Netkeys™ InternetSecuritySystem
        Owner's Manual 

        (c) Software Appliance Company
        Version 6.5, July 16, 2003

        Disclaimer
        This information is subject to change without notice. The information contained herein is believed to be accurate and reliable, but may contain errors or omissions, and is not covered by any guarantee or warranty. Information is intended for Software Appliance Company customers only. Please report any problems to:support@softappco.com.

        Table of Contents

        1. Introduction & what to expect
        2. Installing & uninstalling
        3. Multiple users, Settings, Passwords and serial #'s
        4. Quick Start - using Netkeys
        5. Email menu, SPAM controls
        6. URL,IP, PORT and Security Overrides menu
        7. Word Blocking menu
        8. Historian menu
        9. Personal Privacy menu
        10. Admin menu & PersonalFirewall™
        11. Virus menu & Internet Bomb Diffusion Technology
        12. Customer support - problems & questions

        1. Introduction & what to expect.
        This manual provides extensive tutorial help and background information about Internet security to enable you to understand how to apply the power of Netkeys™ to increase Internet security. 

        Each chapter provides screen shots and background information about each product feature, including tips on how to use the features, and how not to use the features. 

        Automated problem diagnosis is provided 24/7 on-line by Software Appliance Company. The "ReportBug.exe" tool is provided with each Softappco product to expedite problem resolution. See Customer support - problems & questions for more info.

        Since the Internet is a global, unregulated forum, all types of information are available, spanning every national, cultural, political, and moral persuasion. Netkeys™ provides the tools required to monitor and control Internet access, including a variety of Internet privacy, virus, security, and obscenity controls.

        Netkeys™ was designed for two types of people:

        Basic User
        This person wants software to monitor Internet activity, keep a history of everything that happens, and wants security, privacy, and obscenity controls.

        Advanced User
        This person is comfortable with computers. They will appreciate and explore the advanced capabilities of Netkeys.

        All users will appreciate the Netkeys Historian menuwhich records everything that's been happening on their Internet connection. The Historian is like a phone bill - it is made to be looked at.

        Quiet operation
        Netkeys can operate quietly, or provide a warning screen (see Figure 1a) whenever it blocks any information. This is controllable using the Quiet button in the Personal Privacy menu. 


        Figure 1a - Internet Security warning screen.

        Tolerance to obscenity
        Netkeys offers many types of obscenity protection.  Depending upon the tolerance level of the user, individual features can be turned on or off. 
         

        2. Installing, registering, & uninstalling

        Installation
        Netkeys installation is easy. Step by step instructions are provided on screen through the entire process. Installing the product automatically provides you with a 10-day software serial number until you get a permanent one by purchasing and registering the product. 

        Microsoft file sharing & NETBIOS install options
        If your PC is running Microsoft Windows XP (tm), the installation process will prompt you to use the Internet Connection Firewall. Figure B1 provides information about using the Internet Connection Firewall.

        If you are connected to a local area or private network, you may not need the Internet Connection Firewall. See your System administrator if in doubt.

        In the Network settings, turn off NETBEUI, Microsoft File and Printer Sharing, and Client for Microsoft Networks unless you are an expert in Microsoft Network Configuration.

        The only network settings required for the Internet are TCP/IP and specific dial-up adapter connections to your ISP. Remove the others.

        This chapter will provide further information for you to change your Windows settings for maximum security. See the screen shots below, and read the information.



        Figure B1 - Internet Connection Firewall information for Windows XP

        Microsoft file sharing & NETBIOS install options
        When you install the product, you can disable Microsoft filesharing and NETBIOS ports 137-139. NETBIOS is a well know security problem with Windows systems, and it leaves your PC wide open to attacks from hackers.

        See figure A1 below.

        If you choose option 1, then you are expected to actually go into the control panel, Network settings, and remove "Client for Microsoft Networks" from the network settings. You can always add this feature later, if you like.

        If you choose option 2, the product installer will disconnect NETBIOS from your network. To reverse this, you must uninstall the product.

        If you choose option 3, then you are expected to have the expertise and actual need to use the Microsoft Network for your LAN of PC's and peripherals. For further information about configuring Microsoft File sharing yourself, see:
        http://grc.com/su-fixit.htm
        http://grc.com/su-bondage.htm

        Figure A1 - install options for disabling Microsoft file sharing.

        Registration
        Software serial numbers, such as 17a7b3d9, are used to activate and register Netkeys. Software serial numbers are provided to all customers when they purchase the product.

        To register the software, a program is provided called Register, as shown in Figure 1.Just run the Register program, and enter the valid software serial number in the edit box to complete registration. Make sure to enter the serial number exactly as it is shown, using upper & lower case letters.
         


        Figure 1 - Register program screen menu.

        Uninstalling
        For any Windows software program, uninstallation should be done properly. To uninstall Windows software, go into the Control Panel and select Add/Remove Programs. Select "InternetSecuritySystem" (this is Netkeys) from the list of programs to uninstall. See the Windows Help system for more info on Add/Remove Programs.

        Always reboot your computer immediately after uninstalling.

        When uninstalling Netkeys, the menu shown in Figure 2 appears. The secret password must be entered for uninstallation to be allowed.  This prevents a child or co-worker from uninstalling the software without your permission. Passwords are discussed in the chapter: Your secret password.
         


        Figure 2 - password protection screen for uninstalling Netkeys.

        3. Multiple users, Settings, Passwords and serial #'s

        Multiple users
        This product can work with multiple Windows login users. Each user can have their own custom settings, or use global default settings.

        By default, all Windows users share the same settings for this product. If you change the settings, all Windows login users will be affected.

        If you prefer, any Windows login user can have independent custom settings for this product, instead of the global settings.

        Set custom settings for a specific Windows login user as follows:

        1. Login to Windows as the user.
        2. Open the product settings using your password.
        3. Press the "User profiles" button on the Admin tab..
        4. Uncheck the checkbox "Load global settings for this user at login"
        *Now this Windows login user will use custom instead of global settings.

        Save and restore settings to & from files
        Settings and lists can be saved to files, and loaded from files. The files are of type .txt, so you can read them with any program. The files have a special arrangement and format, which should not be disturbed.

        You may save and restore selected items. For example, you may save only the URL list, or save everything. Also, you can load only the URL list, or load everything. Checkboxes are provided to allow selective save and load of settings and lists.



        Serial #
        Serial #'s are provided when you purchase Netkeys. Register your serial # using the program "Register.exe", which comes installed with Netkeys. It is important to register right away to be eligible for customer support and free upgrades.

        To find your serial number, run the program "Register.exe" which comes installed with the product. If you have already registered, then your serial number will appear when you run "Register.exe".

        Passwords
        The secret password is needed to:
        - View Internet activity history.
        - Change Netkeys settings.
        - Uninstall Netkeys.

        The initial secret password is yahoo. Note that the password is lower-case yahoo, not YAHOO or Yahoo. The password should be changed immediately after Netkeys is installed & the computer is restarted. The password can be changed in the Privacy menu of Netkeys. Try using a password that you are not likely to forget,  such as your ATM pin number.

        Every time you use Netkeys, you need to enter the secret password. If you type the password incorrectly, you will need to try again. Each attempt to use Netkeys is recorded, so you can see if anyone is trying to break in to Netkeys using guessed passwords. See the Historian menu chapter for more information. 

        4. Quick Start - using Netkeys

        After installing Netkeys, the computer must be shut down and restarted. When the computer starts, the Netkeys icon will appear in the icon tray, as shown in Figure 3.

        The tray icon display
        The tray icon will change to indicate what Netkeys has detected or blocked, as shown in Figure 3a. A detailed description of the event will also be listed in the Historian display, as described in the Historian menu. Also, sound effects will play to alert you to the detected events. The sound can be turned off in the Admin Menu .


        Figure 3a - Tray icon indicating InternetBombDiffusion has occurred.

        Security note:  You may remove the Netkeys icon from the Windows startup folder if you do not want the Netkeys icon to appear in the icon tray when your computer starts. Netkeys will operate even when the icon is not being displayed. See the Windows help information on your computer to learn more about the startup folder.


        Figure 3 - Netkeys icon in icon tray.
         
         


        Figure 4 - Netkeys in start menu.
         

        Netkeys will appear in the Program menu, as shown in Figure 4.

        When you start Netkeys from the Program menu (Figure 4), the Netkeys icon appears in the icon tray, as shown in Figure 3. To access the capabilities of Netkeys, click the right mouse key over the Netkeys icon in the icon tray, as shown in Figure 5.


        Figure 5 - click right mouse key over Netkeys tray icon.

