<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: The Lurking Threats in Free Services</title>
	<atom:link href="http://www.gfi.com/blog/lurking-threats-free-services/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/lurking-threats-free-services/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=lurking-threats-free-services</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Eliza</title>
		<link>http://www.gfi.com/blog/lurking-threats-free-services/comment-page-1/#comment-17552</link>
		<dc:creator>Eliza</dc:creator>
		<pubDate>Tue, 04 Jan 2011 22:16:09 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2976#comment-17552</guid>
		<description><![CDATA[As an additional (or even primary) form of security, would it be possible for a system to simply remove any possibility of writing, modifying or installing any new files into the hard drive. It would be much like administrative jurisdiction, but in this case, it’s not just applied to protected, administrative and/or system folders. If the purpose of public PC users is simply to go online, browse and check their mail, then I wouldn’t see any problems with implementing a system such as this one.]]></description>
		<content:encoded><![CDATA[<p>As an additional (or even primary) form of security, would it be possible for a system to simply remove any possibility of writing, modifying or installing any new files into the hard drive. It would be much like administrative jurisdiction, but in this case, it’s not just applied to protected, administrative and/or system folders. If the purpose of public PC users is simply to go online, browse and check their mail, then I wouldn’t see any problems with implementing a system such as this one.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: angie f.</title>
		<link>http://www.gfi.com/blog/lurking-threats-free-services/comment-page-1/#comment-17547</link>
		<dc:creator>angie f.</dc:creator>
		<pubDate>Tue, 04 Jan 2011 21:57:10 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2976#comment-17547</guid>
		<description><![CDATA[@JP Adler

I guess, the fact of the matter is that not all individuals may have access (or even own) their own laptops or mobile workstations. It’s true that netbooks and laptops have dropped in cost over the last three or four years, but average end-users that include students in that demographic still rely heavily on public use computers. It’s these audiences that need to be educated on the safe practices of public PC use, for their own protection.]]></description>
		<content:encoded><![CDATA[<p>@JP Adler</p>
<p>I guess, the fact of the matter is that not all individuals may have access (or even own) their own laptops or mobile workstations. It’s true that netbooks and laptops have dropped in cost over the last three or four years, but average end-users that include students in that demographic still rely heavily on public use computers. It’s these audiences that need to be educated on the safe practices of public PC use, for their own protection.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Amy</title>
		<link>http://www.gfi.com/blog/lurking-threats-free-services/comment-page-1/#comment-17215</link>
		<dc:creator>Amy</dc:creator>
		<pubDate>Thu, 30 Dec 2010 16:03:47 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2976#comment-17215</guid>
		<description><![CDATA[@freddie melanon

