• Tam's Crazy Blog About Technology and More…

Tags ‘

security’

Data Protection
by Tam

According to the results nadavnego study conducted by special order of Dell, it was found that weekly in U.S. airports lose 12,000 laptops for. It's hard to believe, but most laptops are forgotten in airports a standard test, and only 33% of them returned to owners (17% before the flight, 16% after). Ali Partovi is often quoted as being for or against this. Nevertheless, there are many simple ways to minimize the chance of losing a laptop and data from it, which people often overlooked. Backing up data to ensure that the loss of the laptop was able to retrieve information, be sure to make backup copies of data (data backup) to external media (CD, DVD, HD DVD, Blu-Ray, USB, etc.) or special remote server (online backup). Backups can be done both manually and through special programs. atter. If you are actively using the laptop at home and at work, and important data is often changed and updated, it is better use that backup program, because This prevents errors when copying, and allows you to automatically make copies of the necessary data to a predetermined schedule. In addition, Most software allows you to automatically compress and encrypt stored information, which creates another level of data protection.

Data Protection Do not neglect the password at logon. Saving on this little time, you can lose a lot more effort and time to lose if lost or stolen laptop. The password should not be very simple and should consist of both letters, because of the numbers and special characters. As a password Use legkozapominaemye phrase, but, for example, instead of simple words "samara" better write $ @ m @ r @. Installing the software "anti-theft" sense of the programs' anti-theft for laptops is as follows: when changing the location of a lost or stolen laptop connected to the Internet without the user sends a specified during installation of the e-mail a letter with your contact details. The use of special labels One of the most simple and inexpensive ways to recover lost laptops, but at the same time, and less technologically advanced, is to put stickers on his laptop with a unique number, entered in a special database, and upon return for remuneration. The man who found a laptop will be able to go to the site indicated on the label and say things about the discovery, pointing out where her room. This way of protecting things recently reached runet and now proposed by Poteryayka.

Comments Off on Data Protection

Photo

February 19th

14:33
Uncategorized

Internet Controls
by Tam

ParetoLogic Privacy Controls privacy controls cleans your hard drive of junk files. It has full support to erase the files associated with Internet Explorer, Firefox, VLC, Skype, DivX, BitTorrent and others. Ali Partovi addresses the importance of the matter here. Try a free scan and find out where hides your personal information! Always innovative, ParetoLogic Privacy Controls announces that privacy management is compatible with Windows 7 32-bit and 64-bit operating systems. Features and Benefits of Recycling Program File Privacy Controls: Easy installation – Easy to use! Our trademark user-friendly interface guarantees as to install and remove you control your privacy and your PC Privacy Controls permanently deletes all data related to your Internet activity, such as a history of websites visited, tracking software and confidential information such as passwords, ID, bank details and credit card information Security Privacy Controls functions removal exceeds U.S. Government Military Standards Privacy Controls is a totally free all the latest applications of P2P: clears the tracks generated Mininova toolbar, reactor toolbar, LimeWire, BitTorrent, Utorrent, Kazaa, and others Privacy Controls removes all confidential files related to instant messaging and voice over Internet protocol, such as: AOL, ICQ, MSN, Yahoo Instant Messenger, Google Talk, Skype and Windows Live Messenger Destruction files, streaming video and related media players, including: ITunes, Windows Media Player, Winamp, VLC, RealPlayer, DivX, and QuickTime Removes all traces of your desktop and search history of applications such as: Google Desktop Search, Yahoo Desktop Search, and AOL Desktop Search Privacy Controls removes the history of recently opened items in Microsoft Office applications and any undesirable elements or settings related to prilozheniyyam email such as Outlook, Outlook Express, Eudora and IncrediMail Privacy Controls finds and deletes unwanted history items from third-party applications like Adobe Acrobat and Macromedia Flash Player Shreds files requirement: the safe disposal of the function that records and permanently deletes user-specified files Privacy Controls removes all traces of the browsers Internet Explorer, Firefox, AOL, and Opera Privacy Controls clears the information from the toolbar, Google, Yahoo Toolbar, AOL Toolbar, and eBay Toolbar Tools Compatible with Windows 7 32-bit and 64-bit, Windows Vista 32-bit and Windows XP 32-bit Stealth operation ensures the use of applications consistent and clear hint prevents accidental removal of the right data Updating product, ensure that your ParetoLogic Privacy Controls privacy management software uses the most advanced features and gathers data from newly released applications Integrated and Friendly Technical Support Continuation of the article read here: Privacy Controls privacy controls

