Computer Tips that Help Small Businesses Operate P

Computer Tips that Help Small Businesses Operate Profitably

by: Sharron Senter

When working properly, computers enable small businesses to make big business profits; however, get booted off your computer and you’re suddenly starving. In most instances, computers usually act up due to lack of care by its owners. Here are four computer tips that’ll keep you up and running smoothly.

Tip #1 Back up your computer’s data no less than once a month.

Too often a small business is thrust back to infancy because it didn’t take time to back up precious data; information that took hours upon hours to create. Information that’s irreplaceable, such as customer databases or employment contracts. Keep in mind you’ll want to back up your written data as well as check books such as Quicken and email address books. If your computer has a CD writer, it’s simple and quick to back up your data. Simply select the files and folders you want to back up and copy them to the writer.

Or if you have an older computer, copy your most important files to a floppy disk. Either way, don’t stop there; now take the CD or disk and store it in a firesafe box! To expedite the process, organize your files within folders so you can quickly grab and copy one or two folders.

Tip #2 – Don’t turn off your computer every evening.

Too frequently computer users turn their computers off every evening. This is unnecessary and not recommended. A computer’s components are at their most vulnerable when turned on and off. When a computer has to heat up [turn on] or cool down [turn off] it’s at this precise moment components fail. It’s recommended you turn your computer off once or twice a week or only when necessary, such as from a power outage. However, don’t do the opposite and never turn your computer off, since many antivirus programs require a computer reboot be performed before new virus patches take effect.

Tip #3 Automate antivirus software so it updates automatically no less than once a week.

Depending on your software, you may need to prompt it to update. Unfortunately, there are people with too much time on their hands who desire to attack and make your computer unusable. A computer user is not ultimately protected from viruses and spyware [popups, cookies, etc.] unless you’re using a combination of antivirus and antispyware software and a firewall, a piece of hardware that protects computers from being hacked. You must have all three pieces in order to ward off viruses, lurkers and attacks. What’s more, most of the attacks are very quiet. You don’t know someone is on your computer. Instead, they secretly store information, such as child pornography or music MP3s on your computer, since itกs illegal, and redirect childporno or MP3 seekers to your computer instead of theirs.

Tip #4 Install a firewall if you keep your computer constantly on.

Using a broadband or DSL connection dramatically increases your exposure to being hacked. It only takes an average of 15 minutes being online before a homebased computer is attacked. The only true way to protect a computer from a hacker is to install a hardware firewall. It’s a misconception that softwarebased firewalls ultimately defend computers. This is simply not true. Computers must have a hardware firewall for ultimate protection, such as a SonicWall or Netscreen firewall, a component installed between a home user’s cable or DSL connection and their computer.

About The Author

Sharron Senter is cofounder of http://www.VisitingGeeks.com an on site computer repair, security and networking company that helps families, home power users and small businesses north of Boston, Southern NH and Maine. Visiting Geeks’ technicians are crackerjacks at squashing viruses, popups and securing and making computers perform faster. To reach Visiting Geeks call (978) 3464087 or visit http://www.VisitingGeeks.com Sharron’s also the author of, ขMake Money While Sleeping.ข Learn more at http://www.sharronsenter.com/fs_increase_seo.shtml

This article was posted on October 05, 2004

by Sharron Senter

Hosting Your Own Web Server: Things to Consider

Hosting Your Own Web Server: Things to Consider

by: Ant Onaf

Are you disgusted or disappointed with your current web host? Have you switched web hosting companies too many times? Have you thought of hosting your own website(s)? Do you have the ambition to control and manage your own web server?

If you answered กyesก to the questions above, then you may be ready to host your own sites. This article will give you things to consider while making the switch.

When being your own web host you should be technically inclined and have basic knowledge of operating systems, understand technical terms, understand how to setup a server environment (such as: DNS, IIS, Apache, etc.) have basic knowledge of scripting languages and databases (PHP, Perl, MySQL, etc.), be familiar with current technologies, and have a basic understanding of hardware and server components.

You should realize the pros & cons. It is one thing to say, you want to host your own web server and it is another thing to actually do it.

Pros:

Own sense of responsibility

Awareness level raised (you are at the frontline of all server happenings)

No monthly hosting fees/accounts

Incompetence no longer exist

Nonshared environment (dedicated server)

Unlimited websites, databases, content, storage, etc.

More bandwidth

No more waiting on someone else time

Complete control

Cons:

Exhausting at times

Faced with server/hardware problems

ISP business account (monthly business/broadband expense)

If server goes down then the website is offline

No technical support team

Software, hardware, and network expenses

There could be many more pros & cons but I’ve pointed out some of the major ones. Managing a web server starts as a full time job, you must constantly monitor its performance and security. This can sometimes be an exhausting task, especially if you currently have other responsibilities. Though, the control you will have over your website and its performance is rewarding enough. You no longer have to wait for technical support or approval to install a script onto the server. You can have as many websites and databases you want, as long as your hardware can handle it. You no longer have to go into the discussion forums and search for the best web host or rant about how much you hate your current host. You can even begin hosting family & friends personal websites.

Ask yourself, how technically advanced are you? Many times you do not have to be a tech guru or anything of the sort, but you must be very resourceful. You must know how to find resolutions and answers to problems, quickly and efficiently. This means you must be internet savvy. Not just the average surfer, who surfs aimlessly, but you must be the surfer who can always find what they are looking for. This is key, because with any server environment you are going to run into problems and finding the answers are most accomplished online, using multiple resources, search techniques, and engines. Sure you can hire someone to fix your problems, but as we should have learned from the กweb hostingก, having someone do it for you isn’t always the best option. Here is a test to see if you are ready to find solutions. I need a solution to a Microsoft Windows 2003 Server Event Error กEvent ID: 1056ข it’s a DHCP Server Error. How would you search? Go ahead find the solution.

