access

Fri
08
Sep
Dennis Faas's picture

Free WiFi for Residents and Businesses in Silicon Valley

Announced earlier this week, a group of technology companies are planning to provide a vast wireless network that will give the entire Silicon Valley free high-speed Internet access. The free WiFi service will be available as early as next year and ... will be provided by Silicon Valley Metro Connect: a group that is comprised of IBM, Cisco, SeaKay, and Azulstar. (Source: abcnews.com ) Silicon Valley Metro Connect will provide the service for 38 cities in California's San Mateo, Santa Clara, Alameda, and Santa Cruz counties -- an area covering roughly 1,500 square miles. This move takes advantage ... (view more)

Thu
27
Jul
Dennis Faas's picture

Firewalls: Hardware and Software Solutions, Part 2

[Continued from Firewalls: Hardware and Software Solutions , Part 1] On the software only side of things, there are quite a few possibilities available for a software firewall. These all install directly on your PC and use the internal resources ... like any other program run on your system (such as memory, disk space, CPU cycles, and so on). Software firewalls do a good job of preventing both inbound and outbound traffic and are easy to install and configure. First up is Zone Labs Zone Alarm. The download is free as is the firewall product itself. They will try to get you to buy the Pro version ... (view more)

Wed
19
Jul
Dennis Faas's picture

Firewalls: Definition

A firewall is a barrier to keep destructive forces away from your computer. In fact, that's why it's called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. Firewalls use one or more ... of three methods to control traffic flowing in and out of the network: Packet filtering: Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded. Proxy service: Information from the Internet is retrieved through the firewall and then ... (view more)

Thu
30
Mar
Dennis Faas's picture

CosmoPOD: Your Free Remote Linux Desktop

A short time ago, I found a cool web service called CosmoPOD that allows you to run a remote Linux PC from your desktop without having to actually install a Linux operating system. Once you are connected to the remote Linux PC, you are able to surf ... the web anonymously, plus have immunity to Spyware or adware attacks. But that's just one of the benefits of CosmoPOD. Once inside your new CosmoPOD desktop, you will have access to dozens of free or open source applications. For example: Open Office is one of the many installed applications and it lets you use and create most of the common ... (view more)

Wed
28
Dec
Dennis Faas's picture

Exploit Computer Security

An exploit is a common term in the computer security community to refer to a piece of software that takes advantage of a bug, glitch or vulnerability, leading to privilege escalation or denial of service on a computer system. There are several ... methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A 'local exploit' requires prior access to the vulnerable system and usually increases the privileges of the person ... (view more)

Wed
14
Dec
Dennis Faas's picture

Application Programming Interface

An application programming interface (API) is the interface that an application provides in order to allow requests for service to be made of it by other computer programs, and/or to allow data to be exchanged between them. For instance, a computer ... program can (and often must) use its operating system's API to allocate memory and access files. Many types of systems and applications implement API's, such as graphics systems, databases, networks, web services, and even some computer games. API: Description One of the primary purposes of an API is to provide access to a set of commonly-used ... (view more)

Wed
12
Oct
Dennis Faas's picture

Windows Form Parking Window Error?

Infopackets Reader Jimmy B. writes: " Dear Dennis, I'm running windows XP and use Webroot Spy Sweeper and Norton Anti Virus. Sometimes I'll be using my computer when -- all of the sudden -- I get this very strange error message that reads 'Windows ... Form Parking Window' error and it shuts my computer down. What is Windows Form Parking Window and how can I stop it from appearing? I've done a Spyware and AntiVirus scan of my computer and haven't come up with anything. Can you help? " My response: From what I read via Google, the "Windows Form Parking Window" or " ... (view more)

Tue
04
Oct
Dennis Faas's picture

PowerUp XP Platinum 2 Review

Great news! Just this past Wednesday, I received wind that Ashampoo has released their flagship tweak utility, "Powerup XP Platinum", version 2. Reminder: What is Ashampoo PowerUp XP Platinum? PowerUp XP Platinum takes the hassle out of optimizing ... and fine-tuning a Windows PC and combines everything into one easy to use, tidy package. Rated 5/5 by the editor's at Download.com, PowerUp XP Platinum 2 includes all the powerful features that made its predecessor the favorite tuning tool of many Windows users -- plus it adds many new terrific and unique features that yield even more ... (view more)

Sun
28
Aug
Dennis Faas's picture

Superuser

On many computer operating systems, " SuperUser " is the term used for the special user account that is controlled by the system administrator. SuperUser: Unix and Unix-like In Unix-style computer operating systems, root is the conventional name of ... the user who has all rights or permissions in all modes (single- or multi-user). The user root can do many things an ordinary user cannot, such as changing the ownership of files and binding to ports numbered below 1024. Generally, it is not good practice for anyone to use root as their normal user account, because simple typographical ... (view more)

Wed
06
Jul
Dennis Faas's picture

VisualWare CallerIP Review

Synopsis: Fact: The moment you are connected to the Internet, your system is vulnerable to outside intruders, even with an anti-hacker Firewall in place! So how would you know if your system is being hacked right now? Answer: using VisualWare ... CallerIP, of course! With CallerIP, you get realtime monitoring information -- visually -- so you can instantly identify suspect activity to *and* from your computer (such as Hackers, Spyware, and Trojans). VisualWare CallerIP is so useful, it should have been renamed to VisualWare Internet "Caller ID"! VisualWare CallerIP: Screenshots Click to ... (view more)

Pages

Subscribe to RSS - access