Recent newsmaker stories regarding Microsoft Windows security highlighted the recurring theme that there are "care and feeding" issues related to using computers in the dynamic, connected world of the Internet. Just days ago this month, computer users of home PCs, businesses, and mobile laptop users were affected. In this case, the issue was an animated cursor (typically, an ".ANI" file) exploit, which abused a Windows feature, and therefore created the issue.
The impact potential was high; if attacked, most recent versions of Windows (2000, XP, 2003, Vista) permitted the bug to engage "Remote Code Installation and Execution" without the user's knowledge. Under the right conditions, simply viewing a baited web page could set into motion the steps to infect the host PC with progressively damaging malfunctioning software (malware). The malware could take many forms, in a stealth-like fashion, with users unable to detect anything unusual, which makes this particular infection damaging to Internet coupled PCs. At worst, potentially your PC could automatically join a network of remotely controlled "zombie" computers, ready to perform additional malicious tasks to the connected world under remote direction. PCs left powered on for long periods unattended or in "screen saver" mode could do lots of downstream damage, switching to a more subdued, "light-impact" mode when the unsuspecting user returned to the PC.
This particular exploit was notable, in that a variant was apparently identified and patched in 2005, with a second form of the exploit surfacing in December 2006. Further, the typical practice of using firewalls, anti-spyware, and anti-virus applications would not have prevented infection, leaving many users with a false sense of security, so to speak. Reportedly, the exploit could happen whether you used Firefox or something other than Internet Explorer 7 under Windows Vista (in protected mode) to browse the web (though Vista was not totally immune).
The good news- there have been several patch updates from Microsoft to correct this condition on the windows update website. This real-life technology drama may illuminate a thought in your own situation. Is now maybe a good time to review my own procedure for ensuring a secured and sound computing environment in my company? Could be; Array Systems suggests the following basic operational components be included in a security review:
Anti-Virus.
Make sure you have recent versions and current definition (signature) updates. There are license fees/renewals with most products, which should be maintained or checked.
Anti-Spyware.
Similar to Anti-Virus in function- ensure updates and versions are current for this tool to be effective. This can be part of a suite of defense products, all with the intent of providing added protection.
Microsoft Update.
A free Microsoft web service that provides direct and concise access to software updates for Microsoft products (Windows, Office, etc.) You can set manual or automated updates, but you should understand the ramifications of each method.
Firewall.
Hardware firewall devices are preferred, as some software based firewall/Internet security products can be ineffective for certain environments.
Gateway/Content Filter.
Hardware and software based devices which can provide active protection between internal users and the Internet, and also manage wireless, PDA/mobile users, remote access, etc.
In addition, there are behavioral (human factors) components that should be part of the security review, which do not involve hardware or software. For example, antivirus experts have noted that perhaps 35-40% of virus definition/signatures are unavailable on average, due to delays in developing remedies or in detecting new malware exploits. Therefore, the habits and interaction patterns of users become a vital part of a security protection strategy, which might include:
Email.
Don't open attachments, or click on hyperlinks unless you are sure of the content. This is similar for web links embedded in email messages, and is independent of whether full-client applications or web-based browsers are used. Consider when to use email, or revise company policy to standardize its use.
Web browsing.
Stay away from unknown websites. Websites are now the most common source of PC infection. (Even the official NFL SuperBowl website got infected most recently). Spear phishing is particularly harmful in that it targets truly authentic looking, legitimate websites, using well written grammar and customer data, to lure the user viewing the website into infection.
Passwords.
Maintain established complexity and change frequencies suitable for your environment. Like keys to locks, passwords are the primary mechanisms for controlling access to networked computers.
Remote access.
Consider the method and management of outside access to company infrastructure. Who is permitted, how, and using what devices may be a part of the design.
Data management.
Similar to remote access, consider the data involved. Allow only authenticated access to critical information, and actively manage where and how information is used if on portable devices or outside systems. Is internal business data stored permanently on portable devices? Are portable devices/laptops protected?
