Just ran into this thread and I agree %100 with Steven1 and like I have said in many previous post, if you use one of those community/lobby/hotel/public computers you should assume that everyone else can see your data. I think that they are a great tool if you need to do a quick Google search or just get some directions. Anything that requires a logon should be done from your own personal computer.
They are some interesting posts,
Irish Drifter wrote:
Almost all software in Costa Rica is pirated and has become sophisticated enough to be able to fool Windows into thinking the copy is a legitimate licensed version.
This is true; hackers are getting better at fooling the licensing programs. The problem is that they are also getting better at adding code to the pirated software and this is what Steven1 is referring too. Just because you are able to patch the OS, it still a compromise OS. Unless you know where the piece of code resides and be able to delete and recompile the code, then you are toast.
Miamiheller wrote:
When using public computers at Internet Cafes, I always set the PC to boot from USB and then reboot it with my PC on a USB drive plugged in.
That should defeat most keystroke loggers and malware (except for HW based solutions).[ /quote]
Like you mention, useless against a HW solution and useless if the router/ISP has its own static IP format. Would work only with most basic network setup.
TheMadGerman wrote:
The only public computer systems i've seen that are safe are the ones where they re-image the drive after every session. Those work nice, and i've seen them in use in many public internet cafes in europe and the US, but not generally in small cafe's or hotels.
MadGerman, I do not think you know what you're talking about. Well, you kind of do, but you don't know as much as you think you do.
The drives are not re-imaging, it is impossible, it would take too long in between logon sessions. I do this for many medical kiosks in which doctors have to logon and get medical histories. We just boot up to the same image that although you able to “update†on the fly is just a temporary entry that gets destroy/wash after every logon/boot.
Still that does not solve any of the keyloggers issue, HW or software based because the keyloggers can install itself on every logon/boot on the infested machine. And you are also assuming that the original image is not already compromise.
Gringotim wrote:
Why don't the so called 'IT techs' there run Ad-Aware, Spybot, etc. on a daily basis? I guess that would be too much work for them.
Great question. Although this will be one of the most basic IT function to do, I doubt many of this places even commit themselves to do it. Why? It cost money. How many of this places will have an IT guy 24/7. And even if they automate the function, what then when something pops-up? Monitoring needs to be in place and that cost mucho dinero.
To summarize, guys use public computers at your own risks. I agree that buying one of those netbooks, now under $300 might be the best investment you can make to keep your information safe.