Play online chess!

IT and ICT Security
« Back to club forum
Pages: 12
Go to the last post
FromMessage
riaannieman
28-Dec-20, 23:43

IT and ICT Security
I had a similar thread in one of the previous Fiat Lux clubs. I want to reopen it, for those who have a similar interest in security, to exchange ideas and give advice.

IT is Information technology, and ICT is the abbreviation for Information Communication Technology. There is a difference.

So today, I have a problem with hard drives on the BizHub machines. In our environment we have a lot of extremely sensitive and classified information, that are being printed from, and copied on, the BizHub machines. These machines all have hard drives, which store a copy of these documents until the hard drive runs out of space and starts to overwrite the oldest information.

So, the contracts for our BizHub machines are nearing the end dates, and I need to ensure that the information doesn't leave the environment. What to do? Apparently the hard drives are on-board, so I doubt that it can be removed. I can't degauss it on the machine, and I am told the contracts doesn't allow me to damage the hard drives, because the machines need to leave in working condition.

Is there anybody out there with some advice? Anybody with a similar problem or situation?
5imon
29-Dec-20, 01:22

There will be a way to wipe the hard drives but you'll probably need your supplier to give you the code to enter service mode. 'Memory/HDD adjust' or similar.

(eg www.copytechnet.com)

However, I'm not sure that an expect wouldn't still be able to recover data. If you have a strict ISMS policy (and it sounds as though you should have), would it not require the hard drives to be drilled as well? That would leave you a bit stuck though if your contract doesn't allow it.
riaannieman
29-Dec-20, 03:43

Yes our policy prescribes formatting 3 times with junk code inserted in between each format, then degaussing, then drilling at least five 15-20 mm holes, and lastly destruction and recycling. I can do that with ordinary PC and laptop hard drives,external drives and so on, but not these machines.
ace-of-aces
29-Dec-20, 08:23

Do Google and youtube search first.
youtu.be
I have a very little computer knowledge. I can give you some advice but I cannot guarantee you that it may ruin your Bizhuz machines because of my advice. If so, be careful of my advice. I have a lot of curiosity in the machines even if curiosity can kill the cat. Especially, when you have an extra virgin machines, you want to probe and see what is inside. At one time, I probe and tweak inside the engine of an old car. Aftermath, it will never start again. I have to send the car to the old junk yard.

Bizhub machine appears to be a printer with computer system that I have checked in the youtube video above. Please check the make, model and number of your Bizhub machines and type in at the search engine of Google and youtube. Google search will show you where the machines are made or the vendor. Usually when you get their phone number, you can call and find out technical support at those sites and get their advice. At youtube you can also find technical support plus how to do it yourself. I believe you can open the machines and look inside to see where the hard drives are located. Before you mess up with the hard drives, think twice about my junked car.

Hillary Clinton, the former presidential candidate did a wonderful job of deleting 30,000 emails without any trace from her computer before FBI confiscated it. Hunter Biden was very stupid. He forgot to pick up his laptop computer at the repair shop. Father and son corruption scandals are well documented and caught red handed in the hard drive. Learn the lessons from them.

Please let me and other GK members know how things are going after google and youtube search.

bobspringett
29-Dec-20, 14:27

What do the experts say?
No doubt you have tried this, Riaan, but I'm perplexed that you haven't mentioned it...

What do your Department's IT experts say? And if they don't know, why haven't they asked someone who does? That's what I do when confronted with an IT problem; I ask someone who knows.

Perhaps there is no answer within the terms of the contract that require "the machines need to leave in working condition." In that case, you might need to negotiate a variation to your contract. If all else fails, you could dismantle the machines, remove and completely wipe the drives of all residual data (not just the directory), and re-build the machines.
thumper
29-Dec-20, 16:39

Riaan
I'm not a computer whiz but am a low tech expert. Drop those hard drives into a 1500°F bed of coals for 2 minutes then buy new drives. Cheap and easy. Hard drives are what, a buck and a half now?
ace-of-aces
29-Dec-20, 18:13

Riaan
There are some questions I would like to ask before you do something to your machines.

1. Are your machines at the end of life and therefor it will be trashed ? Before it is trashed, do you want to take out the hard drives from the machines and destroyed it so that unscrupulous people will not get top confidential secrets from HD. If so, Thumper's message is the answer.

