<?xml version="1.0"?>
<?xml-stylesheet type="text/css" href="http://wiki.cas.mcmaster.ca/skins/common/feed.css?207"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=SJakubowski&amp;title=Special%3AContributions</id>
		<title>Computing and Software Wiki - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="http://wiki.cas.mcmaster.ca/index.php?feed=atom&amp;target=SJakubowski&amp;title=Special%3AContributions"/>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Special:Contributions/SJakubowski"/>
		<updated>2026-04-12T15:17:27Z</updated>
		<subtitle>From Computing and Software Wiki</subtitle>
		<generator>MediaWiki 1.15.1</generator>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2009-04-11T00:53:46Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* Bot? What is it?? How it works??? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Each phase our world, had it's wealthiness such it has been with gold, commerce, industry and others on the last centuries. On this XXI century, the main wealthiness has been around information, and the spread of it. This information has been the key structure of our world's society, economy, health, development and others. And this vast information sea has been spread though the internet network, which evolved into a magnificent tool of knowledge power on the latest years. Unfortunately, malicious intentioned people have been using this consistent tool for the spread of threats such as viruses, worms, Trojan horses and others, again, to obtain confidential and powerful information such as bank accounts user names &amp;amp; passwords, confidential &amp;amp; military information or even CPU power to the increase of the spread of these threats. One powerful way of this spread, has been though Bots that integrate Botnets, which are the main focus on this research. This security breach has been one of the newest and most powerful threats relating to computer security within the last 5 years.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Bot? What is it?? How it works???== &lt;br /&gt;
&lt;br /&gt;
Thanks for asking if you could modify my page, or use my info. -SJakubowski.&lt;br /&gt;
&lt;br /&gt;
A Bot is a type of malicious software that after successfully invading a machine (called Zombie computers), usually installed via worms, Trojan horses, or through Back doors, under a common command-and-control infrastructure. These new installed malicious software (Most likely to exist in machines that run on Windows OS (most used OS in the world), which don't have a file-user safe executing system like computers that run on Linux or Mac OS) behaves like a “worm” process, capable of spreading though the infected machine and having the power to connect to a communication channel (IRC, Web Server or P2P Server), allowing the attacker(Bot Herder) full control of this machine though a remote communication channel.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
At this point, these infected machines can work only as tool used by the Bot Herders as they may please. Some of this malicious intentioned people use this Bot commanded machines to obtain certain valuable information from users, or also, to integrate these Bot Clients to a much greater threat and risk, such as a Botnet.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Botnet? What is it?? How it works??? ==&lt;br /&gt;
A Botnet consists of a Bot server connected to one or more Bot clients. This set of Bots integrate the zombie machines into a really powerful and sophisticated invasion technique of a mass control of a a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
This invasion technique has evolved not only to an illegal way of profit, but also to a way of violating people's information privilege. What have been Botnets being used for? Is the concept of Botnet Evil? What measurements are being taken to control this terrible plague?. On the following sections, this article will discuss ways to detain this astonishing threat which has been vastly used as one effective malicious way of breaking into data integrity, availability and confidentiality of computers of a network.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Hard to exterminate...why? ==&lt;br /&gt;
A Botnet is adaptive; it can be designed to to download different modules to exploit specific things that it finds on a victim. New exploits can be added as they are discovered. This makes the job of the anti-viruses systems way more complex. Finding one component of a Botnet does not imply the nature of any other of the others components because the first component can choose to download from any number of modules to perform the functionality of each phase in the life cycle of a Botnet.&lt;br /&gt;
It also casts doubt on the capability of anti virus software to claim that a system is clean when it encounters and cleans one component of a multi-component bot. Because each component is downloaded when it is needed after the initial infection, the potential for a system to get a zero day exploit is higher. We also have to put in consideration that one of the bot client modules is usually set to to make the anti-virus tool ineffective and prevent the user from contacting the anti-virus vendor’s Web site for updates or removal tools. Botnets are powerful because they not only try to enable a perfect attack, but also a perfect own defense system.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== History of Botnets ==&lt;br /&gt;
Like many things on the Internet today, bots began as a useful tool without malicious purposes. They were originally developed to keep a channel open and prevent malicious users from taking over the channel when the operator was busy doing other things. In order to assist these IRC operators, bots needed to be able to operate as the channel operator. This lead the bots to evolve from being code that helped a single user to a code that manages and runs IRC channels as well. Around this time, some IRC servers and bots began offering the capability to make OS shell accounts available to users. The shell account permitted users to run commands on the IRC host. At this point, the bots intentions were twisted to a malicious way of commanding a machine remotely. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
The table bellow shows the evolution and how an human-machine assist application went from being a simple code to &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table border=&amp;quot;1&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Timeline&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;th&amp;gt;Bot technology&amp;lt;/th&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1988&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Invention of IRC by Jarkko “WiZ” Oikarinen of the University of Oulu, Finland&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1989&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Greg Lindahl invents GM the first Bot, where GM plays &amp;quot;Hunt the Wumpus&amp;quot; with IRC users&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;Pretty Park discovered. First worm to use an IRC server as a means of remote control&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;1999&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SubSeven Trojan/bot. A remote control Trojan added control via IRC&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2000&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;GT Bot, mIRC based. Runs scripts in response to IRC server events Supports raw TCP and UDP Socket connections&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SDBot. Written in C++ where its source code is available to hacker community though a small single binary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2002&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;AgoBot, Gaobot. They introduced modular design. The 1st module break-sin downloads, the 2nd module turns off anti virus and hides from detection before downloading the 3rd module. Module 3 has attack engines/payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;SpyBot. Spyware capabilities (key logging, data mining for email addresses lists of URLs, etc.)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2003&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;RBot. Most Prevalent Bot today. It spreads through weak passwords, easily modifiable, Uses packaging software&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2004&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;PolyBot. A derivative of AgoBot with Polymorphic abilty. Changes the look of its code on every infection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;2005&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td&amp;gt;MYTOB. My Doom mass emailing worm with Bot IRC C&amp;amp;C&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/table&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How Big is the problem? ==&lt;br /&gt;
On September of 2006 Symantec released a internet threat report which stated that during the six-month period from January to June 2006 Symantec observed 57,717 active bot network computers per day. Symantec also stated that it observed more than 4.5 million distinct, active bot network computers. They also discovered that many bots were not&lt;br /&gt;
usually detected until the Bot Herder had abandoned the computer which makes us conclude that the actual number is much larger than what Symantec can report.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
In March of 2006, McAfee was called to reclaim an unnamed Central American country’s telecommunications infrastructure from a massive Botnet. In the first week of the&lt;br /&gt;
