Share


Share

Share it !



share/bookmark

Building Relationships Through Social Networking Websites


There are numerous social networking sites available on the internet. They are places where everyone has the freedom to express themselves, make friends from other countries and advertise businesses. Whatever your purpose is you have to ensure that you are not wasting your time building relationships from these sites. Learning some helpful tips on how to build a good networks or relationships through these websites will make your time, sitting in front of your computer, worth it.

Lots of social networking sites are accessed online where you can gain followers and friends. It's everybody's goal to generate hundreds and thousands of followers on his profile. In that case, you need to make your profile interesting, attention-grabbing and informative. Customizing your personal or business profile through the different social networking sites can provide you an increase of followers.

Privacy and security are the concerns in every social networking site. Therefore, you avoid posting too much personal information about you. Instead, display educational details and encouraging posts. Keeping your profile informative and enlightening is a representation that you are real, sincere and honest of who you are.

Social network sites are created for everyone to engage in active interaction, share common interests and communicate with other people from other parts of the world. This is your best chance actually to meet people from different backgrounds, cultures and traditions. For business, you can expand the way you market products not just locally but globally. Participating in various ways to make interaction with others is a good way to build network relationships.

Understanding all these things can help you build relationships through different social networking sites. It is fun and exciting to join in this kind of places where you have the privilege to meet other people. Keeping all these things in mind is surely a great way to socialize with thousands of people around the world.




You CAN drive targeted visitors to your website without spending a BOMB!

Here's a FREE resource that's going to help you get visitors: Hyper FB Traffic Formula

And here's to sweeten the deal even further! For insane bonuses on how to profit from Facebook, go to Hyper FBTraffic bonus to download your FREE bonuses that will supercharge your Internet business and profits!




Computer Forensics and Computer Security Consulting as a Career?


The other day an acquaintance mentioned to me that he'd like to start a new business in the computer forensics trade, and make it his new life's work. Does that make sense? Well, sure it does, and just because everything is moving into the cloud, or so it is predicted doesn't necessarily mean that folks who are trying to hide something would dare to store stuff there. After all, it would be easily searchable by the authorities, or some NSA searching algorithm will find it.

Thus, those using computers to help them break the law are more likely to keep information close to the vest on encrypted CD ROMS, hard drives, thumb drives, etc - kind of like Osama bin Laden did. And then there is another aspect to the computer forensics business, and that is recovering lost data for businesses. Therefore, I explained to him that I agree that computer forensics, and consulting are a good business to be in - smart idea.

In fact, I have a friend who had a computer consulting business, and did quite well, but had challenges when he took on the wrong partner, and they both had different ideas on how to run the business, so they split it into two, hardware sales/computer repair and consulting/networks. Just be careful if you take on partners, was his advice. I'd say that advice would definitely go for the computer forensics sector as well.

And, speaking of computer forensics, I sure could have used him a few years ago, when my hard drive crashed, and I lost 4 eBooks I was working on, which like a dummy I hadn't backed up. That was terrible. And that same year I had my MS operating system screw up, and when I re-booted I lost a ton more, lots of import ideas, concepts, and half completed articles I was thinking on. People really need computer forensics, and data recovery, and Corporations really need to trace back how the hackers get in to provide safe data security too.

I'd say there is a ton of work to be done + potential contracts with law-enforcement I'd say, as well. Good be quite a lucrative business I'd say? Indeed, maybe my acquaintance is quite wise in his desire to start such a business, maybe that is a smart industry to get into, and with the right connections, it ought to be a very awesome business. Well, that's all for now, something to think on. If you have any more questions or comments on the computer forensics industry please shoot me an email.




Lance Winslow is a retired Founder of a Nationwide Franchise Chain, and now runs the Online Think Tank. Lance Winslow believes writing 23,777 articles by 7 PM on June 27, 2011 is going to be difficult because all the letters on his keyboard are now worn off now..




Computer Security and Why Keylogger Removal Should Be on Everyone's Agenda


Computer Security is something large commercial organisations have long since realised cannot not be ignored. SME's (Small and Medium-sized Enterprises) are not always so diligent, this is often down to the lack of resources or the simple fact that no one in particular has sole responsibility for it. Sure, it should be part of any IT function, but with all the other more pressing day-to-day demands it is also something that sits untouched on a 'to do list', if it even makes it on to the list at all.

Then there's the home and personal users who in most cases just don't understand the dangers. Any thoughts regarding security stop at the purchase of some antivirus software or a possible reluctance to use a credit card online in case it is compromised. The thought of having to stop hacker intrusion of their computer may never have crossed their minds.

Computer security should be a concern for everyone with a personal computer or laptop, from the home user to the world's biggest corporations - they all have good cause for concern. The readily available supply of both hardware and software keyloggers is making it easy for the cyber criminals to gain access to sensitive and potentially harmful personal and corporate data.

I'd just like to make one thing clear. Keystroke recorders, or Keyloggers as they are also known, are legitimate surveillance hardware or software methods which are completely legal. How can that be? I hear some of you say. Well, it is important to distinguish between legitimate and fraudulent / covert use of these devices.

As a legitimate surveillance tool Keyloggers are often used by employers to ensure employees use work computers for business purposes only. Keyloggers can record instant messages, e-mail, and any information an employee types using their keyboard. A log file of keystroke activities is created by the keylogger which can then be sent to a specified receiver for examination. Some keylogger programs can also record any e-mail addresses the employees' use and Web site URLs they visit. All activities are logged into a file, supported with screen snapshots.

In cases of under performance an employer may use this method to check on an employee's activity - it may expose time wasted on web surfing, instant messaging or time spent on social networking sites, time which should be spent working.

Parents worried about the safety of their children when online can use keyloggers to monitor their activity. I know this may raise huge questions about trust, but parents have to balance this against the potential dangers presented by the unscrupulous and devious in our society who try to groom children for unsavoury purposes. It's a hard fact of life but there is a category of low-life who prey on the young and unsuspecting. If using this technology gives a parent peace of mind and ensures their kids stay safe then I regard it as a legitimate use.

Key logging recorders can be small hardware devices - small and usually unnoticed hardware keylogger devices inserted between the keyboard and the system unit can record every single keyboard input. A microcontroller interprets the data, and stores information in memory and just like a USB key drive will retain information even without being connected to a power source. Some of these devices can store up to 12 months of data entry. Every account reference, every password can be recorded. These hardware devices are quick and easy to install, just plug them in. They can also quickly be removed or moved to another computer.

Keyloggers can also be a software program which resides inside your system - a much harder thing to spot. I've seen some software versions advertised as a means to catching a cheating spouse or partner. To some people the suspicion that they are being cheated on can cause great heartache and anxiety which eventually becomes unbearable. In such cases they may invest in a product which may tell them one way or another if their suspicions are valid or not.

There are clearly legitimate reasons why people use keystroke recording methods as part of a security or surveillance activity. However, this also raises the question of what can happen when the criminal element use these methods on the unsuspecting computer user.

A physical security search of all computer hardware to identify the presence of hardware keylogger devices may seem like a tedious task - it is, but then again compare this with the theft of important data and the potential consequences if this found its way into the hands of the criminal fraternity. Perhaps that search wasn't so tedious after all.

If being used covertly hardware keyloggers have to be deliberately connected by someone who has physical access to the computer in question. Software versions do not! It is the software versions which give rise to the greatest concern.

Users may unwittingly download the software version when visiting a website or when they download other legitimate content from the net. The software version can sit undetected hidden somewhere amongst your system files capturing every keystroke you make and relaying them to someone who could be anywhere in the world. That's every password, credit card number, bank details etc. - everything a criminal would need to start spending your hard earned money.

It's the software version which is the real threat to the general personal computer user. The easy target that is unlikely to spot they have become a victim and who won't know how to stop hacker theft of their information. Who has never even heard of Keylogger Removal software or how to use it. These are the easy prey for the professional computer hacker.




For anyone who wants to read more about Keylogger Removal I invite them to check out my Blog on the subject: [http://www.keyloggerremoval.biz]

All the best,

Nigel Ridge




How Can WikiLeaks Occur in the First Place?


Julian Assange, the assailed WikiLeaks publisher, was allegedly supplied with a huge quantity of sensitive information which is now showing up on the infamous WikiLeaks website compliments of a private first class in the Army. Uncle Sam is screaming foul. Most people are scratching their heads trying to figure out how such a thing could happen.

The real truth is that we likely did it to ourselves. There is a full range of possibilities but a PFC isn't likely to have broad access to a large cross-section of secret information. The application of flawed network security policies, however, probably made it possible for Pvt. Bradley Manning to allegedly gain access to the information now appearing in Wikileaks.

You may recall that after Al Qaeda's attack on September 11, 2001 an investigation was launched. One of the findings was that U.S. intelligence information was too "stove piped". The criticism was that each agency with a security function gathered and guarded its own information rather than sharing it with other agencies. Efforts to tear down the walls among agencies were implemented. Intelligence agencies were told to distribute their information. The very office of the Director of National Intelligence was created to ensure giving out information among agencies.

The groundwork was laid for massive security leaks to happen, especially the loss of information that is stored in electronic databases. Computer operating systems have network security settings associated with them. These are known as "policies" and they determine who has authorization to what specific information. The principle of "need to know" is generally applied. That is, if a person is without the need to know the information, he or she is denied access to it. Each employee would have differing levels of access to sensitive information.

The U.S. State Department sent over the information it was told to send over to the Defense Department. Did the State Department set the security policies to be applied to DoD? It's unlikely. Would the information to which the PFC gained access ideally be controlled by the need to know principle? Yes, but the information arriving at DoD was unlikely supported by strong network security policies as to "who" within DoD could have access.

On the other side of the coin the DoD was likely without the resources needed to establish fine granular network security policies for control on each and every sensitive piece of information arriving from the State Department. The forced sharing of information between multiple agencies would likely increase vulnerabilities and produce system failures.

A PFC might very well have been able to download and review information if robust network security policies were absent. Any efforts by multiple agencies to match up sensitive information and establish need to know policies would be extremely difficult and time consuming. Couple this basic fact with the apparent desire on behalf of the perpetrators to harm America and we have a recipe for disaster.

The real enabler may have been our own ill-configured network security policy settings and the likes of Julian Assange who is allegedly linked to the globalist organization Open Society.




G. Rodriguez is a computer security specialist who occasionally writes articles that are used by various web sites.

Learn more about information security by downloading Computer Security Glossary's FREE eBook, "How to Security Your Computer". Just access the web site, http://www.computer-security-glossary.org and select the FREE eBook link.




