About Technology

update technology ,more fast more smart...

Getting right protection from firewall

Written by oneself on 6:04 PM

by Muneer Mohammad

Every computer connected to internet is open for hackers and intruders. It is very easy any one to break in to your computer and steel your confidential data. Hackers can break in to you PC and violate your system. So, we should use a way to get protection from those fellows.

Firewall is there to help you. Firewall is a system specially made for blocking unauthorized access to your PC from the outside world. When a system is protected by a firewall, only the allowed ports are visible to others. No one can break in to your system without your knowledge. Firewall automatically identifies the unauthorized intrusions and block them without reaching to your system according to the knowledge where it learnt from the settings that you or system administrator made.

Basically there are two types of firewalls. One is Hardware and other is Software firewall. Both are wanted according to the situation we are going to implement. You can select a type of firewall that best fits to your need. When choosing a firewall, we have to consider some most important points.

  • The cost
  • Type of usage
  • Level of security
  • Number of user or PCs etc.

Most likely, for a home PC user, according to my knowledge it is enough to use a lite Software firewall. Even though sometimes software firewalls cost more than that of a hardware firewall, it is nothing to say that there are no free versions of software firewalls available. Some vendors are offering free software firewalls nowadays. In my home PC, I am too using a free version of COMODO personal firewall. It is very good enough for a normal PC user. If you find that it is not enough to the requirements of your security level, you can search for more. Norton Internet Security, MacAfee personal firewall, Zone alarm security suite are some such kind of commercial software firewalls.

When it comes to the large scale of organizations, institution, firms or any other institution where proven security is must, the kind of hardware firewall is the best suit one. Meanwhile, as a software firewall vendor, Microsoft has announced that they can challenge with all major hardware firewalls. Although, what ever they announced, according to my experience and knowledge I can recommend the hardware firewall for its high security and efficiency.

The first benefit of hardware firewall is its efficiency and reliability. As because it work as a separate hardware device without caring about what the operating system, or what the machine configuration, you can use it with any network without taking much consideration about them. Event the machines, servers on the network fail due to any cases, the firewall would stand alone to protect you.

Another important thing to consider about is the number of machines in your internal network. It is important when licensing the product. Some firewall has limited amount of devices while some others have no limitation. So, we have to make a plan on our internal network before think about the type of firewall product.


About the Author

Administrator of http://www.pc4safe.com who periodically provides IT related articles, trouble shooting tips, updates related to network issues and IT certifications. Started IT career as a hardware technician and crossed networks, web development and Currently working as web programmer & Internet Marketing consultant for encode solutions

source:www.goarticles.com

Read More......

Securing Your Computer System

Written by oneself on 5:05 AM

Pj Germain

Today, more and more people are using their computers for everything from communication to online banking and investing to shopping. As we do these things on a more regular basis, we open ourselves up to potential hackers, attackers and crackers. While some may be looking to phish your personal information and identity for resale, others simply just want to use your computer as a platform from which to attack other unknowing targets. Below are a few easy, cost-effective steps you can take to make your computer more secure.

1. Always make backups of important information and store in a safe place separate from your computer.

2. Update and patch your operating system, web browser and software frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com to locate possible patches for your Office programs.

3. Install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs.

4. Review your browser and email settings for optimum security. Why should you do this? Active-X and JavaScript are often used by hackers to plant malicious programs into your computers. While cookies are relatively harmless in terms of security concerns, they do still track your movements on the Internet to build a profile of you. At a minimum set your security setting for the "internet zone" to High, and your "trusted sites zone" to Medium Low.

5. Install antivirus software and set for automatic updates so that you receive the most current versions.

6. Do not open unknown email attachments. It is simply not enough that you may recognize the address from which it originates because many viruses can spread from a familiar address.

7. Do not run programs from unknown origins. Also, do not send these types of programs to friends and coworkers because they contain funny or amusing stories or jokes. They may contain a Trojans horse waiting to infect a computer.

8. Disable hidden filename extensions. By default, the Windows operating system is set to "hide file extensions for known file types". Disable this option so that file extensions display in Windows. Some file extensions will, by default, continue to remain hidden, but you are more likely to see any unusual file extensions that do not belong.