2. The machines are still usable but you need to exchange with the new hard drives and destroyed the old full hard drives with confidential information. The problem now is that if the old HD contains operation instructions in order the machine to work, you need to copy the instructions first before you destroy the old HDs.

3. If your machines use windows 7 or 10 software, I can show you how to copy the old information in HD to new bigger HD. Please also check what kind of interface, IDE, SATA 3, PCIE. etc. It is little bit strange to hear that the printing machine contains sensitive data and confidential information because the printer is usually controlled by the computer which contains HD with a lot of information.
mo-oneandmore
29-Dec-20, 19:12

riaan
There are few cure-alls for cleaning a HD other than cremation of the critter, but that might not fare well with the equipment provider.

High security facilities have specific protocols for old hard drives, but i suppose you could try overwriting the security data with worthless material such as trump tweets, the Wall Street Journal or a few hundred hard rock videos, etc.

Also --- As Ace suggested: You can simple remove the old HDs and replace them if that works for the equipment provider, Hard Drives are notably less expensive these days.

Finally: Your vendor (Minolta?) should be able to dhow show you to wash the drive. Printers are generally designed to not hold old print data because if they did they would be almost unmarketable to even low security firms.
riaannieman
30-Dec-20, 02:07

OK, let me start at the top and go through the posts one by one.

ace-of-aces, the video does help, thank you. But thinking about your car- maybe I should not! The embarrassment of recovered hard drives are exactly what we want to avoid.

bobspringett, the problem is that our IT department developed the policy with no input from us. It is a policy that we were in process of developing (meaning myself) in cooperation with other intelligence agencies, both national and foreign. FIS (Foreign Intelligence Services) has just as much interest as ourselves for the information to remain intact and not compromised. So almost every embassy specialist I approached had had some positive input in the document that I had been compiling. So the IT division compiled a document that is fairly ell written, but not always practical. And now that the pumpkin has hit the fan, they bump the problem off to us, rightly, but we cannot comply with all the requirement because of a severe shortage of manpower and resources. Seeing the problem, Treasury has now adapted the regulations and the new contracts will include the provision for the removal of hard drives into our care. The problem are the old contracts expiring now.

ace-of-aces, the machines are still serviceable and will be redeployed in businesses unknown after a service. We don't have the money, manpower or resources to remove old hard drives and replacing them. Copying the data is not a problem technically- the objections are again money, manpower and resources.

mo-one, we deal with Konica-Minolta, Sharp, Brother and Canon. None of them are willing to go to the extra expense of removing and replacing the hard drives for us, and the SAPS as an organization doesn't have the budget to it, especially after all the cutbacks to provide for emergency services in connection with COVID-19. And my unit in particular doesn't have the manpower- we are supposed to be at least 14 members at Head Office, but there are only 3 of us left. I don't trust the service providers to remove and destroy the hard drives for me (I am paid to distrust them!) and by law they are not mandated to handle such critical data. Very few people in SA are allowed to do that- cryptographers, crypto custodians, and heads of Counter Intelligence departments throughout the Intelligence Services here. In total maybe 150 individuals, if that many. In the SAPS we are only 21 throughout the country.

As for junk data- I have 250 TB of random data specifically designed to be used for junk. It is just a series of randomly generated machine code. My software uses random sectors of it, so that it can never be predicted.
mo-oneandmore
30-Dec-20, 02:24

riaan
I say run some of that junk data through the machines and throw in a few photos of Stormy Daniels for giggles --- trump will love the memory's. 
bobspringett
30-Dec-20, 02:36

Riaan 02:07
As I would have expected, you show great courtesy in responding to inputs. You are a gentleman.



riaannieman
30-Dec-20, 03:00

You make me blush, Sir. I am just being courteous. Besides, the answers here are helping me already. I am thinking of a way to fill the hard drives with some junk...... Maybe I can do that. No photos, tweets, newspaper articles and videos! The problem with that is the data is predictable and can be removed, exposing what is 'underneath' it. One can identify the metadata, and therefore the content. One needs to truly write meaningless code to the hard drive- 0's and 1's, nothing else, and this data should not contain any information. Nothing at all. The best I can describe it is the grey and white television screen before a channel is tuned to. (That is actually really random data, being the cosmic background radiation left over from the big bang. Random data is not really random. Just have a look at this entry that explains it better than I could: en.wikipedia.org)

