, it’s an idea to tick the box Ask
JavaScript, Flash, Pop-ups, your computer’s microphone and where to save each file before downloading. Again this can be a
even the webcam. It’s an extensive list so we can’t go into all the options within bit of a pain for the user; however it stops malicious background downloads
this limited space. For maximum security, disable JavaScript and Flash and from infecting your system, giving you more control and the ability to stop
make sure the mic and webcam are protected too. the process.

STEP 9 To the left of the Chrome Settings page you can see links for
Extensions, Settings and About; click the Extensions link. With the
Extensions page open, scroll down to the bottom and click the Get More
Extensions link.

STEP 6 Click the Done button when you’re finished with Content
Settings, to return you to the Chrome Settings page. Within
Privacy still, ensure the last option, Send a “Do Not Track” request, is ticked. This
will stop any tracking elements from monitoring your browsing activities.

STEP 10 With the Chrome Web Store launched, via the Extensions link,
search for Adblock Plus. Within the results, click on the Add to
Chrome button on first option for Adblock Plus. This will install an advertising
blocker within Chrome, securing you from any threats from Internet advertising.
Do the same for Blur (an anti-tracking add-on) and HTTPS Everywhere.

STEP 7 Just under the previous step’s tick box, it’s also recommended to
untick the two Passwords and Forms boxes that offer to enable
Autofill and Save your Passwords. Whilst it’s a pain to constantly enter
passwords, this will stop any hijack Chrome attacks from gaining your usernames
and passwords.

,QWHUQHW6HFXULW\ 47
Protecting Yourself

How to Secure Your


Home Network
We’ve mentioned previously that an attack doesn’t always come from the other side of the globe
but can indeed be a little too close to home at times. Home network hacking is possible with the
simplest of tools available on the Internet, often even just tapping into a cable.

Network Protection
Without being too paranoid, it’s remarkably easy to get into a neighbour’s home network. If you live in a block of flats or you use powerline adapters, you may
need to consider these ten steps for better network protection.

The most common entry point to gain access DISABLE DHCP It can be a pain but try disabling DHCP on your router
ROUTER PASSWORD
to your network is via the router. The router and opting for static IP addresses. Every device that
from your ISP may well be offering the latest forms of encryption but it doesn’t connects to a DHCP router will receive an IP address. By eliminating that you get to
take a genius to trawl the less reputable sections of the Internet to obtain a list of specify the address range available. It’s not fool proof but it’s worth considering.
passwords. Therefore, change the default username and password to access it.

MAC ADDRESSING Most routers these days come with a form of


authentication called MAC (Media Access Code)
address filtering. Every networkable device, computers, tablets, games consoles,
POWER OFF According to Trustwave’s 2013 Global Security Report,
come with a unique MAC address. The filtering allows you to enter the MAC
many home network hacks are conducted when the
addresses of your devices, so only they can be used on your router. Consult your
household is away or asleep. This leaves the hacker with ample opportunity to
router documentation for more details.
steal bandwidth and view files you may have on a NAS drive. The short, simple
solution is to power off the router at night and if you go out for the day.

48 ,QWHUQHW6HFXULW\
How to Secure Your Home Network

POWERLINE ENCRYPTION Powerline adapters are an excellent SHARE LESS Sharing resources and files from one computer to
resource for connecting wired another is perfectly fine but consider sharing less if you
network devices, without trailing lengths of cable around the home. However, live in close proximity to others. Once a hacker has gained access to your
depending on the adapter, it is possible to use another adapter to gain access to network, getting to any shared folders you have will be a doddle. In extreme
yours. Newer homes are common where you’re able to pick up another network, cases don’t share anything but generally tighten password control.
so use the encryption button if the adapter has one.

REMOTE ACCESS Remote administration on both the router and


computer certainly help you out when you’re not at
ETHERNET CABLES Cabling a home with Ethernet isn’t a difficult
the keyboard. Perhaps you connect to your home network from work? Whatever
project, this offers faster connection speeds
the reasons, it does leave a potential gap in your home network security. Consider
than that of wireless; but if you’re living in shared accomodation or a flat block,
closing it completely or double-checking the authentication is top notch.
make sure that any unseen cable lengths can’t be access by a neighbour. It’s
easy enough to splice into an Ethernet cable and steal bandwidth.

NETWORK MAPPING Consider using a network mapping program,


such as Open-AudIT, to gain a better
understanding of what devices are attached to your network. Become familiar
with the addresses, manufacturer, model IDs and so on of every connected If you run a small office make sure that all your wall
object. That way, should anything new appear, you’ll know it’s not something VISIBLE PORTS
ports are located in areas where they are secure.
you allowed. Behind desks and generally away from where the public or any visitors may be
able sneakily plug a laptop in.

,QWHUQHW6HFXULW\ 49
Protecting Yourself

What are Wireless Security


Standards?
Wireless security has adhered to a number of standards since 1999, each improving over
the last due to the ability for a then-modern computer to hack the security levels behind
them. Tighter controls are needed as computers and the way they connect have become
increasingly more complex.

WEP, WPA, WPA2, IEEE…


Amid the confusing acronyms lies a logical progression of wireless encryption and security protocols. Whilst at first they seem bewildering, it’s quite
interesting to learn of their history.

The technology behind delivering a wireless network has evolved over the last These standards are always moving forward and like most elements of the
couple of decades and so has the ways and means in which to secure it all. It’s not technology industry they come with a bewildering cocktail of acronyms and
just simply down to choosing a password that no one is likely to guess, you need meanings. Encryption and all things security can be a confusing topic, even for
to make sure that data and connection to a wireless network is encrypted to the experts. Here are the current, and most important, terms you should be familiar
highest possible standard. with when talking about wireless security standards, wireless networking and the
hardware that lies between your wireless communications.

IEEE
The Institute of Electrical
and Electronics Engineers is the
organisation responsible for setting
the entire wireless security industry, and
data communications standards. It was
founded, surprisingly, back in 1963 and
is regarded as the largest association 802.1x
of technical professionals in You’ve no doubt come
the world. across the numbers 802.11 when
looking at wireless-based and networking
documentation but what on earth does it
mean? 802.1x is the IEEE standard for providing
authentication and controlling user traffic across
wireless and wired Ethernet-based networks. It’s an
ideal application for providing authentication for
wireless networks, as it requires very little processing
power from the authenticator: the actual wireless
access point. The better the standard, ending
with a, b, g, n, ac and so on, the higher
the speed of communications
between devices.

50 ,QWHUQHW6HFXULW\
What are Wireless Security Standards?

WPA2
WPA2 is the upgraded
standard security technology of WPA. It’s
WEP
This is the original wireless
designed to offer the user an impressive 256-
encryption security standard, Wired
bit encryption key, which is virtually uncrackable
Equivalent Privacy. Whilst the protocol
unless you’re a secret research lab with a few billion
worked for the late nineties wireless networks,
dollars to spare on quantum computing and dedicated
it was soon overshadowed by the ever increasing
hardware decrypting processors. There are also different
power of the average computer. WEP uses a 40-bit
sub-standards within WPA2, with AES (Advanced
standard encryption key, which is a key consisting of
Encryption Standard) and TKIP (Temporal Key Integrity
either 10 or 26 hexadecimal digits. That sounds like a
Protocol), both of which are encryption methods,
lot of possible keys to crack but a modern, powerful
along with the lesser used CCMP (Counter
computer would be able to break 40-bit
Mode with Cipher Block Chaining Message
encryption in around 30 seconds; compare
Authentication Code Protocol).
this to months for a computer in the
late ‘90s.

Access
Point
Talking about access points, this
is the hardware that acts as a receiver
or transmitter for the wireless signal and
network. It can physically be a number of
WPA different components, such as a router, switch
Replacing the WEP standard, or powerline adapter but essentially it’s the
WPA (Wi-Fi Protected Access) provided hardware that converts a wired Ethernet
a much needed improvement for the ever network to a 2.4GHz or 5GHz wireless
advancing march of security. It became the signal and vice versa; it’s also
standard in 2003 and offered the user either 64-bit or referred as the WAP, Wireless
the more adept 128-bit key levels of encryption. A 64-bit Access Point.
key attack would take several lifetimes when it was first
introduced; these days it’s estimated that it would take
several months, maybe less if the attacker used several
computers working as a cluster. Naturally 128-bit key
lengths are mind-numbingly more complex and even
by today’s standards, the theoretical process of a
brute force attack would take more time than
the universe has estimated left to exist.
Which is a very, very long time.

,QWHUQHW6HFXULW\ 51
Protecting Yourself

How to Secure Your


Wireless Network
It may seem a little far-fetched but it’s not unfeasible for a hacker to sit outside your house with a
tablet or laptop and gain access to your home network via the router’s Wi-Fi signal. Understandably
it’s quite rare but it’s worth considering beefing up your protection.

Wi-Fi, Lock and Key


A lot of the standard tips on protecting your Wi-Fi merge with those of protecting your wired network. It’s common sense mostly and keeping an eye on
what’s going on in your own network.

All routers come with a generic username and CHANGE SSID The Service Set Identifier (SSID) is the name of the
ADMIN PASSWORD
password. Depending on the model and router that’s broadcast so you’re able to locate and
manufacturer of the router, it’s surprisingly easy to get hold of the username and connect to it. Most routers will display the name and ISP, or the make and
password. For example, view www.routerpasswords.com and choose your router. model, making it easier for a hacker to find the information they need to gain
With that being the case, change the administrator username and its password. access. It’s recommend therefore to frequently change the SSID.

ISP PASSWORD ISP supplied routers tend to have their own set of HIDE SSID It’s also possible to select an option to hide your SSID from
usernames and passwords. Although these are more being broadcast. Whilst this doesn’t stop it being hacked, it
secure than that of the default set, they are still obtainable from the more dubious does make it a little more difficult for someone who’s casually looking around for
quarter of the Internet. A potential hacker will easily be able to get hold of sets of networks to access. You’ll need to consult your router documentation to find
passwords, so where possible change the ISP default username and password. how to hide your SSID for make and model.

52 ,QWHUQHW6HFXULW\
How to Secure Your Wireless Network

USE WPA2 Most modern routers will already come with the latest ROUTER RELOCATION Most users will have their router located
security standard enabled, WPA2; but there are instances of in the living room, near the master phone
some routers defaulting to a lesser security type for the sake of device socket. This means that not only will the router broadcast through the house,
compatibility. It’s essential that you ensure your router is using the latest and it’s also broadcasting over much of the street in front. Consider placing the
best form of encryption for your protection. router in a more central location of your house. This offers great coverage,
whilst limiting its signal reach beyond.

DISABLE WPS The WPS button on a router and a device will allow
ROUTER FIREWALL The firewall that comes with Windows 10 is easy pairing of the two without the need to enter the
good but the firewall from third-party AV encryption password. This is certainly convenient but someone who may gain
software is even better; and for extra protection, make sure that the router’s physical access to your router will be able to pair their own device. Look to
firewall is enabled and doesn’t have any potential leaks. turning off WPS in the router’s settings.

MAC FILTERING Filtering MAC addresses was discussed previously


but it’s worth repeating with regards to wireless
network security. By filtering those devices that are allowed to connect to your
DISABLE GUEST Some routers come equipped with the ability to router, and keeping an eye on what’s connecting, you’re able to control your
allow a guest network. This enables users to security to a far higher degree than usual.
connect to the router without requiring an encrypted password. Obviously this is
a potential huge gap in your home network security. If you have no need of a
guest network, then look to the documentation on how to disable it.

,QWHUQHW6HFXULW\ 53
Protecting Yourself

What is Encryption?
We’ve mentioned encryption and its impact on your privacy and security, but what exactly is it?
The definition of encryption is ‘the process of converting information or data into a code, to prevent
unauthorised access’.

Kryptos Communications
To better understand encryption it’s worth taking a moment to learn about its origins, how it’s been developed over the years and how it applies to our
modern communications.
The word encryption comes from the ancient Greek word Kryptos, which means be shared with everyone and is usually generated by software or provided by a
hidden or secret. Interestingly, the use of hiding messages from others can be traced designated authority. The private key is something that’s usually only known by the
back to early Egyptian scribes who inserted non-standard hieroglyphs within other individual user. Interestingly both types of keys can be applied, where one user has
communications in order to hide the message from casual viewers. According to a public key and another a private key, which can be combined to form a shared
historians the Spartans used strips of leather with messages engraved. When the encryption level.
strips were read they were meaningless but when wrapped around a staff of a
These keys are many characters in length, proving it nigh impossible for someone
certain diameter the characters would be decipherable.
to Brute Force hack them. The Brute Force method involves using a program on a
Of course, the modern forms of encryption are far more advanced but the overall computer to try every possible combination of a key until the correct one is found. In
core concept has remained the same: to be able to send a message to others the case of the 256-bit encryption, it would take 2256 different combinations to break
without anyone else being able to decipher it. However, modern encryption now the key. If you were able to force one trillion keys per second, it would still take you
requires more than simply sending coded messages. Not only is confidentiality somewhere in the region of 1057 years in order to crack 256-bit encryption. However,
required, encryption must perform a level of authentication, so the origin of the a powerful computer can probably manage around two billion calculations per
communication can be verified; integrity of the communications, where both second, so in theory it would take 9.250 years for your standard desktop to crack it.
the sender and those who receive the communication can be ensured that the Take in mind that the universe has theoretically only been in existence for 1.410 years.
message hasn’t been altered in between; and some form of nonrepudiation, where
Numbers as big as that are generally far too mind-boggling to comprehend. Suffice
the sender cannot deny having sent the communication in the first place.
to say that if you’re able to use 256-bit encryption for your communications or to
During the early digital age the only users of encryption were the government and protect your data, then you’re going to be protected for at least seven times the
military, and as such between them they created a set of algorithms and standards current age of the universe.
to protect the communication on the battlefield and from one government agency
to the next. These algorithms grew in complexity as technology advanced and it
wasn’t long before the military-based forms of encryption were being used in
commercial modes of communications. Within a few short years, bank transfers,
cash withdrawals and data sent to and from modems began utilising these
new protocols to protect sensitive information.
Today we’re regularly seeing and using devices that boast ‘military
grade 256-bit AES’ forms of encryption, a standard that is regarded
as nearly impossible to break without spending billions on
specialist hardware and software. In plain English, the modern
form of encryption takes data and passes it through an algorithm
together with a key. This creates a garbled file of characters that Encryption is the act of
can only be clearly read if the correct key is applied to decrypt
the data. Algorithms today are divided into two categories:
symmetric and asymmetric.
protecting your data from
Symmetric key ciphers use the same key to both encrypt prying eyes
and decrypt data. The most popular symmetric cipher is AES
(Advanced Encryption Standard), developed by the military and
government to protect communications and data. This is a fast form
of decryption that requires the sender to exchange the key used to
encrypt the data with the recipient before they’re able to read it.
Asymmetric key ciphers are also known as public-key cryptography and
utilise two mathematically linked keys, public and private. The public key can

54 ,QWHUQHW6HFXULW\
What is Encryption?

“Forms of encryption can be


traced as far back as ancient
Egypt, using non-standard
hieroglyphs.”

“Making data impossible to read


is just one step, you also need
the key to decrypt that data.”

“The universe is 14 billion years


old, but it would take seven
times that time to crack 256-bit
encryption.”

,QWHUQHW6HFXULW\ 55
Protecting Yourself

Encrypting Your
Windows 10 Laptop
Windows 10 Pro comes with Microsoft’s BitLocker program to encrypt the file system; however,
Windows 10 Home versions do not have this feature. Thankfully there are many encryption
programs available for download, we’re using DiskCryptor in this tutorial.

Windows 10, Under Lock and Key


We’re going to encrypt a 2GB USB flash in this example, purely for ease of use and to demonstrate how you can encrypt your entire laptop hard drive(s).

STEP 1 Encryption doesn’t affect the core data, other than making it STEP 3 It’s always best to ensure safe data before commencing with
impossible to read without the decryption key but it’s always anything like this. It’s also always worth doing (as we are) a test of
worth making sure you have a backup of all your data prior to any system related the software first, on a disk that you don’t mind messing up should you get the
changes. If you store your work or data in the Documents folder, then start by process wrong. Let’s start by navigating to the DiskCryptor homepage, at www.
opening it in Windows Explorer. diskcryptor.net/wiki/Main_Page.

STEP 2 Press Ctrl+A to highlight all the files, then press Ctrl+C to copy
them to the clipboard. Next, choose a suitable backup location
such as an external or network drive and when ready, press Ctrl+V to paste the
copied data into the new location. Then, should something go wrong, you have a
recent backup of your most used data.

STEP 4 Using the menu to the top left, click on the Downloads link. Look
for the latest version in the Download section and click the link
for the Installer. This will open a confirmation box, click the Save File button to
download the DiskCryptor executable file.

56 ,QWHUQHW6HFXULW\
Encrypting Your Windows 10 Laptop

STEP 5 The dcrypt_setup.exe file should now be in your Downloads STEP 8 You’re now offered a selection of available algorithms to
folder. Double-click it and select Yes to accept the Windows choose from. Click the drop-down box to view them all but we
confirmation. With the DiskCryptor setup window open, click the Next button recommend staying with the default AES algorithm for the time being. Leave
and accept the license agreement on the following page. For the remainder of the Wipe Mode box as None and when you’re ready, click the Next button.
the options choose the defaults, clicking Next. When done, click the Install
button and reboot the computer.

STEP 6 After a reboot, click the Windows Start button and locate the STEP 9 In the next section, choose a unique password for accessing the
newly installed DiskCryptor program. You will need to click Yes to encrypted disk; you’re notified how strong the password is. When
authorise its administrative access. With DiskCryptor open you can see the list of you’re ready, enter it again in the Confirm box. Click the OK box to start the
currently installed hard drives in your system. You can click each in turn and encryption process.
view its information at the bottom of the DiskCryptor window.

STEP 7 Start by selecting the disk you want to encrypt. In our example, as STEP 10 Depending on the size of the drive, and how much data there is
mentioned before, we’re going to test this out on a USB stick. We on it, the encryption process could take some time. When it’s
recommend you do too, until you’re comfortable with the process. With the complete you’re notified and the selected drive will the fully encrypted, with you
correct drive selected, either click the Encrypt button to the right or right-click being to access and decrypt it using the password you set up in the previous step.
and choose Encrypt from the menu.

,QWHUQHW6HFXULW\ 57
Protecting Yourself

Top Ten Encryption Tools


for Windows 10
There’s no shortage of programs that can encrypt files, folders and entire drives for Windows
10. Whilst some are very good indeed, others tend to fall by the wayside by not offering as good
a solution.

Encryption Galore
Here are ten different encryption tools for you to consider that work well with Windows 10, and some previous versions too. Some are free, others cost but
they’re all good in their own right.

Available only for users of Windows 10 Pro, Windows 8.1 7-ZIP Primarily a compression program, 7-Zip can also encrypt your data
BITLOCKER
Pro and Enterprise and Windows 7 Enterprise and with the AES 256-bit standard. It’s simple to use, completely free
Ultimate versions. If you’re running the Home versions, you’ll need to upgrade via and comes in either 32-bit or 64-bit versions depending on which type your core
the Microsoft site, or from the Windows Store. In short, BitLocker offers full disk Windows system is.
encryption with 128-bit or 256-bit AES standards.

VERACRYPT This is a free disk encryption program that’s based on the AXCRYPT Another excellent free program, AxCrypt offers 256-bit
popular TrueCrypt. It offers enhanced security, lots of encryption, easy to use interface, cloud storage integration,
levels of encryption and support for UEFI drives. It’s available for Windows password management, secured folders and is available in a multitude of
version 7 onwards as well as Mac OS X, Linux and even the Raspberry Pi. different languages. There’s support for Windows Vista onward as well as support
for files sizes over 4GB.

58 ,QWHUQHW6HFXULW\
Top Ten Encryption Tools for Windows 10

FOLDER LOCK An excellent and comprehensive folder locking GPG4WIN This entry is a little more advanced but once you master its
program, with support for 256-bit encryption and intricacies it’s an extraordinarily powerful program, and free.
Windows versions from Vista onward. It costs in the region of £40 but you’ll need It’s designed for file and email encryption, offering incredible levels of security for
to check for the most recent pricing. For your money, you get secure backups, Windows 7 upwards and Microsoft Outlook 2003 and newer.
USB protection, password wallets, a secure file shredder and much more.

CRYPTOEXPERT 8 Costing around £60, CryptoExpert 8 offer support DEKART PRIVATE DISK This is a simple and easy to use program
for Windows versions from 7 onward, unlimited that supports AES 256-bit encryption,
file size encryption, 256-bit AES encryption, unlimited secure file vaults and on compatibility with Windows Mobile, free unlimited support and updates; and
the fly encryption as you move and copy files around your system. it also includes its own firewall to help prevent hackers from gaining access to
your system.

CERTAINSAFE This is an interesting product, as it provides DISKCRYPTOR We used DiskCryptor in the previous tutorial as it’s a
cloud-based encryption for any files or folders you fairly straightforward program that can achieve high
upload into your online storage. It offers AES 256-bit encryption and an easy levels of encryption with ease. There’s a lot more you can do with it and you can
to use setup and integration into your cloud provider. It’s Pay as you Go, so get further support from within the product’s homepage.
you only pay for what you use.

,QWHUQHW6HFXULW\ 59
Protecting Yourself

What is a VPN?
Your system may be secure to any online threats but it doesn’t always mean your privacy is assured.
This is where a VPN comes in, as it offers the user a heightened level of anonymity when online and
even another level of security and protection.

Virtual Private Network


Using a VPN can help hide your online presence. Whilst this may seem like an ideal way to get to illegal content, it’s actually designed to help fight for your
basic right to Internet and digital privacy.
Essentially, a VPN (Virtual Private Network) is a server or group of servers in a remote Thankfully it’s not a lot, for the most part: you’ll be expected to pay in the region of
location that you can connect to through a client. The VPN servers then hide your £5 to £15 per month. This grants you better coverage and the ability to use up to five
Internet-bound IP address with their own, so if you connected to a VPN that’s or more different devices, including tablets and phones.
located in Australia then your IP address would be as if you were actually sat at a
Over the coming pages we dig a little deeper into VPNs, as you can imagine, using
desktop down under.
one will significantly improve your protection when online. In terms of Windows 10
The benefits of this are many but mainly a VPN will allow you to access region security, the use of a VPN is quickly becoming vital, so by the end of this chapter
restricted websites, protect you from tracking and shield your browsing activities you’ll be knowledgeable and helpfully utilising one to your own advantage.
from those who want to find out where you are personally based. Obviously there
comes a negative side, in the form of being able to access content that your country “A VPN isn’t just used to get access to
has deemed illegal for some reason but on the positive, VPNs have allowed people foreign online services, it can be used by
remote workers to access head office as
in countries with extraordinarily tight restrictions to get access to the outside world; if they were in the building”
often enabling them to report on what’s going on in their own country to the world.
However, for most users having a VPN means they’re able to gain access to TV
channels in the U.S., Canada, Europe and other parts of the world. It’s not always
about being able to moderately ‘cheat the system’ by forcing the Internet to
think you’re somewhere else other than where you actually are though. Remote
workers and employees who live in other countries can connect to company VPNs
and be able to use the company’s network resources as if they were physically sat
in the building.
The connection from your computer to the VPN server, via the client, is usually
secure to the tune of 256-bit encryption levels, depending on the VPN company who
is hosting the service. All your Internet traffic will filter through the VPN server’s
systems, offering multiple layers of protection from viruses, malware and
privacy. Beyond the other possible scenarios, using a VPN whilst you’re
abroad, working in a hotel for example, will enable you to access your
home country’s services and work resources. One more element
that’s worth mentioning is that using Wi-Fi hotspots is one of the
biggest security risk for travellers; using a VPN can effectively
improve your security whilst using a café’s free Wi-Fi.
Using a VPN will protect your
Most operating systems come with the ability to connect to a
VPN through their network settings. If you have the network
access online and filter all
and connection details of the VPN in question, then you’re able
to connect to it using the built-in Windows 10, Linux or macOS your Internet traffic through its
options. However, the more common, and in some respects,
easier method, is to use the client which most VPNs now offer as
standard. The client is often simply a connection window that will
secure service.
ask you your login details, then provide a method of allowing you
to connect to any of provider’s geo-location servers, listed by country.
Once the choice is made, you simply click the connect box and within
a few seconds your IP address will be located within the chosen country.
There are plenty of VPN providers to choose from and we’ll look at ten of the most
popular in a while. Some offer a free connection service that’s handy for quick
browsing but isn’t very fast. To gain access to faster servers, with better security
and protection features you need to pay a monthly or annual subscription fee.

60 ,QWHUQHW6HFXULW\
What is a VPN?

“You’re able to access


web pages and Internet
services from all over the
world, even if you can’t
from your own country.”

“A VPN greatly improves


security for devices and when
you’re using free Wi-Fi at cafés
and other such locations.”

,QWHUQHW6HFXULW\ 61
Protecting Yourself

How Can a VPN Improve


Windows Security?
We’ve emphasised the enhanced privacy that a VPN offers when you’re connected to its services,
and the heightened levels of anonymity, but what security benefits does a VPN bring to a Windows
10 computer with an antivirus program already installed?

Security Beyond Anonymity


It’s a good question: how can a VPN improve Windows security? Whilst the privacy side is well catered for, there are some good security enhancements and
features a VPN brings to the table.

This doesn’t happen often but an ISP can THREAT PROTECTION To expand the previous feature, VPNs will
BROWSING ACTIVITY
become compromised and details of user filter web pages that are dangerous or
activities leaked or stolen. Using a VPN can hide your browsing activity from contain threats. Even with a good antivirus client installed, you can still access a
trackers and even your ISP, enabling you to browse with freedom of fear of dangerous site. Using a VPN will stop the site from even being loaded.
having your details leaked or accessed by others.

ANTIMALWARE Many VPN providers utilise a level of antimalware into HIGHEST ENCRYPTION The connection between you and the VPN
their security layers. This enhances your security by server is encrypted to the highest possible
filtering any downloads through the VPN first. Should there be a virus present, standards. This makes it near impossible for some external element to gain
then it can be removed or stopped at the VPN before it even reaches you. access to the data you’re transmitting. Online banking and shopping are
extremely secure with a VPN.

62 ,QWHUQHW6HFXULW\
How Can a VPN Improve Windows Security?

WI-FI PROTECTION Public and free Wi-Fi hotspots are notorious AD BLOCKING
when it comes to mobile security. Anyone with
a little knowledge and some free tools via the Internet can intercept public Most VPNs will also add an
Wi-Fi network and hijack your connection, revealing all your data. A VPN will extra layer of security
encrypt the data and protect you. whereby they actively block
any advertising from
websites. Internet ads are a
necessary evil in some ways,
as they provide much
needed funds for your
favourite freely available
websites. However, some
contain malicious content
and need to be blocked.

SECURE TUNNEL If you’re working abroad, or you’re a remote USE HTTPS Using HTTPS instead of HTTP uses the secure side of the
worker, then a VPN connection to the company’s Internet protocol. Sadly, it’s not always implemented in
servers will ensure that all the sensitive business data will remain secure. It’s browsers or by users. Many VPNs will force all websites to use the secure
difficult for a company to ensure 100 per cent security with mobile and off-site connection that a HTTPS site offers, enhancing your browsing security.
workers but a VPN will provide a secure tunnel straight to the company itself.

MULTI-PLATFORM ZERO LOGS In some countries data retention laws are quite archaic,
with governments and other bodies being able to access
The availability of iOS and Android your data log for as long as you’ve been able to access the Internet. A good VPN
VPN clients means that your call won’t detail any logs of your browsing and in most cases won’t even hand over
data and data stored on your device any personal information relating to you to other agencies.
is also secure. Mobile VPN apps will
use the same levels of protection
and security, so your data can’t be
stolen when you’re not even aware
of it.

,QWHUQHW6HFXULW\ 63
Protecting Yourself

Top Ten VPNs


There’s no shortage of programs that can encrypt files, folders and entire drives for Windows
10. Whilst some are very good indeed, others tend to fall by the wayside by not offering as good
a solution.

Encryption Galore
Here are ten different encryption tools for you to consider that work well with Windows 10, and some previous versions too. Some are free, others cost but
they’re all good in their own right.

CYBERGHOST CyberGhost is our favourite VPN. It offers 256-bit AES NORDVPN NordVPN offers two levels of encryption, access to fast
military grade encryption, no logging, access to 27 servers, no logging, a kill switch in case the VPN connection
countries and hundreds of servers, protected browsing, ad blocking, access to drops and you’re still surfing and support for multiple devices and operating
fast servers, unlimited traffic and bandwidth and an anti-fingerprint system. All systems. It’s well priced and is highly regarded among the press and media. Not
for around £5.83 per month for up to five devices. bad for a mere $5.75 per month (around £4.50).

HMA Despite its colourful name, Hide My Ass VPN is considered to be one PUREVPN With support for multiple devices, 256-bit AES encryption
of the best services available. Along with the usual secure 256-bit and access to 180 locations worldwide with 750 plus servers,
encryption connection you get blistering speeds, access to over 300 locations, PureVPN is a great choice for the home user. The cost varies depending on the
anonymous email use, a free web proxy access and free extensions for your package but expect to pay in the region of $5.90 (around £4.58). Just as with all
browser. Expect to pay around £5 per month. these VPNs, it’s worth checking for the latest pricing.