Security issues related to Windows fall under many names (beyond malware), which specifically equate to hardware, software, network and user components too numerous (and specialized) to adequately address in this article. Terms such as IDS (intrusion detection), port attacks, Phishing/Spear phishing, Root kits, Social Engineering, Spam, Spyware, Trojans, Virus, etc. are but a brief sample list of keywords found on popular web searches. Each has deeper meaning and implications that can fill entire articles in themselves. Awareness, understanding, acceptance, and change start the steps toward action in the highly interconnected world of present day secured computing. The fluid, interactive nature of the Internet will require a progressive response to maintain a trouble-free web experience.
Got a question? Need Help?
Please visit our website: Array Computer Network Support in Los Angeles
Ask a question at our blog site:AskSid.com
Email: skato@arraysystems.com
Call us Toll Free: (877 ) 412-7729
Sid Kato is the president of Array Systems Inc. and author of the Daily Breeze "computer-wise" column. Array Systems is an IT Outsourcing and Computer Network Support company that aims to help small businesses throughout the greater Los Angeles area with all of their technology demands. In business for over 16 years, Sid knows where the pitfalls are.
I was asked recently to go to a car dealership and do a security analysis on their Windows Server 2000 machine.
This is what I recommend doing to any Windows 2000 machine where applicable.
Make sure that the guest account is disabled. It comes disabled by default.
A problem I notice allot is when I go to companies, lots of accounts are still active for employees who no longer work there. They should be removed when the employee is terminated or leaves on their own accord. Disgruntled employees have been known to wreck havoc.
Group policies can and should be implemented in a Windows 2000 environment and audited to make sure there are no extra accounts or accounts with weak passwords.
Password security is also important; if your password is weak it will be cracked. I have been in companies where your password is your initials. That is to simple. Implement password policies and account lockouts after multiple failed login attempts. WARNING this can create a denial of service attack. Create multiple admin accounts and give them different rights. A strong password policy for administrative tasks.
Run Net Share from the command line to view open shares on your network and shut those down unless needed.
Go into the BIOS and set a user password and disable the ability to boot from a floppy, USB, or CD. People can easily grab the SAM file which is a password hash stored on your system from a Linux boot CD or other tools. Then attempt to crack the hash.
Change the administrator account to a different name. That is usually a crackers first attempt. Rename it to something other than root as well.
Use NTFS on all partitions this gives you more control and security than using the FAT file system.
Make sure that the "Everyone" permission is not allowed on your resources, directories, etc.
Have the last user logged on turned off. This makes it easier for an attacker to guess passwords. There already half way there the have the username.
Apply appropriate access control lists.
Don't forget about the people around you and either lock your workstation when you leave or have a screensaver enabled with a strong password. Insider threats are a reality.
You can enable EFS encryption file system; you can encrypt whole directories as well. I suggest if your really paranoid or smart to look into a utility that allows you to choose different encryption algorithms. I do not like encryption standards that are closed. Meaning we cant see the source code. I prefer open source its easier to look for holes and attacks.
Make backups of all your important files. This is the most important thing I learned in System Administration. Backup, Backup, Backup to something that cannot be overwritten such as a CD-R.
To configure Security Policies use the Security Configuration Toolset you can make your job allot simpler by using snap-ins.
I visited Microsoft's site to see everything they had, I have to say there is plenty of information.
Shut down services that are not needed. The more ports that are open and the more applications running the more avenues of attack.
Restrict access to Local Security Authority only to admin.
Change log in warning to something like. Authorized Personnel only, "all activities are logged and monitored. Violators will be prosecuted to the fullest extent of the law."
Shut down individual ports, that are not used.
I personally like smartcards for two form authentication. I recommend RSA secure ID for machines that need more security.
Enable auditing to track what users and possible intruders are doing on your system.
Everything from login attempts to access of objects can be audited in Windows 2000.
Protect the registry from anonymous access.
Make sure the audit logs are locked down so they cannot be erased, or tampered with. Only the admin should have rights to these files.
Install service packs.
Make sure that your antivirus is up to date with the latest signatures.
Run a Spy-Ware utility.
You can also run an online vulnerability checker such as Shields Up by Gibson Research.
Get automated patch software.
Remember that security is not something that can be finished. Keep up to date.
Benjamin Hargis CEO & MCP
Phuture Networks
Visit us on the web! [http://www.phuturenetworks.com]
Computer threats are numerous and the consequences of an attack on your computer's security can be severe. But the good news is that it's relatively simple to protect your computer. You can check the security settings that help protect your computer to make sure your computer is secure. The three most important security settings are: Firewall, Automatic Updates and Virus Protection.