Firewall Security Safeguards Personal Computer and Data


Almost everybody today has a personal computer connected to the Internet. The internet is a great way to communicate, gather information, and shop. It has made life easier with applications that help a person transact over the internet. However, while the internet has numerous advantages, there are serious disadvantages that should be taken into account as well. The internet has become a breeding ground for criminals and hackers who victimize people by accessing their profiles and fraudulently use their names for transactions which result to huge amounts of bills and tainted credit records of the victimized people. Thus the need for an efficient and effective internet security that could help protect your identity from these attacks. Using a firewall protects your computer and prepares your computer from potential attackers.

Facts about firewall security

1 - A firewall is basically a piece of software or hardware operating in a networked environment to prevent communication between areas with different degrees of trust. The term firewall is derived from the same concept of firewall used in construction whose purpose is to keep fire from spreading if a fire starts.

2 - Personal firewall is the most common type of firewall and this type is found in Windows XP. This type of firewall was not popular among users because of the invention of the viruses-Blaster worm and the Sasser worm. These worms drove Microsoft to start designing a more comprehensive firewall application that can provide users improved and enhanced protection for both their home and office networks.

3 - The next generation of Microsoft firewall protection is effectively designed to help secure and equip both your personal and business computers with the advanced protection against the capabilities viruses. The next generation of firewall protection allows you investigate any activity going on outside of your system. It will let you know who is accessing your information online and who is doing transactions under your name.

Setting firewall

Every personal computer needs a firewall for complete cyber security. Luckily, there is no need to buy it since the operating system of your computer has already included it. Your role is to find out how to properly set up your operating parameters and start configuring your firewall by identifying what to allow and what to ban on your computer.

Although you could easily look for help in setting up your firewall in your computer, it is also important that you ask for assistance of somebody who knows a thing or two about firewalls. Mishandling of firewalls will make them useless and will not protect you from any cyber attack.




Enroll with Sourcefire and get cyber security instantly. Sourcefire provides next generation intrusion detection, NGFW and intrusion prevention system to protect your privacy on the internet.




Social Networking (and Media) Changing Corporate Culture


Social networking (SN) was a concept originally founded for the masses to use on a very overlapping basis, but alongside the acceleration of Enterprise 2.0, things have begun to pick up, and fast. After social networks surpassed the sustainable monetization stage the first Web 1.0 companies couldn't, and evolved to an adequate scale and spectrum, the next, less generic step formed: professional use.

Once enterprise discovered the potential for a means of fast, accessible and affordable communications between remote workers, professional networking began to grow out of the single all-inclusive concept which generically encompasses SN. There are, or at least were, some obvious benefits of using Facebook and Twitter to share data and information, notably the fact no training was required for employees already accustomed to the simplified user interfaces via their own personal experience.

However significant, this use by the enterprise was only one aspect to professional networking, which branched out to encompass other fields as well. These include individual employment of LinkedIn and similar services. And, as SN geared more and more user interest, enterprise focus began to fall on two very specific elements.

Social Media Monetization

The major social networks alone, namely Facebook, Twitter and the ever-fading MySpace, have over a billion users combined, and they're not the only ones to monetize these demographics. Enterprises utilize various SN resources, including advertising, dedicated channels, metrics and Big Data to boost marketing and consumer perception. There are many examples of enterprises utilizing social media for outbound purposes, but internal use represents the second, equally significant element of the two noted above.

Internal community platforms

In addition to marketing, enterprises also adopted social networking for internal communications between remote workers. However, employee communications and collaboration requirements drastically increased, and general public-optimized social networks were abandoned in favor of specifically targeted enterprise-centric offerings.

Demands which were not answered by Facebook and Twitter were addressed and compensated for in these new offerings, which multiplied in number. Security, transparency, integration and functionally were all drastically enhanced and optimized for the enterprise, resulting many, relatively still fresh products.

Cisco, IBM, Jive, Hearsay and dozens of others are all now competing for market share in what was once only an almost makeshift market. Increased competition means enhanced offerings. In terms of internal social networking platforms, this translated into blogs, document repositories, calendar integration, project planning, instant messaging, video conferencing and VoIP options on a massive scale.

What goes around comes around, and after insufficient features were replaced by complex functions and capabilities, the need for simplicity and clarity soon realized itself.

Internal enterprise social networking offerings are often fairly complex, sometimes one or two steps exceeding efficiency. A large bulk of only partially necessary functions has some very obvious downsides to it, most notably when it comes to organization and time consumption on the user. Research firm Gartner predicts that social networking will replace e-mail as the main communications channel for 20% of business users by 2014. Nevertheless, growing demand doesn't mean the necessity will be properly answered. Enterprise social platforms are not designed for socializing, and highly popular social network add-ons are simply not designed for large-scale business users. Another factor is training, and a complex internal community platform probably is not worth the training time it would require.

Simplicity is a requirement for internal networking, and it's this factor which can turn a piece of enterprise software into an advantageous operational asset for a given company and workforce. Legacy software integration, large-scale real-time collaboration and communication channels cut down to the simplest and most scalable form derived from actual user experience form a more realistic structure, and are already utilized by existing offerings.

Overall, enterprise social network offerings still need some time to mature. On the bottom line it's all about boosting workforce efficiency and answering corporate needs, and social networking may not be the answer. Gartner predicts that while 50% of enterprises will use social networking activity streams next year, they will have less than 5 percent penetration. Moreover, 2012 will be the year "over 70 percent of IT-dominated social media initiatives will fail", and only 25 percent of enterprises will routinely utilize Big Data from social networks by 2015. All and all, it's all about necessity and practicality. The answers to these will probably be shaped around mobile and cloud computing, as these continue to integrate directly into business operations at an ever-accelerating pace and maximize corporate assets.




Read more articles about online strategy and technology by visiting Steven Henty's blog.




How to Improve Network Security


Using internet applications is great fun but they are sometimes unsafe and susceptible to unauthorized access, security threats and the inability to access inbound and outbound traffic. Sometimes you may also face the stealing of some crucial information and the interruption of some unauthorized software which consequently hampers your software and increases the security risks. Making use of internet security firewalls is the best way to protect your computer.

With firewall security you can stop unauthorized access to the network or internet by allowing authorized communication to take place. If there is an attempt to access the network or internet, it allows the user to block and encrypt the attempts which are blocking them. It is one of the ways to remain safe from viruses, Trojans or malware, which repeatedly continue to interfere with and connect to the internet or network. A typical firewall works only one way by keeping vigil on inbound traffic; for example, Windows XP and Vista, which are unable to control the multiple threats. So it is better to install the two-way firewall that checks both the inbound and outbound traffic. Such a firewall allows the creator to manipulate the system while recording the keystrokes, including internet banking accounts and keywords and send those logs to the creators. The two-way firewall works at the Intrusion Detection System which initiates an outbound connection.

The best firewall can block different ports through which an unidentified logger can seek information from your system by blocking unauthorized traffic online. So if you want to minimize the threat, use the best firewall protection software. One should select the appropriate firewall security system/software that should be compatible with your system and should provide the best internet security.

You will find many antivirus companies that can also provide firewalls. They can be disabled or reinstalled according to the user's desire. For complete internet security, you can install a firewall in every computer in the network. The added benefit of it is that if any one of the computers is being infected with viruses, it cannot be spread to the other computers in the network if each and every computer in the network is protected by the firewalls.

The function of firewall security is very simple since the mode of communication in the network is transmitted into small packets and these packets are equipped with both the originator of the message and the receiver of the same. The firewalls installed can determine the type of application message and properly assemble it to find whether the originator is authentic or not.

Therefore, the basic function of the firewalls is to protect the computer from unauthentic and illicit networking and thus provide the best network security.




Looking for dynamic firewall security for your PC? With intrusion detection software get 100% guaranteed security against any possible virus or Trojan threat for better internet security. To seek complete information about cyber security online please visit Sourcefire.com.




Computer Security For Your EBiz


Online computer security is overlooked or minimized by too many Internet businesses. There are numerous security software packages available. Each company offers a multitude of features to keep your business computer safe and secure. So which features are essential? Which ones can't you do without? Which of these features are already in your business computer? Most vendors sell the basic version of their security software and sell the premium versions (usually with the features that you really need) at a higher price. Is it worth it to pay more for the premium versions of these security programs?

To safeguard your online business computer the following are what you absolutely should have:

1. Anti Virus Software

Having an anti virus system installed in your business computer is a must as it will detect and remove viruses and worms that have gotten into your hard drive. You may accidentally download infected files, receive infected e-mails or have your system compromised after visiting questionable websites. Once installed on your business computer, your anti virus software will need to be updated on a regular basis since new viruses are created every day. Most anti virus software programs automatically update themselves.

2. Personal Firewall

Install a personal firewall on your business computer to keep hackers and malicious programs from infiltrating your computer and accessing your business files. A personal firewall will monitor connections that are coming in to and going out of your computer.

3. Anti Spyware Program

Install anti spyware program in your business computer in order to block or remove spyware and adware programs that have gotten into the computer. Spyware and adware programs are malicious programs with hidden code. They disguise themselves as acceptable files. For instance, rootkit programs are often used by hackers to hide spyware and malware.

4. Wireless Network Monitoring Software

If you use a wireless networking system this piece of software is absolutely essential. It will prevent unauthorized individuals from using up all your bandwidth or invading your wireless network. With wireless network monitoring software you can set up access IDs, passwords and network addresses.

The following are also good for security although it may not be as critical to have the best software available:

1. Anti Phishing/Fraud Defense Software

This security software protects your business computer against phishing and fraud. It stops various online fraud attempts to get your credit card number or bank account number. If you use Internet Explorer or Firefox as your browser, they already have this security feature integrated.

2. Online Identity Protection Software

Online identify protection software protects you from online identity theft. Most of the sites you will use for online purchases already have some type of online identity protection implemented. If you use your credit card or debit card for online purchases, be aware that it comes with online protection in cases of unauthorized purchases.

3. Anti Spam Software

An anti spam software filters e-mails you did not request or e-mails that may contain dangerous files. Web-based e-mail services like Gmail, Hotmail and Yahoo already have spam filters in place. If you mistakenly open an e-mail with a suspicious attachment or links to sites designed to steal your information, the anti spam software will scan the attachment first or disable the links so that you do not accidentally click on them.

4. Pop-Up Blocker

A pop-up blocker prevents malicious scripts in pop-up webpages from executing. Again, Internet Explorer and Firefox already have a pop-up blocker installed.

When you purchase any of these security software packages to protect your eBiz computer, make sure you keep your subscription up to date. Keeping your security software current helps keep your online business computer secure.