I don't know who Stormy Daniels is, but I suspect it is political and I don't want this thread to go into that direction.
mo-oneandmore
30-Dec-20, 03:20

Stormy Daniels is a porn star who trump paid $149K to keep her mouth shut and then shoveled-out another 60-grand to cover her legal fees after she wrote a book about the experience. --- trump['s wife was apparently taking care of his infant child at the time..

And, yes. The issue of latent data on a "washed" hard drive is quite real --- that's why cremation is the best solution.

Also: When I was with Xerox, am issue popped-up where latent images were retained on the photo receptor --- mirror images.
riaannieman
30-Dec-20, 03:24

Oh crap... not that as well! I have never thought of that. I can solve that, I think. Strong magnet? Almost like degaussing. Or just making copies of junk to overlay it beyond recognition.
mo-oneandmore
30-Dec-20, 04:21

A magnet doesn't do the job,

It depends on the (intermediate) photo receptor chemistry, but a strong white light (white paper on the glass if the machine is also a copier) and a good cleaning (buffing ) will usually do the trick --- the receptor will also electrostatically discharge while you're running the blank copies
riaannieman
30-Dec-20, 04:23

Thanks. I can do that.
riaannieman
30-Dec-20, 04:49

Cybermap
Contrary to baseless accusation and threats, Kaspersky is a good product. The company also has a nice database to consult on many technical matters. What does make an impact when I have a presentation is the live cyber attack map, which I can demonstrate to the audience. I can zoom in on any specific part of the world and demonstrate that cyber crime knows no international borders. It always creates live participation and discussion, and amazement that so many cyber attacks actually occur all the time. It is a handy tool to get senior management interested in security:

cybermap.kaspersky.com
riaannieman
05-Jan-21, 04:01

How to work from home: what do you need for remote working?
It is not just a case of making sure you have the right laptop or smartphone to stay in contact with your bosses, co-workers, family and friends. Let us start at the peripherals:

Picking the best mouse for your needs when working from home is important, as it's one of the most common ways of interacting with your PC or laptop. You can spend hours using your mouse when working from home, so you need to make sure you have one that's comfortable to hold, as well as being fast and responsive. Even if you have a laptop with a touchpad, you may find getting a mouse will make things more comfortable. Try a wireless mouse that doesn't impede you with cables lying in the way.

As with mice, having the best keyboard for working from home is also important. You'll want something nice and comfortable, as again, you'll be using it for long periods of time. Personally I prefer an external wireless keyboard.

If you're one of the lucky few who enjoys a multiple-monitor set-up in the office, you may be feeling a little short-changed in home working from home has minimised your screen options. Luckily, adding an extra monitor is easier than ever these days, particularly if you have a docking station alongside your work laptop. Most external monitors can now be connected via HDMI, USB-C or DP ports.

When working from home, you'll probably find you're holding just as many meetings – if not more – via video conferencing services. With these meetings, it's important to have a good quality webcam. Working from home can sometimes feel a little isolating, and video conferencing can give you some much needed human interaction. While laptops usually come with webcams built-in, if you're using a desktop PC, you'll want to invest in the best webcam you can. Laptop owners may also want to buy a standalone webcam, as the one included in their machines might not be up to scratch.

If you're now working from home, one of the devices you may find you miss the most is the office printer. They're not the most glamorous of devices, but if you need to print off documents or labels, you'll soon get frustrated if you don't have a printer. The good news is that you don't need to spend a lot of money on a great printer for day-to-day work.

If you're really serious about getting the best working from home setup, then you may find you want to purchase a new laptop. After all, if you're using it all day, every day, then you'll want something that is powerful, dependable and comfortable to use.

USB Hub. I found that I rapidly run out of USB ports, as I connect flash drives, external hard drives and other peripherals like a bio-metric scanner to my laptops. I usually get four port USB 3 Hubs from a local supplier.