Your first line of defense in securing your computer is to protect it from attacks by outsiders. Windows XP comes with firewall software that is turned on automatically. The firewall software provides a barrier between your computer and the network to which is connected by preventing unauthorized people or unwanted programs, such as viruses, from accessing your computer through the Internet or a network.
Windows regularly checks Microsoft's Web site for the latest important updates for your computer and downloads and installs the updates automatically. (Provided you have automatic updates turned on) Windows also checks to see if your computer is using an anti virus program and whether the program is up to date. A virus can cause a variety of problems, such as the appearance of annoying messages or the destruction of information.
Follow the step by step instructions to enable or disable your Windows firewall protection. To view the instructions with guided screenshots you can visit our website and click on PC Tips, and select Security Tips.
Step 1
Click on Start menu and select Control Panel.
Step 2
In the Control Panel window Select Security Center to view and manage your security settings.
Step 3
The Windows Security Center appears and displays the status of your Firewall setting.
Step 4
You can turn Firewall On/Off by clicking Windows Firewall at the bottom of the Windows Security Center window. In the Windows Firewall dialog box select your choice and click on OK.
For more Windows Tips, including performance, customization, maintenance, recovery, efficiency, networking and registry tips, all with step by step instructions and guided screenshots, be sure to be visit our website and begin to unleash your computers potential.
PC Online [http://www.pconline.com.au] - Embracing the Future
[http://www.pconline.com.au]
Over the past recent years security has become the major concern of the internet users. It is important to keep your home computer secure from the viruses, hackers, spyware and other security threats. These security tips are applied on the Windows based operating systems such as Microsoft Windows 2000 Professional, Windows XP Professional and Windows 2003 Server. The general methods of securing your computer and network is keeping your operating system up-to-date, installing up-to-dated antivirus program, anti spyware program, applying security templates, restricting the access to computer server of unauthorized users and applying security patches Microsoft's website.
The major threats to computer are viruses, spyware, accidental deletion of the files, information theft and unauthorized access. More and more malicious codes are being are written to develop the viruses, Trojan horses, spyware, malware and adware.
Applying local security policies on each computer in a network is a must and you can access the local security policies in the Administrative tools in the Window's control panel or by simply running it secpol.msc or gpedit.msc. Remmeber that the key policies that should be enabled are audit login for the failed events, creating password policies and requiring Ctrl+Alt+del for login.
If you have made a shared folder in your computer to be accessed by the other users in network, make sure that you have set the permissions to access this folder to only the required users. If you haven't secured the shared folder by restricting the permissions then your sensitive information can be leaked and your data can be deleted accidentally from the shared folder.
If your computer is directly connected to the internet through Dial up connection, DSL or cable net you need to protect your computer by connecting the hardware firewall and it is also a good idea to install and configure the software firewall as well. In Windows XP there is built in Firewall installed and you can turn it on and off by going to control panel and select "Network and Internet Connections". You can also try Sygate personal firewall.
Another security measure is to identify the mysterious processes running at the backend with the operating system. These processes starts when the Windows startup. Identify the description and command line instructions for each process.
Bad or weak passwords are the most important causes of the security compromises. A password should never be a dictionary word. A password has less chance to be cracked if it has been changed regularly. Always use the combinations of the alphanumeric, symbols and spaces between words etc to make strong password.
Last but not the least security measure is to encrypting your important files so that they can't be accessed and read by the unauthorized users.
B. Bashir manages this website Networking Tutorials and regularly writes articles on various topics such as Computer Networking, Network Troubleshooting Tips Wireless Networking, Computer Hardware, Certifications, How Tos, Network Security Guide and computer tips.
Today, Information Security is the most important thing to be taken care of while using the Internet.
Internet, Being a source of knowledge, learning and entertainment, it is also something that can be misused for malicious and destructive intent.
So what do I mean by "Securing Windows"?
Windows being the most widely used operating system, Its users are vulnerable to data theft, Identity theft and cracking. By taking some precautions and a few good practices, you can secure your Windows computer, easily and effectively.
Security is a big field altogether in the world of computers, there are huge corporations that only specialize in security. This article is for the type of security you can use for your home computer and not it is not for huge corporate setups, since they have a much larger perspective.