Most security software offers similar features and protection capabilities. There is, however, security software that is specifically recommended for online businesses. Most of this security software can be downloaded for free during a trial period before you purchase the full version.

Your business computer can never be 100% safe and secure. You can, however, lower the risk of unauthorized access to it by using security programs and keeping them all current. By doing this, you save yourself time and money.




Please also read about another essential safeguard involving password security. Be sure to visit our website and discover ways to build a passive income online.




Sound Device Drivers - Worry Free Solutions For Your Computer Sound Problems


Are you having problems playing sounds on your computer? There's no need to worry. That can be easily resolved by going through a little troubleshooting. Follow the steps below:


Are your speakers on? If you are using speakers, make sure that the power cord is firmly plugged into a working outlet and that the speakers are turned on.
Are your speakers or headphones properly connected? The sound cable of the speakers or headphones must be securely plugged into the appropriate jack on the computer. Look up your speaker/headphone documentation to be sure that you have connected them correctly.
Are the volume settings correctly set? Adjust the volume control to the proper settings on the speakers or headphones and on the computer itself. Make sure that audio is not muted.
Is the source media playable? You may be trying to play a damaged disk or a corrupt sound file. Try a different disk or sound file.
Are your speakers or headphones working properly? Try different headphones or speakers. The ones you are trying to use may be defective.
Is your sound device working properly? Your sound device should be enabled and properly configured. If you have more than one sound device, the device you are trying to use should be the default sound device. The documentation that came with your sound device will provide information on how to enable and configure it.

If your sound device has been properly enabled and configured and seems to be working properly, yet you still can not hear sounds, or if you can not configure your sound device on your system, it is most likely due to not having the correct device drivers.

Device drivers are programs which add functionality to devices. These are software that make hardware devices work. As with all other programs or software, device drivers need to be compatible with the platform or operating system on which they are to be used. A device driver designed for a MAC will most definitely not run on a PC. And drivers made for Windows 98 will not work on Windows Vista. For drivers to make any device function properly, the correct version for the particular system must be installed.

When you buy a computer, the correct drivers are usually already installed on it and a driver installer disk or a recovery disk usually comes with it. There are circumstances wherein the drivers are lost, most of the time because of a system crash. Reinstalling the drivers from the disk that came with the computer would solve this. But what if the disk has been damaged or lost and the computer is already beyond warranty? Or what if the system was upgraded so that the device drivers that came with it no longer work with the upgraded system?

Again, there's no need to worry. That can be easily resolved by using a driver finder program. A good driver finder program will scan your computer, identify hardware devices installed on it, recommend drivers specifically made for the brand of your computer, and download the most up to date drivers for your devices. It should preferably have a feature that will allow you to copy the downloaded drivers to a CD, network drive or USB flash drive. An option that lets you download the program and scan your computer for free would be an added bonus.

There are many driver finder programs on the market. You can search the internet and choose one which will work best for you.




Fara is a consultant engaged in rating the quality of web search results to improve internet user experience. She also specializes in web development, remote business administration solutions, PC technical support and internet security, and is one of the major solutions providers for Clarafaie Solutions. For the past year, she has been working with Affilorama Group Ltd and Doubledot Media Ltd, helping aspiring internet marketers achieve success in their online business ventures. In her spare time, she writes for a few selected clients.




Testing Computer Network Security


So you want to know just how secure your computer network is. You can't really tell until you perform a text which assesses your system's weaknesses and how these could be taken advantage of. Companies and personal users do these tests so they can narrow down their locus of problems regarding their systems and come up with possible ways to remedy whatever irregularities are spotted. In a way, these so-called "Penetration Tests" are synonymous to ethical hacking which aims to get into a system to see how it can be further strengthened and guarded against black hats.

Doing a penetration test will, of course, begin with a plan where goals are defined as well as the time limits for the achievement of those goals. Here, the major problems will be discussed, as well as the specific parts of the system that should be tested, when and how long the process will take. Basically, this is where the structure of the test to be performed will be mapped out, beginning with pinpointing the actual potential sources of problems and the approach that will be used to solve them using the penetration technique.

Once everything has been detailed out, the role of the ethical hacker will be defined. The person who will pretend to be a hacker will now put himself in the shoes of a black hat and will try to do things as a black hat would to a system that he plans on attacking. After this, the tester will now go through the system and see from which actual points a hacker might possibly attack. In other words, this is where vulnerabilities of such a system will be exposed.

The last step is for the tester to "hack" the system as though he was a real hacker with real objectives for doing the hacking. For example, the tester would try to dig as much information from the system as he can. By knowing how this is possible, he will be able to come up with counter measures that will make such an intrusion impossible.

After the test, a report will be submitted to the company and will detail whatever vulnerabilities have been discovered with the system as well as how to best remove these weak points by providing solutions. In other words, the main goal of a penetration test is to see where a hacker might be successful in hacking a computer network and provide solutions to make sure these weaknesses are fixed before a real hacker makes a go for them.

Prevention is still, of course, the main thing when it comes to avoiding hackers. Companies must make it a point to ensure that their employees only visit clean sites or, if this is not possible, web surfing other than those directly related to the job, should be prohibited. However, as one can never totally get rid of the threats of hacking, it would be wise to install a software that isolates such risks significantly.

An IP change software, which allows a computer to go online with its real IP address hidden, could be a very good option. When the IP is hidden, any computer can run around freely on the Internet without being targeted for hacking. Or the computer may be targeted but the hacker's efforts will simply be in vain because such computer won't really be accessible to him since it's using a fake IP.




For safe surfing, surf anonymously and preserve your online security.




Network Security - Methods For Controlling Threats


Since firewalls are so commonly used it is worth exploring them in greater depth. Corporations often set up rules for managing their Web connections using firewalls. A firewall enables a company to designate how all end users can use their network and decide what information is passed through Web servers and other servers.

There are several methods a firewall uses to control traffic that comes into and goes out of the network. One way firewalls do this is through packet filtering. During this process a firewall analyzes small packets of information against pre-designated filters. All data is sent via small packets of information through filters. Safe information is passed through and unsafe information is generally removed.

Another way firewalls mitigate traffic is through proxy service. This means the firewall retrieved information from the Web and sends it to the requesting computer. Still another method of traffic control used by firewall is stateful inspection. This technique allows the firewall to compare certain parts of the data packet to information gathered from trusted sources. Information going to the firewall from the Internet is monitored to determine whether it contains key characteristics that suggest the information is safe rather than harmful. Information designated as safe passes through freely and other information is blocked.

The methods a company selects will depend on a number of factors including personal preferences. Regardless of the method a firewall uses however a company or network administrator can customize the firewall to filter information based on a pre-established set of criteria.




Article by Frank Owen, visit his web site on network security [http://www.networksecurityinsider.com] for more information on network security [http://www.networksecurityinsider.com]




2011 Computer Security Incidents Have Made Headlines


2011 is turning out to be busy for those involved in information security, so far there have been the following information security related incidents in the headlines during the first 5 months of the year:

February 2011 HB Gary hack attack by the group known as Anonymous.

March 2011 RSA hack stole token data, (attackers were reportedly advanced persistent threats).

April 2011 Sony hack data theft reportedly involving information related to 77 million accounts and 2.2M credit cards.

April 2011 Epsilon victimized by a hack attack, email addresses stolen.

WikiLeaks related attacks perpetrated by the group known as Anonymous.

April 2011 Ritz-Carlton Hotel customers data stolen in a hack attack.

April 2011 Amazon Web Services cloud outage (non-availability).

May 2011 Lockheed Martin (details were not disclosed).

May 2011 Woodside Petroleum (Australia's largest oil company said attacks were coming from everywhere).

May 2011 Public Broadcasting (a phony news story and lists of reporters accounts and passwords were posted to a PBS site.)

May 2011 A New York Congressman reported a lewd photo had been mailed when his Twitter account was hacked.

Hacking is a type of directed attack typically executed by an external human using tradecraft methods to exploit accessible vulnerabilities and inflict damage. Protection methods are usually applied to limit the damage inflicted during an attack, limit the duration of an attack or deter an attacker. The effectiveness of any protection measures in use is clearly at issue when a successful attack occurs. Forensic tools and methods are used to analyze attacks allowing lessons learned to be captured and documented. Data theft is often motivated by financial gain, focused on credit card data for sale to fraudsters or email addresses for sale to spammers.

Non-availability incidents occur for any number of reasons, often not involving malicious activity. Such incidents can grow as related resources cascade into failure, a phenomena with potentially wide spread impact.

The Internet is often used to deliver the attack. The nature of giant public networks facilitate anonymity while being reliable and predictable.

The list does not include a huge number of incidents based on malicious code that have become common events or the large number of incidents involving sensitive, typically government, sites that never make it into the press.

The rapidly evolving sophistication of hacking attacks is a cause for concern. State sponsored activity involving "Advanced Persistent Threats" is emerging from behind the curtains as a valid concern for enterprises worldwide. The press in not likely to suffer from a shortage of material for their headlines for the remainder of 2011.




The incidents mentioned are from press articles that can usually be found in the publisher's archives. A search using the name of the victim and "hack" can often find a no cost article.




IT Managed Services: How They Can Help Improve Your Information Security


Many companies are turning to IT managed services for help with keeping their data secure. If a security breach were to occur on company computers and servers, sensitive information such as personal client and employee information, trade secrets, or financial records could be compromised. This could lead to the loss of integrity of the company as well as loss of client trust.

This is where IT managed services come in handy. They can help with making sure servers and networked computers communicate with each other and with the outside world in a safe and efficient manner. More specifically, they can aid in ensuring that your networks, servers, and computers have the latest security software, can fend off malware and viruses, and can be protected overall from information security threats.

Types of Information Security Pitfalls

Here are some of the typical risks a managed services provider can help mitigate:

Attacks from virtual threats. If you use a hypervisor machine (the virtual platform that hosts operating systems), you must make sure to keep its security measures up to date with the latest patches because it is possible for it to be attacked from within the virtual world. If that attack were to occur, all of your servers would be compromised.

The transfer of harmful data packets onto your servers with your knowledge is another viral threat that your company may face. A managed services provider can set up virtual firewalls that will create boundaries between each server and will prevent servers from communicating with non-secure servers.

Lack of network oversight and mindfulness. When hiring an IT managed services professional, a clear line of security responsibility is set so that you and your employees can focus on your own tasks at hand instead of worrying over who is responsible for the company's information security.

Virtual sprawl. It can be easy to keep creating new servers when a company has virtual servers (even when you don't work in the IT department). When more servers are created than being tracked is when a virtual sprawl can occur. This leaves the virtual server susceptible to being attacked from outside forces (hackers). If a server is deliberately created and then forgotten about, the information on it may be at greater risk of being compromised.