        The password is required to run Netkeys. The initial password of yahoo will work unless it has been changed subsequent to installation. The password menu is shown in Figure 6. Make sure to enter the password correctly, using upper and lower case as required.


        Figure 6 - password screen

        5. Email Menu

        The Email menu provides tools to:

        1. Block sending email via POP3 email accounts or via free Web-email accounts.
        2. Block receiving email via POP3 email accounts.
        3. Block sending email attachments via POP3 email and Web-email.
        4. Block receiving email attachments via POP3 email (erases them).
        5. Records email attachments sent (POP3 & Web-email) & received (POP3).
        6. Email obscenity (send/receive) can be erased using the Word Blocking menu
        7. All email activity is recorded in the Historian menu.
        8. Wildcard matching to block email from a range of email addresses.

        Block email SPAM button
        SPAM is unwanted email. Often SPAM contains advertisements, pornography, or viruses. If the SPAM comes into your POP3 email account, such as Outlook Express, Eudora, etc. then Netkeys SPAM blocking can stop the incoming email. If the SPAM goes into your HOTMAIL(tm) or YAHOO(tm) account then Netkeys can only mask the watchwords and obscenity, but not stop the email. There is no way for Netkeys to intercept email from a spammer en route to HOTMAIL(tm) or YAHOO(tm).

        Use this button if you want to block SPAM based upon WatchWords or obscenity content.

        You must also turn on the ElectronicMasking(tm) or ElectronicWhiteout(tm) buttons on the Word Blocking controls tab when blocking spam.

        SpamTorpedo(tm) feature
        The SpamTorpedo(tm) is an automated email response to spammers, triggered whenever SPAM is blocked. The SpamTorpedo(tm) is sent directly to the spamming email server and also to the email sender, if possible, informing them that the email was undeliverable. If the spammer is using software to manage their mailing list, the SpamTorpedo(tm) email may cause your email address to be removed from the spammer's email list. However, this feature is not 100% guaranteed, since spamming software sometimes does not check for undeliverable email return messages.

        Here is how Netkeys can be used to block SPAM.

        1) Content triggered SPAM blocking. The WatchWords(tm) list can be used to define words and phrases that will trigger email blocking. Any content can be blocked this way. WatchWords(tm) are an extension of the built-in obscenity detection vocabulary, so obscenity is also blocked. See the Word Blocking menu to specifiy WatchWords.

        2) Email address triggered SPAM blocking. Netkeys allows you to block email addresses for incoming and outgoing email. There is a separate button to block each direction (send/receive). To block specific email addresses, enter them in the email list. You can block ranges of email addresses containing substrings, such as blocking everyone from a specific country, etc.

        Examples:
        ?yahoo (block all email address from yahoo)i
        ?.de (block all email from Germany)
        ?webmaster (block all email from webmasters)

        When outgoing email is blocked, the outgoing address is scrambled so that the email will "bounce back" to you as undeliverable. When incoming email is blocked, the sender's name & address, as well as the entire email contents are erased. Optionally, a warning popup screen can be displayed when anything is blocked as allowed in the Admin Menu .

        Why block email incoming attachments? Because many porno sites will send obscene pictures via email on request - new pictures every day. However, blocking incoming email attachments is an extreme measure, since it completely erases the contents of the email attachment, and it is not recoverable. A good rule is: "don't open email attachments from a stranger!" Also, there are known "virus" exploits involving various types of files such as .CIL files etc. that cause malicious code to execute on your PC if you open the file. Email attachments are a potential security risk. 

        Why block email outgoing attachments? If you have valuable data files on your computer, obviously you want to protect these from unrestricted Internet access. Please note that it is very possible for a file to be read from your PC simply by visiting a website! For example, free Web-email sites can read files from your PC, and then attach them to email sent from their server. If the free Web-email site can do it, other malicious websites can as well. Such activity would likely require some Javascript, ActiveX, or VBScript to run on your PC, and that happens all the time! 

        AOL (America Online) users please note: AOL's browser provides some email blocking capabilities which AOL customers may prefer, so Netkeys email blocking is disabled when using the AOL browser. Possibly use a different browser like Netscape for email if you prefer the Netkeys email blocking features.

        Email Attachment Controls
        Block Incoming Button
        Blocks POP3 email attachments as they enter your PC by erasing their entire contents, and storing the filename in the Historian.
        Block Outgoing Button
        Blocks outgoing POP3 and free Web-email attachment files from leaving your PC. The DataWall™ feature of the Personal Firewall™ also blocks email attachment files from going to free Web-email sites, as well as any other website. 

        EmailCloaking™ button
        This feature allows you to send anonymous email using POP3 email servers. It does this by setting your return email address to a@non.net. However, it is always possible for Internet Service providers, website administrators, etc. to track you down if this feature is used for malicious purposes. This feature is similar to call-#-blocking on your telephone, and is intended for legitimate purposes only. 

        Figure 7 - Email screen. 

        Email blocking is designed to operate with any POP3 compatible email programs you may have, such as Netscape email, Microsoft IE email, Pegasus email, etc.

        Blocking free Web-email sites
        Outgoing email blocking works for nearly all free Web-email sites, such as Microsoft's Hotmail, etc. Incoming email to Web-email servers cannot be blocked by Netkeys. However, these email sites can be completely blocked using theEd Website blocking capability discussed in the Websites menu chapter. Just enter the free email site as a blocked site, and all access to that site is disallowed.

        Editing the Email blocking list
        Just click the left mouse key on the name to be edited, and edit using the keyboard. Scroll bars are provided to access any part of the list. Any email addresses listed in the Email blocking list can be blocked.

        The following rules apply when entering email addresses:
        1. Enter the entire email address (name@domain.com, etc.).
        2. Lower case only - uppercase is translated into lower case anyway.
        3. Wildcard matching - use ? at the beginning of the string (see examples).

        Examples:

        john@yahoo.com (OK)
        john @ yahoo.com (NOT OK - spaces not allowed)
        ?yahoo (WILDCARD - block everybody from yahoo.com)
        ?sex (WILDCARD - block any email address containing the string 'sex'

        Note: the Historian Menu has a button to add email addresses from the History list directly into the Email blocking list.

        Blocking outgoing email
        If desired, outgoing email to listed email addresses can be blocked. If an email address is in the Email blocking list, the email will bounce back from the Internet, showing an undeliverable email address.

        Blocking incoming email
        Incoming email blocking is provided for POP3 email programs. If desired, the email address of the sender can be blocked from appearing in the email, and the incoming email erased. However, the email address will be shown in the Historian Menu. This feature may only be useful in extreme cases where the incoming email sender's address and email content should be blocked.

        Also note that all email is filtered using the obscenity protection features found in the Word Blocking Menu, as shown in figure 7a.
         


        Figure 7a - email filtered for obscenity.
         

        6. URL, IP, PORT Menu

        The URL, IP, PORT menu provides the capability to blocked any specific web site URL or IP:PORT address from being accessed. Blocking is bidirectional, so you can block both outbound and incoming connections. An edit list is provided, and control buttons as shown in Figure 8. This includes chat sites, obscene websites, search engines, free email sites, etc. 

        Overrides for specific websites
        The global settings can be changed for a specific website using Overrides. Overrides allows you to set website specific security features, which override the global settings.

        For example, if the global settings are configured to block private information from going to the Internet (such as your credit card #), you may want to override the global settings and allow your credit card to be used on Ebay.com or Yahoo shopping, etc.

        Override settings appear as a 10-digit numerical string following the website name. They can be erased manually by editing the website in the list. Example: "www.softappco.com:1000040023".

        To use overrides, select a website from the list by clicking once on it, and then press the "Set selected URL/IP" button. This allows you to set overrides for the selected website.



        Figure 5.1 - Overrides menu

        Microsoft NETBIOS file sharing
        Microsoft NETBIOS file sharing can be disabled when you install Netkeys. If you have a LAN, and you are currently using Microsoft NETBIOS file sharing, you should not use this feature.

        Why would you want to disable Microsoft NETBIOS file sharing? Because it makes your PC wide open to anybody on the Internet who wants to break in. If you are a Networking professional, or a very advanced user, you can configure Microsoft NETBIOS file sharing so that you have some protection. But, it requires considerable expertise.

        However, for the majority of PC users, Microsoft NETBIOS file sharing ports should be disabled when you install Netkeys, since they are completely un-needed and dangerous temptations for Internet hackers.

        You may uninstall Netkeys at any time to restore your NETBIOS settings to what they were. Or, you may uninstall Netkeys, and reinstall to disable NETBIOS ports if you desire.

