13 October, 2010

Firewall with Windows - can use Windows as a firewall

You may not know it, but Windows has a very capable firewall built right in. To access it, run the Microsoft Management Console. You can do this by opening up a Run dialog, typing mmc, and clicking the OK button. After the program loads, you should see Microsoft Management Console.
Microsoft Management Console


Click on the Console menu and select the "Add/Remove Snap-in..." menu item. Next you should be presented with a dialog that has an Add button at the bottom. After clicking the Add button, you should see a dialog box with a list of available snap-ins. Scroll through the list and locate the item titled IP Security Policy Management. After you've selected this, the dialog box should look like:

Adding the IP Security Policy Management
 
Now click the Add button. You'll be presented with a dialog asking whether you want the snap-in to manage the local computer or a domain. Determine whether you want to apply the filtering settings to just the local computer or the entire domain, and click the Finish button. Click the Close button in the Add Standalone Snap-in list dialog as shown in Figure Adding-the-IP-Security-Policy. You should now see the IP Security Policies snap-in listed in the Add/Remove Snap-in dialog, as shown in Figure Snap-in-dialog-with-the-IP. Click the OK button and you'll be returned to the original Management Console window. You should now see the IP Security Policies snap-in listed in the window.

Snap-in dialog with the IP Security Policies   
Before setting up firewall rules, you'll need to create a block action for them to use. To do this, right-click the IP Security Policies icon and select the "Manage IP filter lists and filter actions" item. After the dialog appears, click on the Manage Filter Actions tab. You should now see something similar to Figure Manage-Filter-Actions-tab.

Manage Filter Actions tab

If the Use Add Wizard checkbox is not checked, be sure to check it. Now click the Add button. Click the Next button after the wizard dialog opens. Then type, "Block" for name of the new filter action. For the description, type "Blocks Access" or something similarly appropriate. After filling those in, click the Next button. Now click the Block radio button, and then click the Next button once again. After that, click the Finish button. You should now see the new filter action in the list that was shown in Figure Snap-in-dialog-with-the-IP. You may now click the Close button.

Now you can set up the firewall rules. Right-click the security policy icon and select the Create IP Security Policy item. This will bring up a wizard. Click the Next button and fill in the Name and Description; a good choice for both of them would be "Firewall". After filling those in, click the Next button. You should now see a checkbox labeled "Activate the default response rule". Uncheck this box and then click the Next button. After that, click the Finish button. You should now see a dialog called Firewall Properties, as shown in Figure The-Firewall-Properties-dialog.
 
Firewall Properties dialog
To create a new filtering rule, uncheck the Use Add Wizard box and click the Add button. You should now see a dialog box that looks like Figure Adding-a-new-rule.
 
Adding a new rule
To select the IP addresses to match on, click the Add button in the IP Filter List tab. This will also let you define ports and protocols to match on. After you have selected the IP addresses and ports you want the rule to apply to, click the Filter Action tab and choose your selections from the list of actions.

Windows Firewall protects your computer by blocking communications that might actually be dangerous software trying to find a way to connect to your computer, rather than communications from a person or program you want to interact with. Windows Firewall is smart enough to allow connections from computers in your home and to block those connections from computers on the Internet.

 

07 October, 2010

Password Recovery Toolkit (PRTK™)

The AccessData Password Recovery Toolkit (PRTK™) gives you the ability to recover passwords from well - known applications. PRTK is perfect for law enforcement and corporate security professionals. The Password Recovery Toolkit can analyze an entire hard drive to locate encrypted and password protected files. Easily generate reports listing protected file information and their corresponding passwords. Each PRTK includes a license disk, which restricts unauthorized use.
Password Recovery Modules

AccessData has a wide variety of individual password breaking modules that can help you recover lost passwords for almost every product in the industry.