IT managed services will help your company create only the servers it needs. A managed services provider can also help prevent virtual servers you aren't aware of from infecting your other servers by installing and updating security patches.

How an Experienced IT Managed Services Company Can Help

An IT managed services firm can help improve and maintain your information security so that, even though a virtual server is out of sight, the security maintenance needed to keep your business up and running is not forgotten about.

A managed services provider can do the following for your company:

-Install, maintain and update security systems on each server and computer.

-So that you are aware of the type of information the servers share, they can set up server scans.

-To help ensure that each new server has a purpose, they can design server-creating protocols.

-Without the proper formatting, a security patch will not be able to protect your server against attacks. Therefore, they can correctly install security patches.

The security of your network is highly important for your company. An IT managed services company can provide the proper support and security monitoring you need in order to prevent or address any potential issues before they impact the productivity, customer relations, and bottom line of your company.




Visit our website to read more about how IT managed services providers can help your company improve its information security. www.Prosum.com is an IT consulting and information technology solutions company that provides business solutions for IT staffing and IT consulting.




Personal Computer Security and International Corporate Deals Considered


Each time US Internet security software companies work with overseas companies, they end up risking the potential eventuality of giving away information which could be used against citizens in other nations, or used by country-sponsored cyber attacks on US computer systems. The risk is so great in fact that it is amazing that there isn't more oversight than there already is. Let's take a look at a recent case study involving Symantec and Huawei Technologies in China for a moment.

There was an interesting article in the New York Times recently on March 26, 2011 titled; "Symantec Dissolves a Chinese Alliance," by Nicole Perlroth and John Markoff, which stated;

"Less than four years after Huawei Technologies and Symantec teamed up to develop computer network security products, the joint venture is being dismantled because Symantec feared the alliance with the Chinese company would prevent it from obtaining United States government classified information about cyberthreats."

Anytime a very well market penetrated company such as Symantec gives clues, consults, or works with a foreign company, that foreign corporation now has more insight as to how the software that Symantec deploys protects their customer's computer systems. Therefore, we now have a big problem. You see, the software engineers and computer scientists working for Huawei Technologies, which has been set up much similarly to AT&T, are not stupid people. Many have been trained in the top US Universities in fact.

You see, they already know most all of the tricks of the trade to Internet and computer security, as well as all the neat strategies for encryption, thus, giving them more information, actually has the potential eventuality of rendering all US computer security obsolete. Not to mention the reality that in the end the Chinese will have copied all the intellectual property and the company doing business there will not have gained much anyway, expect for giving away their yesterday's and most likely a good portion of their current technology without any huge financial gain for their troubles.

US companies should be quite alarmed at what is happening, and be prepared to hyperspace any current technology before sharing any of it with China who really doesn't culturally respect what we in the US refer to as proprietary information or intellectual property. Okay so, why did Symantec kill their Chinese alliance so abruptly? Well, why do you think? Further, I ask; are a good number of the attacks on US Computer systems due to perhaps, should I go so far as to say; Unholy Alliance? Time will tell and the truth always comes up, no matter how well encrypted. Please consider all this and think on it.




Lance Winslow has launched a new provocative series of eBooks on Serious Internet Issues. Lance Winslow is a retired Founder of a Nationwide Franchise Chain, and now runs the Online Think Tank; http://www.worldthinktank.net




Computer Security, A Useful Guide


There are many types of malware, malicious software that pose threat to your computer security. These malicious objects have been designed with the intent to disrupt the normal use of your PC. Cyber criminals, known as hackers use these tools and employ various techniques to invade your privacy and cause you significant personal and/or financial harm. Malware get installed onto your computer via various sources like web browsing, instant messaging and peer-to-peer file sharing. These malicious objects pose great danger to your online computer security.

Viruses are the small piece of software program that can install itself and infect a PC. Viruses have potential to infect and corrupt files. Even sometimes, hard drive can also be crashed by viruses. These can spread via any medium while exchanging of digital data in a computer network. These include DVDs, CD-ROMs, USB keys, etc.

Spyware is another common malicious object that poses great threat to cyber security. These are installed with some other type of desired program without the knowledge of the PC user. Once these malevolent objects are secretly installed they can change computer settings, collect your passwords, your internet browsing history and private information. Then this information is sent to the author of the spyware. How will you understand your computer is infected by spyware? Well, there are various symptoms. If you experience sudden slowdown of your computer, it might be due to spyware.

Adware is another very annoying type of spyware. If your computer is infected by adware you will experience tremendous amount of advertising in the form of pop-up advertisements or banners scrolling across your screen. This is truly disturbing and distracting but they don't pose that much threat like that of other types of spyware.

In the list of computer threats a worm is a notable name. This self-contained program not only can replicate itself but also use a network to infect other systems on the network. There are also worms that can secretly send documents though email to its author and even delete necessary files. Worm cause harm to other computers on the network as well as it consumes bandwidth. This means it slows down the computer and slows down web browsing.

To deal with cyber threats and enhance computer security you need to consult a tech support service provider. These service providers are highly experienced to cope with cyber threats. They will provide you with robust security so that you can stay away from all types of security threats.




Remote computer support providers offer PC security support at a very convenient price. Their services are available round the clock and you get state of the art services from certified experts.




Network Security - MPLS is a Better Choice Than Traditional VPN


Today's businesses expect a lot when it comes to their data networks. Speed, reliability, robustness, and scalability are just a few of the performance parameters with high standards from business users. One area in particular requiring special emphasis is security. Choosing the right network infrastructure is critical to ensuring that your security requirements are met end to end...and everywhere in between.

For example.... do NOT be so enamored with a traditional VPN backbone (e.g. Layer 2-based VPN services such as ATM and Frame Relay) that you overlook the drawbacks in maintaining the secure environment that your company applications will require. A standard VPN will not offer the same level of privacy and security as will a private dedicated backbone. At least not without extra effort on your part... and higher costs therefore in the long run.

A typical virtual private network (VPN) is a computer network that is layered on top of an underlying computer network. This is most commonly a public telecommunication infrastructure such as the internet. The private nature of a VPN means that the data travelling over the VPN is not generally visible to, or is encapsulated from, the underlying network traffic. Although it is run "layered" on top of a public pathway (the internet).... secure segregation of the two is enacted through using encrypted tunnels to ensure that data cannot be accessed without authorization.

The purpose of a VPN is to enable remote locations and/or individual users (e.g. telecommute staff) to access a company's network with some expectation of secure activity. An additional intent is to avoid the perceived high cost of owned or leased lines (dedicated circuits) that can only be used by one business. So, the goal of a VPN is to provide the organization with the same, secure capabilities, as a dedicated network. But at a much lower cost.

However that presumption is misleading. A traditional VPN network is not as secure as you likely expect and need. After all... it is still tied to a public infrastructure. A talented and persistent intruder can still defeat most encryption safeguards. Plus, a glitch in the hardware or software leaves your information open to public eyes. The appearance of failsafe privacy and security is really just that.... an appearance.

As for cost.... the price tag of the extra hardware and software to enable encrypted communication over your entire network is not cheap. Even though it may appear so compared to other options you may be considering. There's much more to the cost than set-up, installation, and encryption software. Don't overlook the maintenance, oversight, and trouble shooting of those safeguards. Particularly since you are responsible for all of that.... forever.... just to try and save a few pennies.

This is where MPLS comes in.

The architecture and protocols of MPLS (Multi-Protocol Label Switching) are predicated on the absolute privacy and security enabled via a dedicated network infrastructure. Put simply..... the entire network is completely separate and unto itself. You own it, share it with no one, and there is no connectivity of any kind with a public infrastructure. Now that is security.

To further drive home the main point of this entire article in simple terms..... with private lines or MPLS solutions, there is no path from the public into those network facilities. With VPN over the internet, the path is there and it's your responsibility to provide your own security. Think of the difference between a brick wall, and a brick wall with a door. VPN over the internet is the wall with a door, and you have to manage the lock and keys.

Once your MPLS core is configured and operating..... you're done. In fact it's unlikely you would even have much involvement with that. Your provider will do it all for you. Since it's a dedicated circuit network you are not responsible for the maintenance, oversight, and troubleshooting you would be with a VPN. In short.... it's hands off for you. No recurring costs except the monthly "leasing" fee for the lines comprising your network.

Before you play the cost card..... look deeper. The price of all dedicated circuits has been dropping dramatically for the last few years. Whether it's copper or fiber based.... the sticker shock days of old for dedicated T1 lines, DS3 Bandwidth, or SONET circuits (e.g. OCx) is long past. In fact.... probably the best deal for you today is pursuing MPLS over an Ethernet backbone. You'll get the best of both security and cost savings.




Michael is the owner of FreedomFire Communications.... and also authors Broadband Nation where you're always welcome to drop in and catch up on the latest BroadBand news, tips, insights, and ramblings for the masses.

For quality Dedicated Bandwidth service, protect yourself and your investment by comparing amongst 30 first and top tier carriers where you have a Low Price Guarantee. For more information about Dedicated Bandwidth and finding your best deals and options, please visit Business Ethernet




Computer Forensics - A Beginner's Guide


Computer forensics is a new and growing specialty that serves both the public and private sectors. IT forensics specialists are not only competent in software related matters, but in those relating to computer hardware issues as well. Computer forensics comes into play in both ethical and criminal issues, including intellectual property law, theft, and fraud. There was a time when those people committing computer crimes weren't at risk from the law - now they are.

These forensics follows traditional principles for scientific investigation. Work in computer forensics is systematic, well recorded and documented, and acceptable within a court of law. The methodology of computer forensics follows several steps. The first is to identify sources of digital evidence. The second is to preserve that evidence from loss, change or corruption. The third step in the process is to analyze the evidence, and the fourth is to present the evidence within the context it is required.

A good forensic specialist can manage the computer system and the data it contains while protecting sensitive evidence. Computer forensics explores both the individual computer, and any relevant networks or server connections. Forensics allows for the discovery of obvious and hidden data, as well as allowing access to password protected, encrypted and otherwise secured data on a computer system. Forensics may also allow for the recovery of deleted files.

As a matter of fact a lot of modern IT forensics work involves recovering files that have been deliberately deleted from computers and cellphones. The drugs trade relies on cellphones to communicate but now they're realizing that a good forensics team can retrieve information on every text message and phone call they've ever made.

