Tuesday, August 7, 2007

Tips of security

Protecting private information

Information is the lifeblood of most, if not all, modern organisations, so protecting (this) information against unauthorised disclosure, modification or erasure is a basic requirement of management. Executives and staff in all organisations rely on the timeliness and accuracy of information in order to operate in the most efficient and effective manner. Increasingly, with advances in technology, there is the danger that this information may be unavailable or may be corrupted, either accidentally or deliberately. There are frequent reports of computer hacking (unauthorised access to computers), viruses and other disasters that can affect information such as fires, power failures or simple human error.
What Is Sensitive Information

Sensitive information can be many different kind of information, like:

* Name, address, phone number
* Date of birth
* Social Security Number (SSN)
* Credit card numbers
* Driver's license number (DL)
* Banking and financial information
* Medical information
* Employment/education information
* Patient, Student and Faculty records
* Grades
* Intellectual property (your creation)
* Proprietary information (unique data)
* Trade secrets (Coke)
* Passwords and access codes

Protecting Information In Your Office Area

A few basic steps to secure information in your office:

*Documents that include sensitive information need to be secured during printing, transmission, storage, and disposal.
*Don't leave paper documents containing sensitive information unattended. Credit card slips or paper checks should not be sent through intercampus mail.
* Be aware of the potential of others to overhear sensitive information. Don't discuss confidential information outside of the office.
* Verify identities of all visitors and escort them; verify identities of those requesting sensitive information.
* Lock your office, desks, and file drawers when unattended. Don't store keys in easily accessible areas.

Protecting Your Computer And Its Information

Simple steps to protect your computer and its information:

* Lock down PCs, laptops, PDAs, flat panel displays, printers, and other high-value items.
* Avoid allowing strangers or visitors to use your computer. Be aware of who can see your screen, especially when viewing sensitive information.
* Create strong passwords or pass-phrases. Use a combination of letters and numbers, and don't use dictionary words.
* Change your passwords when prompted by the system and never share them or write them down.
* Avoid discussing confidential information, accepting downloads or authorizing transactions or payments on IM, IRC or other chat programs.
* Privacy and confidentiality of email messages is not guaranteed. Information can be opened or read by someone other than the intended recipient. Exercise caution in using email to communicate confidential or sensitive information.
* Use only approved and necessary software applications.
* Make sure anti-virus software is installed on every computer you use.
* Make a backup copy (to a removable disk or flash drive) of your most important files and store the backup in a safe place, preferably in a different location. Backup your files at least on a weekly basis.
* Delete files you no longer need.
* Don't accept unsolicited downloads.
* Don't use P2P or file-sharing systems.
* Log off when not using your computer or at least use a screen saver that requires a password.
* Turn your computer off when leaving for the night.
* Follow all LTS and University IT policies and procedures regarding information technology security. Immediately advise an LTS supervisor of any suspicious activity on University computers.

Protecting Your Trash Can

Also be careful with your Trash can:

* Avoid careless disposal. Shred any discarded materials containing sensitive or confidential information.
* If you find sensitive information carelessly discarded in a public place, notify your manager.

Protecting Your Privacy

Never give out personally-identifying information unless you know:

* Who is receiving the information
* Why the information is needed
* What specific elements of information are needed
* How the information will be used, and by whom
* With whom the information will be shared
* How the information will be protected

Article source: information security awareness

About the Author: information security awareness

article source : www.easyarticle.com

Read More..

Computer Tips

Computer errors are very common and every computer user may face different kinds of issues so they should learn about the solutions of the common computer related problems. The common factors that cause problems in computer are viruses, spyware, Trojan horses, adware, corrupted registry, faulty hardware, low memory, low capacity hard disk, low CPU speed and stuffing computers with large number of software applications. In this article, I have compiled a list of the most common computer problems and their solutions.

Computer is very slow

This is very common issue and it arises due to the several factors such as too many programs running at the startup, low RAM, low processor speed, spyware running as a background application, errors in the Windows registry and the buildup of the garbage files on the hard disk. Scanning your computer with an up-to-dated anti virus and anti spyware program, cleaning and repairing Windows registry, increasing memory, deleting temporary files, deselecting the programs at startup and uninstalling unwanted software applications can solve this problem to a very large extent.

Network Server is not accessible

In a networked environment every computer depends on the server for logon authentication, files access, internet and printing access and sharing server resources. The downtime and the communication failure with the server are very problematic and frustrating for the users. Check both end of the network cable and make sure that the attached RJ-45 connectors are properly plugged into the LAN card and hub/switch. Ping the server’s IP and make sure you get the reply from server. Ensure that your server is on and working fine. A large number of the running applications on the server and simultaneous access to the server from a number of users can slow down the performance and speed of the server. Scan your PC with an up-to-dated antivirus program because certain viruses and spyware are responsible for the communication failure. Replace your LAN card with new one and assign different IP address and try to connect with the server.

Computer locks up or freezes

Missing .dll files, viruses, faulty registry, defective RAM and spyware slows down the performance of the server and it locks up frequently. Scanning PC with the anti virus and anti spyware program, cleaning and repairing registry and increasing RAM can solve this issue.

Computer won’t boot

Faulty power cable, power extension and power supply all contributes to this problem. Checking one by one each of the above components can pinpoint the problematic part. Simply replace that part with new one and your compute is okay.

Computer reboots itself

Defective cooling fan, power supply, RAM, viruses and spyware can cause this to happen.

Memory usage is maximum in computer

Either the memory is less than the recommend memory to run certain applications, swap memory chips with each other, scan your computer for viruses and spyware, increasing the page file and physical memory can overcome this problem.

Browser’s home page has changed itself

This is most likely a spyware problem and scanning computer with an up-to-dated anti spyware program can fix this issue.

Computer’s clock losing time

If you see that your computer’s clock is losing time frequently replace your CMOS battery.

My computer can’t get connected to internet

Check IP address, gateway address, scan your PC for viruses and spyware, check network cables and make sure that server’s or gateway’s firewall application is not blocking http requests from your PC.

Computer making noises

Faulty RAM, VGA, hard disk, Sound card, Processor and other components produce noises. Make sure that each hardware device is properly connected inside the PC and if the problem is still not resolved then replace the faulty hardware component with new one.

About the Author: B. Bashir manages Networking Tutorials and regularly writes articles on various topics such as Computer Networking, OSI Model Layer Wireless Networking, Computer Hardware, Certifications, How Tos, Introduction To ATM Network and Computer tips.

article source : www.easyarticle.com

Read More..

Free Data Recovery Tips

Imagine this scary moment. You log into your computer like you do every morning. But today when you go to open the files for the important project you have been working on you can’t find them. Keeping you cool you check the Recycling Bin; unfortunately they are not there. Next you use your computer’s search function to see if you accidentally moved the files to another location. Again, you have no luck. You now realize the files appear to no longer be on your harddrive.


Then finely a bit of good news; you check for signs of a hardware failure. Things like the sound of a clicking harddrive, or strange error messages like “CRC read IO Error. Do Not Proceed.” And, you do not find anything.

This is good news because if you data loss is not due to a hardware failure then you know there is a good chance that your files can be recovered. Even better, there are several good pieces of free software to help you “undelete” your lost files.

At this point, it is important that you stop using the system. This is because you want to reduce the likelihood of writing over the areas of your computer that may still contain you lost files. Even if you are not actively creating and saving files your computer still uses your system's hardrive as a swap disk for its memory. That alone can inadvertently write over what you are hoping to recover.

