Part of data security is protecting the storage media from damage and maintaining a high level of data integrity. For hard drive maintenance and recovery, there is no better tool than SpinRite, developed by Steve Gibson of GRC.com. I recently had a great experience with it at Antonelli College where I am the network administrator, so I told Steve about it. While listening to Security Now! Episode 345, I was surprised and delighted to hear Steve read my story. Here’s the excerpt:
Steve: And I heard from a listener, Ken Harthun, who wrote to me on the 19th of February: “SpinRite saves a student’s laptop.” He said, “Steve, I’m a loyal listener of Security Now!, having listened to every single episode. That first episode was only 18 minutes and left me wanting more.” Well, we’ve taken care of that.
Leo: Was it that short? Wow.
Steve: Wow. And that was your original concept, Leo, was just to do sort of a check-in on the week. It’s like, okay, well, that didn’t last long. And it’s funny, too, because I remember Elaine quoting me for transcription, didn’t sound like it was going to be very expensive, either.
Leo: No, sorry about that. Whoops.
Steve: Oh, it’s been worthwhile, and I haven’t looked back.
Leo: Thank you.
Steve: So he said, “Today’s episode was a little over two hours and still left me wanting more. You are often the source and inspiration for my Security Corner blog posts over at IT Knowledge Exchange. So a big geek thank you to you and Leo. Please continue.” He says, “I first used SpinRite in 1999 – it was v5.0 – to recover a floppy disk that had been corrupted. Since that day I’ve insisted that wherever I worked, the IT department agreed to make SpinRite available to me should the need arise, and too often it has. In my private service world, I always insist that, if SpinRite recovers the drive for my client, that my client purchase a copy. Needless to say, there have been a few sales as a result.”
Leo: That’s good idea. That’s a good way to do it.
Steve: I have no problem with that, yeah. He says, “I have my own copy, of course, and last summer I insisted that my new employer, Antonelli College, where I am the network administrator, purchase a site license. Well, that’s a good thing because last week it saved one of their students’ laptops and all of her interior design coursework. Windows was throwing all kinds of errors. The wireless wouldn’t connect. She gave me a list of seemingly random errors that didn’t seem to make a whole lot of sense. But they pointed toward a hard drive failure. I was about to attempt to backup the data and restore the system when it just completely locked up, and I had to force a shutdown with the power button. On restart it just hung at the starting Windows screen and would go no further. I could hear the drive thrashing about. Not good.
“Enter SpinRite. I booted up from my thumb drive and ran it at Level 2. After a couple of hours SpinRite reported that it was finished, though no errors or bad sectors were found,” which of course is a story we’ve heard many times. And I’ve explained why that doesn’t mean SpinRite didn’t do anything. He says, “On reboot, the system came right up, faster than ever, connected to the wireless, and immediately began downloading updates. I completed the updates, ran a few tests, and pronounced the patient healthy. Needless to say, the student was ecstatic. And thanks to SpinRite, I did my part to provide a ‘superior student experience.’” He says, “Part of our vision statement for the campus.” He said, “Steve, SpinRite is absolutely the best hard drive maintenance and recovery utility on the planet, and maybe in the universe. It’s worth 10 times the price you charge for it. Thanks for all you do. Ken Harthun.”
And he said, “P.S.: I’ve never had a hard drive failure, and I attribute that to my using SpinRite on my own systems on a regular basis.” And of course we understand also why it is a good preventive maintenance utility. Running it on a drive, even a quick Level 1, shows the drive where it’s got problems developing that it’s able to correct before they get critical.
It’s that time of the year again and while this particular fake notice has been around before, the frequency seems to peak around tax time in the U.S. It’s a wonder the ploy even works because the IRS NEVER communicates with taxpayers via email. Nevertheless, people fall for it and find themselves infected with malware. Of course, if you are not in the U.S. this one is easy to spot, since the IRS would have no business with you in the first place.
The message comes with one of these subject lines:
Rejection of your tax appeal.
Your tax return appeal is declined.
IRS notification of your tax appeal status.
