internet

Tue
12
Nov
Dennis Faas's picture

What programs are running in the background?, Part 2

Last week, Stan L. Jr. sent in a question which asked what should be done when a program attempts to suddenly "call home" and request a connection to the Internet. Recall: " A few days ago, I was using my computer when all the sudden, I noticed that ... some program decided that it wanted to access the Internet. I tried to cancel the request to connect to the Internet, but the bugger kept coming back asking for a connection. I then decided to try the "3 finger salute" by pressing CTRL + ALT + DEL at the same time to bring up Task Manager, but no programs were listed here ... (view more)

Thu
07
Nov
Dennis Faas's picture

What programs are running in the background?

Infopackets Reader Stan L. write s: " Dear Dennis, A few days ago, I was using my computer when all the sudden, I noticed that some program decided that it wanted to access the Internet. I tried to cancel the request to connect to the Internet, but ... the bugger kept coming back asking for a connection. I then decided to try the "3 finger salute" by pressing CTRL + ALT + DEL at the same time to bring up Task Manager, but no programs were listed here that seemed to be "out of the ordinary" that might have been attempting to access the Internet. Is there a program which ... (view more)

Wed
06
Nov
Dennis Faas's picture

Using a software firewall and hardware firewall in tandem

Almost a month ago we were knee-deep in discussion with respect to tracking down a hacker. In short, our ongoing discussion probed possibilities and known methods which might be used to track down a hacker, if one ever attempted to hack into *your* ... computer system. RE: Can I track down a Hacker?, Part 1 , and Can I track down a Hacker?, Part 2 . Shortly after Part 2 was released, I received an email from Dan Daily (editor / webmaster) of Danny's Daily . Dan's comments focused on a proposed supposition, which was sent in from John B. in Part 2 of our Discussion . To recap: John suggested to ... (view more)

Tue
17
Sep
Dennis Faas's picture

Using Trace Route and Ping to trace pathways on the Internet

Tracert.exe? Ping.exe? What the heck is that? Trace Route (tracert.exe) is a DOS command line utility program that traces connection pathways along the Internet using the TCP / IP protocol. Ping (ping.exe) calculates how long it takes to transfer a ... packet of information from origin [you] to destination [a web site] and back again [to you]. What is TCP / IP? The TCP / IP protocol is a method used to communicate computers on the Internet. Any computer using the TCP / IP protocol has a unique address, referred to as an IP (Internet Protocol) address. An IP address can be thought of as a special ... (view more)

Tue
17
Sep
Dennis Faas's picture

How can I set up my modem to my network (ethernet) card under Windows?

Infopackets Reader - J Lerch. writes: " Dear Dennis, I have an ethernet card (network card) and external Cisco modem installed on my old computer. I recently purchased a new computer, and would like to transfer my network card and modem to the new ... computer. Could you give instructions on how to do this? I would like to do this myself (this time) because the last time cost me almost $200 dollars! " My Response: Anything to do with networking a computer can be highly involved. I will outline the steps taken, but will not go into too much detail: Open your old computer. Take out your ... (view more)

Tue
21
May
Dennis Faas's picture

Information Technology Abuse -- Privacy Issues (Part 2 of 2)

Abstract This article is a continuation of last week's issue of the Infopackets Gazette. This article presents an overview of current privacy issues, discusses potential methods in which an individual's privacy may be jeopardized, and examines ... specific countermeasures that can be used to protect private information. Information Technology Abuse -- Privacy Issues (Part 1 of 2) -- Third Layer: Firewalls, Web Filters, and Tracking Detection Firewalls: Any computer system that accesses the Internet should be equipped with a firewall to enable the user to detect and prevent unauthorized access to ... (view more)

Sun
14
Apr
Dennis Faas's picture

Unlimited Bandwidth Shopping for a New Web Host and Server

Have you ever wondered where you are connected to when you're visiting a web site? Believe it or not, every web site in cyberspace resides on a computer which is physically located somewhere in the world. Each server is "hosted" by a company which ... dictates the configuration of each server, such as: how many web sites reside on each web server, server-to-Internet connection speed, how much information can be transferred per site per month (also known as bandwidth limitations), and the like. Different web-hosting packages are offered by different web-hosting companies and define the ... (view more)

Thu
14
Feb
Dennis Faas's picture

To Upgrade Windows -- The Pros and Cons

A few weeks ago, I was called to do an upgrade on an older, Pentium 200 (P200) MHz computer. The P200 was equipped with an old-style scanner that used a special interface. After a few years of good use, the scanner died and needed to be replaced. ... Since the Pentium 200 did not come equipped with a USB interface (universal serial bus), shopping for a new scanner was difficult. The options were to buy an old-style scanner which used the Parallel Port (Printer Port) as its interface - but this was not a viable option because it was extremely slow and would not meet the demand in an office ... (view more)

Pages

Subscribe to RSS - internet