Now you need to find and download some data recovery software onto another system. Once this is there, save it either to a USB memory stick, or to a CDROM. You will run the recovery software directly from there. Once your lost files have been found you should play it safe and copy the files unto your USB memory stick or to another system. This is just in case the issue arises again.

PC Inspector is a free data recovery program you may want to consider. This program was developed by the Convar company. Conver has been doing data recovery for 15+ years.

With PC Inspector you can recover files of any size, folders, or programs you want. Often you will recover the original date and time stamp of documents at the time the files were lost. That information may be helpful in determining what actually caused the data loss.

By David Wegener

Find out more about Data Recovery techniques by visiting http://harddrive-data-recovery.com a site dedicated to making the task of recovering your lost data easier.

Article Source: http://EzineArticles.com/?expert=David_Wegener

Read More..

Making Picture Changes - Getting Help With a Photoshop Tutorial Effect

While a picture speaks a thousand words, those words tend to have one main meaning – with the possible exception of the still-mysterious Mona Lisa. But what if you had the chance to change those words? Are you interested in having that chance? If so, all you need to do is get help with a Photo Shop tutorial on effects.

Adobe Photo Shop today is the world’s leading digital imaging software program, and it allows users to edit their pictures with an amazing array of tools.

Tone – With just a click of your mouse, you can immediately turn your 100% colored photo into a black and white picture to make it seem older. You can also choose to give it a sepia look for a similarly quaint but more artistic impact.

Text – With the help of an Adobe Photo Shop tutorial on effects, you can also add cute text or captions to and within your photos. Unlike older programs which require you to copy and paste text with white backgrounds, Adobe Photo Shop has a transparent background so that only the very shapes of the letters are pasted on your photo. With this option, the text you’re adding will be made a part of the very photo.

Selection – Sometimes, you wish to create an effect on only one part of the photo. Adobe Photo Shop anticipates this need, and even better, lets you choose the shape of your selected part. When you’ve selected which part of the photo you wish to edit, all subsequent changes will then take effect on that part alone. It’s as easy and simple as that!

Mosaic – Remember your old art lessons in primary school and you had to create a mosaic project? Well, how about doing a mosaic version of your photo? It seems to require harder work with only your keyboard and mouse, but think again. Thanks to Adobe Photo Shop, you can create your own mosaic with just a click and even choose the cell size for your photo.

Blur – Faded patches in a photo are interesting, and you can intentionally make such patches on your photo if there are none to begin with. Under the same category of tools – Filter – in which you’ll also find other effect options like Mosaic and Pointillize, you can use the Blur option and apply it to a selected part of your photo or all of it. Keep pressing the Blur button until you reach your preferred degree of blurriness.

Color Pencil – Have you ever imagined what your photo would look like if it had been drawn using colored pencils? Imagine no more with the help of Adobe Photo Shop. Under the colored pencil function (still in the Filter category), you can also choose the degree of stroke pressure, paper brightness, and pencil width applied to your photo.

Neon Glow – Do you want your photo to outshine everything else in its vicinity? You can literally achieve that with the neon effects of Adobe Photo Shop. Once more, it can be a part of or the whole photo that could be changed with this option. The impact of this function can be modified according to neon color, glow, and brightness.

There are many other effects that Adobe Photo Shop can provide you and to change your photo, but self-study and self-exploration won’t get you anywhere fast anytime soon. If you want to learn now, find the best Photo Shop tutorial in the Internet and start watching.

By Mario SG Churchill

Mario Churchill is a freelance author and has written over 200 articles on various subjects. For a free photo shop tutorial and or to purchase a video photo shop tutorial checkout his website.

Article Source: http://EzineArticles.com/?expert=Mario_SG_Churchill

Read More..

VoIP - Just What is it I Need to Know About it?

Well if you read this article you won't any more. What is more I am not going to baffle you with a battery of technical terms and the like. No need as it is all so simple really.

Once you understand about what VoIP is you will be really keen to use it.

The first and very last bit of a hint of technical terms is what the letters VoIP mean. It means Voice over Internet Protocol. Wow, now we have got over that we can talk about just what it is all about. Basically, all this means is that, instead of your voice being sent down a line in the old way down landlines, it is now being sent down an internet connection.

There are a couple of differences between these but basically the internet way is very fast and you voice is sent in little data packages which is converted back to your voice at the other end. The old way was slow so not as economical cost wise. Hence, although you may not have realised it your phone companies have been converting your voice messages to VoIP for some time now. They can handle thousands of conversations at the same time down the same line whereas previously they could not. However, they have been reluctant to reduce prices until the pressure has been put on them recently by new VoIP companies springing up.

So… There we have it. VoIP is just anther way to have a conversation between two or more people. How hard is that to understand?

Now we come to the bit where you have a choice. Do you stick to paying a high price to phone all over the world or do you look for someone to use that will give the same – if not better service much cheaper. I know what I do!

This is where most people start to panic asking the questions – How do you do it? With whom do you do it? Will I need a special phone line? Do I need a special telephone? It's still a mystery to me, who will help me? And so it goes on. Well it is to be understood you would have many questions needing an answer. These changes are very new and like anything new, we fear the unknown until we get some of the answers.

So let us tackle some of the questions here and you will see that there is really nothing over complicated at all. After all, at the end of the day you are going to save a lot of your money. Afford to be more in contact with your friends without worrying how much the call is going to cost you.

I have written a lot of published articles that are reproduced around the world so I can give you the guidance that you may need. Let's find the answers to some of those questions.

How do you do it? First you need to decide on a VoIP service to go with. There are a lot around, some based on original VoIP platforms and have developed an impressive array of web facilities. Such a Skype, Verizon and other well known's. But there are a number of new VoIP service providers that are pushing forward the VoIP technology. These are patenting these new platforms /features. Check my resource at the end.

With whom do you do it? Sounds the same as the first question; however what you want is someone to guide you in both your choice and in understanding how to use the VoIP features. Better a service that provides you with a personal helper.

Will I need a special phone line? No. You will be using just your normal cell phone or telephone line.

Do I need a special telephone? No. Not necessarily so unless you wish to have an I P telephone. This all depends on how far you want to go in ease of use. Alternatively to are able to use an adapter to which you plug in your normal phone. However, the service can be used without special setup, using your ordinary landline, computer, or a cell phone. You do not even have to have a connection to the internet with companies such as Global1touch. You simply dial a special number, disconnect. You will get a call back asking which number you wish to call. You just enter your destination number and you are connected via VoIP service. There is no cost involved with your normal landline or cell phone service provider. In fact on a cell phone you will not even lose any ‘free' time minutes.

It's still a mystery to me? At this point I hope you now see that it is in anyones reach to use. Additionally if you have a person helping you then you have no worries at all. Did you know that VoIP customers worldwide are doubling year on year, so it cannot be that hard.

I recommend VoIP to all and particularly to families where a huge saving can be made. Realizing the massive saving to be had, small to medium businesses are taking up VoIP services rapidly. The advent of VoIP on the move with cell phones is playing a large part in this. Contacting personnel via cell phones locally and internationally runs up large communication accounts, sometimes on top of actual cell phone package deals. Using VoIP slashes the costs dramatically.

I hope that this article has helped you to feel more comfortable about considering adding VoIP to your personal communications package.

I encourage you to look at my web sites where I can assist you further.

By M E Moore

http://www.megamarketingsystems.com/flashads/adnews.htm

http://www.global1touch.com/English/ProductGlobalLocal.aspx

Article Source: http://EzineArticles.com/?expert=M_E_Moore

Read More..