Individual Password Breaker Modules: MS Access, ACT! , Ami Pro, Approach, ARJ, Ascend, Backup, Best Crypt, Bullet Proof FTP, Cute FTP, Data Perfect, dBase, Encrypt Magic Fldr, Excel, FoxBASE, File Maker Pro, Lotus 1-2-3, Mail (MS), MS Money, MYOB, My Personal check Writer, Norton Secret Stuff-Organizer, MS Outlook, Palm-Paradox, PGP Disk File 4.0, PGP Secret Key Ring, Pro Write, Project (MS), WinZip & Generic Zippers, Q&A, Quattro Pro, QuickBooks, Quicken, WinRAR, Scheduler+, Symphony, Versa Check, MS Word, WordPerfect, Word Pro, Adobe PDF, Win95/Win98 PWL Files , IE Content Advisor, WE_FTP , Netscape Mail , Source Safe , PC-Encrypt.

Read More

05 October, 2010

What to Do About Password Attacks

Password Attacks is the classic way to gain access to a computer system is to find out the password and log in. The growth of the Internet has created unlimited opportunity for these intruders to steal secrets, tinker with Web sites, abscond with credit card information, or just generally make mischief. A Password hackers approach their craft from a number of motivations. Their goals might differ, but they all have the goal of gaining power and control of a computer system or network. Many of their intermediate steps are therefore the same. Read More

01 October, 2010

Cloud Web Hosting

Nowadays various types of web hosting solutions are available in the market, like shared web hosting, dedicated web hosting, virtual web hosting. When the cloud computing concepts introduced there are significant change in the way of web hosting infrastructure. All popular websites are now using cloud hosting, and the service is spreading to smaller sites as well. Cloud hosting is a better way to run a website, instead of on a shared server space. Read More

29 September, 2010

Computer Virus, Worm and Trojan Horse

Computer viruses, worms and Trojan Horses are all malicious programs that can cause damage to your computer, but there are differences among the three, and knowing those differences can help you to better protect your computer from their often-damaging effects. Read More

28 September, 2010

Private Browsing: Not enough to protect all your Internet activity

 Most modern browsers have a private or incognito mode. "InPrivate Browsing" in Internet Explorer, "Incognito mode" in Chrome, and "Private Browsing" in Firefox and Safari all strive to do the same two things: make it impossible for users of the same computer to figure out which sites the browser has been used to visit, and make it impossible for sites to know whether or not a particular user has previously visited them.

Research by Stanford University to investigate the privacy of the "private browsing" feature of many Web browsers suggests that the tools aren't all that private after all, and that many kinds of information can be leaked by browsers when using the mode. The paper is due to be presented at the USENIX security conference.


Normally, browsers are remember a fair bit about where you have been and what you have done online so that it can make your browsing easier: auto-filling Web forms, making it easy to get back to sites you have visited recently, caching frequently loaded content to speed up sites. Read more

22 September, 2010

Flash Cookies and Consumers Privacy

A recent study called "Flash Cookies and Privacy" reports that, now days growing the number of consumers who are taking legal action against company that track computer users’ activity on the Internet. At issue is a little-known piece of computer code placed on hard drives by the Flash program from Adobe when users watch videos on popular Web sites like YouTube.
The technology, so-called Flash cookies, a new way of tracing your movement and storing a lot more information about you than with normal cookies. Unlike HTML cookies, which store Web site preferences and can be managed by changing privacy settings in a Web browser, Flash cookies are stored in a separate directory that many users are unaware of and may not know how to control. Normal HTTP cookies can’t save more than 4 Kilobyte of data while Flash cookies can save up to 100 Kilobyte.   Read More

18 September, 2010

DownloadHelper: Easy way to download YouTube videos

Download Helper is a free Firefox extension for downloading and converting videos from YouTube like sites with minimum effort.  It’s also purpose to capture image and audio clips from many sites. Using DownloadHelper, you can easily save videos from most of the popular video sites like MySpace Video, Google videos, DailyMotion, Porkolt, iFilm, DreamHost and others.
Read More

17 September, 2010

Difference between 32 and 64 bit operating system

Many people confused about what operating system they should purchase 64 bit or 32 bit. Most peoples are running Windows XP or Vista in its 32-bit version. But as hardware gets cheaper, people are curious of what the 64-bit operating system has to offer. This article may help you to choose the correct operating system. So, what is the difference between 32 and 64 bit operating system?

