This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

Saturday, February 20, 2010

Facebook Hackers Phishing and Taking Over Facebook Accounts

Facebook hackers take control over the users page and send out distress calls via the "What are you doing" tab. Criminal hackers do this by sending out phish emails that request user names and passwords. Other phish have viruses containing a remote control component.



Here is what you could do to protect yourself from FaceBook Hackers

  • Limit Public Information
  • Unlist Phone Number
  • Pick Seldom Used Email Address

Thursday, October 15, 2009

Computer Networking Tutorial

1 - Introduction to Networking



2 - Networking Basics



3 - Network Topology



4 - OSI Model Physical Layer



5 - OSI Model Data Link Layer



6 - OSI Model Network and Transport Layer

OSI Reference Model

7 Layers OSI Model
Below is another video that give you more information about 7 Layers of OSI Network Model on Cisco Systems. The Understanding the OSI Reference Model by Cisco Systems was presented by Eric Jefferson who did a great job of explaining the 7 Layers OSI Model.


OSI Network Layer

7 Layers OSI Model
OSI (Open Systems Interconnection) Network Layer
Open Systems Interconnection (OSI)Model was developed and defined by the International Standards Organization (ISO). This model was created to define functional communications system in terms of abstraction layers. This reference model is widely used by equipment manufacturers to assure their products inter-operate with products from other vendors.

There are 7 layers all together for this OSI network layer which are listed below ordering from top to lower layer:
  • Layer 7 Application
  • Layer 6 Presentation
  • Layer 5 Session
  • Layer 4 Transport
  • Layer 3 Network
  • Layer 2 Data Link
  • Layer 1 Physical
Below is the video to show you in more detail about this OSI Network Model . But, If you prefer reading rather than watching, please visit http://en.wikipedia.org/wiki/OSI_model.

Understanding IPSEC - Server 2003



In this selection from Server 2003 Network Security Admin LearnSmart Video Training, best-selling network security author Tom Carpenter illustrates the foundations of the IPSEC security protocol, as well as IPSEC policies, architecture and troubleshooting.

What is Network Security?

Matt Sarrel technology expert of the Sarrel Group give brief information of what network security is.

Information Security Fundamentals

Get a sneak preview of information security concepts presented in E-Learning like threats, risks and business continuity - and gain a feel for the types of security threats you and your organization need to look out for.

Introduction to Information Security

An Information Security overview

Monday, June 15, 2009

Do You Want Someone To Know Your Secrets? Protect Yourself with a Firewall

With more and more small and home based businesses getting high speed, full time Internet connections, like Cable modem and DSL, there is an increased need for firewall software and/or hardware.

A firewall can be many things, but the main thing you need to know is that without one you are at risk of someone breaking into your computer. With people staying connected to the Internet full time with Cable modems or a DSL line, you are at a MUCH greater risk of someone accessing your computer from a remote location.

Basically a firewall limits the access to your computer from the Internet. This has nothing to do with your website. That's your webhost's responsibility to protect your site (which is another reason to make sure you have a reputable firm hosting your website). We're talking about someone accessing the computer that's sitting on your desktop right now.

I was amazed at the number of alerts I got when I first installed my firewall. Each alert meant that someone or some automated robot was trying to access my computer. Admittedly, if you are a small business just beginning e-commerce operations, you are not a prestigious target for a hacker to attack. But you might be a fun target for some 8th grader who wants to see if they can get into your computer.

Begin by immediately downloading and installing some free firewall software: You could visit http://www.firewall.com/ for many choices and more technical articles about firewalls.

I got my free firewall at http://www.zonelabs.com . It provides a good beginners level of protection. http://store.mcafee.com/ has a popular firewall for about $40.00. So does http://www.networkice.com/ that has one called Black Ice Defender.

As your business grows, you probably will want to graduate to more sophisticated software and hardware solutions. Just know that you MUST do something and you must do it NOW!

