Elementary precautions
Cyber cafes are very popular in our counry. The revolutions in technology ensures that everyones has a use for internet. People mainly use cyber cafes for browsing internet,checking thier mails and chatting.
The first thing you should make sure is that you never tell the owner of the cyber cafe your email id and password to check your mail.Email ids and passwords should always be entered only by thier owners.At most they can ask for guidance to the log-in screen to enter details personally.
Another important rule is the practice of people coming with thier floppies,CDs or pen drives to send their resumes via email. Usually individual computers have neither floppy nor CD drives. The media is hence run through the server itself before being transferred to the relevant individual's PC. After sending these documents the user forgets about deleting the documents on the original server. More than simply emptying the recycle bin, you should ensure the cyber cafe has a file shredder program to properly delete these files. Resumes contain many personal details ,you should avoid all risk of these being exposed.
Other options you should be aware of when surfing include disabling the option for "remember my ID on this computer" when surfing. Make sure to turn of the autocomplete option in the browser.This can be done by accessing Tools>Internet Options>Autocomplete tab in the Internet explorer and tools > options > privacy > password tab in firefox. There are also options for clearing your private history / temporary internet files which surfing in case you dont want your browsing history known.
Always make sure that you logout properly when you are using messenger software or mail accounts. Some people make mistakes with IM software by simply closing the program,which does not shut it down but minimizes it into the system tray. This should be taken care of to ensure that the next user does'nt use your IM account as he wishes. You should also take care to disable options that allow archiving of messages as text files. This helps in keeping conversations private and personal info usually shared online safe.
Finally whenever you go to a cyber cafe, ensure it has the most upto date anti-virus and spyware definitions. These will help root out Trojan horses and keyloggers responsible for tracking your activity and recoring your password/IDs.
Keyblogger is basically a spyware. As indicated by its namesake, it logs or recors your keystrokes. When you type in your username or password, this information is logged and amde available to the hacker. Keyloggers can either be physical or software-based, the latter being more difficult to detect.
A keylogger works in several different ways
- Each keystroke is recorded and immediately dispatched to some remote listener over the internet.
- Keystroke are collected ina temporary file, which is then periodically uploaded to the author's location over the internet.
- The keystrokes are collected in a temporary file, but much like a spam bot, can listen for and recieve instructions from the author. The logger could thus upload the collected information when requested.
- The collected keystrokes could never be uploaded. Instead, if someone has remote access to your machine, or even physical access to your machine, they could simply come by and copy the information manually.
- Finally, the information may not even be kept on your machine. There are keyloggers that include a little flash memory and can be quickly inserted in between installing, the person behind it stops by and picks up the device containing all your information.
There are two methods for bypassing keyloggers, both which involve confusing the logger with random keystrokes. The first, when you need to enter a username or password, is to randomly insert irrelevant numbers and letters in between the same. Once entered, just select the random hits wih the mouse and delete them before logging in. The second is for fooling keyloggers that capture all keystrokes and not just those typed in the password box. Enter your info randomly across the browser and search bars along with random numbers and letters. When you wish to log in, simply copy and paste the relevant bits into the log-in boxes.
You can use KYPS, a reverse proxy server that takes a password, encrypts into a one-time code, printed from the KPYS web site that can be used to log into any computer safely. After being decrypted by the KYPS system and logged in, it deletes the one time code as a password. KYPS also acts as a normal proxy to protect your browsing history. When browsing, it displays the KYPS URL along with random characters and symbols to maximise security.
The " work offline" option shouldn't be relied on too often. This feature is specific to Internet Explorer or the application with that function, and its not too hard for a keylogger to bypass something so narrow. Also, even if you physically pulled out the internet connection wire from your PC, only the first of the above approaches is rendered harmless. The keylogger can still quietly collect the data and transmit it when a connection is available.
As such, there is no way to be 100% carefull against keyloggers. It depends on specific keyloggers most of the time. However, you should always remain careful and cautious when entering a cyber cafe.
Computer is a fast speeding work system. Many uses from this computer, perfect work, it is better than that manual work. Man can do heavy work. Ten men work and eight hours works, that system do it easy in an hour. This is capacity of computer system. So, computer system is very essential. This operating and courses are most important to the all students. Not only it’s need to students but also useful to learn to the old employs.
Computers have brought about a revolution in human life. Computers performed certain mechanical functions. But gradually computers took over different human activities. Now even thinking and problem- solving are being done by computers. They reduced manpowered in administration, business and industry. Speed and accuracy are other advantages. The growing use computer in teaching might one day render teachers, classroom and libraries. Computers are likely to replace human beings in every walk of life.
But every coin has two sides. However, computer can’t replace human beings. Human life is not mechanical affair. They fall in love with each other at first sight. Simple touches of the mother silence a crying baby. Can a computer perform these? Nowadays, teaching is being done by computers. Computers also administer tests, declare results award certificates.
But imagine the difference between the two situations, i.e, sitting before computer and sitting in a classroom with dozens of students around and in the presence of a teacher. The pleasures and pains of companionship, encouraging expressions as he teacher’s face, the direct interaction, eye contact, spontaneous smiles etc., set this living situation. Can a computer give all these?