        Website blocking list
        Items can be added to the website blocking list in the following ways:

         Manually, by directly editing the list.
         Selectively, using a special button in the Historian Menu.
         Automatically, using the AutoBlock feature described here.

        Blocking chat sites
        To block chat sites, just enter the name of the chat site in the Websites list.

        Editing the URL, IP, PORT list
        Just click the left mouse key on the name to be edited, and edit using the keyboard. Scroll bars are provided to access any part of the list. Any web sites addresses listed in the Websites list can be blocked.

        If you only want to block a specific website, enter the full URL as "www.something.com." To also allow for subsites within the website such "sub.something.com", then enter the name as "something.com". But for blocking all subsites within a site, only use the name "something".

        The following rules apply when entering websites and IP:PORT addresses:

      • something.com - (Preferred method - omit the www for also blocking subsites.)
      • something - (OK, but will block any URL with "something" in it.)
      • www.ebay.com - (OK, but will not block subsites such search.ebay.com)
      • http://www.another site.com - (NOT OK - don't use the http:// at the front)
      • 123.234.1.122 - (valid IP address)
      • 123.234.1.122:23 - (valid IP address and port)
      • i
      • 127.0.0.1:7777 - (valid - block port 7777 on my PC)
      • 25.44.221.41:1400000000 - (NOT OK - invalid port value > 64k - overrides not allowed on IP addresses.)
      • ebay.com:14000000000 - (override - 10 digit code for site specific security override.)
      • *:80 - (valid (asterisk * = wildcard) - block port 80 on my PC and everywhere else)

      •  

        Port information
        PORT Protocol Purpose
        NETBIOS ports NETBIOS Microsoft file sharing
        134-139, 445 NETBIOS These are not TCP/IP ports.
        Well-known ports, 0-1023 TCP/IP TCP/IP protocol port assignments
        20 FTP FTP data connect
        21 FTP FTP control connect
        23 TELNET TELNET session
        25 SMTP Simple Mail Transfer Protocol (email)
        53 DNS Domain Name Service
        70 Gopher Gopherprotocol
        79 Finger Finger protocol
        80 HTTP Hypertext Transfer Protocol
        88 Kerberos Kerberos authentification protocol
        110 POP3 Post office protocol (email)
        113 IDENT Remote identity service
        119 NNTP Network news transfer protocol
        143 IMAP Email access
        161 SNMP Simple Network Management Protocol
        162 SNMP SNMP traps
        194 IRC Internet Relay Chat
        280 HTTP mgmt HTTP management
        389 LDAP Light-weight Directory Access Protocol
        427 SVRLOC Server Location Protocol
        443 HTTPS Secure HTTP (SSL)
        465 SMTPS Secure emil (SSL)
        535 IIOP Internet Inter-ORB Protocol
        551 CyberCash Secure money transactions
        563 SNEWS Secure news (SSL)
        614 SSL Shell SSL Shell
        636 LDAPS Secure LDAP (SSL)
        989 FTPS Secure FTP data connect (SSL)
        990 FTPS Secure FTP control connect (SSL)
        992 TELNETS Secure TELNET (SSL)
        993 IMAPS Secure IMAP (SSL)
        994 IRCS Secure IRC (SSL)
        995 POP3S Secure POP3 (SSL)
        1080 SOCKS SOCKS Protocol (circuit-level proxy)
        Registered ports, 1024-49151 TCP/IP IANA listed ports
        1024-49151 TCP-IP Listed and registered with IANA.
        Dynamic/private ports, 49152-65535 TCP/IP Available for general use.
        49152-65535 TCP/IP Available to any TCP/IP SOCKETS program.

        Buttons

        Set selected URL/IP (Overrides)
        This is used to set the security setting overrides for the selected website. See the section on Overrides for specific websites earlier in this chapter.

        Allow all URL + [IP : PORT] button
        This button is used to allow access to any website. When it is on, the website block list is disabled.

        Block URL + [IP : PORT] button
        When this button is on, access to the websites shown in the list is disabled. Browser cache files are all cleaned out when a site is blocked to ensure that no text or images are left on the system from suspect sites.

        AutoBlock™ button
        This button is used to automatically add obscene websites to the website blocking list. How does this work? When Netkeys has detected that the current website contains obscene material, the website address is automatically added to the website blocking list. The AutoBlock™ feature uses the Sensitivity threshold on the Word Blocking Menu to determine when a website is obscene, so you have some control.

        The AutoBlock feature is designed so you can only go there once. After that, access is blocked. This feature is fairly sensitive, and will block obscene advertisements that appear in search engines & other websites. If an obscene advertisement is detected, AutoBlock would block any future non-obscene ads from the blocked ad server as well, obscene or not, which is not always what you want! This may be acceptable for some users. Effective use of this feature may require a sensitivity threshold setting in the medium-high range, rather than the low range, to overlook small amounts of obscenity. See the Word Blocking Menu for more on the Sensitivity control.
         

        Figure 8 - Website screen

        7. Word Blocking Menu

        The advanced word filtering capabilities of Netkeys can be used in a variety of ways. 

        1. The Electronic Whiteout ™ feature automatically erases obscene words and phrases from all internet traffic, such as WEB sites, search engines, email, etc. 
        2. The WatchWord™ list allows the user to selectively add words and phrases to the word filtering list.
        3. Only available from Softappco, CleanSearch™ filters search engine results for obscenity or WatchWord™ related text and links, and erases them from the search results, as shown in Figures 8a and 8b.
        4. Any websites containing obscene material or WatchWords™ can be automatically blocked with the CleanBlock™ capabilities.

        NOTES: 
        1. Netkeys™ cannot detect or eliminate subtle innuendoes and suggestive speech, nor can Netkeys™ provide complete protection from web sites containing such material. Netkeys™ attempts to detect obvious obscenity, but may miss some things.

        2. Apparently non-obscene WEB pages may contain obscene words embedded into invisible portions of the WEB page, such as comments by the WEB page author, etc.  This obscenity will never show up on the browser screen, but will be detected by Netkeys, and reported in the Historian menu.

         Figure 9 - Word Blocking screen

        Netkeys™ provides CleanSearch™ to remove obscene results from over 43 leading search engines, leaving only non obscene results.  This is effective for obviously obscene search results, but subtle, suggestive language is not detected.

        Obscene Website content blocking threshold slider
        A sensitivity slider feature is provided to allow some adjustment of the threshold of what is considered obscene speech. A more tolerant setting will suit more tolerant folks, while a more sensitive setting is recommended for others, such as children. Sensitivity is adjustable using the slider bar on the Word Blocking menu.

        Exactly what is obscene speech?
        Well, Netkeys has developed proprietary artificial intelligence software to determine just that. Suffice it to say that if you don't want your kids talking about it, or your co-workers saying it to respectable clients, Netkeys probably takes care of it.

        Of course, this feature can be disabled using the buttons provided on screen.

        WatchWord™ list
        The WatchWord™ list allows you to create a customized list of words and phrases that you wish to block. Each word and phrase in the WatchWord™ list triggers all the word blocking and web site blocking features provided for obscenity. For example, adding "explosives" to the WatchWord™ list allows you to 
        1. Erase all occurrences of the word in email.
        2. Stop the word from going into search engines.
        3. Triggers CleanSearch™ search engine results filtering.
        4. Records all occurrences of the word in the Historian Menu.
        5. Triggers CleanBlock™ to block any websites containing "explosives".

        CleanBlock™ button
        This button is used to detect and disconnect from web sites that contain obscene material or WatchWords™. Note that the sensitivity slider control can be adjusted between Sensitive and Tolerant to determine how much obscenity is needed to trigger a disconnect from obscene web sites. This feature can also be used to disconnect from search engine results that are obviously obscene, if the CleanSearch™ results are not clean enough. Browser cache files are all cleaned out when a site is blocked to ensure that no text or images are left on the system from suspect sites.

        The key to effective use of CleanBlock™ dynamic obscenity detection and blocking is to set the sensitivity threshold to an appropriate level for the user, ranging from sensitive to tolerant, as explained below.

        Note: when a website is disconnected by CleanBlock™, a line will appear in the Historian showing the "disconnected" site name, and your browser may then complain about a network error, as shown in Figures 9b & 9c.


        Figure 9b - Netscape network error display for CleanBlock disconnects.


        Figure 9c - IE network error display for CleanBlock disconnects.

        Allow obscene words button
        This button is used to allow any obscene words and WatchWords? to be sent between your computer to the Internet. It disables obscenity filtering.

        ElectronicWhiteout™ button
        This button is used to cause obscene words and WatchWords™ to be erased from all data sent between your computer and the Internet. Erased words do not appear - they are removed from the data. See Figure 8a for an example of ElectronicWhiteout™.