Monday, June 1, 2009

How To Protect Your Identity Online

Surfing the Internet is a daily occurrence for an increasing number of people these days, as technology expands and online services continue to grow. Many people go online to carry out banking transactions, shop, check e-mail, and catch up on news. That’s why it’s more important than ever to protect your identity while surfing the web. As identity theft becomes more prevalent, it’s necessary for everyone to be extra vigilant in protecting personal information – before it gets into the wrong hands.

Every time you go online and conduct some type of transaction, whether it is monetary or an exchange of information, you put your identity at risk. Unfortunately, criminals use the Internet too, making use of the technology to perpetrate identity theft. This type of cyber-criminal gathers personal information online and either sells it to others for profit, or uses it to his/her own purpose.

Luckily, there are many things you can do to stay one step ahead of these “bandits” and keep your identity as safe as possible. The Internet landscape is always changing, so you need to keep on top of things if you want to remain as safe as possible.

The first thing you need to do is learn how to avoid phishing scams. Phishers use fake e-mails and websites to pretend they are actual, trustworthy companies and institutions, such as banks and insurance companies. When people receive a fake e-mail or are directed to a counterfeit website, they are tricked into revealing passwords, credit card numbers, and other such information. Be warned: the criminals are good at what they do, so you must be very careful when dealing with e-mails from your bank or other organization. The key thing to remember is that real institutions never ask you to verify personal information online – be cautious and contact the sender directly, over the phone, to authenticate the request and, if necessary, provide any information they might actually require.

Because many phishers use spam e-mail as a way to obtain your personal passwords and information, install a good spam filter to keep out as much spam as possible. If you strain out most of the problem e-mails from the get-go, you won’t have to worry about dealing with too many suspicious messages on your own. Also, avoid sending any sensitive information via e-mail or instant messengers. Scam artists are notorious for intercepting e-mails and IMs. Use common sense when dealing with e-mail as well. For instance, avoid opening e-mail or IM attachments that you deem suspicious. Only open files from someone if you know the sender and what they are sending you.

And NEVER send your social security number over the Internet. No one should be requesting it, but if you are asked for it, confirm who is requesting it and send it directly to that person.

Another great way to prevent ID theft is by password protecting all your computers, laptops, and PDAs. For each item, come up with a unique user name and password. The same rule should be followed when selecting passwords for any online activity. Why? If one password is discovered by an individual with ill intentions, and all your bank accounts, credit cards, and other private logins use the same password, he/she could gain access to everything. When selecting passwords, create them with letters, numbers, special characters, and make up nonsense character strings not found in the dictionary. These will be much more difficult to decipher by a potential scammer.

Keep the amount of personal data present on your computer to a minimum. In the event that your computer is hacked or your laptop is stolen, you will be much less prone to ID theft because you won’t be giving the thief much to work with. Another good idea is to install a personal firewall program. Although systems such as Windows already contain a basic firewall program, setting up another program will ensure that your computer is hidden from hackers, stop intruders from reaching sensitive information, and let you control Internet traffic.

Purchase antivirus software and keep it updated. A high-quality virus protection package can help prevent and eliminate viruses, Trojan horses, and other dangerous items designed to steal your personal information. It will also scan e-mail and IM attachments for viruses.

In addition to antivirus software, be sure to equip your PC with the latest in anti-spyware protection. Although a great many of the spyware programs out there simply monitor your online actions for the purposes of marketing, some have been created for malicious reasons, including keystroke logging and, of course, identity theft.

One last tip: when you decide to update your computer and throw away or sell your old one, remember to remove all your data from the hard disk. Many people mistakenly believe that simply deleting files makes them disappear – but this is not the case. When you delete files they are still present on your hard drive, and have to be erased prior to handing the machine over to another person. Software known as wipe programs or shredders can be used to overwrite data with zeroes or random patterns making it completely unreadable.

It’s well worth the effort to take the precautions necessary for keeping your personal information under lock and key. Trying to clean up the mess left behind by an identity thief can take years, and will cause you a headache or two. So take charge and protect your personal information, using common sense and a few good tech tools to keep the cyber-thieves at bay.