You can think of these specialist forensic teams as like the ultimate data recovery specialists. No matter what lengths the guilty have gone to trying to hide the evidence of their crimes these guys can find it and use it against them in court. An example is the guy who set his laptop on fire but realized it was going to take forever to burn. So he threw the laptop into a river and figure that was enough.

It wasn't. Police were able to recover the laptop and almost all the data from his hard drive. He was prosecuted for the crime in question and is now serving his sentence. The only safe way to protect your data against a computer forensics team is to set the computer on fire, smash it to bits with a sledgehammer, put it in a container and have it shot into the heart of our sun on a rocket. And even then you can't be sure....

Industrial applications, the insurance industry, legal professionals, the courts and more rely on computer forensics for many functions, ranging from preventing the spread of illegal materials to avoiding corporate fraud. Computer forensics is a growing field, and one that will continue to provide evidence and insight to prevent growing criminal computer related activity.




Are you worried that your computer might be at risk? Your computer security is something you should take very seriously - it only takes one mistake to cause you major problems. If you want more info and help with your computer security problems then click here.




Easy Tips to Improve Internet and Network Security


Computers, being vulnerable due to having both wired and wireless connections, have been a victim to internet security threats. However, you can improve your internet and network security by making use of few steps and establish a network that cannot be hacked by anyone.

We can see great efforts being done by many companies to improve their internet and network security. This has been happening because of the progress of high speed internet service and wireless internet connectivity that has attracted many hackers to access it and misuse it. That is why, one can find many vulnerable computers all over the world, being attacked by spyware, virus and malware causing various instances of security issues, identity theft and cyber crimes.

The first step you must take to improve your internet and network is by installing a firewall. A firewall detects any unauthorized communication that tries to take place in a network or any unauthorized communication to access the internet. Firewall can give users options to allow or deny any communication that may appear to be dangerous to the computer.

Spyware are malicious programs that steal highly sensitive data such as usernames, passwords, personal and banking information. Viruses are computer programs that have the ability to multiply and cause severe damage to the computer's performance. Hence, it is also very important to install an antivirus and antispyware in addition to that firewall on your computer. Make sure your antivirus, antispyware and firewall programs are updated regularly.

It is very important to make use of high quality passwords that cannot be cracked by any hacker. Do not download any data or software from any not to be trusted websites. Do not download email attachments if you are unsure about its source. If you think your PC is infected by a spyware, you must checkout the genuinely of any website login page before you submit your username and password on it. You may install additional software that can fix errors in your computer's registry. These are some of the simple ways you can make use of to improve your internet or network security.




The author of this article, Silki Garg, has written many high rated articles on Internet Security. Her recent articles on Portable Antivirus and Windows Security are sure to be interesting for you.




Federal Cyber Security and Trusting the Cloud - Data Hosting and Virtualization


It seems that the security risk to federal cyber security introduced by a new or emerging technology is inversely proportional to the convenience it offers to industry. Every few years a hot capability comes along that instantly has businesses clamoring to adopt it, while security professionals scramble to discover and address its vulnerabilities. Wireless networking fell into this category, and the rise of Cloud computing over the last few years appears to be just the leading edge in a massive migration towards virtualization and out-sourced data hosting.

An industry unfortunately lacking standardization and oversight, where the uninformed essentially gamble one of their most valuable assets on a table marked with confusing, and sometimes risky, bets. The "valuable asset" in this analogy is, of course, proprietary data. Businesses, and even governments, frequently fail to comprehend the true value their data and intellectual property represent to their organization-much less the value that information might have to others: "Value" cannot always be measured in monetary terms, and oftentimes the value of an object comes not in its positive potential, but in the negative consequences it might produce in the hands of a competitor, criminal, or wary public.

The attraction to the Cloud is undeniable. Cost savings are frequently realized through the outsourcing of infrastructure, software, technical support, and security controls-assuming those services are effective and reliable. In fact, a service provider may be able to offer a computing capability far beyond what many companies might otherwise be able to afford: An outsourced solution is easily scalable, providing a partial or total solution with ready-made growth capability, and it may also offer increased accessibility to data if that is desirable. With respect to security, for a small or mid-sized company with marginal security to begin with, even a service provider with only modest security features may offer an improvement over the existing system.

When deciding whether or not to outsource it is important for an organization to fully understand and quantify their risk in utilizing the Cloud, starting with a comprehensive assessment of the true value of the data and intellectual property being entrusted to a potential service provider. In an outsourced solution, an organization is relinquishing direct control of their data, and possibly business processes as well, to an entity for which the element of trust may be unknown or at least undeveloped. Significant effort should be expended in understanding the details of the service being provided and defining the level of trust obligated by the contractual relationship. Be wary of Service Level Agreements (SLA) containing contractual elements granting the provider wide latitude and limited liability for the storage or confidentiality of data: For instance, some SLAs include provisions for sharing data with third parties or rights for marketing.

Key information to collect and consider when comparing service providers will include:

• Governance, Oversight, and Liability: When was the service provider's last assessment, and have they had citations or security breaches in the past? Is the service provider compliant with applicable regulatory requirements in handling your data? Are you in compliance with applicable regulatory requirements in outsourcing your data? What is the provider's liability and obligation in case of data loss or compromise?

• Physical and Logical Geography: Where are the data centers physically located that will be hosting your information, and how will your data be partitioned on the server(s) relative to other data stored by the provider?

• Security Controls: How is your data secured, both in transit and in storage? How, when, and where is your data replicated, and how long is it retained? How will various security measures impact advertised access and performance characteristics for the service?

• Physical and Logical Access: What security policies are in place for access to, and modification of, the data center and your data? Who will have access to your data? Possibilities include service-provider employees or administrators, third-party vendors, contractors, as well as officials from governmental, compliance, or oversight bodies.

• Balance Risk versus Trust: Evaluate the costs and consequences in the event your data were lost or compromised, and consider maintaining internal control or heightened security measures for that portion of information critical to the organization or the conduct of business. Such sensitive data might concern proprietary products or processes, intellectual property, privacy information regarding employees or customers, or company financial's.

Although various initiatives are underway for establishing uniform standards and oversight bodies for the virtual sector, many such efforts have failed in the past and effective legal and industry standards for Cloud computing appear to be years away from realization. As tighter security and control requirements do come into play in the industry, it will be interesting to see whether outsourcing remains a cost-efficient and attractive proposition for businesses when weighed against the relative risks.




Jon M. Stout is Chief Executive Officer of Aspiration Software LLC. Aspiration Software LLC is an Information Technology/Cyber Security services provider focused on the Intelligence Community (IC). For more information about Cyber Security and Information Assurance and Employment Opportunities in the Intelligence Community go to http://aspirationsoftware.com




Worried About Computer Security? Installing Avast Can Be a Solution


Computer security is a broad spectrum, and citing the emerging Internet threats it has become a must to do review work. As more and more digital information is getting online through e-mail client, instant messenger, social network, photo sharing websites, etc., your system is more vulnerable and can be an easy target of fraudsters and scammers. Along the installation of Windows, Microsoft Office, browser, e-mail clients, and more, the most essential job is to give your PC the protection of compatible antivirus or Internet security software. Sometimes, despite all protection the system acquires the infection. And, you may be perplexed with symptoms like slow performance, Windows Lockup, system crash, hard-drive failure, disk or drive inaccessibility, and more. At times, there can be silent errors, and before you awake it can be too late.

Avast is renowned brand while you are discussing the computer security aspect. There are home and business products both, and are powered with advanced antivirus and anti-spyware engines to check viruses, spyware, and other malicious agents. Real-time anti-rootkit protection will make sure that stealth factors, which can be a threat to your precious database stay away from your machine and specifically the Windows operating system files are safe. The brand has integrated some hi-tech features such as Boot-time scanner, avast! SafeZone and AutoSandbox. CommunityIQ network takes care of your system files against emerging Internet threats, as this is the portal empowered by the vast user-base. Avast products have received several acclamation from reputed software testing organizations, VB100, ICSA Labs, and West Coast Labs, are a few to name. Going through the avast reviews offered by these agencies can be a great advantage. These reports are based on practical performance of security software in terms of ease-to-use, intuitive features, effectiveness, update, upgrade and support. Thus, you can choose the best antivirus or Internet security protection for your system.

However, problems related to the installation, activation, update, and upgrade are not denied. There can be different reasons related to compatibility and conflict. So, before you install avast on your system affirm all requirement. Trace out and remove if there is any outdated security software already running on it. Do it either through Windows Control Panel or using an uninstaller tool as per your convenience. Uninstaller tool should be used with acute precision as it might delete important files or registry settings if taken for granted. Post installation problems related to e-mail send/receive, Internet access, sharing of files and peripherals, etc., can also be there, especially due to wrong settings and lack of update. Most of the times, you can fix the problem on your own, by updating or configuring the software application. Windows Firewall and Windows Update are other main supplementary aspects contributing in the PC performance, and must be reviewed regularly. You can uninstall avast and restore it back as well, if you are not satisfied with its performance.

No matter, you have done all to secure your data, but bad situations are enviable, and can slip anytime. So, you must follow safety measures. Regularly backup your data, and use encrypted system to encrypt sensitive files and folders. Download internet files from trusted sources only and stay away from rogue security software. Use password encryption to protect Office files.




The author is a technician at Techvedic technologies, a firm that delivers end to end Trend Support to clients. Online computer repair, Install Avast, Hp support, Remove Bitdefender are few services offered at this one platform along with many others.




The Essential Elements of Computer Network Security


The computer network security encompasses the policies and procedures adopted by the network administrators to monitor and prevent any kind of unauthorized access, modification, or misuse of accessible resources. It includes the access authorization of data in network, controlled by network administrator.

The administrator provides ID and password to the users to access the programs and information. It includes various modes like the private and public networks. It can be private i.e. within the organization or it might be opened for public access.

The computer network security must cover all the aspects of network, ranging from desktop to other peripherals. The multilayered and multifaceted approach to a network security for business or organizations renders excellent protection against external threats and internal threats as well.

For small network or for single computer system, a router along with integrated firewall is sufficient. On the other hand, for large network the most appropriate option is the dedicated firewall within the network perimeter. There are many good dedicated firewall applications that can allow for secure VPN connectivity. The important functions of dedicated firewalls are inspection, blocking, and reporting of malicious network.

One of the best complements for dedicated firewall is the content filtering device. Such devices are usually helpful for monitoring filtering, regulating, and reporting of all the web related traffic. The content filters are installed between the internal switch and firewall or router. The outbound and inbound traffic of internet have to pass through such filters. They are usually referred as bridged mode.

Effective monitoring is of utmost importance for computer network security. It helps in competent management of networks, in which the activity log of routers and varied servers can be closely watched and reported.