To begin with, let me summarize the points that I am going to cover in this article
Understanding Windows processes that run in the background.
Antivirus software, and sources of viruses
Firewall
Security tips and tricks
Understanding Windows Processes
Every software, application we install in our computer runs as a "process", it is a way that the computer can keep track of running software, close it, or even modify it in some cases.
So where can you see them?
You can see the processes by following these steps -
Right-click the taskbar down below, select "Task Manager"
Select the "Processes" tab
Or - You can also open Task Manager by pressing (CTRL+SHIFT+ESC)
Once you get there, you can see all the processes that are currently running on your computer. This gives you a detailed overview of what exactly is going on in your computer. You can see what process is running, and how much of your system memory are they using.
Here is a list of common Windows system processes that can be found there,
Ctfmon.exe
This is involved with the language/alternative input services in MS-Office. Ctfmon.exe will continue to put itself back into the system startup when you run the MS-Office apps as long as the Text Services and Speech applets in the Control Panel are enabled.
Explorer.exe
This is the Windows Shell - the desktop, taskbar, icons almost everything that you see in windows is controlled by this process
Svchost.exe
Svchost.exe (Generic Host Process for Win32 Services) is an integral part of Windows OS. It cannot be stopped or restarted manually. This process manages system services that run from dynamic link libraries (files with extension.dll). Examples for such system services are: "Automatic Updates", "Windows Firewall", "Plug and Play", "Fax Service", "Windows Themes" and many more.
Winlogon.exe
This controls the authentication of Windows users. It is one of the most important system processes.
Rundll32.exe
This program is part of Windows, and is used to run program code in DLL files as if they were within the actual program. DLL files are a part of the Windows programming.
Csrss.exe
This is the user-mode portion of the Win32 subsystem; Win32.sys is the kernel-mode portion. Csrss stands for Client/Server Run-Time Subsystem, and is an essential subsystem that must be running at all times.
When looking at the processes, you can also see the memory they are consuming, using the task manager process list, you can also close a non-responsive program.
From the security aspect, any Virus, Spyware will show up in this list, so this is a very important tool that you can use when you feel you have a virus or a spyware installed on your computer.
Sometimes you can directly say whether a process is running a virus or not, when you click on it, it will just 'slip' out of your mouse pointer and will change its position, these are the advanced viruses designed to evade from being manually removed.
Antivirus Software
Antivirus software is one of the first and foremost thing that you must install after getting a new system, or after you have re-installed your operating system.
Choosing the right anti-virus software is very important; it is very much dependent how fast your computer is. An Antivirus constantly scans your system's active processes and is vigilant, so as to prevent any threats. With thousands of viruses releasing every day, here are some things to note -
Prevention is better than cure, right?
Antivirus software priority - it should be the first thing you must install after getting a computer.
Never opt for 'Trial version', either purchase a full version, or use the free version with lesser features. The problem with trial version is, that once it is expired, it will stop protecting your system and trouble you with constant security alerts, which means, your computer is at risk while you are battling with security alerts.
Always keep your antivirus software updated, most of the antivirus softwares update automatically. However for some reason if they are not able to, update manually.
So why does it needs to be updated?
Companies that make these softwares release new virus Signatures or 'patterns' every week and in some cases even daily. The antivirus on your computer must learn about those new threats, so it downloads the new patterns from the server, while ensuring that you are protected from the latest viruses.
Virus Sources
There is no prime source of viruses, they can come up from just anywhere. However, here are some things you should be aware of -
EXE Files- Exe files are executable files that windows uses to execute or start any program, application or even a software.
Exe can contain viruses, even spyware designed to track your system, Always scan a file before opening it
Websites - Never accept a link from anyone whom you don't know. There are websites on the internet specially designed to compromise your computer, they may be in a form of internet chat, a forum, a game, or even music.
USB Flash Drives- we all share data, and use USB flash drives to carry our data with us. If you use your disk on an infected system, your disk will catch that virus, and will begin infecting every computer you insert it in. Always scan a USB flash drive before opening it.
Firewall
So what is a firewall?
In simple terms, It is an application that is designed to control and analyze the network traffic coming in and out of your computer.