If your home office is a bit too far away from your home router, you might benefit from a Wi-Fi extender, which can boost the signal across the rest of your house. These are important as when working from home, your internet connection is essential. If you struggle to get a dependable network connection where you work, then you'll soon get very frustrated. A Wi-Fi extender, or powerline adapter, is an easy way to fix this.

It may sound obvious, but having the right office set-up can make all the difference to your working from home productivity - and this can start with your chair and desk. Making sure you're comfortable whilst your work isn't just a good idea for your fitness and general well-being, but will also make it less of a chore to sign in every morning - and help you stave off the temptation to slope off to the sofa after lunchtime. I have two custom built ergonomic chairs, one at the office and one at home.

And then we come to software. There could be much debate, and people who prefer some operating systems over others. Let us stick to the the most used Windows software. Let us assume the operating system is WinX (Windows Ten), and build from there.

Video conferencing software. There are many options available on the commercial market these days. I don't want to punt one over the other. Make sure that the option you (or your company) chooses have the security well in mind, especially if you are going to be sharing trade secrets, personal information of yourself, employees and clients, and any other sensitive information that can be used to cause embarrassment, discrimination or trade advantages.

The 2016 MS Suit has been replaced with Office 365. Although the different programs are all backwards compatible, the capability, functions and most of all, security, of Office 365 has been beefed up considerably. If you use another product, make sure it is compatible with Office 365, because that is the most popular at the moment.

Malware-, web-, personal- and family-, data- and network protection. There are really great companies from all over the world that provide absolutely top class protection. Do not evaluate these companies at the face value put upon them by politicians. (I'm not going further into that discussion!) Use online evaluations from reputable and well known technical magazines. Compare the products and what they offer. Some are stronger in one area, or more adaptable to family situations. Other offer a password safe which stores all your online passwords. Others still create complex passwords for the user. Some may even provide a Virtual Private Network (VPN) which should increase the level of protection while online. Depending on your need, price range, specifications of the OS and hardware, find a solution that is most compatible with your situation.

riaannieman
09-Jan-21, 07:46

Public platforms
Recently there has been a lot of attention on the public platform WhatsApp- I gather in some countries it is more prevalent than in others. Facebook, who bought the platform in 2014, is now going to incorporate all kinds of tools in the app to collect personal data of the user. One will not have the option to decline or refrain from sharing information. In essence the new user agreement gives away all rights to privacy, and to accept general and targeted advertising from the platform.

The truth is, ALL public platforms have weak points and can be breached. There are several attacks that can put a user in danger: spoofing, man-in-the-middle, attacking the host server, interception, breaching the device itself..... too many to mention here.

The rule is the following: never trust a free, public platform. As Abraham Lincoln said: there is no such thing as a free lunch. All the platforms come at a price. The only platform that can safely be used is a proprietary platform, with a proprietary algorithm, reviewed by impartial and ratified security specialists to have no vulnerabilities, and security always comes at a hefty price.
riaannieman
07-Apr-21, 21:59

Unsolicited email, texts and suspect websites
Haven't we all been contacted with unsolicited emails, text messages and advertisements? When you click on any unknown link, there is a serious risk of being attacked. Websites, links, content and files may contain malicious code that can infect your device and leave you vulnerable. It happens all the time: you get a text on your smartphone that you have won a prize, and need to follow a link to claim a fantastic amount of money. Or you should submit your email to a gaming operator to participate/claim a lucky draw. Maybe you have inherited an undisclosed amount of money from an unknown relative, or a prince from Abu Dhabi needs to move money from the UAE to your country, and request your assistance.... by providing your bank account detail!

Here are some websites that can help you look up unknown websites before you access them. These websites can assist to identify spam-, spoof-, phishing- and spearphishing attacks.

who.is
lookup.icann.org
www.wappalyzer.com

Be safe out there, don't click on unknown links, and report malicious texts, emails and websites to your local authorities! In South Africa we have two major organizations who track down and close such websites, telephone numbers and domains. Other countries have similar entities, some government sanctioned, others from laboratories such as Dr Watson, Bitdefender, Symantec and Norton, and there are some private groups who try to do their civic duty as well. be careful of vigilante types, though, as they can get you into trouble.
riaannieman
30-Jun-21, 03:33

Difital footprints
A digital footprint is a trail of data you create while using the Internet. It includes the websites you visit, emails you send, and information you submit to online services.