64 ,QWHUQHW6HFXULW\
Top Ten VPNs

VPN UNLIMITED VPN Unlimited offers a full firewall service with PRIVATE INTERNET ACCESS Private Internet Access VPN offers a
anti-malware, ad blocking and anti-tracking. There’s wealth of features with its
256-bit AES encryption, over a thousand servers in 70-plus locations, support for impressive service. 256-bit levels of encryption, no traffic logging, ad blocking,
up to five devices, fast servers and app support for iOS, Android and Widows support for five devices and access to over three thousand servers across twenty
Phone. Pricing varies but expect to pay around $8.99 (approx. £6.97) per month. five countries. It’s surprisingly cheap too, at just $6.95 (about £5.40) per month
depending on the package you opt for.

IPVANISH IPVanish is another highly regarded and awarded VPN VYPRVPN VyprVPN is an exceptionally good service that offer access to
service. For $6.49 (around £5) per month depending on the fast servers, multiple device support, unlimited bandwidth
package, you get access to fast servers, unlimited bandwidth, no logging, 256-bit and connection, 256-bit AES encryption and access to over seventy global
AES encryption and support for up to five different devices. locations and hundreds of servers. The Premium package costs just £5.83 per
month for a one year subscription, but check regularly for any changes.

TUNNELBEAR VPN TunnelBear VPN offers an initial 500MB per FACELESS.ME Faceless Me is an interestingly named VPN service.
month free service, moving up to $9.99 (around Amongst its features expect to see elevated levels of
£7.75) per month for unlimited bandwidth. For this you get access to fast servers encryption, unrestricted access, an easy to use interface and unlimited traffic.
across twenty plus countries, 256-bit AES encryption and support for Windows, You get 2GB per month for free but for $6.65 (around £5.16) you can have
iOS, Android, macOS and browser add-ons. unlimited access and traffic.

,QWHUQHW6HFXULW\ 65
Protecting Yourself

Using a VPN for Added


Security and Privacy
We’ve covered how a VPN works, how it can improve your security and given you a top ten chart of
recommended providers but we’ve not looked at how you would set one up and what it’s like when
up and running.

CyberGhost
We’re going to use CyberGhost as the example VPN for this tutorial. You’ll need to purchase one of the available packages to begin with, Premium is £3.74 per
month, while Premium Plus is £5.83.

We won’t use the free option in this instance, as the paid for STEP 3 Go to the Downloads folder and double click the CyberGhost
STEP 1
services offer a better set of features with which to display the executable followed by a click on Yes for the Windows
VPN in action. Start by navigating to www.cyberghostvpn.com and clicking on authentication process. Accept the agreement and follow the on-screen
the Pricing link in the upper portion of the main CyberGhost site for your regional instructions to set up CyberGhost on your PC; the default options are fine to use,
and latest pricing. unless you specifically require a different location for installation.

STEP 2 Assuming you’ve purchased one of the options, click the yellow STEP 4 Once the installation is complete you’re presented with the main
Free Download button located in the top right of the main page. CyberGhost client window. However, before you make a
This will, after a few seconds, automatically initialise the download of the latest connection, click on the Login link located at the top of the client window.
CyberGhost client software. Click Save File to download it to your
Downloads folder.

66 ,QWHUQHW6HFXULW\
Using a VPN for Added Security and Privacy

STEP 5 Enter your CyberGhost login and password that you set up STEP 8 Click back to the CyberGhost client and return to the main
when you purchased the package and click the OK button. Once window. Click the Home icon along the top of the client window
the login is confirmed you’re taken back to the main client window where the and then the Choose My Server button in the bottom right. This allows you to
available options for the account package you purchased will be displayed. choose your own server from the available countries that CyberGhost works with.

STEP 9 Look through the list and pick a server; we’re going to use one of
the Vienna servers in this instance. The Ping value is how fast the
server is, the lower the ping the faster the connection. Either click to highlight the
STEP 6 Before you use the service, it’s best to check a couple of things. server followed by clicking the Connect button or double-click to launch the
First click on the Settings link along the top of the client window. server connection.
In here you can see multiple options for the control, connection and how
CyberGhost will work with your PC. Generally speaking, the defaults are fine
unless you have a specific reason to change them.

STEP 7 One more thing before connecting to the CyberGhost VPN: open
a browser and enter www.ipcim.com/en/?p=where. This will
display detailed information based on your IP address, such as the ISP you’re
STEP 10 The CyberGhost client will take a few seconds to connect. When
using, the country, city, even latitude and longitude, complete with a map and
it’s ready you’ll see a ‘You are currently protected’ message in
possible radius you fall into. This is the kind of information we want to secure
the client. Close your browser and relaunch it, then return to the www.ipcim.
from prying eyes.
com/en/?p=where page. You can see that the Internet now thinks you’re located
where the chosen CyberGhost server is, protecting and securing your privacy and
personal details.

,QWHUQHW6HFXULW\ 67
Online Protection and Disaster Recovery

68 ,QWHUQHW6HFXULW\
INDEX

Online Protection
and Disaster
Recovery
While you can successfully protect yourself and your own computer, as
soon as you make a connection to the outside world you’re under the
influence of many external factors. We look at how data is transmitted
from your computer to the Internet and how a canny hacker can
intercept that data for their own means.
Over the coming pages you’ll discover how best to protect yourself
and what strategies you can use to become more secure when online;
even when you’re out and about with your Windows 10 laptop and
other devices.

70 How Does Information Move Around 82 How to Secure Yourself


the Internet? on WhatsApp
72 How Can Internet Data be 84 What to Avoid when Creating
Intercepted? a Password
74 10 Tips to Protect Yourself Against 86 Password Generators and Tools
Interception 88 Top Ten Password Managers
76 How to Secure Your Devices 90 Shopping Online and Security
78 How to Secure Yourself on Facebook 92 How to Remove a Virus or Malware
80 How to Secure Yourself on Twitter from a Windows PC

,QWHUQHW6HFXULW\ 69
Online Protection and Disaster Recovery

How Does Information Move


Around the Internet?
Before we get into online protection and disaster recovery, it’s worth taking a moment to look at
how information moves around the Internet, in particular your information. Just how is data sent
from your PC across the Internet, to potentially fall into the hands of someone else?

Information Superhighway
The Internet is a huge, complex network of computers and is widely credited as humanity’s greatest achievement. It’s estimated that the Internet houses
something in the region of 1024 bytes of information, which is quite a lot.
That estimated 1024 bytes equates to an exabyte of potential information held by The protocols used throughout the Internet define what the data being
every single connected device that makes up the Internet, some of which is your communicated actually is. For example IMAP, Internet Message Access Protocol, is
information. It’s an impossible number to visualise, since we’re only using gigabytes a mail protocol for accessing email on a remote server, such as accessing Gmail.
or terabytes of storage in most of our devices. More to the point though, how on These protocols help further the transmission of data to its intended location,
earth does all that connect together, and how does it work? making it more accurate and telling the computer on the other end what it is and
how to piece together the jigsaw puzzle of packets that will be received.
To be able to transmit all that information, the data that travels around the Internet
is in packets. Each of these packets contains a header and a footer. The information Essentially this is how information is sent and received around the Internet.
stored in the header and footer contains the details regarding the data being sent. Obviously, there’s a lot more going on in the background than we’ve mentioned
For example, if you send an email to someone, as soon as you click the send button here. The complexity that you can go into when dealing with data transfers is quite
the data will be wrapped up in headers and footers, split into numerous packets staggering and a little bewildering at times. Suffice to say, all those packets of data
and sent on its merry way. contain information about something or someone and somewhere out there are
packets of data that contain information about you, where you are, what you’re
Whilst that sounds logical, much in the same way a telephone call takes place, the
doing, and other personal details such as bank accounts, passwords, names
reality is quite different. Those packets can take any route possible to get to the
and addresses.
destination, as defined by the header and footer. Those routes don’t necessarily all
have to be the same either. Some packets may travel from one server to the next via
one data pathway, while others will take another. The server at the other end will use
the information provided by the headers and footers to collate the message, reform
the data and present it to the email recipient the way in which you intended it to.
Remarkably, if the server at the other end detects missing packets it can
request the missing information from its available connections. Any
missing data can then be sent via an alternative route, updating the
information as it goes so other packets will know that the previous
route isn’t getting through. The headers and footers then tell the
server that the data packets are all present and what they should
look like; the email will arrive accordingly. The Internet is regarded as the
All this happens in milliseconds. This sounds incredibly complex
and on paper it makes the Internet appear to be a slow, lumbering
beast dealing with incomplete packets of data. In a way that’s
greatest human achievement,
how it works but instead of being a lumbering beast, the Internet
or more accurately, the servers and computers attached to it, are
and it’s not difficult to see why
fathoming data packets by the millions every second.
Just as we’ve seen, each computer on the Internet is connected
using an IP address. These are registered across the Internet, so the
headers and footers in each packet contain the IP address of the sender
and where the data is heading to. That way, it’s not just a random collection
of data travelling across the ether in the hope of landing in the right place. The
DNS, Domain Name System, converts the IP addresses to readable names, such
as Google.com and the like, and back again. That way when you enter the email
address [email protected] the DNS servers will convert the information
and the packets sent to the relevant destination.

70 ,QWHUQHW6HFXULW\
How Does Information Move Around the Internet?

“Data is split into packets, with


headers and footers telling
servers what to do with it and
where its going. ”

“Along with protocols, packet


information can take any
possible route to its destination
and it happens in a matter of
milliseconds.”

“DNS servers translate IP


addresses to readable locations,
the packets then know where
exactly to head to deliver the data.”

,QWHUQHW6HFXULW\ 71
Online Protection and Disaster Recovery

How Can Internet Data


We’ve seen how data travels around the Internet in packets and with the help of various protocols that determine
its source, destination and what manner of data packet it is. While that’s all well and good, it’s worth knowing how a
hacker goes about intercepting that information.
The data packets that make up a message, or a string containing a username
and password, are sent to and from yours and other computers without
most of us ever really knowing what’s going on in the background.
It’s this lack of knowledge that’s the hacker’s greatest tool. Well,
that and some clever software that’s freely downloadable
from the Internet. Let’s look at how data can be intercepted
by a hacker. Let’s use the scenario that you’re on a
MITM
business trip, or just out and about, and you’re using a The first and most notable form of attack is called MITM or Man In The
café’s free, public Wi-Fi. Middle. This attack utilises a set of free tools that can essentially grab data
packets from the locally used network. This means that the data packets
leaving your computer must travel through the free Wi-Fi’s network before
going off into the Internet to its destination. The MITM attacker can sniff out this
data, intercept the stuff that looks interesting, which can be done by reading the
There are numerous, and headers and footers and determining what the message/information contains,
quite ingenious, ways and decode it to view in plain text on their computer.
in which data can be
Think of this form of attack as a postman opening a bank statement letter,
intercepted by a hacker. writing down all your bank details, then sealing the envelope before posting
it through your door. The data packets are easily intercepted on the free
Wi-Fi and unless you’re using a HTTPS site, they take very little effort to
decode and read.

Man in the
Middle

Shoulder Surfing
Normally you need to Whilst not a technical way of intercepting data,
be using an unsecure hackers will still use the old tried and tested method of
stealing information simply by sitting close to you and
network, such as a public
peering over your shoulder whilst you enter login details
Wi-Fi but there are other or write an email.
ways and means.
It doesn’t take much skill, as we’re usually so busy
concentrating on other things that we often fail to
notice someone looking over our shoulder. However,
it’s a real and credible threat, so be wary.

72 ,QWHUQHW6HFXULW\
How Can Internet Data be Intercepted?

Fake Wi-Fi
This is another element to a MITM attack, also known as an Evil Twin.
Essentially a hacker can sit at the same café as you and everyone else and
use a set of tools that can pretend to be the actual Wi-Fi router belonging to
the café. This enables them to do several things: first, they’re able to beam out
the fake Wi-Fi signal to every device within range, which in turn (if the users have
their devices set to attach to any freely available Wi-Fi) will instantly connect to
the fake signal. Secondly, once they have a device connected, they’re able to
use their laptop and the tools therein to intercept all the traffic that’s being sent
to their fake Wi-Fi signal. Thirdly, the attacker can connect themselves to the
actual café Wi-Fi and act as a filter to the real connection to the Internet. The
victim isn’t even aware that their connection is compromised.
Naturally, this means that every single scrap of data is being filtered
through the hacker’s system. It’s just up to them to collect it all, decode
it and use the information within for their own gains.

Fake Sites
We’ve mentioned fake websites previously. This way of data
interception is often working hand-in-hand with the scenario we’re
using as an example. Combining the aforementioned Evil Twin and
packet sniffing methods, a hacker, who has taken the time to set up the
scam, can create several fake website front ends that mimic banking sites,
Outlook access, login pages and so on. They then host those sites on their
interception laptop, together with the Evil Twin fake Wi-Fi and should a user
connect and request the page of their bank they instead get the fake site that
the hacker set up.
The victim will then unwittingly enter their details, which will be stored by the
hacker before forwarding the victim to the actual bank website. The victim will
then be required to re-enter their banking details into the actual bank website.
For their part, they simply think they’re mistyped a password and
gain access to their account as normal. Sadly, the hacker
now has plain text information regarding all their
login details and can begin to transfer
money from their account.

,QWHUQHW6HFXULW\ 73
Online Protection and Disaster Recovery

10 Tips to Protect Yourself


Against Interception
While it may seem like fearmongering, detailing the ways in which data can be intercepted, it’s sadly
a real world fact. Public Wi-Fi, hotspots and free access points are the bane of the security industry.
Thankfully, there are ways in which you can protect yourself.

Public Safety
Despite the different and varied ways a hacker can gain access to your inbound and outbound data, there are means in which you can defend yourself. Here
are ten tips to help you protect your data from being intercepted.

Not all public Wi-Fi access points are havens for nefarious hackers TIP 3 Always double-check a website for spelling errors, older logos or
TIP 1
but that doesn’t mean you should let your guard down. Every anything else that may raise an alarm. If your banking website looks
security software and firewall in the world can’t help you if you’re not savvy when even remotely different from when you last used it, try and avoid logging into it
it comes to information security. If you’re going to use public Wi-Fi, don’t use it for until you get to a more secure Internet location.
banking or other highly personal detail transactions.

TIP 2 It may not always be possible to spot an Evil Twin fake Wi-Fi access TIP 4 Ensure you use the latest antivirus and antimalware definitions for
point. It’s often best to double-check with members of staff, if it’s a your security client. If you’re going to use public Wi-Fi, make sure
café, airport, restaurant or similar, that the Wi-Fi you’re connecting to is actually you’re up to date prior to leaving, especially airport Wi-Fi points, and that the
theirs and not one that’s being spoofed. Avoid Wi-Fi names like ‘Free Wi-Fi Here’ client is in good working order.
or similar.

74 ,QWHUQHW6HFXULW\
10 Tips to Protect Yourself Against Interception

TIP 5 Always use HTTPS to access any website. This means that the TIP 8 Using a VPN when accessing a public Wi-Fi point is a fantastic way
information and data packets will be sent and received in an of protecting your data packets. They can still be intercepted but
encrypted form and will make it exceedingly difficult for a hacker to decipher the VPN client encrypts all outgoing and incoming data with the highest possible
them. If possible, use an add-on such as HTTPS Everywhere for your browser levels, making it virtually impossible for a hacker to decode.
of choice.

TIP 6 Turn off file sharing when you’re using a public Wi-Fi access point. TIP 9 To avoid shoulder surfers, make sure that the area behind you is
Whilst it’s great to share your content on your home or work clear and enter passwords etc. via your keyboard in the same
network, once you start using another network, your computer could start way you’d protect your card details in an ATM. Cover your keyboard as much
sharing that data with anyone who’s also connected to the same network. as possible and make a point of looking around to make sure no one is
watching you over your shoulder.

TIP 7 If you’re not planning on using any public Wi-Fi points, then make TIP 10 If possible, always use a two-factor form of authentication. For
sure that the Wi-Fi is turned off on your laptop, phone, tablet and example, some banks will utilise both a login from their website as
other devices you have on you. There are instances when a device can well as a text sent with a unique code to a registered phone number. This way
automatically attach to any available network, unless otherwise told not to. you ensure that the banking site is legitimate and a hacker can’t go any further
without the SMS pin sent by the bank.

,QWHUQHW6HFXULW\ 75
Online Protection and Disaster Recovery

How to Secure
Your Devices
Mobile device hacking is on the rise. Most people now carry a phone or tablet around with them
all the time, containing their emails, browser data, photos and enough personal information for
someone to be interested.

Ten Tips for Safer Mobiles


Your personal information is worth quite a bit to the right group of people. It’s not just Windows 10 security you need to keep in mind, you need to consider
your mobile security too.

Locking your device is one of the most basic of MOBILE ENCRYPTION It’s possible to set up data encryption on
SECURITY LOCK
security tips for mobile devices. Either use a number mobile devices these days. For example, you
code, pattern lock or finger print to lock your device when not in use. Should can encrypt the entire device or just the part that contains emails and personal or
someone steal it, it becomes a little more difficult for them to gain access. That banking data. Either way, encryption will protect the contents of your device.
won’t stop a professional digital criminal, but it will deter the rest.

REMOTE WIPE If possible set up some form of remote wipe. Should BACKUP DATA Make sure that the data you have on your device is
your phone or tablet be stolen or lost, you’ll be able to regularly backed up. You may have umpteen security
use another Internet connected computer to send a delete signal to the lost elements in place but if the device is lost and you haven’t made a backup, then
device. You may never see the phone again but at least the personal data within your data is lost too.
is now out of the hands of others.

76 ,QWHUQHW6HFXULW\
How to Secure Your Devices

BLOCK INSTALLATIONS Try to avoid installing third-party apps. FALSE TEXTS Be aware of social engineering phone scams, Vishing
iOS devices are covered in this regard and Smishing in particular. Criminals love sending false
thanks to Apple’s walled garden approach to its app store. However, Android banking texts, links to fake websites and all manner of other scams designed to
users are particularly vulnerable. Don’t install anything from an unknown source gain access to your personal information.
and research plenty before installing anything.

POWER OFF WI-FI Remember to turn off your Wi-Fi when you
NO ROOTING Avoid jailbreaking or rooting your device. Whilst it’s leave the home or office network. If you
regarded as a positive process, to remove the built-in desperately require Internet access and don’t want the data charges, then
software from the manufacturer and give you control over the device, it often consider using a VPN if you’re connecting to public Wi-Fi points.
also opens your device to backdoors that were previously sealed. Unless you
know how to properly secure a device, leave rooting alone.

UPDATE SYSTEM Keep your system as up to date as possible. It MOBILE AV


can be a pain having to frequently accept update
and upgrade messages from your device, and waiting for the OS or the app to Download and install a
update itself, but more often than not an update will provide much needed good mobile antivirus
security patches. and malware tool set.
Bitdefender, McAfee and
all the other major
security companies offer
a mobile version of their
products and with it
you’ll be better prepared
for any potential
cyber attack.

,QWHUQHW6HFXULW\ 77
Online Protection and Disaster Recovery

How to Secure Yourself


on Facebook
Facebook has become one of the best sources for cyber criminals to gain personal information on
the Internet. Without realising it, a user is giving out reams of data and in most circumstances they’re
making it public.

Tips for Better Facebook Profiles


The dangers of social media aren’t just for young people, many adults have been duped into befriending someone they don’t know and exposing their
personal information.

Facebook’s policy forbids the use of fake names but it does allow nick Go to Settings > Privacy, and make sure that the Who can see my stuff
names to be used. Where possible, use your nickname instead of your section is set for just friends, as opposed to friends of friends or public.
real name. This will effectively hide your real name details from those who would This will effectively hide your Timeline contents from others and only your
wish to exploit it. confirmed friends will be able to see any updates.

Set up two-factor authentication, alerts about unrecognised logins and Never post any contact information on your profile. We often
make sure that emails from Facebook are encrypted. These can all be automatically start filling in the phone number field on a site but take a
found in the Settings > Security and Login section. moment to consider what the ramifications could be should your number be
made aware outside your circle of friends. That also includes house address too.

78 ,QWHUQHW6HFXULW\
How to Secure Yourself on Facebook

Tempting as it may be, try to avoid posting your location. Whether you’re Not all apps you install on your phone or tablet are good. Take a
at home alone, or you’re on holiday, should that information be made moment to read what an app will try to access when it’s installed. Often
available then a criminal will know that your house is empty or worse, that you’re a rogue app will attempt to access your Facebook account to farm for your and
alone in it. your friend’s information.

Try and avoid sharing random thoughts of the day, inspirational quotes,
fake news or other such items that appear on your Timeline from others.
Often these instances are created to farm for shares and likes and as such can
often be traced back to individuals who are simply looking for active
Facebook accounts.

Whilst in the Settings > Privacy section, consider editing the default
options for the Who can look me up fields. These will prevent the
public, or even friends of friends, from being able to find you on Facebook,
which in turn adds a higher level of security to your account.

Try not to accept every friend request you get. Take a moment to
check the person out and if necessary message them to find out who
they are and how they know you. If their comment is something like ‘we met
at the bar last month’ then it’s best to ignore the request, as they could be
fishing for information.

Finally, ensure that the Do you want search engines outside of Facebook
to link to your profile option is set to No. This will hide you from
someone who has entered your name into Google in the hope that they might
be able to find your Facebook account.

,QWHUQHW6HFXULW\ 79
Online Protection and Disaster Recovery

How to Secure Yourself


on Twitter
Twitter’s success has boomed in recent years. Where once it was simply one of the more popular
social media platforms, thanks to presidential candidates and scores of celebrities, it’s fast become
the modern media phenomenon.

Securing the Twitterverse


Sadly, due to its popularity, Twitter is a hotbed of scammers, spammers, hackers and social engineers scouting out the next potential victim for monetary
gain, or simply behaving abusively. Here are ten tips to help secure your Twitter account.

If you click on your profile picture and choose Settings and Privacy from We’ve previously mentioned the fact that using weak passwords is,
the menu, you’re able to set up a form of two-factor authentication unsurprisingly, not recommended. However, you’d be amazed at how
called Verify Login Requests. This will enable Twitter to use your phone number many people still use the likes of ‘password1234’ or something similar. Set a
to send texts for any login requests. So even if your password is compromised, good, strong password that will take some cracking.
the hacker can’t get in without the text code.

Just like most other social media platforms, phishing scams are rife on
Twitter. Be wary of anyone sending you Tweets claiming to be someone
you know, offering a too-good-to-be-true job or even informing you that your
account is compromised. It’s likely a phishing scam, so delete and report the There are many accounts
instance to Twitter. on Twitter that simply
aren’t real. These bots, as they’re
known, can be programmed to
post daily amusing, inspiring and
socially acceptable Tweets. On the
flip side, other bots are designed to
Tweet suspicious links to
virus-infested websites. In short,
unless you trust the account, don’t
follow any links.address too.

80 ,QWHUQHW6HFXULW\
How to Secure Yourself on Twitter

Within your account settings, you’ll see a menu to the left with a Word Muting is an excellent feature within Twitter’s account settings.
Privacy and Safety option. Click this to enable Twitter privacy, With it you’re able to mute any words you don’t want to see in your
Discoverability, Direct Message notifications, the ability to hide sensitive Tweets notifications or timeline. There are often Tweets you’d like to avoid even seeing in
and the removal of blocked accounts. It’s worth going through the list to further your timeline, so muting them is an ideal solution to help keep your account
secure your account. clean and free from negative aspects.

Direct messaging in Twitter is both advantageous and dangerous at the It’s always worth browsing through the Apps section in the Twitter
same time. Whilst great for communicating directly with another user, options. This is where you can allow or revoke access for any apps
it’s also used by others to lure in victims or send links to malicious websites. It’s you’ve used via the Twitter account; and you can also see what rights each
best to ignore most messages unless you know who they’re from. app has to your Twitter account.

If you use your Twitter account to login into any third-party apps or
games, then you may need to consider setting up a secondary Twitter
account. Whilst convenient, some apps can be hijacked to collect account
details, leaking them to hackers.

Like Facebook, be careful of what you post. It’s nice letting others know
you’re off on holiday to the Bahamas for several weeks but there could
be a rogue account that’s now informed of an empty house; and if you were
foolish enough to mention your address in previous Tweets, they know exactly
where to go.

,QWHUQHW6HFXULW\ 81
Online Protection and Disaster Recovery

How to Secure Yourself on


WhatsApp
With over a billion users worldwide, WhatsApp is proving to be a force to be reckoned with in the
social media marketplace. This messaging app was released over eight years ago and developed by
the Facebook team; since then it’s become the most popular messaging app.

WhatsApp Security Tips


With this popularity comes a darker side to messaging. Accounts of terrorists using WhatsApp, along with hackers, scammers and all manner of nefarious
individuals and groups are ever in the popular media.

Protecting your WhatsApp For added security you can


account can be done mainly opt for two-step
through the Settings > Account > authentication, which will require a
Privacy option. In here you’re able to PIN when registering your phone
secure your personal details, profile, number with WhatsApp. This is an
status, messaging and who can see absolute must for those who use the
your account. app regularly.

Beyond WhatsApp itself, make sure that your phone or tablet is securely
locked with an access PIN, pattern, facial or finger print recognition
system. This way, should you lose your phone, it will be locked against anyone
who tries to access it and WhatsApp.

Thankfully, WhatsApp
already encrypts and
secures messages sent from one
device to another. This means
that your data can’t be
intercepted and read. However,
you can opt to view security
notifications if a contact’s security
setting has been altered. This is in
the Settings > Account >
Security menu.

82 ,QWHUQHW6HFXULW\
How to Secure Yourself on WhatsApp

Generally you’re not able to add users to your chat list if you don’t If you don’t want WhatsApp contacts to see where you’ve been, you
already have them in your contacts list. However, clever phishing scams need to disable the Last Seen option within the Privacy settings. This will
can have a victim add a contact, who can then message them using WhatsApp; prevent other users from ‘seeing’ your movements. Should a malicious contact
as with all social media platforms, be wary of phishing attacks. be added, they will never know where you are or have been.

You can block users via the WhatsApp Web feature. Log into WhatsApp
Web, and click on the three horizontal dots by your profile picture. Then
click Settings and from there the Blocked option. You can select contacts to
block from WhatsApp.
Be wary of scams where you’re contacted through other social media
accounts informing you that your WhatsApp account has been
compromised. These often request you to add a so-called legitimate contact,
who in reality isn’t, or visit a webpage that’s riddled with malware.

You can block all images If you use WhatsApp Web it’s always best to ensure that you’ve logged
from appearing on your out of it correctly before leaving your computer. The last thing you need
photostream within WhatsApp. iOS is for someone to come over to your computer and view any conversations
users can look to their Settings then between contacts.
Privacy > Photos and deselect
WhatsApp from the list of allowed
apps. Android users will need to
create a file called .nomedia within
the WhatsApp images folder to stop
the app from listing pictures.

,QWHUQHW6HFXULW\ 83
Online Protection and Disaster Recovery

What to Avoid when


Creating a Password
Creating a strong password sounds easy on paper but when you’re presented with the password box
it’s easy to become stumped. Should you get past that part, there are also security rules to follow to
further protect that password.

PA55W0RD1234
To help you create the perfect password, and secure it further, here are ten tips for happier password management. There’s always password pitfalls but stick
to these general tips and you should be okay.

Never use your date of birth, partner’s date of birth, VISIBLE PASSWORD Never write your password down on a Post-It
OBVIOUS DATES
children’s date of birth, pet’s names, family names note or somewhere near your computer. It’s
or even the town where you grew up in. This is all information that can easily be not too difficult for someone to visit your computer whilst you’re on a coffee
collected from social media sites or even a clever Internet search. break and read the note.

SAME PASSWORDS Never use the same password for multiple COMMON PASSWORDS Try and avoid using common words in
sites. It’s tempting and easy to have a single your password. Most password attacks are
password for everything but should that password ever become compromised brute force, using dictionary words to gain access. Avoid using sequences of
you will lose access to every site you visit, including any banking sites. numbers, such as 1234. Instead, try inserting numbers, capital letters and symbols
into words, such as C0m”o% instead of the word common, for example. However,
avoid common words altogether if possible.

84 ,QWHUQHW6HFXULW\
What to Avoid when Creating a Password

CHANGE REGULARLY Regularly change your password. Most LENGTHY PASSWORDS Don’t use short passwords. The longer
companies and good sites will require you to they are, generally, the harder and more
enter a new password that hasn’t been used previously in the last few months complex it will be should anyone try to crack it. A longer password that also
every thirty days or so. If not, then you should actively keep changing your utilises upper and lower case, numbers and symbols can’t easily be viewed by
password yourself. any shoulder surfers.

SECURITY QUESTIONS In addition to creating a password, some


UNTRUSTED DEVICES Never enter your password on a device or
sites also offer a rescue security
computer you don’t trust. Entering your
question. Sadly most of these questions are a little too easy to get the
account details on a public computer, such as a kiosk or library, is dangerous as
answers for. Questions such as Mother’s Maiden name, first pet, town where
you don’t know what protection these machines have nor whether they’ve
you grew up, etc. can again be obtained by the clever hacker.
already been compromised.