I’ve seen other variations in the past, but the above are the most common ones.
The text of a typical message is shown below. Variations are common, but generally don’t stray far from this example:
Dear Business owner,
Hereby you are notified that your Income Tax Refund Appeal id#6636527 has been DECLINED. If you believe the IRS did not properly estimate your case due to a misunderstanding of the facts, be prepared to provide additional information. You can obtain the rejection details and re-submit your appeal by using the instructions in the attachment.
Internal Revenue Service
Of course, the attachment is malware and anyone clicking the link will be immediately infected. Sophos detects is as Mal/Iframe-AE.
So you don’t have to surf away from here, here is the video.
[kml_flashembed movie="http://www.youtube.com/v/VTLA-LSJAcc" width="425" height="350" wmode="transparent" /]
I admit, I didn’t take this one on; I’m just not much of a coder. I did, however, find it extremely interesting, especially in the way the original puzzle was “encoded.” You can see the original puzzle and challenge here. It’s actually a concatenated C routine:
Sophos promises more puzzles in the future on their nakedsecurity blog.
I’ll be watching, for sure, and stay tuned: tomorrow’s post will show the solution.
Microsoft will issue six security bulletins on Tuesday, March 13. The issues address seven vulnerabilities. This time, however, only one of those has been given a severity rating of critical; it addresses a remote code execution vulnerability in Windows.
Interestingly enough, there are footnotes that apply to Windows Server 2008 and Windows Server 2008 R2 detailing whether or not the Server Core installation is affected:
*Server Core installation affected. This update applies, with the same severity rating, to supported editions of Windows Server 2008 or Windows Server 2008 R2 as indicated, whether or not installed using the Server Core installation option.
**Server Core installation not affected. The vulnerabilities addressed by this update do not affect supported editions of Windows Server 2008 or Windows Server 2008 R2 as indicated, when installed using the Server Core installation option.
This tends to support some of the things I am hearing about Server Core being more secure than a full-blown GUI installation of the products. Here’s Microsoft’s take:
Reduced attack surface. Because Server Core has fewer system services running on it than a Full installation does, there’s less attack surface (that is, fewer possible vectors for malicious attacks on the server). This means that a Server Core installation is more secure than a similarly configured Full installation.
As you know, I’m a big fan of SANS Institute; their site, their various newsletters and their wealth of knowledge about cybersecurity are unparalleled. One day, I hope to be able to take some of their excellent training courses. In the meantime, however, I continue to peruse their newsletters and learn what I can.
The latest issue of SANS NewsBites, March 9, 2012, Vol. 14, Num. 020, beguns with this blurb written by Alan Paller, director of research for SANS:
The managing partner of a large New York law firm had a visit from the FBI in which he learned that the files of every one of his firm’s clients had been copied from the law firm’s servers and placed on servers in Asia known to be used as transfer points in APT attacks (APT translates loosely to Chinese, he learned). Nine days later, he and another partner from his firm came to my house on a Sunday morning fora conversation. They wanted to know why the intruders wanted the data, how they got in, why the firewalls and AV and other security tools their consultants told them to install didn’t stop the attacks, and how they could be stopped in the future. The conversation is posted at http://www.sans.org/security-resources/cybersecurity-conversations
This four part series is a fascinating read and I highly recommend it to anyone who is curious about the types of targeted attacks that are out there and how to protect yourself from them.
I promise that this is the last password succession hint for a bit. I just think this information needs to be out there for everyone to access. It doesn’t matter if you’re 16 or 95, if you have any accounts that your loved ones need access to in the event of your untimely (or even timely) demise, these tips will help you choose the method you most favor.
Most accounts you set up these days with banks, email, credit cards, PayPal, etc. allow you (or force you) to create security questions in the event you forget your password and need to reset it. You know them; they are things like, “What was the name of your first pet,” or, “What was the model of your first car.” The variations are endless, but they all satisfy the condition of “something you know.”