engagement McAfee documented 6.9 million attacks of which 95 percent were Internet Relay Chat (IRC) bot related. The national telecommunication company reported the&lt;br /&gt;
following resulting problems:&lt;br /&gt;
* Numerous network outages of up to six hours&lt;br /&gt;
* Customer threats of lawsuits&lt;br /&gt;
* Customer business disruptions&lt;br /&gt;
* Lengthy outages of bank ATM service&lt;br /&gt;
Since January 2005, Microsoft has been delivering the Windows Malicious Software Removal Tool to its customers. After 15 months, Microsoft announced that it had removed 16 million instances of malicious software from almost six million unique computers. Use of the tool is voluntary; that is to say, the vast majority of Microsoft users are not running it. &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Consider the distributed denial-of-service (DDoS) attack power in one Botnet; A small Botnet of 10,000 bot clients with, conservatively, 128Kbps broadband upload speed can produce approximately 1.3 giga-bits of data per second. With this kind of power, two or three large (one million plus) Botnets could, according to McAfee, “threaten the national infrastructure of most countries.”&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== How it turned in to an illegal way of profit? ==&lt;br /&gt;
&lt;br /&gt;
== Life cycle of a Botnet ==&lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
&lt;br /&gt;
== Types of attacks ==&lt;br /&gt;
&lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
&lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-14T03:18:22Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A Botnet is a collection of infected computers that can be used to attack organizations and distribute illegal information due to the sheer number of computers that is contained within them. Botnets are hard to prevent as the computers that become bots usually bear no resemblance in their locations in the physical world. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
They are a major threat to computing, due to the sheer amount of computers that can be controlled. In 2005 the Dutch police shut down a botnet that controlled 1.5 million computers. 1.5 million computers could shut down any website in the world if they all attempted to access its services at the same time. &lt;br /&gt;
== Definitions == &lt;br /&gt;
*Bot&lt;br /&gt;
*Herder&lt;br /&gt;
*Zombie&lt;br /&gt;
*Scrumping&lt;br /&gt;
&lt;br /&gt;
===Bot===&lt;br /&gt;
&lt;br /&gt;
A Bot is short for robot. In the context of this wiki page a bot is a malicious program that installs itself unbeknownest to the owner of the pc, sets up an IRC or HTTP server and is ready to perform illegal activities.&lt;br /&gt;
===Herder===&lt;br /&gt;
A person who controls all the bots in the botnet.&lt;br /&gt;
===Zombie===&lt;br /&gt;
An infected computer.&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-14T03:17:44Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A Botnet is a collection of infected computers that can be used to attack organizations and distribute illegal information due to the sheer number of computers that is contained within them. Botnets are hard to prevent as the computers that become bots usually bear no resemblance in their locations in the physical world. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
They are a major threat to computing, due to the sheer amount of computers that can be controlled. In 2005 the Dutch police shut down a botnet that controlled 1.5 million computers. 1.5 million computers could shut down any website in the world if they all attempted to access its services at the same time. &lt;br /&gt;
== Definitions == &lt;br /&gt;
*Bot&lt;br /&gt;
*Herder&lt;br /&gt;
*Zombie&lt;br /&gt;
*Scrumping&lt;br /&gt;
&lt;br /&gt;
===Bot===&lt;br /&gt;
&lt;br /&gt;
A Bot is short for robot. In the context of this wiki page a bot is a malicious program that installs itself unbeknownest to the owner of the pc, sets up an IRC or HTTP server and is ready to perform illegal activities.&lt;br /&gt;
===Herder===&lt;br /&gt;
A person who controls all the bots in the botnet.&lt;br /&gt;
===Zombie===&lt;br /&gt;
An infected computer.&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:17, 13 April 2008 (EDT)&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-14T03:16:03Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* How it works */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A Botnet is a collection of infected computers that can be used to attack organizations and distribute illegal information due to the sheer number of computers that is contained within them. Botnets are hard to prevent as the computers that become bots usually bear no resemblance in their locations in the physical world. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
They are a major threat to computing, due to the sheer amount of computers that can be controlled. In 2005 the Dutch police shut down a botnet that controlled 1.5 million computers. 1.5 million computers could shut down any website in the world if they all attempted to access its services at the same time. &lt;br /&gt;
== Definitions == &lt;br /&gt;
*Bot&lt;br /&gt;
*Herder&lt;br /&gt;
*Zombie&lt;br /&gt;
*Scrumping&lt;br /&gt;
&lt;br /&gt;
===Bot===&lt;br /&gt;
&lt;br /&gt;
A Bot is short for robot. In the context of this wiki page a bot is a malicious program that installs itself unbeknownest to the owner of the pc, sets up an IRC or HTTP server and is ready to perform illegal activities.&lt;br /&gt;
===Herder===&lt;br /&gt;
A person who controls all the bots in the botnet.&lt;br /&gt;
===Zombie===&lt;br /&gt;
An infected computer.&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the inherent weakness of a command and control scheme, once the higher level bots are compromised the effectiveness of the botnet can be severally reduced. If the main server is taken down, the entire botnet fails.&lt;br /&gt;
&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-14T03:13:04Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* Spamming */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A Botnet is a collection of infected computers that can be used to attack organizations and distribute illegal information due to the sheer number of computers that is contained within them. Botnets are hard to prevent as the computers that become bots usually bear no resemblance in their locations in the physical world. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
They are a major threat to computing, due to the sheer amount of computers that can be controlled. In 2005 the Dutch police shut down a botnet that controlled 1.5 million computers. 1.5 million computers could shut down any website in the world if they all attempted to access its services at the same time. &lt;br /&gt;
== Definitions == &lt;br /&gt;
*Bot&lt;br /&gt;
*Herder&lt;br /&gt;
*Zombie&lt;br /&gt;
*Scrumping&lt;br /&gt;
&lt;br /&gt;
===Bot===&lt;br /&gt;
&lt;br /&gt;
A Bot is short for robot. In the context of this wiki page a bot is a malicious program that installs itself unbeknownest to the owner of the pc, sets up an IRC or HTTP server and is ready to perform illegal activities.&lt;br /&gt;
===Herder===&lt;br /&gt;
A person who controls all the bots in the botnet.&lt;br /&gt;
===Zombie===&lt;br /&gt;
An infected computer.&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders.&lt;br /&gt;
&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Due to the size of some botnets, a spammer will also be able to send much more messages via the bots then he normally could. This is another example of the exponential power of a botnet.&lt;br /&gt;
&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-14T03:10:09Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* See Also */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A Botnet is a collection of infected computers that can be used to attack organizations and distribute illegal information due to the sheer number of computers that is contained within them. Botnets are hard to prevent as the computers that become bots usually bear no resemblance in their locations in the physical world. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
They are a major threat to computing, due to the sheer amount of computers that can be controlled. In 2005 the Dutch police shut down a botnet that controlled 1.5 million computers. 1.5 million computers could shut down any website in the world if they all attempted to access its services at the same time. &lt;br /&gt;
== Definitions == &lt;br /&gt;
*Bot&lt;br /&gt;
*Herder&lt;br /&gt;
*Zombie&lt;br /&gt;
*Scrumping&lt;br /&gt;
&lt;br /&gt;
===Bot===&lt;br /&gt;
&lt;br /&gt;
A Bot is short for robot. In the context of this wiki page a bot is a malicious program that installs itself unbeknownest to the owner of the pc, sets up an IRC or HTTP server and is ready to perform illegal activities.&lt;br /&gt;
===Herder===&lt;br /&gt;
A person who controls all the bots in the botnet.&lt;br /&gt;
===Zombie===&lt;br /&gt;
An infected computer.&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders.&lt;br /&gt;
&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Phishing &amp;quot;Phishing&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-14T03:08:37Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A Botnet is a collection of infected computers that can be used to attack organizations and distribute illegal information due to the sheer number of computers that is contained within them. Botnets are hard to prevent as the computers that become bots usually bear no resemblance in their locations in the physical world. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
