Showing posts with label computer security. Show all posts
Showing posts with label computer security. Show all posts

Avoid the "Cash for Clunkers" Website Like the Plague!!!

Now a days everybody is concerned about privacy (or at least they should be). We'd all like to believe our private information is private and will not be misused. It's not too much to ask.

We've all heard the government is building massive databases on each one of us for "good" purposes. Once such purpose is to centralize our medical records so that everybody who needs access to our personal medical records has it. The government even tries to assure us their intent is noble and will make health care more efficient.

Okay, so it's no secret we'd like to believe the government will take the necessary precautions to safeguard our private info. But let me ask you this ... if President Bush or Reagan were driving this, would you still be willing to cooperate????

Let's face it, the government (in BOTH parties) has gotten so big and powerful that it just can't be trusted anymore. It's now infringing upon our individual rights guaranteed under the Constitution (one of our country's founding documents.)! Anybody that denies this, really doesn't understand the Constitution.

The reason I am writing this post is to alert you to the most recent aggressiveness of our government to invade your privacy for their, "noble purposes" ... the "Cash for Clunkers" program.

The government claims it wants to help you do your part in cleaning up the environment by helping you trade in your old clunker for an environmentally safe green-car (which by the way, more and more scientists are standing up now to say is a hoax). Who wouldn't want to get rid of their clunker for a new car? I've been driving the same car for 8 years and would love a new car - especially since mine is approaching 100K miles.

But here's what you need to know! If you access the "Cash for Clunkers' website, you will be voluntarily giving access to Uncle Sam to ALL of your files and information stored on that computer. Sound harmless? Think about this .... once they get access to your computer, they'll have your IP address - which means they'll be able to hack in any time they want! DON'T DO IT!!! The U.S. Government can no longer be trusted! This is the kind of stuff that fascist dictators and 3rd world countries do. Don't be a willing victim!




This is serious stuff and it's time Americans woke up and pushed aside their nativity on what the government's doing. I understand folks who hate Bush, Reagan and other Republicans will be skeptical and laugh at this kind of paranoia. But I urge those folks to ask themselves how they'd feel if it were Bush or Reagen or any other Republican doing these things. I guarantee you I'd be just as outraged!

This is NOT a party issue. It's an assault on America by both parties and it's time we remind the government of their limited roles in our lives! Don't be blinded by party lines!

Firewall Configuration

firewall

A firewall is a device or a set of devices, which can be implemented in any of the hardware, software or both. All the messages passing through the firewall are verified to meet some level of security criteria.

It acts as a computer security barrier, which analyzes all the incoming and outgoing traffic to and from your computer or network based on the firewall settings. There are some common types of firewalls like: Application level gateway, Packet filtering firewall, Circuit gateways and Hybrid firewall.

Application level gateway firewall works on the application layer of the protocol stack. It works more intelligently than the packet filtering firewall. Packet filtering firewall examines the information contained in the header of the message packets.

There are some factors based on which the filters can be added or removed from the firewall:

1. IP address

2. Ports

3. Protocols

IP address: Every computer connected to Internet has a unique IP address. The firewall configuration can be customized to block any IP address so that your computer will not allow any kind of communication to take in between.

Ports: The firewall can be configured to allow or block messages from any port number.

Protocols: There are some commonly used protocols like IP, HTTP, TCP, FTP, and SMTP etc., which can be included in the firewall filter.

Some operating systems, such as Microsoft Windows offer built-in firewalls that are turned on by default to block all the incoming threats from Internet. There are several other third party firewalls available. You can choose any one the firewall to replace the default firewall in Windows.

Firewall Configuration

firewall

A firewall is a device or a set of devices, which can be implemented in any of the hardware, software or both. All the messages passing through the firewall are verified to meet some level of security criteria.

It acts as a computer security barrier, which analyzes all the incoming and outgoing traffic to and from your computer or network based on the firewall settings. There are some common types of firewalls like: Application level gateway, Packet filtering firewall, Circuit gateways and Hybrid firewall.

Application level gateway firewall works on the application layer of the protocol stack. It works more intelligently than the packet filtering firewall. Packet filtering firewall examines the information contained in the header of the message packets.

There are some factors based on which the filters can be added or removed from the firewall:

1. IP address

2. Ports

3. Protocols

IP address: Every computer connected to Internet has a unique IP address. The firewall configuration can be customized to block any IP address so that your computer will not allow any kind of communication to take in between.

Ports: The firewall can be configured to allow or block messages from any port number.