A History of P2P

P2P use has become an everyday occurrence for many internet users, allowing users to download content reliably, reasonably quickly and quite often, copyrighted material free of charge. Ok, now I hear those P2P virgins cry, “What is P2P?!”. And in response; P2P (peer to peer) is simply connecting to other computers via the internet, and in this case, to download files from them free of charge.

The use of P2P has been attacked by record companies and pro-copyright organisations since the very beginning. Napster was one of the first large P2P systems seen, which allowed users to download music free of charge, however Napster was “shutdown” in 2001 when a court ordered that Napster prevent all illegal file sharing on it’s networks. This, of course, was almost impossible for Napster to do without pulling the plug, and in March 2001 Napster networks were shut down. Later to be re-opened legally, to provide legal music downloads at a price.

Nowadays, programs such as Limewire, Bearshare and Kazaa are used which, in theory, can never be stopped by any legal force, owning to the fact that illegal content is not hosted on any particular server, but on many computers, so blaming the actual programs cannot be legally justified. In effect, the only way to stop P2P file sharing is to nuke the entire internet.

However, in the last year or two, the file sharing community has seen a rising amount of prosecutions and threats from record companies, for “illegal” and “mindless” copyright infringement as a result of P2P file sharing of music and movies. One of the most recent cases involving the RIAA (Recording Industry Association of America) is that of a 10 Year Old girl who was found to be downloading music using a P2P program, where the RIAA allegedly “bullied” and “threatened” her into co-operating with them. There have been many other prosecutions across the US and into other countries too, often with the same ruthlessness as this one.

The use of P2P was changed when a new method of downloading and sharing files was designed and programmed by Bram Cohen. This new method was called “Bittorrent”. Other programmers soon caught onto this method and other Torrent clients were released, such as KTorrent and Azureus. The idea behind using a torrent, is that the user downloads a small file which has the extension .torrent, and this torrent tells the client, eg. KTorrent, where to download parts of the file from. This offers a very stable and reliable method of downloading via P2P.

The RIAA and various other anti-P2P organisations continue to prosecute and threaten users of P2P, however, the majority of sharers will keep sharing….the RIAA cannot stop millions of users worldwide, P2P is here, and it’s here to stay!

NOTE: File sharing is not illegal… but downloading material that is not legally owned by you is ILLEGAL, do so at your own risk.

By Andrew Horner

Article Source: http://EzineArticles.com/?expert=Andrew_Horner

Read More..

Learn Photoshop Like A Pro through Photoshop Tutorials

At the dawn of computer generation, image editing was made more efficient and remarkable by various photo editing software. But when people talk about the world leader in digital image editing, Adobe Photoshop takes center stage.

Photoshop is, above all else, a superior image editing tool, one that will always be remembered best as the software that forever changed the way the world looks. In many ways, Photoshop has become almost indistinguishable from photo or image editing. And as technology advances, it has become one of the most proficient tools in creating web-based images.

For all of their bells and whistles, however, Photoshop still serves best when used with Photoshop tutorials. Many people are familiar with Photoshop but not all of them are fully capable of managing the tricks and tips of the program. Hence, Photoshop tutorials can facilitate the full use of the software for better image editing.

There are so many websites that offer Photoshop tutorials nowadays. The best thing about Photoshop tutorials is that people can access them for free. Hence, they can learn many things about photo editing and other services needed to enhance the images.

When it comes to Photoshop tutorials, there are so many factors to consider in order to get the lessons you need to know. Some may go for the advanced tutorials while others may find basic Photoshop tutorials beneficial. If you really want to learn the basic tips and tricks in Photoshop, you may find these Photoshop tutorials useful:

1. Photographic effects

With the help of digital cameras, photographers nowadays can really make wonders on their images. However, with the help of Photoshop, they can truly create a new perception of the world. Professionals know how to do their thing but ordinary people cannot. Hence, with the help of Photoshop tutorials, they can create different photographic effects in their images the way the experts do.

2. Lighting

With light, you can create different moods in the picture. Through the use of lenses, flares, and other lighting effects, images may appear surreal, romantic, or morbid. Photoshop tutorials can teach you the basic tips in creating different lighting effects to achieve the mood that you want.

3. Touch ups

This is the most basic section of Photoshop tutorials. In fact, this is what Photoshop is all about. People would want to enhance their pictures. If the camera may not seem to do the tricks, Photoshop can fix it. All you have to learn is to identify the basic steps in doing touch ups. With Photoshop tutorials on touch ups you can even make an old picture look new or arrange some flaws and make it more appealing.

4. Image presentation

Photoshop tutorials can give your picture a good lift from the ordinary. You can make two people appear together in the picture even if they were taken separately. Photoshop tutorials will teach you various means of presenting your picture — totally different from the way you have captured the moment. You can mix and match, combine and contrast, or simply create a new background without having to take a new shot. You just need to learn the basic Photoshop tutorials on image presentations.

So if your books and magazines cannot tell you more than what you need to know about image editing, hook yourself to the Internet and learn the different image editing tips and tricks through Photoshop tutorials.

By Mario SG Churchill


Mario Churchill is a freelance author and has written over 200 articles on various subjects. For a free photo shop tutorial and or to purchase a video photo shop tutorial checkout his website.

Article Source: http://EzineArticles.com/?expert=Mario_SG_Churchill

Read More..

How To Secure Your Computer

According to a Software security and Antivirus company Symantec, it only takes 20 minutes for an unprotected computer to be attacked once it gets connected with the internet. Computer security cannot be compromised because if your computer is insecure then all your data, software and hardware are at risk. There are several methods that are used to combat with the security threats. The known threats to a computer are viruses, spyware, adware, malware, Trojan horses, internet security threats, accidental files deletion and data corruption, unauthorized access to compute and the hackers’ attacks. Following tips tells that how to deal with the computer security threats.

Install Up-to-dated Antivirus Program

One of the most important security step and preventive measure is to install an up-to-dated antivirus program and scan your computer regularly with it. An antivirus programs acts as protective shield for your computer against the virus, spyware and other internet threats.



Install Firewall

A firewall is a protective boundary that protects your computer from the unauthorized access and from the hackers’ attacks. If you haven’t enabled a firewall software or hardware on your gateway computer then anyone can get into your computer.



Install Anti spyware

Installing a good anti spyware program eliminates the chances of data corruption, Windows registry corruption, slow computer booting, browser’s hijack and applications failure. The combination of Antivirus + Anti Spyware + Firewall program is a very good choice.



Update your operating system with service packs and patches

Services packs and the security patches fix the security holes and other vulnerabilities in the operating systems. If you are using Windows based operating system then there is automatic update option in the control panel of the Windows and you can set schedule updates of the operating system from the Microsoft’s website.



Beware of suspicious emails and attachments

Suspicious emails and email attachments is a very common cause of the viruses. The best safety measures it not to open the suspicious emails from the unknown source.



Uninstall Unnecessary Programs

For getting the optimized performance from your computer, uninstall all the unwanted programs and delete temporary internet files. You will notice increased performance of your computer.



Deploy Encryptions

Another important security measure is to prevent your important files with the encryption. Also for protecting your important data from accidental deletion, make your files to read only.

The above mentioned tips provide the best safeguard against the known offline and online threats.

By Bushra Bashir

B. Bashir manages this website Networking Tutorials and regularly writes articles on various topics such as Computer Networking, Network How Tos Wireless Networking, Computer Hardware, Certifications, How Tos, Switched Network and Computer tips.

Article Source: http://EzineArticles.com/?expert=Bushra_Bashir

Read More..

