Computer Tutorial

Its all about computer world tutorial and a guidance in it

Archives

Get free article to your email:

Delivered by FeedBurner


Many Unix systems, including Linux, FreeBSD, OpenBSD, and the like, come with packet filtering packages. They require special kernel options and modules to be built in, but because security has become so important, these options and modules are almost always built into the default system install.

Here we'll talk about Linux's ipchains software. Then we'll take a look at FreeBSD's IPFW tool kit. It's important to note that ipchains, iptables, and IPFW are all "userspace" programs.

That means that the programs run and reside in memory designated for programs run by the users as opposed to those run by the system kernel. The actual packet filtering is done by the system kernel itself. These programs should be thought of as user interfaces to the kernel's packet filtering capabilities....

Ipchains

Ipchains is the first packet filter we'll discuss. Ipchains was originally based on a tool called ipfwadm, a Linux spawn of BSD's IPFW, which we'll discuss shortly. The idea behind ipchains was to create chains of rules for a packet to traverse. At any point in a chain, the packet could be passed on or denied. Ipchains has all but been replaced by iptables for Linux kernels running the 2.6 series; however, it may be included in most Linux distributions along with iptables. It is a good starting point for our first look at firewall packages, and it also gives us an example of a stateless firewall.

To use ipchains, all you need is a Linux box with the proper options compiled into the kernel. You can tell if your kernel has ipchains support if the file /proc/net/ip_fwchains exists.

Most current Linux installs will have these options built in, but earlier Linux installs may need to be modified. Unfortunately, we can't go into detail here about how to build a Linux kernel; numerous Internet resources are available on building kernels for firewall support. You can check out the ipchains man page or visit the following web pages for more details: http://www.tldp.org/HOWTO/IPCHAINS-HOWTO.html.

You'll also need to make sure that the file /proc/sys/net/ipv4/ip_forward contains the value 1 if you want to be able to forward packets from one network to the other. You can type echo 1 > /proc/sys/ net/ipv4/ip_forward as root to make sure that your firewall is ready to forward packets.

Ipchains is a user interface to the kernel's packet filtering capabilities. All of the actual packet examination gets done in the kernel's memory space. The ipchains program simply dictates the rules to the kernel. Unfortunately, this means the kernel will forget your rules any time the system is rebooted. Thankfully, you can use the tools ipchains-save and ipchains-restore to make a dump of the current ipchains rules in use and restore them after a reboot.

[+/-] Read more...

The marketplace is crammed with software programs designed to help you free up resources and declutter and protect your system. With so many choices available, knowing which products to use can be confusing. I’ve put together ten products I’ve found interesting and helpful. You can’t go wrong with them.

1.System Mechanic: http://www.iolo.com/sm/index.cfm

Iolo Technologies publishes System Mechanic, an award-winning collection of tools that help clean your system. Some of its tools fix shortcuts, clean and optimize the Registry, defragment disks, optimize memory, remove duplicate files, block pop-ups, and remove some spyware. This is one great set of tools!

2. Window Washer: http://www.webroot.com/wb/products/windowwasher/index.php

Window Washer is a system cleaner that helps maintain your privacy. It removes information collected with browsing, such as your cache, cookies, history, deleted e-mails, and so on. It also cleans your Recycle Bin, program run histories, recent documents lists, and the like...


3. Spring Cleaning: http://www.aladdinsys.com/win/springcleaning/index.html

Spring Cleaning, from Aladdin Systems, is a comprehensive system cleaner. It uninstalls and removes unwanted programs, cleans the Registry, finds and cleans duplicate files, removes plug-ins, and eliminates cookies. It also includes complete undo capability to protect against accidental file erasure.

4. McAfee VirusScan Professional: http://us.mcafee.com/root/package.
asp?pkgid=145


VirusScan is one of the largest selling anti-virus programs. It automatically scans e-mail, attachments, and downloads, then immediately starts cleaning infections. The Professional version of the software comes with a two-user license (to protect two systems), system cleanup functions, and a security file eraser.


5. Norton Antivirus Professional: http://www.symantec.com/nav/nav_pro/
Norton Antivirus protects e-mail, instant messages, and other files by recognizing and removing viruses automatically. The software also recognizes and alerts you to the presence of spyware and other hacking programs. It includes advanced tools for data recovery and secure file deletion, plus a license for two computers.