Thus, despite the many advantages of a computer, wisdom lies in the judiciously using it’s as a tool.
Indian people need less rate computers. That means ordinary people can buy it in cheap cost.
There are lots of Anti virus software available in market today, and all claims to be very much effective and providing 100% protection. Before you choose any Anti virus solution first find out the system requirement. Then you can decide which brand provides all those features. These are some key features of the leading anti virus software available in market.
McAfee VirusScan 13.3
McAfee VirusScan provides powerful integrated technologies to combat and defeat the most sophisticated attacks. McAfee's trusted PC protection blocks removes threats automatically, and identifies spyware and adware before they can run on the system.
McAfee VirusScan Plus AntiVirus, Firewall & AntiSpyware provides the essential protection you need to surf the Web safely. And the McAfee SecurityCenter gives you at-a-glance control over all the McAfee applications.
McAfee VirusScan automatically blocks, cleans, and removes viruses. It blocks spyware before it installs on your computer and removes existing spyware. Also protects and conceals your computer from hackers so that you can surf the Internet safely. Provides advance warning to help you avoid sites which send spam, install adware, or attempt online scams.
Daily updates are installed automatically. When a new version of McAfee is available, you get it automatically at no charge during your subscription. You get 24/7 virus and threat protection from McAfee AVERT Labs, which continuously monitors worldwide virus activities and provides immediate, anti-virus protection and removal solutions.
Kaspersky Internet Security 2010
Kaspersky Internet Security application provides an all-in-one security solution for safe and secure Internet experience. It protects from viruses, Trojans, worms, spyware and adware. It scans files in real time and on demand, also assigns security rating to unknown applications.
Kaspersky Internet Security scans operating system and other installed applications to find malicious software. It detects viruses based on the packers used to compress code. This program restricts access to the user’s resources and data by unknown applications.
Kaspersky Internet Security provides lots of features to protect the internet users. It scans all email messages before you open, protects from the dangers arising instant messengers. It analyzes and closes Internet Explorer vulnerabilities, disables links to fake websites and malware sites. It prevents the theft of data exchanged via secure connections (HTTPS / SSL). This application blocks unauthorized dial-up connections and Cleans up any traces of user activity by deleting temporary files, cookies etc. Also Blocks banners on web pages.
Avast! Home Edition 4.8
Avast! Home Edition provides effective protection against computer viruses, worms, Trojans, adware, spyware and rootkits. It obtained VB100% awards in 2002/3 Virus Bulletin comparative reviews. It’s very much easy to use, just select what you want to scan in which way and press the Play button.
Avast! Home Edition scans all opened files as well as files being read and written, also monitors dangerous actions of viruses. It can be easily integrated with most mail clients and checks both incoming and outgoing mails, it provides heuristic analysis of mail content to protect against new Worms.
It isolates infected and suspicious files to a separate folder. You can download and install updates by simple clicking on the iAVS icon; it can be checked and done automatically when you are On-line.
Kaspersky Virus Removal Tool 7.0
Kaspersky Virus Removal Tool 7.0.0.290 is a freeware that completely removes all types of infections from your computer. It uses effective algorithms of detection and AVZ Antiviral Toolkit.
Kaspersky Virus Removal Tool is not capable for real-time protection of your computer. So, as soon as your computer is cleaned, remove the tool and install a full version of antivirus software.
Kaspersky Virus Removal Tool can be installed to an infected machine in the safe mode. It uses signature detection and heuristic analyzer combined for Integral search and removal of malicious software. Its easy-to-use interface and step by step guidance helps the user.
A firewall is a part of a computer system used to prevent any unauthorized access and allows safe communications. It can be implemented by hardware or software, or combination of both.Each firewall has different kind of authorisation criteria.
The firewall techniques consists of four main types namely
1. Packet filter
2. Application gateway
3.Stateful firewall
4. Proxy server
Packet filter
The data transfer between computers and networks takes place by a basic unit called packets. Packet filter uses a set of user defined rules for identifying the source address, destination address and port number.If a packet matches the rules, the filter either discards it or rejects it. Packet filters are not tough to configure. They are also susceptible to IP spoofing.
Application gateway
They are located between end user and network. The end user contacts the gateway ,after which it performs the required function for the user.Specific programs use specific mechanisms. This type is simple,since it only functions to proxy requests from end users. It also intercepts IP packets from the net.
Stateful firewall
It is used to keep track of the network connections moving across it. It distinguishes legitimate packets for different connections and only allows packets matching a specific connection state. All others will be rejected.This type of firewall is advantageous as opposed to packet filters since it need only check the connection against its table rather than an extensive rule set.
Proxy server
Proxy server is one of the most favourable types, they act as go-betweens for outside clients seeking information from servers.The request is filed and checked according to various filtering rules hence filtering traffic from certain IP addresses. The direct access to the server is subsequently handled by the proxy on the behalf of the clientThe servers are hence kept safe and anontmous from any attack.
More Articles …
Page 21 of 24