Setting Up a Wireless Network: What You Need

Are you thinking of setting up a wireless network for your home or workplace? Interested in having the luxury of going from one room to another without having to depend on wiring systems creeping inside your walls just to retain your connection with your computer?

But, how should you do this? Is setting up a wireless network hard to do? Do you need to be a tech-savvy person so you can install and set up this work successfully?



The First Thing to Bear in Mind:

One of the first few things that you may have to do in setting up a wireless network is determining what wireless network you would need since there are various options available in the market.

To zero in on a particular choice that would suit your needs, be sure to understand what it entails. Search the internet for additional information if necessary. Or, ask your friends, family, or colleagues on what’s the best thing to use.



Knowing Where to Locate a Vantage Point or Point of Access:

Point of Access (AP) is crucial in setting up a wireless network. It involves the following configuration settings that you need to implement:

• Connection settings

• Wired interface settings

• Security settings



Asking for Help:

Sometimes, the task at hand may seem difficult - even with the access point configurations; and you may be confused with what the next thing to do is.

Times like these, it would be wise to call or get in touch with a support group. You can use the help of the vendor if you are sure to have purchased the things you need from a reliable source.

If you have troubles with the access point, be sure to understand that the three things that you need to set up includes the RF (or radio frequency), the perceived distance with your access points, and the IP address of that connection.



Managing Your Ethernet Interface:

The next thing you need to do after configuring the setting of your point of access is the selection of the things that you’ll need to get you started: Speed and duplex settings.

However, you may find that there are other manners of set-ups that may not require you to do this since these features are set up automatically after you have provided a suitable point of access.



Purchasing a Laptop:

With a wireless network, it is suitable that a laptop be used instead of the desktop computer version. However, this doesn’t mean that you have to ditch your desktop for this reason since there are some customers who still use their desktops together with their wireless network at their offices or homes.



Ensuring Your Security:

Security measures are crucial in wireless connections and you have to be sure to have this since there may be instances when a complete stranger can listen in to your private conversations traveling through the airwaves with your wireless settings.

It is true that setting up a wireless network may seem difficult at first when it is your first time to deal with it. But, if you are good with following directions and see to it that everything is done well, setting up a wireless network can be easily configured even if you are a mere beginner or aren’t that knowledgeable in technical stuff.

By Gavin Sanderson

Gavin Stevens writes articles about wireless network For more information about setting up a wireless network please visit http://www.wirelessnetworkcentral.com

Article Source: http://EzineArticles.com/?expert=Gavin_Sanderson

Read More..

Your 'No' Could Mean 'Yes' To A Trojan

Similar to viruses, Trojans copy, distribute and kill your data. Obviously since you would never permit these actions, Trojans do not bother to ask for your permission.

Trojans are deceptive programs which don't take no for an answer. Any keystroke means yes to them. They are mainly designed to steal your data from your pc. But if you have antispyware guarding your pc, you need not worry.

What Are Trojans?

Basically Trojans appear quite harmless. They quietly enter your computer, either as email attachments or bundled in with other software programs. They are a kind of spyware. Spyware works by keeping track of what you do when you browse the web without you being aware of it. It is quite irritating and can cause major problems if you don't use any antispyware program to keep your pc clean.

Trojans are one of the worst kinds of spyware that eventually destroy your data after stealing it. There are some Trojans called remote administration tools, which permit access to your computer every time you log in - and you won't even know it. Whoever accesses your pc can easily pick up files from your system, remove or add programs, and even control your keystrokes.

How Trojans Land Into Your PC

Similar to viruses, Trojans copy, distribute and kill your data. Obviously since you would never permit these actions, Trojans do not bother to ask for your permission. The spyware installer does not care about the means used to rob your data. It is well known that there are many Internet marketers who trick you into installing certain software bundled in with Trojan spyware into your computer. They use a pop up ad to attract you, and then as if you want to install it. Whether you say yes or no is irrelevant. Even if you say no, they follow up with another pop up ad to ask if you are really sure. In spite of clicking no, your keystroke simply sets off a download into your computer without your being aware of it.

Drive by downloads are a common method for Trojan spyware to sneak in to your pc. Here is what happens - you browse a website and see a popup asking if you want to download something and the way it asks you, you sometimes end up saying yes, thinking that you need to download it to look at the web page. So when you say yes, it looks like you are allowing the download. If you say no, you are hounded by pop ups that wait for you to just click to start off the download, making it happen without your knowledge.

Everyday there are new ways being devised by spyware installers to get into your system. Get antispyware software to control this and keep your pc free of spies!

by: Arvind Singh

About The Author

Arvind Singh is admin and technical expert associated with development of computer security and performance enhancing software like Registry Cleaner, Window Cleaner, Anti Spam Filter etc. More information can be found at http://www.pcmantra.com

To know about the Registry Cleaner visit at: http://www.pcmantra.com/registry-cleaner.htm

Know more about Registry Cleaner?

Read Articles at : http://www.pcmantra.com/RegistryCleanerResource.aspx

article source : www.articlecity.com

Read More..

VPN Explained - The Basics Of VPN Simplified

The question of exactly how to explain or define a VPN is one that is often up for discussion amongst today's network consumers and communications providers. If we look at the literal definition of the words virtual private network, it can help to understand what is, and what is not, a VPN .

Using Webster's dictionary definitions of the component words, a VPN should have the following attributes:

Virtual - defined as "being such practically or in effect, although not in actual fact or name." Therefore, the first part of the answer to our question "what is a VPN" is that it is something that acts like a hard-wired network, but is actually not.

Private - defined as "of, belonging to, or concerning a particular person or group; not common or general." So, a VPN should be one where the consumer has exclusive use of the network links. (Note, this is different from a Secure Network, which may be a private or public network.)

Network - defined as "a system of computers interconnected by telephone wires or other means in order to share information." This is the goal of a VPN or any other type of network.

VPN explained in this manner is a network technology which gives the owner the ability to share information with others on the network by means of a private, exclusive link that is created by a method other than hard-wires or leased lines; usually via the internet. Before the internet, computers in different offices, cities or even countries could only talk to each other like people could - through telephone wires. As the needs for this type of communication grew, telephone lines became replaced by higher volume wires, like T3 circuits, but the concept was the same. For computer A to talk to computer B, there had to be a physical wire connection. For security reasons, you would want to make sure that only your 2 computers used that line, so you would contract with a vendor to "lease" that circuit. However, this type of network was expensive and difficult to expand, not to mention difficult for the client to have control over.

With the advent of the internet, connections no longer needed to be physical. As long as each computer has access to the internet, information can be shared using local ISP circuits, across the internet, and to the recipient in much the same way that it was when the computers were physically connected. This is why the way VPN works is considered a "virtual" network; the entire connection is not hard-wired.

The aspects of VPN explained in this article so far have not yet discussed an ever present concern in today's world - security. In an old WAN arrangement, the security of data transmission could rely entirely on the provider's guarantees. Today, however, a VPN keeps information private by means of encryption on both the sending and receiving end. There are a variety of encryption protocols, depending on what a company's needs are, who they need to communicate with (and therefore be compatible with), etc. The data is not only encrypted, but it is encapsulated, meaning it is sent in its own private "tunnel" or connection across the internet. No one can see the data, and even if they could, they can't decipher or change it. In this way, information can be sent across the internet without being susceptible to interception or corruption by those who are outside of the VPN.