        ElectronicMasking™ button
        This button is used to cause obscene words and WatchWords™ to be masked (or covered) with the '-' character from all data sent between your computer and the Internet. Masked words appear as dashes (-----) in the data. See Figure 8b for an example of ElectronicMasking™.

        Filter results - CleanSearch™ button
        This button is used to perform filtering of search engine results, as shown in Figures 8a & 8b,  eliminating both text and URL links triggered by obscenity or WatchWords™.

        If more protection is desired than is provided by CleanSearch™, the CleanBlock™ feature can be used to completely disconnect any pages with obscene content, which may be the preferred option for sensitive users. Family Filters are not provided by all search engines, and they can be easily subverted.

         *Note: search engine display formats may change over time, and Netkeys™ will be updated to keep up with the changes. Contact support@softappco.com if you suspect a search engine format has changed adversely affecting Netkeys CleanBlock™.

        The following search engines are filtered at the time of this writing.

        - lycos 
        - altavista 
        - yahoo 
        - directhit 
        - infoseek 
        - looksmart 
        - netscape 
        - msn 
        - about.com 
        - northernlight 
        - snap 
        - webcrawler 
        - multicrawl 
        - whatuseek 
        - search4info 
        - yeehaa 
        - yupi 
        - alltheweb 
        - fast (dell) 
        - infind 
        - aol 
        - yep 
        - askjeeves 
        - go 
        - dmoz 
        - goto 
        - hotbot 
        - search.com 
        - botspot 
        - search.internet.com 
        - beaucoup 
        - metacrawler 
        - go2net 
        - cyber411.com 
        - c4.com
        - google
        - euroseek
        - magellan
        * Note: most other search engines not listed above are also filtered, but not as well. Some filtering is also provided for: stpt.com , excite, ioport, highway61.com, kanoodle, bizrocket.net)


        Figure 8a - search engine result filtering with ElectronicWhiteout™.


        Figure 8b - search engine result filtering with ElectronicMasking™.
         
         

        8. Historian Menu

        Internet history logs from your browser are not secure - anybody can delete the information in the logs to cover their tracks, or just to clean out the old history log files to make more disk space. Netkeys keeps a secure log of Internet activity, which is usually big enough for several weeks activity. The log automatically keeps itself from growing very large.


        Figure 8a - Historian display icons and meanings

        The Historian Menu shows all Internet activity at a glance, including web site visits, incoming email, outgoing email, blocked email, obscene words blocked, personal information blocked, web sites blocked, websites disconnected by CleanBlock™, files that were downloaded from the Internet (such as games, etc.), as well as all Netkeys administrative use. A different icon appears in front of each item type in the history list, as shown in Figures 10 & 11. This is useful for quickly scanning the list for certain types of items. A time stamp is shown for each item in the list, showing when the item occurred.

        Note on Historian Display item sequence:
        Due to the nature of the Internet, a typical web page may also access many other web sites multiple times to get images, news, stock prices, advertisements, etc. The Historian attempts to filter such duplicate entries. which could be misinterpreted in the Historian display. For example, if you go back and forth between websites, it will be filtered as a recent duplicate entry.

        Note: Double-click on a website address in the historian display to go there.

        Sometimes, obscene words will be blocked before the web site is displayed. When this happens, the Historian will show that the words were blocked, followed by the web site name. In other cases, the Historian may display the web site name first, followed by indication that words were blocked.

        Hopefully, the History List will be used often to observe Internet activity on the computer, allowing appropriate management of the Internet.

        Note: the obscene words detected are listed at the end of each line ( !) reported in the Historian, so just scroll the window to view the words.

        Note on Internet Obscenity
        Some apparently non-obscene WEB pages may contain obscene words embedded into invisible portions of the WEB page, such as comments by the WEB page author, etc.  This obscenity will never show up on the browser screen, but will be detected by Netkeys, and reported in the Historian menu.

        The following buttons are provided on the Historian menu, described as follows.

        Filter Options button
        This button calls a popup which provides choices to filter the Historian display for keywords, or specific Internet activity like email only. You may use this menu to find and display anything in the Historian display.

        Save to file button
        This button causes the Historian activity log to be appended to a file called:

           /Program Files/Software Appliance Company/InternetSecuritySystem/histbak.txt

        Since this is an append operation, any data already in the file will be preserved, and the current Historian data will be added (appended) to the end of the file, which can be viewed using any text editor or Microsoft WORD, etc.

        Add website to list button
        This button is used to add websites automatically to the Websites Menu list. To use, select a website item from the Historian list by clicking the mouse on it. Then press the button to add it to the Website Menu list.

        Add email name to list button
        This button is used to add email addresses automatically to the Email Menu list. To use, select a website item from the Historian list by clicking the mouse on it. Then press the button to add it to the Email menu blocking list.

        Refresh List button
        This button can be pressed to cause the history list to be updated. Use this to catch anything that might have occurred after the History List was displayed in the menu.
         


        Figure 10 - Historian list display #1
         


        Figure 11 - Historian list display #2

        9. Privacy Menu

        The Privacy features allow specific personal information to be blocked, such as credit card numbers, phone numbers, addresses, etc. Using these features, personal information is protected from leaving the computer.

        However, for users who routinely purchase items direct from the Internet, this feature should be used carefully, since it may interfere with on-line purchasing where personal information is required. Of course, privacy features can be disabled before making a purchase, and then enabled when finished.

        You may also block popup Ad windows using the Block Ads button.

        Program Password
        The Program password is used to allow Internet programs to run when InternetPasswordProtection™ is enabled as described in the Admin Menu. You might want to give this password to someone *If* you want them to use the Internet on your PC. The Historian Menu records all attempts to use the password, both correct and incorrect.

        Admin Password
        The Admin password has two purposes: 1. for accessing and changing settings and 2. for running Internet programs when InternetPasswordProtection™ is enabled as described in the Admin Menu. ***Write the secret password down somewhere - you probably will be glad you did.*** Try using something meaningful to you, that you already know, like your ATM pin number, etc.

        It is a good idea to change the password if you think someone else knows it. However, anytime the password is used, it is recorded in the Historian Menu list as an Admin Login, so it is possible to see if anyone else knows the password, which means it's time to change it.

        Three buttons are provided:

        InternetCloaking™ - Hide my Internet trail button
        InternetCloaking™ cloaks nonessential parts of the protocol stream which may contain personal or confidential information regarding your computer (Windows software & browser info), your surfing history (previous or referring site), and prevents your email address and other confidential information from being sent to websites by the browser without your knowledge. Note: some web sites don't like this feature, and will complain with a wide variety of error messages!

        Personal information can be revealed by your browser under certain circumstances. If you have provided any information to a website, such as credit card numbers, phone numbers, your email address, etc., this information may be inserted by the browser and the website server into the invisible protocol stream between your computer and the website. Why? The information is used to identify you to the website. Why is this a problem? Because anyone eavesdropping on the Internet connection will see the information, and also some of the identifying information may be sent along to the next website you visit (although the next website probably will not even look at or care about the information). 

        Some websites can get even more information about you by correlating your name, address, phone number, etc. with other on-line information databases containing consumer information, public records, etc. Unless the transaction between your PC and the website is encrypted, and you are certain you are dealing with a trustworthy website, it is safe to assume that the information is not secure. Sometimes "cookies" are also used to contain this information. 

        Cookie scrambler button
        Use this button to disable malicous code hidden in cookies. Note: some web sites don't like this feature, and will complain with a wide variety of error messages! Your browser can be set up to completely disable cookies if you desire, but then some websites will not work for you if they require cookies.

        Private Information - Privacy on button
        Use this button to make sure that no information in the Private Information items edit list is sent from your computer to the Internet.

        Editing the Private Information items list
        Just click the left mouse key on the item to be edited, and edit using the keyboard. Scroll bars are provided to access any part of the list. Private information is case insensitive. Upper case & lower case mean the same thing.

        The following rules apply when entering Private Information:
        1. Enter numeric personal information in any format you may expect to find it.
        2. Phone number & credit card numbers particularly can be entered multiple ways. 
        3. All information is translated to lower-case for comparison purposes. 
        4. Private information only checks for characters [a to z] and [0 to 9].
        5. Spaces are significant in phone numbers, credit card numbers, etc.

