Intro
Internet, a virtual world online, is built actually on trust. When we are communicating or getting & sending information with other people online, we don’t actually see the people. But we trust that they are who they say they are. But trust is not enough when it comes to financial transaction or other important communication. But there are crackers and hackers, scammers & con artists in an around us. They are very much active to steal credit card number or our personal & financial information or business secrets information. On the other hand business needs to know that the person sending a data, that is really is who he says he is or an imposter who has managed to steal a data from some one.
Here DIGITAL CERTIFICATE comes to the picture. It is an attachment to an electronic message used to verify that the person sending information, accredit card number or anything over the internet really is who he claims to be. The certificates place on a person’s hard disk and using an encryption technology, create a unique digital certificate for each person. When some one sends email or goes to a site with a digital certificate, that certificate presented to the site or attached to the email and it validate that the user is who he claims to be.
Due to the use of powerful encryption technology this certificates are quite safe & secure. Probably it is much more safe & secure than the real life signature. In real life signature can be forged but in Internet digital certificate can’t be forges.
Certificate Authorities (CA)
Certificate authorities are an independent, recognized and mutually trusted third party who issued Digital Certificate and guaranteed that the person or site is who it claims to be.
The Digital Certificates contains:
Name of entity
Address of entity,
The certificate’s serial number,
Public Key,
Expiration Date, and
Digital Signature,
The information has been encrypted in such a way that it makes unique for each person. The most widely used standard for Digital Certificate is X.509 and most well known certificate authorities are VeriSign (www.verisign.com) and Thawte (www.thawte.com).
How to Creating the Certificate
Step 1: The certificate authorities verify that the public key belongs to a specific company or individual and the through details validation process it is determines that the company or individual is who it claims. It depends on the CA and on the level of certification.
Step 2: After completion of details validation CA creates an X.509 certificate that contains CA and subject information including the public key. The CA signs the certificate by creating a hash value and encrypting the hash value with its private key. The encrypted hash value is called a "digital signature," and when placed into the X.509 certificate, the certificate is said to be "signed." Private Key is very important & CA keeps it very secure because if it is discovered, false certificate would be created.
Public key or Cryptography
Every packet of data sent over the Internet through many public networks, that means access to these packets is not private. So when highly confidential information such as corporate data or credit card numbers, which is transmitted across the Internet, are not save. So the Internet will never be a secure place to do business or send private data, unless there is some way to protect that kind of information.
To protect the confidential information software developers develop encryption & decryption that is information is altered in such a way that to any one other than the intended recipient it will look like meaningless garbage. Again the information is also turned back into the original message by the recipient and only by the recipient. Many complex cryptosystems have been created to allow for this kind of encryption & decryption.
The hearts of cryptosystems are the keys. Keys are secret values that computers use in concert with complex mathematical formulas called algorithms to encrypt and decrypt messages. The concept behind the keys is that if some one encrypts a message with a key, only some one with matching key will be able to decrypt the message.
There are two common encryption systems: secret-key-cryptography, i.e symmetric cryptography, and public-key-cryptography, i.e. asymmetric cryptography. The most common secret-key cryptography system is the Data Encryption Standard (DES).
How to verify the Certificate
Signed certificate is verified by the recipient’s software, which is mainly the recipient’s web browser. The list of CA’a and their public keys is maintained by the web browser. Web browser uses this appropriate public key decrypt the signature back into the digest. It recomputed own digest from the plain text in the certificate & compares the two. Certificate is verified if both the digest match & the public key in the certificate are assumed to be the valid public key.
VeriSign introduced the some new concept of classes of digital certificate
Class 1 - For Individual
Class 2 - For company or organizations-Identity proof required
Class 3 - For servers & software signing
Class 4 - For online business transactions between two companies
Class 5 - For private or governmental security
Digital ID is valid for one year & after that every software has to be resigned. To avoid this companies have introduced time stamping services. Once the software has been time stamped it is not required to resigning the software after Digital ID expires.