Moreover, the servers and desktops must have anti spyware and antivirus protection. Today, myriad of threat protection software for enterprise levels are available in the marketplace. The most suitable and ideal threat protection application must be cost effective, and it should provide daily updates of virus definition. Additionally, it should have centralized reporting and management system and active protection for runtime security.

Another aspect of computer network security is assigning permissions to various users in the network. For example, top management might want to assess the systems of their subordinates or teams. They will be granted with limited admin rights to handle their group. They might not necessarily be given the admin rights for the entire networks. You could also block the users from installing software from their workstations. Similarly, you could also prevent them from accessing their systems through portable storage devices. Basically, the entire network infrastructure has to be mapped clearly.

Lastly, the physical security measures are also very important for the overall security aspects of computer network. In order to achieve this, the servers must be kept in secured server rooms with regulated access. It is also better to check the security of the backup media, be it off-site or on-site. Remember that the critical information about your company cannot get into wrong hands, and therefore it is very important to secure your networks, in order to sail towards your business goals.




For more information about Exin Certification please visit us here: VMware Certification




Wireless Sensor Networks - An Emerging Technology


Wireless sensor networks (WSNs) are an emerging technology consisting of small, low-power devices that integrate limited computation, sensing and radio communication capabilities. The technology has the potential to provide flexible infrastructures for numerous applications, including healthcare, industry automation, surveillance and defense. Wireless sensor networks promise an unprecedented fine-grained interface between the virtual and physical worlds. They are one of the most rapidly developing new information technologies, with applications in a wide range of fields including industrial process control, security and surveillance, environmental sensing, and structural health monitoring.

A wireless sensor network is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants, at different locations. The development of wireless sensor networks was originally motivated by military applications such as battlefield surveillance. However, wireless sensor networks are now used in many civilian application areas, including environment and habitat monitoring, healthcare applications, home automation, and traffic control.

In addition to one or more sensors, each node in a sensor network is typically equipped with a radio transceiver or other wireless communications device, a small micro controller, and an energy source, usually a battery. The envisaged size of a single sensor node can vary from shoebox-sized nodes down to devices the size of grain of dust, although functioning 'motes' of genuine microscopic dimensions have yet to be created. The cost of sensor nodes is similarly variable, ranging from hundreds of dollars to a few cents, depending on the size of the sensor network and the complexity required of individual sensor nodes. Size and cost constraints on sensor nodes result in corresponding constraints on resources such as energy, memory, computational speed and bandwidth. A sensor network normally constitutes a wireless ad-hoc network, meaning that each sensor supports a multi-hop routing algorithm (several nodes may forward data packets to the base station). In computer science and telecommunications, wireless sensor networks are an active research area with numerous workshops and conferences arranged each year.

The applications for WSNs are many and varied. They are used in commercial and industrial applications to monitor data that would be difficult or expensive to monitor using wired sensors. They could be deployed in wilderness areas, where they would remain for many years (monitoring some environmental variables) without the need to recharge/replace their power supplies. They could form a perimeter about a property and monitor the progression of intruders (passing information from one node to the next). There are many uses for WSNs. Typical applications of WSNs include monitoring, tracking, and controlling. Some of the specific applications are habitat monitoring, object tracking, nuclear reactor controlling, fire detection, traffic monitoring, etc. In a typical application, a WSN is scattered in a region where it is meant to collect data through its sensor nodes. Another class of application is the so-called smart space.







Computer Network Securities


Computer security policies are the basic guidelines and rules for accessing a network. These lay out some basic concepts to secure your computers. Computer network security is a complicated area, and is taken up by experts with many years of on-the-job experience.

As more people turn to computers for simplifying their day-to-day activities and jobs, the need for general users to understand the concepts of network security has become important. One should know the risks involved in using the computer without the security systems, and learn how to deal with them successfully both at home and at work.

There are two popular types of network security systems: transit security and traffic regulation systems. When both of these join forces you can be assured of the delivery of important information to the right person without any network pilferage problems. The receiver should also ensure that the information received should be carefully processed using a computer which is loaded and protected with latest protection software.

The simplest form of ensuring security on the net is to keep a close watch on the type of data packets moving between the networks. If an infected packet does not reach the recipient, the host may have nothing to worry about. Traffic regulation systems serve as a protective screen between the receiver and remote sites. These tools generally guards three basic regions of the network: the routers, firewalls and hosts.

The three 'guards' deliver similar service at various points in the network, and it is difficult to draw a differentiating line between them. The truth is that there are no foolproof systems which offer a guaranteed secure system for data transferred in the public network. With the increasing use of the Internet, network security is fast becoming crucial for the safe use of the systems, and therefore computer network security is all set to be an important part of our regular computer usage.




Computer Security provides detailed information on Computer Security, Computer Security Systems, Computer Network Securities, Computer Security Software and more. Computer Security is affiliated with Information Security Systems [http://www.e-InformationSecurity.com].




CompTIA Security+ Made Easy


Cyber Security has been written about a bunch recently. As computers gain complexity, so do the malicious attacks used to beat the security systems built to guard those systems.

Why Get Certified?

Government employees working in the Information Technology and Computer Security fields, are being expected to complete the Security+ exam in order to stay compliant with the DoD 8570 policy. Several non-government companies are also requesting their employees to receive certification as part of their yearly training plan. Industry standard certifications are a great way to make your resume shine. Professionals seeking employment opportunities as a Security Specialist, Network Administrator, or Network Technician may benefit from obtaining a Security+ certification. Getting Security+ certified can also be worth while for individuals who are already employed and hope to advance their earning potential. The knowledge gained from preparing for and taking the exam is a good justification for seeking the Security+ certification.

About the Exam

The exam contains 100 questions which need to be answered in 90 minutes or less. A score of 750 or higher on a scale of 100-900 must be obtained to pass. CompTIA recommends that you have former network and security experience, but it is not mandatory. The exam codes for the current test are SY0-201 and JK0-015. The current pricing for 2011 in the United States is $266 for non-members and $226 for member organizations.

Exam Objectives

The core objectives for the exam range from broad organizational topics to specifics about various cryptography algorithms. Here's the topic breakdown:

Systems Security - 21%

Network Infrastructure - 20%

Access Control - 17%

Assessments and Audits - 15%

Cryptography - 15%

Organizational Security - 12%

It's easy to feel overwhelmed at first by reading the exam objectives, but don't sweat it. Keep in mind that this exam does not demand a degree in Computer Science and with a good study plan you too can have a good outcome. I'll give you some tips on how to increase your chances for passing the exam on your first try later in this article. I passed the exam on my first attempt with a score of 855 out of 900 and you can too!

Where to Take the Exam?

Pearson VUE or Prometric exam facilities both offer the Security+ exam. If you're a government employee you should receive an exam voucher from your command to pay for the exam cost. You will need to visit the Pearson or Prometric website to schedule your exam date once you are ready to take the exam. Don't be overly anxious to schedule the exam! Be sure you are ready to take the test before scheduling.

Preparing for Success

I did self-paced study for the Security+ exam for 2 weeks and passed on my first attempt with a score of 855 out of 900. My primary job responsibility is not as a Network Administrator or a Security Specialist, so my applicable work experience was minimal. I have some book recommendations and a study strategy that will maximize your chance for success on the first attempt. I highly suggest that you obtain a copy of CompTIA Security+ Deluxe Study Guide: SY0-201 and CompTIA Security+ Review Guide: SY0-201. Begin by reading the study guide cover to cover, making sure to complete the end of chapter practice exams. Then read the review guide cover to cover, making sure to take all of the practice exams too. Both books come with a CD full of practices questions and mock exams. When you can consistently pass the end of chapter practice exams and the mock exams on the CDs with a score of 80% or higher, then you should be ready for the real exam. Take your time, grasp the knowledge, and most importantly have fun!

Exam Day

Here are some closing recommendations that may help make your exam experience go smoother. Review the chapter summaries of CompTIA Security+ Deluxe Study Guide: SY0-201 and CompTIA Security+ Review Guide: SY0-201. Show up early at the exam center so you don't feel as anxious or rushed. Leave your cell phone and other personal items at home or in another secure location since you will be asked to empty your pockets prior to starting the exam. The test administrator will give you a small whiteboard and a marker for note taking during the exam. Don't speak with anyone in the exam facility once you have been seated and begin the exam. While taking the exam make sure to mark any questions you are unsure of and return to them later so you can maintain an unbroken pace of answering questions.




Adam Thomas is a security professional currently working as a Java Software Architect. You can read more articles on his Computer Security website.




Strong Password Authentication Essential to Your Computer Security


1. Why Password?

 

Your computer and the websites you frequently visit contain a great deal of personal information about you. It is important, therefore to ensure that you do not allow your personal details to get into the wrong hands.

We do so much online these days: banking, shopping and social networking have become everyday activities. There are nasty people out there who want to steal from you. Not just your money, but your very identity. It is therefore very necessary to protect yourself by restricting access to your personal data. This is where passwords come in. They make sure that your personal details are only available to you.

 

2. Why a Strong Password?

 

We all like to keep things simple. Passwords can be a pain. So let us make it easy to remember and  not complicate matters. Why not use the same password for all our safe sites. It is too much hassle remembering all those different passwords, after all.

 

Passwords can be seen as the weakest link between your data and those who could most benefit from access to your personal details.  Once the password is cracked they are in. If you use the same password for different applications, your system is vulnerable, along with your online banking and credit card accounts.

 

Examples of weak passwords include your name, username, date of birth, names of your children, even your car registration number. Paul123 would not be a safeguard against my online bank account, for example. Hackers can use programs that try to guess your password by browsing through your files to search for personal information.

Criminals use a number of methods to identify passwords. Dictionary search trawls through online dictionaries to come up with a match to your password. Brute force attacks try every possible combination of keystrokes that can be used in connection with a user name. Phishing, official looking emails purportedly from banks, for example, seek to obtain passwords or PIN numbers from unsuspecting victims.  

 

3. What is a Strong Password?

 

Many websites demand passwords that exceed seven or eight digits, including letters and numbers. Security experts advise even longer passwords, 14 characters are considered sensible. Experts also suggest that you mix upper and lower case letters and utilise characters in lieu of some letters. The key is to use a password that is simple enough for you to remember but no one else, even your close family and friends would be able to identify.

 

4. Further assistance

 

Microsoft has a very good application that rates the strength or weakness of your chosen password.




Password checker can be found here: http://www.microsoft.com/protect/yourself/password/checker.mspx

Paul Forrest has run marketing orientated businesses for more than ten years. He specialises in writing articles for websites, utilising proven successful methods that attract new customers. Paul has an extensive knowledge of Search Engine Optimisation (SEO) and enjoys a clear understanding of the profitable use of keywords.