Did you first go to Google? If you did, that was a nice effort and common for most, plus a good place to start, but usually it is best to start at the developersก website. In this case กmicrosoft.comก would have been the first option. Why? Google would more than likely provide you with the answer from Microsoft and other sources, but you don’t want to get inaccurate information from other sources. It is common to get information from Microsoft that would not specifically resolve your problem, but the developer should always be your first place to search for the answers. Now search the error again and go to the Microsoft site and find the solution.

You should had found this link: http://support.microsoft.com/default.aspx?scid=kb;enus;282001 (Event ID 1056 is Logged after installing DHCP)

What search phrase did you use? It should have been Event ID: 1056, because the Event ID is the exact error, it pinpoints your exact problem without broadening your search. Sometimes the error description is also appropriate to search, just the error description by itself or in combination with the Event ID. It depends on your error, your search feedback, your ability, and technique. For this example I did not include the error description.

Google or Yahoo! should have been your second option (the two largest search engines). Then search other smaller and niche search engines. A good search site which makes use of Google’s operator tags is www.soople.com. Next you should search within forums and discussion groups. If you are pretty internet savvy and have a plentiful or few forums and discussion groups which you frequent then you might actually visit those places before visiting Google or Yahoo!. You can even visit those before visiting the developer site since it is a trusted source, but I wouldn’t recommend it, I still would go to the developersก site first. Okay, so now we have planted our feet and have familiarized ourselves with being internet (search) savvy. We are ready to purchase a server!

When making a server purchase you need to consider a few things before doing so. What to buy? A top of the line, quadruple processor, and super fast turbo server is always ideal, but many times it is not logical or affordable. Therefore, you need to weigh your options (sensibly).

What to buy?

First determine your budget. Be realistic and expect to spend at least $2,500 for a lowend server. For a lowend, quality server with other needed equipment and services I spent a little over $4,500 easily.

Determine your ISP (broadband) provider. Research and speak with several different vendors before deciding which broadband solution best suit your needs. Each provider plan is different and has different benefits, determine the best one which fits your needs. Bandwidth should be put into consideration when choosing your ISP.

A backup device should be purchased before implementing a server install. The backup device should be double the server storage space. This could be a standalone unit like an external hard drive or network storage device or the backup device could be multiple devices such as: backup tapes, disc, etc. The reason the backup device should be larger is because you want to be able to have months worth of backups and not just weekly or monthly backups. You should have at least 24 weeks of backups without the concern of storage space. The backup device or safe deposits should also be external, removable, and portable. This is so the backups can be stored in a remote location. Usually for safekeeping, in event of a theft or disaster.

Determine your daily traffic goal (the daily traffic which you hope to see within 1 year – be realistic), divide that number by the daily traffic you currently receive, and then multiply that number by 5. That is the total number of GB space you need.

Example:

Daily Traffic Goal: 10,000 (Divided by) Current Daily Traffic: 500 (Times X) 5 = 100GB

In the example you should purchase a 100GB Hard Drive, it is best to buy 2 or more drives oppose to 1. In this case, since 50GB drives do not exist or harder to find, you would buy two 60GB drives giving you a total of 120GB. 2 or more drives are usually needed in a server to configure the proper RAID option, in some cases 3 or more are needed. Your backup storage space should be a minimum capacity of 200GB (or 240GB, optional).

Determine your memory. If your web server daily traffic goal is 500,000 then I would recommend at least 2GB worth of memory. If it is a shared server, meaning it also has other server services running on the machine, especially a mail server or database server (which is not recommended) then your memory should at least be 3GB or more. Otherwise you can think small and upgrade as needed, a 1GB memory stick should be fine for starters.

Determine your network components, which NIC card best performs under high traffic levels and which router best performs for your LAN / web server. It is best to get a router which has a builtin firewall (commonly known as a ขhardware firewallข). Your ISP may provide you with a router or hardware firewall, this is how they are able to authorize your traffic on their network. Like a cable box does for cable television. The router also shares your IP address with other clients on your network. This enables you to share your internet connection without having to get a different IP from your ISP. The hardware firewall is simply a router with a builtin firewall, which means it shares your IP address as well as provides added protection to your network. It blocks bad addresses and ports at the forefront, before it can even make it to your computer. It is not recommended to rely only on a hardware firewall for security, this is just the first step. It is recommended to also include a software firewall (firewall software which installs on your computer) and it is recommended to continue timely security practices, such as updating and patching your system on a scheduled routine.

Determine your processor speed and power. Regardless of the amount of traffic you are expecting I would recommend a dual processor or greater. A dual processor or greater is best because if your website unexpectedly take off then you will be well prepared and if you host other server options or websites on the same server then you will have better performance. At the time of this writing the 64bit platform is the processor direction. 3.8GHz is the most available speed. If your pockets can afford the latest technologies then that is ideal, but keep in mind at this particular time a 64bit compatible processor is not necessary, without having many applications that require or deliver on that platform. That is a lot of speed going no where fast. Also, remember the power of the 64bit platform and the greater the processor speed the more heat it produces, therefore it must be cooled much more rapidly and efficiently. At this time a dual 32bit, 2.8GHz – 3.2GHz processor will suffice (even that is way more than enough). Though, if your pockets can afford it then the latest and greatest would be fine, you will be well prepared. Otherwise, do like most people and upgrade when the time comes.

Make sure you have a CD/RW drive. A floppy disk drive is not needed, but I do recommend it for making system restore disk. The CD/RW drive is needed because you need some type of removable storage device. You never know when you need to install a driver from a different location…like a ethernet driver. An external CD/RW drive is the best option, especially if you have multiple machines.