STRONG PASSWORDS A strong password isn’t going to be easy to


remember at first. For example, something
like 8%&KY4&$XzwMhfrk will take a hacker around a hundred thousand years to
PUBLIC WI-FI Try to avoid logging into certain sites when you’re crack but it hardly flows off the tongue. Find a happy medium and make your
using public Wi-Fi. We’ve already covered how data password as strong as possible.
on a public, free Wi-Fi access point can be intercepted. Your passwords,
therefore, can be intercepted and viewed in plain text by a hacker.

,QWHUQHW6HFXULW\ 85
Online Protection and Disaster Recovery

Password Generators
and Tools
We’ve looked at some tips on what not to include when coming up with a strong password.
However, it’s not always as straight forward as that. Whilst some can come up with an elaborate and
incredibly strong password, others struggle. Thankfully, there’s help on offer.

Top Ten Password Generators


We live in an age where you don’t have to sit with a dictionary and cryptic decoder to come up with an excellent password. There are many generators freely
available to help you out. Here’s our top ten.

NORTON IDENTITY SAFE PASSWORD GENERATOR WIGHT HAT PASSWORD GENERATOR This online password
generator has been
Norton by Symantec, offers a handy free password online generator. You can set around for quite some time and has proved to be one of the best available for
the password length, include letters, mixed case, numbers, punctuation and no those after a unique and unbreakable password. There are ample options, and
identical characters. You can find it at: none of the passwords generated are stored remotely. Visit:
https://identitysafe.norton.com/password-generator/. http://strongpasswordgenerator.org/ for more information.

LASTPASS LastPass is a popular password management program, which


STRONG PASSWORD GENERATOR Another great online we’ll look at in the next section; it also offers a free password
resource that will create generator. Found at https://lastpass.com/generatepassword.php, this
an incredibly strong password based on the options you choose. You can choose excellent tool will help you create a strong and virtually unbreakable password
the length, punctuation and avoid similar characters but also display phonetic in seconds.
words to make it easier to remember. Try it out at:
https://strongpasswordgenerator.com/.

86 ,QWHUQHW6HFXULW\
Password Generators and Tools

MSD SERVICES An interesting site this, one that will allow you to XKPASSWRD This site is powered by the XKPasswd.pm Perl module,
create multiple unique passwords, based on length, which offers a range of settings to help create a unique
upper and lower case, number and symbols as well as whether the end result will and very strong password. There are plenty of options to choose from and you
be pronounceable or completely random. It’s at https://msdservices.com/ can save and load your preferred configuration for later. It’s at:
apg/index.php for those after several passwords. https://xkpasswd.net/s/ if you want to check it out.

SAFEPASSWD Another great site to have in your password arsenal.


LITTLELITE PASSWORD GENERATOR Another simple but
SafePasswd has been around since 2006 and is regarded
easy to use and good
as one of the best online password generators. The options are many and with
online password generator. LittleLite offers some options, including
them you can create something truly impossible to crack. You can find it at:
password length, number, upper and lower case, symbols and spaces. It’s
https://www.safepasswd.com/.
found at http://www.littlelite.net/pwdgen/ and certainly worth
considering bookmarking.

DINOPASS For kids at school or when online, DinoPass is an excellent


resource that will help them come up with a memorable, yet
strong password. You can choose between a simple or strong password type,
PASSEDS.NINJA This is a quick and easy online password depending on where it’s going to be used and there’s meanings of each to help
generator. You won’t get any options or added out, too. You can find it at:
extras, you simply click a button and ten unique passwords will be displayed http://www.dinopass.com/.
for you to choose from. It’s worth looking into for a quick solution to password
creation; https://passwds.ninja/.

,QWHUQHW6HFXULW\ 87
Online Protection and Disaster Recovery

Top Ten Password


Managers
Creating uncrackable passwords is one thing, remembering them for each of the services that require
one is something else entirely. The reason why most people opt for a single password for all their
accounts is simply due to not being able to remember them all. This is where password managers help.

Manage Those Passwords


Password managers differ in what they offer, how they work and what optional extras they provide. Therefore it can be tricky to find one that fits the bill.
Some are free, others cost a monthly or annual fee; here are ten to consider.

LASTPASS LastPass, which also offer a free password generator, is STICKY PASSWORD Sticky Password is available both as free or
regarded as one of the finest managers available. There’s a Premium versions, costing just £24 and offers
free version that offers unlimited password storage, cross-platform access, two-factor authentication, autofill for websites, advanced biometrics; it’s also
two-factor authentication and elevated levels of encryption. There’s also a available on all major platforms. The Premium version goes further with cloud
Premium version that offers a lot more, including 1GB of encrypted file storage backup and syncing and with every license purchased a Manatee is saved.
and higher levels of encryption. Certainly worth considering.

ZOHO VAULT Zoho Vault is another excellent password management DASHLANE With free, Premium and Business options available,
application. With a free version on offer, moving up to Dashlane covers a huge user base. Its features are many
Enterprise levels for just €7 per month, Zoho allows unlimited passwords, access and it offers the user a high degree of encryption and security alongside all the
from all platforms, password tracking, offline access, auto-login for websites and usual auto-filling, two-factor authentication and the ability to export data.
much more.

88 ,QWHUQHW6HFXULW\
Top Ten Password Managers

KEEPER Keeper is a powerful and feature rich password manager that KEEPASS KeePass is a freely available, open source password manager
has Individual, Family and Business plans available for £20.99, that’s regularly updated and comes with a long list of
£44.99, and £22 per year respectively. With unlimited password storage, unlimited interesting features. You can import and export password data, it’s fully portable
device syncing, finger print login and secure cloud backup, amongst others, it’s so there’s no installation required and it adheres to 256-bit AES encryption.
certainly one to consider.

1PASSWORD 1Password offer an individual and Family plan for as little PASSWORD BOSS Password Boss offers both free and Premium
as £2.30 and £4 per year. With it you can access password plans, with the Premium plan costing around
across all your devices and operating systems; there’s offline access, automatic £24 per year. There are ample features to enjoy, including cross platform
synching, 1GB of secure storage available and a 365 day password history recovery. support, full military encryption, cloud synching and more.

TRUE KEY True Key is an excellent password manager with a free LOGMEONCE LogMeOnce is an award-winning password manager
and Premium plan available; the Premium plan costing that incorporates many interesting features. It’s ultimate
around £29.99 a year. It’s unique in that it utilises facial recognition as well as selling point, however, is a passwordless operation, whereby you are able to log
finger print, and integration with Windows Hello. There are plenty of other in to any website or service just by using facial recognition. Prices do vary across
options available too, so it’s worth looking into. the Premium, Professional and Ultimate editions but the personal version is free.

,QWHUQHW6HFXULW\ 89
Online Protection and Disaster Recovery

Windows 10 is continually improving and as such the new


updates have brought a more customisable degree of control
over the operating system’s privacy configuration; something
that Microsoft has always been criticised for in the past.

The length of breadth of online


shopping is far too vast to cover every
conceivable angle here. So rather than

10 Online
Shopping
Security Tips

focus on particular elements, here are


RUSH BUYING Don’t be
ten online shopping security tips to
fooled into
apply across the board. rush buying something that’s at a
ridiculously low price. If a site is selling
an iPhone for £20, then it’s more than
likely to be a ruse to lure you in and
steal your money.

FAKE SITES Ensure that you’re


buying from a real
website. Fake sites are remarkably easy
to create by the clever hacker and are
designed to steal your transactions. Be
wary of sites other than the big names.
While smaller online shops are fine, just BOGUS EMAIL Strange email
look into the type of security it’s using addresses are
and do some research before purchasing. something to look out for with suspect
online shops. If the support email or
contact information for the site is
something like: [email protected]
instead of [email protected], then
there’s most definitely something wrong.

90 ,QWHUQHW6HFXULW\
Shopping Online and Security

Remember to load STRONG PASSWORDS


USE HTTPS
up the online shop
Use a strong and unique password for
using HTTPS instead of HTTP. This will
all your shopping sites. Occasionally,
ensure that the transactions and data
although not often, websites can be
sent between you and it are encrypted to
hacked and the database of users is
the highest possible levels. If possible,
leaked. If your password is strong
use a browser add-on such as
enough, it will stand up to any
HTTPS Everywhere.
decryption methods.

SHOPPING APPS
AVOID PUBLIC Wi-Fi
If possible, always use an online
Tempting as it may be, don’t use a public
shop’s dedicated app rather than the
Wi-Fi access point to conduct any online
standard website. Websites can be
shopping. For one, you could be attached
compromised, however apps from
to an Evil Twin Wi-Fi point, where the
iTunes and the Windows Store, for
hacker is filtering all information through
example, can’t be altered by a
their system and two, all your data can be
third-party.
intercepted and potentially read.

3RD PARTY SECURITY Invest


PAYPAL If possible use PayPal
in one
or a Credit Card as
of the many third-party antivirus and
opposed to a Debit Card. Credit cards
malware suites, such as Bitdefender.
have an extra layer of protection and
These programs also offer extra security
legal standing than that of a debit card;
when shopping online and can help
PayPal features many protection
prevent any hacking or data interception
elements within its accounts too.
from happening whilst the transactions
are in progress. They can also check the
site you’re buying from, too.

BANK TRANSACTIONS
Always keep an eye on your bank
account and the transactions that go on
after you’ve conducted online shopping.
This will help you get an idea of what’s
going on and should something
suddenly crop up that looks suspicious,
then you’re able to inform your bank
before too much damage is done.

,QWHUQHW6HFXULW\ 91
Online Protection and Disaster Recovery

How to Remove a Virus or


Malware from a Windows PC
So far we’ve looked at ways to prevent getting scammed or indeed getting malware on your system
but what if you’re unlucky enough to already have some form of digital infection? Thankfully, there’s
a way to remove malware and viruses from your computer.

Malware Busters
For this tutorial let’s use a preconfigured rescue disk from Bitdefender. You need to transfer, or burn, the disk contents to a CD or a USB stick and boot into the
safe environment through one of those mediums.

Make sure you have a blank CD or a USB stick that’s at least 1GB STEP 3 Click the Next button and using the drop-down menu next to
STEP 1
in size. The Bitdefender Rescue Disk is downloaded as an ISO Removeable Drive choose the drive letter of your USB stick. Click
(which is an image file containing all the disk information) and can be Next to start the transfer of the image. Once the image is transferred click the
downloaded from www.download.bitdefender.com/rescue_cd/latest/ Finish button and remove the USB stick and power off your computer.
bitdefender-rescue-cd.iso.

STEP 2 To transfer the ISO to USB download Stickifier, which is an STEP 4 If you’re using a CD, start by inserting the CD into the drive. Locate
executable that doesn’t require any installation. Insert your USB the downloaded Bitdefender Rescue ISO, right-click it and choose
stick and double-click Stickifier. Click the Select an Existing ISO Image option Burn Disc Image from the context menu. Tick the Verify disc after burning option
followed by the three full-stops and using Windows Explorer, locate the and click the Burn button to start the process. Once the ISO is burnt to the disc,
downloaded Bitdefender Rescue ISO. Click the Open button to select the image you can power off your computer.
and continue with the process.

92 ,QWHUQHW6HFXULW\
How to Remove a Virus or Malware from a Windows PC

STEP 5 You now need to allow your PC to boot up into the Bitdefender STEP 8 You need to accept the license agreement notification first. Tick
Rescue CD environment. Power up your PC and open the Boot the I agree box, followed by clicking the Continue button. The
Option Menu. This could be accessed by pressing F12, depending on the make virus scanning software will then start to automatically update itself with the
and manufacturer of your PC motherboard. With the boot options available, latest virus definitions from the Bitdefender servers. The process won’t take too
select either the CD or USB stick and press Enter. long, so let it run through the update.

STEP 6 The PC will now boot into the Bitdefender Rescue Disc STEP 9 Once the update is complete you’re taken to the main
environment. This is a custom Linux operating system with all the Bitdefender Rescue CD antivirus interface. The three main
necessary Bitdefender security tools preinstalled. First, you need to choose options: Scan Now, Update Now and Settings are fairly self-explanatory; the
which language to load the environment. Use the arrow keys, and press Enter for Settings allows you to set a few more options regarding the scan, however the
your language choice. defaults will suffice.

STEP 7 Ideally you should use a wired Internet connection but if you’re STEP 10 To remove a virus on your PC, click on the Scan Now button.
on wireless, click on the network icon in the bottom right of the Select the drive you wish to scan and click the Open button to
desktop to establish a connection with your router. Once you’re connected to commence scanning the system. Any viruses found will be detailed along with
the Internet, double-click the red Bitdefender icon on the desktop, labelled options for removal. The process may take some time, so be prepared for a
Antivirus Scanner. lengthy wait.

,QWHUQHW6HFXULW\ 93
Advanced Security Tips

94 ,QWHUQHW6HFXULW\
INDEX

If you want to improve your Windows security further, then this section
looks at more advanced ways and means in which you can achieve that
goal. We cover firewalls, sandboxing and virtual environments and how
to tell which programs are communicating beyond your home network.
Our easy to follow tutorials will help you create a reliable backup of
Windows 10 and all your data, so should something happen you’ll be able
to restore your files with confidence.

96 Windows 10 Privacy Settings 114 Installing Windows 10 in VirtualBox


98 How to Check which Apps are 116 Creating VirtualBox Snapshots of
Sending Information Windows 10
100 What is a firewall? 118 Create a Windows 10 Recovery Drive
102 Improving the Windows 10 Firewall 120 How to Back Up Windows 10
104 Creating a Security Plan 122 How to Create a Windows 10
106 Windows Security Checklist System Image
108 What is a Sandbox? 124 Extreme Windows 10 Lockdown Tips
110 Running Windows 10 as a Sandbox 126 Cyber and Windows Quiz
112 Installing VirtualBox 128 What the Experts Say

,QWHUQHW6HFXULW\ 95
Advanced Security Tips

Windows 10’s new updates and special edition updates have brought a more customisable degree of control over the
operating system’s privacy configuration; something that Microsoft has always been criticised for in the past.

T
here are many advantages to this particular setup. A and typing privacy into the search box. Click on the Privacy
Windows 10 user will always be up to date with regards Settings option, with a padlock icon, and the core privacy
Windows 10 is said to security, options and support. Any new hardware options window will open. There are, at the time of writing,
to be the last true that’s released will be added to the vast driver database nineteen different options available to browse through. Each
Windows desktop that Windows 10 already uses and it will operate at its maximum option, when clicked, will display a subset of available options
potential. Microsoft can gradually roll out features that would that can then be enabled or disabled and turned on or off,
release, with the
require a brand new operating system, thus maximising the depending on your preference.
Redmond company capabilities of the OS. Of course, the company can charge for
For example the first option, General, offers the user a choice
certain additional features that would ordinarily be a part of the
of opting for advertising via apps, allowing websites to provide
OS, such as a media centre for example.
locally relevant content based on the user’s language list and
However, profit margins aside, it’s the rolling security and updates allowing Windows 10 to track how an app is launched to improve
that the user will benefit greatly from. As Microsoft evolves Windows search results. Whilst that in itself doesn’t sound too much like
Going 10, user and developer feedback can help improve the way the OS your privacy is being infiltrated, there are those who don’t want

Private protects its user base. A prime example is the new privacy settings
available post-Fall Creators Update, which was gradually rolled out
the installed apps and the OS having too much knowledge of
where they are and what to advertise. Like most privacy options,
to Windows 10 PCs around late October 2017. The privacy settings it’s a personal preference as to what you’re happy sharing with
and options that are now on offer are a radical improvement over the system and its connected technologies. Whilst opting to
the previous, rather bleak, features that came with the original turn every privacy setting on will inevitably open your use of
Windows 10 setup. Now, the user has greater control over what the Windows 10 up to whoever or whatever is readily receiving the
now opting for OS can and cannot do to affect an individual’s privacy. information, likewise turning everything off will effectively hide
a rolling release you (to some degree); but at the cost of possible loss of available
Providing you’ve applied the Fall Creators Update, you can view
features. There’s a fine balance needed to get the best from your
cycle, that will add the current privacy options by clicking the Windows Start button
privacy and still enjoying Windows 10’s many features.
or remove features
over time through There are some interesting additions to the
Fall Creators Update privacy settings, which
regular updates. are certainly worth looking over, if you want
a best of both worlds approach to privacy
and features.

96 ,QWHUQHW6HFXULW\
Windows 10 Privacy Settings

Location – The Location option will allow Windows 10 and its apps to use your Radios – This option will define which apps can control hardware such as the
current location to specialise any content. It’s innocent enough but for added computer’s Bluetooth device, Wi-Fi or any other kind of wireless receiver. Obviously,
privacy it’s worth considering turning it off. some apps will require access to share information or allow access to shared areas.
Camera – This is an excellent addition that will define which installed apps have Background Apps – Windows 10’s background task handling is far better than in
access to the computer’s webcam. You can turn off app access to the camera previous versions of the operating system. Memory is released as apps drop into the
globally or browse through the apps to decide which has access, or not. background, as is processor allocation. However, you can further define which apps
will be allowed to run in the background with this option.
Microphone – The same applies for the computer’s microphone; which apps can
access it or not, and whether you want to globally turn it off. Taking time to go through each of the available options is something every
Windows 10 user should do. This way you become familiar with how the OS shares
Contacts – The Contacts section details which apps can have access to your current
your account data and what exactly has access to your Windows 10 computer and
Windows account contacts. Disabling this globally may have a severe impact on
its hardware.
how some apps, such as Skype and email work.

You can control which apps have access


Which apps are allowed to run silently to the computer’s webcam. Handy for
in the background whilst you work? You keeping track of your privacy. . .
can decide whether they do, or not.. . .

Windows 10’s apps can access almost


Click the Windows Start button and type every element of your account,
privacy, click on the Privacy Settings link including your contacts. . .
and you see this screen . . .

,QWHUQHW6HFXULW\ 97
Advanced Security Tips

How to Check which Apps


are Sending Information
Most Windows 10 apps and programs have some element of code that will attempt to communicate
with an external source. That communication could be to check for the latest version, or patches and
updates, or it could be malicious software sending personal data.

Look Who’s Talking


There are a number of ways in which you’re able to view which programs and apps are sending data to Internet and external sources. Some methods are
better than others, so it’s worth trying them all to see which works best for you.

The first port of call to help monitor what apps are accessing the STEP 3 This is a reasonably accurate way of viewing which installed
STEP 1
Internet is Task Manager. Click the Windows Start button and type programs have been accessing the outside world. The amount of
task, then click the Task Manager result in the search box. You can also right-click data being sent to and from your PC can be quite illuminating, and surprising, as
the taskbar and select Task Manager from the available option in the menu. you may never even realise you have a particular app installed never mind that
it’s communicating with an external source.

STEP 2 With Task Manager displayed, click the More Details arrow (if it’s STEP 4 Another excellent method is by using the Netstat command. Click
available). This will expand the Task Manager options. From here, on the Windows Start button and enter cmd, then right-click the
click the App History tab and then the Network column so that there’s a Command Prompt option and choose Run as Administrator from the menu.
downward pointing arrow above it. This indicates network use in a descending When the message to authenticate the action pops up, click on Yes.
order of amount of data sent.

98 ,QWHUQHW6HFXULW\
How to Check which Apps are Sending Information

STEP 5 With the command prompt open enter the following: netstat -e STEP 8 In the activity folder, enter the following: netstat -e -s -p tcp -b >
-s -p tcp -b. The information populates the command prompt activity1.txt. This is the same command as before but this time
box quickly, so you need to scroll back up to the top to see it in its entirety. the output is being sent to a text file, named activity1.txt, rather than outputting
to the command prompt window.

STEP 6 What you’re looking at here is a list of programs, from the column STEP 9 Using Windows Explorer, locate the C:\activity folder you created
to the far left, with the IP address of its source and the destination and within the activity1.txt file. Double-click the activity1.txt file
address in the middle column; with a third column detailing if the connection is and it opens in Notepad where you’re able to view it without the often difficult to
established or not. It can be confusing to view at first but after a moment or two it read command prompt window.
should begin to make sense.

STEP 7 If you want to create a friendlier way of viewing Netstat active STEP 10 If you want to simplify the information and the process, enter:
connection data, you can pipe the contents to a text file. For netstat -b 5 > activity2.txt into the command prompt within
example, in the command prompt enter cd\ to take you to the root of the C: the activity folder on the C: drive. This will record the information and only write
drive. Then create a new folder to store the text file with md activity, and enter it the data once you’ve pressed Ctrl+C, which stops the process. Use this for
with cd activity. around two minutes to get a record of what’s going on.

,QWHUQHW6HFXULW\ 99
Advanced Security Tips

What is a Firewall?
The data packets that come and go between your PC and the outside world can be defined by a set
of rules. These rules state whether a packet has access to the system in the first place, then whether
or not it can gain access to its destination program. Collectively, these rules make up a Firewall.

Great Walls of Fire


The term firewall comes from fire prevention, where a physical wall is constructed in order to halt the spread of a fire. In digital terms, the physical wall stops
malware and other threats from spreading into the system.
Some form of digital protection against unwanted entry into a system has existed could miss out on regular updates, fixes, patches and so on. One of the key benefits
for many years but the more recent software side of a firewall, one that we’re to an application-layer firewall is that it’s excellent at blocking specific content,
reasonably familiar with, has only been around since the ‘80s. such as known malware and viruses or dangerous websites. It’s also capable of
determining when a particular protocol is being misused by a rogue application.
Prior to the modern firewall, system administrators blocked unwanted access
through various stages of hardware layers. Long lists of allowed computer addresses Where the firewall proceeds from this point is unclear. However many experts agree
were painstakingly entered into mainframes and routers, where programmable that although we’ll always need a firewall, the modern systems, networks and
chips filtered the white list and simply stopped all access to addresses that weren’t devices have so many potential access points that it’s fast becoming less efficient
on the list; think of a nightclub bouncer, if your name’s not on the list you’re not to run the standard firewall model. In effect, the modern firewall, regardless of how
getting in. complex and efficient it has become over the years, is quick becoming a bottle-neck
for the operating system. What some experts are theorising is that at some point in
In its simplest guise, a firewall will look to a defined set of rules then apply those
the future, the need for a single, overall firewall will be outdated and that the next-
rules to any data packets that pass through it. For example, if you’ve created a
generation operating systems will require each program and application that can
rule whereby all Telnet traffic is blocked, any packet that’s trying to reach port 23,
be installed to act as its own firewall. Whether this will come about is pure fantasy at
the port that Telnet applications listen on for data, will be blocked. While suitably
the moment but at the speed digital technologies grow and evolve there’s a good
effective this low-level packet filtering does have its Achilles heel, in that it treats
chance of finding out soon enough.
each packet as an independent piece of data: not knowing whether it’s a part of
an already established stream of data. This can be targeted by hackers who want
access to a system with a firewall in place. The clever hacker is able to spoof a
packet and thus tricking the firewall into letting it pass. It takes some time, and it’s
a bit hit and miss, but most hackers have plenty of patience when it comes to
getting into a network. Therefore a much needed higher degree of firewall
monitoring is called for.
Stateful Inspection firewalls were introduced in the mid ‘90s and
enabled a firewall to log all the connection that passed through it
determining what was the start of a new packet stream, part of
an existing packet stream or something random. This allows a
Hardware firewalls are an early
firewall to allow or drop any access based on a data packet’s
history. In terms of effectiveness, this makes the firewall more
example of network security
efficient and faster at dealing with connection requests as it
doesn’t need to continually analyse each packet as an individual
but rather as a whole stream. For added layers of protection, if a
packet doesn’t match any of the connection histories, then it can
be evaluated and filtered through the various rules to determine
its legitimacy.
A further layer of protection was included into the basic firewall early
in the 2000s. Application-layer analysis enabled firewalls to inspect
packets that were targeting individual applications within the operating
system. Each program or application installed in the system will use a set of
protocols to communicate with the outside world. When an application is installed,
on a Windows 10 system for example, the installation mechanism will automatically
add an instance of it to the Windows 10 firewall. This means that it is able to send
and receive information successfully through the Windows firewall without any of
it being blocked. By blocking an application’s access to the outside world, the user

100 ,QWHUQHW6HFXULW\
What is a Firewall?

“The built-in Windows 10 firewall is “When each program, application,


certainly good enough for most users’ game and so on is installed, it is
needs. It’s fast, effective and can be entered into the Windows 10 firewall
easily configured.” so it can communicate with the
outside world.” “There are countless freely
available third-party firewall
clients. Some are very good,
others not so much.”

,QWHUQHW6HFXULW\ 101
Advanced Security Tips

Improving the
Windows 10 Firewall
The built-in Windows 10 firewall is a surprisingly good security application. Whilst it may not be
as efficient as something offered by one of the third-party security suites, it’s certainly more than
adequate for the average user.

Getting to Know Your Firewall


Generally, there’s little need to ever configure the Windows 10 firewall. However, getting to know how it works and improving it is part of being more security-
conscious. Here’s some tips on how to manage it better.

You can open the main Windows 10 firewall console window by STEP 3 Down the left-hand side are some links that will help you
STEP 1
clicking on the Windows Start button and entering firewall into the configure and improve the firewall, as well as turning it on or off
search box. Click the returned link, Windows Firewall Control Panel, to launch it. (which isn’t recommended under any circumstance other than the installation of
an improved third-party firewall). To begin with, start by clicking on the Advanced
Settings link.

STEP 2 The Windows 10 firewall console window starts by detailing the STEP 4 The Advanced Settings link launches a new console window. This
basic status of the firewall. It should be On by default, unless new console defines the inbound and outbound rules for the
you’ve installed a third-party security suite which contains its own firewall. There entire system and its installed programs and applications. You can set
are two kinds of network listed, Private and Public. Private is for home or work, authentication rules between computers, view and create new firewall rules, view
whereas Public is for cafés and the like. the current firewall policies and even monitor what’s being blocked in realtime.

102 ,QWHUQHW6HFXULW\
Improving the Windows 10 Firewall

STEP 5 Click on Inbound Rules to the right-hand side of the main STEP 8 Sometimes, uninstalling a program doesn’t automatically remove
console window. This will list the current rules that allow traffic it from the Windows firewall. The exact reasons why are varied but
into your computer and to the applications that require it. For example, in this to help improve the efficiency of the Windows firewall, whenever you remove a
screenshot there are rules for various games that allow multiplayer interaction program from your system, it’s worth checking the firewall to see if its entry has
and the ability to ‘talk’ to the game server as well as install updates. been deleted. To delete an entry, right-click then select Delete from the menu.

STEP 6 These rules are automatically entered into the firewall when you STEP 9 You may not want to delete a rule as it could be used later or if
install the program, game or app. When you install a program you reinstall the program and it fails to recreate the firewall entry.
you’re required to accept and authenticate the process, clicking on Yes to start The recommended process then is to block the rule from communicating with
the installation. This level of administrative access also allows entry of the the outside world. To do this, double-click the rule and from the General tab click
program into the firewall. Pick one of the entries and double-click it. the Block the connection button.

STEP 7 The properties of each firewall entry allow a greater degree of STEP 10 Similarly, the Outbound Rules link will detail the various
control for that particular program. You can change the name of programs that are allowed to communicate from your computer
the entry, allow or block the connection, define the physical location of the to an external destination. It’s good practise to familiarise yourself with the rules of
program on your computer, allow access to the program from remote the firewall, as a rogue program will need to set a rule to communicate. You can
computers, set the protocol and port number it uses and even which network then block that rule and stop the threat from reporting back.
controller to use.

,QWHUQHW6HFXULW\ 103
Advanced Security Tips

Creating a Security Plan


A security plan will help you form a better strategy when it comes to tackling your Windows and
home network security. A good plan will help keep on top of backups, updates and possible areas of
weakness that malware or hackers can exploit.

Plan for the Worst, Hope for the Best


There’s a lot to consider when coming up with a good security plan. It’s not just a case of occasionally checking for an OS
update on your own computer, you have to take into account other computers and the entire network.
An effective security plan should encompass the whole of your network, which includes Windows computers, Android and iOS
devices, your router, any powerline adapters, Wi-Fi coverage, access passwords and even where the Ethernet cable runs through.
It may sound a little extreme but like most checklist-type scenarios it can be as in-depth as you like.
However, it’s worth at least considering some aspects of the home network and overall security
before starting a plan.

