safety

Timesavers International Pty Ltd Copyrights (C) 2010

CyberMartialArts

What are the CyberMartialArts? | Techniques | The Belts | Free CMA Tips | More CMA Tips


What are the CyberMartialArts?

If you knew how much efforts and time 1000s of malicious hackers are spending in order to be able to attack your personal computer, you would not hesitate in investing some time and money to learn enough to make their work extremely difficult!

CyberMartialArts students or "CMA students" use Firewalls and CyberForceField to stay as invisible as possible and to protect their computer's data, software and hardware using various techniques. A powerful security software such as CyberForceField gives the student access to advanced techniques to protect computer data..

How can you feel fully secure if you don't understand what the problems are, how to recognise an attack and how to react to it? How would you know if your computer is currently under the control of a hacker on the other side of the world? Do you know how to adjust the security settings of the security software you are using? Do you know how to recognise a dangerous file, a dangerous program's behaviour, a dangerous computer user? What settings do you need to check to tune your computer for optimum performances and maximum security? If you suspect a program to be infected by a virus, what can you do to monitor that program? How can you clean it? What do you need to do on a regular basis to keep your computer healthy and clean? How to prevent phishing attacks, ID theft, spam, intrusions, data theft, etc..
All these questions and many more are answered by the CyberMartialArts courses!

 CyberMartialArts help to reinforce one of the weakest link in the chain of items to secure: THE USERS!  If the users can be tricked easily to do stupid and dangerous things, what is the point of having the best security software in the world? As the complexity of the challenges grows, so does the complexity of our solutions and it makes sense to invest time learning about the risks, the problems, and how to react to them. You wouldn't like to be in an air plane controlled only by a computer, without a human pilot in the cockpit, right?
The reason: today's computers can fail sometimes and we cannot fully rely on their software to handle all the possible challenges in the way. CyberMartialArts is as needed to use a computer safely as you need lessons to pilot a plane, or drive a car safely. If you think it would be mad to allow everyone to drive a car without driving lessons, you can easily understand that it is today irresponsible to let everyone use computers without teaching them the basics of computer safety.  Your own life might not be endangered by your computer but your computer might be attacking 1000s others on a regular basis and your current lack of knowledge contributes to the Cyber Tsunami which is on its way right now, and will destroy billions of dollars worth of data, software and hardware in a near future, sooner or later.    

 CyberMartialArts is a new way of approaching computer security.
It empowers the Users with the knowledge to take the control of the safety of all their files, computer programs and even their hardware
, because a software damage can have an impact on the health of the hardware. 

Set the rules for your files... Set the protection level... Let users authenticate themselves and play... securely!

 


CyberMartialArts Techniques


Techniques employed by CyberMartialArtists


 Force Fields

Generic term to describe the tools the users can build with CyberForceField.
According to its purpose, a Force Field can be any of the following tools:

 

 Cage Systems

Cages are folders containing programs with access limited only to files within the cage. "Read Only" Cages prevent any program they contain from modifying anything else within the cage. Cages are fundamental for temporary folders where the majority of Trojans, viruses, spyware, worms and bugs of all kinds fall.

 

 Safe Room / vault Systems

Safe Rooms and vaults are Folders which are only accessible by selected programs and/or selected users at the keyboard.

A safe room or vault can not only be inaccessible but invisible as well - in other words "fully hidden" to all unauthorized programs and/or unauthorized users.

Safe rooms and vaults are fundamental for:

  • emails folders, otherwise any program can read  our emails!
  • files containing passwords, even encrypted, otherwise any program can try cracking them!
  • backup folders, otherwise these local backups are NOT 100% reliable!
  • to prevent the robbery of private data, whatever the threat, local or remote, by the user at the keyboard, a local program or an attacker on a local network or the Internet!
  • to prevent and detect attacks from an insider, data thieves. They are IDS, "Intrusion-Detection Systems".

 


 Freezers

Freezers prevent the modification of existing programs as well as the introduction of new ones. Freezers also protect critical settings such as those monitoring the access to the Internet. Freezers also protect the "shortcuts" leading to programs.

Freezers are fundamental to protecting all programs and software including the operating system and especially the software used to protect the computer. Freezers also prevent the installation of worms, viruses, spyware, dialers, key loggers, adware, and bugs of all kinds.

 

 Settings Protectors

Settings protectors prevent unauthorized modifications of the settings of your programs.
Settings protectors are fundamental to protect from Browser Hijacking, Fishing, many forms of hacking and great to detect attacks as well as most attacks interfere with Windows settings.   

 

 Anti-formatters

Anti-formatters prevent the unauthorized formatting of a hard drive. They are fundamental to protecting from malicious formatting of a hard drive, one of the most dangerous threats to a computer system.

