Category Archives: Internet

How Firewalls Work

How Firewalls Work

At their most basic, firewalls work like a filter between your computer/network and the Internet. You can program what you want to get out and what you want to get in. Everything else is not allowed. There are several different methods firewalls use to filter out information, and some are used in combination. These methods work at different layers of a network, which determines how specific the filtering options can be.

Firewalls can be used in a number of ways to add security to your home or business. Large corporations often have very complex firewalls in place to protect their extensive networks. On the outbound side, firewalls can be configured to prevent employees from sending certain types of emails or transmitting sensitive data outside of the network. On the inbound side, firewalls can be programmed to prevent access to certain websites (like social networking sites). Additionally, firewalls can prevent outside computers from accessing computers inside the network. A company might choose to designate a single computer on the network for file sharing and all other computers could be restricted. There is no limit to the variety of configurations that are possible when using firewalls. Extensive configurations typically need to be handle and maintained by highly trained IT specialists, however.

For home use, firewalls work much more simply. The main goal of a personal firewall is to protect your personal computer and private network from malicious mischief. malware, malicious software, is the primary threat to your home computer. Viruses are often the first type of malware that comes to mind. A virus can be transmitted to your computer through email or over the Internet and can quickly cause a lot of damage to your files. Other malware includes trojan horse programs and spyware. These programs are usually designed to acquire your personal information for the purposes of identity theft of some kind. There are two ways a firewall can prevent this from happening. It can allow all traffic to pass through except data that meets a predetermined set of criteria, or it can prohibit all traffic unless it meets a predetermined set of criteria.

Comodo Firewall Pro uses the latter way to prevent malware from installing on your computer. This free software Firewall, from a leading global security solutions provider and certification authority, use the patent pending “Clean PC Mode” to prohibit any applications from being installed on your computer unless it meets one of two criteria. Those criteria are a) the user gives permission for the installation and b) the application is on an extensive list of approved applications provided by Comodo. With this feature, you don’t have to worry about unauthorized programs installing on your computer without your knowledge.

Comodo Firewall Pro is rated as Top Firewall recommended for both beginners and advanced users. It has a number of unique features including “Defense +,” an advanced host Intrusion Prevention system (HIPS), which prevents changes to critical system resources. This software is highly customizable, so that you can adjust it to suit your specific needs.

By: Vijayanand

Article Directory: http://www.articledashboard.com

Vijayanand working as a online marketing co-ordinator in ID Theft team in Comodo, a leading internet security provider, offers a real time Identity Theft Prevention and Identity Fraud restoration services among others.

Please Rate this Article

Click the XML Icon Above to Receive Security Articles Via RSS!
Additional Articles From – Home | Internet Business | Security

* Start up guide to become an Information security consultant – By : Nirmalya Jain
* Why Would Someone Steal Another’s Identity? – By : Fred Jones
* The Problem of Identity Theft – By : Fred Jones
* Microsoft and US Law against internet pop up scams (Part 1) – By : Jennifer Quirk
* Associate Degree in Security Management – By : Abby Reid
* Helpful Tips for Fire Safety – By : Franchis
* Fire Marshals for Your Safety – By : Franchis
* Fire Extinguishers and Small Fire Mishap – By : Franchis
* Fire Safety Equipments For Emergency – By : Franchis
* Internet Security Appliance – By : Harish Chib

Understanding of Squidoo

Squidoo has been an extremely popular platform to launch as many free web pages as you can successfully maintain. However, there exist mixed feelings about the effectiveness of the site and its long term implications for a successful internet marketing strategy. Some people love Squidoo, some hate it, and some feel that it is so-so for a free service. If you are brand new to Internet Marketing, I would suggest that you definitely start some lenses (Squidoo lingo for a single web page). Why? Well the benefits are many, and below, I will list some of them for you to consider.

The biggest positive aspect of Squidoo is that it is 100% free. You pay no hosting fees, no domain registration fees, and you don’t have to deal with any server maintenance on any of the pages you create (That is all done by a guy named Gil, a very wise webmaster who works at Squidoo). This is a huge help for people who know nothing about web site management, ftp, mysql databases, and content management systems. While seasoned internet veterans will tell you that WordPress is a breeze, and you’ll be up and running in a day, trust me, when I say- you won’t be. Many people suggest one click installation for WordPress. However, this one click installation does not accept upgrades at many web hosting companies, and you will be bashing your computer when the day comes that you have to upgrade to yet another version of WordPress (they upgrade quite a bit). If you are brand new to the guts of the internet, you will be trapped in a spider web of WordPress for at least a month if you work 8 hours a day with it, for 1 month straight.

With Squidoo, setting up a page is extremely easy, and you can start driving traffic to it immediately. In fact, traffic will find you immediately, because you are creating a page that is part of the huge Squidoo website that has very good ranking power in the search engines.

Before we discuss how exactly to create a Squidoo lens (remember this is a page on Squidoo that you make), I want to discuss in more detail as to why Squidoo is a great place in general to learn Internet Marketing. If you are serious about Internet Marketing, and doing it full time, heed the advice in these next few sentences very closely.

The most beneficial aspect of Squidoo is learning. You see, Squidoo is like going to Internet College for free. It is like going to an Ivy League Internet College for free. Why exactly? Because some people who make money with their Squidoo pages are very sophisticated Internet Marketers. And they realize, that if they make some of their pages about the tools and methods for making money online, their pages will get tons of views, visitors, and clicks, because there are many beginners at Squidoo who want to learn. But, these pages about making money online are actually grade A work, because at Squidoo, you know who is “selling” you the information. This is because these wise Internet Marketers are branding themselves at Squidoo, because there are tons of people to follow the quality content back to their personal websites. Consequently, they know that if their information is not top notch you won’t buy their products and “brand”. This is much different than the selling of junk e-books, when you don’t know who is selling them to you, because their domains are set to privacy, and they are marketing anonymously.