It is like your pet dog that only allows certain people into your house, while preventing unauthorized people or intruders, at the same time alerting you at various occasions.
So why is a firewall important?
Everything that is in your computer needs to be protected. Your personal documents, photos, financial information, even your passwords. When your computer is connected to the internet, your data is susceptible to theft. Major corporations spend millions of dollars just on firewalls. According to a recent news report, Sony's Play Station was hacked, and a lot of data was leaked. This cost the company millions of dollars.
Taking little bit of care about your computer security and escalating it, can be very beneficial.
Does Windows have an in-built firewall?
For starters, newer versions of windows like the windows 7, has an amazing inbuilt firewall, also known as the windows firewall, It allows granular control over your systems' networking, even defining rules for applications that are installed in your computer.
Windows firewall also has different profiles like 'home network' and 'public network'. This allows easy one click configuration, wherein you change the settings depending on the location you are using.
When you're connected to a public network like a library or a coffee shops' wireless network, you may want to block all incoming connections and can select the public network profile.
At home or work, where you may be sharing files over the network, you can easily switch to the home network profile.
You can access windows firewall by - clicking the Start button clicking Control Panel, clicking Security, and then clicking Windows Firewall.
Make sure that your firewall is set to 'ON'
For advanced users, you can even install a free third-party firewall like "Comodo Firewall". It is one of the most advanced, and free firewalls that I have encountered and the one I personally use. This is however not recommended for basic users, since its configuration requires a very good understanding of the windows operating systems and its architecture, and about TCP/IP.
Security tips and tricks
Be cautious with your computer Administrator passwords, never store them anywhere, always memorize them, they are the key to your system. Someone who is trying to gain remote access to your system won't get through if he cannot guess your password. Try to include a combination of special characters, numbers and letters for your password.
Download softwares only from reputed websites, these include Cnet.com, FileHippo.com, Soft32.com.
These websites never host malicious softwares, and always scan them with an antivirus before hosting them.
Always scan your USB flash drives with your antivirus before opening it.Simply Right-click your disk in My computer, and select 'Scan with' - your antivirus
Run a full system scan every month. This will help removing any viruses that have crawled in.
Never turn off your anti-virus software or your firewall. Many a times people suggest turning them off.
If possible, get a security expert to analyze your computer once a month. A security expert will check your computer in great detail and will suggest you to remove any programs that may compromise your computer.
Windows update - Always use windows update and set it to automatic. Windows updates are critical system patches that escalate your system security or patch any vulnerability that was otherwise found by Microsoft security experts. Many people don't realize the significance of Windows Update,until they are infected.
User account control - User account control is a security feature in windows that should always be 'ON', it prevents the execution of malicious code.
Web Browser - Always update to a newer version of a web browser, they are better, faster and more secure. Because everything today is web-based, security of your web browser is the most important thing.
User Accounts - Always keep the guest account disabled, and create a new administrator account for yourself. Never use the default administrator account.
These are the basic steps that you can use to secure your Windows computer.
Geek-Assist.com is a leading provider of 24/7 online computer support services. Geek Assist also provides security consultation,to help users secure their computer against hackers, viruses, malware, and firewall configuration. Geek-Assist is currently solving hundreds of issues everyday while being one of the most affordable online computer support solutions. Call 888-408-5784 (toll free) Now, to get instant help. To visit geek assist online, click Here
With hundreds of thousands of viruses and trojans just waiting to infect your computer when given the right opportunity, do you really have any reason not to have some form of Windows Web Security?
The Internet is a technological marvel that allows unprecedented levels of communication, but many unscrupulous individuals use the technology to wreak havoc among Internet users by creating viruses and other malware. Protecting yourself against these threats should be your main priority, especially if you use your computer to conduct business online.
Many people do not understand the various types of malware and how they can negatively impact your PC performance, or even expose private data that has no business in the hands of others. Better understanding how these malware programs work will provide you with insight into the protection you need for your computer.
Two of the most common types of malware that affect computers today are viruses and trojans. Viruses are the most lethal to any computer since they can attach themselves to any executable file on your computer, replicate, and essentially destroy your system before you know what has happened. Preventing this type of replication and destruction should be your main priority, which is why an anti-virus is necessary.