Users Updates
More than likely the ‘user’ is the most Obviously a must-have section of a good security plan is to regularly
vulnerable point of access and the check for system and program updates. Thankfully, Windows 10 and
biggest security threat to any system most security suites will run an automatic check whenever the system is
or network. Whilst you can have the greatest powered up and connected to the Internet. However, there’s always some
AV suite and water-tight security system point where an update failed to initialise for some reason or another.
in the world, the user who carelessly visits Therefore, it’s often best to manually check.
unbeliveableandobviouslyfakedeals.com is the
Consider too checking for updates for the most frequently used programs.
one that’s going to cause you the most headaches.
“Users form Microsoft Office, GIMP, your browser and even games will inevitably have
In a home network that’s often youngsters, those
the most an update available which can enhance, protect and improve the security
who don’t quite understand the whole Internet
vulnerable of the program. After that, make sure that the other installed programs
security element.
point of access on the system are up-to-date too, as it’s best to make sure there’s few
for security on Whilst most youngsters are more tech-savvy weaknesses as possible.
any system. than us adults, there’s an age range where they’ll
Educate and happily click a link from a friend or something
make sure they’ve seen that looks cool. Therefore take Programs
they’re safe.” the time to educate and frequently check their It can be difficult to keep track of what programs are installed on a system
accounts or computers for anything suspicious. but it’s not impossible. If you’re serious about the security of your home
If possible enforce limits to their browsing network and its systems, then taking stock of what programs are installed
and regularly update the browsing rules to on each system is worth doing.
make sure they’re not going where they
shouldn’t. Remember, it’s not just viruses Running through a checklist of installed programs you may notice one
that a child can download, they could that shouldn’t be there. A quick lookup of the program may reveal that
potentially see something that would affect it’s a popular backdoor for hackers to get into a system and the attached
them emotionally. network. That being the case, it needs to be removed and any firewall
entries checked and disabled.

104 ,QWHUQHW6HFXULW\
Creating a Security Plan

“Router security is vital


but it’s placement
“Keep all your
in the home is
software up-to-
important too. Not
date, including AV
just for effective
suites, programs
signal reach but
and the operating
also to stop
system itself .”
others from
hijacking it .”

“Make sure that all


the important data
is backed up to an
external source as well
as off site, such as a
cloud service. That
way if you end up with
a complete loss of
data, you can recover
it easily. ”

Routers Backups
The family router is the first point of access for anything malicious on the network, We’ll cover backups in a few pages time but for the meantime though making sure
since it’s the gateway to the outside world. Make sure that the router software is up-to- that each account and computer is regularly backed up can take much stress out
date and that it’s using the best possible wireless security standards and encryption. of a security situation. If you’re unlucky enough to catch a virus or other malware,
or are unfortunate enough to be hacked, you’ll need to act quickly to prevent any
It’s also beneficial to make sure that the router’s admin password and access
loss of personal information. This usually means wiping your computer completely.
passwords are hidden from sight. It doesn’t take much for someone to look through
the front window and make a note of a router password that’s carelessly on show for Having a good and reliable backup solution will help you recover your valuable data
all to see. Consider too, that not all visitors to your home are going to be chivalrous in no time, should you ever need to wipe everything or all your data is compromised
towards viewing your network password. through malware. It’s also worth thinking of investing in a fireproof safe to store your
backups along with cloud options for off-site backup security.
It’s also worth tracking the range of the wireless signal from the router. By installing
and using a good Wi-Fi scanner on a mobile device you can tell where the Wi-Fi
signal from your router lies beyond your home. Whilst it’s good to have a powerful
signal, it won’t take much for someone to sit nearby with a laptop (or a neighbour)
Cabling
and hack into your network. A Wi-Fi analyser will help you determine the best It’s not always something you need to check but ensuring that the home’s Ethernet
placement for security and more efficient use of the signal. cabling is secure is an essential element to network security. For example, if you
live in shared accommodation, it’s possible for a neighbour to be able to be able
to connect to your Ethernet cable and steal your bandwidth or gain access to your
Passwords network resources.
It’s not common for a home user to frequently change their password to the same If you can implement all or just some of these elements into your plan, you will be
degree as would an office worker but it’s certainly something worth implementing. well on the way to making sure that your home network is as secure as possible,
Using a combination of a good password manager and generator, you can set a 30- without becoming too paranoid over potential threats from outside sources. After
day password limit for all users and their access to the sites they visit. all, you lock your doors when you’re not at home so why shouldn’t you lock your
network too.
It might sound like an awful lot of hard work on the part of everyone involved but
weak passwords and the same password being used across Facebook, banking
and gaming is a huge security vulnerability.

,QWHUQHW6HFXULW\ 105
Advanced Security Tips

Windows Security Checklist


Taking the time to write down an effective security plan for your home
network will pay dividends in the long run. With it you’re able to spot
potential leaks in security, secure your home network, Wi-Fi and
powerline adapter technologies, and ensure digital peace of mind.

Naturally, this is just our example and


will probably be different to your We’ve come up with
own setup and depending on the a template security
equipment you have available
to you. For the sake of this
checklist that you
publication we’ve taken a more can use to create
generic approach but it’s your own, for your
worth using it as a foundation
from which you build your
own, personal and unique
checklist. Your checklist
can be as intricate as you
like, detailing specific Plan
hardware or software
on one or all your
Ahead
computers, devices and
so on, that needs to be
updated regularly. Just
remember though, there
is a point where you can home network.
become a little too security Remember to tick
conscious. Whilst it’s great to be each section and
prepared for anything, and run
remember to keep
your home network like a veritable
digital Fort Knox, it can take up a checking regularly
substantial amount of your time applying patches and alter it as new
and checking off every item on the list. Therefore, devices are added.
look for a happy medium, whilst remaining vigilant
against digital threats.

106 ,QWHUQHW6HFXULW\
Windows Security Checklist

Checklist
e
Installed Rogu pp
A
Router min password
and Program and twork for its list ne
your router’s ad mputer on the e
M ake sure th at
re, unviewable Check each co e’s anything in ther
ds are in a secu e og ram s. If ther it if
access passwor when they com of installed pr it and rem ove
So visitors can’t see them
do es n’t look right, research s installe d
place. that program
e. ake a note of the re
into your hom ne cessar y. M te) and co m pa
ot or physical no
(as a screen sh
Wi-Fi Securitd chyeck that the Wi-Fi is
fre qu en t chec k.
them with each
et
Login in to your
using W PS 2. Th
router an
en check the curre
u
ntly attached
us e any other
Password R-deay,spassword reset. Each
an omalies. If yo ually 30
device s for an y
le check it’s still Set a regular, us reset all their
security, doub er sh ould be able to make sure
form of router set routers. individual us e they visit and
updates can re for every sit se
functioning as passwor ds g are strong. U
ds they’re usin
ioning the pa ssw or ne rato r if
that ord ge
Wireless Pos it a password man
ager and passw
tablet, needed.
your phone or
alyser on
Using a Wi-Fi an ss signal from ity
Firewall Intoneeagchrcomputer, and
th e im pa ct of the wirele d
mea su re to the street an
reaching out in
the router. If it’s us e, then co nsider
e rear of the ho Check that the
firewall that
not so much th e signal power
and d running and
in g it. Ke ep an ey e on th
tentially any devices, is up an inbound and
mov
.
po
gu e prog ram s within the
weak locations there’s no ro
s set.
outbound rule
OS Update system updates on all a ck up Imp o r tant
Check for any op
erating
ile devices that
B
Windows mob
the com pu ters
connect to the
and
home network. Files mputer and de
vice is
each co
Update Make sure that ely
how to effectiv
Security Suecitk eon any antivirus larly ba cked up. We’ll cover r on. Back
regu r late
ws 10 compute
back up a Windo en ts and keep the backup
date ch rtant docu m a
Run a similar up -party security up im po er purchasing
N clients or other third py so m ew here safe; consid
clients, VP co
applications. fireproof safe.
programs and
Update
Program & Aonpfrepquently used
checks
Run any update that, run as
d ap plications. After rams on all
programs an her installed prog
dates on ot
many up
rs.
your compute

,QWHUQHW6HFXULW\ 107
Advanced Security Tips

What is a Sandbox?
Sandboxing is an important security technique that’s used by companies and individuals the world
over. It’s not something the average user will normally come across but you can guarantee that every
piece of software you use has been sandboxed at some point in its development.

Playing in the Sand


Everyone from software developers and security experts to the hackers themselves will use a sandbox environment to help build and test their products; so
what exactly is a sandbox?
Just as the name suggests, a sandbox is a place where you can do something different elements, both hardware and software, that work together to make up the
without it affecting the surrounding area: visualise a sandbox in the middle of computer that you’ve customised and personalised. A developer, security expert or
a garden. In digital security terms, this means a sandbox is a tightly controlled software tester can never hope to create something that works 100 percent with
environment that’s isolated from the main operating system where a person can every Windows 10 desktop system that’s out there.
test or analyse software and its impact on a virtual system.
It’s generally accepted then that when testing in a sandbox it’s advisable to use
The sandbox can be one of a number of implementations: web based, operating as common a hardware and software setup as possible. This way, the developer
system based, program based, network based or even emulating interaction with will likely create a program that works on as high percentage of the computers
the Internet. There are countless more examples, each depending on what exactly available. Those computers that differ from the norm, and that may require a little
is being tested and what functions are required to complete the test. more work for the product to install and work on, can then be dealt with through
minor patching and bug testing.
For security, a sandbox is usually an extremely isolated environment that doesn’t
have access to anything on the company network, or any contact with a host So what’s this got to do with you, we hear you say. Well, there are ways in which
machine. Here the security expert is able to conducts tests on untrusted pieces of you can create your own sandbox environment to test in. Consider how many
code, known malware and viruses and even website content. Should those tests times you’ve downloaded software from the Internet and executed it without
reveal something nasty within, the security expert is able to work their magic and even examining how it may affect your computer. How many times do you visit
develop a fix that can be further tested and finally deployed to the company’s websites and happily click on whatever message may appear without even reading
servers, where it’s downloaded as updated virus definitions by the security suites it properly. With your own sandbox environment, you can download and install a
and applied to a customer’s computer. piece of software and see how it runs within a test setup without it ever impacting
your real machine. If you get into the habit of testing every bit of software in a
Imagine that from the point of view of a hacker, then. The hacker has developed
sandbox first, you’ll certainly be glad should the day come you discover a hidden
a particularly nasty piece of code that could bring down government agencies
virus in the folds of an otherwise harmless looking program.
and cause widespread panic among the global digital community; they’re hardly
going to test it on their own computer. They need to create a sandbox environment
whereby they can trigger the malware, ransomware or whatever, and let it run
its course. In the meantime they can run through various procedures
to try and wipe the malware, as a security expert would, to find any
weaknesses. Once they’ve perfected the malware and wiped out
any perceivable vulnerabilities, they can then happily upload
it to the Internet and sit back as the world is infected with
their code.
It’s not always the testing of malicious code that’s Using a virtual machine as a
associated with sandboxes. For example, the words
you’re reading now were written using Office 365/Word
2016. Before the product was released by Microsoft, the
sandbox is a great way to test
development team behind Word will have gone through
extensive testing, making sure that all the individual
programs for every version of
components within and that make up Word 2016 all
worked. To do so, they will have used a dedicated and Windows, not just the latest
separate environment to the one they’re using to program
on. This specialised environment will have mimicked a real
world setup as much as possible, so that when the developer
wanted to test something they could compile the code and
execute it in an environment that wouldn’t affect their normal day-
to-day workplace.
The often severe lockdown of a sandbox system does make it difficult to emulate
what the average user may be using. The standard desktop computer has many

108 ,QWHUQHW6HFXULW\
What is a Sandbox?

“VirtualBox is considered to be one of the leading


and easiest to use virtual machines, where you can
create a sandbox environment to test in.”

“Sandboxie is an environment
designed to allow you to test
programs without them being
installed on your computer.”

,QWHUQHW6HFXULW\ 109
Advanced Security Tips

Running Windows 10
as a Sandbox
We’ve already talked about how a sandbox works and essentially what one is in terms of
computing and security. However there are many advantages to creating your own virtual sandbox
environment. It’s not always purely to test suspicious code, as you’ll soon discover.

Sand Between Your Toes


If you’re still convinced that a sandbox environment can help you out, then read on. We’ve compiled a list of ten reasons why creating your own Windows 10
sandbox is beneficial to the average user.

Within the Windows 10 virtual sandbox environment SAFE BROWSING Within a virtual environment you can browse a site
OLD PROGRAMS
you may be able to run older programs that would without any of its code being written to the main,
normally fail, even in compatibility mode, under more modern hardware drivers. host computer. This could simply be cookies and other such relatively harmless
Often an older program will look for a specific driver set, if it’s too modern then it additions to sites or it could include data miners and malicious links.
can fail. Virtual environments use older type drivers by default.

HOST PROTECTION If you think that a download link or email SOFTWARE TESTING If you’re serious about your security and the
attachment may contain a virus, then opening safety of your home computer, then you
it in a safe, virtual environment is the safest bet. Of course, you shouldn’t open should be downloading and installing software in a test environment first before
any unknown email attachments but if you need to, do so in a sandbox. The applying it to your real computer. A virtual environment is a great place to see how
virus will infect the sandbox and not the host (real) computer. software works and whether it’s worth installing or not.

110 ,QWHUQHW6HFXULW\
Running Windows 10 as a Sandbox

VIRTUAL OS The beauty of a virtual environment, such as one created SAFE DEVELOPMENT If you’re considering developing your own
by VirtualBox, is that you’re able to run Windows, macOS software and apps, then using a virtual
and Linux operating systems on top of your host operating system, whatever environment is an ideal place to test the code as you create it. Should a function
system that may be. You can install Windows 10 within a virtual environment you’ve written have an adverse effect on the OS, then you won’t damage your
whilst using Linux or macOS, or vice versa. working system.

VIRTUAL BACKUP It is possible to create a virtual copy of a physical


machine. This is an excellent way of making sure
that the entire machine, that is a snapshot of the OS as it was when copied, is safely
backed up and accessible regardless of what operating system you choose to use. FAMILY FRIENDLY If you have a single-family computer, a virtual
environment is a great place for the kids to go
without fear of them potentially breaking the system. It doesn’t happen often,
kids are mostly more tech-savvy than adults but little fingers do have a habit of
clicking things they’re not supposed to. Virtual environments can be backed up
and redeployed easily.

SECURE ANONYMITY Within a virtual Windows 10 environment


you’re able to create an anonymity system.
By this we mean, you can install a VPN and use the Tor network and surf the
Internet without fear of being traced; and what’s more, none of it will affect your
host operating system.
RESTRICTED ACCOUNTS Again, using children as an example, a
virtual child’s Windows 10 account can
come with all manner of restrictions and monitoring software, to stop them from
wandering into the scarier parts of the Internet, such as installing Net Nanny.
Again, these controls won’t affect the host computer or adult accounts.

,QWHUQHW6HFXULW\ 111
Advanced Security Tips

Installing VirtualBox
Oracle’s VirtualBox is one of the easiest virtual machine platforms for the beginner to experiment on.
Within it you can install Windows, Linux and even macOS for sandbox testing, without ever having to
alter your main computer’s setup.

Going Virtual
Using a Virtual Machine (VM) will take resources from your computer: memory, hard drive space, processor usage and so on. So make sure you have enough
of each before commencing.

STEP 1 The first task is getting hold of VirtualBox. If you haven’t already, STEP 3 With the correct packages downloaded, and before you install
head over to www.virtualbox.org and click on the large anything, you need to make sure that the computer you’re using
‘Download VirtualBox 5.1’ box. This will take you to the main download page. is capable of hosting a VM. To do this, reboot the computer and enter the BIOS.
Locate the correct host for your system, Windows or Mac, the Host is the current When the computer starts up, press the Del, F2, or whichever key is necessary to
installed, main operating system, and click to begin the download. Enter Setup.

STEP 4 Each BIOS is laid out differently so it’s very difficult to assess where
to look in each personal example. However, as a general rule of
Next, whilst still at the VirtualBox download page, locate the thumb, you’re looking for Intel Virtualisation Technology or simply Virtualisation:
STEP 2 usually within the Advanced section of the BIOS. When you’ve located it, Enable it,
VirtualBox Extension Pack link. The Extension Pack supports USB
devices, as well as numerous other extras that can help make the VM save the settings, exit the BIOS and reboot the computer.
environment a more accurate emulation of a ‘real’ computer.

112 ,QWHUQHW6HFXULW\
Installing VirtualBox

STEP 5 With the computer back up and running, locate the STEP 8 When installing VirtualBox your network connection will be
downloaded main VirtualBox application and double-click to disabled for a very brief period. This is due to VirtualBox creating
begin the installation process. Click Next to continue, when you’re ready. a linked, virtual network connection so that any VM installed will be able to
access the Internet, and your home network resources, via the computer’s
already established network connection. Click Yes, then Install to begin
the installation.

STEP 6 The default installation location of VirtualBox should satisfy most STEP 9 You may be asked by Windows to accept a security notification.
users but if you have any special location requirements click on Click Yes for this and you might encounter a dialogue box asking
the ‘Browse’ button and change the install folder. Then, make sure that all the you to trust the installation from Oracle; again, click yes and accept the
icons in the VirtualBox feature tree are selected and none of them has a red X installation of the VirtualBox application. When it’s complete, click Finish to
next to them. Click Next to move on. start VirtualBox.

STEP 7 This section can be left alone to the defaults, should you wish. It STEP 10 With VirtualBox up and running you can now install the
simply makes life a little easier when dealing with VMs, especially VirtualBox Extension Pack. Locate the downloaded add-on and
when dealing with downloaded VMs, which you may encounter in the future. double-click. There may be a short pause whilst VirtualBox analyses the pack but
Again, clicking Next will move you on to the next stage. you eventually receive a message to install it; obviously click Install to begin the
process, scroll down the next screen to accept the agreement and click I Agree.

,QWHUQHW6HFXULW\ 113
Advanced Security Tips

Installing Windows 10
in VirtualBox
Installing Windows 10 within a VM carries with it a clause: you need to make sure you have a valid
license. However, if you’re testing something then you can use the Windows 10 Enterprise Evaluation
image, which will last for 90 days.

Window Installations
Naturally you might own a spare Windows 10 license to use for the VM but for this tutorial we’re going for the 90 day Windows 10 Enterprise Evaluation model.
To begin with, browse to https://microsoft.com/en-us/evalcenter/evaluate-windows-10-enterprise.

STEP 1 You need to register with Microsoft prior to being able to STEP 3 You need to set an amount of memory from your host computer
download the Windows 10 image; simply click the Register to use as virtual RAM for the VM. Naturally, you don’t want to take
button and fill in the required fields. When done, click Continue and choose the too much as your computer will suffer due to low memory when the VM is
ISO Enterprise option, then your language choice and 64-bit, followed by the running. Ideally, you need to allocate around 2GB of memory to the VM. Click
Continue button once more to begin the download. Next when ready.

STEP 2 The ISO you’re downloading is around 4GB in size, so it may take STEP 4 The next section will enable you to create a virtual hard disk, in
some time, depending on the speed of your connection. Open which the Windows 10 virtual machine can be installed. The
VirtualBox and click on the New icon located in the top right of the main VirtualBox default option: ‘Create a virtual hard disk now’ is recommended, then click the
window. In the Name field enter Windows 10, this should automatically change Create button to proceed. The pop-up box will detail the type of virtual hard disk;
the Type and Version fields accordingly. Click Next when ready. stick to VDI and click Next.

114 ,QWHUQHW6HFXULW\
Installing Windows 10 in VirtualBox

STEP 5 The default Dynamically Allocated option will suffice for this STEP 8 The Windows ISO will now load, and begin the installation
instance, so click Next. VirtualBox recommends that you process. The first options you need to set are the language, time
allocate 32GB of physical hard drive space to creating the virtual hard disk. and keyboard. Set your preferences, although the default is English US to begin
Make sure your hard drive has enough spare capacity and click the with, and click on the Next button when you’re ready to continue.
Create button.

STEP 6 The Windows 10 VM is now listed in the available VMs in STEP 9 You now have an Install Now option available. Click it to begin the
VirtualBox. Before you begin to install it though, click on the installation, then tick the license agreement box followed by
Settings icon whilst the Windows 10 VM is highlighted. In the General tab, click Next. There are two possible options to install Windows 10, Upgrade and
Advanced and enable Bidirectional for Shared Clipboard and Drag ’n’ Drop. In Custom. Since this is a blank hard drive, the Custom option is the only viable
Display, enable 3D and 2D Video Acceleration. Click OK to finish. mode. Click it to continue.

STEP 7 With the Settings console window closed, and the VM highlighted, STEP 10 The drive available will be the 32GB virtual hard disk you
click on the Start button. This will open a new window, asking for created. Click on the New button, then Apply to create a new
the location of the Windows 10 ISO you downloaded from the Microsoft site in valid drive that Windows 10 can be installed on. You’ll be asked what additional
the first few steps. Use the folder icon to locate the ISO and click Open, then the partitions will be created, click OK to accept. Choose the largest partition size and
Start button to commence the installation. click Next to install Windows 10.

,QWHUQHW6HFXULW\ 115
Advanced Security Tips

Creating VirtualBox
Snapshots of Windows 10
One day the testing process of a Windows 10 VM will inevitably leave the system in a broken or
malware riddled state. You can wipe it and start again but a far better solution is to create snapshots,
so you can easily revert to a previous build.

Take a Snapshot
Setting up Windows 10, installing the drivers, updates and programs takes a fair amount of time. If you take a VirtualBox snapshot, you can return to where
you left off in an instant.

STEP 1 To begin with open VirtualBox. If it’s already open, shutdown the STEP 3 You can see that the state of all the virtual systems is currently
Windows 10 VirtualBox image you created. It’s not necessary but Powered Off. To create a Snapshot of the Windows 10 VM, click to
it’s often easier, to ensure the VM is closed prior to creating a snapshot. highlight the system’s entry in VirtualBox, then click on the Snapshots button (it’s
a camera icon), located to the far-right of the VirtualBox console.

STEP 2 A Snapshot in STEP 4 At present there aren’t any Snapshots of Windows 10 available. To
VirtualBox is create one, click the camera icon just above the words Current
simply an image of what the State, the icon at the opposite end of the sheep icon. This will launch the Take
virtual machine ‘looked’ like Snapshot of Virtual Machine console window.
at the time the Snapshot was
taken. You can make multiple
Snapshots and revert to any
whenever you wish.
Snapshots taken are labelled
next to the name of the VM.

116 ,QWHUQHW6HFXULW\
Creating VirtualBox Snapshots of Windows 10

STEP 5 If you want you can name the Snapshot: Installed and Updated STEP 8 If you click the Details of the named virtual machine icon, the one
for example, along with a description to help identify it easier next to the sheep, represented with an orange circle, you can
from the other Snapshots you may eventually end up making. It’s not hugely view the VirtualBox settings of that particular Snapshot. This way you can assess
important but if someone else wants to load up Windows 10, they know which any issues that may arise with other virtual machines; here you can see which
Snapshot to go for. When you’re done, click the OK button. settings worked and which didn’t.

STEP 6 The process happens almost instantly and you’re left with an
entry in the Snapshots section detailing the named Snapshot,
how long ago it was taken and a Current State entry. The Current State is literally
its state when you boot it up. With it highlighted, you can take more Snapshots STEP 9 You shutdown the guest system, as mentioned in Step 1, but
by using the camera icon again. VirtualBox guest doesn’t need to be shutdown in order for a
Snapshot to be taken. For example, prior to installing an experimental program,
click the Machine entry in the VirtualBox top menu bar and choose Take
Snapshot. The process works the same way as in Steps 4 onward.

STEP 7 If you click the named Snapshot, you get more options available STEP 10 Each Snapshot taken can easily be reverted to, cloned, deleted
in the toolbar just above. Here you can Restore a selected and so on. However, Snapshots are stored by default in the
Snapshot, if you have multiple entries. You can Delete a Snapshot and view Users/username/VirtualBox VMs folder in Windows. If you’ve only a limited
detailed information regarding one; and with the sheep, you can Clone the amount of space on your C:\ drive, you may want to set the path to a bigger hard
current Snapshot as a new virtual machine. drive in the File > Preferences option in VirtualBox.

,QWHUQHW6HFXULW\ 117
Advanced Security Tips

Create a Windows 10
Recovery Drive
Since Windows 95, Microsoft has offered users the ability to create a recovery drive, which is used to
help troubleshoot a Windows PC that is failing to boot, by presenting various options. If you haven’t
done so yet, you ideally should have created a Windows 10 recovery drive.

Time to Recover
You need an 8GB USB drive minimum, in order to successfully create a recovery drive. It wipes the contents off the drive and you won’t be able to use it for
anything else, so make sure it’s labelled and stored in a safe place.

STEP 1 Insert the USB drive into your PC and close the Explorer window STEP 3 There’s a short wait as Windows analyses the available locations
that opens upon insertion. Click the Windows Start button and where it can install and create the recovery drive. Eventually,
type recovery, then click on the Recovery Control Panel. In here you can see providing you inserted the 8GB plus USB stick prior to starting the process, you’re
several options available; you want the first, Create a recovery drive. asked to select the destination from those Windows has discovered.

STEP 2 Click the Create a recovery drive link and accept the UAC STEP 4 In the example we have here, there’s just one possible location, the
authentication message that pops up. First, there’s the option to F:\ drive. If you have more than one possible destination available,
backup any important system files to the recovery drive, alongside the usual make sure that you’re selecting the correct USB drive for your recovery drive. When
recovery options. This is a good idea as it can replace these vital files in the event you’re ready, click on the Next button.
of a boot failure. Click Next to continue.

118 ,QWHUQHW6HFXULW\
Create a Windows 10 Recovery Drive

STEP 5 Before committing to creating the recovery drive, Windows will STEP 8 Store the drive in a safe place, as it can restore vital system files
offer one final warning. Remember, everything that’s currently should anything ever go wrong with your system and leave it
on the USB stick you chose as the recovery drive will be erased during the unable to boot. Should something go wrong, you see the Windows 10 safe mode
process of creating the drive. If you have any files stored on it, make sure they’re boot options when you try and power up your computer.
backed up to another location.

STEP 6 When you’re ready click on the Create button to start the process. STEP 9 From the safe mode boot options, choose the Troubleshoot tile
It may take some time, depending on the speed of the USB stick followed by Advanced Options. From there you can choose the
used, as Windows prepares, formats and copies the utilities and files over to the System Restore and System Image Recovery options along with your rescue
USB recovery drive. drive to help you recover Windows.

STEP 7 When the process is complete, you receive a recovery drive is STEP 10 Alternatively, set the BIOS to boot to the newly created recovery
ready message. The only option available to you is to click the drive and follow the onscreen instructions to launch the
Finish button. This will close the recovery drive window and return you to the recovery method. Start by choosing your language, then select the Troubleshoot
Recovery console. option and then opt for one of several recovery options.

,QWHUQHW6HFXULW\ 119
Advanced Security Tips

How to Back Up
Windows 10
Even with the greatest possible cyber protection in the world guarding your computer, there’s still
a chance something could go wrong. It might not even be malware-related; a broken hard drive or
other component can cause as much grief. Therefore, you need a good backup.

Backing Up
Computers are unpredictable beasts, so you need to make sure that all your files and important data are securely backed up and more importantly, you’re
able to restore them easily. Thankfully, it’s a straightforward process.

STEP 1 Windows has, since its early days, featured some form of backup STEP 3 Ideally you need to insert a reasonably sized USB stick or use a
tool. Windows 10 was launched with the File History backup tool, second hard drive in your computer. If you have a USB stick,
which is a simple to use tool to ensure stable and regular backups of important insert it now, or if you own a second hard drive power off the computer and
files are made. Start by clicking on the Windows Start button and selecting install it and boot back into Windows 10. Once done, click the Add a Drive icon.
Settings from the menu.

STEP 4 Windows will search for any capable drives on to which it’s able to
back up your files. When your drive or USB device is displayed,
click the drive link. Notice that an ‘Automatically back up my files’ switch button
has appeared where Add a drive once was.
STEP 2 Once in the Settings console, click on the Update & Security icon,
followed by the Backup option from the menu on the left. You can
see a number of possible options before you: Add a Drive, More options, Go to
Backup and Restore (Windows 7), along with help and feedback links.

120 ,QWHUQHW6HFXULW\
How to Back Up Windows 10

STEP 5 From here, click on the More Options link that’s under the switch STEP 8 When you’re ready to start backing up, you can click the Back up
button, this will open the Backup Options console. This section now button to the top of the Backup Option console window.
details the backup schedule, the location and which folders will be included in Alternatively, you can wait for an hour when the default schedule kicks in.
the backup; and for how long Windows will retain your backed up files. Obviously, depending on the size of the files within your backup folders this
could take some time.

STEP 6 If you scroll down through the Backup Options console, you can STEP 9 The backed up files will be stored on the chosen backup drive,
see that the entirety of your user folder within Windows 10 has within a folder called FileHistory. Inside that folder will be the
been added by default. This includes the Music and Videos folders, as well as specific user folder, so if you use File History backups for more than one user,
Searches, Camera Roll, Contacts, Favourites and so on. their user names will be listed here too.

STEP 7 At the bottom of the console window you have the options to STEP 10 Drilling deeper into the folder layers reveals more default
stop using the selected drive and to Exclude any folders from the folders, containing important XML data that Windows uses to
default. If you don’t want to back up folders for Music, Videos etc., click Add a store the chosen options. You can find the actual files that have been backed up
folder on the Exclude these folders icon, then pick the folder to exclude and click in the Data folder, laid out in the same folder structure as on your system, i.e. C >
the Choose this folder button. Users > Name > Documents etc.

