internet

Wed
09
Jul
Dennis Faas's picture

Clear Windows Media Player history?, Part 3

... Continued . Reminder: What is Adware and Spyware? Spyware is software which silently records a users' Internet activity, and then reports the data to a central computer (which is also connected to the Internet). After data is collected from ... millions of online users, statistical forecasts are made for the purpose of targeted online marketing (IE: which search engine queries are used, buying habits based on pages visited, etc). On the other hand, Adware is software which sends advertisements (usually PopUps) to your computer -- even if you're not connected to the Internet. Quite often, ... (view more)

Thu
23
Jan
Dennis Faas's picture

Using a software firewall and hardware firewall in tandem, Part 2

I'm stumpe d. A while back I received a question which dealt with anti-hacker protection ... with a bit of a twist. Infopackets Reader John S. asks: " I just had my Laptop networked to my Desktop PC. I'm using a DSL connection to the Internet. I use ... a Linksys Cable/DSL Router, and already have Black Ice (software firewall) installed on my Desktop PC. Should I also add Black Ice to my Laptop? " Something similar to this question was discussed in a previous Gazette issue, way back in November of 2002. RE: Using a Software Firewall and Hardware Firewall in Tandem In brief, this article ... (view more)

Thu
14
Nov
Dennis Faas's picture

Web Server Upgrade, Part 2

After pumping out that 3-part series on Shopping for an LCD monitor , I've decided to take a break and let you all know what's happening with the web site. I mentioned a few newsletters ago that I had to fork out some serious $$ for a new web ... server. I ordered it at the beginning of this month and have been waiting patiently to register my own nameserver. Nameserver? What did you name your server? Actually, a nameserver is a technical term for a database record which points to the location of a web site. I have two nameservers for my web site and their names are ns1.infopackets.com and ns2. ... (view more)

Tue
12
Nov
Dennis Faas's picture

What programs are running in the background?, Part 2

Last week, Stan L. Jr. sent in a question which asked what should be done when a program attempts to suddenly "call home" and request a connection to the Internet. Recall: " A few days ago, I was using my computer when all the sudden, I noticed that ... some program decided that it wanted to access the Internet. I tried to cancel the request to connect to the Internet, but the bugger kept coming back asking for a connection. I then decided to try the "3 finger salute" by pressing CTRL + ALT + DEL at the same time to bring up Task Manager, but no programs were listed here ... (view more)

Thu
07
Nov
Dennis Faas's picture

What programs are running in the background?

Infopackets Reader Stan L. write s: " Dear Dennis, A few days ago, I was using my computer when all the sudden, I noticed that some program decided that it wanted to access the Internet. I tried to cancel the request to connect to the Internet, but ... the bugger kept coming back asking for a connection. I then decided to try the "3 finger salute" by pressing CTRL + ALT + DEL at the same time to bring up Task Manager, but no programs were listed here that seemed to be "out of the ordinary" that might have been attempting to access the Internet. Is there a program which ... (view more)

Wed
06
Nov
Dennis Faas's picture

Using a software firewall and hardware firewall in tandem

Almost a month ago we were knee-deep in discussion with respect to tracking down a hacker. In short, our ongoing discussion probed possibilities and known methods which might be used to track down a hacker, if one ever attempted to hack into *your* ... computer system. RE: Can I track down a Hacker?, Part 1 , and Can I track down a Hacker?, Part 2 . Shortly after Part 2 was released, I received an email from Dan Daily (editor / webmaster) of Danny's Daily . Dan's comments focused on a proposed supposition, which was sent in from John B. in Part 2 of our Discussion . To recap: John suggested to ... (view more)

Tue
17
Sep
Dennis Faas's picture

Using Trace Route and Ping to trace pathways on the Internet

Tracert.exe? Ping.exe? What the heck is that? Trace Route (tracert.exe) is a DOS command line utility program that traces connection pathways along the Internet using the TCP / IP protocol. Ping (ping.exe) calculates how long it takes to transfer a ... packet of information from origin [you] to destination [a web site] and back again [to you]. What is TCP / IP? The TCP / IP protocol is a method used to communicate computers on the Internet. Any computer using the TCP / IP protocol has a unique address, referred to as an IP (Internet Protocol) address. An IP address can be thought of as a special ... (view more)

Tue
17
Sep
Dennis Faas's picture

How can I set up my modem to my network (ethernet) card under Windows?

Infopackets Reader - J Lerch. writes: " Dear Dennis, I have an ethernet card (network card) and external Cisco modem installed on my old computer. I recently purchased a new computer, and would like to transfer my network card and modem to the new ... computer. Could you give instructions on how to do this? I would like to do this myself (this time) because the last time cost me almost $200 dollars! " My Response: Anything to do with networking a computer can be highly involved. I will outline the steps taken, but will not go into too much detail: Open your old computer. Take out your ... (view more)

Tue
21
May
Dennis Faas's picture

Information Technology Abuse -- Privacy Issues (Part 2 of 2)

Abstract This article is a continuation of last week's issue of the Infopackets Gazette. This article presents an overview of current privacy issues, discusses potential methods in which an individual's privacy may be jeopardized, and examines ... specific countermeasures that can be used to protect private information. Information Technology Abuse -- Privacy Issues (Part 1 of 2) -- Third Layer: Firewalls, Web Filters, and Tracking Detection Firewalls: Any computer system that accesses the Internet should be equipped with a firewall to enable the user to detect and prevent unauthorized access to ... (view more)

Sun
14
Apr
Dennis Faas's picture

Unlimited Bandwidth Shopping for a New Web Host and Server

Have you ever wondered where you are connected to when you're visiting a web site? Believe it or not, every web site in cyberspace resides on a computer which is physically located somewhere in the world. Each server is "hosted" by a company which ... dictates the configuration of each server, such as: how many web sites reside on each web server, server-to-Internet connection speed, how much information can be transferred per site per month (also known as bandwidth limitations), and the like. Different web-hosting packages are offered by different web-hosting companies and define the ... (view more)

Pages

Subscribe to RSS - internet