Trojans are aptly named since they provide a back door into your computer's network that allows the hacker that spread the trojan the ability to access any personal information on your computer. While trojans do not operate the same as a virus in that they do not destroy your computer, they are just as bad since they provide a back door to personal information. This can be devastating if you have ever used your credit card or bank account online, since the hacker can gain access to that information.
Aside from viruses and trojans that can destroy your computer and leave paths for hackers to collect your personal information, you must also worry about spyware and adware installing themselves on your computer. These are less of a threat than viruses and trojans, but they can directly affect the performance of your computer, bogging it down and eating up precious processing time, causing your computer to respond very sluggishly. To top it off, these sorts of programs usually have some sort of feature that phones home, reporting your browser history and other private details you may not want revealed.
With so many threats to computers in the wild, you can see the benefit of having a secure anti-virus and spyware solution that will protect you when you need it most. When considering a solution for protection, you need to make sure your suite will protect against viruses, trojans, spyware, and adware, otherwise you are paying for a solution that does not have you 100% covered. In addition, an anti-virus suite that auto-updates with the latest virus definitions should be your top priority, so you know you are protected from the latest threats.
Windows web security can be difficult to understand with so many different threats out there, but with the proper anti-virus software installed on each computer in your home, it is something you should not have to worry about, as long as you keep the program up to date.
For more info and free downloadable Windows Web Security software take a look at the Windows Apps website.
Thanks!
Kevin
Not everyone in this world is as computer savvy as we would like to be and many are afraid to ask about computer technology out of sheer embarrassment. Well, if you are unclear about what the deal is with Ad-Hoc mode in windows is, search no further. This article will break down for you what Ad-Hoc is, why it was created, the differences between XP/Vista ad hoc modes and how to use it.
What is Windows Ad-Hoc mode?
Ad-Hoc is the ability to connect from one computer (or mobile device) to another without having to by pass an access point. These access points are like wireless networks that you log into and that secure the network for you. Ad-Hoc technology should only be used with people that you know and that there is a certain reason why you are using it. Such as passing documents off from one computer to another. Once you are done, you should disable the feature, which is discussed later in the article.
If you need to send applications, photos, music, movies, documents, software, etc. to another person, you can do it from a direct connect from one computer to another without having to go through a service provider. This is great in times that the internet is not functioning well and you have the two computers in relatively close distances.
Why does Ad-Hoc exist?
Ad-Hoc is ideal, especially between colleagues and students, who want to share files. With Ad Hoc technology, you are able to connect directly to another computer without an intermediate party. However, if you are not very technologically adept, it is safer to have your computer working through an access point because it is more secure. Computers often can have information stolen or corrupted by using an Ad-Hoc source.
Differences between Ad-Hoc in Windows XP and Windows Vista
There is not really any difference between Ad-Hoc in these two systems. Ad-hoc is available in both systems and they are compatible with each other. For example, a computer running on Windows XP is able to be part of the ad hoc network of a user that has a computer running on Windows Vista and vice versa. It seems that Windows XP can control pop ups from ad hoc networks that are in range where as Windows Vista likes to give its user the option that an ad hoc system is around you even though you have disabled the technology. In terms of use, it is used exactly the same in the two Windows applications and has the same sending capabilities (applications, photos, music, movies, documents, software, etc). The only difference may be how to get navigate to your wireless adapter. However, after finding the wireless adapter, the options and directions to enable and disable the Ad hoc networking system in your Window's computer should be exactly the same.
Using Ad-Hoc
Configuring the Ad-Hoc system on Windows XP can be relatively simple and problem free. You can have up to nine people who are on your as- hoc network but you will be limited by distance since this wireless technology does not reach very far. First, go to the wireless adapter and click on the properties tab which will prompt you to click on the wireless networks tab. Then you click on configure my wireless network settings. Then once you see Advanced options, click on that. Here you will be able to enable the computer to computer option also known as ad hoc. To add ad hoc networks, click the close button and then Windows will ask you which sites you would like to add to your ad hoc network. Click on the network and then click on add. Then you will have the further option of enabling and disabling this feature.
To disfigure the connection, you follow the same steps but when it asks if you want to connect to an ad hoc system, simply unclick that option and you will have disabled the feature. Make sure to disable the networks that you added to your ad hoc network.