They are a major threat to computing, due to the sheer amount of computers that can be controlled. In 2005 the Dutch police shut down a botnet that controlled 1.5 million computers. 1.5 million computers could shut down any website in the world if they all attempted to access its services at the same time. &lt;br /&gt;
== Definitions == &lt;br /&gt;
*Bot&lt;br /&gt;
*Herder&lt;br /&gt;
*Zombie&lt;br /&gt;
*Scrumping&lt;br /&gt;
&lt;br /&gt;
===Bot===&lt;br /&gt;
&lt;br /&gt;
A Bot is short for robot. In the context of this wiki page a bot is a malicious program that installs itself unbeknownest to the owner of the pc, sets up an IRC or HTTP server and is ready to perform illegal activities.&lt;br /&gt;
===Herder===&lt;br /&gt;
A person who controls all the bots in the botnet.&lt;br /&gt;
===Zombie===&lt;br /&gt;
An infected computer.&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders.&lt;br /&gt;
&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method. However, instead of trying to sell a service such as &amp;quot;P3N15 3NLARGEMENT PILLS&amp;quot; the phisher is trying to con you out of your paypal or bank account.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-14T03:03:21Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A Botnet is a collection of infected computers that can be used to attack organizations and distribute illegal information due to the sheer number of computers that is contained within them. Botnets are hard to prevent as the computers that become bots usually bear no resemblance in their locations in the physical world. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
They are a major threat to computing, due to the sheer amount of computers that can be controlled. In 2005 the Dutch police shut down a botnet that controlled 1.5 million computers. 1.5 million computers could shut down any website in the world if they all attempted to access its services at the same time. &lt;br /&gt;
== Definitions == &lt;br /&gt;
*Bot&lt;br /&gt;
*Herder&lt;br /&gt;
*Zombie&lt;br /&gt;
*Scrumping&lt;br /&gt;
&lt;br /&gt;
===Bot===&lt;br /&gt;
&lt;br /&gt;
A Bot is short for robot. In the context of this wiki page a bot is a malicious program that installs itself unbeknownest to the owner of the pc, sets up an IRC or HTTP server and is ready to perform illegal activities.&lt;br /&gt;
===Herder===&lt;br /&gt;
A person who controls all the bots in the botnet.&lt;br /&gt;
===Zombie===&lt;br /&gt;
An infected computer.&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer. This can be used as a positive means if the botnet is configured to not automatically propagate into systems that do not want it. This is not commonly the case. This could be done on a school's network.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it receives from up top. This is beneficial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a PC. It has various vectors to enter that PC that the Herder can set. It does this autonomously. It receives orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The bot once installed camouflages itself from the system view. It installs a hidden IRC client. It tries to mask itself by maintaining a low profile by using as little system resources as possible until it receives orders.&lt;br /&gt;
&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Initial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vulnerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as received by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's PC realizes the PC is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
Bots commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioral based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
===General Tips===&lt;br /&gt;
Use common malware prevention techniques. On Windows XP this includes monitoring the process manager and registry for unknown applications. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A better user could also monitor network traffic and see what ports are in use. A good indication is TCP port 6667 open when an IRC client is not running.&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== External Links ==&lt;br /&gt;
[http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1 &amp;quot;Norton AntiBot&amp;quot;] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.techweb.com/wire/security/172303160 &amp;quot;Dutch Botnet Suspects Ran 1.5 Million Machines&amp;quot;] &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-14T02:47:32Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A Botnet is a collection of infected computers that can be used to attack organizations and distribute illegal information due to the sheer number of computers that is contained within them. Botnets are hard to prevent as the computers usually bear no resemblance in their locations in the physical world. &lt;br /&gt;
&lt;br /&gt;
== Definitions == &lt;br /&gt;
*Bot&lt;br /&gt;
*Herder&lt;br /&gt;
*Zombie&lt;br /&gt;
*Scrumping&lt;br /&gt;
&lt;br /&gt;
===Bot===&lt;br /&gt;
&lt;br /&gt;
A Bot is short for robot. In the context of this wikipedia page a bot is a malicious program that installs itself unbeknowenst to the owner of the pc, sets up an IRC or HTTP server and is ready to perform illegal activities.&lt;br /&gt;
===Herder===&lt;br /&gt;
A person who controls all the bots in the botnet.&lt;br /&gt;
===Zombie===&lt;br /&gt;
An infected computer.&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer.&lt;br /&gt;
== How it works ==&lt;br /&gt;
A Botnet basically uses a command and control schema, the same as a military. Each bot has a chain of command that is part of. It distributes orders down the line that it recieves from up top. This is benificial in the fact that it can grow exponentially. This is the opposite of the cell schema that some malware uses, which is to split apart and never communicate once they become big enough. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A bot installs itself onto a pc. It has various vectors that the Herder can set. It does this autonomously. It recieves orders from a server that tell it what to do. An individual bot by itself is not that powerful. However an exponential number of bots performing the same action has a much more profound effect. &lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Intial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vunerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as recieved by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's pc realizes the pc is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
They commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioural based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== External Links ==&lt;br /&gt;
http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-14T02:41:43Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* Norton Anti-Bot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A Botnet is a collection of infected computers that can be used to attack organizations and distribute illegal information due to the sheer number of computers that is contained within them. Botnets are hard to prevent as the computers usually bear no resemblance in their locations in the physical world. &lt;br /&gt;
&lt;br /&gt;
== Definitions == &lt;br /&gt;
*Bot&lt;br /&gt;
*Herder&lt;br /&gt;
*Zombie&lt;br /&gt;
*Scrumping&lt;br /&gt;
&lt;br /&gt;
===Bot===&lt;br /&gt;
&lt;br /&gt;
A Bot is short for robot. In the context of this wikipedia page a bot is a malicious program that installs itself unbeknowenst to the owner of the pc, sets up an IRC or HTTP server and is ready to perform illegal activities.&lt;br /&gt;
===Herder===&lt;br /&gt;
A person who controls all the bots in the botnet.&lt;br /&gt;
===Zombie===&lt;br /&gt;
An infected computer.&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer.&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Intial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vunerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as recieved by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's pc realizes the pc is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
They commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
Norton Anti-Bot is commercial software that scans your system to see if it has become a zombie. It is behavioural based, versus the usual signature based. What this means is unless the bot software actually does something, Norton will leave it alone. It has all the benefits of a commercial software, meaning it will be updated constantly as new bot definitions are found.&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== External Links ==&lt;br /&gt;
http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-14T02:35:38Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* Norton Anti-Bot */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A Botnet is a collection of infected computers that can be used to attack organizations and distribute illegal information due to the sheer number of computers that is contained within them. Botnets are hard to prevent as the computers usually bear no resemblance in their locations in the physical world. &lt;br /&gt;
&lt;br /&gt;
== Definitions == &lt;br /&gt;
*Bot&lt;br /&gt;
*Herder&lt;br /&gt;
*Zombie&lt;br /&gt;
*Scrumping&lt;br /&gt;
&lt;br /&gt;
===Bot===&lt;br /&gt;
&lt;br /&gt;
A Bot is short for robot. In the context of this wikipedia page a bot is a malicious program that installs itself unbeknowenst to the owner of the pc, sets up an IRC or HTTP server and is ready to perform illegal activities.&lt;br /&gt;