9. Turn off your computer and disconnect from the network when not using the computer. A hacker can not attack your computer when you are disconnected from the network or the computer is off.

10. Consider making a boot disk on a floppy disk in case your computer is damaged or compromised by a malicious program. Obviously, you need to take this step before you experience a hostile breach of your system.

source:users.search-o-rama.com

Read More......

Top 6 Standalone Spyware Scanners

Written by oneself on 5:07 AM

From Mary Landesman,

It's not just viruses that plague today's Internet users. Spyware surreptitiously monitors your computer and Internet use, while adware can bombard your PC with unwanted advertising. Both pose a drain on your bandwidth and can lead to loss of security. Following are a selection of the best dedicated adware and spyware scanning tools to ferret out these often hidden menaces. If you go the standalone route, make sure you back it up with antivirus software and a firewall.

1. McAfee VirusScan

McAfee AntiSpyware 2006 is no longer sold as a standalone product, but don't despair. McAfee VirusScan (2006) includes the same stellar protection. In our tests, both products nabbed 98% of running processes associated with adware and spyware, effectively neutering the infestation. At $39.99 for both stellar spyware protection and a top-notch virus scanner, McAfee VirusScan (2006) is a steal.
Compare PricesRead Review

2. Webroot Spy Sweeper

Spy Sweeper removed 100% of the miscreant BHOs and Toolbars in our tests and stopped 84% of the active processes associated with adware and spyware. Spy Sweeper is a standalone spyware scanner and not a full-fledged Internet security suite, thus it is best used in conjunction with antivirus and firewall software.
Compare Prices

3. Sunbelt CounterSpy

Sunbelt's CounterSpy removed 90% of the miscreant Browser Helper Objects (BHOs) in our tests. Sporting above average detection for only $19.99, CounterSpy offers inexpensive protection, an easy-to-use interface and US-based tech support.
Compare Prices

4. Windows Defender

Windows Defender is offered free and, like CounterSpy, sports above average detection rates. The product is still considered beta and tech support is not provided. Despite these setbacks, it can provide a good second opinion. However, Microsoft AntiSpyware and CounterSpy should not be installed on the same system, as they both share common components.

5. Spybot Search & Destroy

Free for personal use, Spybot doesn't have stellar removal rates. It does, however, provide TeaTimer and SDHelper which are extremely effective at preventing adware and spyware from gaining a foothold on your computer. So while you may not want to rely on it for detection and removal, you may want to install and activate it alongside other protection to help keep your system spyware-free.

6. Hijack This

Another free utility, Hijack This isn't a traditional spyware scanner. It will, however, provide a full report of what's active on your system. Experienced users can peruse the report, identify the miscreants, and use Hijack This to disable the unwanted loading (or do so manually). Less experienced users can save the Hijack This log and send it to a more savvy friend for advice.

source:about.com

Read More......

Computer Safety Tips

Written by oneself on 4:21 AM

From Mary Landesman,

Achieving good computer security can seem like a daunting task. Fortunately, following the few simple steps outlined below can provide a good measure of security in very little time.

Use antivirus software and keep it updated. You should check for new definition updates daily. Most antivirus software can be configured to do this automatically.

  • Top Antivirus Software
  • Top Spyware Scanners

    Install security patches. Vulnerabilities in software are constantly being discovered and they don't discriminate by vendor or platform. It's not simply a matter of updating Windows; at least monthly, check for and apply updates for all software you use.

  • For Windows updates, visit the Windows Update Center
  • For all other updates, use the Secunia Software Inspector Firewalls are necessary even if you have a dial-up Internet connection - it takes only minutes for a a non-firewalled computer to be infected.

  • Free ZoneAlarm Firewall
  • Using the Windows Firewall

    Secure your browser. If you use Internet Explorer, you will be able to take advantage of the security zones settings to ensure optimum browsing safety. Not only will you enjoy safer browsing, you'll be able to eliminate unwanted pop-ups as well.

  • Securing Internet Explorer

    Take control of your email. Avoid opening email attachments received unexpectedly - no matter who appears to have sent it. Remember that most worms and trojan-laden spam try to spoof the sender's name. And make sure your email client isn't leaving you open to infection. Reading email in plain text offers important security benefits that more than offset the loss of pretty colored fonts.