6. Spybot Search & Destroy: http://www.safer-networking.org
Without a doubt, Spybot S&D is the best spyware detection and removal software available. To top it off, it’s free. Constantly updated, the software recognizes and removes a huge number of spyware programs from throughout your system. With the recent addition of the TeaTimer, it can even provide real-time continuous protection against surreptitious spyware activities.

7. Popup Ad Filter: http://www.meaya.com
Popup Ad Filter, from Meaya Software, works with Internet Explorer to block ads while you’re browsing the Web. It can be configured to allow pop-ups from specific sites and logs all the sites from which pop-ups were blocked. The filter’s easy to install and easy to use.

8. Super Ad Blocker: http://www.superadblocker.com
Super Ad Blocker prevents not only pop-up, but also spyware, pop-under, messenger, Flash, and floating ads. Includes capabilities to clean your cookies, cache, and browser history. Includes the ability to generate graphic reports on the quantity and type of ads blocked. Designed to work with Windows XP Service Pack 2.

9. Cookie Pal: http://www.kburra.com
Cookie Pal, fro m Kookaburra Software, allows you to decide what types ofcookies you want to accept and what type you don’t. It works with a widenumber of browsers and e-mail programs to give complete protection against unknown sites.

10. ZoneAlarm: http://www.zonelabs.com
Zone Labs created ZoneAlarm as personal firewall for Windows systems. It stops intruders from accessing your PC, essentially making your system invisible to hackers. The Pro version includes a pop-up blocker and rudimentary cookie management capabilities. It also analyzes incoming and outgoing e-mail to identify and quarantine potential viruses.

[+/-] Read more...


In Windows NT, 2000 and XP, the Administrator user has total power over its computer, just as root has total power over a Unix/Linux type computer. However, it is possible to change the name of Administrator so an attacker has to guess which user has all the power.

Let's try to log in as Administrator by guessing the password. Give the command:
C:\>net use \\10.0.0.2\ipc$ * /user:Administrator
Type the password for \\10.0.0.2\ipc$:
System error 1219 has occurred.

Multiple connections to a server or shared resource by the same user, using more than one user name, are not allowed. Disconnect all previous connections to the server or shared resource and try again

This means that someone else is currently logged onto this server who has Administrator rights. Furthermore, this person is probably watching me on an IDS and thinking up terrible things to do to me. Eeep! Actually this is all going on inside my hacker lab - but you get the idea of what it could be like when trying to invade a computer without permission....


I discover that whether I guess the password correctly or not, I always get the same error message. This is a good safety feature. On the other hand, one of the users is named Administrator. This is a bad thing for the defender. When you first set up a Windows NT or 2000 server, there is always a user called Administrator, and he or she has total power over that computer. If you know the all-powerful user is named Administrator, you can try guessing the password whenever no one is logged on with Administrator powers.

Computer criminals don't waste time guessing by hand. They use a program such as NAT or Legion to get passwords. These programs are why smart NT administrators rename their Administrator accounts and choose hard passwords. Also, this kind of persistent attack will be detected by an intrusion detection system, making it easy to catch criminals at work.

You can get expelled warning: What if you are a student and you want to save your school from malicious code kiddies who steal tests and change grades? It is important to get permission *in writing* before you test the school's network. Even then, you still must be careful to be a model student. If you act up, cut classes you know what I mean - the first time a cracker messes up the network, who do you think they will suspect? Yes, it's unfair, and yes, that is the way the world works.

[+/-] Read more...


You might have to make changes on your system in order to use these commands. Here's how to enable NetBIOS for Windows XP. (If you are stuck with Windows 95, 98, SE or ME, see the end of this Guide for how to enable NetBIOS.)
Go to Control Panel -> Network Connections
There are two types of network connections that may appear here: Dial-up and LAN or High-Speed Internet.

notes:
A dial-up connection uses a modem to reach the Internet. LAN stands for local area network. It's what you have if two or more computers are linked to each other with a cable instead of modems. Most schools and businesses have LANs, as well as homes with Internet connection sharing. A DSL or cable modem connection will also typically show up as a LAN connection.

To configure your connections for hacking, double click on the connection you plan to use. That brings up a box that has a button labeled Properties.

Clicking it brings up a box that says "This connection uses the following items":
You need to have both TCP/IP and NWLink NetBIOS showing. If NWLink NetBIOS is missing, here's how to add it. Click Install -> Protocol -> Add NWlink/IPX/SPX/NetBIOS Compatible Transport Protocol.

[+/-] Read more...

In order to connect the internet or the network, we recently need a wireless system to make a connection between a workstation and routes a network traffic among workstation and an existing internet connection. There are two type of it; a wireless router which includes wireless acces point built in and a wireless router with cable modem or DSL built in.