Ad hoc is an excellent option for those who need to send documents or applications quickly and in a limited range such as in an office building floor, a house or classroom. The use of Ad hoc can be hazardous to your computer if you always keep it configured, so try to disable it after using it. Ad hoc is not necessary because you can use your wireless adapter to commit the same work of sending applications and receiving them as well, yet sometimes it proves to be faster just using direct computer to computer technology.
Security is key. Only join ad hoc networks where you are a friend, colleague or family member of people you know. Therefore, none of your documents will be compromised. Many times using ad hoc is looked down upon in, especially in business because employees by pass all of the security measures. However, on the other side of the coin, those who are paranoid about the government or employer snooping through private documents, there is not much they can do in regards to the ad hoc system.
Ad hoc is not very difficult to use so you should not be deterred by it. Play around with it for a while. If it benefits your style and makes the world a bit less complicated, then go for it. If it is a pain, then dimply disconnect it and you will never have to deal with it again. At least now you know what ad hoc is, why it was created, the differences between the ad hoc system in the Windows XP and the Windows Vista versions (or lack there of) and how to enable and disable your ad hoc networking system. Piece of cake, right?
Best Rated Laptops Security Guide
Laptop security, everything you need to know to protect your property, personal data and identity.
http://www.best-rated-laptops-guide.com/laptop_security.html
Windows Security Center is a security tool included with Microsoft's Windows XP Service Pack 2, Windows Vista and Windows 7 operating systems. It allows you to monitor the status of computer security settings and services. Windows Security Center also constantly examines these security settings, and informs via a pop-up notification sign if there is something wrong. Microsoft has renamed it as Action Center in Windows 7, where it covers maintenance as well as security.
Windows 7 Security Center
Windows 7 Security center or Action Center is a single point from where you can get system maintenance information, security information and can also diagnose computer problems if any. Microsoft has reformed Security Center into a handier and informative Action Center however, you can use the same term as it's more common amongst folks. It includes the following categories:
1. Windows 7 Security Center Notifications
It alerts you when there are important messages that require proper maintenance. The notification itself is very informative and lets you know about the problem right away. Action Center settings provide options to personalize these notifications.
2. Action Center - Security
In this category, you can monitor all of the required security information, problems and the options to troubleshoot.
3. Action Center - Maintenance
In this section, you can get information related to system maintenance like system backup, Windows update etc. It also enables you to check solutions.
4. Troubleshoot Options
Troubleshooting computer issues has not been easy in Windows 7. The troubleshooting wizard identifies any technical issues and tries to resolve them. The wizard is user-friendly and gives detailed step-by-step instructions.
5. Troubleshooting Report
Producing troubleshooting report is as essential as providing a fix. Windows 7 troubleshooting report provides complete information on the task, issues' description and their status (fixed or not fixed).
Manage the following security features through Windows 7 Security Center
Windows Firewall: This is normally famous as "Network firewall" in Action Center. This tool scans network traffic passing in and out of your system.
Windows Update: In Windows 7 Security Center, Windows Update is merged with the Automatic Updates tool from previous Windows editions. This feature makes sure that essential software updates are installed automatically unless you configure the system otherwise.
Virus protection: Since Windows 7 does not have any built-in antivirus protection for some reason, Windows 7 Security Center integrates with third-party antivirus and Internet security solutions.
Spyware and unwanted software protection: It monitors Windows Defender (a built-in tool in Windows 7) and other third party antimalware products.
Internet security settings: These settings are managed through the Security tab available in Internet Explorer 8 version. There are various security settings for each of four security zones (Internet, local Intranet, trusted sites, and restricted sites). If any of these zones are configured in such a way that your computer is at risk, the Security Center will display a notification.
User Account Control: This utility is built to ensure that programs running on ae PC are always working with the less possible permission level. If required, UAC can raise the permission level to fulfill specific tasks, while preventing malicious applications from doing so on their own. Windows 7 makes UAC less annoying than in Windows Vista by reducing the number of notification messages you receive.
Network Access Protection (NAP): This feature is available in Windows 7 enterprise edition by which the network can automatically detect whether your PC meets the baseline security policy of the corporation and, if not, move you into a secure network from which you can download and install any needed updates before proceeding.
