Wednesday, October 31, 2007

Firewall

Personal Firewall Choices


What is a firewall ?
A system designed to prevent unauthorized access to a private network or a system. Firewalls can be implemented in both software and hardware, or a combination of both.
lets see various firewalls :

Microsoft Windows Firewall -- The Vista and XP Service Pack 2 operating systems have personal firewalls built in that are turned on by default to block threats from the Internet. You should leave this feature turned on until you replace it with third-party software and/or hardware.

Two-Way Third-Party Personal Firewall Software -- These firewalls block both incoming and outgoing threats. A computer has outgoing threats when it becomes infected with a virus , trojan or spyware . Two common ways to address this are by vendors including a list of safe software for the firewall to check and/or by issuing a pop up alert to the user asking for advice on what to do.

Recommended products :

  • Zone ALarm Pro from CheckPoint [retail & free versions]
  • Sunbelt /Kerio [freeware & retail versions]
  • Comodo [freeware]

Internet Security Software Suites -- These products include two or more security features such as a personal firewall, anti-virus, anti-spyware and more. Recommended retail products with links to vendors:

  • Norton Internet Security 2007 or Norton 360 from Symantec include personal firewall and protection from viruses, worms, spyware, intrusion, phishing and root kits. Also includes behavioral monitoring features. The free online add-on pack includes anti-spam, parental control, confidential information blocking, and ad blocking. "Norton 360" adds automatic backup and restore with 2 GB of online storage, PC tune up and embedded support components.
  • Zone Alarm internet security suite from CheckPoint features include network, program and operating systems firewalls, antivirus, identity theft protection, anti-spyware, spy site blocking, auto-learn, privacy protection, IM protection, game mode, essential email security, wireless PC protection, parental control, and smart defense service.

Hardware Firewalls -- A hardware firewall is usually a small box that sits between a modem and a computer or network. The firewall is either based on "network address translation" (NAT) which hides your computer from the Internet or NAT plus "stateful packet inspection" (SPI) for more protection. There are three basic types of hardware devices that include firewalls for home users, routers and broadband gateways . They can be used in addition to a software firewall on each computer because they run on a separate box preventing most compatibility problems. Recommended broadband gateway retail product with link to vendor:

  • Zone Alarm Secure Wireless Router from CheckPoint with SPI firewall, gateway antivirus and additional features.

Important Tip -- Never use two personal firewall software products at the same time. Fully uninstall one before installing another to prevent compatibility problems.

http://hydtechie.blogspot.com/

Hyderabad Software Job Openings

Wanna get informed about the latest news about openings for freshers and experienced people in HYDERABAD .

Join our community in ORKUT :


CLICK HERE TO JOIN THE JOB COMMUNITY IN ORKUT


And get updated about openings from various companies like


  1. Cognizant
  2. Infosys
  3. Microsoft
  4. Oracle
  5. Wipro
  6. TCS
  7. Satyam
  8. Dell
  9. HSBC
  10. ADP
List of all MNC's that has presence in HYDERABAD is listed in this community.


More over u can get tips for freshers and experienced people to face interviews , previous placements papers , resume writing tips , etc


Do leave your comments
http://hydtechie.blogspot.com/

Beta Version

A "beta" is a pre-release version of a product that is available for public testing before the final version of the product is released. Through public testing, they can evaluate how the product performs in "real world" environments and collect valuable feedback from you.


Your valued opinions will make the products the best they can be and help them exceed the customers’ expectations.
So no harm in trying out BETA softwares .......... go ahead


http://hydtechie.blogspot.com/

JavaScript

Whats is JAVASCRIPT ?

Brief overview of JAVASCRIPT is given below .

It is a scripting language.

  • It is designed to make HTML pages interactive.
  • It consists of lines of executable code.
  • It is usually embedded directly into HTML pages.
  • It is an interpreted language.
  • It executes without preliminary compilation.

Feel free to add more stuff about it in the comments

http://hydtechie.blogspot.com/

Monday, October 29, 2007

10 Ways to Defend Against IM Threats

Consumers can protect themselves from viruses, worms, and Trojans delivered through IM. By following some basic rules, it’s easy to keep these threats from slowing you down.

  • Choose your screen name carefully. Don't use your real name, email address, or other personally identifiable information.
  • Only share your screen name with people you trust, and ask them to keep it private. Only communicate with people on your contact or buddy list. To prevent “spim” (IM spam), use settings to block messages from people you don’t know.
  • Don’t display your screen name or email address in public places such as Internet directories or personal profiles. Some IM services link your screen name to your email address when you register. Consider setting up a secondary email account if this is the case, since your address could be harvested for phishing attacks.
  • Never provide private information like account numbers or passwords in an IM conversation. Network sniffers can intercept unencrypted IM traffic. Anti-virus software and a firewall will protect you from Trojans and viruses, but cannot protect your information once it leaves your PC.
  • Fortify your computer with strong security software and keep it up to date. The security suite guarantees trusted PC protection from viruses, hackers and spyware. Its cutting-edge features include X-Ray for Windows®, which detects and kills rootkits and other malicious applications that hide from anti-virus programs. Its integrated anti-virus, anti-spyware, firewall, anti-spam, anti-phishing, and backup technologies work together to combat today’s sophisticated, multi-pronged attacks.
  • Configure your IM application correctly. Make sure it does not open automatically when you fire up your computer. Turn off your computer and disconnect the DSL or modem line when you’re not using it.
  • Enable automatic Windows updates, or download Microsoft® updates regularly, to keep your operating system patched against known vulnerabilities. Install patches from other software manufacturers as soon as they are distributed. A fully patched computer behind a firewall is the best defense against Trojan and spyware installation.
  • Configure your anti-virus software to automatically scan all email and IM attachments and downloaded files. Never open attachments from people you don’t know. If you know the sender, contact them to confirm the file is trustworthy. Beware of spam-based phishing schemes—don’t click on links in emails or instant messages.
  • Be careful when using P2P file sharing with IM. Trojans sit within file sharing programs waiting to be downloaded. Avoid files with the extensions .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd. Configure your file settings to limit the folders that other users can access.
  • Monitor and limit your children's use of IM. Put the computer in a high traffic family area and limit nighttime use. Parental controls in the firewalls or any security suites help parents control the information that their children receive and send.

http://hydengg.blogspot.com/

LINUX

The Linux kernel, pronounced 'linnuks' is the heart of the Ubuntu and many more other operating system. A kernel is an important part of any operating system, providing the communication bridge between hardware and software.


Linux was brought to life in 1991 by a Finnish student named Linus Torvalds. At the time, it would run only on i386 systems, and was essentially an independently created clone of the UNIX kernel, intended to take advantage of the then-new i386 architecture.

The Linux kernel has gained an ideological importance as well as a technical one. There is an entire community of people who believe in the ideals of free software and spend their time helping to make open source technology as good as it can be.People in this community gave rise to initiatives such as Ubuntu, standards committees that shape the development of the Internet, organizations like the Mozilla Foundation, responsible for creating Mozilla Firefox, and countless other software projects from which you've certainly benefited in the past.The spirit of open source, commonly attributed to Linux, is influencing software developers and users everywhere to drive communities with common goals.

Click here to read more about latest technologies

Also u can read about HYDERABAD at http://hydengg.blogspot.com/