        Examples of entering possible VISA & phone number combinations:
        4893 3994 5995 9599 (VISA #)
        498399459959599 (SAME VISA #)
        1 509 291 2344 (phone number)
        15092912344 (same phone number again)
        5092912344 (phone number again)
        291 2344 (phone number again)
        2912344 (phone number again)
         


        Figure 12 - Personal Privacy screen
         

        10. Admin Menu & PersonalFirewall™

        The Admin Menu as shown in Figure 14 contains the following features:

        Master on/off buttons
        Netkeys can be turned off (i.e. it does not look at or alter any Internet information). When it is off, the tray icon will be red lined, as shown in Figure 13.


        Figure 13 - "master off" indication drawn on tray icon

        Popup button
        A popup menu can optionally be displayed with specific details whenever Netkeys blocks something, as shown in Figure 14. Press the Popup button if you want Netkeys to operate with no pop-up warning screen.

        Sound on
        Netkeys can operate quietly, or play sound effects whenever items are detected or blocked. 

        Empty Browser Files at startup (cache & cookies) buttons
        - Empty AOL Browser Files button
        - Empty Netscape Browser Files button
        - Empty Microsoft IE Browser Files button

        When your browser runs, it saves up recently used web pages in a set of "cache" files. If you go back later to the website, the files in the "cache" will probably be used instead of going out to the Internet. Also, when websites send "cookie" information to your computer, the information is stored in files. This feature automatically deletes these files when your computer starts. 

        PersonalFirewall™ features
        A PC is like a house built of software. It is possible to "break-in" or "break-out" of the house if you know how, regardless of whether or not a security system is installed. Conversely, it is impossible for any firewall product to guarantee that your PC is safe from all break-in and break-out attempts.

        However, it is possible to secure a normal PC from blatant attacks if you have a firewall installed and configured properly. "Break-out" attacks may come from trojan horse programs running on your PC that came from a malicious web page, email attachment, or some other file on a disk. "Break-in" attacks may come from any computer on the Internet.

        The personal firewall has four components:

        1) InternetSecurityScan™ - provides information about low-level Internet activity.
        2) DataWall™ file security - stops Internet file transfers to/from your PC.
        3) Incoming firewall section - stops remote computers from connecting to your PC.
        4) Outgoing firewall section - stops your PC from talking to remote computers.

        Each part of the firewall is controlled by a separate button.


         Figure 14 - Admin menu display 

        InternetSecurityScan™ button
        This feature provides warnings, information alerts and controls related to Internet security issues such as trojan horse programs (i.e. computer viruses). Trojan horse programs can be installed on your PC without your knowledge from a variety of sources, including a CDROM, floppy disk, email, or a web site. Once installed, you may never realize that they are there! Also, this feature will block use of the non-standard "virtmach" script language. 

        InternetSecurityScan™ looks for threats including TELNET, FTP (File Transfer Protocol) activities, hidden file transfers to or from your computer, and low level TCP/IP port connections. These information alerts appear in the Historian Menu as shown below. 

        DataWall™ File Security button
        Only available from Softappco, this features stops files from leaving your computer via POP3 email attachments, as Web-email attachments, or as FTP files. It also stops files from being downloaded to your computer, such as games and FTP files. It also stop files from leaving via invisible programs such as Javascript, etc.

        Block unsolicited connections button
        This controls the incoming side of the firewall, and stops an unsolicited remote computer from connecting to your computer (i.e. "break-in");

        User Profiles Button
        By default, all Windows login users share the global defaults. To set the global defaults, use this button, and then press the "Save current settings as global settings" button on the User Profiles popup. See also Multiple users, Passwords and serial #'s.

        Approved Internet Programs Button (Overrides)
        InternetPasswordProtection causes Internet programs to block until the user enters the Internet password or the Administrator password. You can override InternetPasswordProtection by adding specific programs to the "approved" list by pressing this button, and adding or subtracting programs from the list. You can also override global settings for particular websites using the Overrides feature found in the
        URL, IP, PORT and Security Overrides menu.

        InternetPasswordProtection™ button
        This controls the outgoing side of the firewall, and stops programs on your PC from connecting to remote computers without a password. Either the Program Password or the Admin Password must be used to override, as described in the Personal Privacy Menu

        You can override InternetPasswordProtection using the Approved Internet Programs list on the Admin tab.

        InternetPasswordProtection™ is the ultimate protection against "Spyware" and Trojan Horse Programs, since it displays the full pathname to the program on your disk, allowing you to approve or disapprove (with extreme prejudice) the Internet access. 

        The Historian Menu records all attempts to run Internet programs using a password, both correct and incorrect. The password screen is shown below.


         Figure 14 - Internet program password protection screen

        What do trojan horse viruses do? They allow remote-control access to your PC, or just cause malicious damage to files on your PC. This could be happening to your PC today, and you might never know it. The Historian Menu should be checked often to look for clues if you suspect your PC is infected. 

        For example, following is a list of the common activities of trojan horse programs. Since the trojan horse programs exploit very similar PC capabilities, the PersonalFirewall can detect and stop obscure and future trojan horse programs that rely on similar tactics. Note that particular trojan horse programs may only implement a few of the items listed below. 

        Common features of Trojan horse programs.
        - Read your password files 
        - Log all keystrokes on your PC & send the info to another PC 
        - Periodically email or FTP a file from your PC to another PC 
        - Listen through the microphone on your PC and send the audio to another PC 
        - Delete any file on your PC under remote control 
        - Run any program on your PC under remote control 

        The PersonalFirewall™ currently provides effective detection and control of the following known trojan horse programs (as well as any others that exploit similar capabilities): 

        Aandromeda 
        Acid Shivers 
        Antigen 
        Attack FTP 
        Back Orifice 1.20 
        Back Contruction 
        BigGlick 1.0 
        Bla 2.0 
        Canason 1 
        Deep Back Orifice 0.6.3136 alpha 
        DeepThroat 1.0 
        DeepThroat 2.0 
        Delta Source 0.5 
        Devil 1.3 
        Doly Trojan 1.1 
        E-MAIL Password Sender 1.03 
        E-MAIL Password Sender 1.04 
        E-MAIL Password Sender 1.06 
        E-MAIL Password Sender 1.07 
        Evil FTP 
        Executer 1 
        Executer 2 
        Firehotcker BackDoorz 1.03 
        Fore 1.0 beta 1 
        Fore 1.0 beta 2 
        FTP99cmp 
        Gate Crasher 1.0 
        Gate Crasher 1.1 
        Gate Crasher 1.2 
        GirlFriend 1.0 beta 
        GirlFriend 1.3 
        GirlFriend 1.35 
        Hack '99 Keylogger 
        Hack office Armageddon 
        Hack City Ripper Pro 
        HAEbU COCEDA 2.12 
        HAEbU COCEDA 2.14 
        HAEbU COCEDA 2.15 
        HAEbU COCEDA 2.18 
        HAEbU COCEDA 2.19 
        HAEbU COCEDA 2.21 
        HVL RAT 5.3.0 
        icKiLLeR 0.9 
        ICQ Trogen A.5 
        Invisible FTP 
        iNi-Killer 1.2 
        iNi-Killer 3.0 pro 
        iNi-Killer 3.2 pro 
        iNi-Killer 4.0 pro 
        JammerKillah 
        Kuang2 veryLite 0.17a 
        Kuang2 pSender 0.20 
        Kuang2 pSender Full 0.30 
        Masters' Paradise 8 beta 
        Masters' Paradise 9.2 beta 
        Masters' Paradise 9.5 beta 
        Masters' Paradise 9.7 beta 
        Masters' Paradise 9.8 beta 
        Masters' Paradise 9.8 
        Masters' Paradise 9.9c beta 
        Masters' Paradise 9.9d beta 
        Millenium 1.0 
        NetBus 1.20 
        NetBus 1.53 
        NetBus 1.60 
        NetBus 1.70 
        NetBus 2.0 beta 
        NetBus Pro 2.0 
        NetMonitor 1.0 
        Netsphere 
        NetSpy 6.98 
        NetSpy 1.01 
        NetSpy 1.06 
        NetSpy 1.10 
        NetSpy 1.12 
        phAse zero 1.0 beta 
        Phineas Phucker 
        Portal Of Doom 3 
        Priority Beta 
        Progenic 1.0 beta 
        Progenic 1.0 beta 2 
        Progenic 
        Prosiak 0.47 
        Psyber Stream Server 
        Remote Grab 1.0d 
        Robo-HacK 1.2 
        Remote Windows Shutdown 0.02
        Satanz BackDoor 1.0 
        Schwindler 
        Senna spy 
        Sesam V.102 
        Sivka-Burka 0.2b 
        Sockets de Troie 2.3 
        ShockRave 
        Shtirlitz 
        Silencer 1.0.0 
        SpySender 0.65 beta 
        Stealth 2 
        Stealth 2.9 
        Stealth Spy 3 beta 
        Striker 1.0 
        SubSeven 1.0 
        SubSeven 1.1 
        SubSeven 1.2
        SubSeven 1.3 
        SubSeven 1.4 
        SubSeven 1.5 
        Tapiras 
        TeleCommando 1.5.4 
        Terminator 
        The Invasort 1.0 
        The Spy 
        TN 
        The Trojan Cow 1 
        The Unexplained 1.0 
        Tiny Telnet Server 
        Ugly FTP 
        Ultor's Trojan 
        Voice 
        VooDoo Doll 
        Web EX 1.2 
        Web EX 1.3 
        Web EX 1.4 
        WinCrash 
        WinCrash 1.03 
        WinPC 
        Winpy 4.1 

        Note: Internet security issues are constantly being identified, similar to computer viruses. Netkeys™ will be enhanced in the future as new security issues are identified.
         