 

 Honey Pots and Trip Wires

Honey pots and trip wires are dummy folders which are visible but their access or the access of some files inside them triggers an alert, with a pop up warning window if needed. 

Honey pots and Trip wires are particularly useful for detecting intruders and attacks from an insider, but also viruses trying to harvest email addresses or spyware trying to rob some data.

 

 Programs Monitors

Programs Monitors monitor the programs running by controlling the data they access and how.
Programs Monitors are fundamental for detecting attacks of all kinds.

 

 Application blockers

Application blockers prevent users from using protected applications. They are fundamental in restricting users of a computer access only to the applications that they are allowed to use.

"Computer program", "computer code", "software", "task", "process" are different names for "executable file", which means "file containing data which can be considered automatically as lists of instructions to execute".

An application uses generally several executable files and data files.

 

 Email Protectors

Emails protectors are fundamental to prevent any program and any user of the computer to access emails, read or write private emails, without authorizations . They prevent any bug to do any damage in the emails folder. 

Emails protectors are fundamental to protect emails.

 

 Backup Protectors

Backup are great to recover from all kinds of attacks but how can we be sure that the back ups are safe to use?

Backup protectors are fully hiding the Backups folders, making them unaccessible and invisible to all programs except the backup programs and only during the backup sessions, and only with the legitimate users at the keyboard.

Backup protectors are fundamental to protect backup data.

 

 Tunnels

Safe Rooms are great to protect private files and folders but how can our programs access them?

Tunnels are settings allowing programs to access safe rooms. There are mainly 3 different kinds of tunnels: tunnels allowing to read data and execute programs, tunnels allowing to write data but not programs and lastly tunnels allowing to write programs.

Tunnels are fundamental to monitor the access of protected areas, such as safe rooms.


 

The Belts


CMA Belts/Levels

Descriptions of the different levels of the CMA students:



 White belt

At the completion of this training, the CMA White Belt Student will have learned very needed knowledge such as: 

How to connect computer equipment safely - technical maintenance;

The basic components of the computer, understand the files system and terms such as RAM, drives, drivers, compression, zip, safe mode;

the purpose of very important tools such as BIOS Settings, control panel, device manager, task manager, registry, firewall;

how to copy/paste, use word processors, connect to the Internet, use emails with attachments, browsers, search engines, install hardware and software, detect anomalies; search the disk, save space, do backups and create smart passwords.  

 


 Yellow belt

At the completion of this training, the CMA Yellow Belt Student will have fine-tuned his/her computer, a basic understanding of the manipulation of files, installed CyberForceField and enough knowledge to use CyberForceField without disturbing the normal functions of the computer.

The accomplished CMA Yellow Belt student has achieved the tuning of:

  • BIOS
  • Folder Options
  • File Sharing
  • Private Data Folders
  • My Computer
  • Task Manager
  • Registry
  • Startup folders and MS config
  • Services
  • Temporary folders
  • Firewall
  • Browsers
  • Email programs
  • CyberForceField
  • Other programs installed in the computer

 Orange belt

An orange belt CMA student has a good understanding of the functions of CyberForceField, and the different tools used in CyberMartialArts, knows how to set special permissions and restrictions with the right priority level and understands the role of the other parameters.

The orange belt CMA student has an overall understanding of all the screens of CyberForceField and is ready to play and test custom protections, in particular private files and folders, like the folders containing emails and backups.

 Green belt

A green belt CMA student has a good understanding of the real causes of computer malware and is able to protect his/her files and folders in Windows normal mode and Safe-mode. The Green Belt can build Cages and Safe Rooms, install honey pots, do safe downloads and installations of programs, monitor programs with cages, fully hide backup folders smartly, can recognize dangerous files and knows how to monitor them, knows how to set securely the settings of each program running, and has no unexplained attacks in the Log File, or knows how to get explanations about each alert in the LogFile, and finally knows how to send and receive an email safely, smartly, and how to track the real sender of an email.

 Blue belt

A Blue Belt CMA student is able to set custom protection for Internet, local networks, and to share files safely in a multi user environment, to set the parameters of Firewalls, use CFF's firewall's functionalities, protect wireless networks, understand and act on the Firewall's alerts, detect attackers on the network, and use the needed networking tools safely.

 Brown belt

A brown belt CMA student is able to fix computers infected by bugs of any kind, manipulate safely registry settings and configuration files, repair, clean and rebuild safely a computer damaged by a malware infection.

 Black belt

A black belt CMA student has mastered the previous levels and can do more!
The black belt CMA student can improve the default settings of CyberForceField for the benefits of the whole community.