Page

Tuesday, March 10, 2009

How to Use Google Chrome For Secure Web Surfing by Default

If you have ever shared a log on or computer for your web browsing you'll know how annoying it can be not to have secure web surfing. Organize a surprise party or weekend away and then a list of hotels appears in your partners browser next time she logs on. It's almost like you share a common surfing history in the house.

Let's face it perhaps you don't want your kids to visit all the same web sites as you!

There's nothing ground breaking in Chromes Incognito mode but it is a very useful feature. Switch to Incognito mode and your web surfing instantly becomes a little more secure.

This is how you can use Chrome for secure web browsing, simply right click on the Chrome Shortcut on your desktop, select properties and you should see the shortcut menu appear.

1) Right Click on Chrome Shortcut on Desktop
2) Select Properties
3) On Shortcut menu add the following to target shortcut menu -incognito

Therefore every time you start Chrome using that shortcut now you will be in 'incognito mode'. If you just want to use this mode occasionally then you can select a 'incognito' windows from the file menu.

All the web sites you visit are now not recorded in your history, all cookies are deleted when you close. There's no trace of the web sites stored on your computer at all. Most of the browsers offer similar functionality now but most have to be done manually (so people forget). Overall I guess Firefox with it's multitude of plug-ins and open source model will hopefully produce the ultimate secure browsing. I'll have a look at these options in a later article.

Of course, it's a long, long way from real secure web surfing, we still use HTTP which means your browsing is in clear text. Your browsing history and IP address are also stored on the web site you visit, on the ISP logs. But it is a start and at least can keep your PC holding a huge list of your web browsing.

If you want the ultimate secure browsing, have a look here - Secure Surfing Protection

Try the new free demo of Identity Clocker on the link below.

Anonymous Surfing Program

Take care and stay safe.

Article Source: http://EzineArticles.com/?expert=Jim_Rjindael

Can Google Chrome Help Secure Web Browsing?

If you have to share a computer either at home, work or school then you'll soon realize that you leave a trace of your web history on the computer each time you use it - it's not exactly secure web browsing. This can be quite annoying at times, if you're trying to arrange a surprise, buy a gift then leaving a trail of web sites behind you can slightly give the surprise away.

There is of course even more serious side when so many of use the internet for lots of private stuff like banking, investments or research. Using a shared computer has a lot of risks to it so most of the browsers are introducing features to deal with this.

Google's Chrome browser has probably the most advanced of these features at the moment although there isn't a lot in it with IE and Firefox both offering similar features. The privacy mode in Chrome is called Incognito mode and it can help your web browsing become a little more secure.

To enable Chrome's Incognito mode just select a new incognito window from the file menu. Then all your web browsing is slightly more secure, no cookies are stored, no logons cached and history maintained on the PC you are using.

If you want to start this mode automatically follow this procedure.

1) Right Click on the Chrome Shortcut on the desktop
2) Click on Properties
3) On the Shortcut - just add the following to the target line -incognito

(make sure you leave a space and add outside the inverted commas)

Then every time you start Chrome using this shortcut it will run in incognito mode. This will prevent any details of your browsing being left behind on your computer and all the cookies will be automatically removed. There are unfortunately many other traces of your web history so this is not totally secure web browsing but it is an important step.

Of course, it's a long, long way from real secure web surfing, we still use HTTP which means your browsing is in clear text. Your browsing history and IP address are also stored on the web site you visit, on the ISP logs. But it is a start and at least can keep your PC holding a huge list of your web browsing.

If you want the ultimate secure browsing, have a look here - Secure Surfing Protection

Try the new free demo of Identity Clocker on the link below.

Anonymous Surfing Program

Take care and stay safe.

Article Source: http://EzineArticles.com/?expert=Jim_Rjindael

A Guide to Choosing Internet Privacy Software

It can be quite confusing looking at the various types of internet privacy software on the market today. Hopefully I can clarify some of the features to help you decide what is right for you.

First of all I should perhaps clarify the two major types of privacy software that is available. The first group protects your local PC and information stored there, this includes the web browsing history, cookies, local images and files associated with your internet surfing. The idea behind this software is that when you delete or remove these traces of your surfing they are not completely destroyed.  With the right technical skills it is possible to recover these details. You'll mostly find this group of software focusing on evidence removal and destroying local traces of your browsing.