In order to create a virtual private network, you would need to decide who needs to share information, in what directions, and how often. Next you would need to prepare a listing of the hardware and software systems you are currently using at each location. You might very well need to make changes so that the computers can talk to each other easily. You'll also want to consider just how important it is that your data remains secure, as this will have an impact on what type of protocol you select. Preparing this information will have you educated for the discussions you will need to have with potential vendors.

by: Van Theodorou

About The Author

Van Theodorou will help you slash your telecom expenses over 43% and assist or even become your telecom department at no cost to you. For a free analysis or phone consultation go his site at http://www.worldnet-long-distance.com

article source : www.articlecity.com

Read More..

Print Your Photos Like A Pro At Home

Even with the lowest pixel available in your digital camera, you too can produce photos and prints at home that can look better than those made in photo labs. Digital photo printing has come to a point where everybody is given the choice to either produce the output by themselves or to get assistance from outside. So when you opt to do it yourself, avoid the two mistakes often made by first timers of digital photo printing.

Mistake # 1: Digital camera is not set to the highest image quality.

Solution:

The first thing you should do is to set your digital camera to the highest picture resolution available. This can be found in the camera’s setup menu, and usually indicated as either “quality” or “size”.

In addition, when your digital camera offers you to select between TIFF and JPG when saving your photo, opt for TIFF. TIFF images appear much cleaner, crisper, and more detailed than the JPG version. However, you have to take note that TIFF files have larger sizes than JPG that your digital memory card may not be able to save many photos. Moreover, most digital cameras have memory cards that could only hold a few high resolution TIFF images. To answer this problem, you could either buy a larger memory card that will cost you almost $100, or just settle with choosing images you like best and discarding those not at par with your tastes.

Mistake # 2: Printer is not set up for the right resolution and paper type.

Solution:

Second, when you go to your printer’s settings in your computer find your printer’s setup and put to highest quality color digital photo printing. This is sometimes indicated in dpi (dots per inch). Still, some printers have a “Quality versus Speed” setting which makes you choose between faster printing or better looking photos. When you’re doing documents, it is better to use the Speed setting, while for photos, go for Quality.

Finally, choose a photo paper rather than plain paper. The reason why manufacturers produced and named them “photo” papers is because they’re definitely for this type of use. Photo papers come in either glossy or matte finish.

And take note of the brand of the photo paper. Particular printers choose to work only with photo paper of the same brand. It’s not that manufacturers wanted to get even the paper market to their side; it’s just that printers and papers are usually designed around each other.

For better results, just stick to the same brand as that of your printer. Even with the introduction of third party substrates, certain problems such as smearing and unnatural color balance will just show in the end when you choose to use other brands.

About Digital Printing Company

Digital Printing Company offers high impact digital printing solutions from prepress scanning and graphics design to customizing documents using Variable Data Imaging technology. They specialize in short run printing of books, manuals, and flyers, as well as large format printing of posters and trade show graphics. For more information, visit their website at www.digitalprintingcompany.com.

by: Granny's Mettle

About The Author

Granny's Mettle is a 30-something, professional web content writer. She has created various web content on a diverse range of topics, which includes digital printing topics, medical news, as well as legal issues. Her articles are composed of reviews, suggestions, tips and more for the printing and designing industry.

Her thoughts on writing: "Writing gives me pleasure… pleasure and excitement that you have created something to share with others. And with the wide world of the Internet, it gives me great satisfaction that my articles reach more people in the quickest time you could imagine."

On her spare time, she loves to stay at home, reading books on just about any topic she fancies, cooking a great meal, and taking care of her husband and kids.

acapili@losangelesprintingservice.com

article source : www.articlecity.com

Read More..

How To Copyright And Patent Your Software

If you're wondering how to copyright software, the good news is you've probably already done it. At least you have if you have ever written software. Most people get confused over exactly what having a copyright for their software means. Only those things that can be seen (when it comes to software) can be copyrighted. If you want to protect the abstract, look into patents. Otherwise if it is original, fixed, and tangible you can copyright it. Essentially you already know how to copyright software if you've put it into a finished form. Once you've written the source code, the copyright belongs to you.

Copyrighting software doesn't offer the protection that many people hope it will. The idea of software and anything about the finished product that wasn't available in a tangible (visible) form isn't protected by copyright. In fact, the only thing undeniably protected by software copyright is the source code. The question you should ask yourself is not how to copyright software, but how to patent your software.

What Is A Software Patent?

A “software patent” has no universal understanding. In general, owning a patent allows a company certain rights (or exclusivity) for a prescribed amount of time. Individuals or corporations seeking a patent must apply for a patent in each country in which they wish to have one. Unlike copyrights, patents are not automatically granted to applicants and can take a while to be approved.

The growth of Internet business and e-commerce has led to many patent applications for software, particularly software designed for specific business applications. While the cases are granted and successfully tried and defended in some countries, other countries offer no enforcement or legal recourse for those who do not honor the software patent, even if the patents were granted in those countries. The fine line between nations about what is and isn't patentable is another challenge to establish and honor patents.

Patents differ greatly from copyrights, which are issued automatically and recognized and enforced internationally. Copyrights protect the source code of software from being copied and registration is generally not required to protect your work.

Lately there is a new term, “Copyleft,” which is an obvious play on words and represents the rights to not only redistribute the copyrighted works, but also to modify and freely distribute those modifications. This term is very much in the spirit of many open source types of software and music. The catch for copyleft protection is that the newly created work be distributed in the same manner and spirit in which it was received. In other words if you were freely given the software, then you must freely provide the improvements and modifications you made to that software.

One unfortunate circumstance surrounding patents is the unequal and obvious disparity between the haves and the have not's. Patent enforcement for software, unlike literature and music, is largely subjective. In literature and music, it is obvious that the copyright has been abused or that the work has been copied; this isn't as simple with software.

How to Obtain a Patent

To obtain a patent for your software, you must apply for a patent in each country that offers patents for software and in which you wish to have the protection a patent can offer. There is no universal legal definition of what a software patent is. Each country that offers patents also has a different definition for what is protected by that patent, as well as for why a patent will be granted. Also consider the fact your software may be given a patent in one country where you applied and none of the others.

Of course, if this is not enough fun for you, you can try to deal with the red tape involved in dealing with multiple governments to resolve any issues or disputes that may have arisen from your software patents.

If you are applying for international patents (which can secure a profitable future for you and your business), you need to find a good patent lawyer and have him walk you through the entire process. Patents are complicated. When you're not exactly sure of what you're doing, whom you need to talk to, and what the next step is, you stand to waste a lot of time while taking a bigger risk. It is much easier to deal with how to copyright software on your own than it is to work out the complicated world of software patents.

If this is your first time designing your own software, you have every right to be nervous. Remember: lawyers went to school much longer than you to know what to do in this situation, so you should not be expected to know how to copyright or patent software when you've never done it before.

by: Richard Cunningham

About The Author

Richard Cunningham is a freelance journalist who covers copyright law for http://www.ResearchCopyright.com. Download his free e-book, "Copyright Basics" at http://ResearchCopyright.com.

Article source : www.articlecity.com

Read More..

Wireless Network Security in 6 Easy Steps

Connecting your home and office computers with a wireless network sure makes things convenient ...BUT the very feature that makes them so popular is also their biggest weakness! Anyone with the knowledge can intercept your signal and gain access to your network if it is not secure. The technicians at computerguyslive.com offer the following six easy steps to wireless security for your home or office.

1. Change the System ID: Devices come with a default system ID called the SSID (Service Set Identifier) or ESSID (Extended Service Set Identifier). It is easy for a hacker to find out what the default identifier is for each manufacturer of wireless equipment so you need to change this to something else. Use something unique- not your name or something easily guessed.