The word "bit" refers to the way computers deal with information in binary, where all data are listed, as a string of digits that can either be a 0 or a 1. Each of this digit is known as one bit, meaning a 32-bit processor can process 32 digits at once. Read More

What’s new in Internet Explorer 9?

Microsoft has released a beta version of its latest web browser, Internet Explorer 9 (IE9) on September 15, 2010. Microsoft IE 9 has included new and improvised features to enhance the user experience, and increase browser speed. Microsoft says that IE 9 is designed to be the most trusted browser as it has a robust set of built-in security, privacy and reliability technologies that keep customers safer online.

IE9 contains a range of new features; many features will be familiar to users of other browsers like Firebox and Chrome.


What’s new in Internet Explorer 9?  Read More

15 September, 2010

Free Web Hosting with PHP, MySQL and Ftp

Web hosting can play a significant part in helping you start your own website. A good web host will also have a services and software that can take care of the site building for you. Are you Looking to make a free website? When creating a website or simply a blog, many of us tends to depend on those free web hosting services offered by many of the free web hosting providers around the internet. If you want to have your own website but do not have the idea yet on which free web hosting service provider to use, we are highly recommended to use Freewebhostingarea.com. This site offers you a free web hosting area in which you will be able to place your web site on them and have more people viewing them.




Freewebhostingarea.com
  Read More -->

11 September, 2010

Google Instant - Instant Search as you Type

Google Instant is a new search enhancement that shows results as you type. Google Instant helps users find information faster by showing relevant results as a query is typed. As users get this immediate feedback, they're able to refine their searches more quickly and find the results that more precisely match what they need. As a result, we expect increased user engagement with our search services, including ads.






Features in Google Instant:

Dynamic Results – Google dynamically displays relevant search results as you type so you can quickly interact and click through to the web content you need.

Smarter Predictions – Google’s auto complete technology to show predicted search terms in a drop-down box, and begins to display search results below the drop-down.

Faster searches – Smarter predictions that help guide user searches, and instant results that let the searcher see results without clicking a search button or pressing enter. (It saves 2-5 seconds per search according to Google research)


Safe content filtered - Queries that may be considered offensive or lewd don’t work in Google Instant. In these cases, Google stops showing search predictions and search results, and instead displays a “Press Enter to search” message below the search box.


 
 
 
 

10 September, 2010

How to delete Internet Explorer History Permanently

Internet history can be helpful in remembering past visited sites and having shortcuts to your favorites, but it is not always an option we would like to have. There are many things that Internet users want to keep private, ranging from what sites they visit to what information they enter into online forms. The reasons for this can vary, and in many cases they may be for a personal motive, for security, or something else entirely. It doesn't take too much to learn how to erase Internet history, commonly known as clear history. This will keep your computer clean, secure and running up to speed.


If you follow the steps outlined here, you will be able to browse the Internet more inconspicuously.


09 September, 2010

These days’ computers are becoming more and more of a media hub for users to watch movies or television shows on. In the recent years lot of video formats have emerged, each having its own advantages. Most of users switched between the media players including VLC and Media Player Classic, as their preferred media player. When new codecs were initially introduced, users mostly had to download a compatible media player to go with it. A particular media player used to be the best option for a certain codecs. So we need to install multiple media players on our computer to play the particular types of codecs. Today the most leading media players are capable of playing almost all video formats. SPlayer is one of these types and excellent in supporting the wide array of media formats.

SPlayer-Screenshot

SPlayer contains a decent number of video and audio filters. It also includes something called EyeCare. There are other helpful features such as options to rotate the video and adjust the brightness/contrast of the video.

