I N D E M
I N D E M @ I I I T A
Hear this page
Without software, hardware are meaningful and charming in stores only. But in IIITA laboratories, hardware are functional because of software installed on them. A good academic institution of this repute maintains rich archive of software for academic and R n D activities. It is our commitment at IIITA to cater all the software related needs of academic communities by inhancing the repository round the year.
For the sake of availability and accessiblity of these software to academic communities, INDEM maintains a Software Repository Server on the Intranet at IP 172.31.1.11. These software can be accessed via FTP to server IP using STUDENT account.
Students are always encouraged to inrich this repository by contributing available software from Open Software Domain.
Illigal distribution of propritory software is prohibited and considered an offensive act inside the campus.
The biggest factor in protecting your machine -- and everybody else in the department -- is YOU! There are several areas to pay attention to, but in truth, it's all pretty easy...
Make sure there is a virus scanner installed on your PC, and configured to do auto-updates.
If the Maintenance Cell has configured your Windows PC, they already installed some virus scanner software (Norton), and it is configured to automatically update itself daily. If you configured your PC, make sure you INSTALL a virus scanner.
We recommend that you configure your scanner to auto-update on a daily basis, but if for some reason you don't, you must update your virus scanner frequently - i.e., daily. Sophos, Norton typically has an update to deal with a new virus very soon after it is unleashed on the world, and the update process is pretty painless (especially if you configure it to happen automatically, in the middle of the night.)
Keeping your virus scanner updated is the best thing you can do to stay safe. Thinking before you open an attachment is the other best thing you can do (more on this further down this page.)
Windows Security Patches
If your system is configured for updates then it is automatically updated with the latest security patches. The latest Windowsupdate processes also update your microsoft applications that you have installed, like IIS, SQL, and Office. For information about Windowsupdate, follow the help on specific version of your OS.
If you are running any special software that utilizes the network/internet (Apache Web server, MYSQL server, etc) you *MUST* keep those applications patched. We have no way to update these packages for you. Even applications like Mozilla Firefox and Thunderbird can be gateways for hackers to get into your computer if you don't keep them patched.
Enable Windows Firewall
A firewall protects your computer by blocking incoming traffic and prevents infection from attacks directed towards your computer. All recent versions of MS operating systems now come with a nice firewall built in (XP SP2 and Win2k3 server SP1). You are allowed to make exceptions for programs that you need. For information about configuring windows firewall, follow the help of your OS.
THINK! Before Opening an Attachment
Be careful about opening attachments that come in email or ICQ, or files you download from the net, or that you get on a floppy.
One simple rule is to check the extension of an email attachment. If the extension is .vbs then it's not a web page, it's a Visual Basic script that will execute as soon as you try to open it. And chances are very good that the effect will be very bad. Some viruses come packaged as screen savers (.scr). Word documents can contain macros with hidden viruses. You get the idea.
A second simple rule is to pay attention to the sender of an email message, and whether anything strikes you as a little bit odd. Many viruses propogate themselves by first opening a person's address book and sending itself to everyone in there. Thus, you may receive a message from someone you know or have corresponded with in the past, buy maybe haven't heard from in a while. So if a message seems to come "out of the blue", or the message itself seems a little odd, BE SUSPICIOUS ! Contact support if you have any doubts.
For Linux Users
Most of this page is oriented towards Windows user, although some recommendations such as using firewalls, strong passwords and turning off unnecessary services are applicable to Unix-like systems. Further general guidelines for securely configuring various Linux flavors can be found here. More specific links for keeping software up to date on some non-Windows systems are given below:
Mac OS X security alerts are available on MAC site. To automatically update your Mac OX software see the instructions
For Ubuntu Linux see the tutorial on automatic security updates
For Redhat Enterprise Linux, security announcments are archived
. Update are available via rhn.
For Fedora Linux, all update announcements are achived
how to use yum
If you are running some other distribution, you probably already have your own methodology for dealing with security. Right?
How Stuff Works
How Router Works
How Switches Work
How Proxy Works
How DNS Works
How Email Works
How Firewall Works
I N D E M I C A
IIITA Network (ppt)
The INDEM Team
Mithilesh Kr. Mishra
Indian Institute of Information Technology Allahabad
Deoghat, Jhalwa, Allahabad - 211015 (UP) India