Below is picture if a user receives an unsigned component distributed via the Internet?
The following will occur
- If security settings are set on "High," the client application will not permit the unsigned code to load.
- If security settings are set on "Medium," the client application will display a warning like this screen:
Below is the picture if a user receives a signed component distributed via the Internet?
Virus as you all aware about it .The following is some great information I have collected for all you people through which you are never ever get your computer harm from a antivirus:
As I have done a research from many years on the processing of virus in the computer i came to know that there is no solution to it until you are having a excellent anti virus. The following are the details:
As you now all the virus scanner comes with a trial version through which you came to now about how the anti virus work.
The following are all the protected anti virus and suggestion as my point of view :
1.AVG 9-free for all time ( give it marks 3-5)
2.Mcafee 2010-30 days trial( give it marks 3-5)
3.Avast 8 pro-30 days trial( give it marks 2.5-5)
4.Bitdefender 2010-30 days trial( give it marks 5-5)(But need a good ram and space for proper functioning)
5.Norton 2010-30 days trial( give it marks 5-5)(is my point the best one suitable for all type of computer)
6.Kaspersky 2010 ( give it marks 4.8-5)
7.Webroot AntiVirus with SpySweeper 2010 ( give it marks 4.6-5)
8.ESET Nod32 ( give it marks 4-5)
9.F-Secure Anti-Virus( give it marks 3-5)
10.G DATA AntiVirus( give it marks 3-5)
11.Avira AntiVir( give it marks 3-5)
12.Trend Micro( give it marks 3-5)
I thibk above information might helpful in getting a good antivirus and get ride of virus.
Nowadays, hacking has increased so much, that even people who don’t know much about computers have started hacking, in some or the other way. People have started hacking email address and social networking ids and passwords too. Internet Service Provider’s (ISP) are also been fooled by their own user’s.
At my neighborhood, sify is one of the leading service provider’s. It provides broadband internet connection where different computers are connected with help of router’s placed at each area.
This ISP provides an ID and Password, which would give access to the user’s account, they also provide a unique IP address (Internet Protocol), which connects the user to the internet. They also keep a track of your MAC (media access control) address, which makes sure that the appropriate computer is trying to access the internet. Suppose, if you try to use your ip address in a different machine, it will pop-up an error saying that ‘the machine id is incorrect’.
Now, here’s what people at my neighborhood do, they first download software called Ethereal from the internet. Ethereal is a software that searches your network and throws the ip addresses that are been used at that particular time, thus you get to see all the ip addresses that are been used. Since those ip addresses are connected, with their actual login ID and password, we can gain access to the internet by just using their IP.
But these ISP’s can’t be fooled that easily, they come to know if someone is trying to use other people’s IP address. And if they catch you, then you will be fined a hell lot of money. I’ll tell you how they get to know whether we are using a different IP address. Remember Mac address that I had mentioned earlier, yes, that is what tells the ISP whether who is using the IP address.
Thus to avoid such situation they use a software called TMac, which changes the mac address of your internet. Now once you change your computer’s Mac address, you can use different ip address as much time as you wish and the isp won’t even come to know about this.
In case you run a business that is very much dependent on all the documents and paperwork, it certainly is very much important that you may have to protect all your documents against theft and also fire. To protect your documents against fire you certainly have to turn towards professionals like fireproof-file-cabinets who may always provide you with wide variety of solutions how to protect your documents against fire. You certainly may be considering of buying a fire proof cabinet for your important files so it is always safe even at times of large blaze. You certainly may have to go through a number of reviews on various cabinets as the cost certainly can vary depending one the security it may offer like time and temperature a particular filing cabinet can resist.
You can always browse the website for going through various reviews of different types of fire proof file cabinets which certainly are considered as best in the present market. So in order to get all your best reviews you certainly may have to continue reading different pages on the website. You certainly may get a lot of information based on some of the most professional and stackable filing cabinets that are fire resistant. You certainly can also read about various views by some professionals like why most of these cabinets are so safe. You can also gather information on different brands and companies that manufacture some of the best fire proof cabinets along with their price range.