Protocols: There are some commonly used protocols like IP, HTTP, TCP, FTP, and SMTP etc., which can be included in the firewall filter.

Some operating systems, such as Microsoft Windows offer built-in firewalls that are turned on by default to block all the incoming threats from Internet. There are several other third party firewalls available. You can choose any one the firewall to replace the default firewall in Windows.

What are the benefits of Firewall Configuration?

Internet is a huge inter networking of individual computers. As a stand alone component, there is no danger of outside attacks for our system (without the use of pen drives and compact drives in the system), but connectivity to other networks results in vulnerability to attacks. So there is need for a strong protection to our computer. Firewall fulfills this requirement of computer users.

Firewalls are used to create control points on the border security of the networks. It can be either installed as a software program in a computer or it can be coupled with a separate hardware like router software. A good professional expertise helps in proper setup and configuration of firewall.

Firewall obstructs incoming and outgoing traffic from your computer, but if you want to have a clever watch on hackers who does not leave any chance to steal your personal information, then it is necessary that your firewall must be fully activated. Guidance from a certified technician helps to optimize your firewall security and you can fully assured for the safety of your data.

There are lot of advantages with using firewalls like security for both inbound and outbound traffic, windows firewall comes with the operating system and is highly efficient, proprietary firewalls ( that comes with their own operating systems) provides high level of security, response time is very high in case of high end firewalls etc. All these features will be easily available for the users when they use the services of a certified technician to configure firewall.

A firewall allows you to open ports you wish to use and block other ports you might not require. Sometimes you have a need for addition of an instant messenger or any multiplayer game, in that case you have to configure firewall and allow this type of traffic. However you must keep in mind that addition of functionality reduces the security so try that you only add any functionality if there is an urgent requirement for that.

A firewall is very important for your system because it save the system from outside attacks and retains the safety of your computer. There are many companies in the market today that provide remote computer support for firewall setup and firewall configuration. Choosing a good technician in this field needs some research but be sure that you will hire the best one in the industry if you are really concerned about the safety and durability of your system.

Firewall Configuration

firewall

A firewall is a device or a set of devices, which can be implemented in any of the hardware, software or both. All the messages passing through the firewall are verified to meet some level of security criteria.

It acts as a computer security barrier, which analyzes all the incoming and outgoing traffic to and from your computer or network based on the firewall settings. There are some common types of firewalls like: Application level gateway, Packet filtering firewall, Circuit gateways and Hybrid firewall.

Application level gateway firewall works on the application layer of the protocol stack. It works more intelligently than the packet filtering firewall. Packet filtering firewall examines the information contained in the header of the message packets.

There are some factors based on which the filters can be added or removed from the firewall:

1. IP address

2. Ports

3. Protocols

IP address: Every computer connected to Internet has a unique IP address. The firewall configuration can be customized to block any IP address so that your computer will not allow any kind of communication to take in between.

Ports: The firewall can be configured to allow or block messages from any port number.

Protocols: There are some commonly used protocols like IP, HTTP, TCP, FTP, and SMTP etc., which can be included in the firewall filter.

Some operating systems, such as Microsoft Windows offer built-in firewalls that are turned on by default to block all the incoming threats from Internet. There are several other third party firewalls available. You can choose any one the firewall to replace the default firewall in Windows.



Install Anti-virus

Anti-virus

With the increasing pace of Internet usage worldwide, the rate at which the Computer Security systems are being infected is also increasing. Not only the users connected to Internet are infected, but the non-Internet users are also being attacked at the same rate with the use of infected portable storage devices like floppies, CD/DVD, USB flash drives and other for transferring files, data, and other documents among different computer systems.

There has been a tremendous growth in the number of malicious codes developed and spread on Internet. There has been a growth in the virus, spywares, Trojan horse, worms, adware, key loggers and other similar threats. To tackle with this increasing growth of virus and other malicious code on Internet, anti-virus software are simultaneously developed and updated.

In today’s scenario the anti-virus software comes bundled with several additional programs such as firewalls, and spyware removal tools so as to provide a higher level of security to the computer users.

The first line of defense to protect your PC is to install some good anti-virus software carrying the feature of automatic update. The reason behind installing anti-virus software with the automatic update feature is to get the latest protection against the newly released viruses and other malicious codes. The next step is to update the anti-virus with the latest virus definitions.

The install anti-virus software compares the binary code of the content stored on the computer hard disk against the database of virus definitions. When the anti-virus software detects the similar binary code of the virus on the hard disk then it report it as the presence of virus. So, if the virus definition database is updated with the latest virus definitions then your computer system will remain protected against the latest virus attacks.