2. Disable Identifier Broadcasting: Announcing that you have a wireless connection to the world is an invitation for hackers. You already know you have one so you don't need to broadcast it. Check the manual for your hardware and figure out how to disable broadcasting.

3. Enable WEP (Wired Equivalent Privacy): WEP encrypts your data so that only the intended recipient is supposed to be able to read it. As with all security measures there are ways around it, but by using encryption you will keep the novice hackers out of your systems. It is best to use 128bit rather than 40bit encryption (it is exponentially harder to crack).

4. Restrict Unnecessary Traffic: Many wired and wireless routers have built-in firewalls. They are not the most technically advanced firewalls, but they help create one more line of defense. Read the manual for your hardware and learn how to configure your router to only allow incoming or outgoing traffic that you have approved.

5. Change the Default Administrator Password: This is just good practice for ALL hardware and software. The default passwords are easily obtained and because so many people don't bother to take the simple step of changing them they are usually what hackers try first. Make sure you change the default password on your wireless router / access point to something that is not easily guessed like your last name.

6. Patch and Protect Your PC's: As a last line of defense you should have personal firewall software such as Zone Alarm Pro and anti-virus software installed on your computer. As important as installing the anti-virus software, you must keep it up to date. New viruses are discovered daily and anti-virus software vendors generally release updates at least once a week. You also must keep up to date with patches for known security vulnerabilities. For Microsoft operating systems you can use Windows Update to try and help keep your computer current with patches.

Following these steps will insure that hackers and hitchhikers don't surf on your wireless network, or more importantly, these steps help block unwanted access into your computer network, and your valuable data.

Copyright 2006 Chris Kaminski

About The Author

Chris Kaminski has worked in computer repair and web development for the last 20 years. Kaminski is currently the Head Technician and CEO of Computer Guys Live Inc., an online computer repair company based in Asheville, NC. For more tech tips and step-by-step wireless guides visit http://computerguyslive.com or write to custserv@computerguyslive.com.

Article source : www.articlecity.com

Read More..

Knowing Your Data Is Safe

All companies of today make great use of the technology available to them and rely on their data. Most businesses however, don’t have the budget to invest in network storage or large servers, which is what the bigger companies use to transfer information and create a backup of the information they rely on to carry out their operations.

Smaller businesses have a limited budget. When most encounter a disaster they never seem to recover, normally going out of business. Past disasters such as 9/11 or the dreaded hurricane have showed the importance of backups and disaster planning. Companies that thought things out and protected their data survived these disasters, while those that didn’t went out of business.

There are several ways that you can protect your data and keep it safe. One of the most popular and easiest ways to protect your data is with a server. Servers are great for both large and small businesses, and protection the data for your business. They can tend to get expensive though, with the most popular server, Microsoft, starting out around $3,000.

Unlike other options, servers provide you with a safe and secure system to store all of your corporate data. You can set the permission of your files to prevent any unauthorized access, to keep your files safe. When using servers, most of the loss comes from either accidental deletion or employees that are upset with corporate management and decide to get into the server and erase files.

When using a server, your data will be stored in one central location, and not spread around over different computers in your network. Servers are very user friendly, and keep your files neat and tidy - in one location. This way you don’t have to go looking all over the place for your data, you can look in the server and find everything you need.

Another way to keep your data safe is with CDs, DVDs, and even external hard drives. If you are using any of these methods, you should always do a backup of your information at the end of every day. With disasters being completely unpredictable, backing things up every day will ensure that you are protected if something should occur.

If you are backing things up to CD or DVD media, you should always put the discs in a safe and secure location, preferably a fireproof safe. This way, if the office should catch on fire, you’ll have your backup discs protected. You should always add your new backups to the safe at the end of every working day, so you’ll have them tomorrow if you need them.

You can also store your data and information offsite as well. This is a highly recommended option, as you pay a flat monthly fee and a company stores your information. Most have secure vaults and servers for your data, which ensures protection from unauthorized accidents or hazards. You don’t need to worry about your data when using these services, as they will do the protection for you.

No matter which method you use for protecting your information, you should always make sure that you have a plan. Corporate data is very important and essential to success, which is why you should look into immediately if you don’t have a plan already. If you know your data is safe and protected from hazards and unauthorized access - you’ll have the peace of mind in knowing that your data will be there each and every time you need it.

by: John Ugoshowa

About The Author

John Ugoshowa. You are welcome to use this article on your website or in your ezines as long as you have a link back to http://www.quickregister.net/partners/

For more information on data recovery see the computer section of Quickregister.net Free Search Engine Submission Service at: http://www.quickregister.net/partners/

article source : www.articlecity.com

Read More..

An Apple Fan's Review of the MacBook

First, the bad stuff. Sadly, there are 1 or 2 dead pixels on the glossy wide-screen, but a quick look around the Internet and I've realized there's not a lot of point taking it back because low end TFTs can suffer from dead pixels. It's only when you pay more for a "pixel-perfect" display that there is a return policy on dead pixels. Oh well.

That aside, it has all the trade marks of a classic Apple product. The packaging was superb, and minimal. In fact, I've noticed a trend in packaging. My new Sony Rescission K310i from Orange came in a box barely big enough to fit everything in. It's good to see manufacturers producing packaging solutions that are both functional and well designed.

Once out the box, the MacBook looks simply stunning. The outer casing is a similar white polycarbonate (I believe) to the iBook. Opening the MacBook is a joy - there are no latches or buttons, it's all magnetically done. Opened, the MacBook is a departure to Apple laptops of the past. The keyboard keys are spaced out more and flatter, and the casing is the same ceramic-like material that is found on the base of the Mac Mini.

The connections on the left of the MacBook are the usual stuff, with one notable exception - the MagSafe power connection. It's a small, rectangular port and is also magnetically charged. When plugging in the power adaptor, the connector literally snaps into place due to the magnet. Very neat. The concept is simple, if the power cord is ripped out, instead of pulling the laptop with it, the MagSafe connector just comes out.

Powering up is quick and simple, and after the standard Tiger set up, we're up and running. Only a password was required to connect to my wireless network (new MacBooks have Airport built in) and a few more minutes tinkering had the MacBook set up how I like my Macs to be.

The first noticeable thing is how bright the 13.3 inch display is compared to my old 12 inch Powerbook. I can see me having to turn the brightness down to avoid headaches. The keyboard, which I was worried about, turns out to be almost as usable as a standard keyboard, with lovely positive feedback. Again, a definite improvement over my Powerbook.

After a few minutes playing on the Internet and trying to fix the couple of dead pixels (to no avail) I had a good play, running a few apps to see how the machine responded. General OS stuff is super quick (although the Quad Xeon I played with in the Trafford Centre was slightly quicker!).

From what I've seen so far, I'm impressed. With a 2GHz Intel chip, 1 Gig of RAM and an 80 Gig hard drive, it's got plenty to keep me going (although one of the first websites I visited was Crucial to price up the 2 Gig kit).

by: James Ashberry

About The Author

James Ashberry is a die-hard fan of Apple products. Read more of James' rantings at James Ashberry's Blog. Web Design Liverpool - http://www.webstarcreations.co.uk/.

article source : www.articlecity.com

Read More..

How To Back Up Files Correctly

Throughout the world of computers, it’s simply amazing just how many people are scared to death of losing their data. Most of those who are scared, don’t give a second thought to backing up their data. Even though the thought may be the same, most people are worried more about losing their data than actually backing it up - which can prove to be a downfall in the face of disaster.