You can also read a lot about expandable fire proof cabinets that can always be expanded as and when your needs grow. You can also read about some of the best fire proof file cabinets that may offer you protection for at least two to three hours at temperatures as high as 1700 degrees. You may always have to pay different amounts to get these cabinets as a lot may depend on the amount of protection they offer to your documents.
Today banking has become so easy with netbanking facility,but unfortunately many people are worried on how to use it safely.They fear of hacking and online theft.This article will tell you how to get netbanking facility and how to use it safely.These are the tips you must basically know inorder to step into the world of online banking.
HOW TO GET A NET BANKING FACILITY
1.Go to the banks website(search) and download the netbanking form or contact your nearest branch and get the form.
2.Fill the simple form and submit it in the bank and after registration you will be given a paper which has confidential information..keep it safe and start using the facility only after you follow the security tips
SECURITY TIPS
*IN YOUR SYSTEM YOU MUST HAVE THE FOLLOWING
1. ANTIVIRUS
1.1 If you can buy one KASPERSKY IS THE BEST..Other top antivirus are NOD32,McAfee,NOTRON,VIPRE
1.2.Free are AVG,AVAST,AVIRA
Any of the above is quite enough..though most of the people I know prefer kaspersky..basic security are provided by everything..dont be confused on that..if you are using an antivirus update it..that would be enough.
2.FIREWALL
A firewall is basically a watchman which will monitor the internet traffic.So if any one try to access your system,it will block.It will also block any attempt by any progrom to change registry. Some free firewall are COMODO,OUTPOST,ZONEALARM IF u can buy many good and strong ones are available.
3.ANTISPYWARE
There can be some spyware or malware in your system which will help others to access your system as well spy on you inorder to steal your personal information like passwords.This easily enters your system if you have an habit of clicking links in unknown websites.So inorder to clean it use a good antispyware
Eg-SUPER ANTISPYWARE,SPYBOT SEARCH AND DESTROY,AD AWARE,MALAWAREBYTES
4.LINK SCANNER FROM McAfee SITEADVISOR
Go to siteadvisor.com and download the setup and run it..A plugin will appear in the browser (only in IE and firefox) and whenever you enter any site a GREEN color logo will appear if the site is safe to visit.The important use of this in netbanking is that it will identify phishing website-(a fake webpage similar to original one made inorder to get your personal information).you can even check a website safety by going to that siteadvisor.com and entering the web address or url.Also whenever you search in google all the links that appear as search result will be marked.
5.LATEST BROWSER
The newer the browser the more security features.Also i prefer browsers like firefox,opera or chrome for netbanking.
NB**
**Though all the above features will be available in a single INTERNET SECURITY PROGRAM Like KASPERSKY INTERNET SECURUTY 2010,Its better you keep the best of each one..Its just like buying an assembled pc where you buy the best parts of good companies.If you buy all in one, often some of the features will be completely useless..for ex-there is a link scanner in AVG which is fully useless..but AVG is a good antivirus.
**You can download all this softwares from the site like http://www.filehippo.com which is 100% safe
*YOU MUST TAKE CARE OF THE FOLLOWING (TIPS)
1.Do net banking from your personal system or the system you know well.Never do it from a cafe or computers you don't know.
2.Keep all the above said security software in working mode..It must be runnig in the background so that it monitors your internet traffic.
3.To get your banking website,always type the correct webaddress by yourself and dont click on any link to get into that site.
4.Once your are in the site check for "https" instead of normal "http" in the address bar of the browser.
5.In the site use the on screen keyboard to type the password and not your original keyboard
6.Update your seurity programs and do periodic scan.
Once you follow these instructions use the ID and password in the paper from bank and change both during the first visit itself...more details and instructions will be provided by the bank itself in that paper.
If you follow these simple instrutions,you can safely do online banking tension free. just be cautious..
ENJOY ONLINE BANKING SAFELY
More Articles …
Page 15 of 24