A "passive digital footprint" is a data trail you unintentionally leave online. For example, when you visit a website, the web server may log your IP address, which identifies your Internet service provider and your approximate location. While your IP address may change and does not include any personal information, it is still considered part of your digital footprint. A more personal aspect of your passive digital footprint is your search history, which is saved by some search engines while you are logged in.

An "active digital footprint" includes data that you intentionally submit online. Sending an email contributes to your active digital footprint, since you expect the data be seen and/or saved by another person. The more email you send, the more your digital footprint grows. Since most people save their email online, the messages you send can easily remain online for several years or more.

Publishing a blog and posting social media updates are another popular ways to expand your digital footprint. Every tweet you post on Twitter, every status update you publish on Facebook, and every photo you share on Instagram contributes to your digital footprint. The more you spend time on social networking websites, the larger your digital footprint will be. Even "liking" a page or a Facebook post adds to your digital footprint, since the data is saved on Facebook's servers.

Everyone who uses the Internet has a digital footprint, so it is not something to be worried about. However, it is wise to consider what trail of data you are leaving behind. For example, understanding your digital footprint may prevent you from sending a scathing email, since the message might remain online forever. It may also lead you to be more discerning in what you publish on social media websites. While you can often delete content from social media sites, once digital data has been shared online, there is no guarantee you will ever be able to remove it from the Internet.

Types of digital footprints:

Passive digital footprints can be stored in various ways depending on the situation. A footprint may be stored in an online database as a "hit" in an online environment. The footprint may track the user's IP address, when it was created, where it came from, and the footprint later being analyzed. In an offline environment, administrators can access and view the machine's actions without seeing who performed them.

Active digital footprints can also be stored in a variety of ways depending on the situation. A footprint can be stored by a user being logged into a site when making a post or change, with the registered name being connected to the edit in an online environment. In an offline environment, a footprint may be stored in files when the owner of the computer uses a keylogger. Logs can show the actions performed on the machine and who performed them. One feature of the keylogger monitors the clipboard for any changes. Though, this may be problematic if the user intends to copy passwords or take screenshots of sensitive information, which is then logged.

Build a positive digital footprint:

The negative impact of a digital footprint could be daunting and make one flee from social media to not have a digital footprint at all, yet this can be beneficial if these are considered carefully and not carelessly. Experts suggest people not to delete their accounts in an attempt to go off the map;[43] instead, experts advise doing the following actions to create an appealing digital footprint:

Research yourself. By doing this, one can see what type of information follows them and is a part of their digital footprint. Think before posting: This will allow for time to consider whether this should be a part of one's digital footprint. Sources say that those who do not consider all possible implications of what they post on the internet may be negatively affected when looking for employment. Highlight attractive traits and qualities: Using the Internet and social media outlets to highlight one's greatest attributes and qualities will allow the person to be seen positively. Since it is already known that digital footprints are evaluated by potential job employers and universities in the application process, then applicants should use that to their benefit and make them look attractive.

Are we allowed to post links to such software that will do the job for us?

joindeleteme.com

support.google.com

uk.norton.com (This is my favorite website for security issues)

www.getapp.com

riaannieman
12-Dec-21, 09:01

Degaussing machine
I want to ask: does anybody have the building plans for a degaussing machine? I looked for such plans on the internet, but could not find any. It is possible that our national firewalls blocks such plans because I can't believe that I can't find any blueprints to build my own machine. I see several brands for sale, though.
riaannieman
27-Jan-22, 01:24

Seeing that there is a discussion elsewhere around the Ukrainian/Russian dispute, I thought this would be insightful. It reminds a lot of the Israeli Stuxnet attack years ago.

www.atlanticcouncil.org

Cyber partisans target Russian army in Belarus amid Ukraine war fears

A group of anonymous cyber activists known as the Belarusian Cyber-Partisans claim to have hacked into the Belarusian Railways computer system this week in a bid to sabotage the deployment of Russian military units in the country. The moves comes amid mounting fears that Belarus may play a crucial role in a possible full-scale Russian invasion of Ukraine.