        11. Virus menu - InternetBombDiffusion™ and EmailBombDiffusion™

        Bombs and Exploits
        InternetBombDiffusion™ and EmailBombDiffusion™ technology are only available from Software Appliance Company. These new technologies are designed to enhance your security and control of internet activity. 

        Firewalls like a water faucet
        Virus scanning like a bug killer
        Bomb diffusion like a water filter

        Here's what bomb diffusion can do for you:

        1. Diffuse email attachments based upon file type or MIME type.
        -- Diffusion eliminates potentially dangerous scripted code in email.
        -- Diffusion can disable links in email that could lead to danger.
        -- Diffusion stops the email program from executing specified files.
        -- Diffused attachments can be saved, and then opened if you like.

        2. Diffuse web page files based upon file type or MIME type.
        -- Diffusion eliminates potentially dangerous scripted code on web pages.
        -- Diffusion can disable receipt of any file or MIME type from web pages.
        -- Diffusion stops the browser from executing specified files and MIMES.

        File and MIME type lists
        There are two (2) separate lists for file and MIME data types, one list for email and one for web pages. You can customize the lists. Place MIME data types first in the list, before file names, as shown in the lists that install with the product.

        Use lower case when creating the list. Wildcards are only allowed for the name of the file (not the extension), and for the MIME type extension. For example:

        application/*
        message/external-body
        *.gif
        *.cil

        EmailBombDiffusion(tm)
        Email can contain viruses in both the email body, and in the attachment files. If the email body contains a virus, the virus will be activated when you read the email. If the email attachment file contains a virus, the virus will be executed when you open the attachment file. Never open email attachment files unless you are positive they are OK.

        BombDiffusion provides separate controls for both the email body and the email attachment files. It should be 100% effective in stopping viruses, unless you promiscuously open untrusted email attachments.

        Bomb diffusion works by disabling invisible code in email which could contain a virus. Email programs blindly execute the code in the email body when you read the email. BombDiffusion disables the code, so you are safe. BombDiffusion will also disable advertisements in the email body which otherwise pull in images and text from the Internet which can be used to track when you opened the email. 

        Opening email attachment files is not safe because viruses can be attached to the attachment file, and the virus will execute when the attachment is opened. BombDiffusion allows you to disable any or all email attachments, so the email program will not execute the virus. The diffused attachment files are renamed to .txt files, which you can save and rename later if you want to open them.

        Email Bomb diffusion is provided for three levels:

        Normal: (*recommended)
        This diffuses all executable code (scripts) in the email to non executable code. No scripting is allowed in the email, and no MIME application files can be automatically loaded and executed. Email body is safe to read. Also, all links in the email are disabled, so this means that email web bugs are disabled, and email tracking features that rely on the links are also defeated.

        High 
        This diffusion is identical to Normal, except that all listed email attachment files and MIMES are diffused according to the types of attachments you specify in the list. The specified email attachment files are renamed to .txt files, so the email program will not attempt to execute them.

        Extreme
        This diffusion is identical to Normal, except that ALL email attachment files are diffused.

        InternetBombDiffusion(tm)
        Web pages can contain viruses. Just by visiting the website, your PC can be subverted. Either malicious scripted code can be contained in the web page, or the web page may have a file embedded into it which contains a virus. By vising the web page, the file will be sent to your browser without your knowledge, and the browser will automatically try to open it. Files like Microsoft Word documents can be embedded into web pages, and these can contains macro viruses. 

        Internet BombDiffusion provides three levels of protection for web pages:

        Normal: (*recommended)
        This diffuses little used and highly dangerous web page code (scripts) such as Virtmach code, Activex, VBscript, and Microsoft Shell Scripting languages. Normal scripting

        High 
        This diffusion is identical to Normal, except that any files or MIME data types will be blocked from coming into your PC. With this feature, you can also block any download files such as games (*.exe, *.zip)

        Extreme
        This diffusion is identical to High, except that ALL script languages are also blocked. This is an extreme measure, since it also disables harmless scripted advertisements and other web page features.

        Bombs defined
        An Internet bomb is a deliberately designed and programmed element which performs activity on your PC without your knowledge or consent, triggered by simply visiting a web page, by clicking the mouse on a certain element of the web page, by reading an email, or opening an email attachment. Bombs rely on the email program or browser to "automatically do something" when the bomb is incoming - and it's all based upon file type and MIME type. Some types are known dangerous, others are on the way. 

        Firewalls vs. bomb diffusion
        Common PC firewalls deal at the lowest TCP and IP protocol layers. These firewalls are primarily targeted at the following threats:

        1. Monitoring and guarding TCP/IP port access.
        2. Blocking hostile port access from outside the PC.
        3. Stealth technology (hiding TCP/IP ports from outsiders)
        4. Blocking trojan horse programs from outbound TCP/IP access. 

        Basically, firewalls are like the "on/off" valve, which control access and data flow, like a water faucet. BombDiffusion technology is like a "water purification system" which can filter out potentially harmful particles from the data stream. 

        See the Admin menu for further information about the Netkeys™ PersonalFirewall.

        Virus scanning vs. bomb diffusion
        Virus scanning falls into two categories:

        1. STATIC - look for matches with a static virus signature file of known viruses.
        2. DYNAMIC - look for potential viruses on the fly by analysis. 

        Given these definitions, then BombDiffusion™ technology is similar to DYNAMIC virus scanning, except that it allows the user to have more control over the filtering process, and looks for different threats. Also, BombDiffusion™ technology "preserves" the diffused code so you can look at it yourself. Virus scanning programs are basically fully automatic, and just fix things for you. 

        The weakness in virus scanning programs is that they may undershoot and miss detecting new viruses. The weakness with bomb diffusion is that it may overshoot and diffuse perfectly harmless code and files. However, the choice is yours. Both approaches can work together, and neither approach is perfect. 

        Internet bombs in web pages and email
        Internet and Email bombs are like land mines - they are well designed, difficult to detect with certainty, and can have devastating results. The bombs can have security, privacy, and PC control consequences. Bombs can be designed like explosives, or like poisons, or like spies. 

        For the purpose of this discussion, there are two key types of exploits:

        Security exploits - security exploits use obvious documented features of a protocol in deliberate ways to gain a predicable result. The attacker simply knows how the protocols work, and can gain access to your PC, without your knowledge or permission. A good example of a security exploit is unauthorized use of the Microsoft File Sharing ports (NETBIOS ports 135-139), which are left wide open to the Internet by design, and allow anyone who knows your IP address to gain complete remote control of your PC from anywhere in the world. 

        Flaw exploits - where the attacker exploits a flaw or unintended side effect present in the design of the software to gain access to your PC. For example, the TCP protocol stack can be exploited in some cases by sending appropriate command sequences to it. Another general example is the stack overflow exploit, where a specific data field in a file can be loaded with executable machine code which is made to overflow onto the program stack, which the CPU then executes like any other program - totally unknown to the PC user. Cookies can also be loaded with executable code, and the executed on your PC. 

        BombDiffusion controls
        Figure 15 shows the available controls for BombDiffusion technology. 


        Figure 15 - BombDiffusion technology for email and web pages.

        MIME types Why are MIME types an issue? Because MIME data files can trigger programs to be executed on your PC, and contain malicious programs themselves.

        The basic MIME types are:

        application - data is to be fed into a specified program
        audio - data is to be fed into specified audio program
        image - data is to be interpreted as a formatted image
        message - information message in specified format
        model - data model in specified format (graphics, etc.)
        multipart - message divisions and formatting
        text - text data in specified format
        video - video data in specified format

        Note that when you click on a data file in Windows, the data file is often fed into the correct program for you. This is handled via a built in Microsoft Windows file type manager, which also works directly with email attachments and MIME files on web pages as if they were on your PC. 