Choose your operating system carefully. Choose the vendor which you are most comfortable with. Do not choose a MAC if you never used a MAC before. Just because your friend suggests it and says it is a piece of cake does not mean it will be for you. You are trying to get a web server online not relearn a whole new system. Stay focused and grounded. If you are comfortable with Microsoft then go with Microsoft, regardless if the IT person at your job says Microsoft products are unsecure, Linux or Unix is more secure and much better for a web server. If you have never used Linux or (especially) Unix then you will be in for a ride of your life. Your web server experience will soon become a nightmare and you will have wasted thousands of dollars on equipment. Go with what you know, not what you are told. Each platform has its pros and cons: Microsoft is the userfriendly of them all; Mac is the web/graphic developer of them all; Linux is the opensource/developers paradise of them all; Unix is the most secure of them all. Each of them can be tweaked in ways to provide a solid, quality platform, it is best to stick with what you already know.

You should install on your system all the web services (such as: Apache, IIS, etc.), applications (such as: backup device software, RAID (Array) Manager), scripting languages (such as: PHP, Perl, etc.), CGI, Database (such as: MySQL, Microsoft SQL, etc.), and a web log analyzer (such as: weblog expert, nihuo, etc.). It is also recommended to perform system updates, security patches, and firewall installs and configurations. It is sometimes best to leave the security installs and configurations for after you have the system functioning properly to avoid any uncalculated problems. This way when you install the firewall and something stops working properly like connecting to your website from outside your network, you can troubleshoot assuming that it is the firewall, therefore you would begin by opening port 80 on the firewall. This method can save you a lot of hassle, but can sometimes be considered the unsecure method, especially if you don’t have a hardware firewall already in place.

Next, there are a few things to consider before installing and configuring a server. Where to put it? A secluded, cool location is ideal, but if this cannot be accomplished then adjustments can be made.

Where to put it?

Locate a location within your home that is staticfree, we do not want to put the server on the carpet, near curtains, or anything else that can produce a static reaction. The reason for this is that you do not want the server internal components to receive a static charge and short circuit.

The location should be a cool environment, preferably below room temperature. The reason for a cool area is because servers (as well as desktop computers) produce large amounts of heat, the more heat it produces the more it needs to cool off. If the server is not kept cool, then this can lead to the server hanging and then eventually crashing. Itกs the same result of when a car overheats, it stops running. You can keep a server internal components cool by keeping the room cool, additionally you can add more fans to the server which cools the server internal components, you can also position a standalone fan directly at the server back panel and constantly have the fan cool the server internal components. Depending on how cool your room is and how much heat your server produces, getting more fans for your server may be a must and not an option.

It is suggested that the server is at a higher level within your house (midfloor), because if it is in the basement and a flood occurs it could ruin it. If it is in the attic and the sun beams on the attic for hours the server could overheat. Midfloor level is usually the cooler place within the home, but these recommendations is optional and you should put the server in the most comfortable and convenient space following the rest of the guidelines.

Be sure the area you choose is not damp or wet (no leaks, moisture, near any liquids, or near a window ขespecially openข). We all know what can happen when electrical components get wet.

The server should sit at least 4ข inches from the ground

Be sure a working electrical outlet is near. It is an important to have a power supply, a good brand is APC. Having a power supply can save you from electrical outages, blackouts, and brownouts. Having a power supply helps the server keep its power, remain stable, and unaffected when there is an outage, as well it protects your server against electrical shock. If your outage remains more than 5 minutes it is recommended to begin backing up anything deemed important and shut the computer down voluntarily as well as any other electrical attached devices.

Have a LAN line near and also a phone jack (if you plan on using the server for any dialup services). It is not recommended to use your web service with a dialup connection. A broadband connection or greater is recommend for optimal performance. The LAN line should never come from your wall and plug directly into your server, it should plug into a hardware firewall (usually a router with a builtin firewall).

Depending on the size of the server and the internal components the server may be extremely noisy and loud, especially with the fans going. It is suggested to have the server in a secluded location which is not near any peaceful area of the house, such as: bedroom.

Those are all some basic things to consider before hosting your own server. Hosting your own server is not an easy task, but once you have had some time and experience with it, it becomes a breeze. You will have a better web hosting experience, you will be more in tune and reliant to your customers, and you will gain greater technical aptitude. Hosting your own web server is rewarding, useful, and gives you the opportunity to host unlimited websites, databases, services, etc.

If your web traffic becomes too great for your server then it is recommended to choose an offsite web host. It is recommend to purchase a dedicated server with a quality web host. If you choose a server with the above recommendations then your server traffic should be fine for at least up to 25,000,000 page views per month. It could be greater or less depending on your operating system, your server configuration, performance, applications, and services. The point is you should be well in a position to purchase dedicated server space by the time your traffic gets too high, because if you are getting anything close to 1,000,000 page views a month you should have some competitive advertising or ecommerce income. And plus, with the knowledge you will gain from the experience you will be able to support your own server at a dedicated server (remote) location, thus cutting more overhead.

The biggest disadvantage of hosting your own web server is the uptime reliability. If your web server powers down for any reason then your website is offline. Usually web hosting companies have methods and networks to prevent this failure from affecting your website. Usually if the system goes down they have a mirror location where your site is rejuvenated and doesn’t experience much downtime. Some web hosts do not practice this method or any other fault tolerance. Imagine if a blackout or power outage occurs, then your web server could be down for hours or even days, this can affect your business greatly. There are some hosting companies who provide mirror web hosting for a small fee, I haven’t found one that is reliable yet. Or you could cross your fingers and hope for the best, until you are able to host your server outside your home on a larger network.

Hosting your own server usually is not a moneysaving experience. It sometimes cost more to host your own server, when you total the up keep and maintenance. The benefit of hosting your own server is usually a better platform for your customers, because it is no longer a shared server and it gives you the ability to make global changes almost instantaneously. When your customers request more performance or specific applications, then you will be able to implement this immediately. Customers like to know that you are in control. If you tell your customers that the server will be down for maintenance from 6 a.m. – 7 a.m. then it would be best if that is when your server is down, not from 5 a.m. – 10 a.m. You know how your web host will tell you one thing and then you have to try explaining it to your customer. In the end it will benefit you to host your own web server as a web business, this helps you and your customers.

