20 Dec

Google abandons SHA-1 encryption soon!

Google abandons SHA1 encryption soon!

Google handles well his security plan on the web and it seems to stick to it. Google waits hardly a week between each announcement of a new measure to increase the security or change an aspect of it. When it is not on its search engine, it is on Chrome, its flagship browser.

Websites and browsers encryptent data exchanged between them. A digital signature is created for each data packet to ensure that these data are not altered when transiting servers to servers.

The SHA-1 type of encryption for security certificates has some weaknesses and recommendation made by security authorities in 2011 was to abandon it on 1st January 2016.

Google will go in that sense, and in the course of January 2016, the release of Chrome 48 will present an error when you browse a Web site only with the SHA-1 encryption type.

The error should look like this:

SHA-1 encryption type error

In addition, on 1 January 2017 it will no longer be an alert to be displayed but an error that will completely block the possibility of visiting the site.

Make sure your web hosting company offers a ready SHA-2 environment for 2016 , such as Internet Cloud Canada which has already made the move since a while! Otherwise, your websites will display errors and of course you will lose the trust of your customers because they will not not buy or look at an insecure website!

Share this
18 Dec

Google indexes more intensely HTTPS pages

Google indexes more intensely HTTPS pages

Google announced that the HTTPS pages will be better ranked and prefered according to certain criteria in the positioning of research results. A website secured by a security certificate will benefit from better visibility in the Google search engine.
This process was initiated but it is clear that a visitor must have a private and secure relationship between him and the website. Google will index the default HTTPS pages using the following criteria:

 

– It doesn’t contain insecure dependencies.
– It isn’t blocked from crawling by robots.txt.
– It doesn’t redirect users to or through an insecure HTTP page.
– It doesn’t have a rel=”canonical” link to the HTTP page.
– It doesn’t contain a noindex robots meta tag.
– It doesn’t have on-host outlinks to HTTP URLs.
– The sitemaps lists the HTTPS URL, or doesn’t list the HTTP version of the URL
– The server has a valid TLS certificate.

 

This may seem like a lot of criteria, but in fact it is more exceptions than actually criteria because few pages are in this situation unless you decided it.

We must therefore now obtain an SSL certificate and switch to a HTTPS website to offer a better user experience and SEO results!

Share this
17 Dec

Prevent viruses from installing on Windows!

Prevent viruses from installing on Windows!

The’re lots of solutions to stop viruses on Windows, but many are only focussing on the definitions of these viruses.  You can block the process at the base for some of them. There are many viruses or malware that install blithely in “Appdata” directory, a default hidden folder in the files of the administration account or in the one of the user.

This directory is very prolific for spywares, keyloggers and other malwares. It is possible for you to prevent the creation of new directories, files, and block executable for that specific folder.

We’ll see the procedure to block .EXE files in that directory:

1. Right-click the WIndows icon at the bottom left of the screen.

2. Select “Run”.

3. Type: gpedit.msc and ENTER to open the Group Policy Editor.

 

This editor allows you to create custom rules to prevent viruses from using the directory “Appdata”.

 

4. In the “Computer Configuration” section, click “Windows Settings”

5. Click the “Security Settings” tab, then “Software Restriction Policies”

6. Right click on “Additional Rules” and “New Path Rule” for all following rules. Do not forget to press the “Apply” button to save your rules.

We will create 6 custom rules in total in this section. For each rule, you do step 6.

 

Rule 1:


Path: % AppData% Local \ *. Exe

Security level: Not permitted

Description: Do not allow executables in Appdata

 

Rule 2:


Path: % LOCALAPPDATA% \ * \ *. Exe

Security level: Not permitted

Description: Do not allow executables in subdirectories of Appdata

 

Rule 3:


Path: % LOCALAPPDATA% \ Temp \ * zip \ *. Exe.

Security level: Not permitted

Description: Prevent executable .ZIP archive files attached to emails using the space of the user.

 

Rule 4:


Path: % LOCALAPPDATA% \ Temp \ 7z * \ *. Exe

Security level: Not permitted

Description: Prevent executable archived files attached to emails .7z to use the space of the user.

 

Rule 5:


Path: % LOCALAPPDATA% \ Temp \ Rar * \ *. Exe

Security level: Not permitted

Description: Prevent executable files RAR archive attached to emails using the space of the user.

 

Rule 6:


Path: % LOCALAPPDATA% \ Temp \ wz * \ *. Exe

Security level: Not permitted

Description: Prevent executable files Winzip annexed to archived emails using the space of the user.

 

We believe that this additional rules will make your computer more secure but you must keep your antivirus.

Also, consider these steps to properly secure your computer:


– Software: Malwarebytes Anti-Exploit
– Software: KeyScrambler
– Enable Windows Firewall
– Do your updates regularly for WIndows or for the virus definitions
– Do not surf on insecure sites or file sharing websites (P2P). If you can not stop you from using them, then use a second computer dedicated solely to these tasks or use a virtualization space on your computer, it will be effective against the spread of viruses and if you are infected, then you destroy this virtual space.

Share this

© 2018-2023 Internet Cloud Canada.Tous droits réservés. (Sitemap).