Paul uses clear explanation regarding the subject. Paul's style of writing engages the attention of the reader in addition to maximising keyword profitability with the major search engines, particularly Google.

Based in Brighton in the United Kingdom, Paul keeps up to date with developments in all aspects of business and has a passion for helping companies to succeed in their marketplace. Following a multi-faceted career in commerce, Paul devotes his energies to writing articles that drive potential customers to his clients' websites. Paul can write about any subject which he will thoroughly research before pen touches paper or finger hits keyboard.

To find out how Paul Forrest can drive more customers to your website, check out http://www.articlewriter.biz today.




Computer Monitoring Tools - How Intrusive Are They?


Computer monitoring tools are used to keep tabs on what's being done on any specific computer or network of connected computers. Business people often use these to monitor employee activities to see whether they are actually earning their pay by working, or spending hours on internet casinos and instant messaging friends for hours on end... or worse, embezzling funds and stealing client accounts. Parents use these too, so that they can protect their children from sexual predators and keep an eye on their children's activities online to see that they don't get into anything pornographic. But how intrusive are these programs?

They're not very intrusive at all, if you ask me. You see, these can be run invisibly and silently, automatically running and recording activities right from the startup of the computer. There doesn't even need to be any evidence that the software exists on the PC. All activities, keystrokes, pages visited, clicks of the mouse, instant messages and such are all recorded onto secret log files which are then stealthily e-mailed to you in secret for your leisurely perusal.

This is also a boon to those who suspect their spouses or relationship partners of cheating, but lack the power of solid, concrete proof. Using computer monitoring tools for these purposes, you can be sure that everything can be done with absolute secrecy, you can protect yourself and your children, and even protect your business and your clients' delicate private and financial information. It's all about safety, security, and just good common sense. Don't you agree?




If you'd like to find the best in stealth computer monitoring software, I've found the state-of-the-art of all keylogger software and you can view more information on it at my website, http://www.keyloggerdownloads.com/




Virtual Private Network Frequently Asked Questions


1. Why do I get disconnected after 4 hours of use?

(a) You will get disconnected because of the limited number of ports and the fact that 90% of all users do not need to be connected more than 4 hours, all units have been set to a 4-hour time limit.

(b) If you require more time, you should disconnect gracefully before the time limit and reconnect so that you do not lose your work.

2. Why not use an 800 number all the time?

(a) Using an 800 number costs the corporation 5 cents a minute versus calling a local number when available that costs 5 to 7 cents one time charge to initiate the call with no per minute charges.

3. Do I have to be connected when Email comes in or to prepare Email?

(a) No, Email is stored in your server until you need to access it.

(b) The proper way to handle Email when working remotely is to make a connection periodically during the day pulling your mail down and then disconnecting.

(c) You can prepare your Email in the offline mode.

(d) When you make your next connection to process incoming mail all prepared mail can be sent at this time.

4. What about reconnection issues?

(a) If you are running Windows 95, NT, 2000 or XP making re-connections should be as simple as clicking on the icon to reconnect.

5. How do I speed up my dial-in connection?

(a) Only install the necessary protocols.

(b) Usually IP is the only one needed unless you are accessing Novell Servers.

(c) Never install NetBEUI.

(d) A good practice, if only accessing Novell Servers occasionally, is to create two configurations, one with IP access only and one with both IP and IPX. Use the second configuration only when required.

6. Why can't I see all of the NT units in the Network Neighborhood?

(a) When you dial into the Network Access Gateway you are normally on a segment without a master browser, which is how units are displayed in the Network Neighborhood.

(b) This does not mean that you cannot access the unit however.

(c) If the unit you are trying to access is a member of the corporate WINS structure and you have configured your remote unit per the configuration instructions, WINS will automatically resolve the units IP address when you Map a drive in Explorer.

(d) The key to this is to know the computer name and share name that you require before starting the process.

7. Why does my Dial-Up Networking fail to work after loading AOL?

(a) AOL sometimes replaces the TCP/IP Winsock driver, causing your PC perform erratically or not at all.

Fix:

1. Delete all references to TCP/IP from the network neighborhood properties.

2. Reboot the system.

3. Add the Microsoft TCP/IP protocol back in.

This will automatically add TCP/IP to all adapters and you should be functional again.

8. Can I use Network Address Translation (NAT) to attach my home computers via VPN?

(a) In general NAT is not supported by the IPSEC VPN client.

(b) Routers such as the Linksys BEFSR11 and BEFSR41 do support VPN with a software workaround.

(c) NAT implementations may be used if One-to-One NAT is used.

9. Why can't I get higher speed on my 56K v.90 modem into some NAG sites?

(a) A 56k v.90 modem is asymmetric by design, so download speed can be as much as 56k but upload speed will be only up to 33.6bps.

(b) For 56k to work, there must be only one analogue to digital (A/D) conversion in your local phone loop.

(c) Thus when modems at both ends are analogue, 56k speeds will never be achieved as most PSTN exchanges run digital routing.

(d) Some NAG sites use analogue phone lines with Cisco and standard 56k modems, while most PCs dialing up use a similar modem.

(e) Between both the modems, it limits the download speed to about 33.6kbps maximum.

(f) At the same time, many users might experience lower connection speeds due to other reasons, such as more poor line quality.

(g) These factors will also contribute to the quality and speed of the line.

10. When I load the Extranet Client on my PC and Winpoet is installed on my machine, it crashes or does not work properly.

(a) There are known issues running Winpoet software on the PC with the Nortel Extranet (VPN) Client.

(b) To repair your system, boot in safe mode and uninstall the Winpoet Software.

(c) A simple solution is to have users install the Linksys BEFSR41 hardware router.

(d) It has a firmware PPPOE connector, which eliminates Winpoet from the PC and provides the added benefit a NAT firewall for the user with the ability to hook up to three other PCs.

(e) A second option is to find a PPPOE Client that does not interfere with VPN Clients.

(f) If you have WINPOET, please check with your local ISP to confirm it will work with the Nortel VPN client.

(g) If not, or if they are not sure, please do not install the new client, or ask your ISP to find an alternative PPPOE Client that does not interfere with the Nortel VPN Client.

(h) If you decide to use Winpoet with the new Nortel VPN client, Nortel strongly recommends using Winpoet 6.0 or higher.

(i) Earlier versions of the Winpoet software are known to cause conflicts with the Nortel VPN client.

(j) If you have Winpoet on your PC and experience problems (i.e. with an earlier version prior to 6.0) the following 8 steps will safely uninstall the Winpoet Software from your pc and repair your system to boot properly.

1. Login to Safe Mode.

2. Login under Admin profile.

3. Go to Add/Remove programs and uninstall Extranet Client. Do NOT reboot at the prompt.

4. Check to see if Winpoet adapter is installed. If so remove it.

5. Go to device manager/network adapters. Right click Winpoet or Winport adapter. Uninstall.

6. Go to Admin Tools./Services and disable Winpoet-over-ethernet.

7. Reboot PC.

8. Reinstall the extranet VPN client.

An alternative solution is to install the Linksys BEFSR41 hardware router. It has a firmware PPPOE connector, which eliminates the need of Winpoet from the PC.

11. My ISP remains connected and I have no known problem with my Internet Service Provider. The problem is intermittent.

(a) Check the version of your Contivity Extranet Access client.

(b) You should be using the current release of the client, 4.65 or higher. You can view the most current version by clicking on Current Version.

12. I am having problems with my VPN connection.

(a) Try isolating the problem by process of elimination.

1. Is your Internet connection to the public Internet working properly?

2. Do you have the most current version of the Contivity Extranet Access client?

3. Have you recently installed any new software or hardware?

4. Were any hardware or software changes made since your VPN connection was last working?

5. Have you scanned your computer for Viruses?

(b) If you are still experiencing problems, try uninstalling or removing the following items.

1. Disable your firewall, anti-virus software and any other maintenance or Security programs installed.

Try to connect.

2. Remove your router from your configuration.

Connect your PC directly to your Internet connection.

This is accomplished by connecting the cable coming out of your DSL/Cable modem, directly into your network card or USB connector.

If successful, the problem might be your router's setup or firmware.

Refer to your Manufacturer's website or documentation for troubleshooting your router or contact the Vendor directly for support. Cheat Note: Caution: use this idea at your own risk - usually there is a little hole in the back of the Router and you can stick a round toothpick into it and push the button inside and it will reset the Router to the Manufacturers settings, do this while the Router is unplugged from any electrical source. This should not upset any of your configurations but do not break the toothpick off inside. It may be best to use a bobby-pin.

You must upgrade your firmware.

Please beware even though you might have just recently purchased your router, it might have been packaged with an older version of the software.

3. Enable your router, firewall/internet security programs one at a time.

Cable/DSL users: If you have a dial-up modem installed on your PC, try to test using a dialup connection.

Either use dialup to an ISP and then use VPN or dialup directly into your Network.

13. The upgrade to release 4.6X of the VPN client failed.

(a) Refer to the list below and see if any of this applies:

Windows XP Disable the XP firewall.

VPN Software Most VPN clients cannot co-exist on the same machine.

Windows ME Remove and Add TCP/IP protocol.

Brother Multifunction Printer You may not be running the current Brother software for your printer.

Windows 2000. Users should download drivers/software from the Brother website.

14. How can I remove and re-install TCP/IP Protocol?

Below are instructions on how to remove and add TCP/IP for Windows 2000. (Refer to your operating system's help screens, web support and/or documentation for instructions, if you are not using Windows 2000.)

(a) Please be sure, no matter which operating system you use, that you elect to restart when finished (as prompted) or restart between each process.

(b) For Windows 2000 you must be logged on as an administrator or a member of the Administrators group in order to complete this procedure.

(c) Remove TCP/IP

1. Open Network and Dial-up Connections, click Start, point to Settings, and then click Network and Dial-up Connections.

2. Right-click any network connection, and then click Properties.

3. On the General tab (for a local area connection) or the Networking tab (all other connections), click Internet Protocol (TCP/IP), and then click Uninstall.

4. In the Uninstall Internet Protocol (TCP/IP) dialog box, click Yes.

(d) Install TCP/IP

1. Open Network and Dial-up Connections. (Click Start, point to Settings, and then click Network and Dial-up Connections.)