Before you spend lots of money on software like this remember that most of the browsers now have increasingly impressive privacy feature built in. Read up about things like Chrome's Incognito mode for instance which supposedly doesn't store any data locally on the PC when you browse.

The second group of products in the internet privacy software market is those that protect your connection and privacy online. You may not be aware but every time you use the internet absolutely everything you do is logged and can be traced back to your computer via it's IP address.  Every web request, every email or message is initially logged at your ISP (Internet Service Provider) - this is by far the most complete record of all your online activities. Next you leave a record in every web site you visit where your IP address is also recorded, finally the vast majority of your browsing happens in clear text so it can be picked up, logged or intercepted anywhere on it's journey around in the internet.

The internet privacy software products  in this area tend to focus on one or two of these areas but you should really protect against them all.  Here's a summary of points you should look for

1) Encryption - if the product doesn't encrypt your connection then you all your details and browsing will be logged at the ISP (a proxy doesn't help with this)

2) Anonymous Proxies - to protect your IP address being logged by the web servers you visit, you'll need to surf via a proxy server.  Make sure the software doesn't just route your connection via a free anonymous proxy on the internet - these are extremely  unsafe and very often used by identity thieves to steal data.

3) Speed - often overlooked and another reason why you shouldn't use free proxies.  Make sure that there are fast private proxies that you can surf at normal speed.

Hopefully this has given you an insight into some of the features that you should be aware of when looking to purchase internet privacy software, there are lots of options make sure you buy the one that's right for you.

If you want to see how the most secure browsing solution available on the internet - you can try the trial version of the software I use to protect my identity - Identity Clocker.

Anonymous Surfing protection

Article Source: http://EzineArticles.com/?expert=Jim_Rjindael

How Secure is Your Surfing - Is Your Browsing Encrypted?

So have you actually every thought about how secure your surfing is? Do you know if your surfing is encrypted, you probably know that if you see that little padlock that you have some sort of security, but how much.   Well the truth is that there is a basic insecurity with browsing the web which is because it was developed for speed not security.

The majority of our web browsing happens through something called HTTP (Hyper Text Transport Protocol), this is a language used to request and receive information through our web browsers. It is an incredibly efficient language and it allows us to send and receive information quickly with little to no overhead.   It is one if the reasons behind the success of the internet, after all for the first years of the life of the internet, people were using very slow connections.  My first modem was a 14.4k model, it would probably take about 10 minutes to load the average web page nowadays but it was reasonably responsive.

HTTP is actually a clear text protocol so it doesn't encrypt, secure or protect your data in any way, it is all transported in clear text.  Anyone one the same network as you can clearly read all the information that passes through HTTP, web sites, logins, password you name it's all visible in logs, in the ether and across the wires.  It's not HTTP's fault though it was never designed to provide any security.

Of course if you see a little padlock on your browser somewhere you'll be a little safer this is when your surfing is protected and encrypted.  This is the sign you're using HTTPS which is a secure version of the protocol, you'll notice in the address bar your HTTP turns to HTTPS on a secure site.   Of course you can't choose when to use HTTPS you are dependent on the server you visit, which is unfortunately the case with most security on the internet - you are reliant on other people.

Always remember the trail you leave behind you when you are surfing, everyone can be traced back to their IP address. Your ISP logs your every web site visited, picture downloaded and movie watched.  Combine this with the servers you visit logging your address and all the other places your browsing is logged and you can see the potential for security problems.

So remember without the padlock you're using HTTP and so your connection, account names and passwords are not encrypted and are readable by anyone.  Never enter sensitive or confidential information on any web site which is not secured.

To see which software I use which offers a full encryption, private proxies and total privacy check out the links below.

Online Surf Protection

Try the new free demo of Identity Cloaked on the link below.

Anonymous Surfing Demo

Take care and stay safe.
Jim

Article Source: http://EzineArticles.com/?expert=Jim_Rjindael

Monday, March 2, 2009

JMD - Laptop Display Setting in to another Monitor

http://www.pratimatrust.org, http://jmdcomputer.blogspot.com, pcshi, pratima computer eduication center, mehsana, gujrat, gujarat, india, hindustan, black screen, blue screen, buy computer,buy pc, cheap computer, cheap, omputers, cheap laptop, cheap laptops, compaq computer, computer, computer accessories, computer atx, computer cases, computer com, computer components, computer desktops, computer equipment, computer gaming, computer hard drive, computer hardware, computer laptop, computer laptops.