Many wireless router manufactures has develop their product as the need of high speed internet connection also a safety in using it like Netgear WGT624SC Super G Wireless Router which include anti virus and anti phising in its software. It makes this product has a significant different product as you find out most in the market while it scans your pc and your home network when connected to internet automatically and of course it will save your money.

This product supported by Trend Micro dashboard which provides filtering(parental filtering sofware is free for one year after that you will be purchased to keep using it) in access an adult material such as pornograhpic, gambling etc. site and it is save for your children in surfing.

Netgear WGT624SC Super G Wireless Router also supported by atheros Super-G technology which keep warranty its user in surfing with stable (40 Mbps from 150 feet) and speed connection as they also provide XR (extended range) capability on the WGT624SC, but it can't match the range of a MIMO router, which can stretch for 800 feet.

As a summary this product which built-in Trend Micro Security inside make the Netgear WGT624SC Super G Wireless Router is worth considering for those people who need a speed, save and secure in internet browsing.

[+/-] Read more...

As we know that every computers need to a realtime maintenance as well as systems checks in order to be in good condition at all times. This can be done by getting the proper software or sending the unit to the shop.

If the individual notices that the computer is not performing as well as before, an accurate action must be done immediately before everything shuts down. Aside from the potential threat of a virus that can destroy the operating system and the hard drive, another concern should be the spyware and the adware that comes when a website is visited.

Spyware and adware programs can be purchased in the store. With the development of e-commerce, software companies have made it possible to get these things online and have it downloaded in an instant into the computer...

Is there one software program better than the other? Some will say this brand while others will say another depending on how user-friendly and effective it has performed in the past. Here are the top 5 that are free for the person to use so the user should be the judge.

1. McAfee has been in the business of providing security solutions since 1987. The software programs it offers can take care of viruses, spyware, adware and any other threats all in just one package.

Among the different software companies in the industry, this firm does not allow free trials but those who have used it and are still doing so today are satisfied with its products and services.

2. Another leader in the industry is Symantec. This company started 5 years earlier than McAfee and offers customers various versions of its products. Those who are skeptic about the adware and spyware software it has can download the software and try it for 30 days. Those who amazed can then buy the program to continue enjoying its services.

3. Microsoft is one of the biggest software companies in the world. Aside from offering to customer’s operating systems, it also has adware spyware remover, which can be downloaded for free into the computer.

4. The fourth company on the list is not as big as the other three players but is still able to hold its head up high in the market. The program is called Spybot Search and Destroy. From the name itself, the individual can already tell what it can do as well as prevent new threats from ever popping up in the future.

5. Lastly, is Adaware, which also has various versions for personal and commercial use. Those who will just use it to keep the computer safe at home can download the adware spyware remover program for free. If this will be used by a company to protect its assets, a fee will be charged to keep the system running.

The person does not have to be a computer expert to be able to protect everything inside the computer because there are adware spyware remover programs available.

Once it is downloaded and installed, the individual does not have to worry because the software will check the computer carefully as well as receive updates so new threats can be caught before it can do any damage making one sleep peacefully at night. It is up to the customer whether to pay for the system or simply get one that is free.

[+/-] Read more...

When you trying to make the usefull spyware and adware protection, it will be better if you look online to check out some of the most effective anti-spyware and adware tools available for you. Many software who have dedicated their resources to develop more effective and more vendor programs to provide you with the best anti-spyware and adware protection for your PC. Here are some example of them:

Spyware Doctor

Spyware Doctor is a multi-award winning spyware removal utility that is available for you both in free trail software as well as an on sale software product version able to provide you with extensive spyware and adware protection. It effectively detects, removes and protects your PC from thousands of potential spyware and adware programs proliferating the online world today...

A wide range of malicious trojans, keyloggers, spybots and tracking threats are put at bay with the Spyware Doctor. This is an adware and spyware removal utility that detects and cleans thousands of potential adware, trojans, keyloggers, spyware and other malware that may be infecting and wrecking havoc on your PC. Its remover tool allows you to remove, ignore or either quarantine identified spyware. This tool is made available for free in the trial version.

Spyware Doctor also has an OnGuard system that effectively immunizes and protects your system against hundreds of online privacy threats even while you work. The Spyware Doctor allows you to perform fast scanning and detection at Windows start-up so that you will be alerted with a list of the potential threats identified and provides spyware blocking features to give you continuous protection.