,QWHUQHW6HFXULW\ 121
Advanced Security Tips

How to Create a Windows 10


System Image
Backing up your files is perfectly fine but in the event of having to wipe your hard drive and start
again, getting everything back in order can be time consuming. However, creating a system image
means you can almost instantly restore the entire system without needing to rebuild Windows.

System Imaging
A system image works in much the same way as the VirtualBox Snapshots. You’re essentially taking a snapshot of your entire system, which can then be
restored quickly. Saving you having to reinstall Windows 10, all your programs and data.

STEP 1 To begin, click on the Windows Start button and once more STEP 3 Windows will now scan your system for a drive that is able to
navigate to Settings > Update & Security > Backup. From within house the system image files. You may need to make some
the Backup console window, where you were in the previous tutorial, click on the changes to any drives according to what messages you get back from the scan. In
Go to Backup and Restore (Windows 7) link under the Looking for an older this example, the drive we’re using needs to be formatted as NTFS before
backup section. Windows 10 can use it.

STEP 2 This will launch a new window, the Backup and Restore (Windows STEP 4 Providing you’ve met the requirements, you’re offered a choice of
7) console. Microsoft has kept this feature intact through Windows where the system image can be written to. A drive is the quickest
8.1 and 10 purely due to compatibility support for backups done under older solution when it comes to restoring the image but you can opt for DVDs; it
versions of the OS. To the left there are two links, click on the Create a system depends on the size of the image as to how many DVDs you need. You can even
image link. select a network location.

122 ,QWHUQHW6HFXULW\
How to Create a Windows 10 System Image

STEP 5 For this example, let’s use an internal second hard drive. Make STEP 8 Once the process is complete, Windows will ask you to create a
sure that the correct drive (it could be a high capacity USB stick or System Repair Disc. This disc will allow you to boot into the
even portable USB hard drive) is selected, then click the Next button to continue. environment where you are able to launch the system image restore.

STEP 6 The next window will display the drives that are included in the STEP 9 If you click Yes to creating the System Repair Disc you need to
system imaging process. In this example, the C:\ drive, the system make sure you have a blank DVD to hand. Follow the on-screen
drive and the System Reserved partition are to be backed up. When it comes to instructions and click on the Create Disc button to burn the repair files to the disc.
restoring the system you’ll need both partitions for Windows 10 to be able to
boot up correctly.

STEP 10 Should you need to restore Windows 10 from the system image,
you can boot into the System Repair Disc and select the System
Image Recovery option from within the Advanced Options of the Trouble Shoot
STEP 7 When you’re ready to continue, click the Start Backup button. menu. Follow the instructions and within minutes Windows 10 will be back as it
This will begin the imaging process, which can take some time was when the system image was taken.
depending on the amount of space used on the C:\ drive and the speed of the
drive you’re writing to. Allocate ample time if you’re writing to DVD.

,QWHUQHW6HFXULW\ 123
Advanced Security Tips

Extreme Windows 10
Lockdown Tips
There are numerous ways and means to greatly improve Windows 10’s security and privacy.
Precisely how secure and private you want to get is purely down to you. You can opt for better than
average or through these tips below, absolute extreme security.

Windows 10 Security: The Paranoid’s Guide


If you’re fanatical about securing Windows 10 and locking it down to the point where the NSA would be impressed, then follow these top ten extreme
lockdown tips.

TIP 1 Let’s begin with the easiest tip, unplug the computer from the TIP 3 When online use a VPN and where possible, also use the Tor
Internet. Naturally there are disadvantages to this and you won’t get browser. Both of these combined will greatly improve your
updates for Windows or programs. However, you certainly won’t get any anonymity and improve security by utilising the site blocking and anti-scamming
Internet-borne malware infecting your machine. properties of a good VPN such as CyberGhost.

TIP 2 Click the Windows Start button and type privacy into the search box. TIP 4 If you step away from your computer on regular intervals, you need to
Open the Privacy Settings link and turn off every option within the make sure that no one will be able to get on to it. From the Windows
eighteen available Privacy sub-categories to the left of the console window. Start button type lock and click the Lock Screen Settings link. In here set a lock so
that only you can get back to your desktop once you’ve entered a password.

124 ,QWHUQHW6HFXULW\
Extreme Windows 10 Lockdown Tips

TIP 5 Depending on the age of your computer, it’s possible to create a TIP 8 Encrypting your installed hard drives and any external devices you
boot password from the BIOS. You need to consult your use is an excellent way of securing your data and locking down
motherboard manual as to how to accomplish this but you can set a password Windows 10. Whilst it can be inconvenient, you can be safe in the knowledge that
for being able to boot into your computer (before Windows even starts) and any lost data is virtually unhackable by all but the military supercomputers.
getting into the BIOS itself.

TIP 6 Consider installing several add-ons to your browser to improve its


security and prevent any unwanted data miners or rogue scripts
from being executed. Adblock Plus, Blur, No Script and other examples will
secure your browsing session. For an extreme route, use the Tor browser.

TIP 9 Normally you’d use a valid email account to log into Windows 10, via
an activated Microsoft account. However, consider setting up an
alternative account that isn’t linked to you. That way any data sent via Windows
10 to other sources won’t contain any personal data.

TIP 10 Use a Virtual Machine within Windows 10 to conduct your day to


day browsing and online work. The VM could be Windows 10 too
or even adopt a more secure environment such as one of the higher-end security
versions of Linux. Either way, a VM will be far more secure than Windows 10 on
Flash and Java are superb entry points for malicious code to infect its own.
TIP 7
your computer and for snooping of various personal settings and
data. Disabling both Java and Flash will prevent any such backdoors but limit
your browsing experience on some sites.

,QWHUQHW6HFXULW\ 125
Advanced Security Tips

Question: 01
Who is it okay
to share your
Strange as it may sound, being able to answer
passwords with?
questions on cyber security helps expand
your understanding of the subject. Plus
it’s a good way to test your knowledge
and see how much you’ve taken in so
far from this book.

Question: 02
True or False:
when on public
Wi-Fi is it safe to
send confidential
or personal
information data?

Question: 03
What does the
‘S’ stand for in
HTTPS?

Answer Then,
These Questions Ten Question: 04
Ten questions on cyber security and Windows security. What is two-factor
They’re not too difficult but enough to make you think and (or two-step)
consider the whole aspect of digital security and privacy. authentication?

126 ,QWHUQHW6HFXULW\
Cyber and Windows Quiz

Question: 05 Question: 08
Answers:
Which of these is a Phishing attack? Which of these methods
▶ Sending someone an email that of browsing is the most once every day.
contains a malicious link disguised as secure? your Windows security at least
a valid email. ▶ HTTPS 10 Once a day. You should look at

▶ Creating a fake website that looks ▶ Private browser mode Standard.


identical to a real one, in order to trick ▶ VPN
Advanced Encryption 9
users into logging in.
▶ Tor subject to vulnerabilities.
▶ Sending someone a text message that VPN. Tor is very secure but is 8
contains a malicious link, disguised as
something else. Trojan Horses, Worms.
Ransomware, Virus, Adware, 7
▶ All of the above.
dictionary word.
lower case and isn’t a
multiple characters, caps,
ThV%100*Vx!. It contains 6

of Phishing.
Question: 09 All of the above. All are forms 5

What does AES message.


Question: 06 stand for? information. Usually via a text

Which of the following and password, as well as extra


method requiring username
passwords is the most A multi-step authentication 4
secure?
▶ Password123
Protocol Secure.
encrypted. Hyper Text Transfer
▶ ThV%100*Vx! Secure, meaning it’s 3

▶ LetM31N public Wi-Fi


confidential data when using
▶ 123456
Question: 10 False. Never send personal or 2

How often should you passwords.


review your Windows No one. Never tell anyone your 1
security and updates?
▶ Once a month
▶ Once a day
Question: 07 ▶ Once a week
Give five examples ▶ Once only, just after
of malware installation of Windows

,QWHUQHW6HFXULW\ 127
Advanced Security Tips

White House Cybersecurity Advisor, Richard Clarke.

Amongst the many quotes from security experts of the modern


digital age, some stand out as either remarkably fortuitous or
simply worth mentioning. We’ve compiled ten top quotes from
the security world, that both entertain and make you think.

Relying on the Bruce Schneier, Protect Your Macintosh, 1994.


government
to protect your
privacy is like
asking a peeping
tom to install your
window blinds
Gene Spafford.

128 ,QWHUQHW6HFXULW\
What the Experts Say

Spokesman, Information Technology Association of


America, Business Roundtable, AP, May 19, 2004.

Bruce Schneier.

Schrodinger’s Backup.

Mike Danseglio, program manager in the Security


Solutions group at Microsoft, April 4, 2006.

Nik Cubrilovic, TechCrunch.com, October 10, 2008.

Dan Farmer, System Administrators Guide


to Cracking. Bruce Schneier, Secrets and Lies.

,QWHUQHW6HFXULW\ 129
Online Child Protection

130 ,QWHUQHW6HFXULW\
INDEX

We as adults face numerous risks when online, children face significantly


more. The predatory nature of some make the Internet an extremely
hazardous place for a child to explore, despite the great benefits that
it offers. The following pages will look at the risks involved for children
when online but also how to prevent them and how to better protect your
child while they navigate this virtual minefield.

132 Children Online: What are the Risks? 152 Your Child and Online Gaming, is
134 Social Media & Children it Safe?
136 Search Engine Safety 154 Staying Safe when Gaming Online –
Advice for Your Child
138 Online Grooming
156 Monitoring What’s Going On
140 How Safe are the Sites Your Child
Can Access? 158 Monitoring Online Activity for
Non-Technical Guardians
142 Email and Child Safety
160 Tips for Technical Guardians to
144 Top Child Friendly Email Programs Monitor a Child’s Online Activity
and Services
162 Ten Monitoring Tools to Install
146 Cyberbullying and Use
148 How to Prevent and Deal with 164 Using the Windows Hosts File to
Cyberbullying Block Sites
150 Helping Your Child Through
the Internet

,QWHUQHW6HFXULW\ 131
Online Child Protection

What are
the Risks?
Every parent or guardian knows that being online represents
an entirely new frontier of potential dangers for young children
and teens. These dangers come in many forms, with each being
capable of greatly affecting the lives of all involved.

132 ,QWHUQHW6HFXULW\
Children Online: What are the Risks?

T
he risks a child faces when online are tremendous
and it’s not just the usual collection of malware that
Cyber Bullying
Cyber bullying comes from many diverse sources on the
focuses on luring young people into executing it. It’s
Internet. It’s not simply others at school bullying someone
also the individuals, sites, language used, videos and
on Facebook, Twitter etc., there are some startling statistics
a whole host of other forms of information and infiltration.
that detail the kind of bullying that occurs in online gaming.
These have quickly become the wolf in sheep’s clothing,
disguising themselves with the single purpose of catching hold For example, leading anti-bulling charity Ditch the Label,
of a child’s online activities. recently reported on a sample of 2,500 young people aged
between 12 and 26. The report discovered that 64 percent
Grooming were trolled whilst playing an online game; 57 percent
One of the more prominent modes of luring children into saying or experienced some form of bullying; half experienced
doing something they shouldn’t is online grooming. The grooming hate speech and threats of violence; 39 percent received
itself could be for many different purposes, either to satisfy the unwanted sexual contac;, 34 percent had private
perversions of an individual or group or to gain information on the information shared; and 38 percent had been hacked
family as a whole, and everything else in between. whilst playing. Whilst the Internet
Online grooming has evolved drastically in recent years with
and all its contents
With comments such as ‘I hope your parents die’ and ‘I’m
the expansion of social media. We’ll look at the impact of social coming to kill you’, and children not being able to process
are an incredible
media and online grooming in the next couple of pages; suffice this kind of violence, cyber bullying whilst playing online learning resource
it to say however, that it’s an on-going concern to parents and games is certainly an issue that needs addressing. that can bring
guardians, as well as those whose jobs involve the protection of
young people. Identity Theft
Possibly used as part of grooming in order to gain
Radicalisation information from a child, identity theft is a growing concern.
A more recent and newsworthy example of online dangers for Keeper Security, a leading password management
children is radicalisation. This can come in the many different
forms but essentially it’s preying on young minds not yet capable
app, recently published an infographic on web security.
According to the company’s sources, children are thirty Online
of being able to discern between differing viewpoints in order to
lure them into the mindset of those doing the radicalisation.
five times more likely to have their identities stolen, with
an estimated 1.3 million children affected each year by
Risks
identity theft and nearly half of them under the age of six.
The more popular examples at present are extremist groups but
it’s not always something that’s associated with terrorism or those It’s a shocking statistic and one that can lessened through
groups affiliated with terrorist organisations. Radicalisation is the online education and not leaving a child alone in front of
adoption of extreme political, social or religious ideals, ones that the Internet; both not always easy to accomplish but also
undermine contemporary ideas and the expressions of a nation. not impossible. together people
It’s something that can occur quickly or over long periods of from all over the
contact, with someone who follows this line of extremist thinking. Online Scams world, inevitably
Needless to say, it’s something that a young mind can easily be Children are vulnerable to varying forms of online scams
purely due to their, in some ways, innocence and lack of
there will be those
tricked into believing and thus is something we as parents and
guardians need to be aware of. experience, as well as acceptability of what they read to who wish to exploit
be a fact or truth. It’s therefore quite easy to dupe a young some of the most
Inappropriate Content person into a scam that either tries to take money from vulnerable among
The dangers of the Internet aren’t always shady characters them, or some form of personal information. us, children and
hanging around chat rooms pretending to be a twelve year old.
Children with online access are just a stone’s throw away from
The likely scams that children often fall for are usually young people.
related to gaming, i.e. ‘click here to win 1000 in gold’ ‘get
shocking, violent and pornographic material.
extra lives’ or something that gives them an advantage in
We’ve looked previously in this book at rogue links, or something the latest game. Often scams will involve having them click
masquerading as a valid website that can easily be used to send a link that’s offering to sell the latest games console, football
the hapless browser to a site that contains either something kit, phones and other technology, all at unbelievably low
malicious or sinister, or simply something that’s considered prices. Naturally it’s all fake but to a child it’s an offer that’s
socially unacceptable. hard to refuse.
Pornography sites are certainly of more prominent and easily These are just some examples of what’s out there and what
accessible forms of unacceptable videos and images that lies in wait for a young person with an inquisitive mind and a
children could venture into unsuspectingly. There are also many trigger-happy mouse button. These individuals and groups
other forms of content that feature death, torture and other have designed their risks to target children in particular, so
such despicable acts of violence. Either way, these are contents we need to make doubly sure that when online our children
children should never witness. are as educated, savvy and safe as possible.

,QWHUQHW6HFXULW\ 133
Online Child Protection

The impact of social media on children has been the subject of numerous reports over the
last few years. With more and more children and young people gaining access to Facebook,
Twitter, WhatsApp, Instagram and so on, there’s a growing concern as to how it’s affecting
online safety.

A
ny site or portal where some form of social Cyber bullying is rife on social media. From threats made to
interaction occurs can be classed as social media, young people, to digs at their appearance and body shaming,
so even if you don’t allow your children access it’s a platform that has quickly devolved into a pit of despair Using social media
to Facebook et al, there’s still a chance they’re in and depression for some unfortunate youngsters. This can is amongst the most
contact via gaming or an app of some description: YouTube, lead, in extreme cases, to fatal consequences but generally the common online
blogs and so on. collective term for the negativity plied upon the youth of today activities of the
is ‘Facebook Depression’. modern day young
Reports from the American Academy of Paediatrics has found
that using social media does provide benefits for young people. In recent months, the Royal Society for Public Health together person. The likes of
According to findings, regular use of social media platforms with the Young Health Movement released a survey that Facebook, Twitter,
enhances communication, social connections and technical revealed Instagram to have the negative impact on a young Instagram and many
skills. Not only that, it allows young people to connect with person’s mental wellbeing, accusing the media platform of
extended family members and friends they won’t see for deepening young people’s feelings of inadequacy and anxiety.
perhaps years at a time, as they live in places they’re not likely It’s a disturbing fact that on top of the pressures of school or
to visit. Depending on the content, social media can help a college life, young people are having to put themselves through
young person develop better perspectives on various issues in the mill whilst simply sitting in front of a screen.
the media and when talked about with an adult, they can begin Mental health is a major concern amongst young people
Safe
to form their own opinions, an impressive stage in a young
person’s life.
but social media also presents its darker side through online
grooming, potential radicalisation and the spread of malware.
Social
In some ways social media can help a young person express Each of these will greatly affect a young person and can lead
to higher levels of anxiety, depression and withdrawal. For
Media
their inner feelings and encourages freedom of thought and
engagement with similar age people. There’s potential for a example, the spread of malware may not sound too negative
young person to learn new things, whether that’s simple life on the wellbeing of a young person but put yourself in the
hacks or discovering someone’s job role. All in all, it adds up, place of the child who has unwittingly executed some form of
on paper at least, to a positive experience that can greatly malware on the family computer or the school network. The
help a young person grow and help them form a more mature negative emotional effects from this happening can be huge more all contribute
understanding of the world around them; something we didn’t to someone whose immaturity can’t deal with the aftereffects. to the billions of
have before the Internet. The safety side of social media and children comes in many hours collectively
Sadly, with every positive aspect there are several negatives.
forms then. Mental health concerns, access to inappropriate spent via computers
content, Internet borne digital threats, bullying, grooming, and mobile devices,
Whilst the effects of social media on a child can be for good,
loneliness and body image. Where it’s easy to point out the with online gaming
they are mostly overshadowed by the popular negative aspects
risks of Internet stranger danger, it’s not always easy to cover
that ultimately rise to the surface. The sheer vastness of social
what happens should someone post edited and manipulated
quickly following
media is one of the main causes for such negativity. Due to its on the heels of the
images of a young person to social media.
freedom and limitless potential, there’s no definable control on
more popular social
the scope of information. Yes, the social media platform can Therefore, the pressure on parents and guardians is just as
apply rules, filters and restrictions but these seem to be far too immense, when helping our young people navigate the digital
media portals.
easily bypassed, and to some degree worthless in the end. wild west frontier that is social media.

134 ,QWHUQHW6HFXULW\
Social Media & Children

,QWHUQHW6HFXULW\ 135
Online Child Protection

Search Engine Safety


The search engine is the portal into the wider Internet and through it we can view everything from
man’s first steps on the moon, to extremist group propaganda videos. It’s therefore paramount that
children are aware of the dangers of the search engine.

I
t doesn’t take much imagination to whatever search engine you use, any filters
While the Google search portal isn’t consider how a particular scenario may are currently set to On or Strict and it’s
dangerous in itself, it’s what potentially be played out. A child is left in front of a recommended that you don’t leave a child
lies behind the search entered that search engine, they enter something to alone in front of a search engine for any
makes it such a dangerous place for do with a school project on World War 2 length of time.
young people to venture into. Many and start to follow the links. Although part
of history, some of the images that may be If you consider Google to be too risky, there
displayed could be deemed inappropriate are the likes of DuckDuckGo, a search engine
to a primary school child, or those as that not only protects your data by not
young. To expand, what if the child then logging any searches but also features an
follows links to modern day warfare extensive filter engine. Likewise StartPage,

Safer and from there potentially to videos


depicting extreme violence. That then can
Bing, Boardreader and CC Search can also
fulfil most users’ requirements whilst filtering
Searching snowball into accessing what can only be
described as the real nasty stuff, which isn’t
inappropriate content and allowing a higher
degree of Internet privacy.
something any child should ever witness. Alternatively there are steps we as parents,
The above scenario is, of course, the extreme adults and guardians can do to help prevent
end of what could potentially happen. any inappropriate content from appearing
Without going down the fearmongering in a search result. There are numerous
young people are somewhat more
road, the search engine can lead someone sites that have been designed specifically
tech-savvy than most adults but the for safer searching with children in mind.
unsuspecting into a whole heap of trouble.
younger children are at risk from a That trouble can come from school, your The strict search policies of an engine may
seemingly innocent search resulting in ISP should any illegally hosted content be good but there’s always a chance that
inappropriate content being displayed. be accessed, or even from accessing something could get through the net and
malware, so it’s worth making sure that reveal itself on the screen.

136 ,QWHUQHW6HFXULW\
Search Engine Safety

Six Safe Search Sites


Therefore, here are six child safe search engines. The age ranges vary but generally they’re pitching to primary or low-middle school children. Either way,
they’re certainly worth considering and bookmarking for when a child is using the computer for school or general research.

SAFE SEARCH KIDS A UK-based search engine that utilises Google’s KIDSCLICK KidsClick is a search engine designed and created by
SafeSearch technology and provides a friendly librarians for children who are searching for school related
front end. It’s a good starting point and one that doesn’t display picture icons research. Each result returned features a description and reading level, along
along with search results; thus eliminating any inappropriate images that may with suggestions and homework helpers.
unintentionally slip through.

FACT MONSTER Fact Monster is an excellent site that’s dedicated to KIDZSEARCH Here’s another customised search engine utilising
helping children research school topics. It’s a free Google’s SafeSearch strict results filter. Additionally, it
online almanac, dictionary, encyclopaedia and thesaurus and is aimed at also features a banned keyword search system that will not return any results
children between the ages of eight and fourteen. from the black list of banned words.

KIDREX A simple site that’s designed for much younger users. KidRex is KIDDLE A great and friendly search engine for children and young
powered by Google’s own search engine but as you’d expect, people. Kiddle provides strict filtering along with child-friendly
filters out any inappropriate content. Further more, as a parent, you’re also able results that are grouped by those deemed safe and handpicked by the Kiddle
to customise the filters to ensure safer or less restrictive search results. editors. Here are trusted sites that aren’t specifically written for children but
provide understandable content and safe famous sites, that are harder to
understand but still relevant.

,QWHUQHW6HFXULW\ 137
Online Child Protection

Of all the many despicable acts and threats that arise on the
Internet toward young people, online grooming is
undoubtedly one of the worst examples. It’s a
tricky act to confirm at times too, as those
who groom often cleverly hide their
tracks but it is possible to spot signs
of it happening.

138 ,QWHUQHW6HFXULW\
Online Grooming

T
he online part obviously involves the groomer building ▶ The young person being very secretive, including their
this emotional connection via chat rooms, online online activity.
gaming, social media, blogs and even comments ▶ Having older boyfriends or girlfriends.
sections on popular websites, such as YouTube. The
▶ Going to unusual places to meet up with friends.
act itself is surprisingly subtle. The groomer first establishes
a rapport of some kind, perhaps agreeing with a child on a ▶ Having new things such as clothes, phones or other
comment he or she has made regarding something online; let’s objects they can’t readily explain.
use a game as an example. The young person has written in the
From the perspective of the young person, a groomer
game’s blog that something doesn’t work, the groomer agrees
will usually:
with them and starts a very basic conversation building a form
of trust between the young person and themselves. ▶ Send you lots of private messages. The NSPCC (the
This can go on for as long as the groomer feels they’re getting ▶ Ask you to keep conversations a secret. National Society for
an advantage, according to leading child experts. The grooming ▶ Attempt to find out more about you and your family. the Prevention of
can then move up a level whereby the groomer starts to become ▶ Start to send you sexual messages, usually starting with Cruelty to Children)
more personal, adopting a persona of another young person jokes then moving on. defines grooming
roughly the same age the child in question. Perhaps eventually
they ask where they live and if they could meet up after school or
▶ Blackmail you into sending images or videos by threats as when someone
something. Of course it doesn’t always play out that way, there
of violence to you or your family. builds an emotional
are many different ways in which the groomer can satisfy their The situations can vary and the groomer is adept at hiding
perversions without ever having to physically meet the young traces of their activity as well as lying to someone about
person in question. themselves. Childline states: “It’s important to remember that
The NSPCC states that groomers can be strangers to the young there isn’t one type of groomer. Many different kinds of people
person, a friend, professional or even a family member; they can
also be either male or female and of any age; as the UK’s Childline
have used the Internet to trick, force or persuade young people
into sharing sexual images of themselves. Often it’s an adult
What it
mentions, ‘anyone can groom someone’. pretending to be a young person, but not always.”
is and
The more prominent reasons are chiefly sexual conversations,
wanting to have naked images of the young person as well
Parents and guardians can watch out for certain types of
behaviour, which could be signs of grooming, regardless of what
as videos, access to the young person’s webcam, mostly for
sexual purposes, or to gain further information regarding
whether it’s online, via a phone chat app or even in person. The
NSPCC have listed the following as potential signs:
to Look
the family; there are examples of grooming in order ▶ Withdrawn ▶ Soils clothes Out for
to obtain passwords for banking and such. Often
▶ Suddenly behaves ▶ Takes risks
there’s an element of blackmail involved, where
differently ▶ Misses school
a young person has sent on images or videos
of themselves and the groomer now either ▶ Anxious ▶ Changes in eating habits
demands more images or even money, ▶ Clingy ▶ Obsessive behaviour
or else they’ll post the images up on
connection with
▶ Depressed ▶ Nightmares
the nternet. a child to gain
▶ Aggressive ▶ Drugs their trust for the
The signs of online grooming ▶ Problems sleeping
vary depending on the young
▶ Alcohol purposes of sexual
▶ Eating disorders ▶ Self-harm abuse, sexual
person and how far into the
act of grooming they’ve ▶ Wets the bed ▶ Thoughts about suicide exploitation or
been drawn. However,
Both Childline and the NSPCC have excellent websites
trafficking.
according to both the
NSPCC and Childline, dedicated to online grooming, along with advice to both parents
the most common and guardians, as well as young people and children. You
signs are: can find them at https://childline.org.uk/info-advice/bullying-
abuse-safety/online-mobile-safety/online-grooming/#10 and
https://nspcc.org.uk/preventing-abuse/child-abuse-and-
neglect/grooming/. It’s certainly worth reading through each
site to gain a better understanding of online grooming, what the
warning signs are and how to support a young person should
any signs be apparent.

,QWHUQHW6HFXULW\ 139
Online Child Protection

How Safe are the Sites Your


Child Can Access?
Mobile operator O2, YouGov and the NSPCC have teamed up with Net Aware to create a site that
reviews popular sites and apps that children and young people use. This guide allows parents and
guardians to view the information to help them understand their child’s online world.

Net Aware
Net Aware is an excellent site, and can be found at https://net-aware.org.uk/. Within you can find an A to Z of Most Popular sites and how safe they actually are
according to face icons. Here are ten of the popular choices with their safety information.

FACEBOOK AND MESSENGER Facebook has gone to great SNAPCHAT According to Net Aware, 32% of children and young
lengths in recent years to ensure people who reviewed Snapchat thought that it can be
a higher degree of safety. There’s a lot of ground left to cover but from the point risky. There aren’t any ‘happy face’ icons among the sections, so be wary of
of view of Net Aware, it’s about average in terms of safety. Signing up and Safety & how it works.
Support need looking into however.

TWITTER Some of the major concerns regarding Twitter are:


Instagram only manages to gain an upvote (smiley face) in uncontrolled Tweets, fake and scam tweets and abusive
INSTAGRAM
the Privacy Settings section, with more rigid controls being behaviour. It doesn’t rate too highly, on a par with Snapchat, so it’s worth reading
asked for from parents and carers with regards to Signing Up, Safety & Support through the available content prior to signing up or allowing a young person to
and Reporting. sign up.

140 ,QWHUQHW6HFXULW\
How Safe are the Sites Your Child Can Access?

WHATSAPP Another not too highly rated site, WhatsApp raises several PINTEREST The main concern with Pinterest is that young people and
concerns over ability to be contacted by strangers, children can’t always control what they see, which means
random people being able to view your profile picture and the potential for there are times when inappropriate content can be viewed by minors. Again, Net
receiving scam messages. Aware rate it the same as YouTube, Snapchat and Twitter.

ASKFM This is a social networking site where you can ask other people ROBLOX This is an online game where you’re able to play games
questions, anonymously if you want to. The anonymity raises created by others, or create games yourself. Whilst fun, it does
concerns, along with instances of bullying and trolling, as well as possible have issues whereby users can add you to their friends list and communicate
exposure to inappropriate content. However, it does have the highest ‘face’ rating with you and it features in-app purchasing, which can be difficult to manage for
off all the apps so far. parents and guardians.

YOUTUBE YouTube’s infamous use by extremist groups when posting FACETIME Apple’s FaceTime is one of the most used video chat clients
inappropriate videos is by far one of the most negative available. However, it has been noted that people you don’t
aspects of its use among young people. Examples of abusive comments and know can FaceTime you and it’s possible to record or take screen shots of a
possibly inappropriate adverts are concerns too. Net Aware rates it on a par with FaceTime conversation without you knowing.
Snapchat and Twitter.

