New User? Need help? Click here to register for free! Registering removes the advertisements.

Computer Cops
image image image image image image image image
Donations
If you found this site helpful, please donate to help keep it online
Don't want to use PayPal? Try our physical address
image
Prime Choice
· Head Lines
· Advisories (All)
· Dnld of the Week!
· CCSP News Ltrs
· Find a Cure!

· Ian T's (AR 23)
· Marcia's (CO8)
· Bill G's (CO11)
· Paul's (AR 5)
· Robin's (AR 2)

· Ian T's Archive
· Marcia's Archive
· Bill G's Archive
· Paul's Archive
· Robin's Archive
image
Security Central
· Home
· Wireless
· Bookmarks
· CLSID
· Columbia
· Community
· Downloads
· Encyclopedia
· Feedback (send)
· Forums
· Gallery
· Giveaways
· HijackThis
· Journal
· Members List
· My Downloads
· PremChat
· Premium
· Private Messages
· Proxomitron
· Quizz
· RegChat
· Reviews
· Google Search
· Sections
· Software
· Statistics
· Stories Archive
· Submit News
· Surveys
· Top
· Topics
· Web Links
· Your Account
image
CCSP Toolkit
· Email Virus Scan
· UDP Port Scanner
· TCP Port Scanner
· Trojan TCP Scan
· Reveal Your IP
· Algorithms
· Whois
· nmap port scanner
· IPs Banned [?]
image
Survey
How much can you give to keep Computer Cops online?

$10 up to $25 per year?
$25 up to $50 per year?
$10 up to $25 per month?
$25 up to $50 per month?
More than $50 per year?
More than $50 per month?
One time only?
Other (please comment)



Results
Polls

Votes: 988
Comments: 19
image
Translate
English German French
Italian Portuguese Spanish
Chinese Greek Russian
image
image trj: Reviews: Review: Tiny Software security program traps telecommuters' Trojans image
Trojans

The best security is a layered defense. Companies surround themselves with rings of firewalls, intrusion detectors and content filters, and yet malicious code occasionally penetrates and assaults their innermost hard drives.

Tiny Trojan Trap tackles this last possible breach with sandbox technology that places users' software applications into private sandboxes where they can play but can't do anything destructive.



How we did it
Graphic: Net results


In our tests, Tiny Trojan Trap protected files residing on Windows-based desktops, but you have to specify its boundaries - what it should protect and what it must leave alone.

Tiny Trojan Trap is a stand-alone application that can be installed remotely via, for instance, Microsoft's Systems Management Server or Novell's ZENWorks, to multiple remote desktops. A network professional would probably tweak the settings on each desktop to get it set up properly.

It was easy to install, placing almost all our existing applications in an unrestricted group, making the assumption that they had no dangerous aspects. (See How we did it).

The software then blocked our attempts to download a harmless PDF file containing the manual because the install program had placed Internet Explorer into an application group with restricted rights. We could read and print the file with Acrobat Reader because Acrobat was placed in the unrestricted application group.

We would have preferred an installation option that let us start with low, medium or high security options for our applications.

The Administration Tool used after installation has an easy mode setting that lets you adjust simple slide bars to the level of security desired for each application group. There is also a helpful list of all the application groups, and moving applications between groups is simply drag and drop.

The advanced mode has a two-pane window resembling Windows Explorer to match application groups to individual system components. Each application group gets access privileges specified for each system component. For example, you can specify that all the applications in a particular group can have limited access to individual services, hardware devices and even specific subdirectories of files.



How we did it

We tested Tiny Trojan Trap Version 3.0.4 primarily on a Dell OptiPlex Gx110, 667 MHz running Windows 2000 Professional and also on a Compaq Presario 5000 1.2 GHz, running Windows XP Home Edition. We ran a batch file to delete several system files. We used a disk editor to manipulate the boot records on our hard drive. We sent an e-mail message using Microsoft's Outlook Express to test the e-mail filtering.


Advanced mode also lets you add content filtering for Web access and outgoing e-mail. Trojan Trap does not provide a blacklist of Web sites or a list of suggested words to block outgoing e-mail.

There are some handy tools for handling cache and cookies. We set an option to delete all cookies after each session and edited the list of Web sites we visited, an automatic way to clean up your browser's cache.

When we tested the product on a multiuser computer, we were disappointed that each user cannot have his own Trojan Trap settings. We appreciated the password feature that prevents tampering with the settings.

Trojan Trap lets you adjust security downward to allow better computer performance. But on our 1.2-GHz Windows XP computer there was no noticeable performance hit at all at its highest setting.

Trojan Trap comes with the ability to launch antivirus scans and to automatically scan CAB files before they are installed. However, it couldn't identify Norton AntiVirus 2002.

Reporting in Trojan Trap is limited. We would have liked to have at least printed out some of the information in the Activity windows and sorted columns of data by clicking on their headers.

Overall, we would recommend Tiny Trojan Trap as an added layer of security to expert users and to average users who have the patience to adjust its settings.


Full article and source:

Network World Fusion

Posted on Monday, 23 September 2002 @ 14:30:00 EDT by Paul
image

 
Login
Nickname

Password

· New User? ·
Click here to create a registered account.
image
Related Links
· TrackBack (0)
· Microsoft
· Microsoft
· Compaq
· Themes.org
· HotScripts
· Linux Manuals
· Dell
· W3 Consortium
· More about Trojans
· News by Paul


Most read story about Trojans:
Lover Spy

image
Article Rating
Average Score: 5
Votes: 1


Please take a second and vote for this article:

Bad
Regular
Good
Very Good
Excellent


image
Options

Printer Friendly Page  Printer Friendly Page

image
"Login" | Login/Create an Account | 0 comments
Threshold
The comments are owned by the poster. We aren't responsible for their content.

No Comments Allowed for Anonymous, please register