About The Author

Ant Onaf is an online internet marketer, web advertiser, and IT consultant. Having several years of experience within the IT field Ant Onaf has managed to successfully advertise and market several prominent clients. His ingenuity, dedication, and passion for technology have made him a monumental icon in the World Wide Web. His public blog can be visited at JournalHome.com: http://www.journalhome.com/?u=anthonyon

This article was posted on February 27, 2005

by Ant Onaf

Personal Firewalls for Home Users

Personal Firewalls for Home Users

by: Pawan Bangar

What is a Firewall?

The term กfirewallก illustrates a system that protects a network and the machines on them from various types of attack. Firewalls are geared towards keeping the server up all the time and protecting the entire network.

The primary goal of a firewall is to implement a desired security policy; controlling access in both directions through the firewall, and to protect the firewall itself from compromise. It wards off intrusion attempts, Trojans and other malicious attacks.

Personal Firewalls:

They are meant for the home user in a networked environment. They aim to block simple attacks, unlike the enterprise level firewalls that the corporate world uses at the server or router end. There are many ways to implement a firewall, each with specific advantages and disadvantages.

Are they really needed?

Nowadays organizations and professionals use Internet technology to establish their online presence and showcase their products and services globally. Their endeavor is to leverage digital technology to make their business work for them.

All the organizations and professionals are shifting from Dialup to broadband and getting a fixed IP. It has led to an increase in security attacks, bugs in everyday working. This does not mean that Dialup being anonymous dynamic link or the firewall of the ISP network make you pretty safe.

Now if your machine was under attack, you must have wondered what went wrong making your system crash suddenly. So I would rather like to say, it’s not necessary for anyone to actually know about you or your IP address to gain access to your system.

If you system is infected or prone to intrusions, then beyond the anonymity of your Dialup connection or a dynamic IP, your system can be hacked.

Types of Attacks

Intrusion:

There are many ways to gain unauthorized access to a system. Operating system vulnerabilities, cracked or guessed passwords are some of the more common. Once access is attained, the intruder can send email, tamper with data, or use the system privileges to attack another system.

Information Theft and Tampering:

Data theft and tampering do not always require that the system be compromised. There have been many bugs with FTP servers that allow attackers to download password files or upload Trojan horses.

Service Attacks:

Any attack that keeps the intended user from being able to use the services provided by their servers is considered a denial of service attack. There are many types of denial of service attacks, and unfortunately are very difficult to defend against. กMail bombsก are one example in which an attacker repeatedly sends large mail files in the attempt at filling the server’s disk filesystem thus preventing legitimate mail from being received.

Types of Attackers

Joyrider:

Not all attacks on computer systems are malicious. Joyriders are just looking for fun. Your system may be broken into just because it was easy, or to use the machine as a platform to attack others. It may be difficult to detect intrusion on a system that is used for this purpose. If the log files are modified, and if everything appears to be working, you may never know.

Vandals:

A vandal is malicious. They break in to delete files or crash computer systems either because they don’t like you, or because they enjoy destroying things. If a vandal breaks into your computer, you will know about it right away. Vandals may also steal secrets and target your privacy.

ขIn an incident a Trojan was being used to operate the web cam. All the activities being done in the house were being telecasted on the websites.ข

Spies:

Spies are out to get secret information. It may be difficult to detect breakins by spies since they will probably leave no trace if they get what they are looking for.

A personal firewall, therefore, is one of the methods you can use to deny such intrusions.

How Firewalls work?

Firewalls basically work as a filter between your application and network connection. They act as gatekeepers and as per your settings, show a port as open or closed for communication. You can grant rights for different applications to gain access to the internet and also in a reverse manner by blocking outside applications trying to use ports and protocols and preventing attacks. Hence you can block ports that you don’t use or even block common ports used by Trojans.

Using Firewalls you can also block protocols, so restricting access to NetBIOS will prevent computers on the network from accessing your data. Firewalls often use a combination of ports, protocols, and application level security to give you the desired security.

Firewalls are configured to discard packets with particular attributes such as:

Specific source or destination IP addresses.

Specific protocol types

TCP flags set/clear in the packet header.

Choosing a firewall:

Choose the firewalls which have the ability to ward of all intrusion attempts, control applications that can access the internet, preventing the malicious scripts or controls from stealing information or uploading files and prevent Trojans and other backdoor agents from running as servers.

The purpose of having a firewall cannot be diminished in order to gain speed. However, secure, highperformance firewalls are required to remove the bottleneck when using high speed Internet connections. The WorldWideWeb makes possible the generation of enormous amounts of traffic at the click of a mouse.

Some of the good firewall performers available in the market are below:

BlackICE Defender

eSafe Desktop

McAfee Personal Firewall

Neowatch

Norton Personal Firewall

PGP Desktop Security

Sygate Personal Firewalls

Tiny Personal Firewall

Zone Alarm

Zone Alarm Pro

Most of these firewalls are free for personal use or offer a free trial period. All the personal firewalls available can’t ensure 100% security for your machine. Regular maintenance of the machine is needed for ensuring safety.

Some of the tasks advised for maintaining system not prone to intrusions:

Disable file and print sharing if you are not going to be on network.

Update your antivirus signature files regularly.

Use a specialized Trojan cleaner.

Regular apply security patches to your software and operating system.

Don’t open email attachments if you have don’t know the contents it may contain.

Don’t allow unknown applications to access to the internet or to your system.

Regularly check log files of your personal firewall and antivirus software.

Disable ActiveX and java and uninstall windows scripting host if not required.

Turn off Macros in Applications like Microsoft Office and turn macro protection on.

Check the open ports of your system and see them against the common list of Trojans ports to see if they are being used by some Trojan.