The Belarusian Cyber-Partisans group says it has accessed and encrypted Belarusian Railways databases in an effort to cause delays and hamper the movement of trains carrying Russian troops and military equipment towards the Belarusian border with Ukraine in the south of the country. “At the command of the terrorist Lukashenka, Belarusian Railways allows the occupying troops to enter our land,” the hacktivist group stated in a January 24 social media post. “We encrypted some Belarusian Railways servers, databases, and workstations to disrupt its operations.”

A representative of the Belarusian Cyber-Partisans told the UK’s Guardian newspaper that the hack attack was in direct response to the recent arrival of large numbers of Russian troops in Belarus. While this presence is ostensibly tied to joint military exercises which are scheduled to take place in February, many have viewed the deployment as part of the Kremlin’s intensifying encirclement of Ukraine ahead of a potential invasion of the country in the coming weeks.

“We don’t want Russian soldiers in Belarus since it compromises the sovereignty of the country and puts it in danger of occupation,” the unnamed Belarusian Cyber-Partisans representative commented. “It also pulls Belarus into a war with Ukraine. And probably Belarusian soldiers would have to participate in it and die for this meaningless war.”

Here is a link to the Stuxnet incident. It is very interesting and makes a good read:

en.wikipedia.org

Linking back to the thread "Question for Stalh." the ability to halt the communication communication of enemy forces are crucial when planning an invasion or attack, and today not all battles are fought with artillery and on the field of battle. Most battles are fought in Cyberspace. We can refer back many years where these battles were fought:
jsis.washington.edu
www.justice.gov
www.nbcnews.com

These cyber attacks seem like the prelude to ground forces occupying the Crimea and an invasion of Ukraine. Just some food for thought. If we read the signs correctly, we can make an accurate prediction of the near future.
stalhandske
27-Jan-22, 02:19

Degaussing machine
This was new to me. Here is one of the simplest designs:

www.youtube.com
riaannieman
13-Oct-22, 02:45

This short video is interesting for anybody who needs additional security.

www.youtube.com
stalhandske
13-Oct-22, 03:05

Very interesting new development - new to me at least!
riaannieman
09-Dec-22, 22:20

here is something I didn't know. Thank you to vocihc for sending me this link. I'll certainly use it often.

archive.ph
riaannieman
28-Dec-22, 04:15

Safe alternative for WhatApp/Telegram/Signal/Line
We all know that public media app such as WhatsApp, Telegram, Line and even Signal are not as safe as commonly thought. I recently discovered a rather obscure app, which I think should be punted a bit. The security and privacy of this app is above expectation, and as far as I can see it works very well.

Have a look at this:

en.wikipedia.org

If there is anybody willing to help me test this app, I will be very thankful. It can be installed on iOS as well as Android. So far it seems that there is no significant reduction in battery life on an iPhone 14 ProMax 256GB, no influence on other software and apps, communication is instantaneous and seamless, and functionality as similar to Telegram and WhatsApp. I tried Signal when it was first released, but it ate into battery life of the iPhone 10 128GB, significantly reducing battery life. I have since read that the problem has been solved, but haven't tried the new version yet.

At the moment I prefer Line and Telegram due to efficiency and ease-of-use, although Telegram has some issues one should be aware of when sending media and multi-media. Line affords one the ability to stay totally anonymous as well, but security is an issue as the app is vulnerable to man-in-the-middle attacks.

threema.ch
riaannieman
22-Mar-23, 02:22

Microsoft support
Never trust the team at Microsoft. I had a teeny little problem with my laptop, running Win XI, and contacted them for a solution. They gave me a file to download, disguised as an update- my machine was formatted and I am battling to get it to the former state it was in.

Worst of all: my problem has not been soved!
mo-oneandmore
22-Mar-23, 07:33

Riaan
Per your "Microsoft support".

That doesn't sound like you were talking to Microsoft, Riaan.

Microsoft techs are real pros in my experience, but it's very common to find yourself talking to a notably less than pro "authorized" contractor when you think you're talking to Microsoft.
Pages: 12
Go to the last post



GameKnot: play chess online, online chess puzzles, Internet chess league, monthly chess tournaments, chess teams, chess clubs, free online chess games database and more.