,QWHUQHW6HFXULW\ 141
Online Child Protection

We’re often so concerned over social media, online gaming and chat sites that we tend to ignore Email at first doesn’t appear
one of the most common threats to online safety for young people and children, email. While it’s to be too much of a concern
a more manageable element, it does carry plenty of dangerous potential. for the parent or guardian,
after all we can view what
emails are coming in to our

I
n reality it doesn’t take too much of a technical the email client or website, then there’s some privacy for the
genius to enter into a search engine, “fake young person too. accounts. However, it’s not
email accounts” or something similar. The too difficult for a tech-savvy
Naturally the best form of email attack and threat prevention
returned results, such as Fake Email Generator,
is through education. Both the NSPCC and Childline
youngster to create an
Mailinator, ThrowAwayMail and FakeInbox are
recommend that you talk to your child and come up with
all designed to help you create a fake account
a set of workable rules and conditions that are fair but
that can either be single use or used regularly.
This of course means that a person is able to protective. Educate them on the dangers of communicating
create a false persona and sign up for Facebook with a stranger and inform them that online grooming takes
and the like using a browser’s private function, place and how it works, also include how viruses work and
other forms of malware, and how phishing and other forms
Email
and have access to accounts without someone
else knowing. of threats work too. Risks
This works both ways, from the point of view of the young There are some tips that we as parents or guardians can use
person gaining access to a site they shouldn’t and for to help children and young people:
someone who’s creating accounts ready for grooming, or
▶ Treat all people on the Internet as strangers, even
something similar. With access to a fake email, a young person
those who could be friends. alternative email account,
has the potential get into a variety of potential dangerous
situations. They could be contacted by someone who is ▶ Never give out any personal information via email to usually one that’s web-
trying to groom or send radicalised content, they could also an unknown source or site. based, that they can use to
become the subject of a hack and unwittingly execute code ▶ Be wary when choosing an email name, access games and sites you
that can deploy a virus, ransomware or other malware, along don’t use anything to identify your gender or wouldn’t normally allow
with possible backdoor hacks to gain access to the system the anything provocative. them to.
young person is using. ▶ Never open an email attachment. Check with a parent
It’s not just fake email sites that pose a danger when it comes or guardian first.
to young people and children; although fake email sites ▶ Never reply to an unknown email and never send any
usually don’t have the better protection and anti-malware images of yourself.
restrictions that more legitimate sites employ. Google Mail, ▶ Always tell a parent, guardian or
Yahoo and so on can represent a weak link in the chain teacher if you’ve been contacted by
of digital protection for children and young people. The someone you don’t know.
dangers are mostly the same but thankfully these online mail
providers have better levels of malware protection. ▶ Never respond to a threating email or
someone attempting to bait you into
So how would you, as a parent or guardian, combat potential contact.
email threats for children and young people? You may not be
▶ Don’t always believe everything you
able to police their mobile accounts all the time but you can
read in an email. Phishing attempts
insist that they allow you access to the account on a regular
come as virus hoaxes.
basis to check that they’re not in conversation with someone
unknown, or that they’re not receiving and responding to ▶ Don’t believe you’ve won £1,000,000 or
reams of spam and malware ridden emails. However, that react to limited time ridiculous offers on
does seem something of an Orwellian approach to managing technology or fashion. It’s nearly always
a young person’s email account. fake emails trying to get you to visit a site.

Another possibility is to set up a family email account, Another possibility is to use one of the many
separate from the parents or guardians’ accounts, where the child friendly email programs and online services.
entire family has access and can utilise to sign up for games, There are ample available to try out and over the next
safe sites and the like. It’s a more open approach, whilst still couple of pages we take a look at ten of the more highly
preserving privacy for the adults and if you use folders within recommended services.

142 ,QWHUQHW6HFXULW\
Email and Child Safety

,QWHUQHW6HFXULW\ 143
Online Child Protection

Top Child Friendly Email


Programs and Services
An email account for a child or young person is a great way for them to communicate with friends
and family; however, as we’ve seen, it can be a dangerous tool. Therefore it’s best to ensure they’re
using a safe, child friendly email account.

Ten Child Safe Email Accounts


It’s not always easy to police and monitor an email account, so here are ten child friendly email accounts and related services that will help make the job of
keeping children safer when communicating via email.

ZILLAMAIL ZillaMail is run under the ZillaDog.com brand, created by ZOOBUH ZooBuh has an impressive list of benefits and features for
parents for children. It’s an easy to use, friendly service that parents and guardians to look over when considering an
also combines child safe online games and links to child safe websites, such as email provider for their child. Adjustable spam filtering, the ability to delete
Cartoon Network and the like. ZillaMail has some interesting aspects and attachments, block specific senders, see activity logs and a Predator Catch
features, which makes it an excellent choice for parents and guardians. Phrase alert system all add up to a great service.

KIDSEMAIL KidsEmail is a paid for service, offering a 30 day free trial KIDMAIL KidMail is a low cost subscription email service that caters for
period. For your money you get mail monitoring for all both young children and older young people. Parents and
incoming and outgoing emails from the child’s account, time restrictions, blocked guardians have full control over the email account and the messages that come
senders, no adverts, spam filtering and an easy way to add friends and family and go from the child’s account, along with many other benefits and features.
contact details.

144 ,QWHUQHW6HFXULW\
Top Child Friendly Email Programs and Services

TOCOMAIL Another well presented service, Tocomail offers the child, SAFENSOUNDMAIL SAFEnSOUNDmail has plenty of features
parent and guardian a wealth of fun and useful features. It available to those who purchase the
brings a lot more than just email to the table, for example children get access to subscription; however, there’s a free 30-day trial to begin with. There’s support for
a drawing board app, to create their own attachments, whilst parents get Apple, Android, Windows, Mac and Chromebook devices, up to five child accounts
notifications via an app when the child has received an email. available, customisable controls and settings and elevated levels of encryption.

GMAIL Providing your child is thirteen years or older, they can get access FAMILY LINK Part of the services offered by Google, Family Link can
to a Gmail account. Gmail isn’t the first email service that springs help you set up a Gmail-like account for children under
to mind when considering a young person friendly email account but with the age of thirteen. You need to be located in the US for the moment but the
careful use of its filters, you can set up a good and reasonably safe email service offers improved controls for Android devices and apps and there are
environment for them. considerations for moving the service outside of the US in time.

MAILY This is a child-friendly email app for iOS and Android devices. It’s SCHOOL EMAIL Here’s an interesting suggestion, why not use the
fun to use, secure and offers the parent or guardian ample control child’s school email? Providing the school is willing
and restrictions for the child’s account. With it children can stay in contact with to participate, a child can log into their account from home and using the
specified contact lists, whilst still remaining safe online. elevated security, send and receive emails in total safety. Naturally, you’d need to
confirm with the school prior to using the email for personal contact.

,QWHUQHW6HFXULW\ 145
Online Child Protection

Cyberbullying is when someone uses the Internet, email, online


gaming, social media and any other kind of digital platform to
threaten, tease, humiliate or upset someone else. Both the bully
and the victim of the bullying can be any age, from very young
children up to late teens, and beyond in some cases. The source
of the bullying can come from others the victim knows at school or
college, or from a complete stranger on the other side of the world.

B
ullying someone online doesn’t always involve threating remarks.
What may seem like a playful comment on one side, could be
taken as a cutting jibe on the other. It’s not always an easy thing to
specify, as we all have moments when we may say or do something
to upset someone without meaning to do that person any emotional harm.
Mostly though, with respect to a loose and throw-away comment, the one
who made the comment will probably apologise for their mistake once
they realise that they have upset the other person.
However, true cyberbullying is the persistent harassment of an individual.
The cyberbully will goad, threaten, send nasty messages, even take images of
the victim and Photoshop them in inappropriate situations, through the use
of many different forms of online communications.
It’s a sad case too, that a lot of young people are already in a heightened
emotional state due to their body image, thanks to the media and unrealistic
Photoshopping of celebrities. Where young people, especially young teens,
are very conscious of their image, a slight remark to someone can impact the
young person in an incredibly negative way.

cyberbullies are able to shout threats and taunt other gamers, rallying
Social Media others around them until the victims feel overwhelmed by bullies.
Probably one of the main platforms for cyberbullying, social media is
an ideal hunting ground for the cyberbully. The effects of social media There are numerous games which have adopted a more sport-friendly
bullying have been devastating on some families. Teen suicides, self approach, introducing policies whereby instances of bulling can be
harm and elevated cases of depression amongst young people are reported and the bullies themselves have their gaming accounts
popular in the media and bring to light just how powerful and dangerous suspended. Often online gaming bullying is just someone shouting
social media is as a communications tool. ‘noob’ at another, degrading the victim as a newcomer, or someone who
isn’t as good as them. Other times the bully will say things like ‘I hope
Facebook, Twitter, Instagram and other examples have all become the you die’ or ‘I’m coming to kill you’, or something similar. In short, any
haunt of those who prey upon and harass others. From the point of view abusive behaviour, including destroying your online game creations or
of a child, whose emotional state is quite vulnerable, even a simple ‘like’ belongings, is a form of bullying.
of a comment can embarrass or hurt.

Online Gaming Text Messaging


With more and more young people having access to their own phones
Another prime source of modern cyberbullying, online gaming has or tablets, abusive text messaging is becoming a major issue. Messages
proved to be a vicious place to inhabit for some. The problem with online sent can, thankfully, be easily traced back to the source, and together
gaming is that the bullying comes from anywhere in the world. There are with anyone else who was involved, the bully(s) can be reprimanded for
cases of gamers targeting females, different religions or those who come their behaviour. Sadly though, there are ways to hide texts and with such
from different parts of the world. With the use of headsets, the gaming knowledge, a cyberbully is able to send their abusive texts anonymously.

146 ,QWHUQHW6HFXULW\
Cyberbullying

Another aspect of cyberbullying via text message is sexting. Setting up filters to block certain senders does work but only
This is when someone takes an explicit image or video of to a small degree. There are plenty of email services available
themselves and sends it to someone else. Sometimes, a that will hide a sender or fake email providers to hide behind.
person can bully someone into sending them images or It’s not always abusive content either, as cyberbullies have
videos of the victim, then send those been known to send viruses and other malware via email to
images on to others or upload them their victims.
to popular sites and inform an entire
Cyberbullying covers many different forms and platforms. It
group of their location.
can be a single, throw-away comment, a like on a Facebook
comment or just someone calling someone else a ‘noob’.
Email It can also be very serious indeed, including death threats,
threats of violence or the sending or posting of explicit
Sending abusive emails is a large area of concern
for those involved in protecting young people from images or videos. There’s a wealth of information available
cyberbullying. We’ve seen, the double-edged blade from the likes of the NSPCC and Childline with regards to
of anonymity can cut both ways: it can protect your cyberbullying, which is certainly worth reading through if you
identity online but it also hide an individual who is suspect any instances of bullying or you just want to know
bullying someone. Anonymous emails sent from a bully more about how it works online.
can be just as harmful as social media, online gaming and
texting. It’s a more personal form of bullying, much like having
an abusive letter addressed and posted directly to you.

,QWHUQHW6HFXULW\ 147
Online Child Protection

We will never be able to truly stop cyberbullying, or any other


form of bullying, from happening, as there will always be those
who want to cause harm to others. However, we can take steps to
prevent its effects, cope and deal with it.

Coping with face-to-face


bullying can usually stop
when the victim is home
or at a place where they
feel safe. On the other

Coping with
Cyberbullying

hand it often feels like


there’s no escape from
cyberbullying as the
online world is always
present, and even when
you cut yourself off from
any online activities, the
bullying still continues.

148 ,QWHUQHW6HFXULW\
How to Prevent and Deal with Cyberbullying

T
he level of how upset a victim of cyberbullying feels depends perhaps contact someone else, such as the NSPCC or local councillor to
greatly on the person. Some can easily shake it off or deal see what they as professionals recommend as a gauged response.
with it by immersing themselves in a sport, book, family or
Take time to listen – A young person coming to an adult for help on
something else. Others though, take any form of abusive
bullying is a huge step for them. It’s easy to close up as a child, so to take
message, comment and such to heart and its affects can range from
that step should be worthy of your full attention. Listen to everything
crying to feeling suicidal. There’s a lot that goes on in between and
they have to say and together find a way to prevent and deal with the
it’s difficult even for professionals and experts to say how to react and
cyberbullies.
cope with cyberbullying.
Help restore self-respect – The ultimate goal in any bullying is help
However, there are some guidelines which we can help children and
restore self-respect to the victim. The more self-respect the young
young people through when it comes to dealing with cyberbullying:
person has, then the better they are able to cope with future bullies, and
It’s not your fault – If someone is repeatedly cruel to you, you must life itself.
not blame yourself. Two people can have an argument but if the other
Stay positive – Bullying should be stopped but it’s unlikely as humans
person continually abuses you in some form, then that’s bullying and is
will never be able to eradicate all forms of cruelty toward others. With
not acceptable.
that in mind, it’s best to remain positive for the young person, whilst
Don’t respond – No matter how easy or tempting it is to still being realistic. It will help them mature and learn to form protection
respond to a cyberbully, it’s recommended that the young techniques against those who want to cause suffering.
person doesn’t. Often, a cyberbully is goading the victim
Ask the person to stop – Whilst one of the guidelines is to never respond,
for a response, it’s a form of psychology that enables
there is the option to take a simple approach and ask the person who’s
them to think they have power over the victim.
bullying to stop. Sometimes a hurtful comment could be easily rectified
Save all evidence – It’s important that the young by the sender, simply by it being shown that it was unnecessarily cruel. In
person saves or records all the evidence of the ideal world, they will apologise and remove the comment. It depends
cyberbullying. This evidence can then be used greatly on the comment and bullying in question.
to show a parent or guardian, teacher or
Use the tools available – Use the available filters, blocks and reporting
relative, or even someone responsible
mechanisms available to stop the cyberbully from even being able to
for the platform where the bullying
contact you. Facebook, Twitter and so on can block users and you’re able
took place. This way action can be
to report abusive behaviour. Likewise, online gaming can ban an account
taken to prevent any escalation.
or kick a bully from the game server.
Always ask for help – Even
Report serious threats – Not only should you report threats to parents
if the bullying incident seems
and guardians, it’s recommended that you should report serious physical,
minor, such as a throw-away
sexual and violent threats to the police. Each case will be treated with
comment, it’s always best for the
respect and the police have powers to approach the bully with the
young person involved to tell their
evidence to caution or charge.
parent or guardian. We, as adults,
can then help the young person Whilst the above will help children, young people, parents and guardians
deal with the bullying. with cyberbullying, it’s sadly not something that’s going to disappear
overnight. The moment you’re online, you’re open to some form of
Measure your response – It’s very
abusive behaviour and every social media, online game and contact
easy as a parent or guardian to
made increases the chances of cyberbullying from occurring. The best
make a knee-jerk reaction to
we can do is help young people cope with it and learn to avoid those who
someone who’s cyberbullying
would want to abuse.
our child. Therefore it’s often
best to take evidence, then

,QWHUQHW6HFXULW\ 149
Online Child Protection

Helping Your Child


Through the Internet
The Internet is a vast resource that’s full of amazing details and an equal amount of villainy and
inappropriate content. It’s difficult for a child to navigate it by themselves and extremely dangerous;
so, as a parent or guardian, we need to make sure they’re safe.

Internet Safety for Everyone


Together with the excellent advice from the NSPCC, Childline and Safety Net Kids, we’ve collated ten practical and realistic tips to help you and your child
remain safe when using the Internet and its connected services.

PERSONAL INFORMATION Never post any personal information STRANGER DANGER People you don’t know in the real world are
online. Keep your postal address, strangers and not always who they say they
email address, phone numbers and, if possible, names away from public are. The same applies for the online world. Not everyone you meet in an online
viewing. Especially never tell anyone you’ve just met online, in a game or chat game is who they claim to be, so treat every contact as a stranger and be wary
room any details about yourself. of them.

PHOTOGRAPHS Consider carefully before posting any pictures of INAPPROPRIATE CONTENT If you see or hear something online
yourself online. Once an image is available on the that upsets you or makes you feel
Internet, it’s extremely difficult to get rid of any trace of it; and should uncomfortable, you must tell a parent, guardian or teacher as soon as you can. If
someone have already downloaded it on to their computer, it’s impossible to possible, show them the content that’s upset you and tell them why it’s upsetting.
locate and trace. Talking to a parent or teacher will help you gain a better understanding of the
world around you.

150 ,QWHUQHW6HFXULW\
Helping Your Child Through the Internet

COMMENTS Always think before you enter any comments online. IGNORE BULLYING Try not to reply to anyone who’s appearing to
Remember, they can be hurtful to someone else or be bully you online. They are most likely trying to
inappropriate without you even realising it. The comments could also lead goad you into responding and will keep pushing until you finally crack and
someone to taking an interest in you, if you enter your age for example. respond. Most of all, never respond out of anger. If it’s getting too much, leave the
site or game and come back later.

ACCOMPANIED VIEWING Parents, always make sure that young SOCIAL SAFETY Whether you’re on a social media site, in a chat
children are accompanied when room or playing a game, become familiar with the
navigating the Internet. Ensure that the privacy and security settings are as high safety settings: how to turn off chat and how to block or report another user for
as possible and that they don’t have access to sites beyond what you specify, any abusive content they may post. Take screenshots if possible, so you have
should you need to leave their side for a moment. evidence to back up your claim.

SECURE PASSWORD Never give out your password online, even if NEVER MEET Never arrange to meet up with anyone you’ve met
the email or message is claiming to be from online, even if you’re an older teenager. It’s very easy to
the bank or someone you know. Never let anyone remotely attach to your pretend to be someone, post a fake picture or take the identity of someone else.
computer either. It’s very rare for a company to attach to a home computer to fix If you do arrange a meeting, make sure you’re with other friends, in a public place
something. At least be suspicious of anyone asking to connect remotely. and let others know where you are going.

,QWHUQHW6HFXULW\ 151
Online Child Protection

Gaming has taken


some interesting leaps
in technology since the
days of feeding money into
the arcade cabinets. However,
with those advances comes a new level of
online concerns for parents and guardians.

152 ,QWHUQHW6HFXULW\
Your Child and Online Gaming, is it Safe?

O
f course, there’s nothing wrong with gaming involve some scenes of an inappropriate nature,
or online gaming. Despite the many years perhaps sexually explicit or extremely violent, or use
of people bemoaning that gaming is taking inappropriate language.
away something from a childhood, recent
In terms of online bullying, it’s not just rage that causes
studies have actually shown that online gaming
problems. Griefing is a tactic used by some gamers to
can increase social skills, help develop hand-to-eye
bully others into making the wrong move or decision
coordination and, depending on the game, have
in the game. This way, the ‘griefer’ wins by simply
educational benefits and help young people learn.
causing as much aggravation as possible, and in turn
The problem is that not everyone always plays fair; enrages those around them. It’s also not unheard of
some take great offence when they’ve been beaten for entire teams of griefers to band together to bully
by another player, resulting in the person beaten the opposition into defeat.
shouting or entering abusive comments. Other players
In-game spending is a modern cause for concern
use cheats to gain an advantage, making it near
among parents too. For the young person who enjoys
impossible for other players to even have a chance of
playing the game to have any significant advantage
winning or succeeding. Sometimes, when a player is
at all, they may need to purchase better items from
better than others around them, they
the in-game store. Often these items
can be accused of cheating, even Online is playing a game
will inevitably lead to more items
when they’re not. in real time with other
needing purchasing and the cost
All of the above can be soon mounts up. Other games players from around the
disheartening to a make it near impossible world. The game can
young person to finish without
be virtually anything,
having to pay for
something, such
a shooter, role playing,
as a key to unlock adventure or something
the next level open world, such as
or by having
the player buy
and download
more content
(known as a DLC,
downloadable content). Online
The other safety concerns
involve those who play games
Gaming
in order to be exposed to young
gamers. Minecraft, for example, is a
game predominantly played by younger
people, so those of a perverse nature may
Minecraft. The issue with
play and use servers where they’re interacting
with younger people; there’s even the possibility online gaming is that
of some form of online grooming taking place in anyone could be the
situations such as this. character that’s currently
However, despite the safety concerns over online playing next to your
gaming, it’s not always bad news. Yes some games child’s online avatar.
and depending on the amount do employ tactics to leech more money from the
and type of abuse they may receive from players and other games are simply an excuse for
a poor loser, quite upsetting too. It’s poor behaviour; but with respect, there are countless
often difficult for someone who enjoys games available that can help a young person develop
playing a particular game to be accused social and other skills.
of something they haven’t done or have
As parents and guardians, we need to make sure that
to contend against someone who is
the game the young person is playing is appropriate
obviously cheating. The trick of course is
and, to some degree, useful to them, as well as being
to keep calm, something many adults find
enjoyable. We’ll look at some tips on staying safe
difficult doing under such circumstances,
when gaming online over the page but it’s worth
let alone children and young people.
remembering that even if we find the game somewhat
There are other factors too that can dull, the young person playing it may well be enjoying
cause problems for young people when it. We just need to make sure it’s a safe environment
gaming. The game itself might not be for them.
age appropriate, with in-game missions
asking the young person to do something
that’s really not very nice. The game might

,QWHUQHW6HFXULW\ 153
Online Child Protection

Staying Safe when Gaming


Online – Advice for Your Child
We’ve looked at the safety concerns of online gaming but what can we as parents and guardians do
to help keep our young gamers safe? Thankfully, it’s nothing too drastic, just a little common sense
and a few tips to help out.

Game On
Here are ten tips to help the young gamer get the best from their game of choice, whilst still remaining safe; also how to avoid any conflicts that may arise
from the gaming community.

INVOLVED PARENTS Parents, take an interest in the online games IN-GAME SPENDING However tempting it is to buy an on-game item
that your child plays. See what type of game it or DLC, it’s not always the best idea. Items like
is and especially see what the online community is like. View the in-game chat, this can be a lure for you to buy another and another, until the cost mounts up and
and read the game’s forum if it has one to gauge the type of gamers who play it. you’ve racked up a game bill in the hundreds. If you desperately need an item,
discuss it with a parent or guardian.

CAREFUL CHATTING Not everyone in the game is going to be the


same age as you. There are some people who
AGE APPROPRIATE Make sure that game you’re playing is age are much older and who like to pretend they’re a young person. Don’t be fooled
appropriate. Whilst it’s fun being nine and into becoming a friend with someone who’s playing with you. Enjoy the game, and
playing an 18-rated game, there’s bound to be content within that may upset or playing with others, but don’t arrange any out of game communications.
offend you. There’s a reason certain types of game have an age restriction.

154 ,QWHUQHW6HFXULW\
Staying Safe when Gaming Online – Advice for Your Child

NOTHING PERSONAL Never give out any personal details into an AVOID HACKING Don’t attempt to download or sign up for a site that
in-game chat window, via your headset or claims to give you an in-game advantage or cheat.
in a game’s forum. These places are ideal hunting grounds for those who want Some downloads and sites contain malware payloads or are trying to scam you in
to use that information to their advantage. Make sure your username isn’t some way. Whilst it’s tempting to have the advantage, it’s nearly always some form
linked to you in real life too. of phishing scam.

NO GRIEVING Try not to get angry or be fooled by someone who’s ALTERNATIVE SERVERS If you find yourself on a server with
being nasty in the game. They could be baiting you, cheats, the subject of griefing or other
griefing you into making a mistake or simply just a cyberbully who’s looking for forms of bullying, then leave the server and see if there’s another one available
someone new to inflict misery on. Don’t react to anyone calling you a noob, loser without these people present. It might also just be a bad time of day, so try again
or any such wording. later on.

WARY TRADING Be wary of any in-game comments offering a


discount on in-game items or trades. Whilst some
are legitimate, people wanting to trade one item for another, others are trying to
scam you out of real money or in-game cash or items.

AVOID CHEATING Cheats are everywhere. Even in the most secure


game, there will be a time when someone
releases a cheat code that can grant them immortality, infinite items or
something else that enables them to win all the time. If you can, record their
activity and report them to the game server admins.

,QWHUQHW6HFXULW\ 155
Online Child Protection

The temptation and lure of the Internet is often a little too much for some people, especially young
people who are repeatedly told not to look or go somewhere on it. Tell a young person not to open a
box and most will lift the lid when you’re not around.

T
he tech-savvy youngsters of today will already have
a better idea of how to circumvent technological Webmail
restrictions that we’ve put in place. We’re not It’s easy enough for someone to create a webmail account,
saying they’re hacking or do anything particularly such as Yahoo or Gmail and use it without anyone knowing
bad, it’s just that sometimes we need to see what all the of its existence. Combine a webmail account with private
fuss is about ourselves, rather than take someone else’s browsing, for example, and a young person
word for it. Here then, are some of the tricks that the could have an entirely anonymous email
modern, digitally capable young person can do to hide account without there being any trace
what they look at on the Internet. of it on your system, as nothing will be
stored locally.

Private Browsing There are also plenty of fake email


services available, so in effect a
Private browsing, privacy mode or incognito mode is a
different persona could be created with
feature built into every browser, regardless of the computer
relative ease, as we’ve seen in previous
or device’s operating system. It is, as the title suggests, a
anonymous and privacy sections of this
privacy feature that will disable the browsing history and
book. Either way, it’s certainly possible
web cache; it stops any data from the browsing activities
for a young person to have an email
from being stored on the device or computer.
account you know nothing about.
With private browsing mode enabled, which
takes just a couple of clicks of the mouse,
someone can effectively run a search Burner Phones
for something they shouldn’t, view the Whilst a burner phone is usually a
content and close down the private phrase we hear on TV cop shows, the
browser window without anyone ever reality is startlingly close. It’s not unheard of
knowing they were on the site. There for a young person, often a teen with a job, to
are ways and means in which you purchase a second pay-as-you-go phone that
can check for private browsing they can use to contact someone or access the
but it’s often hit and miss and Internet and other apps without you knowing.
not entirely accurate, which Never underestimate the resourcefulness
is the whole point of private of a young person. Just as with a cop
browsing in the first place. show burner phone, it’s an easy

156 ,QWHUQHW6HFXULW\
Monitoring What’s Going On

enough device to hide from a parent or guardian. Of course, we’re not saying you should police your Human nature finds
Naturally there’s a limit to what a young person can children like a prison warden. There will come a point most of us sneaking a
get away with but it’s something worth keeping in where you simply have to have faith that you’ve taught
mind. Another of the many elements to look out for them right from wrong and let them go and discover
peek at something we
with a young person who’s being groomed, is a burner the world by themselves, however painful that shouldn’t and children
phone the groomer may give to them. This way, they’re may be. There’s a fine line between protection and and young people are
able to contact the young person with a higher degree controlling and its borders are ever shifting thanks certainly no different.
of anonymity. to the technology available and the ever-growing Young children will
curiosity of young people.

Secret Social Media However, we can make sure that a young person is
educated and Internet-wise enough to be able to
When used with an unknown webmail address, and
private browsing, it’s an easy task to create a secret make decisions for themselves; and, as you would
social media account. Try it yourself and see how far expect, we also need to ensure that they’re not the
you can get using Twitter and Facebook and the like. victim of any digital attack. An open relationship Eyes
Despite the fact that creating a fake social media
account is against the social media platform’s rules,
is credited as being the key here, as often stated by
professional bodies. in the
it’s not something they’re able to police with any Back
great efficiency. Just like a secret email, it’s extremely
difficult to see if a young person has set up a secret of Your
social media account.
Head
OS on a stick
It’s possible to have an entire operating system on a
USB stick and be able to boot into the OS outside the
system that’s installed on the computer. This makes most likely avoid those
for an impressively anonymous and secure platform
to browse from, as everything is done via the USB stick
areas on the Internet the
and the temporary session held in memory. parent or guardian has
told them to never go to;
Naturally, the young person will need to reboot the
computer and boot into the OS on the USB drive but
however, older children
that takes mere seconds these days. The end result is and teens may find it a
something you’ll never likely be aware of. little too tempting.

,QWHUQHW6HFXULW\ 157
Online Child Protection

Monitoring Online Activity for


Non-Technical Guardians
There’s a vast difference between monitoring a child’s online activity and actively spying
on everything they do. In monitoring, you’re making sure that they aren’t being scammed,
downloading anything illegal and generally behaving themselves online.

Non-Technical Tips for Monitoring


There are numerous ways to monitor a child’s online safety but a lot of them can be quite technical. Instead, here are ten tips for those who aren’t as
computer literate but still want to help keep a child safe online.

DEFINE RULES First off, set some rules. Don’t use the Internet alone in ISP HELP If you require some extra help with monitoring the Internet
your room, don’t chat with anyone online, don’t enter activity in your home, consider contacting your ISP and
your full name or address online, don’t click on any links, don’t open any chatting with a member of the team. Most, if not all, ISPs will have a dedicated
attachments, and talk if you see something that’s upsetting. Common sense section for online safety, in particular child safety and may be able to set up a
rules will go a long way to ensuring online safety. web-based monitoring portal for you.

FAMILY ACCOUNTS Consider using the Microsoft Family Account as


your child’s login to Windows 10. We’ll go into
more detail as how to set it up and use it a bit later on. For now though, navigate
to https://support.microsoft.com/en-us/help/12441/microsoft-account-
monitor-child-device-activity and see what you can do with a child account in
Windows 10.

BE PRESENT Even if there are multiple computers and devices in the


home, only allow the child to use one located in a main
living area, such as the living room. Somewhere you’re likely to be when they’re
online, so you can keep an eye on them and be at hand if they come
across anything.

158 ,QWHUQHW6HFXULW\
Monitoring Online Activity for Non-Technical Guardians

GOING OFFLINE If your child wants to play a game, one that doesn’t 3RD PARTY SECURITY It’s worth investing in a third-party
involve any online communications, or do some anti-malware security suite, such as
work, consider unplugging the computer or device from the home router. Either Bitdefender. With Bitdefender, and other security suites, you get some form of
pull the cable out of the network port or power down the Wi-Fi. That way they family protection allowing you to keep track of Internet use, block unknown
can’t get online. communications and even extend the protection to mobile devices.

