Showing posts with label Security-Tweaks. Show all posts
Showing posts with label Security-Tweaks. Show all posts

Sunday, June 6, 2010

What Are Proxy Sites and How it is Used in the Internet?

The word “proxy sites” or “proxy server” sounds quite unfamiliar right? Do you have any idea about it? Well, you heard it but you do not have the proper knowledge about it. So here my article will help you to understand about what proxy sites or proxy servers are all about. It is basically a web page that allows users to surf internet with buffer. These are basically sites or servers. It helps to hide your IP address and provide you information. You can download a page or file very quickly with a proxy server. If you want a good speed while you are downloading any music, movies or any other files then proxy sites are the great option for you. Your system is also safe because proxy server is using another IP.

Now you can ask where to find these. It is very simple procedure. Just search on Google search engine and there you can find lots of proxy sites and servers. Proxy sites always provide the browse server so that will help you remain anonymous online while you are downloading something. Actually there are many sites where you can find some sort of internet limitations. Some websites are banned by them or forbid some types of contents and proxy sites or servers are the best way to bypass all these problems. So a proxy site gives you the comforts, securities and guaranteed privacy. You can just type the web address where you want to go in the proxy bar and it will take you there from its own IP address. It is really a great opportunity to take the benefits of a web proxy.

But there are some problems with anonymous proxies. There are many proxy servers which are slow. If you use Google for searching of proxy then you can have a huge list of proxy servers but most of these are slow and does not effectively. An elite proxy can give you the better result. Elite proxies are different than other free of costs proxies because they are paid items and you have own product right on it. No one else but you can use your own proxy server. Here you can change your IP or hide it and no one can understand anything about it. So it is better to go for the elite proxies rather than going for the anonymous proxy sites.

Free proxy is not good because it makes the way easier for hackers. So you should be more careful when you are putting your identity and other information in a free proxy servers.

So if you are sure that you would use proxy then go for the elite proxy and take the full benefits of it.

I wish you good luck and hope this article has given you some basic knowledge of Proxy, Proxy Sites and Proxy Servers

Thursday, January 4, 2007

Ten steps to a more secure computer

1.Use antivirus software and keep it updated daily- UCI has several software purchase programs for discounted pricing
2.Apply software updates regularly and consistently
3.Use a desktop firewall whenever possible- check with your local desktop support team first
4.Use strong passwords with a minimum of 6 characters- uppercase, lowercase letters, symbols and numbers
5.Change all of your passwords regularly
6.Make routine backups of your critical files
7.Do not open emails that you don't recognize the author or that look suspicious to you- you can call your local support team for more information
8.Don't post passwords or usernames in plain sight- post it notes on your monitor with passwords and usernames break most security processes
9.Turn off your computer at night and on weekends- check with your local desktop support team first if this will break nightly updates or backup procedures
10.Don't leave old computers online- disconnect them or turn them off


Apply software updates regularly and consistently
We recommend that you use an automated software update service for your software. NACS and AdCom each have support services for updating desktops and servers with the latest hot fixes. Please contact the Help Desks for more information on these services.

Use a desktop firewall whenever possible- check with your local desktop support team first
Using a firewall on your local desktop will normally help you mitigate network attacks that exploit security flaws in your operating system. The decision to use a firewall is going to be determined by the way your local support team operates. If you have a formal support team then they will et you know if you need a firewall, but if you are self supported then you will definitely want to consider using the host based firewalls that work on Linux, UNIX and Windows XP.

Use strong passwords with a minimum of 6 characters- uppercase, lowercase letters, symbols and numbers
A three digit password of lower case letters can be cracked in seconds. A complex password usually will take days or weeks to break. Using a number or symbol in the middle of your password is a simple way to make your password more secure.

Change all of your passwords regularly
If your password changes regularly you will make it harder for someone to use your password without your knowledge. If you change a password and you notice a few days later that your account is locked out then you might have someone trying that old password.

Make routine backups of your critical files
If you don't use a server to store your critical files and you don't have a desktop backup service such as Backup Exec, NetBackup or Legato then you should consider using a CD-Recordable drive to copy files to a secure location. A disk failure usually will happen quickly and you may not have time to copy files at that point

Do not open emails that you don't recognize the author or that look suspicious to you
New viruses usually try to get your attention with Subject lines that look unique. If the email doesn't look legitimate then don't open it. You can look up the latest email and virus issues at the NACS Security site in the Symantec Security Alerts window. The easiest way to stay secure is to use the campus mail servers to get your email, or make sure your local mail server uses Antivirus software on them.

Don't post passwords or usernames in plain sight
One of the most common methods of hacking is internal exploitation of resources. If you have a truly complex password, writing it down defeats the purpose. Use a naming scheme or question to help you remember the password. You can usually remember those passwords easily and keep your security standards high.

Turn off your computer at night and on weekends
A computer that is always on is easily probed for security problems. Turning off a computer on weekends saves power and can prevent unnoticed network abuse. If your local support team uses weekends or weeknights for software updates then you may want to keep the system online, but if that isn't the case then save energy and shut the system down.

Don't leave old computers online- disconnect them or turn them off

Saturday, December 30, 2006

Security Tips and Tricks

I wanted to give a brief, yet hopefully informative, little guide on internet security and how to protect yourself online. There are four major areas that I'm going to cover:

  1. Updating Windows

  2. Firewalls

  3. Antivirus Software

  4. Email

Updating Windows is the first suggestion that I would have for you. When you installed your brand new Windows operating system they didn't have all the bugs worked out of it and they issue updates for your operating system. These updates will fix many of the security holes that were found in the original operating system. So, how do you go about updating your Windows? Go to http://windowsupdate.microsoft.com/

Next suggestion is a firewall, with the ever increasing number of people with a broadband connection and 24/7 connectivity it becomes even more important that you put a firewall on you computer. Your computer has a series of ports that are either opened or closed to receive and send information onto the net. If someone attacks these ports with D.O.S. (Denial of Service) attack they can shut your connection to the net off, but that's not that bad, but they can also look at these open ports and find openings in your computer. This is serious because they can gather information on you, can look into you hard drive, and do all sorts of malicious activities. Go to the Firewall section of the website to download one of the free software programs there. They will make your computer even more safe then it was with the security updates you just completed.

The third and final suggestion is Antivirus software. Viruses can range in severity from something simple and annoying to viruses that will wipe your hard drive clean. So you need to get an Antivirus software program. AVG is a free virus scanner that works excellently at protecting your computer. Read more about the antivirus software at the Antivirus section of this website. Antivirus software will also help prevent Trojans from getting on you computer. Trojans allows a user to have remote access to your computer, yes, just like the trojan horse it sits on your computer waiting for the person that put it there to use it...so antivirus software will work wonders on your computer. Make sure you keep the virus definitions up to date! Also avoid downloading email attachments, downloading files from an untrustworthy site, and make sure you frequently scan you hard drive.

Email - No reputable place will ask for you to fill in your credit card information in an email, delete it or sending it to your ISP to point out this danger. If you get an email from EBAY or AOL or any other big company and there is this link in the email asking you to update your credit card info, don't do it, it's a scam, don't do it, they just make a webpage that looks like Ebay or AOL. This is a quick way to get your credit information stolen...so basically use some commonsense when you're reading your emails.

These four basic steps will secure your computer and make your time on the internet a pleasurable one and not a headache. Happy Safe Surfing!