===Herder===&lt;br /&gt;
A person who controls all the bots in the botnet.&lt;br /&gt;
===Zombie===&lt;br /&gt;
An infected computer.&lt;br /&gt;
===Scrumping===&lt;br /&gt;
A bot stealing CPU cycles from the host computer.&lt;br /&gt;
== Attacks ==&lt;br /&gt;
*DDoS&lt;br /&gt;
*Spamming&lt;br /&gt;
*Phishing &lt;br /&gt;
===DDoS===&lt;br /&gt;
A Distributed denial of Service attack. The bots flood a web server with ICMP requests causing the server to crash. This can be used as a method of extortion from various websites. The herder demonstrates the power of his botnet by taking down the website, then he/she contacts the site in question and extorts them for money. &lt;br /&gt;
===Spamming===&lt;br /&gt;
A Herder can sell his botnet as a service to a spammer. This is beneficial to the spammer as he can have anonymous distribution of his messages.&lt;br /&gt;
===Phishing===&lt;br /&gt;
Works the same way as the spamming method.&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
*Intial setup of configuration settings of the bot&lt;br /&gt;
*Register a Dynamic DNS&lt;br /&gt;
*Infect a PC with a bot&lt;br /&gt;
**Bot propagates according to the configuration settings&lt;br /&gt;
**Scans for vunerabilities&lt;br /&gt;
**Idle&lt;br /&gt;
**Performs actions as recieved by other bots above it in the chain of command&lt;br /&gt;
**Bot dies:&lt;br /&gt;
***Bot may be taken over by another botnet&lt;br /&gt;
***The bot's owner's pc realizes the pc is a zombie, kills the bot.&lt;br /&gt;
***The chain of command may be compromised above the level.&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
They commonly have hidden removal commands, to completely clean the host computer. On the larger IRC networks such as EFnet channel activity is logged in order to learn the commands, and then automated systems are setup to prevent the owner of the botnet from accessing them and at the same time perform the removal command when a bot comes online to it's control channel.&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
===Norton Anti-Bot===&lt;br /&gt;
[[Image:Norton_AntiBot.jpg|thumb|140px|right|&lt;br /&gt;
'''Norton Anti-Bot''']]&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== External Links ==&lt;br /&gt;
http://www.symantec.com/norton/products/overview.jsp?pcid=is&amp;amp;pvid=nab1&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Norton_AntiBot.jpg</id>
		<title>File:Norton AntiBot.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Norton_AntiBot.jpg"/>
				<updated>2008-04-14T02:35:20Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-13T14:07:43Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;insert description here&lt;br /&gt;
&lt;br /&gt;
== Definitions == &lt;br /&gt;
===Bot===&lt;br /&gt;
===Herder===&lt;br /&gt;
===Zombie===&lt;br /&gt;
===Scrumping===&lt;br /&gt;
== Attacks == &lt;br /&gt;
===DDoS===&lt;br /&gt;
===Spamming===&lt;br /&gt;
===phishing===&lt;br /&gt;
&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://www.cas.mcmaster.ca/wiki/index.php/Alternative_Technologies_for_Ethernet &amp;quot;Alternative Technologies for Ethernet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== External Links ==&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-13T14:06:36Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;insert description here&lt;br /&gt;
&lt;br /&gt;
== Definitions == &lt;br /&gt;
===Bot===&lt;br /&gt;
===Herder===&lt;br /&gt;
===Zombie===&lt;br /&gt;
===Scrumping===&lt;br /&gt;
== Attacks == &lt;br /&gt;
===DDoS===&lt;br /&gt;
===Spamming===&lt;br /&gt;
===phishing===&lt;br /&gt;
&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[http://en.wikipedia.org/wiki/Botnet &amp;quot;Botnet&amp;quot;]&amp;lt;br&amp;gt;&lt;br /&gt;
== External Links ==&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-13T14:03:50Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;insert description here&lt;br /&gt;
&lt;br /&gt;
== Definitions == &lt;br /&gt;
===Bot===&lt;br /&gt;
===Herder===&lt;br /&gt;
===Zombie===&lt;br /&gt;
===Scrumping===&lt;br /&gt;
== Attacks == &lt;br /&gt;
===DDoS===&lt;br /&gt;
===Spamming===&lt;br /&gt;
===phishing===&lt;br /&gt;
&lt;br /&gt;
== Life Cycle == &lt;br /&gt;
&lt;br /&gt;
== Bot Management ==&lt;br /&gt;
&lt;br /&gt;
== How to Fight Botnets ==&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets</id>
		<title>Bots &amp; Botnets</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Bots_%26_Botnets"/>
				<updated>2008-04-13T13:52:10Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;New page: a&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;a&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-03T04:59:05Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== Terms used in this article ==&lt;br /&gt;
==== ATM ====&lt;br /&gt;
Automated Teller Machine&lt;br /&gt;
==== PIN ====&lt;br /&gt;
Personal Identification Number&lt;br /&gt;
== General Facts about debit/credit fraud in Canada==&lt;br /&gt;
&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Debit and Credit card fraud is a major issue here in Canada. What is basically involved is a group of individuals setting up magnetic strip readers to record magentic data from an unsuspecting person. The PIN must also be either witnessed by a team member or a camera. Then blank cards are filled with the data. Then the cashout phase begins which is when various ATM's are hit and balances are withdrawn sometimes to the point of depositing blank envelopes and withdrawing cash that does not even exist. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Group of Romainian gang members were busted last year for a total of 4 million dollars worth of fraudulent withdrawls from debit cards and ATMs. They custom made a device to fit overtop of an ATM terminal that would look like part of it, with the keypad and magnetic reader, they would leave it there unobserved for an hour or two, and then recover it before the deception was noted. The device kept track of the magnetic data and PIN numbers.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
[[Image:Smartcardchip.jpg|thumb|300px|right|&lt;br /&gt;
'''What a Smart Card Chip looks like internally''']]&lt;br /&gt;
====What is a Smart Card====&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
**They use RSA and DSA encryption algorithms&lt;br /&gt;
====Background====&lt;br /&gt;
*Invented in 1968. German rocket scientist. Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
**Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
**Company that updates the card specifications. &lt;br /&gt;
**Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
====RFID====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RFID is a relatively recent technology. It stands for Radio-frequency identification. It is also non powered, so the card will require no battery. It allows smart cards to function without having to make physical contact with a chip reader, they will be able to work wirelessly.&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;br /&gt;
--[[User:SJakubowski|SJakubowski]] 23:59, 2 December 2007 (EST)&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-03T04:56:01Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* Future of Smart Cards */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== Terms used in this article ==&lt;br /&gt;
==== ATM ====&lt;br /&gt;
Automated Teller Machine&lt;br /&gt;
==== PIN ====&lt;br /&gt;
Personal Identification Number&lt;br /&gt;
== General Facts about debit/credit fraud in Canada==&lt;br /&gt;
&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Debit and Credit card fraud is a major issue here in Canada. What is basically involved is a group of individuals setting up magnetic strip readers to record magentic data from an unsuspecting person. The PIN must also be either witnessed by a team member or a camera. Then blank cards are filled with the data. Then the cashout phase begins which is when various ATM's are hit and balances are withdrawn sometimes to the point of depositing blank envelopes and withdrawing cash that does not even exist. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Group of Romainian gang members were busted last year for a total of 4 million dollars worth of fraudulent withdrawls from debit cards and ATMs. They custom made a device to fit overtop of an ATM terminal that would look like part of it, with the keypad and magnetic reader, they would leave it there unobserved for an hour or two, and then recover it before the deception was noted. The device kept track of the magnetic data and PIN numbers.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
[[Image:Smartcardchip.jpg|thumb|300px|right|&lt;br /&gt;
'''What a Smart Card Chip looks like internally''']]&lt;br /&gt;
====What is a Smart Card====&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
**They use RSA and DSA encryption algorithms&lt;br /&gt;
====Background====&lt;br /&gt;
*Invented in 1968. German rocket scientist. Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
**Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
**Company that updates the card specifications. &lt;br /&gt;
**Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
====RFID====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RFID is a relatively recent technology. It stands for Radio-frequency identification. It is also non powered, so the card will require no battery. It allows smart cards to function without having to make physical contact with a chip reader, they will be able to work wirelessly.&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-03T04:55:18Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* Future of Smart Cards */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== Terms used in this article ==&lt;br /&gt;