Log Off from your internet connection if not required. Being online on the internet for long duration gives any intruder more and sufficient time to breach system security.

Unplug peripherals like web cam, microphone if they are not being used.

About The Author

Pawan Bangar,

Technical Director,

Birbals,India

[email protected]

This article was posted on December 08, 2004

by Pawan Bangar

6 Essential Steps to Protect Your Computer On the

6 Essential Steps to Protect Your Computer On the Internet For Free

by: Jerry Yu

Recently one of my friends asked me to check out if his computer was infected by virus. He suspected because occasionally the computer was shut down automatically when connected to internet. My first thought was the Sasser worm 60 seconds auto countdown. As he uses Windows 98 second edition with IE5, the virus must be a Sasser variant.
Iกm not network security expert but I know some basic things he must do to protect his home PC. It was a shock when he told me that his 4 years old PC had no protection except McAfee antivirus.

Bought in 2000 and no Windows service packs had been applied since then.
McAfee antivirus software came with the PC when bought and no updates since then.
No firewall installed.
No anti spyware installed.

This is what I did to beef up his PC to the best of my knowledge.
Step #1: Patch the operating system.
The first thing I did was update his Windows 98 to the latest available Windows updates for Windows 98.

Open Microsoft Windows Update page at http://windowsupdate.microsoft.com/
Scan the PC to find out what critical updates and security fixes are missing.
Select, download, and install a selection of updates, especially any Critical Updates.
Restart the PC after finished.

When you open the Microsoft Windows Update page, click the กScan for updatesก link. The page will suggest what updates are needed based on your Windows version. You should install all Critical Updates suggested by Microsoft.
It took me about one and half hour to complete the above steps.
Step #2: Download, install, and run Spybot to get rid of all spyware.

http://www.safernetworking.org/index.php?page=download
SpybotS&D is a free antispyware software to detect any spyware installed on your PC.
Spyware is any software that is installed on your PC and tracks your online behavior without your knowledge or consent. Spyware generally can

Track what web pages you are visiting and send these information to advertising companies. This kind of spyware is commonly called adware.
Track and record your computer activities such as what keys you hit. This is generally called Trojans.
Change your web browserกs home page.
And more…

After installed Spybot, I immediately scanned my friendกs computer and found 166 problems. The first run killed nearly all of them except some memory residents that had to be killed after a reboot.
Step #3: Download and install Kerio Personal Firewall (KPF).

http://www.kerio.com/us/kpf_download.html
Kerio Personal Firewall limited free edition is for home users. After installation, KPF works as the full edition for 30 days, after which it becomes the limited free edition.
You may also try the free ZoneAlarm firewall. Be aware that ZoneAlarm free edition uses a lot of computer memory.
The following is the free ZoneAlarm firewall download link. You hardly can find this download link on ZoneAlarm site because they want you to buy the Pro version which is a much better choice.

http://www.zonealarm.com/store/content/company/products/znalm/freeDownload.jsp
Step #4: Download AVG antivirus software

http://www.grisoft.com/us/us_dwnl_free.php
Because my friend has McAfee antivirus installed but has not been updated for about 4 years. I downloaded AVG Free Edition antivirus software and let him to consider if he wanted to pay and update his McAfee or use the freebie. Running two antivirus software on the same computer can cause conflicts.
Step #5: Install password management software RoboForm free edition.

http://www.roboform.com/?affid=siter
RoboForm is a password management software with Artificial Intelligence built in that can automatically fill online forms for you. It has been featured on The Wall Street Journal, CNN, The New York Times, Financial Times, PC Magazine, etc.
Nowadays we all have many usernames and passwords to use on the internet. Some spywares record your keystrokes and send them to the hackers. It has been reported many times that people lost all their money in online bank account or internet payment system account.
One of RoboForm key features is designed to combat this kind of key logger hacking. RoboForm can

AutoSave passwords in browser.
AutoFill passwords to login form.
Click Login button for you.
Fill personal info into online forms.
Save offline passwords & notes.
Generate Secure Random Passwords.
Encrypt passwords and personal info using 3DES.
All personal info is stored on your computer only.
Put passwords on USB KeyChain for extra security.
Sync your passwords and safenotes to a Palm.
Backup & Restore, Print your passwords.
More features: drill down for more.

RoboForm works best with IE 5.0 and above. IE6 is the recommended browser to use with Artificial Intelligence RoboForm.
Note: free eidition comes with some limitations.
Step #6: Apply additional security measures.
More security measures and resources:

Read Web Security tutorial from W3Schools, especially the paragraphs for home users.

http://www.w3schools.com/site/site_security.asp
Use Audit My PC to do three Penetration Testing.

http://www.auditmypc.com/freescan/prefcan.asp
Use Gibson Researchกs ShiedsUP to do port scan and get useful advice.

https://grc.com/x/ne.dll?bh0bkyd2
Download Gibson Researchกs LeakTest and check if personal firewall can be fooled. If the firewall is good, the LeadTest will not be able to reach the internet.

http://grc.com/lt/leaktest.htm
Browse Microsoft security home page to learn more about Windows security.

http://www.microsoft.com/security/default.mspx

Mission completed. It took me nearly 4 hours that night and the result is so far so good.

About The Author

The author, Jerry Yu, is an experienced internet marketer and web developer. Visit his site http://www.WebActionGuide.com for FREE กhowtoก stepbystep action guide, tips, knowledge base articles, and more.

This article was posted on July 20, 2004

by Jerry Yu

Protect Your System From the Internet Evils

Protect Your System From the Internet Evils

by: Daniel Punch

Ads, Spyware and Popups: the Internet is an aggressively commercial place. Internet marketing is hugely profitable; owners of frequently visited websites can make a reasonable living just off a few banner ads placed on their site. Software was quickly developed that would attempt to block these ads from loading and being displayed leaving the Internet free from irritants so the user could just view the information that they were after. Not surprisingly the Internet fought back with ads becoming more and more tricky in their execution.