Saturday, February 28, 2009

Are You Smart Enough For A Smart Phone?

Get ready; the smart phone might just be the next "Must Have" tech device. Don't laugh, this may be truer than many of us realize or would like to believe. Why? Mainly because the smart phone fulfills our ever increasing need for a mobile device that gives us all the features of a laptop/internet/phone in one small package. We want it all and we want it small. Go figure! For regardless of the size of our brain cells, we all need a small communication device that keeps us constantly connected no matter where we are. Connected to friends, family or business via a phone and the Internet. Totally connected to our lives and our sense of "self". So will you pass the smart test when it comes to smart phones? Or are you still scratching your head, wondering why you would need another techno gizmo cluttering up your life? If you're still wondering, here are seven reasons or factors why it would be smart for you to consider getting a smart phone.

1. PDA and Cell Phone Combo
A smart phone is really a combination of a cell phone and a pda. You get the best of both worlds: a cell phone and the functions of a pda in one simple small device. Smart phones can come in different designs: candy-bar, clamshell, slider and flipper. A smart phone offers many pda-like features but keep in mind it is still more like a mobile phone than a dedicated PDA, which offers larger screens and more applications. A PDA is more like a small computer or laptop than a cell phone. As technology becomes faster and smaller one can expect smart phones to become more like a dedicated PDA, offering more applications and more functions of a conventional handheld in a smaller package.

2. Mobile Convenience
Perhaps the greatest advantage of having a smart phone is the mobility it gives you. You can stay in constant contact with all your friends, family or your work. For mobile professionals it can be a very convenient and practical way to stay in contact with your work.

3. Laptop Mini-Me
The smart phone and especially the Pda phone can be a simple laptop that you can take anywhere. This device can take the place of a small laptop keeping you connected via phone and the Internet to all the information you need. Extremely useful for students and in-the-field professionals such as real-estate agents, builders, architects... Although they are slightly different creatures, the line between a Pda Phone and a Smart Phone is blurring real fast. Smart phones are usually smaller and offer less features than a Pda phone which is more related to a PDA (Personal Digital Assistant) or a Handheld PC.

4. Entertain me
Increasingly; these smart and pda phones come equipped with countless games, MP3, camera, video... all to entertain you. Important on those long plane or car trips with unexpected stop-over’s. Also great to keep any complaining off-spring totally enthralled and completely oblivious to their surroundings for hours at a time. Save big on your headache meds by getting a smart phone for little junior or little miss!

5. The Lost Factor
just admit it, we have all been lost at some time in our lives. Now you don't have to be; many of these smart pda phones come with a GPS system to keep you in touch with your location at all times. Become totally grounded with a smart phone!

6. The Cool Factor
there has to be something said about style - these smart phones are sleek and stylist. Fashion should not be a reason to buy a smart phone but sadly it will be a major factor for many who do buy one.
7. The iPhone Factor
You can expect the "Cool" factor to leap-jump when the iPhone hits the market. The iPhone may do for smart phones what the iPod did for MP3 players. Hey, there is nothing cooler than an Apple anything! Besides the cool factor, the iPhone will probably revolutionize how we perceive and look at smart phones. It will elevate the smart phone to unheard of heights and place it center stage in our lives. Most of us will be smart enough to quickly grab one of these techno marvels. How about you? Will you be smart enough to get a smart phone or will you take the opposite route? While you're making up your mind, just remember you don't have to be an Einstein to appreciate the smart phone. Nor does being a prime candidate for the next Jackass video necessarily rule you out - everyone can benefit from having a smart phone.

Titus Hoskins operates numerous sites on the web, his first was a general Internet Marketing site http://jmdcomputer.blogspot.com/and his latest site is Marketing Tool Guide where you can find all the latest helpful and effective marketing tools, including Free Internet Marketing manuals: http://jmdcomputer.blogspot.com/this article may be freely distributed if this resource box stays attached.