==== ATM ====&lt;br /&gt;
Automated Teller Machine&lt;br /&gt;
==== PIN ====&lt;br /&gt;
Personal Identification Number&lt;br /&gt;
== General Facts about debit/credit fraud in Canada==&lt;br /&gt;
&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Debit and Credit card fraud is a major issue here in Canada. What is basically involved is a group of individuals setting up magnetic strip readers to record magentic data from an unsuspecting person. The PIN must also be either witnessed by a team member or a camera. Then blank cards are filled with the data. Then the cashout phase begins which is when various ATM's are hit and balances are withdrawn sometimes to the point of depositing blank envelopes and withdrawing cash that does not even exist. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Group of Romainian gang members were busted last year for a total of 4 million dollars worth of fraudulent withdrawls from debit cards and ATMs. They custom made a device to fit overtop of an ATM terminal that would look like part of it, with the keypad and magnetic reader, they would leave it there unobserved for an hour or two, and then recover it before the deception was noted. The device kept track of the magnetic data and PIN numbers.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
[[Image:Smartcardchip.jpg|thumb|300px|right|&lt;br /&gt;
'''What a Smart Card Chip looks like internally''']]&lt;br /&gt;
====What is a Smart Card====&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
**They use RSA and DSA encryption algorithms&lt;br /&gt;
====Background====&lt;br /&gt;
*Invented in 1968. German rocket scientist. Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
**Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
**Company that updates the card specifications. &lt;br /&gt;
**Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
*RFID&lt;br /&gt;
&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
RFID is a relatively recent technology. It stands for Radio-frequency identification. It is also non powered, so the card will require no battery. It allows smart cards to function without having to make physical contact with a chip reader, they will be able to work wirelessly.&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-03T04:35:56Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== Terms used in this article ==&lt;br /&gt;
==== ATM ====&lt;br /&gt;
Automated Teller Machine&lt;br /&gt;
==== PIN ====&lt;br /&gt;
Personal Identification Number&lt;br /&gt;
== General Facts about debit/credit fraud in Canada==&lt;br /&gt;
&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Debit and Credit card fraud is a major issue here in Canada. What is basically involved is a group of individuals setting up magnetic strip readers to record magentic data from an unsuspecting person. The PIN must also be either witnessed by a team member or a camera. Then blank cards are filled with the data. Then the cashout phase begins which is when various ATM's are hit and balances are withdrawn sometimes to the point of depositing blank envelopes and withdrawing cash that does not even exist. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Group of Romainian gang members were busted last year for a total of 4 million dollars worth of fraudulent withdrawls from debit cards and ATMs. They custom made a device to fit overtop of an ATM terminal that would look like part of it, with the keypad and magnetic reader, they would leave it there unobserved for an hour or two, and then recover it before the deception was noted. The device kept track of the magnetic data and PIN numbers.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
[[Image:Smartcardchip.jpg|thumb|300px|right|&lt;br /&gt;
'''What a Smart Card Chip looks like internally''']]&lt;br /&gt;
====What is a Smart Card====&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
**They use RSA and DSA encryption algorithms&lt;br /&gt;
====Background====&lt;br /&gt;
*Invented in 1968. German rocket scientist. Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
**Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
**Company that updates the card specifications. &lt;br /&gt;
**Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
RFID.&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-03T04:34:21Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* General Facts about debit/credit fraud in Canada */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== General Facts about debit/credit fraud in Canada==&lt;br /&gt;
&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Debit and Credit card fraud is a major issue here in Canada. What is basically involved is a group of individuals setting up magnetic strip readers to record magentic data from an unsuspecting person. The PIN must also be either witnessed by a team member or a camera. Then blank cards are filled with the data. Then the cashout phase begins which is when various ATM's are hit and balances are withdrawn sometimes to the point of depositing blank envelopes and withdrawing cash that does not even exist. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
A Group of romainian gang members were busted last year for a total of 4 million dollars worth of fraudulent withdrawls from debit cards and ATMs. They custom made a device to fit overtop of an ATM terminal that would look like part of it, with the keypad and magnetic reader, they would leave it there unobserved for an hour or two, and then recover it before the deception was noted. The device kept track of the magnetic data and PIN numbers.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
[[Image:Smartcardchip.jpg|thumb|300px|right|&lt;br /&gt;
'''What a Smart Card Chip looks like internally''']]&lt;br /&gt;
====What is a Smart Card====&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
**They use RSA and DSA encryption algorithms&lt;br /&gt;
====Background====&lt;br /&gt;
*Invented in 1968. German rocket scientist. Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
**Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
**Company that updates the card specifications. &lt;br /&gt;
**Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
RFID.&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-03T04:28:21Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* General Facts about fraud */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== General Facts about debit/credit fraud in Canada==&lt;br /&gt;
&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
[[Image:Smartcardchip.jpg|thumb|300px|right|&lt;br /&gt;
'''What a Smart Card Chip looks like internally''']]&lt;br /&gt;
====What is a Smart Card====&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
**They use RSA and DSA encryption algorithms&lt;br /&gt;
====Background====&lt;br /&gt;
*Invented in 1968. German rocket scientist. Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
**Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
**Company that updates the card specifications. &lt;br /&gt;
**Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
RFID.&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-03T04:27:57Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* General Facts about Smart Cards */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
[[Image:Smartcardchip.jpg|thumb|300px|right|&lt;br /&gt;
'''What a Smart Card Chip looks like internally''']]&lt;br /&gt;
====What is a Smart Card====&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
**They use RSA and DSA encryption algorithms&lt;br /&gt;
====Background====&lt;br /&gt;
*Invented in 1968. German rocket scientist. Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
**Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
**Company that updates the card specifications. &lt;br /&gt;
**Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
RFID.&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-03T04:17:02Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* General Facts about Smart Cards */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
[[Image:Smartcardchip.jpg|thumb|300px|right|&lt;br /&gt;
'''What a Smart Card Chip looks like internally''']]&lt;br /&gt;
====What is a Smart Card====&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
*They use RSA and DSA encryption algorithms&lt;br /&gt;
====Background====&lt;br /&gt;
*Invented in 1968. German rocket scientist.&lt;br /&gt;
*Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
*Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
*Company that updates the card specifications. Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
RFID.&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-03T04:16:52Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* General Facts about Smart Cards */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
[[Image:Smartcardchip.jpg|thumb|300px|right|&lt;br /&gt;
'''What a Smart Card Chip looks like internally''']]&lt;br /&gt;
====What is a Smart Card=====&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
*They use RSA and DSA encryption algorithms&lt;br /&gt;
====Background====&lt;br /&gt;
*Invented in 1968. German rocket scientist.&lt;br /&gt;
*Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
*Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
*Company that updates the card specifications. Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
RFID.&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-02T19:57:18Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* General Facts about Smart Cards */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