Normally, these should be something that only YOU know, but you can easily tell your loved ones what questions and answers you have chosen. This is probably the simplest way of providing for account succession as it will allow your loved one to reset your account passwords to something they will be more likely to remember. Besides that, the other methods my be a bit too technical for some; good for geeks, but not so good for the gander.
Do give it some thought, will you? The responsible among us urge you to make it easy on your loved ones during what is always a very difficult time.
My previous two posts have dealt with the concern of what happens if you pass away without your loved ones having access to your various account passwords. What will happen if they can’t access online banking information, credit card accounts, email accounts and other critical information? The process can be a nightmare, adding even more stress on top of the grief of loss. Therefore, it’s a loving thing to do to provide a means for your family to be able to access critical online accounts in the event of your death.
There is no question that the most expedient way to insure access is by storing all of your critical account information, financial information, and any other personal information (using Secure Notes) with LastPass. With LastPass, you can securely store any critical or personal information under one password. You can, as I have shown, make a list of passwords that you will use into the future; however, there is an even simpler solution: LastPass One-time Passwords. Generate a few of those, store them in your safe deposit box or with your attorney and no matter what happens to you, your loved ones can get into your Last Pass vault. Once they do, they can change the master password.
Here’s a video on how to do that in LastPass. And, if you don’t already have LastPass, what are you waiting for?
[kml_flashembed movie="http://www.youtube.com/v/-6lO280MJ0w" width="425" height="350" wmode="transparent" /]
Last time, in How will you pass on your passwords when you pass away? Part 1, I suggested that you need to start using a password manager to store all of your critical passwords and make the master password available to your spouse or loved ones in the event of your demise. But how do you insure that your master password is accessible if, as you should, you regularly change it and something happens to you before you can pass it on? Thanks, in part, to a listener’s question in Security Now! Episode 340, I present the following:
Method 1: Come up with a standard master passphrase that will always remain the same. When you change your passphrase, you will not alter the master portion, but will add to it at the front, the back, or both. What you add will be your own personal pattern based on the year and frequency of change. It is a simple matter to write up instructions and/or a list of those changes going ahead to any date in the future.
For example, you change your passphrase two times a year, say on January 1, and June 30. Assume your passphrase is MyPassphrase and it’s January 1, 2012. You might do this: 0101MyPassphrase2012; then, when you change it in June, you might do 2012MyPassphrase0630. What and how you do it is up to you; just make sure it is a pattern that you can easily communicate.
The beauty of this is that someone who knows the pattern could go back or ahead in history to try different passphrases if the first try doesn’t work. That would also work with the next method.
Method 2: Generate a long list of passphrases that extends well into the future and store the list in your safe deposit box or with someone like your attorney or accountant. If you change your passphrase twice yearly, generating 100 of them would give you 50 years of changes.
You can use GRC’s Ultra High Security Password Generator or any method of your own choosing to generate the passwords, save them in a spreadsheet, and pass them on.
In the meantime, Live long and prosper!
Have you ever considered what your family would go through trying to gain access to your various online accounts when you die? I know it’s not a pleasant thing to think about, but nothing about death and the various arrangements thereof ever is pleasant. Yet, it is something that must be done at some point, lest your family go through additional agony during an already difficult time. If you haven’t considered how to make it easy for your family to clean up and/or transfer your online accounts after your demise, then this article is for you.
I actually started to think about it after a client requested that I provide him with all of the logins to the various servers, backups, managed endpoint protection and special support email accounts. He said he got to thinking about where he would be if I “got hit by a bus.” He’d be lost and would not be able to manage his business or replace my services smoothly. That day, I gave him everything I had and wrote up how to change all of the logins if he needed to.
I also gave instructions to my wife on how to login to my computer with my credentials and how to use my master password for LastPass to access all of my passwords (which includes some of her accounts as well). I know what you’re thinking: What if I change the passwords and get hit by that bus before I tell her the new passwords?
I have a couple of rather ingenious solutions to that dilemma, but first, you MUST go get and start using a password manager if you have not done so already. I’m a LastPass guy, but that is by no means the last word (pun intended) on the subject.
The solutions are coming in Part 2.