2. Right-click the network connection for which you want to install and enable TCP/IP, and then click Properties.

3. On the General tab (for a local area connection) or the Networking tab (all other connections), if Internet Protocol (TCP/IP) is not in the list of installed components, then do the following:

A. Click Install.

B. Click Protocol and then click Add.

C. In the Select Network Protocol dialog box, click Internet Protocol (TCP/IP), and then click OK.

D. Verify that the Internet Protocol (TCP/IP) check box is selected, and then click OK.

TCP/IP is installed as the default network protocol if network adapter hardware was detected during Windows 2000 Setup. You only need to follow these instructions if the TCP/IP default selection was overridden during Setup.

15. I am using Windows XP Home or Professional and am unable to get to certain websites or resource servers when connected using VPN.

(a) There are some known issues when using the Contivity Nortel client 4.60 on a PC running Windows XP.

(b) The older version of the Nortel client (version 3.70) will fix the problem; however, the ultimate goal is to upgrade to the current version.

(c) Please do not reinstall version 3.7X as a fix.

16. My ISP provider requires the installation of WinPoET. Can I use it with the latest release of the client?

(a) If you are using WinPoET, it must be version 6.0 or higher of WinPoET.

(b) Check with your ISP and request v6.0 or higher of WinPoET.

17. After installing v8.0 of AOL, I've experienced problems with my connections to my Network.

(a) Users may experience problems with Windows Outlook email.

(b) You must create two separate profiles; one profile as a Remote Connection (POP3) account for your AOL Internet email and another profile for a local LAN connection to your corporate Network email.

Here's how to do it:

1. Go to Start, Control Panel, Mail, Services, Show Profiles and Add the second profile.

2. Make sure the button "Prompt for a profile to be used" under General tab of MS Outlook properties is selected.

3. Disable the ATWPKT2 driver. (The files ATKPKT2.SYS and ATKPKT2.VXD are located in the AOL directory under PROGRAM_FILESCOMMON_FILES.)

18. I'm Unable to obtain an IP address while "Hotelling".

(a) When working remotely from a Hotel (Hotelling), you must launch your Internet explorer first and try to obtain an IP address.

(b) If you just launch VPN, you won't have obtained an IP address, and VPN may fail.

(c) Disable your firewall, as the hotel may recommend.

19. Why do I get No Domain Available when dialing my ISP?

(a) On your Internet Service Providers (ISP) dial connection, right click the mouse and select the properties button.

(b) Click on the Server Type tab and make sure that the "Log On To Network" box is unchecked, otherwise you will hang trying to log into the Network when trying to connect.

20. Why do I run so slowly when using my VPN connection?

(a) On your Internet Service Providers (ISP) dial connection.

(b) Right click the mouse & select the properties button.

(c) Click on the Server Type tab and make sure that the NetBEUI and IPX/SPX boxes are unchecked; otherwise you will see delays while the system tries the unsupported protocols.

(d) VPN only supports the TCP/IP protocol so checking these boxes will only slow you down.

21. Why can't I access my NT resources when using VPN?

(a)Windows 95 users should make sure that they have the "Log On To the Network Box" checked in the Extranet Client per the instructions for the Extranet Client Install to use NT resources such as Exchange and file shares.

22. Why do I seem to be running slowly through my VPN connection?

(a)Try turning off the Software Compression option on your Internet Service Providers (ISP) dial connection as the VPN client has it's own compression. Right click the mouse & select the properties button.

(b)Click on the Server Type tab and uncheck the "Software Compression" setting.

23. Why can't I get to my Novell Servers when using VPN?

(a)VPN only supports the TCP/IP Protocol & most Novell Servers require that you use IPX/SPX to access them.

(b)Work with your Novell Administrators to change to NT or use a Version of Novell that supports IP traffic.

24. Cannot VPN Web Servers on the Internet after Establishing a Contivity VPN Client Connection.

(a) Cause:

1. This is normal and occurs as a result of having all network traffic passed through the corporate network.

2. Typically, firewalls and other security measures on the corporate network will limit your VPN to the Internet.

(b) Action:

1. The Contivity VPN Switch administrator can set up a default route on the Switch to forward traffic to the Internet.

2. If this default route is not configured, you will need to disconnect the Contivity connection to web browse the Internet through your ISP connection.

25. Cannot VPN Network Shares After establishing a Contivity VPN Connection.

(a) Causes:

1. WINS Server may not be configured for IPsec connections on the Contivity VPN Switch.

2. Your system may be setup for a different domain than the one on the remote network.

(b) Actions:

For the first problem, validate that the Contivity VPN Client has been configured with a WINS Server.

1. Follow the steps outlined above under "Problems with Name Resolution using DNS Services" to run IPCONFIG at a Command Prompt on NT 4.0 and to run WINIPCFG on Windows 95.

2. Verify that a Primary WINS Server is listed under the section for the adapter named IPSecShm on NT 4.0 and on Windows 95.

3. Verify that a Primary WINS Server is listed in WINIPCFG for the Contivity VPN Client adapter.

4. If there is no Primary WINS Server listed, notify the Network Administrator that the Contivity VPN Switch may not be properly configured.

(c) For the second problem, skip the initial domain logon when Windows 95 starts and select "Log on to the Remote Domain" under the Options menu of the Contivity VPN Client dialog box.

1. You will then be prompted to log onto the domain of the remote network after the Contivity VPN connection is made.

2. This is the recommended method for users with Docking Station configurations.

(d) Alternatively on both NT 4.0 and Windows 95, change your workstation to be a member of a Workgroup instead of a Domain.

1. From the Start Menu select Settings then Control Panel.

2. In the Control Panel, double-click on the Icon labeled "Network". The Network Control Panel applet will open. Select the Identification tab.

3. On Windows 95, the entries on the Identification page can be modified directly, while on NT 4.0 it is necessary to click the Change button to change the entries.

4. Change to use a Workgroup and verify that the "Computer name" does not match one that may be on the remote network.

5. The name for the Workgroup is not important, so enter anything. Click OK to save the changes and reboot the machine.

When accessing a resource on the remote Domain, if you are prompted for a username and password, you will need to have a Domain name precede your user ID.

For example, if your user ID is JoeS and you are accessing a machine on the remote Domain named CORP, you would enter your username as CORPJoeS.

26. When trying to load the VPN Client on a Dual Processor unit you get an error message.

(a) The Nortel VPN Client currently does not support Dual Processor units.

27. When I set up my home network, I installed Microsoft Internet Connection Sharing (ICS) so that all of my systems can reach the Internet. Now my VPN client no longer works.

(a) The reason for this is that the Microsoft ICS uses Network Address Translation (NAT) to get the Internet connection, and NAT, which may not support IPSec connections.

(b) The only way around this currently, is to make the unit running the ICS be the one you run your VPN connection from. Any downstream unit will not be functional for VPN.

28. Can Cisco or other IPSEC VPN Client software exist on the same box with Nortel Extranet Access Client? Is this supported?

(a) They cannot coexist, and it is not supported.

(b) The two virtual adapters installed with each client will conflict with each other.

(c) There is a utility on the new Cisco clients that will uninstall a Nortel client if found by the Cisco VPN Unity Client install program.

(d) All other VPN Clients require manual removal of the Nortel client or any other client.

29. I am having problems with my VPN connection not already discussed.

(a) Try isolating the problem by process of elimination.

1. Is your Internet connection to the public Internet working properly?

2. Do you have the most current version of the Contivity Extranet Access client?

3. Have you recently installed any new software or hardware?

4. Were any hardware or software changes made since your VPN connection was last working?

5. Have you scanned your computer for viruses?

(b) If you are still experiencing problems, try uninstalling/removing the following items.

1. Disable your firewall, anti-virus software and any other maintenance or Security programs installed. Try to connect.

2. Remove your router (Linksys, D-link, Cisco, Netgear, etc.) from your configuration.

Connect your PC directly to your Internet connection.

This is accomplished by connecting the cable coming out of your DSL/Cable modem, directly into your network card or USB connector.

If successful, the problem might be your router's setup or firmware.

Refer to your manufacturer's website or documentation for troubleshooting your router or contact the Vendor directly for support.

You must upgrade your firmware.

Please beware even though you might have just recently purchased your router, it might have been packaged with an older version of the software.

3. Enable your router, firewall/internet security programs one at a time.

Cable/DSL users: If you have a dial-up modem installed on your PC, try to test using a dialup connection. Either use dialup to an ISP and then use VPN.

30. VPN Problems with Name Resolution using DNS services.

Cause 1:

A DNS server may not be configured for IPsec connections on the Contivity VPN Switch.

Action 1:

Validate that the Contivity VPN client has been configured with a DNS entry.

For NT 4.0, open a Command Prompt and enter IPCONFIG /ALL.

Verify that a DNS server entry is listed.

For Windows 95, from the Start menu on the taskbar, select Run and enter WINIPCFG.

Select "Contivity VPN Adapter" from the pull down list of Adapters, then click More Info.

Record the information displayed under DNS Server entry and verify it with the network administrator.

Cause 2:

The hostname being resolved has both a public and a private IP address. This is commonly referred to as a Split-Horizon DNS.

Action 2:

Open a Command Prompt and ping the host you are trying to reach with a fully-qualified hostname (for example, [http://www.vpnclient.com]).

If you receive a response, verify that the IP address returned on the first line (for example, www.vpnclient.com [207.78.33.329] is an IP address from the remote corporate network.

If it is not, notify your network administrator that the internal hostname should be modified so that it is not the same as the external hostname.

Cause 3:

The retail release (a.k.a. "release 1") of Windows 95 contained a bug that prevented use of more than one DNS server. This problem was fixed in OS Release2.

Action 3:

If you are using a release of Windows earlier than Release 2 of Windows 95, then you need to upgrade.

31. I am having problems mapping drives using the latest VPN client.

(a) This is a known issue due to Microsoft that can occur when using cached credentials behind a NAT firewall.

(b) The problem will occur for some users, but not others.

(c) It can occur regardless of the VPN client you are using.

(d) Some users may only experience this problem after upgrading to a new VPN client, but restoring the old client does not necessarily fix the problem.

(e)You may try uninstalling the VPN Client and then reinstalling.




For Further Details and More Sources Visit Your VPN Doctor, He has the Cure!

VPN is a Secure Band on the Internet that Hackers and other would be Interlopers can't access by using Dynamic Data Structure Password-Pins and Pass-Codes. Your VPN Doctor can help make Your Home, Identity, Business and Internet activities Safe, Private and Secure.

Whether you use the Internet or not, You use Computer Programs that can cause a world of headache and oodles of Money when things go wrong. Your VPN Doctor provides the information You can't do without

Your VPN Doctor offers VPN Help, PC Help, Resolve to Software and Hardware Issues, Guides, General FYI and other Troubleshooting Steps for Your overall Computer needs.