# Tuesday, October 03, 2006

The topic of the AT command and the command prompt came up on an internal list I am on with Microsoft the jist of which was, "How do I securely turn this junk off".

The answer is that to some degree the command prompt and especially when coupled with the Task Scheduler is a security hole that is closable, but not trivially.  You can patch it using things like this http://www.microsoft.com/technet/prodtechnol/windows2000serv/reskit/regentry/93465.mspx?mfr=true
and you if you really want to wipe out the user's option you should reset the task scheduler service to use a low / no priv account and disable it (I am paranoid, but I have my reasons). The problem is that the perspective of most that come up against this is that you shouldn't have to do this, but the reality is that you do.

For a scary look at why simply taking the RUN command off the Start menu is not enough try the following:
Open up "Help and Support" from the Start menu and seach for "command". 
Select the entry that describes how to "Test a TCP/IP configuration using the ping command"
You will see that there is a link that will open up a command prompt (it doesn't run as System, but it runs). 
That is the XP version. 

The Windows 2003 Server one takes more searching, but it is there.

The issue is not that the functionality exists, we all want functionality.  The problem is when it is hard (or impossible) to shut something off effectively it is maddening and often leaves people dismayed.

Time for an analogy:
I have doors on my house that I leave unlocked all the time.  The dogs and other things in the house keep it secure (if you know me then you know what I mean), but if I wanted to secure those doors and found that I could lock them, but the manufacturer set them up so that the hinges were on the outside and manipulatable by an intruder then I would be unhappy.  Most security outrage and dismay comes from features that just didn't take security into consideration for the times when I don't want the user to do anything except what the user is told they can do.
 
This will always be an arms race.  If one of our professional security gurus such as Duane Laflotte wants to get in and has physical access to a workstation or server then he can get in, but there is a point where I will say, yes I accept that there are some things I can't defend against.  If you use a tank to blow in my front door, I won't moan to the manufacturer about them not being tank proof, that is what the mines are for ;)
 
Is Vista the solution to all security problems?  I doubt it.  I expect that there will be improvement based on features I already know are in the most recent builds, but I won't judge the security of Vista until after it ships (and won't pay all that much attention to it until then either) since the devil is in the details and the truth is in the final bits.  Submarines either leak or they don't.  The OS will be judged in much the same way in regards to security.

Ultimately information is power.  Nowhere is that more true than in the realm of security.  I suggest that you learn all you can and I will do what I can to help.

Tuesday, October 03, 2006 4:07:10 PM (Eastern Daylight Time, UTC-04:00)  #    Comments [24]  | 
# Monday, October 02, 2006

If you want to keep track of how prevelent phishing attacks are from month to month (and I do) then you should check AntiPhishing.org.  The site is pretty meager in most regards, but the front page has a bar chart that is pretty staggering when you realize that they are only measuring people who have actually figured out that there is a phishing attack in progress (a fraction of the population I am sure) and further restricted by the fact that those astute people had to know about and be willing to take the time to report it to AntiPhishing.org.

I find these statistics interesting to have as spin seems to creep into everything nowadays.  I like to lay my hands on hard numbers and make up my own mind.

Monday, October 02, 2006 5:11:19 PM (Eastern Daylight Time, UTC-04:00)  #    Comments [23]  | 
# Friday, September 22, 2006

There are many varying opinions on almost everything, but Compliance is one of those topics like economics, everyone has a different opinion it seems.

I was reading an article by one of the Systems Engineers at Network Appliance entitled, "Six Tips for Archive and
Compliance Planning
" and while I agree with most of the points Mike Riley makes, I had to think a bit about his words on Encryption.

He isn't saying not to use encryption, on the contrary, he is saying that encryption is a must, but the advice is sound.  Be careful what you do and the ramifications.  With compliance systems, often search and rapid retrieval are key and these are some of the most plausible arguements against specific applications of encryption.

As always, look before you leap.  I guarentee that if you think about where you should be using encryption you are already ahead of most.