[[Image:Smartcardchip.jpg|thumb|300px|right|&lt;br /&gt;
'''What a Smart Card Chip looks like internally''']]&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
*They use RSA and DSA encryption algorithms&lt;br /&gt;
*Invented in 1968. German rocket scientist.&lt;br /&gt;
*Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
*Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
*Company that updates the card specifications. Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
RFID.&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-02T19:57:09Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* General Facts about fraud */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
*They use RSA and DSA encryption algorithms&lt;br /&gt;
*Invented in 1968. German rocket scientist.&lt;br /&gt;
*Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
*Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
*Company that updates the card specifications. Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
RFID.&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-02T19:56:47Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* General Facts about fraud */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
[[Image:Smartcardchip.jpg|thumb|300px|right|&lt;br /&gt;
'''What a Smart Card Chip looks like internally''']]&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
*They use RSA and DSA encryption algorithms&lt;br /&gt;
*Invented in 1968. German rocket scientist.&lt;br /&gt;
*Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
*Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
*Company that updates the card specifications. Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
RFID.&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Smartcardchip.jpg</id>
		<title>File:Smartcardchip.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Smartcardchip.jpg"/>
				<updated>2007-12-02T19:55:57Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-02T03:59:48Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* Future of Smart Cards */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
*They use RSA and DSA encryption algorithms&lt;br /&gt;
*Invented in 1968. German rocket scientist.&lt;br /&gt;
*Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
*Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
*Company that updates the card specifications. Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
RFID.&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-02T03:59:35Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* Problems with Smart Cards */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
*They use RSA and DSA encryption algorithms&lt;br /&gt;
*Invented in 1968. German rocket scientist.&lt;br /&gt;
*Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
*Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
*Company that updates the card specifications. Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
*Chip is not flexible.&lt;br /&gt;
*Big banks estimate it would cost 500 million to convert the system to use smart cards.&lt;br /&gt;
*They have been cracked in the past.&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
fsdf&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-02T03:59:12Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* General Facts about Smart Cards */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
*They use RSA and DSA encryption algorithms&lt;br /&gt;
*Invented in 1968. German rocket scientist.&lt;br /&gt;
*Helmut Gröttrup&lt;br /&gt;
*French debit cards in 1992.&lt;br /&gt;
*Carte Bleue.&lt;br /&gt;
*EMVco&lt;br /&gt;
*Company that updates the card specifications. Visa/Debit cards must meet their worldwide standards if the Card is to be successful.&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
dsfds&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
fsdf&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-02T03:50:30Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* General Facts about fraud */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
*44 Million dollars lost in 2003 due to debit card fraud.&lt;br /&gt;
*100 Million in 2006&lt;br /&gt;
*Numbers on the rise every year.&lt;br /&gt;
*Takes less then a second and your Card is compromised.&lt;br /&gt;
*Smart card technology can prevent this.&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
*They use RSA and DSA encryption algorithms&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
dsfds&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
fsdf&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-02T03:47:52Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in '''Credit Cards''' and '''Debit Cards'''.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
* Data Protection&lt;br /&gt;
* Ease of Use&lt;br /&gt;
* Easy to Transport Information&lt;br /&gt;
* Relatively Cheap and Efficient&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
*They use RSA and DSA encryption algorithms&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
dsfds&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
fsdf&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-02T03:46:33Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in Visa and Debit cards.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
* Data Protection&lt;br /&gt;
* Ease of Use&lt;br /&gt;
* Easy to Transport Information&lt;br /&gt;
* Relatively Cheap and Efficient&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
*They use RSA and DSA encryption algorithms&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
dsfds&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
fsdf&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&amp;lt;br&amp;gt;&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Payment Card Industry Data Security Standard]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud.</id>
		<title>Smart Card technology to prevent fraud.</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud."/>
				<updated>2007-12-02T03:43:30Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;Replacing page with 'See Smart_Card_technology_to_prevent_fraud'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;See [[Smart_Card_technology_to_prevent_fraud]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud</id>
		<title>Smart Card technology to prevent fraud</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud"/>
				<updated>2007-12-02T03:42:48Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;New page: Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in Visa and Debit cards.  == Gener...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in Visa and Debit cards.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
* Data Protection&lt;br /&gt;
* Ease of Use&lt;br /&gt;
* Easy to Transport Information&lt;br /&gt;
* Relatively Cheap and Efficient&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
*They use RSA and DSA encryption algorithms&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
dsfds&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
fsdf&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud.</id>
		<title>Smart Card technology to prevent fraud.</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud."/>
				<updated>2007-12-02T03:36:05Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* General Facts about Smart Cards */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in Visa and Debit cards.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
* Data Protection&lt;br /&gt;
* Ease of Use&lt;br /&gt;
* Easy to Transport Information&lt;br /&gt;
* Relatively Cheap and Efficient&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
*Smart cards use a microchip embedded onto the card.&lt;br /&gt;
*The chip uses no power, the reader provides the power and reads the information from the chip&lt;br /&gt;
*Smart card chips are encrypted&lt;br /&gt;
*They use RSA and DSA encryption algorithms&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
dsfds&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
fsdf&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud.</id>
		<title>Smart Card technology to prevent fraud.</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud."/>
				<updated>2007-12-02T03:32:52Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in Visa and Debit cards.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
* Data Protection&lt;br /&gt;
* Ease of Use&lt;br /&gt;
* Easy to Transport Information&lt;br /&gt;
* Relatively Cheap and Efficient&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
\affas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
dsfds&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
fsdf&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[HaveFunWithCasWiki]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:SJakubowski SJakubowski]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[http://www.cas.mcmaster.ca/wiki/index.php/User:Cavaliaj Cavaliaj]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Electronic_Voting_Systems</id>
		<title>Electronic Voting Systems</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Electronic_Voting_Systems"/>
				<updated>2007-12-02T03:26:22Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* Security Implementations and Certification */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;An '''Electronic Voting System''' is an innovative new method of distributing, voting, collecting and tabulating ballots through the use of computer technology.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; The software implementations which are input into this technology expand every day to improve &amp;lt;br&amp;gt;security and integrity of the results. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__TOC__&lt;br /&gt;