McAfee AntiSpyware

Get rid of malicious programs before they can steal your identity from your PC. Someone may be tracking you online and may be monitoring your every move. The McAfee AntiSpyware may just be the essential protection much needed by today's security-conscious Internet user like you.

McAfee AntiSpyware can quickly detect and then safely eliminate malicious applications such as key loggers, remote-control programs, spybots and browser hijackers that may be hiding on your system before they can rob you of your precious personal information, snatch passwords or monitor browsing activity when you go online. By eliminating online roadblocks, McAfee AntiSpyware also prevents adware programs to trigger annoying advertisements and sap precious system performance on your PC.

X-Cleaner

X-Cleaner is a premier privacy software solution that is made by one of the most trusted names in anti-spyware technology. X-Cleaner effectively deletes browser and system usage tracks, shreds pictures and generates secure passwords in your PC. It also features a unique anti-spy and adware technology that will remove them fully from your PC. The X-Cleaner also has effective inoculation features that will help prevent future infections and keep your PC safe for use.

Key features of this software include the ability to remove traces of movie files, pictures that you have viewed. It can also detect and remove spy software that logs your private activity online and may undermine personal online security. The X-Cleaner can also find and remove pornographic content that may contain malicious codes on your computer.

To provide the most privacy, the X-Cleaner can also permanently erase files on your PC with a military style file shredder. Stop password theft and know if some users are snooping and recording your keystrokes with the use of the X-Cleaner!

[+/-] Read more...


Spyware and adware removal nowadays is just a matter of choosing a well equipped anti-spyware program or utility. You install the software into your system and will scan and delete or quarantine spyware and adware programs that were secretly installed in your computer.

The proliferation of spyware and adware programs in the internet has lead an established and highly developed anti-spyware industry. As long as disgruntled internet users abound, the anti-spyware companies will continue to create utilities that will combat the onslaught of spyware and adware on your computers...

Basically a spyware program infects the computer through whatever files a user downloads from the internet. Adware and spyware attaches themselves on these files and can rapidly spread throughout the computer's operating system. The sypware will commonly records information like IP addresses, credit card numbers, lists websites you visit and so on.

But as the spyware infects and spreads your computer, it installs components which affect the overall performance of the computer. They can also cause a degradation of the system resulting to unwanted CPU activity, inappropriate disk usage, and problems with network traffic. All these will cause your computer to low down. It will eventually become unstable and will cause software crashes and will sometimes prevent you from connecting to your networks and to the internet.

Some spyware programs are quite obvious but others are more covert, operating undetected by the user. When problems occur in the computer's operating system, because these spywares are undetectable by ordinary means, users tend to believe that the problems were brought about by problems in the hardware or by a computer virus. But all the while, a spyware program is the one causing the ruckus.

More often not, a computer will be infected with more than one spyware program and have various components installed. Recent studies indicate that when one finds a spyware program installed in his computer, chances are dozens of the components of that spyware is installed all over the computer's system.

And as the number of spyware programs and its components increase, users will encounter problems like computer slowing its functions to a crawl. Other spyware programs are more notorious. Some spyware will disable the computer's firewall system or anti-virus software thus making the computer more vulnerable to spyware, adware and other infectious attacks.

Microsoft Windows platform users are more susceptible from these spyware and adware attacks. Probably because of the popularity of Windows which makes them an attractive and profitable target for spyware agents. Likewise, because of the tight knit Internet Explorer and Windows enjoy, IE users will most likely get an infection from spyware and adware than users of other internet browsers like FireFox.

Meanwhile other computer users are changing to Linux or Apple Macintosh platforms which appear to be less attractive to spyware and adware agents. These two platforms works on Unix underpinnings which restricts access to the operating system unlike with Windows.

It is quite unfortunate and rather irritating that spyware and adware programs grew and developed in the World Wide Web. But we cannot do anything about it now. What we can do is protect ourselves from their attacks by being cautious and by conducting regular spyware scanning and removals as well as performing regular updating of anti-virus and anti-spyware software to ensure that our computers are free from the annoying and damaging spyware.

[+/-] Read more...


There is this one law school student whose thesis is about money laundering so oftentimes she would google the term to come up with a ready list of online references. This proved to be useful to her and the entire process of writing her paper. After several months of doing so, she was confronted with problems like being directed to a weird page totally not related to money laundering every time she types the same words.