The Internet pornography industry is often at the forefront of new advertising technologies. It was they who first discovered methods to lock the กbackก button on the browser from allowing users who stumbled (accidentally or otherwise) into the กdarkerก areas of the Internet. Then came Internethijacking: changing a browserกs home page so that every time the Internet is connected the user is instantly taken to a certain site. There are ads that lie dormant in the system and pop up long after the user has moved on from the original site or even after theyกve stopped using the internet. These people went everywhere they could, and the rest of the Internet world soon followed.

So, how can we keep ourselves safe? Unfortunately, the answer usually lies in having a number of protection programs running in the background at all times which can slow down a computer. This is a lot more positive than having a computer terminally slowed down by the malicious side of the Internet though, so we just have to take the bad with the good.

The first port of call should be an antivirus program. If you’re even vaguely concerned about online security you’re going to need one installed. A friend of mine decided that this was a foolish suggestion and picked up almost 100 viruses in a single day. These programs range in price and quality, with more expensive (but very good) packages such as Nortonกs Anti Virus (or their comprehensive Internet Security bundle) or free programs, such as AVG Free Edition, available from http://free.grisoft.com/freeweb.php/doc/2/

Once you have your computer protected from automated viruses itกs time to shield yourself from malicious hackers and their kind with a firewall. Windows XP comes with a firewall straight out of the box, with Service Pack 2 offering security upgrades. MacOS also has a firewall. Itกs often not a bad idea to install a third party one though, as they are generally more customisable and in a lot of cases more secure. A few good firewalls are ZoneAlarm (http://www.zonelabs.com/store/content/home.jsp) and Kerio Personal Firewall (http://www.kerio.com/kpf_home.html) as well as those offered in the commercial Internet security packages (such as Nortonกs, mentioned above).

Next up is the Spyware and ad blocking software that was the initial concern. The two major software packages for spyware protection and removal are Spybot Search and Destroy (http://www.safernetworking.org/en/index.html) and AdAware (http://www.lavasoftusa.com/software/adaware/) although there are alternatives including a recent Microsoft release. (http://www.microsoft.com/athome/security/spyware/software/default.mspx).

These threats are often not dealt with by Internet security packs (strangely enough) although some protection is now starting to be included.

Chances are you will have picked up an ad blocker somewhere in the collection of programs by now, but just in case you can make your Internet browsing experience a less commercial affair by downloading software such as Hitware Lite (http://www.rightutilities.com/products/hitwarelite/hitware_lite.htm) or Stop the Popup (http://www.stopthepopup.com/). These programs stop ads before they reach you, leaving you to browse only the information you’re after.

Besides installing protection software your best bet is just to be careful with your surfing. Don’t open weird emails with strange attachments if you don’t know the origins (don’t even open the email… often the viruses and Trojans will have an auto open script written into the email itself, so youกve instantly opened up your computer by simply looking at the email). Be careful about the sites you visit. Make sure that you’re well protected before entering the Internet กgreyก areas, such as ROM, Warez, Appz etc. sites. If you perform a web search and some of the sites that show up have descriptions and titles consisting only of keywords, itกs usually a fair bet that you should stay clear of that site. It usually won’t have anything useful to offer and may contain hazardous material. With a bit of care you can keep your system going strong and enjoy the Internet safely and relatively ad free.

About The Author

Daniel Punch

M6.Net

http://www.m6.net

[email protected]

This article was posted on February 01

by Daniel Punch

How To Choose A Fire Wall Software Program

How To Choose A Fire Wall Software Program

by: Cavyl Stewart

In the real world a กfire wallก is a fireproof wall that is built to stop the spread of fire from one part of a building to others. In the Internet world a firewall has a similar purpose in that it stops the spread of harmful viruses and attacks from entering your home or office network.

Because of the everincreasing threats that are appearing on the Internet you no longer have to be in business to need the protection of a fire wall. In fact, every computer that is connected to the internet should have one installed. Youกll be a lot happier once you know that you have protected your personal files, information, and financial data, such as credit cards and bank account numbers, from being shared with every crook on the internet.

Here are some questions that you should consider before you choose a fire wall for your PC:

What features do I need?

Do I want to be protected from viruses, Trojan horses and worms?

Am I at risk because I use programs that access the Internet automatically?

How much am I willing to spend on a firewall solution?

Here are the common features that are available in almost any softwarebased fire wall program:

Inbound filtering protects unknown users or programs from accessing your PC

Outbound filtering Protects your PC from sending information to the Internet without your permission

Application integrity verification Verifies that any program you are running aren’t sneaking around behind your back and doing things that they shouldn’t be doing.

Data encryption Automatically scrambles any sensitive data that you do allow to be transmitted.

Stealth mode Hides that fact that your PC is even connected to the Internet so that hackers can’t see you.

Popup ad blocking Stops those annoying ads.

Cookie blocking prevents web sites from sending you cookies without your permission Spyware protection Blocks dangerous spyware from operating on your PC

There are many softwarebased firewall programs that can be downloaded from the internet. Most of them come with free trials so you can test each one and choose whatกs best for you. Although you won’t have to be King Geek to install and set up your firewall, there are some adjustments and settings that will have to be tweaked. All of the better firewall programs come with decent instructions and many of the products have help available at their web site.

If you notice that some program that used to work stops working after you install a fire wall then youกll have to make a change in the fire wallกs configuration that will enable the program to operate freely. If you find that there is no way to let your previously operating program pass through the firewall then that might be a good indication that you need to try a different fire wall. Be sure to check with the makers of both the software program and the firewall before you give up and change.

About The Author

Copyright © 2004 Cavyl Stewart. Discover 52 Ways To Do More With Software by signing up for my exclusive Free ecourse. Get tutorials, tips, reviews and recommendations you can use right now to help you achieve more, easier, and cheaper! 100% Original content. Visit: http://www.findsmallbusinesssoftware.com/52ways.html.