Article Source: http://www.themobiletracker.com/hindi/cellphone.html

WHAT Does GSM, Lock & Unlock Mean

The term GSM means - Global System for Mobile Communications. It is the most popular standard for mobile phones in the world. GSM differs significantly from its predecessors in that both signaling and speech channels are Digital call quality, which means that it is considered a second generation (2G) mobile phone system. GSM is an open standard which is currently developed by the 3rd Generation Partnership Project (3GPP). From the point of view of the consumer, the key advantage of GSM systems has been higher digital voice quality and low cost alternatives to making calls such as text messaging. The advantage for network operators has been the ability to deploy equipment from different vendors because the open standard allows easy inter-operability. Like other cellular standards GSM allows network operators to offer roaming services which mean subscribers can use their phones all over the world.

To help you further understand, GSM is simply a standard used by phones to communicate with each other. It is a new standard that has been adopted to all new models of phones and is now so prevail ant that it has become the 'norm' in the phone world. Now to answer your other question, with respect to locked and unlocked phones. A phone is locked when it is attached to network. For example if you go to AT&T and purchase a phone from them then that phone is said to be locked unto the AT&T network and as such it cannot work on another network such as SPRINT or NEXTEL. Thus an unlocked phone is a phone that is bought, that is not locked to any network. And as such it can work on any network. The network it will lock unto will depend on the SIM card you put into the phone. For example if you put an AT&T sim in an unlocked phone then it will work on the AT&T network. In the same way if you put a NEXTEL SIM card in an unlocked phone then it will work on the NEXTEL network. However if the phone is locked to a particular network, like say for example AT&T then changing the SIM card in the phone to another SIM card from another network such as NEXTEL will not work. This is because the phone is locked unto to AT&T network and as such will not work on any other network.

Yes, you can use the prepaid SIM card on the phone once the phone is either unlocked or on the same network as the SIM card you are going to put into it. It should work just fine. Unfortunately is possible to have more than one phone on the same line. It is possible to have more to than one phone on the same account, in fact, some providers will allow many many lines on one account. The reason why you’re unable to do this is that your phone has an ESN (electronic serial number) that associated with that line. What this does is allow your network to send the calls to your phone. If there is more than one ESN per line then it will cause problems receiving calls. For example, I had a phone that I wasn’t using anymore when I bought a new one, well my old phone was receiving text messages that my new one was supposed to get, but the new one would get all the calls. To resolve the issue that had to erase the programming on the phone. Victor Expand is an expert agent for http://jmdcomputer.blogspot.com/, a huge cell phone superstore featuring great prices and rebates on cell phones including Motorola, Samsung, Nokia, Audio ox, LG, RIM Blackberry, Sanyo, Sony Ericsson, and others.

Article Source: http://www.themobiletracker.com/hindi/gsm.html

Cell Phone GPS Tracking

The development of communications technology has long since surpassed the sole ability to access others when they are mobile. Today, mobile communication devices are becoming much more technologically advanced and offer more than the ability to just carry on a conversation. Cell phone GPS tracking is one of those advances. GPS or Global Positioning System tracks your location by interpreting the data received from 3 or more satellites. This has made GPS a popular feature in cars as a navigational aid.

All cell phones constantly broadcast a radio signal, even when not on a call. The cell phone companies have been able to estimate the location of a cell phone for many years using triangulation information from the towers receiving the signal. However, the introduction of GPS technology into cell phones has meant that cell phone GPS tracking now makes this information a lot more accurate. With GPS technology now more commonplace in many new cell phones, this means that the location of anyone carrying a compatible cell phone can be accurately tracked at any time. Cell phone GPS tracking can therefore be a useful feature for business owners and fleet managers who need to be able to keep track of their vehicle movements. Cell phone GPS tracking can also be a useful feature to the emergency services or police when responding to a 911 call from a GPS cell phone. For this reason, the FCC has legislated that wireless networks provide location information for 911 calls made from cell phones. These are known as E911 calls.

As technology advance even further, future features will be even more powerful. Imagine GPS cell phones used as a navigational device. Based on the cell phone GPS tracking signal, they could be used to find your way to a location, calculate your speed based on your location change over time, from this calculate your estimated arrival time, suggest an alternative route and even phone the person you are calling to see with your ETA! Of course in car GPS navigation systems can already perform many of these tasks; however it is the portability of cell phones that makes them so useful for this technology. Cell phone GPS tracking could also be used to locate the whereabouts of your children and offer protection to elderly relatives should something happen and they need urgent assistance. These features will help to secure the future of cell phone GPS tracking providing advantages for all. For more information on cell phone GPS tracking and other GPS products visit www.satnav-gps.info today.