The process of backing up files is done by using servers, floppy disks, CD, DVD, external hard drives, or other methods to keep the data protected. This way, when something happens to your hard drive and you lose your information, you’ll have the information backed up so that you can easily access it again. Data that is important, such as tax files or business records should always be backed up, to ensure that nothing happens to it.

If you are using Windows as your operating system, it will be a lot easier to back up your files. Windows XP has a back up facility in it, so that it can make things a lot easier when you create your backups. If data that is stored on hard drives with XP becomes lost, Windows will immediately fetch the file from another drive or area where it has been stored as a back up. This is a very useful technique, although it still has to be practiced to ensure that you understand how it works. Although it may be very useful, it isn’t as safe as other options.

In order to back up your data and programs in a safe and efficient manner, you’ll need to use some of the more reliable methods, such as external hard drives or servers. Offsite backups are great as well, as the data you backup isn’t left around your office, it is instead entrusted with a company who will ensure that it stays protected.

No matter which method or methods you have decided to use for backing up your data, you’ll be happy to know that they are all easy to use. CD and DVD backups are easy to create, all you need is the software installed on your computer to create the backups with. Servers are easy to use as well, all you have to do is upload your data to a server, then log into the server anytime you need to have access to the data.

All in all, creating backups of your data and information is the perfect way to ensure that you always have it in the event of a disaster. Disasters can happen at any time, which is why you should always back up your data anytime you have something new or something that you haven’t backed up yet.

by: John Ugoshowa

About The Author

John Ugoshowa. You are welcome to use this article on your website or in your ezines as long as you have a link back to http://www.quickregister.net/partners/

For more information on data recovery see the computer section of Quickregister.net Free Search Engine Submission Service at: http://www.quickregister.net/partners/

article source : www.articlecity.com

Read More..

FTP Hosting For Small Businesses

File Transfer Protocol (FTP) is an authentic and secure communication protocol designed to exchange information from one computer to another over the Internet. Irrespective of business volume, sharing information or exchanging files on the World Wide Web is a common phenomenon in every business process. Most of us are familiar with Email to share files and other information over the Internet.

The importance of FTP hosting service increased remarkably for smooth and secure business communication. File Transfer Protocol can restrict unauthorized users to intervene in the business process. If you are running a small business and looking for a secure as well as efficient communication protocol then register for a FTP hosting service. FTP hosting service will provide you a secure network with a FTP server and a Client server to exchange information over the Internet.

Selecting an FTP hosting service for your Small Business

Internet is the right place to make sufficient research on FTP hosting service providers and service charges. Free hosting services do not provide the facility of File Transfer Protocol, most cases you have to pay for this secure file transfer service. First you have to register for a selected FTP hosting service. It is recommended to select your primary domain name and secondary domain name based on the name of your company. During the registration process you have to select the period and other facilities for FTP hosting service and based on that service provider will allocate a separate space for your small business in their server.

FTP hosting service to ensure a secured network in Small Business process

FTP hosting service allows you to share all types of files (text, image, audio, multimedia etc.) to targeted FTP account holders. FTP service providers will allocate FTP accounts with unique user name and password. Therefore you can create multiple FTP user account under the registered FTP site. FTP hosting service will allow only authorized account holder to access the server that is allocated for your business. Through your FTP account you can upload copies of the files in the server. Only authorized clients, vendors or end users can view and download selected files from your FTP site through their account.

Security of digital information is necessary in Health Care Services. If you are running a small business where you have to share medical report, research papers and other types of private document then it is recommended to go for Standard FTP. Standard FTP comes with the feature like encryption, which is not available in general FTP hosting service. In this process the system will encrypt the content of the file before uploading the file in the server.

Features of FTP hosting services for Small Business

For small business you can go for basic FTP hosting. Following are some features of basic FTP hosting:

Sufficient space in the FTP server to store any types of files. You have to select the storage based on your business volume.

Web-based Control Panel Sufficient Sub-FTP accounts for clients, vendors and employees Daily statistics of the activities along with daily backup facility Directories, which are protected by Password Additional security features like – Secure FTP or SSL. These features are optional and are not available with general FTP hosting services.

Based on the requirement of your small business you can enjoy additional disk space and/or additional monthly file transfer through FTP server by paying reasonable amount per month to the service provider.

Cost factors

For small business money matters, therefore it is important to select the right FTP service provider. It is observed that, some special software is required to utilize this unique file transfer service. Since you have to pay the bill for FTP hosting service throughout the period therefore it is better to select the an FTP hosting service that does not require any extra software to support the process of exchanging files over the Internet. By this you can save some extra cash for your small business.

Values of FTP hosting services are quite affordable for small business operators. So register for FTP hosting service for your small business and experience an efficient and secure process of transferring files from one location to another.

by: Mike Jewson

About The Author

Mike Jewson is a Network Engineer with "InstantFTPsites.com". You can learn more about "FTP Hosting" services online at http://www.InstantFTPsites.com

© 2006 InstantFTPsites http://www.InstantFTPsites.com You may reprint this article online and in print provided the links remain live and the content remains unaltered (including the "Author Biography").

article source : www.articlecity.com

Read More..

Wireless Network Security

It seems that more and more home users are going with wireless networks rather than the tradition wired networks with wires hanging everywhere and running wild around the house and in the crawlspace. What seems like a good idea quickly turns into a nightmare if you don’t vamp up the security of your wireless network.

Speed is of the essence. Typically, one thing matters to new users of wireless, getting connected and browsing that first website. While wireless connectivity can accomplish this, it’s best to set up your wireless connection securely before venturing out into cyberspace. Below are some tips to help secure your wireless network.

Change the default admin password. Admin passwords are easily figured out by attackers when they are left as the default. Not changing your wireless admin password opens your network to attack and can lead to many problems depending on the attacker’s agenda.

Another wireless security measure you will need to take is turning on encryption. Enabling WEP encryption on your wireless network will help you protect your privacy and all your info won’t be floating around outside your home waiting to be picked up by a passerby. It’s important to remember that all your devices on the wireless network will need to have the same encryption. So find the strongest encryption possible that will work on all devices of the wireless network.

Stop the auto-connect feature. Do not allow your devices to auto-connect. Allowing auto-connect may connect to a network that you don’t particularly want. Example, you don’t want your laptop connecting to your neighbor’s network and sending info.

It’s also a good idea that you install firewalls on all devices that connect to the wireless network. Even if the wireless router is firewalled, it’s important to also install firewalls on all computers that are connected to the wifi network. It’s important that these firewalls be set up correctly and block any intrusions that may compromise your wifi network.

Position your wireless router close to the center of your home. Although the reach of wifi networks can vary greatly, it’s important to not allow the signal to float around great distances from the main access point. It virtually impossible to stop all leakage from exiting your home. But minimizing the risk to your wifi network will help to protect it.

Another good idea for wifi network security is to not allow broadcast of the SSID. Your router may have SSID broadcasting set up by default; however you should be able to change this setting in the configuration. This feature is only useful for mobile environments, and is not needed in home wifi networks.

These are just a few tips to securing your wifi network. It’s always a good idea to check for firmware updates to your router as new exploits and vulnerabilities arise. Some routers will have an auto update feature and it’s important to use it. Using auto update will help keep your wifi network secure without the need of remembering to check for updates.

by: Jake Forrester

About The Author

Jake Forrester writes Wifi Security articles for SX Security. Learn more about Wireless Security by visiting http://www.sxsecurity.com

article source : www.articlecity.com

Read More..

