Adult Websites

Kenhelms

New Member
Reaction score
0
Lets be honest here, when you see a customer with chronic infections from these, or they flat out tell you what they look at....

do you suggest to them the "safer adult" websites?

I had a handful of customers that they were honest and told me what they look and after I gave them a couple of links, no more infections.
Just wondering if you guys have ever done the same?

These were customers that were honest with me and I had built a rapport with as well, not random joe types.
 
I always tell customers they get what they pay for. You can't get dirty mags for free, so why would you expect to get video for free?:p
 
I must admit I have recommended a porn site to two clients in the many years I have been doing this. One of them being a female (strangely enough) who ASKED for a safe one.
And the other guy just kept getting infected from porn sites even with patches, antiviruses etc.. all fully active. Im not going to stop him from looking at porn, but I could direct him to a safe site. Both of these clients I knew fairly well and I would classify them as good clients. I definintely wouldnt say it to just anyone.
 
I simply tell the client that any sites that men go to, such as sports, gambling and porn, all suffer from malware and are best left alone. If you must visit sports sites, keep it to national sites like CNN. I never offer alternative sites for porn or gambling.
 
I think I would if someone asked. It's better to ensure that someone is surfing safely rather than taking risks on dodgy sites :)
 
I don't mean to harp on this, but have any of you setup their customers with SandboxIE? It works with FF and email clients and any program you wish to sandbox. This is much lighter weight than setting them up with VMWare. When they quit, they can just delete the sandbox and it's all gone, so no malware.

http://www.sandboxie.com/

-- Patrick B.

I've used it briefly but not enough to become really familiar with it. I've thought about coupling it with a portable version of Firefox and recommending that for risky surfers. This way they can still have full use of their regular browser. Has anyone tried that?
 
I've never tried it so I've never thought about it but now I have to add that to my list of tools to try.

@PatrickB, Good idea, thanks.
 
I have not tried it with portable Firefox, but it works great with installed Firefox. I don't believe you would need portable FF since Sandboxie contains everything in a sandbox.

For a lot more details, read or listen to episodes 172 and 174 of Security Now:
http://www.grc.com/securitynow.htm

-- Patrick B.

Here's a potential scenario:

User logs on using Sandboxie and his regular browser. Suppose he downloads a keylogger while visiting a risky (porn) web site. Then, during this same session, he visits his banking web site and logs in to check his balance. Has this user's credentials been compromised?
 
I don't really think a keylogger will work in Sandboxie. It blocks several things by default and I think if the keylogger was able to actually insert a keyboard hook, then it would be on the system and not just the sandbox. I do not know, or really think, that Sandboxie can mess with a global keyboard hook to only log applications running inside of it's sandbox.

If it can, then I would consider the sandbox compromised just as it would be inside a VM.
 
VMware is the way to go here. use a livecd so there's no OS to buy and take a snapshot when they have all the codecs and players installed. set it to revert when they close, just hope they remember to use it.
 
I just tried a key logger with sandboxie and could not get it to work. I will do further testing this weekend when I have some free time. Good question.
 
Thanks for doing the testing Ken. I expect the keylogger will work if it was installed outside of Sandboxie. If it arrived inside of the Sandbox, then I expect it will not work.

That is the whole point of Sandboxie; malware that comes in via a sandboxed program like Firefox, Thunderbird, Internet Explorer, Microsoft Mail, etc -- is "sandboxed" and will not survive deletion of the sandbox, and will not be allowed to affect the system outside of the sandbox.

VMWare would also be a great way to go.

Any container may have flaws. Sandboxie may not be perfect. VMWare has definitely had exploits that let malware get to the host machine. Other sandboxes/virtual machines also would have issues. However, using them puts one more layer between the user and the bad guys.



Security is never perfect. I see it as how many reasonable layers we can get between us and them.
  1. Patched OS
  2. Patched programs
  3. Hardware firewall
  4. Software Firewall
  5. Antivirus
  6. Antimalware
  7. More secure browser
  8. Helpful add-ons like WOT and NoScript
  9. OpenDNS or other DNS server with appropriate block lists
  • But most importantly, educated users that practice safe Web habits. This is the hard part since end-users cannot know everything that we know, so they will make misinformed decisions.
    • Don't open unexpected attachments
    • Don't click on links in email
    • Don't reply to spam or click on any of its links
    • Don't buy anything from spam
    • When forwarding those cute emails, use the BCC field instead of TO or CC so that your address book is not made public
    • Don't click on "YOU MAY BE INFECTED" warnings
How in the world can end users know how to answer firewall popups asking if they want to allow a program access or not? I have seen them block system processes and allow malware. They just do not know. Shoot, sometimes I do not know unless I Google it first.


-- Patrick B.
 
To everyone who has posted on this thread : My hat goes off to you all ! I have always shied away from such a scenario , more out of delicacy than anything , and for those who have given safe advice for one of the most common online activities in such a way that no embarrassment is caused to either party , I say to you that you have shown the human side of customer relations to a degree most of us would shy away from. I have learnt something from this post. Thank you. :o
 
In this profession, it is our job to keep people safe online. If we are able to educate our clients without alienating them, we will be far more successful in our careers and in our objective of keeping our clients safe.
 
<JOKE>
Why not add it to your list of services ?
Safe Porn Site Referrals: $49
</JOKE>

If I educate someone on what porn sites to go to that aren't infected then I'm shooting myself in the foot.

'You pay for what you get'.

A full 3-hour DVD costs under $5 delivered to your door. But there willing to risk it and pay me $XX amount every month or two to go on risky sites that usually have 'sample' videos (less than 1 min usually)? (Go to the right place and it will be posted in a blank envelope with nothing relating to the company you purchased it from)

Thats what I tell them anyway; go spend a few bucks, because your paying me X times the amount to fix it so you can go look at more.. lol

@Patrick
Do you have a 'whitelist' for NoScript?
It got to painful for me lol; and I googled for a whitelist but to no avail.
I thought there might be a few out there; like the ones for ABP (AdBlockPlus).
 
@Methical

An individual's whitelist for Noscript appears to be kept in Firefox's prefs.js file located in APPDATA%\Mozilla\Profiles\mely0242.default/

It appears to be in the "paragraph" near the top starting with:
user_pref("capability.policy.maonoscript.sites",

http://noscript.net/faq#qa2_4
http://kb.mozillazine.org/Profile_folder

Daifne could probably tell you more confidently than I can.

A shared whitelist could fall into the hands of the bad guys who could then target those particular sites to compromise them. I have found it very simple to click on the NoScript icon in FF and select to temporarily allow or always allow a site. Even if you allow scripts globally, you still get the Clearjacking protection.

If you have much more on this topic, let's move it to a new thread. :)

-- Patrick B.
 
Back
Top