This article was posted on December 11, 2004

by Cavyl Stewart

Whats All This I Hear About Firewalls?

Whats All This I Hear About Firewalls?

by: Tom Antion

At this point, if youกve got the whole ‘turning the computer onก thing down; you are ready to learn about firewalls. Whether you use your computer for business or pleasure, it is important to have a firewall. If you use a high speed Internet connection like Cable modem or DSL, you are at a MUCH greater risk for someone to hack into your computer, ultimately giving them free rein to meddle in your files and your life.

A firewall basically limits access to your computer from the Internet; it does not protect your website (that is the responsibility of your webhost.) When you first install a firewall, it will alert you many times about possible threats to your computer. This means that an automated robot or someone who needs a life; is attempting to gain entry onto your computer. Chances are good that big time hackers will not bother with files belonging to someone with a small business, but the 8th grader down the street just might.

Begin by downloading a free firewall; you can visit http://www.firewall.com/ for more information. I got my free firewall at http://www.zonelabs.com, and it provides a decent amount of protection for beginners. As your business grows you will need to upgrade your software. Many sites sell firewalls for a fee, but I think you’ll agree you’d rather pay the cash than lose your hard drive.

About The Author

Tom Antion provides entertaining speeches and educational seminars. He is the ultimate entrepreneur, having owned many businesses BEFORE graduating college. Tom is the author of the best selling presentation skills book กWake กEm Up Business Presentationsก and กClick: The Ultimate Guide to Electronic Marketing.ก It is important to Tom that his knowledge be not only absorbed, but enjoyed. This is why he delivers his speeches laced with great humor and hysterical jokes. Tom has addressed more than 87 different industries and is thoroughly committed to his clientกs needs.

http://www.antion.com

This article was posted on September 08

by Tom Antion

Burning Bridges is Bad, But Firewalls are Good

Burning Bridges is Bad, But Firewalls are Good

by: Heather Wallace

When you signed up for that ultrafast DSL or Cable connection there was probably one very important piece of information that your ISP failed to mention. By accessing the Internet via a highspeed connection, you have tremendously increased your chances of being victimized by a computer hacker.

Dialup may not have seemed like it could have held any advantages, but it actually did have one upside. It is much less prone to hacking. Every time you dialedin your computer was assigned a new IP address. That unique IP address made you a moving target that was more difficult for hackers to hit.

With a highspeed connection you are assigned a static IP address (it never changes). So, your computer went from being a moving target to staying still with a bullseye pasted on the side. That, coupled with the fact that with a highspeed connection your computer is always online, are ideal conditions for a potential hacker attack. That seemingly beneficial alwayson connection gives hackers a 24/7 open invitation to try and hack your system. Once inside they can access personal or financial details, compromise your computerกs operating system, or unleash a virus, worm, or spyware.

Which Firewall is Right For You?

Now that you know how vital a firewall is to the protection of your PC you have to decide which firewall is right for you. Software or hardware.

A software firewall is designed to monitor your computers activity at all times. Think of it as a bodyguard who won’t let anyone into your computer if he doesn’t like the look of them. With a software firewall you may to have to assist in protecting your system. The firewall might alert you to certain activity and ask you if you want to grant or deny permission. Itกs just like the bodyguard that was mentioned before. He needs the okay before telling someone to scram. After you give either the thumbs up or the thumbs down the firewall will take the appropriate action and remember your reply so that you won’t be asked in the future.

If you feel comfortable installing and configuring hardware, then you might want to consider a hardware firewall in the form of a Cable/DSL router. The hardware firewall handles everything on its own without any input from you and you also won’t have to read any reports or make any decisions. The firewall handles everything on its own. Installation, however, can be tricky, so this option is definitely more suited to the advanced computer user.

My Firewall is Installed. Now Iกm Safe, Right?

With your new firewall in place you are probably thinking that your computer is impenetrable, right? Well, maybe not. As important to the security of your system as a firewall is, some do have their limits. Most software firewalls won’t scan your system for viruses that can harm your computer and there aren’t any hardware firewalls on the market that offer virus protection. That means that you are still vulnerable to attack.

The best line of defense against viruses that can harm your system is antivirus protection.You can either buy a seperate antivirus program or shop around for a software firewall with antivirus protection builtin. You may never be able to make your computer 100% hackerproof, but the installation of a firewall coupled with antivirus protection will greatly reduce your chances of becoming a hackerกs next victim.

About The Author

Heather Wallace is a writer whose work has been published in national, regional, and online publications. Additionally, she has written articles as a newspaper correspondent. Visit http://www.fetchingsites.com/FreeFirewall.html to download a free firewall that is easytouse and will block hackers and other unknown threats.

This article was posted on December 12, 2004

by Heather Wallace

Are You Well Protected?

Are You Well Protected?

by: Roxie Hickman

Winter…the official start of the cold and flu season. Though, technically speaking, things got started a little early. Close to a million computers, mostly home PC users, have been infected.

For many of us our computers are our business. We keep in contact with customers and clients via email, do extensive internet research, and transmit important files electronically.

We know what to do to protect our bodies from viruses. There are some simple strategies, and even free precautions we can take to protect our businesses by keeping our PCs virus free.

Adopting the following six checkpoints will help keep your computer healthy and your business uninterrupted.

Use a Firewall

At its most basic level a firewall is a software security system that acts as a barrier between your computer and the outside world (the internet) by monitoring all incoming network traffic. A more advanced firewall will also monitor outgoing traffic. How you use your computer will determine whether basic or advanced firewall protection is needed.

What a firewall does is make your computer invisible while on the Internet. If hackers can’t see you, they cannot attack you.

Windows XP has this software installed; however, it may need to be enabled. If you have XP and would like to enable the firewall, directions are on the Microsoft website.