I have learned my lesson by completely avoiding free use public PCs altogether. Nowadays, I simply bring my laptop with me everywhere I go (most especially abroad) for work. I’ve also worked out a plan with my mobile service that I’m connected everywhere I go. When working with public PCs, you can never be sure of the security system they use. Might as well be safe and use your own.]]></description>
		<content:encoded><![CDATA[<p>@freddie melanon</p>
<p>I have learned my lesson by completely avoiding free use public PCs altogether. Nowadays, I simply bring my laptop with me everywhere I go (most especially abroad) for work. I’ve also worked out a plan with my mobile service that I’m connected everywhere I go. When working with public PCs, you can never be sure of the security system they use. Might as well be safe and use your own.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: andrew philmore</title>
		<link>http://www.gfi.com/blog/lurking-threats-free-services/comment-page-1/#comment-16014</link>
		<dc:creator>andrew philmore</dc:creator>
		<pubDate>Tue, 14 Dec 2010 18:40:42 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2976#comment-16014</guid>
		<description><![CDATA[To aid with security, I&#039;ve seen publicly used computer stations implement a sort of &quot;closed system&quot; that manages, monitors and evaluates incoming and outgoing files. It sounds a bit complicated, but the heart of the system is actual quite simple. Users aren&#039;t allowed to use flash or USB drives, downloading isn&#039;t allowed and only a key set of files are allowed to be opened. Flash and USB drives are opened on a remote station accessed only by the system admin, whose content can be moved to the unit of the user. The files can then be accessed from there. That way, all outside data devices is monitored through a single hub to minimize threats and system vulnerabilities.]]></description>
		<content:encoded><![CDATA[<p>To aid with security, I&#8217;ve seen publicly used computer stations implement a sort of &#8220;closed system&#8221; that manages, monitors and evaluates incoming and outgoing files. It sounds a bit complicated, but the heart of the system is actual quite simple. Users aren&#8217;t allowed to use flash or USB drives, downloading isn&#8217;t allowed and only a key set of files are allowed to be opened. Flash and USB drives are opened on a remote station accessed only by the system admin, whose content can be moved to the unit of the user. The files can then be accessed from there. That way, all outside data devices is monitored through a single hub to minimize threats and system vulnerabilities.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: freddie melanon</title>
		<link>http://www.gfi.com/blog/lurking-threats-free-services/comment-page-1/#comment-15709</link>
		<dc:creator>freddie melanon</dc:creator>
		<pubDate>Sun, 12 Dec 2010 16:52:38 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2976#comment-15709</guid>
		<description><![CDATA[It just goes to show that nothing&#039;s free: even a PC that&#039;s slated for public use.  I&#039;ve fallen into the trap of getting my own hardware infected after a short stint at the local computer shop. You really can&#039;t be too careful about these things. If internet shop owners were to implement better security on their systems, they&#039;d best well advertise it to their potential customers. I think the additional security would definitely be a worthy advantage over the competition.]]></description>
		<content:encoded><![CDATA[<p>It just goes to show that nothing&#8217;s free: even a PC that&#8217;s slated for public use.  I&#8217;ve fallen into the trap of getting my own hardware infected after a short stint at the local computer shop. You really can&#8217;t be too careful about these things. If internet shop owners were to implement better security on their systems, they&#8217;d best well advertise it to their potential customers. I think the additional security would definitely be a worthy advantage over the competition.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Trisha F.</title>
		<link>http://www.gfi.com/blog/lurking-threats-free-services/comment-page-1/#comment-15582</link>
		<dc:creator>Trisha F.</dc:creator>
		<pubDate>Sat, 11 Dec 2010 18:33:15 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2976#comment-15582</guid>
		<description><![CDATA[I managed to follow this article back from another one posted on &quot;how to safely secure a public PC&quot;. Interesting anecdote about the German internet shop. Although it isn&#039;t a unique occurrence, the frightening thing to note is how often it happens to public computer centers clear across the world. With the proliferation of hundreds of thousands of malware over years, you would&#039;ve thought that these business center had wizened up and implemented better security.]]></description>
		<content:encoded><![CDATA[<p>I managed to follow this article back from another one posted on &#8220;how to safely secure a public PC&#8221;. Interesting anecdote about the German internet shop. Although it isn&#8217;t a unique occurrence, the frightening thing to note is how often it happens to public computer centers clear across the world. With the proliferation of hundreds of thousands of malware over years, you would&#8217;ve thought that these business center had wizened up and implemented better security.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: JP Adler</title>
		<link>http://www.gfi.com/blog/lurking-threats-free-services/comment-page-1/#comment-15575</link>
		<dc:creator>JP Adler</dc:creator>
		<pubDate>Sat, 11 Dec 2010 18:04:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2976#comment-15575</guid>
		<description><![CDATA[I thought that Antivirus software  and whatever preferred Endpoint Security Point software would be mandatory for public use PCs by now. Unfortunately, this doesn&#039;t seem to be the case at all. As for me, I just tend to work straight off my laptop in times of emergency and simply hook my system up to the shop&#039;s remote internet cables. Saves me the paranoia of compromising any of my own data.]]></description>
		<content:encoded><![CDATA[<p>I thought that Antivirus software  and whatever preferred Endpoint Security Point software would be mandatory for public use PCs by now. Unfortunately, this doesn&#8217;t seem to be the case at all. As for me, I just tend to work straight off my laptop in times of emergency and simply hook my system up to the shop&#8217;s remote internet cables. Saves me the paranoia of compromising any of my own data.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/lurking-threats-free-services/comment-page-1/#comment-13217</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Tue, 09 Nov 2010 11:40:39 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=2976#comment-13217</guid>
		<description><![CDATA[I completely agree with what you&#039;re saying, and I think the title is a bit misleading in that the problem here is not restricted to only free services. The same issue can just as easily exist if such as service was paid for. 

Whenever a business offers computer usage to customers, be it for printing or other uses, one has to be extra careful to ensure that the system is secure not just for the business itself but also for the customers. This includes logical security but also physical security. Such systems require protection not just against malicious software but also against hardware-based keyloggers as well as Rouge Access points.]]></description>
		<content:encoded><![CDATA[<p>I completely agree with what you&#8217;re saying, and I think the title is a bit misleading in that the problem here is not restricted to only free services. The same issue can just as easily exist if such as service was paid for. </p>
<p>Whenever a business offers computer usage to customers, be it for printing or other uses, one has to be extra careful to ensure that the system is secure not just for the business itself but also for the customers. This includes logical security but also physical security. Such systems require protection not just against malicious software but also against hardware-based keyloggers as well as Rouge Access points.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 07:04:43 by W3 Total Cache --