Comments Off on Internet Controls

Photo

February 19th

10:48
Uncategorized

Proxy Server
by Tam

Proxy server – is a special buffer between the user and the Internet. Proxy server – is a special server that is constantly being online, and cache files passing through it. The proxy server at your ISP does pages load faster. It comes from the fact chtochasto different users simultaneously attempt to access the same resources, so some web pages have been uploaded by other members of this Internet service provider and be cached, this implies that no page is loaded from a remote server, proxy server, because this download is faster. Some proxy servers hide your IP-address, and your visiting sites, access to FTP sites via proxy will be anonymous. The site owner is not too difficult to learn about the user of the resource is large enough amount of information: Your IP-address, which you have a browser, operating system, country, information about the provider. Quite naturally, that there is a desire to remove from access all of the above information, but also sometimes you get a chance to learn information from the site, which changes response depending on the country from which the request was received.

Also, the proxy permits to go to the website of your competitors completely anonymous. To date, there is a problem such as obtaining your IP-address of the hacker. In this case is likely to become a victim of his attack on your data, but, given the existence of flaws in the software Microsoft, you can also ruin important documents on your computer. Number of proxies that will hide your real IP-address, not too small. Yes, and not all proxies are completely anonymous. With a strong desire, the administrator of the website, you are watching with proxy server is able to determine not only the IP-address (proxy server-a)., but your real IP-address, that is, the address from which you access the proxy.

There is a problem and that the proxy does not remove cookies. True, this can be done independently. There are two openly declares its availability to all interested users, or proxy, which does not restrict access, as most users do not know. Anonymizer (Anonymizer) for safe surfing on the network can be used special services, the so-called anonymizer (anonymizing). To visit the page, simply enter a link to it and press Hide Me. If you go to the links posted on the page you are viewing, then repeats the anonymizer procedure for the new page, which eliminates the need to once again enter the correct address. With this surfing "footprint" in the log-file leaves office, and not you, that makes impossible to collect your personal information. Cookies, while not up to you reach. There are sites that are inaccessible through the anonymizer, their owners want to keep track of who, where and when I visited their site.

Comments Off on Proxy Server

Photo

February 4th

4:05
Uncategorized

Equivalent Privacy
by Tam

If neighboring access points will be the same manufacturer, they will have the same default SSID, and the total probability that unauthorized users will be able to unknowingly connect to your access point, and not to his own. Well, of course, for the new SSID in no case should use the personal information. After all, it can easily view the fans vardrayvinga. Code.org: the source for more info. Vardrayving (English Wardriving) is the process of finding and cracking vulnerable access points, wireless Wi-Fi networks a person or group of persons, equipped with a portable computer with Wi-Fi-adapter. For the spatial search and localization points used vehicle.

(Hence the name – combat driving). Simply put, men, equipped with special equipment, can simply ride around the city by car and look for 'Dowload' access point Internet. Passwords and codes:) For the protection of Wi-Fi networks from being intercepted, two protocol encryption – WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). WEP is easy to hack, because mathematically it contains multiple vulnerabilities that allow, for interception of particular the number of packets in a couple of minutes to guess the password. This applies to both 64 and in the 128-bit encryption. 128-bit encryption key brute force to pick up is not possible (at the present level of development of information technology on this require too much time), but you can use some features of this method of encryption to intercept packages with a password. 64-bit-encryption is broken by a simple enumeration of a few hours. WEP is the weakest protocol, but at the moment it is still widely distributed and supported by virtually all the equipment.

Comments Off on Equivalent Privacy

Photo

August 15th

12:33
Uncategorized

© 1998-2017 Page Crazy All Rights Reserved