Data Recovery Over Hard Disk Failure

Hard Disk: An Introduction


Hard Disks are used to store information. All information on computers are stored in files. Hard disks store the majority of information on today's modern computer. Hard disk drives (HDDs) can be critically damaged by static electricity, shock, and other factors, often resulting in failure or the loss of valuable data. In many cases it may become necessary to recover information from your hard drive. Such retrieval is quite possible.


Hard Disk Failure


*Physical Failures


Physical failure occurs from sudden switch off, power failure, sliding them off desks and cheap components. As for data loss, data is only magnetic impulses on the surface of a hard disk. And ridiculously small bits of magnetism at that! When the magnetic impulse fades, or changes position, trouble starts.

Drive Alignment Drift is another cause of problems. Mechanical devices are subject to wear and tear, heat and cold, loosening tolerances etc.

The small changes in the read/write heads wouldn't matter usually, as data still gets written in the same place as it will be read later. However, there is some data that hardly ever gets re-written, and that is the Sector ID Headers.

*Logical Failures

Master Boot Record Failure

Technically, when the Master Boot Record is working correctly, the master boot code scans the partition table for the active partition, finds the starting sector, loads a copy of the boot sector from the active partition into memory and then transfers control to the executable code in the boot sector. If the master boot code cannot complete these functions, the system displays a message similar to the MBR error.

*Boot Sector Failure

The boot sector is a region of a hard disk, floppy disk, and other similar data storage device. It is loaded to memory and executed as a part of the bootstrap sequence. The boot sector contains a small computer program that is loaded on the operating system into memory and transfers the control.

Most boot sector failure occurs by the defection of boot sector virus. Boot sector viruses are usually spread by infected floppy disks. In the past, these were usually bootable disks, but this is no longer the case. A floppy disk does not need to be bootable to transmit a boot virus. Any disk can cause infection if it is in the drive when the computer boots up or shuts down.

*Accidentally Deleted Data

Some time some how you may delete a file thinking we don?t need it any more, but in a week or or two you may realize that it is a needed one. It happens to the best of us, but fortunately there are ways to get these lost files back.

When it comes to data on your computer, it is almost impossible to accidentally remove it beyond recoverability. Even if you are intentionally trying to completely wipe a file from your hard drive it is exceedingly difficult.

*Cross Linked Files

A file system error that corrupts the contents of an existing file by writing data from another file into the same cluster. Running Scandisk or a similar program cleans up the problem, but one of the files is no longer usable.

*Bad Sectors

It is a portion of the Hard disk that cannot be used any more. If a part of the disk get bad sector which contains data then those data is to be recovered before use. When you format a disk, the OS will mark all the unusable sector as bad sector, however, this does not affect the overall performance of the disk as the damaged space is considered unusable.

Hard Disk Data Recovery

*Replace the (Circuit Board) PCB

Upon a Hard Drive circuit board failure, it is possible to get back the data by carefully replacing the PCB of the hard drive.

*Replace the Firmware

Hard disk firmware is the information that is used by the computer that allows it to correctly interact with the hard disk. It may be replaced or updated by the matching firmware.

*Replace the Head Stack

There are common situation that may be due to head failures. There is a small chip located in the head stack that is called PREAMPLIFIER. Working with preamplifiers always includes some difficulties, because, practically, they can not withstand static discharges. If re-soldering is needed, one should follow a number of rules to protect a preamplifier from static damage caused by careless finger touching. Although this task is very risky and it should be done in a high secured lab specially created for this task.

*Move the disk to another Drive

In some cases complete functionality of the Hard drive may be disabled while only the internal disk plate is without any damages or errors. In those situations, it is possible to move the disk to another drive.

*Spin-Stand Testers

Hard drive manufactures and their head media; preamplifier and read channel suppliers do have very accurate, very expensive "magic machines" called Spin-Stands. These are used for testing and experimenting with heads and disks. They are used mostly by researcher and development departments.
*Magnetic Force Microscopes (MFM)

Magnetic force microscopy is a powerful tool for high-resolution magnetic imaging of most data storage media. As the density of magnetic media is higher, the bit becomes smaller than the wavelength of light, so optical techniques can not resolve it. General MFM is capable of imaging the magnetic domain of several tens of nanometers. Also, MFM is almost simultaneous with measuring the surface characteristics of topography and roughness of the same area with sub-angstrom vertical resolution.

Recovery Softwares

*SpinRite 6.0

SpinRite is a stand-alone DOS program designed to refurbish hard drives, floppy disks and recover data from marginally or completely unreadable hard drives and floppy disks and from partitions and folders which have become unreadable.

*Ontrack data recovery software

Ontrack Data Recovery offers the industry's highest quality and cost-effective do-it-yourself data recovery software solutions for almost any data loss situation covering servers, desktops or laptops for all media, operating systems and file types. Ontrack's EasyRecoveryTM family of products is unmatched in its ability to recover/repair from all causes of lost data.

*Recover My Files

Recover My Files data recovery software will easily recover deleted files emptied from the Windows Recycle Bin, or lost due to the format or corruption of a hard drive, virus or Trojan infection, and unexpected system shutdown or software failure.

For more Data recovery topics http://www.pc4safe.com

by: Muneer Mohammad

About The Author

Admin & Publisher

PC4safe http://www.pc4safe.com


article source : www.articlecity.com

Read More..

Tips For Data Recovery

Anytime your hard drive crashes or you lose your data, you’ll need to turn to data recovery to properly restore your information. Data recovery is something most computer users are familiar with, as a majority of us have had to turn to data recovery at some point in time. Even though hard drives are becoming better and better, they are still mechanical and will always encounter problems.

The first thing to do, before any problems happen, is to always back up your data. If you create backups of your information, you’ll be well prepared in the event of a disaster. This way, even if your hard drive cannot be repaired and the data is lost forever, you’ll have the back ups to continue going as normal. If you didn’t make back ups, you’ll find the situation very traumatic when you discover that your data cannot be recovered.

Most hard drives will last for years before they start to encounter any type of malfunction or hardware problems. You can help prevent data loss by turning off your computer when it isn’t in use, or shutting it down when you hear the hard drive making an odd noise. If the hard drive starts to malfunction, letting it continue to run will only do more damage. If you shut it off immediately and take it to a specialist, you’ll have a much better chance of getting it repaired.

With natural disasters, hackers, viruses, or other problems, you won’t have the time to react. Before you know it, your hard drive will be damaged and your data will be gone. Although this can be very frustrating, data recovery can normally bring your information back. All you need to do is take the hard drive to a local specialist, then let them work their magic and show you the power of data recovery.

There are software programs out there that claim to recover lost data, although you should avoid them at all costs. Most of time, these software programs will do your hard drive more bad than good. Even though software may cost a lot less than professional data recovery services, the professional services will guarantee their work. If you turn to software and it only makes things worse - your more or less out of luck, as the software doesn’t guarantee anything.

Anytime your hard drive fails and you seem to have lost your data, you should turn to professional data recovery services immediately. They may cost you a lot of money, although they do the job right the first time. When it comes to your data, you really don’t want to take any chances - especially if you had important documents and files stored on your hard drive.

by: John Ugoshowa

About The Author

John Ugoshowa. You are welcome to use this article on your website or in your ezines as long as you have a link back to http://www.quickregister.net/partners/

For more information on data recovery see the computer section of Quickregister.net Free Search Engine Submission Service at: http://www.quickregister.net/partners/

article source : www.articlecity.com

Read More..