It is very important to understand that Internet marketing requires many, many skill sets, if you do not outsource any work. At Squidoo, you can learn all of these skills from professionals. You can find this information elsewhere, but not as easily as at Squidoo. You want to use Squidoo to make your own pages, but you also want to use it to learn from other people (at Squidoo people are known as lens masters).

There are currently excellent pages at Squidoo, concerning each of the following subjects that are absolutely necessary to successful internet marketing: Rss, css stylesheets, html, SEO, and link building. And, as mentioned before, the people presenting this to you have a vested interest in giving you good information. If you think you are going to make a go at using computers, as your employees, to help you make tons of cash, you need to know how they work. Outsourcing everything technical is a nightmare, unless you pay premium prices for competence and honesty. Trust me when I say that you want to learn how to do all technical subject matter yourself (I am not talking about everything under the sun, but the core, fundamental computer language of the internet.) That means hosting, ftp, rss, html, and knowing how to fix php, and css stylsheets. At Squidoo, you can learn all of this for free.

Article Source: http://www.articlecache.comArticle Directory | Free Articles

Arief Prajogo is an Indonesian Web Publisher. Learn how to make money online by reading his blog at http://www.ariefprajogo.com

What Is Cybercrime?

What Is Cybercrime?

It’s complicated. Cybercrime cannot be described by any one word. Just like crime as we know it, cybercrime has many different applications and can occur anytime and anyplace. Identity thieves and other criminals use several different methods, depending on how much they know and what their objective is. Cybercrime is ‘crime’ involving some sort of a ‘computer’ or ‘cyber’ factor.

The Council of Europe’s Cybercrime Treaty uses the term ‘cybercrime’ to identify offenses ranging from criminal activity against data to content and copyright infringement [Krone, 2005]. Others [Zevar-Geese, 1997-98] have stated that the definition is not that confined and include fraud, unauthorized access, child pornography, and cyberstalking. The United Nations have authored the Manual on the Prevention and Control of Computer Related Crime and they include fraud, forgery, and unauthorized access [United Nations, 1995]. Obviously cybercrime comes in many different packages and different types of cybercrime are going to require different defences if your computer is going to be safe.

Internet security software giant Symantec draws from the various definitions of cybercrime and define it as ‘any crime that is committed using a computer or network, or hardware device’. Symantec says that ‘the computer or device may be the agent of the crime, the facilitator of the crime, or the target of the crime’. The cybercrime may occur just on the computer or in addition to other places. To help us understand this complex group of crimes, Symantec has divided it into two categories and they are Type I and Type II cybercrime

Type I cybercrime contains the following properties:

Typically it is a single event (in the mind of the victim). An example would be when a victim downloads a trojan horse, without knowing it, and then the horse installs a keystroke logger into his or her machine. Or the victim could receive an e-mail that carries a link to a supposed known entity, but instead it is a link to a hostile website. Type I cybercrime is often enabled by crimeware programs like keystroke loggers, viruses, rootkits or Trojan horses. Software flaws or vulnerabilities will usually provide the anchor that the identity thief/criminal is looking for. An example would be a group of criminals having control of a website and then taking advantage of a vulnerability in a Web browser that would allow them to place a Trojan horse on an un-suspecting persons computer. Type I examples include but are not limited to phishing, theft or manipulation of data services by way of hacking or viruses, identity theft, and bank or e-commerce fraud.

Type II cybercrime includes, but is not limited to cyberstalking and harassment, child predation, extortion, blackmail, stock market manipulation, complex corporate spying and planning/carrying out terrorism. The properties of Type II cybercrime are a set of circumstances etc. that are an on-going series of events where there are repeated interactions with the target. One example is a target being contacted on a social networking site or chat room and because of the calculated time and effort of the criminal, a relationship is formed. Inevitably the target is exploited in a criminal manner. Another example is a group of identity thieves, terrorists or other criminals using hidden messages to communicate in a public forum to plan activities or discuss money laundering locations. Type II cybercrime is usually enabled by programs that are not classified as crimeware where conversations may take place using IM (instant messaging) or files may be shared using FTP.

By: Vezina

Article Directory: http://www.articledashboard.com

Do you want to learn about Identity Theft Prevention & Identity Theft Protection. Stop Identity Theft with LifeLock. LifeLock can guarantee identity theft never happens to you. To see how lifelock identity theft protection works

Please Rate this Article

Click the XML Icon Above to Receive Security Articles Via RSS!
Additional Articles From – Home | Internet Business | Security

* Start up guide to become an Information security consultant – By : Nirmalya Jain
* Why Would Someone Steal Another’s Identity? – By : Fred Jones
* The Problem of Identity Theft – By : Fred Jones
* Microsoft and US Law against internet pop up scams (Part 1) – By : Jennifer Quirk
* Associate Degree in Security Management – By : Abby Reid
* Helpful Tips for Fire Safety – By : Franchis
* Fire Marshals for Your Safety – By : Franchis
* Fire Extinguishers and Small Fire Mishap – By : Franchis
* Fire Safety Equipments For Emergency – By : Franchis
* Internet Security Appliance – By : Harish Chib