Features
Windows 7 introduces Action Center or Security Center to keep you updates of security and maintenance issues that require attention, such as antivirus protection and file backup. It informs you to issues you should pay attention by displaying a flag with an X over a red circle in the notification area of the taskbar.
Limitation
No doubt Windows 7 Security Center is a handy tool but at times it can get annoying seeing the notification icon appear every time you turn on your computer.
Recommendation
Security Center is developed to monitor specific security and maintenance features in Windows 7, but if you think it's irritating you at times, you can disable it with no hassle.
Summarize - Features
Action Center is an excellent tool of Windows 7. With the new functionalities it ensures everything in Windows is running at peak efficiency, it allows you to keep systems up and running over extended periods of time. It was almost impossible in Windows XP, even with third party programs. But even when compared to Windows Vista, Action Center represents an enhancement, given its addition of system maintenance monitoring.
Usability
Windows 7's Security Center does a great job of combining all of Windows' update, alerts and notifications into one icon.
Ryan Simon is a Microsoft Certified technician working at iYogi, which is a leading technical service provider for Windows 7. The company's Microsoft Certified Technicians are dedicated to proper computer repair. iYogi also provides services such as, complete system cleaning, Windows Updates, virus removal, hard drive optimization, Windows 7 security center information etc.
Global reach and the information highway have changed the way individuals and businesses function. Computerization, the World Wide Web, and B2B and P2P applications have added a zing to business activities. The reach has grown beyond physical confines and boundaries to embrace the world.
In the fast paced world of business what causes grave concerns in security. With the use of computers and links to cyber space corporate crime is at an all time high and
1. High level security. Most companies spend thousands of dollars in securing their business data as with the advent of the World Wide Web cyber thievery is at an all time high. Vista is designed to provide multiple layers of protection. It will protect the business from external attacks and there are ways in which crucial information and data can be protected by creating a fortress of authorized access.
2. Back ups are automated and files can be recovered easily. So, if any information is inadvertently deleted it can be recovered.
3. Since the cyber highway is where security is lax and threats exist, Vista has Windows Internet Explorer 7. This is very advanced and provides great amounts of browser security and grants privacy protection. So while your employees can browse the World Wide Web for business related purposes thieves will not gain ready access to your company systems.
4. The Windows defender program has been integrated into Vista to protect your business system from malicious soft wear.
5. Wireless networking systems are secured by Vista such that employees can connect to multiple networks simultaneously without any trouble. It has a secure wireless networking protocol and Wi-Fi Protected Access 2 (WPA2).
6. Internal threats are averted as Vista ensures that data is kept secure and confidential by encryption, assigning a high level of protection, and selective authorization of removing of storage devices like USB and flash memory drives.
Vista has been developed keeping in mind the threats being posed to computer users today. And, a new version of Windows Firewall has been developed to protect computers from inbound and outbound traffic threats. The UAC or user account control has been under continuous revamping and takes into consideration serious criticisms made throughout Vista development by techies on the Vista watch.
Paul Thurrott who has been monitoring Vista since the very start has written glowing reviews of Vista security features, the integrated anti-spyware product , Windows Defender, security improvements to IE7, parental controls, and more.
Security enhancements in Vista are more than welcome and users both business and individual are looking forward to the release of the final Vista package.
Aaron Brooks is a freelance writer for http://www.1888softwaredownloads.com, the premier website to find Free Software Downloads including free anti-virus software, free spyware detection software, free toolbars, free chat software and more. He also freelances for Free Online Games site http://www.1888freeonlinegames.com/profile-miniclip-games-10.html


If you follow the default Windows installation you may already be starting out with a significant number of applications and utilities that you will never use taking up hard drive space and possibly memory and processor resources. As you surf the Web your computer caches information in Temporary Internet Files which can take a significant amount of drive real estate if not kept in check. As you use programs data that in theory belongs together is actually written to random areas scattered about the hard drive. Over time this file fragmentation can slow your computer down and cause excessive wear and tear on your hard drive.
Joli Ballew and Jeff Duntemann do an excellent job of helping you to find the things that are slowing down and cluttering up your system. They explain in plain-English what you need to know to remove unwanted programs and optimize your Windows machine for maximum performance. Keep the book handy because you will need to go through this cleanup periodically- maybe a couple times a year.