BROWSER HISTORY After your child has been online, consider FREE MONITORING If you don’t want to pay for a full suite, consider
taking a look at the browser history. You can using a free monitoring and protection tool
find the history among the browser’s usual settings, click on the three horizontal such as Norton Family Free Edition. With it you can supervise web access, protect
bars in the top right of Firefox, for example, followed by History to view the personal information and set up social network supervision.
recently visited web pages.

BECOME FRIENDS If your child has any social media accounts,


make sure to become friends or connected to
PARENTAL FILTERS Make sure that any search engines used, such
them. This way you can see what they post, what they like and be ready to help
as Google, have the parental filters set to the
them should something ever get out of hand.
maximum or strict levels. In Google, enter something in the search box, then click
the Settings link and turn on SafeSearch. Other search engines may differ in
appearance but they all have some form of customisable filter rule.

,QWHUQHW6HFXULW\ 159
Online Child Protection

Tips for Technical Guardians to


Monitor a Child’s Online Activity
For those parents and guardians who are more technically minded, there’s a wealth of software
and features available that enable you to monitor your child’s Internet activities. Some are simple
solutions, others require a little more work, it depends what you’re looking for.

Ten Steps for Tech Minded Guardians


As a technically minded parent or guardian, you can monitor traffic, set up batch files to send daily connection reports and fiddle with the inner workings of
your router. Here are ten tips to help you out.

ROUTER LOGS Depending on the router you own, either one you’ve FRIENDLY NAMING This may seem an obvious step but it’s one that
bought or the ISP-provided one, there’s often a way to often overlooked. If you’re going to monitor
log web traffic. The logging can sometimes be a single entry detailing the entire online activity, you need to make sure that the child’s devices are correctly labelled
house’s activity or you can specify individual devices connected to the router. You in the router setup. Instead of them being just a string of numbers, take the time to
need to consult your router guide for more information, or contact your ISP. ensure they’re labelled as ‘Bobby’s iPad’ and so on.

RESOLVE ADDRESSES If when consulting router logs you have


countless IP addresses instead of domain
names, you can run the addresses through a reverse IP lookup site. There are Monitoring software is a must have for
dozens available, but MX Toolbox is a good place to start. Enter the IP address
PARENTAL MONITORING
parents or guardians who want to limit
and you can see who the hosting company is, and from there ascertain what’s and control what their children do online. We’ll look at some examples over the
being viewed. page but to begin with take a look at Qustodio Parental Control: https://.
qustodio.com/en/. It’s a cross-platform tool for better monitoring of online
activity, and it’s reasonably well priced.

160 ,QWHUQHW6HFXULW\
Tips for Technical Guardians to Monitor a Child’s Online Activity

DISPLAY DNS For those who like to get their hands dirty in the BROWSER CONTROL If you need a specific monitoring and parental
command line, open up CMD from the Windows Start control tool, then consider using FoxFilter for
button and enter the command: ipconfig /displaydns. This will list the sites Firefox. This is an add-on that can block customised websites, such as anything
visited by the user during their session. If you want, record the sites to a text file containing inappropriate content and report its use in a handy web interface.
for viewing later with, for example: ipconfig /displaydns > c:\monitoring\
sites.txt.

NETSTAT COMMAND Using the Netstat command that we looked CHROME CONTROL Users of Chrome can try MetaCert’s Parental
at on page 98, you can enter into a command Controls & Web Filtering add-on. With it you
prompt: netstat -abf 5 > c:\monitoring\activity.txt. This will record the entire can block certain sites, set profiles and monitor the web activity of your child as
activity of a session to a file, which you can then browse. The recording will stop they use the browser. There are plenty of features, so it’s worth looking over if you
once the child has logged out of their Windows account. regularly use Chrome.

WINDOWS LOGS Don’t forget to check your Windows Event Logs, SUPERVISED USER While still on Chrome users, if you visit http://
especially the Windows Firewall Event Log for any chrome.com/manage, you’re able to set up a
activity that may have triggered the Firewall. You can then build up a picture of supervised user for the other Chrome accounts. This way you can set restrictions
where the child is visiting that’s causing the Firewall to react and educate them in and monitor the sites that a user has visited during their Chrome use.
the dangers of malware and such.

,QWHUQHW6HFXULW\ 161
Online Child Protection

Ten Monitoring Tools


to Install and Use
Monitoring tools usually come within a complete Parental Control package. These tools can be
dedicated programs, or come as a part of a security suite. Either way, they’re excellent ways to help
keep children and young people safe on the Internet.

Parental Controls
We’ve collated ten of the better parental control and monitoring tools and software, in no particular order. Some offer their software for free, others you need
to pay for.

QUSTODIO We’ve mentioned Qustodio in the previous page, so it’s a KIDLOGGER KidLogger is an interesting product that offers a basic,
good example to kick of this top ten tools section with. single device with nine days of history for free, moving up
Qustodio is a complete package that monitors, blocks, filters and controls times, to five devices, then ten devices for increasing costs. You can monitor browser
games and apps across many different platforms. Pricing for up to five devices activities across Windows, Mac and Android; block apps, take screenshots and
starts at £32.95 per year. limit time, amongst other features.

OPENDNS OpenDNS from Cisco offers both free and paid-for services to
help block inappropriate content across virtually any Internet
connected device. You need to set up DNS entries in your router to take advantage
of it but full instructions are given via a helpful setup guide. Without a doubt, one of the most respected parental
NET NANNY
control solutions available is Net Nanny. It’s been around
since 1996 and offers unparalleled levels of filtering, protection, monitoring and
parental controls. It’s cross-platform and prices vary depending on what you want,
so it’s best to check out the latest offers available.

162 ,QWHUQHW6HFXULW\
Ten Monitoring Tools to Install and Use

BITDEFENDER Bitdefender’s Total Security suite offers an excellent NORTON FAMILY Norton Family is a previously mentioned tool that
parental control and monitoring tool within it’s offers both free and paid for services to help protect
already impressive list of features. It’s cross-platform, can shield children and children and young people online. It’s cross-platform, provides protection for
young people from inappropriate content and extends its use to mobile social media accounts, time supervision, activity monitoring and much more.
devices too. Pricing starts at just £34.99. Check the site for the latest features and pricing.

UKNOWKIDS uKnowKids provides a wealth of features for parents, KASPERSKY Kaspersky Total Security 2017/8, very much like
including call logging on devices (with Facetime call Bitdefender, offers a parental control feature within its
logs), image reviews that children post, social media monitoring and web security suite. With it the parent or guardian can set time restrictions, block
browsing history access and controls to block inappropriate content. Pricing access to inappropriate content, monitor Internet activities and monitor
varies, so it’s best to visit the uKnowKids site to see the latest offers available. communications on mobile devices. Prices start at just £31.99 per year for a
single device.

K9 WEB PROTECTION K9 Web Protection (nothing to do with


MOBICIP Mobicip is a cross-platform tool that offers app monitoring, protecting dogs from accessing the Internet)
web browsing monitoring, time limits and custom filters. The is a free, cloud-based Internet filter that blocks inappropriate content, sets time
basic package is free but has some good features on offer, whilst the premium restrictions, forces safe search on all search engines and works on both Windows
package costs $39.99 per year. and Mac computers.

,QWHUQHW6HFXULW\ 163
Online Child Protection

Using the Windows Hosts


File to Block Sites
The Hosts file is used by the operating system to map hostnames to IP addresses. It’s a historical
file that’s used by Windows to signpost internal and external websites, and other such networking
services. You can use it to your advantage though.

The Perfect Host


The Hosts file is simply a plain text file for mapping network locations and is checked by Windows to see if there’s an entry whenever the user requests access
to a website or network resource. Here’s how to block websites using it.

STEP 1 First you need to open the Hosts file with administrative access. STEP 3 You can see that the Hosts file is a historic text file dating back
To do this, click on the Windows Start button and type notepad. from the early days of networking and communications. The
When Notepad appears in the search list, right-click it and choose Run as localhost entry at the bottom of the file, 127.0.0.1 is your computer. This is the
Administrator from the menu and click Yes for the UAC message authentication. important entry, as we’re going to fool the networking services into believing that
a website is stored locally.

STEP 2 Within Notepad click File > Open and navigate to c:\Windows\ STEP 4 It’s this fooling Windows that makes this such an effective solution
System32\drivers\etc. Click the drop-down menu saying Text to blocking sites, as you’re not fiddling with your router or other
Documents and change it to All Files. This will list the files within the etc folder. networking devices. Let’s say, for example, you want to block BDM Publications.
Click on the Hosts file, then click the Open button. Open a browser and go to the BDM Publications website,
https://bdmpublications.com.

164 ,QWHUQHW6HFXULW\
Using the Windows Hosts File to Block Sites

STEP 5 Either close or minimise the browser window and get back to the STEP 8 What we’ve done here is fool Windows’ networking services into
Hosts file in Notepad. Press Enter a couple of times to start a new thinking that the website bdmpublications.com, is being hosted
line under the last hash and type in: 127.0.0.1 bdmpublications.com. Don’t on the computer itself and not out there on the Internet. If we wanted to remove
add the HTTPS or the www part, just as it appears in the address bar. the block, we can simply delete the line or put a hash at the start of the line and
save the file.

STEP 6 In Notepad, click File > Save, to obviously save the newly edited STEP 9 Over time you can add more sites to the Hosts file list, pointing
Hosts file. Now get back to your browser and either refresh the each one back to the 127.0.0.1 address of the local computer to
page or close and reload the browser. When back up, in the address bar enter the block it from ever being reached; even if you use a different browser or other
site: https://bdmpublications.com. You can now see that the page won’t load. Internet accessible program.

STEP 7 You can try searching for it via Google or Bing but it still won’t STEP 10 If you want a complete list that’s already been created, then
load as you’ve successfully blocked access to the website’s WinHelp2002 provides a downloadable compressed Hosts file
hostname from the Hosts file. You can also see that any sub-domains after the that you can replace your own with. You can find it at http://winhelp2002.
main bdmpublications.com address are also blocked, which is certainly handy mvps.org/hosts2.htm; just read the instructions to replace the new Hosts file.
for some sites.

,QWHUQHW6HFXULW\ 165
Further Protection for Young Adults

166 ,QWHUQHW6HFXULW\
INDEX

Younger children are certainly vulnerable when on the Internet but


from 13-years a teenager is allowed to have a Facebook, Twitter and
other social media accounts. This opens up a whole new level of online
protection issues and significant dangers within.
We look at how you can help protect their social media status and how to
create their own Windows accounts.

168 Staying Safe with Facebook 180 Windows 10 Family Features


for Teens 182 Problems with In-app Spending
170 Staying Safe with Twitter for Teens 184 Tips on How to Stop In-app
172 Staying Safe with Instagram Overspending
for Teens 186 Online Child Safety at School
174 Staying Safe with WhatsApp 188 Where to Find Help with Online
for Teens Child Safety
176 Staying Safe with Snapchat 190 What the Experts Say
for Teens
192 Glossary of Terms
178 Creating a Child Account in
Windows 10

,QWHUQHW6HFXULW\ 167
Further Protection for Young Adults

Staying Safe with


Facebook for Teens
If your child is thirteen they’re now, according to the rules of the company, allowed to have a
Facebook account. Facebook’s popularity has waned in recent years with teens but it’s still heavily
used. Therefore, we need to make sure that our teens are safe when on it.

Smells Like Teen Facebook


Providing you adhere to the recommended security settings for Facebook, and don’t add just anyone who sends you a friend request, you should be
relatively safe. However, these ten tips will help.

Get to the Facebook security settings by clicking on the Down Arrow next In the same section, you’re also able to set up two-factor authentication,
to the question mark in the top right of the Facebook interface. From utilising your phone, where Facebook will send a code to login with along
there click the Settings option on the menu and then Security and login on the with using your password. This elevated level of security ensures a higher degree
left-hand panel. If you haven’t already, make sure you’re using a strong password, of safety, as your account will be extremely difficult to hack.
as suggested earlier in this book.

Whilst in the Security and login page, click the ‘Get alerts about Click on the next section heading on the left-hand pane, Privacy. Take a
unrecognised logins’ section’s Edit box, this enables you to view if your moment to run through each of the options in this page, to ensure that
account is logged in from an unrecognised device. This particular function is your account is as private as possible, whilst still being available for true friends
handy to keep track of when and where your Facebook account is being used. and family to add you to their friends lists.

168 ,QWHUQHW6HFXULW\
Staying Safe with Facebook for Teens

We’re sure you don’t need telling this, but never type your password into Try to avoid being drawn into mass phishing posts, where the response
your Timeline. It may sound like a very basic tip but there have been asking is along the lines of ‘List five things about yourself, then pass it on’,
instances of users being fooled, or simply not thinking of what they’re doing or or even posts that ask for likes. These are generated to catch active user
where they’re typing, into entering their password into the Facebook Timeline. accounts, which can then be used for phishing attempts.

Never accept a friend request from a random stranger. Sometimes they Don’t be fooled into thinking that posts asking for people to help locate
accompany their request with a message, something along the lines of a missing child, pet or object are real. Not only are most of these
‘hey, remember me? We met in town…’, or something similar. The hope is that phishing attempts but often they can be attempts of someone trying to find a
you’ll accept the request blindly and once in your friend list, they can get all person; there could be a reason that the person in question has left, an abusive
manner of details from you. relationship perhaps.

Although it’s nice to put forward information about yourself in your Always think before you enter a post or reply to one. Just as you would
Facebook account, be a little cautious and consider not entering too in life, sometimes it’s best not to say anything at all rather than offend or
many details. It’s very easy for someone to then retrieve information regarding anger someone who’s is blatantly baiting others. Think also about what images
your date of birth, where you live, where you went to school, where you work and you post. Could your address or other details be discovered from the image?
so on.

,QWHUQHW6HFXULW\ 169
Further Protection for Young Adults

Staying Safe with


Twitter for Teens
Twitter has been seen as both a force for good, allowing users from other parts of the world
to communicate with what’s going on in their country and as a platform for the nastier side of
humanity. For teens, there’s a lot to consider with staying safe on Twitter.

Twitter Twits
The age for setting up a Twitter account is thirteen but even adults can find themselves in a pickle from an errant Tweet or a Twitter-based phishing scam.
Here are ten tips to help keep you safe on Twitter.

In Twitter, click on your profile picture and choose Settings and Privacy Just under the Direct Messages options, look to the Safety section. Here
from the menu. To the left-side of the Twitter interface, click on the you can opt whether to hide Tweets that may contain sensitive content,
Privacy and safety link. Consider enabling Tweet Privacy and disabling remove blocked or muted accounts or display media that may also contain
Discoverability for improved safety. sensitive content.

Further down the Privacy and safety section, make sure that the Direct To the left-hand options pane, click on the Muted Words section. With this
Messages option, Receive Direct Messages From Anyone is unticked. This option you’re able to hide certain words, phrases, usernames or hash
way you won’t get messages from anyone on Twitter, just those who you follow. tags. This is a great option to mass block any content you never want to see, or
that contains inappropriate content.

170 ,QWHUQHW6HFXULW\
Staying Safe with Twitter for Teens

If you see a Tweet from a user you don’t like the look of, or is offensive in Try not to reply to any Direct Messages sent to you on Twitter. Whilst
some way or form, you have several options available to you. Click the some messages and accounts are real, perhaps a job offer for example,
down-arrow next to the user’s name and you can Mute, Block, Report or simply many are simply Twitter bots phishing for active accounts and details.
opt for I Don’t Like This Tweet.

As a Twitter user who hasn’t enabled privacy, you’re open to anyone


finding and following you. You get an update as soon as someone does
follow you and you then have the option to Mute, Block, Report or remove the
user. Don’t be afraid to remove a user if you don’t know or trust them.

Never click on any links that appear in a Tweet or as part of a Direct


Message. Unless you specifically know the user and can trust their
Tweets or messages; the link may lead you to a site that’s riddled with malware
or further scams.

Just as with Facebook posts, don’t be fooled into commenting on posts Always think before you reply to any Tweets, post your own or upload
that are phishing attempts. These are created to farm for active accounts any images. It’s very easy to offend and become involved in a heated
and gather information about users’ tweets, and any personal details. war over something you don’t want to be a part of. Don’t become the victim
of anyone baiting you into an argument. If you are, then sign off and leave
the group.

,QWHUQHW6HFXULW\ 171
Further Protection for Young Adults

Staying Safe with


Instagram for Teens
Much of today’s Internet youth has moved from Facebook and now inhabits Instagram. This social
media platform is used by celebrities, politicians and a user base of over 700 million. Needless to say,
it’s population is varied and contains those who you wouldn’t want contacting you.

Insta-scam
In compliance with the Children’s Online Privacy Protection Act, Instagram requires that its users’ minimum age to sign up is 13 but even as a young teen,
there’s still plenty to do to help improve your safety.

Instagram is a simple photo and sharing app but there’s plenty of Staying in the Account section,
material and content out there that shouldn’t be viewed by minors. That tap on Edit Profile. This is where
being the case, tap the person (profile) icon in the bottom right, then the three you can create a profile picture and
vertical dots in the top right. This opens the Instagram Options window. From include other information about yourself.
there, scroll down and enable Private Account. It’s up to you how much info you want to
add but it’s often best to take a secure-
minded approach and not give away
too much.

The magnifying glass icon is


the Instagram search
function. It often displays images
and videos based on your likes and
who you follow, such as amazing
landscapes but it’s also known to
insert content that isn’t always
Private Accounts are visible, but not the content you’ve posted. Anyone appropriate for younger viewers.
who wants to follow you will need to send a request, so you can easily Don’t open the image, even to
decline any users. Whilst still in the Account section, scroll up and consider report it, it’s best to just ignore it.
enabling Two-Factor Authentication, for additional security.

172 ,QWHUQHW6HFXULW\
Staying Safe with Instagram for Teens

Uploading an image provides multiple options, from choosing a filter, The Instagram Help Centre is where you can report a user for
image style and so on, to tagging other people, sharing with other social inappropriate content, abuse, spam, hacked accounts or exposure of
media platforms and adding a location. It may seem harmless enough but private information. It’s available from any browser, as well as from the app itself.
consider not sharing your location, as it’s instantly available on Instagram. It Be familiar with it, as you may need it someday.
doesn’t take a genius to locate where you are.

Be wary of what you see on Instagram. This applies to other social If you find yourself involved with someone or a group of people who are
media platforms too but Instagram users appear to revel in posting fake obviously trying to create some form of hate messaging, bullying or
or photoshopped images of themselves or others, or even events. It’s a huge similar, make sure you take any screenshots as proof (in case someone reports the
source of image-aware and body-conscious behaviour, that’s influential to incident) and walk away from the conversation. Block accounts if necessary, to
younger minds. In short, don’t always believe what you see on Instagram. stop further instances happening.

Parents: before you allow your young teen access to Instagram, it’s best
you have a read through the company’s Tips for Parents section. This
can be found at https://help.instagram.com/154475974694511/?helpref=hc_
If you’ve approved a user, whilst in privacy mode, and they start to send
fnav and includes everything you need to know about what it is and how
you inappropriate images, video or comments, then make sure that you
it works.
show a parent or guardian. Don’t respond to the sender and don’t unfollow or block
them until you’ve shown someone or taken a screenshot of the content.

,QWHUQHW6HFXULW\ 173
Further Protection for Young Adults

Staying Safe with


WhatsApp for Teens
WhatsApp is a free messenger app that can make Internet voice and video calls, send messages,
images and other content. It’s a little safer than some social media platforms, as you need a user’s
phone number before being able to add them; but there’s always room for further security.

What App?
There’s plenty you can do to improve your privacy and security and remain safe when using WhatsApp. Here are ten tips for teens and parents when using
this popular app.

According to WhatsApp’s terms, the minimum age needed is thirteen WhatsApp has a high-degree
years old before a young person is allowed to use the service. Thankfully of encryption and security
young teens are only able to contact those who they have added to their already built-in; however, by tapping
WhatsApp account but it’s best to occasionally check their contact list in case of the Security option within the Account
someone unknown being added. option, you’re able to display any
security notifications that may crop
up from time to time.

Tap the three vertical dots in the top right of the WhatsApp interface, Again, from the Account
followed by tapping the Settings option. Now tap the Account option, option, tap on the Two-Step
then Privacy. In here you’re able to limit the amount of personal information a Verification setting to set up a PIN in
contact can view, as well as block any contacts. addition to your usual login
information. This will enhance the
security of your WhatsApp account,
should you ever lose your device.

174 ,QWHUQHW6HFXULW\
Staying Safe with WhatsApp for Teens

If you’re using the web version of WhatsApp, click on the three vertical If someone becomes aggressive or starts to bully you in WhatsApp, take
dots, followed by Settings. Although not as comprehensive as the app’s a screenshot and record the evidence, then approach a parent and
settings, you can set up your notifications and block any users if necessary. guardian and show them what’s going on. Don’t respond to the person and don’t
block them immediately. Always talk to a parent or guardian before
doing anything.

Back to the Privacy settings in the app’s Account option, don’t forget to Any contacts that send you a message can be blocked, muted and the
limit the Last Seen setting. The three options available are: Everyone, My chat content cleared or emailed if needed. Just open the message, tap
Contacts and Nobody. This will prevent contacts from seeing where you were the three vertical dots and select the appropriate option from the menu.
when you posted any content.

WhatsApp also utilises the device’s built-in Location feature. This Once you have a message
enables geo-tagging of content as it’s uploaded. If you want to upload open, long tap the contact
something but want to make sure that nobody knows where you are, quickly tap and you can see the contact’s
the Location function on your device to disable it before uploading. information. From there you’re able
to block them, report them as a
spam user, mute them or even
verify that the messages sent are
fully encrypted.

,QWHUQHW6HFXULW\ 175
Further Protection for Young Adults

Staying Safe with


Snapchat for Teens
Popular amongst young teens, Snapchat has continually raised its appeal by offering alluring
features at the cost of security and privacy. The most recent update (at the time of writing) is Snap
Maps, a feature that tells everyone where you currently are.

Safety Snaps
Snapchat has some useful features but also some slightly scary security issues. It’s best then to make sure that you’re as safe as possible when using it.

Parents: Take the time to look through your child’s Snapchat contacts. You can create your own Snapchat Stories, by tapping the three dots in a
Together you can limit who can see what and who can contact your triangle in the bottom right of the Snapchat interface. Make sure that you
child through Snapchat’s various functions. also tap the cog icon in the top right within Stories, in here you’ll be able to limit
who sees your stories. Try and avoid choosing Everyone, if possible.

Tapping the magnifying glass icon will open the global Snapchat Top Snap Maps is the newest
Stories. From there a user can search for something specific or view feature to Snapchat, one that
any Snapchats via the various headings. Be careful here, there’s a lot of enables other Snapchat users to see
inappropriate content out there, along with dubious individuals who would like where you are in the world. To open it,
your information. pinch your fingers like you’re zooming
out from the camera screen. When
asked, you’re able to set who can see
your location. Always ensure you
know your friends, or enable Ghost
mode for better privacy.

176 ,QWHUQHW6HFXULW\
Staying Safe with Snapchat for Teens

Tap on the Snapchat icon, Be wary of the Add Friends function in Snapchat. From it you can add
followed by the cog in the top friends in your contacts list, any that have sent you their Snapcode,
right to access your account settings. shared friends lists, or you can opt to locate other Snapchat users based on
Scroll down a little way to Login whether they’re nearby. Obviously this is a privacy and security concern, so be
Verification and tap it. This is a two-step aware of it.
authentication process that requires
both a code sent to your device, as well
as your login details to open Snapchat.
Useful if you ever lose your device.

Whilst still in the account settings, scroll down to Manage Preferences


under the Additional Services heading. In here you can limit the mobile
data use and enable filters for nearby places, change the app permissions and You can easily remove friends, block and report other Snapchat users by
advert preferences. long pressing the contact or Snapchat feed and selecting the option from
the menu. Make sure you’ve taken any screenshots of inappropriate content
before blocking, to use as proof if reporting the contact.

Under the Additional


Services heading, the Who
Can… heading enables you to
specify who can contact you or see
your Stories. It’s best to limit your Just as with all social media platforms, if you’re uncomfortable with
account so only friends are able to the content or messages that someone is sending you, tell a parent,
see you or any posts you make, as guardian, teacher or other responsible adult. Don’t respond, don’t send
opposed to the Everyone option. anything to them and always think before posting any images of yourself and
your location.

,QWHUQHW6HFXULW\ 177
Further Protection for Young Adults

Creating a Child Account


in Windows 10
If you’re sharing a Windows 10 computer with your children, or they have one for themselves, then
setting them up with their own account will work better for you both in the long run. A Windows 10
child’s account gives them freedom, and you can set up certain restrictions.

Windows 10 for Children


With a Windows 10 child account you’re able to set up age restrictions, time limits and ensure they’re not visiting sites or using apps they shouldn’t.

STEP 1 Start off by clicking the Windows Start button and typing STEP 3 You need to sign in with a Microsoft account for this to work. If
‘account’. The first result that should appear is Manage your you’ve not already set up a main Microsoft login account for
account, if anything else appears, maybe you have some work labelled ‘account’, Windows, you’ll need to click the Sign in with a Microsoft account option. Once
then scroll down until you find the Manage your account option. done, you’re presented with the current family members who already have
MS accounts.

STEP 2 You now find yourself at the Windows 10 Settings page, in the STEP 4 Next click on the Add a Family Member link, next to the plus sign
Accounts section portal. Notice there are links down the left-hand under the Your Family section. This will launch a new pop-up
side, look for the Family & Other People link and click it to continue with the process. window to create a new Microsoft account. You need to make sure that your child
has an email address and that you or they currently have access to it to
authenticate the process.

178 ,QWHUQHW6HFXULW\
Creating a Child Account in Windows 10

STEP 5 Click the Add a Child option in the new account window and STEP 8 The child’s account is now ready to be activated. The message
enter their email in the text box section below. When you’re ready, box informs you that you need to respond to the email Microsoft
click on the Next button. has sent before they’re able to login in to the Windows 10 computer. Click the
Close button when you’re ready.

STEP 9 Microsoft will send some emails to the child’s account. One will be
a Verification email, and you, or your child, will need to click the
link to activate the account; they need to login to Microsoft online to complete the
process. The other email will be an invitation to join the family account, which you
also need to Accept.
STEP 6 You now get the message that it’s not a Microsoft account, click
the link to Create a Microsoft Account. This will bring you to a new
window with the email address you’ve entered already filled in. Complete the
relevant details and click the Next button to continue.

STEP 10 Using the child account to join the family will send emails to
you confirming the accepted invitation. Back at the Windows 10
Family & Other People window, you can now click the child’s account and allow it
to login, or manage it via the Microsoft Family portal online, which we’ll look at in
the next tutorial.

STEP 7 The next section details what level of search and advertising
Microsoft will allow to the account. Obviously you can untick both
boxes or leave them as they are, it all depends on what you want. However, for
the sake of enhanced privacy, we recommend unticking both. Click Next when
you’re ready.

,QWHUQHW6HFXULW\ 179
Further Protection for Young Adults

Windows 10
Family Features
Microsoft’s Family portal is a continually updating service that allows you to monitor, control and
share features across Windows machines and Xbox consoles. It’s designed to help share calendars,
set screen times for games and set up safe browsing.

Happy Families
The Microsoft Family portal is where you’re able to set the various features. First, you need to browse to https://account.microsoft.com to login with your MS account.

STEP 1 When you’ve logged in to the Microsoft account online, click on STEP 3 Being a parent or guardian, you can set Activity Reporting for any
the Family link found along the top set of menu options. This will of your Microsoft child accounts. Click on the Activity reporting
display the current members of your Microsoft account, adults and any children slider to the On position; this will instantly block InPrivate browsing within
you’ve added, as per the previous tutorial. Microsoft Edge and start to collect data on their online activity.

STEP 2 Under the child account you can see four options: Check recent STEP 4 Under the Activity reporting, you can see sections for Web
activity, Web browsing, Screen time and More options. All the browsing, Apps & games and Screen time. To the right of each title
options can be accessed by clicking on any of the links, so to begin with, click the are links to set up web access blocking, game and app blocking and so on. Click
Check recent activity option. on the Turn on blocking link next to Web browsing to begin with.

180 ,QWHUQHW6HFXULW\
Windows 10 Family Features

STEP 5 Providing the child uses Microsoft Edge, you can set Windows 10 STEP 8 Purchases & spending is an interesting option and something which
to automatically block any inappropriate websites by clicking the we’ll be looking at in the next couple of pages. In here, you can
slider in the Turn on blocking link to the On position. By default, Microsoft will specify a spending limit on the child’s account as well as view their purchase history.
block all inappropriate sites but you can also specify an allow and block list of
sites yourself.

STEP 9 The Find your child setting works only with Windows 10 Mobile
devices. With it, you’re able to locate your child or rather their
device, within just a few metres via a handy map. Useful for if they lose their device
or just checking in on where they are.

