access

Wed
19
Jul
Dennis Faas's picture

Firewalls: Definition

A firewall is a barrier to keep destructive forces away from your computer. In fact, that's why it's called a firewall. Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. Firewalls use one or more ... of three methods to control traffic flowing in and out of the network: Packet filtering: Packets (small chunks of data) are analyzed against a set of filters. Packets that make it through the filters are sent to the requesting system and all others are discarded. Proxy service: Information from the Internet is retrieved through the firewall and then ... (view more)

Thu
30
Mar
Dennis Faas's picture

CosmoPOD: Your Free Remote Linux Desktop

A short time ago, I found a cool web service called CosmoPOD that allows you to run a remote Linux PC from your desktop without having to actually install a Linux operating system. Once you are connected to the remote Linux PC, you are able to surf ... the web anonymously, plus have immunity to Spyware or adware attacks. But that's just one of the benefits of CosmoPOD. Once inside your new CosmoPOD desktop, you will have access to dozens of free or open source applications. For example: Open Office is one of the many installed applications and it lets you use and create most of the common ... (view more)

Wed
28
Dec
Dennis Faas's picture

Exploit Computer Security

An exploit is a common term in the computer security community to refer to a piece of software that takes advantage of a bug, glitch or vulnerability, leading to privilege escalation or denial of service on a computer system. There are several ... methods of classifying exploits. The most common is by how the exploit contacts the vulnerable software. A 'remote exploit' works over a network and exploits the security vulnerability without any prior access to the vulnerable system. A 'local exploit' requires prior access to the vulnerable system and usually increases the privileges of the person ... (view more)

Wed
14
Dec
Dennis Faas's picture

Application Programming Interface

An application programming interface (API) is the interface that an application provides in order to allow requests for service to be made of it by other computer programs, and/or to allow data to be exchanged between them. For instance, a computer ... program can (and often must) use its operating system's API to allocate memory and access files. Many types of systems and applications implement API's, such as graphics systems, databases, networks, web services, and even some computer games. API: Description One of the primary purposes of an API is to provide access to a set of commonly-used ... (view more)

Wed
12
Oct
Dennis Faas's picture

Windows Form Parking Window Error?

Infopackets Reader Jimmy B. writes: " Dear Dennis, I'm running windows XP and use Webroot Spy Sweeper and Norton Anti Virus. Sometimes I'll be using my computer when -- all of the sudden -- I get this very strange error message that reads 'Windows ... Form Parking Window' error and it shuts my computer down. What is Windows Form Parking Window and how can I stop it from appearing? I've done a Spyware and AntiVirus scan of my computer and haven't come up with anything. Can you help? " My response: From what I read via Google, the "Windows Form Parking Window" or " ... (view more)

Tue
04
Oct
Dennis Faas's picture

PowerUp XP Platinum 2 Review

Great news! Just this past Wednesday, I received wind that Ashampoo has released their flagship tweak utility, "Powerup XP Platinum", version 2. Reminder: What is Ashampoo PowerUp XP Platinum? PowerUp XP Platinum takes the hassle out of optimizing ... and fine-tuning a Windows PC and combines everything into one easy to use, tidy package. Rated 5/5 by the editor's at Download.com, PowerUp XP Platinum 2 includes all the powerful features that made its predecessor the favorite tuning tool of many Windows users -- plus it adds many new terrific and unique features that yield even more ... (view more)

Sun
28
Aug
Dennis Faas's picture

Superuser

On many computer operating systems, " SuperUser " is the term used for the special user account that is controlled by the system administrator. SuperUser: Unix and Unix-like In Unix-style computer operating systems, root is the conventional name of ... the user who has all rights or permissions in all modes (single- or multi-user). The user root can do many things an ordinary user cannot, such as changing the ownership of files and binding to ports numbered below 1024. Generally, it is not good practice for anyone to use root as their normal user account, because simple typographical ... (view more)

Wed
06
Jul
Dennis Faas's picture

VisualWare CallerIP Review

Synopsis: Fact: The moment you are connected to the Internet, your system is vulnerable to outside intruders, even with an anti-hacker Firewall in place! So how would you know if your system is being hacked right now? Answer: using VisualWare ... CallerIP, of course! With CallerIP, you get realtime monitoring information -- visually -- so you can instantly identify suspect activity to *and* from your computer (such as Hackers, Spyware, and Trojans). VisualWare CallerIP is so useful, it should have been renamed to VisualWare Internet "Caller ID"! VisualWare CallerIP: Screenshots Click to ... (view more)

Tue
08
Feb
Dennis Faas's picture

Organize cluttered Start Menu?, Part 2

Last week , Infopackets Reader Diane M. asked how to organize items in her cluttered Start Menu. In my response, I suggested that Diane right-click over top of the "Program Files" and use the Windows Explorer to "Explore All Users" of the Start Menu ... to sort her icons. Shortly after emailing my response, Diane wrote in again: " Dennis: thanks for your response. I went to Start -> Program Files, right-clicked, and chose to Explore ... but I did not see the 'Explore All Users' option. I am using Windows XP; would that make any difference? All I want to do is take one ... (view more)

Tue
16
Nov
Dennis Faas's picture

Password Protect / Lock access to Web Browser?

Infopackets Reader Ron H. writes: " Dear Dennis, I enjoy your newsletters, as they are very helpful. I would like to know if there is a way to password protect a web browser (MS Internet Explorer in particular) to prevent access to the internet for ... unauthorized persons? This is a plant security problem where some off-shift personnel have access to the computer for e-mail but do not need to have access to the web browser. Any help with this matter would be appreciated. " My response: In this case, your best bet is to get in touch with your IT guy at the plant and tell him to restrict ... (view more)

Pages

Subscribe to RSS - access