  • Why Plain(text) is Better
  • How To Secure Your Email

    Treat IM suspiciously. Instant Messaging is a frequent target of worms and trojans. Treat it just as you would email.

  • Tips for IM Safety

    Avoid P2P and distributed filesharing. Torrent, Kazaa, Gnutella, Morpheus and at least a dozen other filesharing networks exist. Most are free. And all are rife with trojans, viruses, worms, adware, spyware, and every other form of malicious code imaginable. There's no such thing as safe anonymous filesharing. Avoid it like the plague.

    Keep abreast of Internet scams. Criminals think of clever ways to separate you from your hard earned cash. Don't get fooled by emails telling sad stories, or making unsolicited job offers, or promising lotto winnings. Likewise, beware of email masquerading as a security concern from your bank or other eCommerce site.

  • Internet Scams, Phishing, and Fraud

    Don't fall victim to virus hoaxes. Dire sounding email spreading FUD about non-existent threats serve only to spread needless alarm and may even cause you to delete perfectly legitimate files in response.

  • Hoax Encyclopedia
  • Urban Legends and Folklore

    Remember, there's far more good than bad on the Internet. The goal isn't to be paranoid. The goal is to be cautious, aware, and even suspicious. By following the tips above and becoming actively engaged in your own security, you'll not only be protecting yourself, you'll be contributing to the protection and betterment of the Internet as a whole.


  • source:about.com

    Read More......

    Top 5 Tips For Protecting Your Computer

    Written by oneself on 7:00 PM

    by David Grahams

    Top 5 Tips For Protecting Your Computer

    Do you ever feel like you know just enough about PC Security to be dangerous? Let's see if we can fill in some of the gaps with the latest info from PC Security experts.

    Today, more and more people are using their computers for everything from communication to online banking and investing, to internet shopping.

    As we do these things on a more regular basis, we unknowingly open ourselves up to a multitude of online threats to our PC's security. These include but are not limited to potential hackers, attackers and crackers. In addition there are pieces of software, malware, adware and scripts containing Trojans and other such virus like nasties that are all intent on soliciting some form of information about us which may already be contained in personal files on our PC systems.

    1. Get a Router. If your broadband connection is through some form of modem (normally USB or cable) supplied to you by your ISP (Internet Service Provider), make sure you attach this to a Router and then attach that Router to your PC. Many people just attach the modem to their PC and then rely on Anti-Virus software to protect them. This is simply not enough nowadays, and they will surely have a problem somewhere down the line.

    2. Make regular Backups of your data and important information and keep it in a safe place that is separate from your computer. Nowadays there are a lot of different ways to achieve this, especially with the advent of DVD writers and low cost hard disks which enable a lot of data to be backed up and stored "offline".

    3. Keep your operating system, web browser and software updated frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com and locate possible patches for your Office programs. If you have Windows XP service pack2 installed (and it is recommended that you do, because it contains inbuilt security fixes) you can use the Security Center from the Control Panel to turn "Automatic Updates" on. This will keep your system updated with all the latest patches and fixes that Microsoft releases.

    4. Make sure you install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs. Of course, if you use a router (which is recommended) this will already have a firewall built into it, and this can work in addition to any software firewall you choose to install on your PC.

    5. Check your internet browser and email client settings for optimum security. Why should you do this? Active-X and JavaScript are often used by hackers to plant malicious programs into your computers. While cookies are relatively harmless in terms of security concerns, they do still track your movements on the Internet to build a profile of you. At a minimum set your security setting for the "Internet zone" to High, and your "trusted sites zone" to Medium Low.

    I hope that reading the above information was both enjoyable and educational for you. Your learning process should be ongoing--the more you understand about any subject, the more you will be able to share with others.

    source : www.goarticles.com

    About the Author

    David Grahams is a successful Internet Marketer. In addition to writing articles and ebooks on Internet Marketing, he is also a qualified Microsoft Certified Systems Engineer, and is the author of the successful ebook "Ultimate Online Security". http://www.theidealebook.com/ultimateonlinesecurity.html


    Read More......