&lt;br /&gt;
=Electronic Voting Systems=&lt;br /&gt;
==DRE Machines==&lt;br /&gt;
&amp;lt;br&amp;gt; '''DRE (Direct Recording Electronic)'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; A '''DRE''' machine is a recent implementation of a fully self-operated computer voting system.&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;DRE's are user-friendly and time-efficient which makes them an attractive alternative to traditional pen-and-paper voting. A DRE machine consists of a user screen &lt;br /&gt;
&amp;lt;br&amp;gt;for information and ballot display, a keypad involving buttons or a touchscreen, and other assisting tools such as head-phones for the handicapped. &lt;br /&gt;
&lt;br /&gt;
[[Image:sequoia_dre.jpg]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; DRE's have been implemented worldwide but most frequently used in countries such as Brazil, India and United States.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; To access a DRE machine, a voter must be provided with a Voter Authentication Card (SmartCard or another type of Memory Card) by an Election Official. The Voter card &lt;br /&gt;
&amp;lt;br&amp;gt;becomes automatically deactivated by the DRE once a vote is fully cast.&lt;br /&gt;
&lt;br /&gt;
==Optical Scan==&lt;br /&gt;
&lt;br /&gt;
Optical Scanning machines were introduced shortly after the Punch Card system, incorporating paper ballots with computer technology. There are two common Optical Scanning Machines&lt;br /&gt;
&amp;lt;br&amp;gt; used in todays elections, Marksense and the Digital Pen. &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; '''Marksense''' is a system developed ... Using a dark marker, a voter shades in a selection on the paper ballot, once completed the paper ballot is run through an optical scanning &lt;br /&gt;
&amp;lt;br&amp;gt;machine which uses 'dark mark' logic to select the correct choice. &lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; A '''Digital Pen''' is a similar version to Marksense except the pen communicates with the paper ballot and knows at all times its location on the ballot. &lt;br /&gt;
&lt;br /&gt;
[[Image:opticalScan.jpg | 200 px]]&lt;br /&gt;
&lt;br /&gt;
==Internet Voting==&lt;br /&gt;
&lt;br /&gt;
=Electoral Fraud=&lt;br /&gt;
==Insider Attacks==&lt;br /&gt;
==Man-In-The-Middle Attacks==&lt;br /&gt;
=Reported Problems=&lt;br /&gt;
=Security Implementations and Certification=&lt;br /&gt;
&lt;br /&gt;
* &amp;quot; :) &amp;quot;  [[HaveFunWithCasWiki]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Payment_Card_Industry_Data_Security_Standard</id>
		<title>Payment Card Industry Data Security Standard</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Payment_Card_Industry_Data_Security_Standard"/>
				<updated>2007-12-02T03:24:43Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* Summary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The Payment Card Industry Data Security Standard (PCI DSS) is a security document created by the Payment Card Industry Security Standards Council (PCI SSC).  To make the explanation of the PCI DSS a bit more interesting, I will be presenting it as an Industry Wide security do&lt;br /&gt;
&lt;br /&gt;
== Terms Used In This Article ==&lt;br /&gt;
* ''PCI'' '''P'''ayment '''C'''ard '''I'''ndustry: A Payment Card is any &amp;quot;card&amp;quot; form of payment.  This can cover everything from credit cards to debit cards.  The Payment Card Industry consists of all the companies which make up the many different brands of payment cards in use today.  (ie Visa, Mastercard, ect..)&lt;br /&gt;
* ''PCI DSS'' '''P'''ayment '''C'''ard '''I'''ndustry '''D'''ata '''S'''ecurity '''S'''tandard&lt;br /&gt;
* ''PCI SSC'' '''P'''ayment '''C'''ard '''I'''ndustry '''S'''ecurity '''S'''tandards '''C'''ouncil: A council made up of Visa, Mastercard, American Express, Discover and JCB (Japan Credit Bureau) created in order to align their individual security goals into one document - the PCI DSS.&lt;br /&gt;
* ''Card Holder'': Any customer of a Payment Card company.&lt;br /&gt;
* ''Merchant'': Any company which accepts Payment Cards as a form of payment.&lt;br /&gt;
== Security System Life Cycle ==&lt;br /&gt;
[[Image:PCICouncil.JPG|frame|right|Formation of the PCI SSC]]&lt;br /&gt;
=== Threats ===&lt;br /&gt;
&amp;lt;P&amp;gt;The main threat to the Payment Card Industry as a whole is more of a threat to the card holders than the industry itself.  The card holders are taking a chance whenever they use their credit cards to make a purchase.  This threat is not only present when purchasing online, but also when purchasing in stores.  The threat originates from a lack of industry wide standards on how card holder information should be stored, processed or transmitted.&amp;lt;/P&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;P&amp;gt;This security threat directly affects the Payment Card Industry because if cardholders don't trust that their information is secure, then they will not use their credit cards and hence the Payment Card Vendors loose business.  This is why the Payment Card Industry is moving forward with their industry wide standard for security, the Payment Card Industry Data Security Standard.&amp;lt;/P&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Policy ===&lt;br /&gt;
&amp;lt;P&amp;gt;Before December 14th 2004, the 5 major Payment Card companies (Visa, Mastercard, American Express, Discover and JCB (Japan Credit Bureau)) each had their own set of Information Security Standards.  This meant that retailers had 5 different security policies to comply to.  &lt;br /&gt;
After December 14th 2004, these 5 brands of cards collaborated to create the Payment Card Industry Security Standards Council (PCI SSC).  The purpose of this council is to align the goals of each of the Payment Card companies an industry wide security policy for merchants to follow.&amp;lt;/P&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Security System Development ===&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Requirements Specifications ====&lt;br /&gt;
An overview of the list of requirements needed to maintain Payment Card Industry Data Security Standard (PCI DSS) compliance is available here [https://www.pcisecuritystandards.org/tech/index.htm About the PCI Data Security Standard (PCI DSS)]. The full list of requirements is available here: [https://www.pcisecuritystandards.org/tech/download_the_pci_dss.htm Download the PCI DSS].  Below is the summarized list and an explaination of what each item means.  There are 12 major requirements which can be broken up into 6 categories.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Build and Maintain a Secure Network''&amp;lt;BR&amp;gt;&lt;br /&gt;
1.)Install and maintain a firewall configuration to protect cardholders' data&amp;lt;BR&amp;gt;&lt;br /&gt;
2.)Do not use vendor-supplied defaults for system password and other security parameters&amp;lt;BR&amp;gt;&lt;br /&gt;
* This set of requrements is meant to keep any network of computers which contain Card Holder information in a secure state&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Protect Cardholder Data''&amp;lt;BR&amp;gt;&lt;br /&gt;
3.)Protect stored cardholder data&amp;lt;BR&amp;gt;&lt;br /&gt;
* This requirement is meant to protect the card holder data while it is stored on merchant computers&amp;lt;BR&amp;gt;&lt;br /&gt;
4.)Encrypt transmission of cardholder data across open, public networks&amp;lt;BR&amp;gt;&lt;br /&gt;
* This requirement is meant to protect cardholder data when it might be necessary to transmit it accross a public network (ie when contacting the Payment Card server)&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Maintain a Vulnerability Management Program''&amp;lt;BR&amp;gt;&lt;br /&gt;
5.)Use and regularly update anti-virus software&amp;lt;BR&amp;gt;&lt;br /&gt;
* This requirement is meant to ensure that all merchants do take advantage of some form of anti-virus software.&amp;lt;BR&amp;gt;&lt;br /&gt;
6.)Develop and maintain secure systems and applications&amp;lt;BR&amp;gt;&lt;br /&gt;
* This requirement is meant to put security as a top priority during the development of software. This is an important requirement because many times when software is being designed, security is tacked on as an afterthought.  By at least making developers aware of security as being a requirement of their software, this ensures better quality of any security mechanisms built into the software.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Implement Strong Access Control Measures''&amp;lt;BR&amp;gt;&lt;br /&gt;
7.)Restrict access to cardholder data by business need-to-know&amp;lt;BR&amp;gt;&lt;br /&gt;
* This requirement is meant to ensure that only people who need to know about cardholder data have access to it.  This is similar to the principle of least privilege.  &amp;lt;BR&amp;gt;&lt;br /&gt;
8.)Assign a unique ID to each person with computer access&amp;lt;BR&amp;gt;&lt;br /&gt;
* This requirement is meant to add a level of accountability to all users on the system.  If each user has their own unique ID on the merchant's system, then actions can be tracked on linked to the person who did them.&amp;lt;BR&amp;gt;&lt;br /&gt;
9.)Restrict physical access to cardholder data&amp;lt;BR&amp;gt;&lt;br /&gt;
