protocol

Fri
16
Dec
Dennis Faas's picture

How to Fix: Thunderbird: One Inbox, Multiple Accounts

Infopackets Reader Julia S. writes: " Dear Dennis, Thanks for your articles on Thunderbird. I have a question! I have multiple email accounts that I use with Thunderbird; one issue I find is that it's difficult to figure out which inbox has my new ... emails. Some accounts are set up with POP3, others with IMAP. The IMAP accounts have their own 'Inbox', 'Sent', 'Deleted items', etc, whereas the POP3 emails end up in my 'Local Inbox'. Is there a plug-in or a way to configure Thunderbird so everything goes into one single inbox? It would make my life so much easier! " My response: I wondered the ... (view more)

Mon
23
Feb
Dennis Faas's picture

How can a Hacker Access my Router and Network?

Infopackets Reader Dean S. writes: " Dear Dennis, I've read that most WiFi routers use weak passwords (example: admin / admin), or none by default. I understand that for security reasons, the router administrator user and password should be set to ... prevent outsiders / hackers from logging into the router and changing the WiFi settings. On my own router I am connected to it via cable, and can connect by WiFi if I login with the password set for WPA2 security. What I have not been able to understand is how does the hacker connect to the router, and how can they adjust my WiFi settings ... (view more)

Fri
24
Aug
Dennis Faas's picture

VPN Hack Used to Steal Passwords: Microsoft

Microsoft has revealed that a new Virtual Private Network (VPN) hack could be used to steal passwords and other sensitive information. It's called a "man-in-the-middle" attack. Security researcher Moxie Marlinspike first disclosed this VPN hack in a ... security advisory earlier this month. After investigating the issue, Microsoft has acknowledged that the threat is legitimate. Hacker Could Take Control of System, Network "An attacker who successfully exploited...cryptographic weaknesses could obtain user credentials," Microsoft said in its own advisory, released earlier this week. "Those ... (view more)

Thu
12
Jan
Dennis Faas's picture

Ftp

FTP or File Transfer Protocol is a commonly used protocol for exchanging files over any network that supports the TCP/IP protocol (such as the Internet or an intranet). There are two computers involved in an FTP transfer. The first computer is an ... FTP server. This computer listens on the network for connection requests from other computers. Another computer (called the client) can make a connection to the FTP server by using FTP client software. Once connected, the client can do a number of file manipulation operations such as uploading files to the server, download files from the server, ... (view more)

Fri
29
Apr
Dennis Faas's picture

'Protocol Handler', and 'Eraser'

Protocol Handler This sweet little program allows you to launch executables from web pages (read active desktop themes) without being bothered by a download dialog. It is used by schools, libraries, and even on public kiosk computers to allow users ... to launch applications in a user-friendly way. http://www.blackbit.net/ Eraser Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP and DOS. http://www.heidi.ie/eraser/ ... (view more)

Tue
17
Sep
Dennis Faas's picture

Using Trace Route and Ping to trace pathways on the Internet

Tracert.exe? Ping.exe? What the heck is that? Trace Route (tracert.exe) is a DOS command line utility program that traces connection pathways along the Internet using the TCP / IP protocol. Ping (ping.exe) calculates how long it takes to transfer a ... packet of information from origin [you] to destination [a web site] and back again [to you]. What is TCP / IP? The TCP / IP protocol is a method used to communicate computers on the Internet. Any computer using the TCP / IP protocol has a unique address, referred to as an IP (Internet Protocol) address. An IP address can be thought of as a special ... (view more)

Subscribe to RSS - protocol