STEP 6 Click on the back button in your browser to return to the previous
page. Now click the Apps & games section and the Changing
settings link. In here you can set age-specific restrictions on apps and games, as
well as block certain programs from running, such as another browser, forcing
them to use MS Edge instead.

STEP 10 If you own an Xbox One or Xbox 360, you’re also able to set up
any Xbox Privacy settings from within the Microsoft Family
portal. You can specify video chat, viewing of profiles, sharing and other forms of
communications from the console.

STEP 7 Screen time, found on the link to the left under the child’s
account name, will allow you to set time restrictions for the child.
These restrictions will work for Windows 10 computers and devices, as well as
Xbox consoles.

,QWHUQHW6HFXULW\ 181
Further Protection for Young Adults

with In-app Spending


The Internet is awash with horror stories from parents who have discovered that their child has spent an
impressive sum on a game without their consent or knowledge; but, just how much of a problem is this
in-app spending issue?

I
n-app spending is a modern scourge for parents, guardians and even the Of course, that doesn’t help the parent or guardian who is now looking at
children and young people themselves. From the point of view of the their vastly diminished bank account. What there must be is some form of
parent or guardian, we have a child who enjoys playing a game, regardless middle ground, where the developers still get paid and the company can
of whether it’s a mobile game, console game or triple-A rated PC game keep producing exciting and great games. Here the players get to reach
and we’re more than happy to allow them to play the game without any the levels they want and continue playing the game and parents and
restrictions, after all it’s just a game, right? However, when those parents guardians can safely leave their children to play the game and
then receive the bill from their credit card company, or a call purchase an upgrade or two, without breaking the bank.
from the bank, that their account is now several hundred or
even thousands of pounds lighter, that game has suddenly
become the bane of their existence.
From the point of view of the child, they have an
incredible and addictive game in front of them. They’ve
put in the hours of game time to achieve a certain level
but to get any further in the game, or to beat an end of
the level boss or something, they need an extra push.
That push can come in the form of more powerful
spells, weaponry, armour or whatever else the
game requires to boost the player’s stats.
To get hold of that equipment or bonus
content, they need to purchase it from
the in-game store. Some of the content
costs just a few pounds but it soon lures
them into the more expensive extras.
Before they realise it, those few pound
extras soon add up and the straw
that breaks the camel’s back is the
expensive object that pushes them
into the new levels, and causes the
parents much angst.
The developers and creators of the
game have their point of view too. These
developers have spent many hours of coding,
testing, re-coding and marketing to help launch
their game. It’s a painful, exhausting and often
expensive process, so the company that launches
the game will need to see some good returns if it
still wants to continue in business and employing
developers, testers and everyone else involved. All
these people involved with the game need paying,
so if they can top up the business with in-app
purchases, added content and such, then why not.

182 ,QWHUQHW6HFXULW\
Problems with In-app Spending

In light of events that hit the headlines, children store, after all why would most people continually
spending thousands of pounds on purchasing virtual require password access to their own in-store account;
pets, virtual food, more lives etc., the main providers or when the child knows the password and can easily
of mobile purchases, such as Apple, Google, Microsoft access the store.
and so on, started to roll out levels of restrictions to
The child, left alone, could then go ahead and accept
help prevent overspending. These restrictions vary
and have improved greatly in recent years; but initially the message from the game that asked ‘to continue,
they we’re more centred around simple tips and buy more apples’ (or whatever), which in turn led
advice for parents rather than the kind of spending them directly to the store to place the order in the
restrictions we see today. basket without any kind of confirmation or message
stating to check with an adult first.
Of course, some of the problems also arise when the
game in question is clearly a pay-to-win model. It’s Most of the time, when these sorts of scenarios
hardly fair for the young person to enjoy the game occurred, the likes of Apple, Google and so on
when they’re continually beaten by those players who refunded the parents in question. From there, it There are two main
can afford to spend the money on extra lives, energy became more difficult for a young person to go on an
schools of thought on the
and so on. The pay to play model, on the other hand, in-game spending spree with their parent’s account.
Internet regarding the
requires the purchase of the app before it can even be There’s a more controlled in-game and in-app
played. Some experts argue that this is a better model overspending in an app
spending focus these days but it’s still not unheard of
but that’s up for debate. or game by a child. One
for a child to get a little carried away and purchase
several hundred on some form of virtual extras for
view is that it’s the fault
One of the main causes for excessive in-app spending
is a child or young person being left alone with the the game. Thankfully, we can combat a sizeable of parents or guardians,
device and game whilst the parent was logged into percentage of these cases with a little education and letting their child on the
their own account. The account itself doesn’t have any some much-needed tips, which we’ll cover on the next game with unrestricted
restrictions or password access to get into the online couple of pages. access to their mobile
spending platform.

Pay to
Win

The other view lies the


blame at the feet of the
developers and those
who have created the
app or game. Both have
their valid points, and
there’s no right or wrong,
but perhaps the blame
lies equally with each.

,QWHUQHW6HFXULW\ 183
Further Protection for Young Adults

Tips on How to Stop


In-app Overspending
In-app overspending, as we’ve seen, is a concern for parents and guardians whenever their children
use a phone, tablet, console or computer. However, there is a happy middle ground, where the kids
can still enjoy their game and the parents needn’t worry about in-app purchases.

10 Tips to Stop In-app Purchases


There’s nothing wrong with spending money on a game, either to buy it in the first place or just to upgrade a part of it. What’s needed though, is a little
thought to combat overspending.

TIP 1 The main tip, and one that all child experts agree on, is simply don’t TIP 3 If you’re using an iOS device,
leave your child alone with a device, console or computer whilst go to Settings > General >
playing the game. Naturally it depends on the age of the child but essentially it’s Restrictions and tap to enable the
recommended never to leave a younger child alone, as that’s when rogue Restrictions. You can now create a
spending can occur. passcode to lock out access to the iTunes
Store, Safari and other Apple online
portals, as well as other Apple apps.

TIP 2 Set up their own account: using a child’s account will dramatically cut TIP 4 For Google devices, it’s best to either never enter your banking details
down on any in-app overspending. Generally speaking, most children into Google Play or swipe in from the left whilst in the Play Store,
won’t have access to a bank card to enter into the in-game shop or have access to choose Settings and tap the Require Authentication for Purchases option.
the family bank details.

184 ,QWHUQHW6HFXULW\
Tips on How to Stop In-app Overspending

TIP 5 For Microsoft accounts, use the steps from our previous pages to TIP 8 Enabling Airplane mode whilst the child is playing on the device
create a child’s account on your Windows 10 device; then use the stops any access to online services and thus the in-app or in-game
Microsoft Family portal to restrict access to apps and spending. stores. It’s not ideal, and it can easily be deactivated, but for younger children it’s
a valid option.

TIP 6 There’s nothing wrong with spending money on a game, so why not TIP 9 Talking to your children and taking the time to explain how in-app
consider setting up a limited amount of money on a Microsoft purchases work, and how bad it can be if they overspend, is a highly
account. The child then has to then manage their own budget on in-app spending. recommended option. Child experts state that the best policy to prevent
overspending in apps and games is a little education.

TIP 7 Similarly, consider using a gift card for iTunes or Google Play to allow TIP 10 Before your child downloads and installs a game or app, take a
any in-app spending. This way it’s a more controlled purchasing few moments to look through the app’s information to see what, if
environment and since the child is happy with the bonus app-extras, you’re any, in-app products are on offer. This section will usually inform you of how
happy with the spending and the developer still gets paid. Everyone is happy much money the in-app extras cost and you can then judge whether to allow the
with the outcome. install or not.

,QWHUQHW6HFXULW\ 185
Further Protection for Young Adults

Whilst you’re doing everything you can at home to ensure your child is safe when online, what happens when they’re out of
the protection of your home network? Schools are up against as much, if not more, online safety issues as parents.
How does your Most of those questions are dependent Beyond the classroom talks and conversations, schools employ an
on the school itself and what policies assortment of advanced monitoring tools and filters. The school’s expert
child’s school provide
it’s created in collaboration with the IT staff will already use a range of network level security features found
online safety? What council, local government, parents, only in the server versions of Windows, or Linux. These features will restrict
tools and procedures teachers and governing body. In the students’ activities, whilst still offering them access to much needed
do they use? What the UK, the UKCCIS (UK Council for resources both internally and externally on the Internet. If your child is new
government backed Child Internet Safety) has drawn up to the school, take a moment to ask if you can speak to the head of the
schemes are and developed a guide for school school’s IT or IT manager and ask them what they use and do to set limits
governors to follow, to help governing and restrictions on local and Internet resources. Most of the techniques
available for them? boards support their school leaders used are quite fascinating, even from a non-technical point of view,
in keeping children safe online. It’s an and often can be applied to a lesser, but just as effective, degree on the
interesting six-page document and home network.
further reading can be found with the
accompanying Sexting in Schools and In addition to protection on the network level, the IT team will also
Safer Colleges 50-page guidance document.
You can find both at https://www.gov.
implement a range of site-level Net Nanny-like programs. They may only
use a single program, installed on a server to manage each workstation
Schooling uk/government/groups/uk-council-for-
child-Internet-safety-ukccis.
or they may use several programs to manage each student’s account;
monitoring sites visited and providing blocks for sites that are deemed
inappropriate. Another element to consider with a schools’ IT is the use
From 22 December 2015, the of its available bandwidth. With hundreds, often thousands, of devices
Department for Education put in and computers attached to the school network it can at times become a
place strengthened measures to help little slow, as there’s limited bandwidth. A school’s IT team therefore must
What’s their policy on protect children from harm online, also decide whether or not to block access to sites that will cause a strain
cyber bullying and which included cyber bullying, access on the bandwidth, such as online game sites or media streaming. Whilst
what’s the process to pornography and the risks involved the students may be blocked from such sites, the teachers are usually
should anything with radicalisation. These measures unrestricted, for teaching purposes.
inappropriate ever enforced schools to improve or
implement better filters and monitoring These filters, blocked sites and bandwidth monitoring techniques
make its way into the
systems, guides on social media and all add up to make an effective protection net around the school’s IT
school’s network? good practise and the teaching of online infrastructure. It’s important to understand, from a parent’s point of
threats and the issues surrounding it. view, the amount of work needed to achieve such a high degree of online
safety and that it can become quite expensive once you factor in licensed
This safeguarding of students through education is one of the best forms software. Where you might have purchased a child filtering product,
of introducing a heightened level of Internet safety amongst young people. and employed some of the security techniques we’ve used in this book,
Parents and guardians can rant and rave about Internet safety until they a school IT system needs to do all that times a thousand-plus for each
are blue in the face but when it comes as part of a lesson in the school, the student, computer and device.
message is considered to be delivered with a more meaningful impact. In
classes, students are taught what Internet use is acceptable, and what isn’t Nevertheless, a school’s online safety requirements are exceptionally
and given clear objectives for Internet use. The school is also capable and more advanced than you have at home. With this in mind, your child is
often required to consult with outside child protection agencies, bringing less likely to experience any online risks when at school than at home.
in experts to help further the student’s understanding of the dangers and However, it’s always best to take the time to make an appointment with
risks of the Internet, social media and all forms of digital behaviour. the school to ask what they’re doing to ensure online safety.

186 ,QWHUQHW6HFXULW\
Online Child Safety at School

,QWHUQHW6HFXULW\ 187
Further Protection for Young Adults

Where to Find Help with


Online Child Safety
The tips and features throughout this book will help you build a better understanding of security and
online safety, with special reference to online child safety. If you want to know more though, or you
have some pressing questions that need answering, here are some places to check out.

Help is at Hand
For more information, expert advice from child care professionals and more tips on how to protect your child when online, here are ten sites to bookmark
and consider.

TIP 1 If you’d rather contact a professional child care expert, person to TIP 3 Regardless of where you are in the world, the UK’s NSPCC website
person, then consider contacting your local doctor’s surgery and contains invaluable information regarding child safety, especially
asking for a list of contact details of the child counsellors in the area. Most online child safety. You can find the main site at https://www.nspcc.org.uk/,
surgeries will have all the relevant information to hand for you. with access to services and resources.

TIP 2 Your child’s teachers and school welfare officers will have an excellent TIP 4 In addition to the NSPCC, the UK’s Childline is also an exceptional
understanding of how to help keep your child safe when online. They resource that contains a wealth of information and support for
can answer your questions or at least help point you in the right direction. families, parents, guardians and children. There’s a superb online safety section
too. You can find Childline at https://www.childline.org.uk/.

188 ,QWHUQHW6HFXULW\
Where to Find Help with Online Child Safety

TIP 5 Childnet International is a site dedicated to young people, children, TIP 8 The American SPCC (Society for the Positive Care of Children) is yet
teachers and professionals, parents and carers. There’s a ton of another superb site that details advice on cyber bullying amongst
resources and support available through the site and plenty of advice about other child protection issues. There’s also a list of recommended books for you to
online child safety. Find it at http://www.childnet.com/. look up. You can find the ASPCC at http://americanspcc.org/.

TIP 6 Internet Matters features articles, advice, support, guidelines and tips TIP 9 There are some excellent resources available on the Get Safe Online
on how to protect your children better when online. There are plenty website. Here you can find tips, advice and tutorials covering nearly
of resources to hand for children at preschool, all the way up to teenagers at all aspects of online child safety, including emphasis on mobile devices; there’s
college. It’s at https://www.Internetmatters.org/. plenty to get through. You can find it all at https://www.getsafeonline.org/.

TIP 7 To expand on the first entry in our list, local support groups are an TIP 10 Finally, consider checking out the website of, or visiting, the local
ideal source of information and tips. Other parents and guardians police station for more information on online safety. The police
going through the same considerations as yourself may well be more than happy have information on area professionals and child safety experts as well as further
to share any tips they have. information on what to do if your child is the victim of an online threat.

,QWHUQHW6HFXULW\ 189
Further Protection for Young Adults

David Emm, senior security researcher at Internet


security company Kaspersky Lab.

Our next generation is heading into an ever increasingly


connected, digital world. What we perceive as threats now
will certainly change in a decade’s time, as the technology
surrounding us evolves and becomes even more integrated.
What will remain important though, is online safety.

NSPCC, Keeping Children Safe Online.

We’ve gathered together


quotes and asked child
safety and security experts to
have their say on the matter
of online safety; as a result,
here are ten examples from
the professionals
Darren Anstee, director of solutions architects
at network security company Arbor Networks.

190 ,QWHUQHW6HFXULW\
What the Experts Say

NSPCC, Keeping Children Safe Online.

Childline.

Childline.

Shelagh McManus, online safety advocate for


security software Norton by Symantec.

Get Safe Online, Safeguarding Children, Gaming.

Childnet, Staying Safe Online. Childline.

,QWHUQHW6HFXULW\ 191
Glossary of Terms

Glossary of Terms
The bewildering world of technological terms is often difficult even for experts to navigate without
becoming slightly confused and we could easily dedicate an entire book just to the glossary.
However, here are some of the more important terms from the world of digital security and safety.

Digital Security A-Z


Digital security and safety terms are often as clear as mud. Use this glossary whenever you come across a term you don’t understand.

connected, infected computers that organisation’s internal network and

A
Access Control: A term used to
are used to flood a network or send
spam message to the rest of
the Internet.
an external network, usually the
Internet. DMZ’s help to enable the
layered security model in that they
provide subnetwork segmentation
ensure that resources are only Brute Force: A hacking technique that based on security requirements or
granted to users who are entitled uses all possible password
policy. DMZ’s provide either a transit
to them. combinations one at a time in order
mechanism from a secure source to
to gain access to a user account
Active Content: Code that’s an insecure destination or from an
or system.
embedded in a web site. When the insecure source to a more
site is accessed the code is secure destination.
automatically downloaded
and executed.
Advanced Encryption Standard
C
Cipher: A cryptographic algorithm
Denial of Service (DoS): Prevention
of authorised access to a system
or network.
(AES): An encryption standard used in the encryption and Disaster Recovery Plan (DRP): A
designed to specify an unclassified, decryption process. plan of action used to restore
publicly disclosed, symmetric systems in the event of a disaster.
encryption algorithm. Cookie: A file used to store information
about a website that can be read Distributed Denial of Service
Asymmetric Cryptography: Public should the user ever visit the (DDoS): A type of DoS attack using
key cryptography, where algorithms site again. multiple attacking systems to
use a pair of keys, one public and amplify the amount of network
one private, to unlock the content Cyber Attack: An attack on a system
using malware to compromise its traffic, thereby flooding and
protected by the encryption. swamping the target systems
security. Usually in order to gain
Authentication: Used by systems to access to steal information or or networks.
confirm the identity of a user. demand a ransom. Domain Name System (DNS): The
Cyber Bullying: When an individual, domain name system (DNS) is the

B or group of individuals, threaten or way that Internet domain names are


post negative and derogatory located and translated into Internet
messages or doctored images of Protocol addresses. A domain name
someone online. is a meaningful and easy to
Backdoor: A tool used by hackers or remember ‘handle’ for an
system security experts to access a
Internet address.

D
computer system or network,
bypassing the system’s usual
security mechanisms.
Bandwidth: The limited amount of
communications data that any
Data Encryption Standard
(DES): A popular method of data
encryption using a private (secret)
E
Encryption: The process of securing
channel is capable of sending or
receiving in a specific time. key. There are data by transforming it into
72,000,000,000,000,000 (72 something unreadable using
Biometrics: A security measure that quadrillion) or more possible cryptographic means.
uses physical characteristics to encryption keys that can be used.
authenticate a user’s access to Ethernet: Communication architecture
a system. Decryption: The process of for wired local area networks.
transforming an encrypted message
Boot Sector Virus: A virus that can
F
into its original text form.
affect a computer as it boots, before
the operating system has Demilitarised Zone (DMZ): A
even loaded. demilitarised zone (DMZ) or
perimeter network is a network area Fingerprinting: Used by hackers and
Botnet: A large number of Internet (a subnetwork) that sits between an security experts to send packets to a

192 ,QWHUQHW6HFXULW\
Glossary of Terms

system in order to see how it Spoofing: An attempt to gain


responds, usually to determine the
operating system and
security measures.
L
Local Area Network (LAN):
unauthorised access.
Spyware: A type of malware that spies
on a user’s activities or system and
Firewall: A hardware or software layer Communications network linking
reports back to a remote system.
designed to prevent unauthorised multiple devices in a defined, limited
access to or from a computer or location, such as a home or office.
network to another computer
or network.
Flooding: A malware attack that causes
Logic Bomb: A type of malware that’s
dormant until a predefined time
when it explodes and runs or injects
T
Trojan Horse: A type of malware
an eventual failure of a system by malicious code into a system.
bombarding it with a continuous designed as a useful program but in
reality hides some malicious code.
stream of data.
M Two-Factor Authentication:

G
Gateway: A network point that acts as
Malicious Code: Software that’s
designed to circumvent security
measures and gain unauthorised
Authorisation of access to a system
or resource through a username/
password combination as well as
another form of authorisation, such
the door into another network. access to a system.
as a PIN code.
Malware: A generic term to describe

H different types of malicious code.

V
Hacker: Someone who violates or
circumvents a computer security
measure. Can be used for malicious
N
Network: A group of linked computers
Virus: A type of malware designed for
multiple purposes to spread and
purposes or legitimately to test a infect as many computer systems as
or devices that can share resources
system’s vulnerabilities. and communicate with each other. possible. Usually destructive but can
be used to grind a system to a halt by
HTTP: Hypertext Transfer Protocol, the using up all of its available resources.
protocol used by the World Wide
Web (Internet) that defines how
messages are sent, received and
read by browsers and other
P
Password: A secret security measure
VPN: Virtual Private Network, a secure
tunnel between two systems using
advanced encryption methods to
connected software layers. used to access a protected resource protect the communications
and authenticate access. between systems.
HTTPS: Hypertext Transfer Protocol
Secure, an encrypted and far more Phishing: A method used by cyber

W
secure version of HTTP. criminals to obtain information from
a user by baiting them with fake
emails or messages.

I
Internet Protocol Address (IP): A
PIN: Personal Identification Number,
used as a form of authentication
access to a system, resource or
Wi-Fi: A wireless network standard
between connected systems.

standard used by servers user account. Worm: A type of malware that can
and machines to connect to each replicate itself and spread through

R
other and form an individual identity other systems consuming resources
for each connected device. and contents destructively.
Internet Service Provider (ISP): A
company that provides Internet
access to businesses and
residential addresses.
Ransomware: A type of malware that
locks, or encrypts, all files on a
system until a ransom is paid and
the unlock code is entered.
Z
Zero Day: Described as the day a new
IP Spoofing: A form of attack where a
device provides a false IP address to Rootkit: A set of tools used by a hacker security vulnerability is discovered,
a server or network. to mask their intrusion and obtain one that has no fix or patch yet to
administrator access to a system. stop it.

K
Key Logger: A type of malware that
S
Zombie(s): A computer that’s infected
with malware and connected to a
network or the Internet and used to
spread its infection to other
can record key presses as a text file
Sandbox: A system architecture
designed to test code in a secure computers. Used also to describe an
and send that file to a remote attack on other systems by hoards of
and safe environment without it
source. Once obtained, the hacker zombie computers.
affecting the host system.
can then see what keys
you’ve pressed.

,QWHUQHW6HFXULW\ 193
ad The Complete
Re Manual Series
Available on

For a full list of titles available please visit:


www.pclpublications.com
Get Your Exclusive
FREE Gift Worth
£9.99 Here!
Download
Your FREE
Copy of
Tech Shopper
Magazine
Head over to your web
browser and follow these
simple instructions...

1/ Enter the following URL: www.pclpublications.com/exclusives


2/ Sign up/in and from the listings of our exclusive customer downloads, highlight
the Tech Shopper Magazine option.
3/ Enter your unique download code (Listed below) in the “Enter download code” bar.
4/ Click the Download Now! Button and your file will automatically download.
5/ Your file is a high resolution PDF file, which is compatible with the majority of
customer devices/platforms.

Exclusive Download Code: PCL37862RE

NOTE: This is a limited reader offer running from 1st J˨˟y 2023 to 1st ʷ˘˖ember 2023.
Terms and conditions apply and can be found at www.pclpublications.com
Want to master your PC or Laptop?
Then don’t miss our NEW Windows desktop
magazine on digital platforms NOW!

Visit us at: www.pclpublications.com


%9EF)B7:=ECEF#A@8A=F,E?DE>" C9EF>8DCA5D=DC3FB6FC9D>F5BB.FA@;FDC>F<B@CE@CF6B?F09ACE1E?F:8?:B>E/F ,CACE>FA@;FBC9E?F<B8@C?DE>/FD@;B0>F !FF F!F#D<?B>B6C
EFA;1D>EFA==F:BCE@CDA=F583E?>FCBF<9E<.F=D>CD@2F:?DB?FCBF:8?<9A>E )B?:B?ACDB@/F-;;DCDB@A=FD7A2E>F<B@CAD@E;F0DC9D@FC9D>F:85=D<ACDB@
     6B?F<B@6D?7ACDB@FB6FA<C8A=F<B@CE@C/F-==FE;DCB?DA=FB:D@DB@F9E?ED@FD> A?EF?E:?B;8<E;F8@;E?F=D<E@<EF6?B7F,98CCE?>CB<./
FF*,+"F  & & !&& C9ACFB6FC9EF?E1DE0E?F&FA>FA@FD@;D1D;8A=F&FA@;FD>F@BCF?E:?E>E@CACD1EFB6 -@3FD7A2E>F?E:?B;8<E;FB@FC9EF6?B@CF<B1E?FA?EF>B=E=3F6B?F;E>D2@
'85=D>9E;F53"F'A:E?<8CF(D7DCE;F C9EF:85=D>9E?FB?FA@3FB6FDC>FA66D=DACE>/F%9E?E6B?EFC9EF:85=D>9E?F9B=;> :8?:B>E>FA@;FA?EF@BCF?E:?E>E@CACD1EFB6F<B@CE@C/
@BF?E>:B@>D5D=DC3FD@F?E2A?;FCBFE;DCB?DA=FB:D@DB@FA@;F<B@CE@C/ '?D<E>4FD@CE?@ACDB@A=FA1AD=A5D=DC34F?ACD@2>4FCDC=E>FA@;F<B@CE@CFA?EF
$D2DCA=F;D>C?D58CDB@F53"F'B<.EC7A2>FFD@DBFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF
F!F'A:E?<8CF(D7DCE;F-==F?D29C>F?E>E?1E;/F+BF:A?CFB6FC9D>F %9D>FD>FA@FD@;E:E@;E@CF:85=D<ACDB@FA@;FA>F>8<9F;BE>F@BCF >85E<CFCBF<9A@2E/
:85=D<ACDB@F7A3F5EF?E:?B;8<E;FD@FA@3F6B?74F>CB?E;FD@FAF?EC?DE1A= @E<E>>A?D=3F?E6=E<CFC9EF1DE0>FB?FB:D@DB@>FB6FC9EF:?B;8<E?>FB6FA::> -==FD@6B?7ACDB@F0A>F<B??E<CFACFCD7EFB6F:85=D<ACDB@/F,B7EF<B@CE@C
>3>CE7FB?FD@CE2?ACE;FD@CBFA@3FBC9E?F:85=D<ACDB@4F;ACA5A>EFB?F B?F:?B;8<C>F<B@CAD@E;F0DC9D@/F%9D>F:85=D<ACDB@FD>F@BCFE@;B?>E;FB? 7A3F9A1EF5EE@F:?E1DB8>=3F:85=D>9E;FD@FBC9E?F1B=87E>FB?FCDC=E>/
<B77E?<DA=F:?B2?A7>F0DC9B8CFC9EFE:?E>>F0?DCCE@F:E?7D>>DB@FB6 A>>B<DACE;FD@FA@3F0A3F0DC9F#D<?B>B6C4FBB2=E4F%9EF(D@8
C9EF:85=D>9E?/F @;E?F@BF<D?<87>CA@<E>F>9B8=;FC9D>F:85=D<ACDB@FA@; B8@;ACDB@4F)A@B@D<A=F(C;4F$E5DA@F'?BE<C4F(E@B1B4F$E==4F E0=ECC&    
DC>F<B@CE@C>F5EF?E>B=;4F=BA@E;FB8CFB?F8>E;FD@FA@3F6B?7F53F0A3FB6 'A<.A?;4F-::=EFA@;F,A7>8@2FB?FA@3FA>>B<DACEFB?FA66D=DACEF E2D>CE?E;FD@F@2=A@;FFA=E>F+B"F!!  
C?A;EF0DC9B8CFC9EF:85=D>9E?>F0?DCCE@F:E?7D>>DB@/F9D=EF0EF:?D;EF <B7:A@3/F-==F<B:3?D29C>4FC?A;E7A?.>FA@;F?E2D>CE?E;FC?A;E7A?.>
B8?>E=1E>FB@FC9EF8A=DC3FB6FC9EFD@6B?7ACDB@F0EF:?B1D;E4F'A:E?<8C 6B?FC9EF?E>:E<CD1EF<B7:A@DE>FA?EFA<.@B0=E;2E;/FE=E1A@C -$ %*,*+FFFB?FB8?F=ACE>CF7E;DAF:A<.>F:=EA>EF<B@CA<C"F
(D7DCE;F?E>E?1E>FC9EF?D29CF@BCFCBF5EF9E=;F?E>:B@>D5=EF6B?FA@3F 2?A:9D<FD7A2E?3F?E:?B;8<E;F0DC9F<B8?CE>3FB6F(E@B1B4F E0=ECC& A7E>FA=EF&F2A=E:<=:85=D<ACDB@>/<B7
7D>CA.E>FB?FD@A<<8?A<DE>F6B8@;F0DC9D@FC9EFCECFB6FC9D>F:85=D<ACDB@/ 'A<.A?;4F$E==4F,A7>8@24F(D@8F#D@C4F)A@B@D<A=4F)35E?9B>C4F) B?FE7AD=F&FA;1E?CD>D@2:<=:85=D<ACDB@>/<B7
$8EFCBFC9EF@AC8?EFB6FC9EFCE<9FD@;8>C?34FC9EF:85=D>9E?F<A@@BCF +E0>4F#*+*4F,CEA7FA@;F A=1E4F*@CE=4F-#$4F)?8<DA=4F,A@$D>.4 *+%+-%*+-(F(*)+,*+FF'A:E?<8CF(D7DCE;F9A>F7A@3F2?EAC
28A?A@CEEFC9ACFA==FA::>FA@;F>B6C0A?EF0D==F0B?.FB@FE1E?3F1E?>DB@FB6 -,B<.4F)*%4F)BB=E?F#A>CE?4F+1D;DA4FE@FA@;F-::=E/FD@;B0>FD> :85=D<ACDB@>FA@;FA==FA?EFA1AD=A5=EF6B?F=D<E@>D@2F0B?=;0D;E/F
;E1D<E/F*CF?E7AD@>FC9EF:8?<9A>E?>F>B=EF?E>:B@>D5D=DC3FCBF;ECE?7D@E AFC?A;E7A?.FB6F#D<?B>B6CF)B?:B?ACDB@4F?E2D>CE?E;FD@FC9EF @DCE; B?F7B?EFD@6B?7ACDB@FE7AD="F2A=E:<=:85=D<ACDB@>/<B7

You might also like