* This requirement is meant to extend the coverage of the PCI DSS to any form of Card Holder data which may not be on a computer.  Hence, the PCI DSS is extended to cover not only digital information but also physical coppies of the information.  However, this does not prevent the threat of customer data being stolen entirely.  There is nothing to prevent an employee from copying down information with a pencil and paper.  Though this is a problem, it is partially alleviated by requirement 7: Restrisct access to cardholder data by business need-to-know.  If only a small number of employees can access the Card Holder data, then it is much easier to track down who may have stolen Card Holder data if there is a security breech from the inside.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
''Regularly Monitor and Test Networks''&amp;lt;BR&amp;gt;&lt;br /&gt;
10.) Track and monitor all access to network resources and cardholder data&amp;lt;BR&amp;gt;&lt;br /&gt;
* This requirement is designed to catch any unauthorized accesses to cardholder data.  If an anomoly is detected, then the system should be able to detect it and steps should be taken to fix the problem&amp;lt;BR&amp;gt;&lt;br /&gt;
11.) Regularly test security systems and processes&amp;lt;BR&amp;gt;&lt;br /&gt;
* This requirement is meant to ensure that merchants don't just set and forget their security systems.  It reminds them that security is a fulltime job and must constantly be maintaned.&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
''Maintain an Information Security Policy''&amp;lt;BR&amp;gt;&lt;br /&gt;
12.) Maintain a policy that addresses information security&amp;lt;BR&amp;gt;&lt;br /&gt;
* Though this may seem a bit redundant, this is an important requirement.  It means that every merchant that deals with Cardholder Data must have their own security policy as well in order to protect cardholder data.&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Design/Implementation ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;P&amp;gt;There is no design or implementation specified in the PCI DSS.  This is because the application of this security policy is so broad that it is impossible to have one design that will work for every company.  For example Soney, which may handle millions of transactions a year, will need a different implementatino than a small &amp;quot;mom and pop&amp;quot; company, who may handle only a few hundred transactions a year.  However, requirements must still be met to some degree depending on the volume of Payment Card transactions which occur per given merchant. This makes the PCI DSS sound rather weak.  However, there is a way which the Payment Card Industry Security Standards Council can keep track of whether or not the requirements are being met.  This is through the use of QSA's and ASV's.&amp;lt;/P&amp;gt;&lt;br /&gt;
*[https://www.pcisecuritystandards.org/programs/qsa_program.htm Qualified Security Assessors (QSA's)] are companies who have been approved by the PCI Security Standrads Council to assess the compliance of merchants to the PCI DSS.  The way the PCI Security Standards Council does this is through a certification program.  This requires not only the company to be certified, but also all of it's employees to be certified on a yearly bases.&lt;br /&gt;
*[https://www.pcisecuritystandards.org/programs/asv_program.htm Approved Scanning Vendors (ASV's)] are companies who are approved by the PCI Security Standards Council to assess merchants' networks for security vulnerabilities.  They accomplish this by simulating both normal and abnormal processes on the merchants networks.  Again, ASV's must also be certified by the PCI Security Standards Council on a yearly basis.&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==== Operation and Maintenance ====&lt;br /&gt;
&lt;br /&gt;
== Summary ==&lt;br /&gt;
[[HaveFunWithCasWiki]]  :D&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
#{{note|PCS_SSC}}PCI SSC&lt;br /&gt;
&lt;br /&gt;
== See Also ==&lt;br /&gt;
[[Electronic Voting Systems]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Social engineering]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Piggybacking]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Identity Theft]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[The Mitnick attack]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Security and Storage Mediums]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Operating Systems Security]]&amp;lt;BR&amp;gt;&lt;br /&gt;
[[Honeypot]]&amp;lt;BR&amp;gt;&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/HaveFunWithCasWiki</id>
		<title>HaveFunWithCasWiki</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/HaveFunWithCasWiki"/>
				<updated>2007-12-02T03:22:14Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A group of individuals enjoying themselves.&lt;br /&gt;
&lt;br /&gt;
Tag yourself here:&lt;br /&gt;
&lt;br /&gt;
SJakubowski!&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/User:Cavaliaj</id>
		<title>User:Cavaliaj</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/User:Cavaliaj"/>
				<updated>2007-12-02T03:21:29Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Has been taken over by SJakubowski.&lt;br /&gt;
&lt;br /&gt;
Is rumored to have a horrible monitor that he will not upgrade from.&lt;br /&gt;
&lt;br /&gt;
Considers himself to be a &amp;quot;1337 g4m3r.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Has interesting presentations.&lt;br /&gt;
&lt;br /&gt;
Is a member of the [[HaveFunWithCasWiki]] group. Member 2/2.&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/HaveFunWithCasWiki</id>
		<title>HaveFunWithCasWiki</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/HaveFunWithCasWiki"/>
				<updated>2007-12-02T03:20:57Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;New page: A group of individuals enjoying themselves.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A group of individuals enjoying themselves.&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/User:SJakubowski</id>
		<title>User:SJakubowski</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/User:SJakubowski"/>
				<updated>2007-12-02T03:17:12Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Needs to work on his own wikipage, get pzed.&lt;br /&gt;
-Andrew!&lt;br /&gt;
&lt;br /&gt;
Drives a Miata. Enjoys posting amusing things on others wiki pages.&lt;br /&gt;
&lt;br /&gt;
[[Image:Turbo009.jpg]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Turbo009.jpg</id>
		<title>File:Turbo009.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Turbo009.jpg"/>
				<updated>2007-12-02T03:17:00Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;SJakubowski's New Snail.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SJakubowski's New Snail.&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/User:SJakubowski</id>
		<title>User:SJakubowski</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/User:SJakubowski"/>
				<updated>2007-12-02T03:15:21Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Needs to work on his own wikipage, get pzed.&lt;br /&gt;
-Andrew!&lt;br /&gt;
&lt;br /&gt;
Drives a Miata. Enjoys posting amusing things on others wiki pages.&lt;br /&gt;
&lt;br /&gt;
[[Image:Turbo_009.jpg]]&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/File:Turbo_009.jpg</id>
		<title>File:Turbo 009.jpg</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/File:Turbo_009.jpg"/>
				<updated>2007-12-02T03:14:34Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;SJakubowski's New Snail.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;SJakubowski's New Snail.&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud.</id>
		<title>Smart Card technology to prevent fraud.</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/Smart_Card_technology_to_prevent_fraud."/>
				<updated>2007-12-02T03:12:56Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;/* General Tips to Prevent fraud */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Smart Card technology to prevent fraud is a summary of various ways that fraud can be prevented using smart cards. This wiki page mainly deals with fraud in Visa and Debit cards.&lt;br /&gt;
&lt;br /&gt;
== General Facts about fraud ==&lt;br /&gt;
* Data Protection&lt;br /&gt;
* Ease of Use&lt;br /&gt;
* Easy to Transport Information&lt;br /&gt;
* Relatively Cheap and Efficient&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Facts about Smart Cards ==&lt;br /&gt;
\affas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Problems with Smart Cards ==&lt;br /&gt;
dsfds&lt;br /&gt;
&lt;br /&gt;
== Future of Smart Cards ==&lt;br /&gt;
fsdf&lt;br /&gt;
&lt;br /&gt;
== General Tips to Prevent fraud ==&lt;br /&gt;
*Hide your PIN&lt;br /&gt;
*Watch for signs of tampered card readers&lt;br /&gt;
*Don't lend out your Credit card or Debit Card&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/User:Cavaliaj</id>
		<title>User:Cavaliaj</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/User:Cavaliaj"/>
				<updated>2007-12-02T03:10:29Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;New page: Has been taken over by SJakubowski.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Has been taken over by SJakubowski.&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	<entry>
		<id>http://wiki.cas.mcmaster.ca/index.php/User:SJakubowski</id>
		<title>User:SJakubowski</title>
		<link rel="alternate" type="text/html" href="http://wiki.cas.mcmaster.ca/index.php/User:SJakubowski"/>
				<updated>2007-12-02T03:09:44Z</updated>
		
		<summary type="html">&lt;p&gt;SJakubowski:&amp;#32;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Needs to work on his own wikipage, get pzed.&lt;br /&gt;
-Andrew!&lt;br /&gt;
&lt;br /&gt;
Drives a Miata. Enjoys posting amusing things on others wiki pages.&lt;/div&gt;</summary>
		<author><name>SJakubowski</name></author>	</entry>

	</feed>