Article Source: http://www.themobiletracker.com/hindi/tracking.html

Global Positioning System (GPS) : A Complete Review

The system of knowing one's exact position on this earth is known as the 'Global Positioning System'. Precise positioning of any location can easily be done with the help of this System. If anyone has a Global Positioning System receiver and if the sky remains clear then no one is going to be lost on this Earth. The receiver is a pocket-sized gadget that makes us inform about our exact position on this earth at any moment. One thing is that this pocket-sized gadget or receiver is very expensive and it also involves a lot of technical ingenuity. The primary function of Global Positioning System is the navigation in three dimensions. The Navigation receivers are used for aircraft, ships, and ground vehicles and sometimes it is also carried in hands by individual.


The working of the System
The GP System provides some special satellite signals which is processed in the receiver. These GPS receivers not only track the exact location but can also compute velocity and time. The positions can even be computed in three dimensional views with the help of four GPS satellite signals. The Space Segment of the Global Positioning System consists of 27 Earth-orbiting GPS satellites. There are 24 operational and 3 extra (in case one fails) GPS satellites. These satellites move round the Earth in 12 hours and send radio signals from space that is being received by the GPS receiver. The control of the Positioning System consists of different tracking stations that are located across the world. These monitoring stations help in tracking signals from those GPS satellites that are continuously orbiting the earth. The Space Vehicles transmit microwave carrier signals. The users of the Global Positioning System have GPS receivers that can convert the satellite signals by which one can estimate the actual position, velocity and time. Four satellites are required to track the three dimensional location and time. The operation of the system is based on a simple mathematical principle called Trilateration. The Trilateration may be of two types i.e. 2-D Trilateration and 3-D Trilateration. In order to make the simple mathematical calculation the GPS receiver should know two things. Firstly the location of the place is to be traced by at least three satellites above the place. Second is the distance between the place and each of those Space Vehicles. Units those have multiple receivers can pick up signals from several GPS satellites at a same time. These radio waves are electromagnetic energy that travels at the speed of light.


OverviewGPS is specially a Satellite Navigation System that helps in tracking the exact location with the help of satellites. The Global Positioning System is mainly funded and controlled by the U.S Department of Defense (DOD). The system was initially designed for the operation of U. S. military. But today, there are also many civil users of GPS across the whole world. The civil users are allowed to use the Standard Positioning Service without any kind of charge or restrictions.


Tyson J Stevenson creates useful articles & reviews on a wide variety of everyday subjects. Expect to see his name often. View further samples of his work at My Adjustable Bed & Adjustable Beds.


Article Source: http://www.themobiletracker.com/hindi/gps.html

GPS - Reduce unauthorized mileage in your company fleet and track your assets.

Global Positioning System - GPS - devices have become everyday items to many of us as their cost has fallen. These devices communicate with geostationary satellites, which tell the device, exactly where on Earth it is. The potential applications for this knowledge are endless. If you know where you are, where you were and the time in between then you know your speed exactly. If you know where you are then others do too.


GPS systems can be installed in cell phones as well as satellite phones. Sportsmen and women can use GPS devices to calculate how far they have run or paddled their current speed and average speed. Increasingly companies are fitting them in their vehicles. Trucks may be carrying $500,000 worth of goods, so it's worth installing a GPS system so you know where it is. A similar system is sold as a theft deterrent to private drivers. Other companies are fitting a system that interfaces with the engine management computer on vehicles in their company fleet. As a driver goes out of a predefined area, the engine power drops and continues to drop the further outside the designated area the vehicle is. The system soon pays for itself in reduced levels of unauthorized mileages.


GPS devices are now so miniaturized that they can be worn on the wrist, like a watch. GPS navigation systems are commonly fitted in trucks and delivery vans. The built in software interprets the GPS information into a series of spoken commands, like "Turn Left" or "You've missed the turning, take the next right and turn around". A GPS system means that courier companies can achieve faster deadlines because drivers never get lost. If you would like to find more about using GPS to reduce your fleet management costs then visit this GPS System site. To research other logistics solutions try visiting this logistics site.

Article Source: http://www.themobiletracker.com/hindi/company-benefits.html