        Most people ignore the little gray warning boxes that pop up when potentially harmful Internet files come into your PC. For example, Microsoft WORD (.doc), Powerpoint (.ppt), GIF images (.gif),and CIL files (.cil) can contain malicious code. You can receive files as email attachments OR transparently from a web page. The list of possible exploits from MIME data is endless and growing, if that is possible!

        One of the most common types of virus attack is via email attachments. If the email attachment is an .exe file (executable program file) or .zip file (compressed file), it could contain a virus, and should not be opened unless it is from a trusted source. Other types of email attachment files can also contain viruses - the list is endless. 

        Another attack comes by following innocent looking links in an email or on a web page. By following these links (clicking on them), this can trigger "malicious" cross-scripting, causing a program or script on an unknown or untrusted website to be executed on your computer without your knowledge. 

        In general, the risk of malicious cross-scripting activity can be drastically reduced by disabling scripting in your browser. However, this has the undesirable side effect of disabling the vast majority of useful and cool features normally provided by scripting. 

        The "Security Zones" provided by some browsers can be easily subverted by a malicious technique known as "cross scripting", where scripts or programs are executed from an untrusted website outside of the security zone of the current website! InternetBombDiffusion™ provides warnings for this activity. 

        Note: if you have downloaded and installed any browser plug-ins, they may trigger security alerts in the Historian Menu when they run. However, browser plug-ins, if trustworthy, are not a security concern. 

        You may not need InternetBombDiffusion™ at all if you visit trusted websites.

        Limitations and expectations
        Netkeys™ BombDiffusion™ technology allows you to recognize and diffuse potential bombs. The word to note is potential. Since new bombs are being found all the time, and the creators of these bombs are always one step ahead of everybody else, BombDiffusion™ technology allows you to get ahead of them in some respects. 

        While virus scanning programs may undershoot and miss detecting bombs, BombDiffusion™ may overshoot and diffuse perfectly harmless code and files. 

        However, the choice is yours. Both approaches can work together, and neither approach is perfect. Virus scanning is like matching mug shots against people, and BombDiffusion™ is similar to passing through a customs inspection. 

        How BombDiffusion™ works
        Think of a bomb squad in the military or police - they locate possible bombs, and then attempt to disable or diffuse the bomb. That is exactly how Netkeys™ BombDiffusion technology works. 

        For files, the MIME type is altered so that the incoming MIME data is treated as a pure text only file. This allows you to look at the data using your browser's "view page source" capability. If you are OK with the data, you can disable diffusion, and let it fly. 

        For other suspicious code, like scripted links, heavily scripted web pages, the scripting and external linking is disabled, so the code does not execute. 


        Figure 16 - BombDiffusion messages in the Historian display.

        How to use BombDiffusion™ controls
        The Netkeys™ Bombs configuration tab allows you to enter specific types of MIME data types and files into separate lists for email and web pages, and select whether or not you want warnings or diffusion to take place when potential bombs are detected. 

        One way to use BombDiffusion is to visit a web page with diffusion enabled, and then see what happens. If diffusion disables legitimate code, you will notice some error message when you try to click something, or visit a page. Then it's up to you to "view page source" and if you accept, turn off BombDiffusion and reload he web page and keep going. 

        MIME Diffusion simply stops automatic launching of applications by the browser or email program. The filename.ext remains the same.
        File *.ext diffusion changes the file name to .Zxx, where xx is what the file extension was. The file must be renamed appropriately to view as the intended file type. 