At first she thought it was just a glitch in the internet system and then she rationalized that no it maybe a glitch in the search engine she is using but the persistent occurrence of such a thing made her think that someone bugged her. We all hate bugging people us but people we can fend of. What this law student is confronted with is a computer bug that she cannot fend off. In the first place she is not a technology savvy person and in the second place she never uses her laptop for any other things than academic research and actual writing of her papers...

The situation above is not an isolated case. There are many people who find themselves caught up in technology problems that are mind boggling but actually can be answered with two words and those two words are spyware and adware. The infamous term of spyware was first coined in the year 1995 but it was popularized in the year 2000. Spyware is a computer software innocently infiltrated in a personal computer to be able to access personal information of the user.

This is done by studying logging keystrokes, web browsing history and even scanning a user’s hard drive. Sounds like something we see only in James Bond movies but apparently we are wrong for anyone can be a victim of spyware. It is safe to use the word victim because no one wants to be monitored of all their online activities. Spyware can understandably be used to spy on criminals because such use is beneficial to society but how about the use of spyware to intercept credit card details and the like. There is simply no excuse for the lax of the use of spyware.

What ordinary people can do to protect themselves is to block spyware and all other software programs similar to it like adware and malware. This can easily be done by availing adware and spyware blocker programs online. The role of these blocking programs include to remove or disable existing spyware programs or to avoid the installation of these malicious software programs.

Spyware, adware, malware are not like virus or worms that self replicate but they can be just as hassle as their counterparts for whoever wants to be disrupted of their normal pc activities. One of the more popular hassles cause by these infectious software programs is the slowness of the computer which can really be annoying because when you are at work you tend to want to finish things quick not just because you are required but also because you want more done or you want to be able to go home early.

In some infections, spyware is not even evident as the bad guy so it can get away with its crime. It is best then to have a ready blocker to at least do something for preventing any infection to occur in the first place.

[+/-] Read more...

Generally considered as some kind of potentially unwanted programs (PUP) by the Internet Security Company (McAFee,) adware and spyware could pause as a menace to original computer owners, web developers, and IT of certain corporations.

Advertisements (adware) already included and mainstay of the program could present a threat or traffic nuisance for reason of its vulnerability to information disseminations, causing notorious cases of "identity theft," that'd been threatening risk on the loss of personal properties, finances, bank's credibility, financiers, and other financial institutions over the globe...

In the United States alone there is a rampant of identity theft to personal properties thru the process of transfer of ownership to a wrong person because of stolen Credit Card numbers, passwords, and other personal identifications robbed thru the internet in forms of spywares that camouflaged use-legalities that are merely ignored by users and computer owners.

Adware and Spyware software present a totally different usage in program inclusions, and for the user. While adware is a legal part of the computer's administrative settings, spyware is ironically a deceptive method, that'll not directly pause as illegal for it may be included in some software that fronts acceptance. By the time it reaches the user's end it reacts like semblance of some kinds of virus or worms; at times just ignored not to be serious and obvious, but with motives, to invade the accessibility and manipulations of some confidential information from the computer, to be transmitted to other end users who may just wait for any advantage taken from this kind of traffic interference.

When the adware database link discovers the effects of detailed interference on some confidential records, those that need financial consideration of return-payments in nature, and wherein, exclusive website agenda had already been diverted to the other end without having to pay from the mother source, it'd be too late to reconstruct to normal settings. It is expensive to replenish and change to untarnished software. At times immune anti-virus is also out there, but anywhere it goes about entails some extra expense on part of the developer.

Spyware is software that support adware usage by PC espionage on different activities in a computer such as e-mail or chat logging, but could easily cause to detour web traffic that's detrimental to e-commerce if abused or used without consent; therefore, by no means the deceiving technology in adverse adware usability.

A number of adware companies seem to feel bias about PC surveillance (spyware) for reason that, although, they had already disclosed specific data collections and transmissions on account of privacy security from their database link, it can't totally control the chances of any outgoing data, where, and to whom it might be sent. Spyware technology has the capability to send not just the banner data from the mother PC, but could channel it to other interested parties that could even install-in to a new program.

The spyware technology is by far infused into the database without the owner's awareness or consent, however, they come in as "drive-by downloads" or the user goes to click in options in "pop-up" windows, and immediately detoured to some other programs, either pornographic, or anything else without essence.

The adverse effect of adware is the fact that when it is installed in the computer and the user consents to include tracking features, it automatically becomes a "spyware" when used by another user who interacts with the "adware" outside any database link.

[+/-] Read more...

Recent Posts

Do follow blog

Recent Comments

Tag cloud