Google has announced a new Google Mobile YouTube

Over at the Google Mobile Blog, Google has announced a new Google Mobile YouTube channel, with a pretty cool UI with fresh look that includes video box, which rotates along multiple axes. ....Read More





08 September, 2010

What to Look For in Internet Browsers


Internet Browser is a kind of professional software that can enable you to surfing Internet for various usages, like media, research, communication, shopping and entertainment and so on. Choosing one better Internet browser is the key to improve your browsing experience. Reviews say the latest versions of all the major Internet Browsers are equipped with the latest feature and technology to simplify, accelerate and helping you get the most from the web. The newest features include tabbed browsing, RSS feeds, skins, informative and fun widgets and additional add–ons.  



internet browser rank

06 September, 2010

Samsung advertises the new Galaxy Tab

Samsung advertises the new Galaxy Tab, a tablet computer running Android 2.2 that will be available from October 2010. The tablet can be used to surf the Web, watch movies, read e-books, and navigate using GPS. The Galaxy Tab has a 7-inch touch screen with a resolution of 1024 by 600 pixels, and a 1GHz Cortex A8 processor with 16GB of integrated storage. There is also a Micro SD card slot that can expand the storage capacity with another 32GB. Read More...





Samsung Galaxy Tab

02 September, 2010

Get through your email faster with Gmail Priority Inbox

Google has announced a new feature of Priority Inbox for Gmail. Gmail has always been pretty good at filtering junk mail into the “spam” folder. But today, in addition to spam, Priority Inbox is like your personal assistant, helping you focus on the messages that matter without requiring you to set up complex rules. Priority Inbox can help save you time if you’re overwhelmed with the amount of email we get. It attempts to automatically identify our important incoming messages and separates them out from everything else.   Read More

29 July, 2010

Identity Theft

Identity Theft :- It could happen to you
Identity theft is a form of fraud in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The victim of identity theft can suffer adverse consequences if they held accountable for the perpetrator's actions. Organizations and individuals who are duped or defrauded by the identity thief can also suffer adverse consequences and losses, and to that extent are also victims.

Identity theft is not always detectable by the individual victims, according to a report done for the FTC. Identity fraud is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs.

Identity thieves might want to impersonate someone else for a couple of reasons. In one form of the crime, an opportunistic thief obtains several pieces of information about a victim and uses the information to obtain goods or services for free, for a short period of time. For instance, the thief opens a credit card account using your Photo Ids and Proof of Residence, name, and address, and then the thief makes several purchases.

Another form of identity theft involves someone with the goal of long-term Impersonation. For instance, someone opens a bank account in your name and then has the statements sent to his own location instead of yours. Another example of this type of crime involves someone obtaining mobile SIM connection by using fake/stolen documents. These mobiles could be used in any disruptive activities including terrorist activities. With almost every major terror investigation revealing the use of SIMs procured on the basis of fake Ids. Unfortunately, there is no central database of mobile subscribers. So you cannot check if any other mobile number has been issued in your name.

Types of Identity Theft

Financial fraud :- This type of identity theft includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more.
Criminal activities :- This type of identity fraud involves taking on someone else's identity in order to commit a crime, enter a country, get illegal mobile connection, hide one's own identity, or commit acts of terrorism. These criminal activities can include: Computer and cyber crimes.

How you can protect yourself

1) Be Informed and Up-to-Date :- We use photo ids and proof of address copies in every day life from getting phone connection, open bank accounts. Have you ever realized that the same photo ids can be put to misuse and lead you to troubles? Always cross the photocopy of the identity proof you give to bank, mobile company e.t.c. And write over it as 'given for bank…for identity verification on this date… '

2) Avoid becoming another Hopeless Victim of Identity Theft:- Identity theft occurs once a thief assumes another person’s identity by using confidential information supposed to be known exclusively by that person. The thief will commit fraud using the person’s name, addresses, date of birth and important confidential

3) Ways to Protect Yourself from Computer Identity Theft:- Identity theft is considered as a huge problem in our society. Since everyday, there is an increase in the number of user of Internet and most people consider computer, as a big part of their lives, there is also an increase of cases of identity theft. Individuals who are new in using the Internet sometimes become to victim to computer identity theft systems. In most cases, the people involved in the identity theft systems use your credit cards to buy supplies and merchandise for themselves.