        Table 12 - Major MIME types (others are invented all the time...)
        MIME type subtype (Commonly exploited subtypes marked with * )
        text/*
        plain
        richtext
        enriched
        tab-separated-values
        html
        sgml
        vnd.latex-z
        vnd.fmi.flexstor
        uri-list
        vnd.abc
        rfc822-headers
        vnd.in3d.3dml
        prs.lines.tag
        vnd.in3d.spot
        css
        xml
        rtf
        directory
        calendar
        vnd.wap.wml
        vnd.wap.wmlscript
        vnd.motorola.reflex
        vnd.fly
        vnd.wap.sl
        vnd.wap.si
        t140
        vnd.ms-mediapackage
        vnd.IPTC.NewsML
        vnd.IPTC.NITF
        vnd.curl
        vnd.DMClientScript
        parityfec
        multipart/*
        mixed
        alternative
        digest
        parallel
        appledouble
        header-set
        form-data
        related
        report
        voice-message
        signed
        encrypted
        byteranges
        message/*
        rfc822
        partial
        external-body*
        news
        http
        delivery-status
        disposition-notification
        s-http
        application/*
        octet-stream*
        postscript
        oda
        atomicmail
        andrew-inset
        slate
        wita
        dec-dx
        dca-rft
        activemessage
        rtf
        applefile
        mac-binhex40
        news-message-id
        news-transmission
        wordperfect5.1
        pdf
        zip
        macwriteii
        msword*
        remote-printing
        mathematica
        cybercash
        commonground
        iges
        riscos
        eshop
        x400-bp
        sgml
        cals-1840
        pgp-encrypted
        pgp-signature
        pgp-keys
        vnd.framemaker
        vnd.mif
        vnd.ms-excel
        vnd.ms-powerpoint*
        vnd.ms-project*
        vnd.ms-works*
        vnd.ms-tnef*
        vnd.svd
        vnd.music-niff
        vnd.ms-artgalry
        vnd.truedoc
        vnd.koan
        vnd.street-stream
        vnd.fdf
        set-payment-initiation
        set-payment
        set-registration-initiation
        set-registration
        vnd.seemail
        vnd.businessobjects
        vnd.meridian-slingshot
        vnd.xara
        sgml-open-catalog
        vnd.rapid
        vnd.enliven
        vnd.japannet-registration-wakeup
        vnd.japannet-verification-wakeup
        vnd.japannet-payment-wakeup
        vnd.japannet-directory-service
        vnd.intertrust.digibox
        vnd.intertrust.nncp
        prs.alvestrand.titrax-sheet
        vnd.noblenet-web
        vnd.noblenet-sealer
        vnd.noblenet-directory
        prs.nprend
        vnd.webturbo
        hyperstudio
        vnd.shana.informed.formtemplate
        vnd.shana.informed.formdata
        vnd.shana.informed.package
        vnd.shana.informed.interchange
        vnd.commerce_battelle
        vnd.osa.netdeploy
        vnd.ibm.MiniPay
        vnd.japannet-jpnstore-wakeup
        vnd.japannet-setstore-wakeup
        vnd.japannet-verification
        vnd.japannet-registration
        vnd.hp-HPGL
        vnd.hp-PCL
        vnd.hp-PCLXL
        vnd.musician
        vnd.FloGraphIt
        vnd.intercon.formnet
        vemmi
        vnd.ms-asf
        vnd.ecdis-update
        vnd.powerbuilder6
        vnd.powerbuilder6-s
        vnd.lotus-wordpro
        vnd.lotus-approach
        vnd.lotus-1-2-3
        vnd.lotus-organizer
        vnd.lotus-screencam
        vnd.lotus-freelance
        vnd.fujitsu.oasys
        vnd.fujitsu.oasys2
        vnd.swiftview-ics
        vnd.dna
        prs.cww
        vnd.wt.stf
        vnd.dxr
        vnd.mitsubishi.misty-guard.trustweb
        vnd.ibm.modcap
        vnd.acucobol
        vnd.fujitsu.oasys3
        marc
        vnd.fujitsu.oasysprs
        vnd.fujitsu.oasysgp
        vnd.visio
        vnd.netfpx
        vnd.audiograph
        vnd.epson.salt
        vnd.3M.Post-it-Notes
        vnd.novadigm.EDX
        vnd.novadigm.EXT
        vnd.novadigm.EDM
        vnd.claymore
        vnd.comsocaller
        pkcs7-mime
        pkcs7-signature
        pkcs10
        vnd.yellowriver-custom-menu
        vnd.ecowin.chart
        vnd.ecowin.series
        vnd.ecowin.filerequest
        vnd.ecowin.fileupdate
        vnd.ecowin.seriesrequest
        vnd.ecowin.seriesupdate
        EDIFACT
        EDI-X12
        EDI-Consent
        vnd.wrq-hp3000-labelled
        vnd.minisoft-hp3000-save
        vnd.ffsns
        vnd.hp-hps
        vnd.fujixerox.docuworks
        xml
        vnd.anser-web-funds-transfer-initiation
        vnd.anser-web-certificate-issue-initiation
        vnd.is-xpr
        vnd.intu.qbo
        vnd.publishare-delta-tree
        vnd.cybank
        batch-SMTP
        vnd.uplanet.alert
        vnd.uplanet.cacheop
        vnd.uplanet.list
        vnd.uplanet.listcmd
        vnd.uplanet.channel
        vnd.uplanet.bearer-choice
        vnd.uplanet.signal
        vnd.uplanet.alert-wbxml
        vnd.uplanet.cacheop-wbxml
        vnd.uplanet.list-wbxml
        vnd.uplanet.listcmd-wbxml
        vnd.uplanet.channel-wbxml
        vnd.uplanet.bearer-choice-wbxml
        vnd.epson.quickanime
        vnd.commonspace
        vnd.fut-misnet
        vnd.xfdl
        vnd.intu.qfx
        vnd.epson.ssf
        vnd.epson.msf
        vnd.powerbuilder7
        vnd.powerbuilder7-s
        vnd.lotus-notes
        pkixcmp
        vnd.wap.wmlc
        vnd.wap.wmlscriptc
        vnd.motorola.flexsuite
        vnd.wap.wbxml
        vnd.motorola.flexsuite.wem
        vnd.motorola.flexsuite.kmr
        vnd.motorola.flexsuite.adsi
        vnd.motorola.flexsuite.fis
        vnd.motorola.flexsuite.gotap
        vnd.motorola.flexsuite.ttc
        vnd.ufdl
        vnd.accpac.simply.imp
        vnd.accpac.simply.aso
        vnd.vcx
        ipp
        ocsp-request
        ocsp-response
        vnd.previewsystems.box
        vnd.mediastation.cdkey
        vnd.pg.format
        vnd.pg.osasli
        vnd.hp-hpid
        pkix-cert
        pkix-crl
        vnd.Mobius.TXF
        vnd.Mobius.PLC
        vnd.Mobius.DIS
        vnd.Mobius.DAF
        vnd.Mobius.MSL
        vnd.cups-raster
        vnd.cups-postscript
        vnd.cups-raw
        index
        index.cmd
        index.response
        index.obj
        index.vnd
        vnd.triscape.mxs
        vnd.powerbuilder75
        vnd.powerbuilder75-s
        vnd.dpgraph
        http
        sdp
        vnd.eudora.data
        vnd.fujixerox.docuworks.binder
        vnd.vectorworks
        vnd.grafeq
        vnd.bmi
        vnd.ericsson.quickcall
        vnd.hzn-3d-crossword
        vnd.wap.slc
        vnd.wap.sic
        vnd.groove-injector
        vnd.fujixerox.ddd
        vnd.groove-account
        vnd.groove-identity-message
        vnd.groove-tool-message
        vnd.groove-tool-template
        vnd.groove-vcard
        vnd.ctc-posml
        vnd.canon-lips
        vnd.canon-cpdl
        vnd.trueapp
        vnd.s3sms
        iotp
        vnd.mcd
        vnd.httphone
        vnd.informix-visionary
        vnd.msign
        vnd.ms-lrm
        vnd.contact.cmsg
        vnd.epson.esf
        whoispp-query
        whoispp-response
        vnd.mozilla.xul+xml
        parityfec
        vnd.palm
        vnd.fsc.weblaunch
        vnd.tve-trigger
        dvcs
        sieve
        vnd.vividence.scriptfile
        vnd.hhe.lesson-player
        beep+xml
        font-tdpfr
        vnd.mseq
        vnd.aether.imp
        vnd.Mobius.MQY
        vnd.Mobius.MBK
        vnd.vidsoft.vidconference
        vnd.ibm.afplinedata
        image/*
        jpeg
        gif*
        ief
        g3fax
        tiff
        cgm
        naplps
        vnd.dwg
        vnd.svf
        vnd.dxf
        png
        vnd.fpx
        vnd.net-fpx
        vnd.xiff
        prs.btif
        vnd.fastbidsheet
        vnd.wap.wbmp
        prs.pti
        vnd.cns.inf2
        vnd.mix
        vnd.fujixerox.edmics-rlc
        vnd.fujixerox.edmics-mmr
        vnd.fst
        audio/*
        basic
        32kadpcm
        vnd.qcelp
        vnd.digital-winds
        vnd.lucent.voice
        vnd.octel.sbc
        vnd.rhetorex.32kadpcm
        vnd.vmx.cvsd
        vnd.nortel.vbk
        vnd.cns.anp1
        vnd.cns.inf1
        L16
        vnd.everad.plj
        telephone-event
        tone
        prs.sid
        vnd.nuera.ecelp4800
        vnd.nuera.ecelp7470
        mpeg
        parityfec
        MP4A-LATM
        vnd.nuera.ecelp9600
        G.722.1
        video/*
        mpeg
        quicktime
        vnd.vivo
        vnd.motorola.video
        vnd.motorola.videop
        vnd.fvt
        pointer
        parityfec
        vnd.mpegurl
        MP4V-ES
        vnd.nokia.interleaved-multimedia
        model/*
        iges
        vrml
        mesh
        vnd.dwf
        vnd.gtw
        vnd.flatland.3dml
        vnd.vtu
        vnd.mts
        vnd.gdl
        vnd.gs-gdl
        vnd.parasolid.transmit.text
        vnd.parasolid.transmit.binary

         

        12. Customer support - problems & questions

        Software Appliance Company would like to hear from you. If you have any problems, questions, comments, or product ideas, you may send them to: support@softappco.com.

        You may also contact us by fax at (360)299-4660. 

        Most of the time, if you just send a simple email question to support@softappco.com, you will receive a simple answer to your question or problem. But if things are just not working right, and you need more serious attention, then read on. 

        Automated Problem Diagnostics
        We provide fully automated problem diagnosis 24-hours per day, 7 days a week, 365 days per year! Since it's fully automated, it saves you time - no waiting on hold for a customer service representative! We contact you by email as soon as we have a solution to the problem - usually within two business days. 

        To provided automated customer support, Software Appliance has created the ReportBug diagnostic tool which automatically collects all the nitty-gritty details we need about your computer to determine possible sources of any problems you may encounter. All you need to do is run the program, which is included with all softappco Products. 

        Automated Problem Diagnostics is very simple! Here's how it works!
        1. Find the program called ReportBug, which will be in the directory where the product is installed, such as C:\Program Files\Netkeys\ReportBug.exe.
        2. Run ReportBug on your computer to create a detailed problem report file.
        3. Email the problem report file back to support@softappco.com for diagnosis. 
        4. We will email you back with a solution to your problem. 

        Overall, it takes less than 5 minutes of your time. 

        Typical problems include (see if your problem is already listed below):

        1. Password does not work - Try using upper case or lower case letters as appropriate. Is the Caps Lock key on? If you really have forgotten the password, send email to support@softappco.com. We can provide special passwords to get you going again. 

        2. Web sites are being blocked that should not be - maybe there is an advertisement on an otherwise benign website, such as a news website, and the advertisement is causing the whole page to be blocked. Maybe try closing and restarting the browser again (see also #4 below). 

        3. I can't tell if Netkeys is working - Don't worry, Netkeys works until it is uninstalled. It cannot be shut off even if the Netkeys icon is closed. Netkeys operates all the time, separately from the user interface. 

        4. Netkeys doesn't change behavior when I change settings - Sometimes this happens when you have multiple Internet connections going at the same time - try closing the browsers that are running, and start them up again. 

        5. The colors of the buttons don't look right - Is the computer capable of displaying more than 256 colors? Change the settings for the display in the Control Panel to make sure the computer can display more than 256 colors. 

        6. AOL email cannot be blocked using Netkeys - Yes, that is true. AOL's browser provides some email blocking capabilities which AOL customers may prefer, so Netkeys email blocking is disabled when using the AOL browser. Possibly use a different browser like Netscape for email if you prefer the Netkeys email blocking features. 

        7. Uninstall does not work - I seem to have the wrong password - Try using the password that you used to install Netkeys. If you continue having problems, please send email to support@softappco.com

        8. What is the network error message I keep getting? - Netkeys will cause network error messages to occur if the CleanBlock™ feature is enabled, because CleanBlock™ disconnects obscene Internet sites. See the CleanBlock™ feature for more information. 

        9. I think Netkeys is goofing up on a certain website - Try disabling Netkeys using the "Master Off" button in the Admin Menu, then try it again. Sometimes, computers, browsers, and any software just goof up due to non-repeatable hardware errors. Possibly shutdown and restart your computer, then try it again. If you continue having problems, pleasesend email to: support@softappco.com

        13. Contacting softappco

        Please send email to: support@softappco.com if you have any questions or comments about this manual.