How many are you vulnerable too?
General vulnerabilities
Default installs of operating systems and applications
Accounts with no passwords or weak passwords
Non-existent or incomplete backups
Large number of open ports
Not filtering packets for correct incoming and outgoing addresses
Non-existent or incomplete logging
Vulnerable CGI programs
Unicode vulnerability (Web Server Folder Traversal)
ISAPI extension buffer overflows
IIS RDS exploit (Microsoft Remote Data Services)
NETBIOS -- unprotected Windows networking shares
Information leakage via null session connections
Weak hashing in SAM (LM hash)
Unix-based vulnerabilities
Buffer overflows in RPC services
Sendmail vulnerabilities
Bind weaknesses
R Commands
LPD (remote print protocol daemon)
sadmind and mountd
Default SNMP strings
The FBI's National Infrastructure Protection Center, the agency's cyberwatchdog, has released a list of seven simple measures computer users can take to step up security on their machines:
Use strong passwords. Choose passwords that are difficult or impossible to guess. Give different passwords to all accounts.
Make regular backups of critical data. Backups must be made at least once each day. Larger organizations should perform a full backup weekly and incremental backups every day. At least once a month, the backup media should be verified.
Use virus protection software. That means three things: having it on your computer in the first place, checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically.
Use a firewall as a gatekeeper between your computer and the Internet. Firewalls are usually software products. They are essential for those who keep their computers online through the popular DSL and cable modem connections but they are also valuable for those who still dial in.
Do not keep computers online when not in use. Either shut them off or physically disconnect them from Internet connection.
Do not open email attachments from strangers, regardless of how enticing the Subject Line or attachment may be. Be suspicious of any unexpected email attachment from someone you do know because it may have been sent without that person's knowledge from an infected machine.
Regularly download security patches from your software vendors.
General vulnerabilities
Default installs of operating systems and applications
Accounts with no passwords or weak passwords
Non-existent or incomplete backups
Large number of open ports
Not filtering packets for correct incoming and outgoing addresses
Non-existent or incomplete logging
Vulnerable CGI programs
Unicode vulnerability (Web Server Folder Traversal)
ISAPI extension buffer overflows
IIS RDS exploit (Microsoft Remote Data Services)
NETBIOS -- unprotected Windows networking shares
Information leakage via null session connections
Weak hashing in SAM (LM hash)
Unix-based vulnerabilities
Buffer overflows in RPC services
Sendmail vulnerabilities
Bind weaknesses
R Commands
LPD (remote print protocol daemon)
sadmind and mountd
Default SNMP strings
The FBI's National Infrastructure Protection Center, the agency's cyberwatchdog, has released a list of seven simple measures computer users can take to step up security on their machines:
Use strong passwords. Choose passwords that are difficult or impossible to guess. Give different passwords to all accounts.
Make regular backups of critical data. Backups must be made at least once each day. Larger organizations should perform a full backup weekly and incremental backups every day. At least once a month, the backup media should be verified.
Use virus protection software. That means three things: having it on your computer in the first place, checking daily for new virus signature updates, and then actually scanning all the files on your computer periodically.
Use a firewall as a gatekeeper between your computer and the Internet. Firewalls are usually software products. They are essential for those who keep their computers online through the popular DSL and cable modem connections but they are also valuable for those who still dial in.
Do not keep computers online when not in use. Either shut them off or physically disconnect them from Internet connection.
Do not open email attachments from strangers, regardless of how enticing the Subject Line or attachment may be. Be suspicious of any unexpected email attachment from someone you do know because it may have been sent without that person's knowledge from an infected machine.
Regularly download security patches from your software vendors.