Friday, September 22, 2006 11:19:34 AM (Eastern Daylight Time, UTC-04:00)  #    Comments [34]  | 
# Wednesday, September 20, 2006
It seems that even though we all know we need to patch our system, we are now having to do it faster and faster to avoid the vulnerable time between patch availability and exploit.  In an article on ZDNet there are details of how the latest exploit is being used, but soon you should see a post by Duane Laflotte on his security blog about how it isn't just being used on sites you might expect.  Even the super computer savvy gamers are getting hit and I have to think that in many cases we just know about this because they realize.  How many never figure out that they are maintaining a drone in the hacker army of some malcontent 15 year old with a grudge...
Wednesday, September 20, 2006 10:49:16 AM (Eastern Daylight Time, UTC-04:00)  #    Comments [20]  | 
# Wednesday, September 06, 2006

I have been casting about for .Net Best Practices and came across Adam Cogan's lists of how to do pretty much everything.  The funny thing is that I have known Adam for years and was aware that he had compiled quite alot of information on his site, but until I started to dig through it I hadn't realized just how much is there.

If you are trying to codify your companies "how we do it here" then make sure you check out Adam's site.

Wednesday, September 06, 2006 9:33:09 AM (Eastern Daylight Time, UTC-04:00)  #    Comments [40]  | 
# Tuesday, August 29, 2006
I am sure it is reported elsewhere, but I found an article on a proof of concept virus that targets AMD processors on a magazine site in Australia.  The article dismisses the threat of such an item and pretty much holds it up as just a curiosity in the fight against hackers, but I see it differently.

In order to win, eventually security has to be hardware based.  The whole Palladium (now known by the horrible NGSCB acrynym) effort is just the most public manifestation of this realization and even it has gone dark.  Hacking the hardware is hard, hacking the software is easy.  Software provides the security of a screen door while hardware security done well can be like a steel cage.  Watch as this develops.  Like gas prices driving the frantic (and belated) search for alternative fuels, it will be a mind blowing security threat that finally forces us to invest in security via hardware in real terms.

If the barrier to enter the hardware market in a significant way weren't so large, I expect this problem might already be solved...
Tuesday, August 29, 2006 3:23:44 PM (Eastern Daylight Time, UTC-04:00)  #    Comments [19]  | 
# Tuesday, August 01, 2006
I know it is simple and probably not an amazing tool, but I am finding www.dnsreport.com to be amazingly helpful in some troubleshooting I have had to do recently.

Sometimes the most important thing is to just have the right tool...
Tuesday, August 01, 2006 12:04:53 PM (Eastern Daylight Time, UTC-04:00)  #    Comments [23]  | 
# Monday, July 24, 2006

Microsoft has released a 12 step plan to help its image and communicate their intent to prevent the kinds of lawsuits like the one going on with the EU.

While I think the plan will work on a number of levels, I am disappointed that it had to happen this way.  I am not of the belief that Microsoft has never acted in the name of profit or that sometimes there have been less than the fairest of practices employed, but is this any different than any other company?  I would prefer that the oil and gas companies were held to such high standards or even just the cable companies.

The Twelve Tenets to Promote Competition are outlined on the MS site and should make anyone who has dealt with Microsoft in the past feel a bit better.  The reason for this is that in all my dealings with Microsoft the staff there have been zealots about dogma.  If it is a defined part of the company culture (as these tenets are sure to be) then it is embraced pretty thoroughly.

I have no doubt that this will help Microsoft by actually influencing the internal culture and that it will help competition.  I just wish the pressure it took to make a single software company do this were either applied to the industry instead or better yet to an industry that actually needs it.

Monday, July 24, 2006 8:50:31 PM (Eastern Daylight Time, UTC-04:00)  #    Comments [27]  | 
# Friday, July 14, 2006

I normally don't post twice in one day, but this blog post by Rob Caron was VERY helpful in understanding VS2005 licensing and the relationship between the products.  I expect it will help alot of people grasp it since I get asked this question a fairly often in my roaming.

Thanks Rob and Enjoy!

Friday, July 14, 2006 2:15:26 PM (Eastern Daylight Time, UTC-04:00)  #    Comments [30]  | 

I was just thinking about one of the bugs listed in the latest hotfix from MS and realized that while aspx and config files are not at risk since they are mapped to aspnet, the express database if stored in App_Data probably is.

We don't typically use SQL Express, but my bet is that this is the greatest risk factor for this bug.  Thoughts?

Friday, July 14, 2006 1:36:04 PM (Eastern Daylight Time, UTC-04:00)  #    Comments [13]  | 
Site Search

Categories

Locations of visitors to this page