For non XP users, firewall software can be purchased. McAfee and Zone Alarm are two very popular products. Zone Alarm has a free downloadable firewall, basic version, available on their website, www.zonealarm.com.

Before installing a firewall, you may be interested in learning your computer’s vulnerability. This is something that can be checked for free and in just a few minutes. Visit the website of Gibson Research Corporation, www.grc.com, and under Hot Spots, click on Shields UP. It takes a little bit of scrolling to get to but is well worth the extra seconds. In minutes your PC is scanned and its vulnerability rated.

Antivirus Software

Antivirus software is the กshotก after the epidemic. This software protects your computer from known threats. Many PCs come with antivirus software already installed. Some of the more popular versions are Norton, PCCillin and McAfee.

If you have it pre installed or have purchased it, great. Please be sure to keep it constantly updated with the latest virus definitions. This is important because these definitions are formed in response to the latest viruses. If you don’t have this protection, please consider getting it.

Once this software is installed on your computer, you will be automatically notified when new virus definitions are available. Then it is just a matter of a few clicks to download the new definitions.

Likewise you will be notified when your antivirus software is about to expire. The software needs to be updated annually. The initial purchase, renewal, updates and installation can all be done online.

Spyware Eliminator

Why am I getting all of these pop ups? Certain websites that you visit or free software (shareware) that you download, and, in some cases, hardware purchased from major manufacturers will also install tracking devices on your computer (spyware). Spyware is annoying but not illegal.

An internet search will reveal the many choices available for spyware elimination software. The important thing is to get one and use it consistently. Spybot and PestPatrol are popular choices.

I really like Spybot Search and Destroy. Besides the fact that it is free, once spyware is identified, the software will provide a detailed description of just what it is. This is helpful just in case it identifies something that you don’t want to get rid of.

Backup, Backup, Backup

How often do you backup? What files/programs do you backup? What media do you backup to?

We all know the importance of backing up our information yet so many of us don’t do it. There may be a ton of reasons why itกs not done but the one reason it should be done on a regular basis is that it can be a timesaver, possibly a business saver if your computer system is corrupted for any reason.

If you happen to be using Windows XP Professional, the backup procedure is quite simple. For users of XP Home Edition, it is a bit more involved. Complete instructions, however, are on the Microsoft website.

Typically, data files are what most people need to back up and having well organized files will certainly simplify the process.

Whether you backup to disk, zip disk, DVD, writeable CDs, external file drive or utilize one of the online services, it is important to get into the habit of backing up on a regular basis.

Weekly Updates of Windows

Windows users are automatically notified of current updates for the Windows operating system when your computer is turned on. With just a few clicks your operating system is updated.

However, when certain patches become available for your particular applications software (XP, 2000, NT, etc), as was/is the case with the recent worm viruses, a visit to Microsoftกs website is necessary.

Once there, Microsoft will scan your computer, tell you what updates are available, and you then have the option of installing them on your system. In some cases, you will need your installation CDs to complete the download.

With the recent run of viruses and with more expected, it is imperative to check for these updates weekly on the Microsoft website as well as do the automatic updates.

Be Careful of Email Attachments

Email is such a widely accepted method of communication, and this has not gone unnoticed by hackers who use email as a means of mass virus spread.

For this final checkpoint, your due diligence is the only software required.

Always delete any email from unknown senders and be very careful of any attachments you are not expecting from any known senders. As we have seen, hackers can quite easily access Outlook address books to spread viruses.

By the way, including a fake email address in your address book will not prevent your PC from spreading viruses. This is an urban legend. If you’re interested in the full story, check out this link:

www.snopes.com/computer/virus/quickfix.htm

When it comes to the health of our computers, an ounce of prevention is worth a pound of cure. Effective prevention software along with plain old common sense, used consistently, can keep you protected.

About The Author

Roxie Hickman, Virtual Assistant (VA), is the owner of The Virtual Connection. The Virtual Connection (www.thevirtualconnection.net) specializes in working with the ‘sucstressed’ (successful professionals who are stressed because they’ve been doing it alone). The Virtual Connection provides offsite executive, administrative, and personal assistance (virtual assistance).

[email protected]

This article was posted on December 21, 2003

by Roxie Hickman

Protect Your Computer…and Your Business!

Protect Your Computer…and Your Business!

by: Ahmad Supaat

We all take the computer for granted. I mean, all we have to do is switch it on and itกs ready to go. But did you ever stop to think what would happen if your computer suddenly crashed? And that is the only computer you have to work on!

What will happen to your work and your business for the next few days or weeks?

Do you have the original or a copy of all your programs?

Do you have the setup configurations, eg for your ISP?. You will need this to reinstall some programs.

Do you have a copy of your email address book? Your email list or address book is vital to your business.

Do you remember all your passwords for retrieving email, connecting to your ISP, membership sites, etc?

So what can you do to ensure that your computer will run as well as youกd expect, and continue working when your computer is down? Hereกs a few simple tips:

1.Is your computer protected from viruses? Install an antivirus software such as Norton AntiVirus or McAfee, and make sure to get regular updates. New viruses are coming out more often these days so you need to have updates regularly. Anything more than 3 months old needs to be updated today.

You can do an online virus scan at: http://housecall.antivirus.com

2.Install a firewall. Anytime your computer is connected to the Internet without a firewall, it is operating under an กopen doorก policy to intruders. Hackers can get in, take what they want, and even leave open a กback doorก so they can turn your computer into a กzombieก and use it to attack other computers, distribute porn and spam.

Your bank account and credit card information, passwords, documents and personal files can be stolen while you’re busy surfing. Don’t let that happen!

You can download a personal firewall from here:

http://www.zonelabs.com or from

http://soho.sygate.com/products/spf_standard.htm

3. Make regular backups of your important files. Keep a record of all vital information, such as passwords, system configurations, etc. in a file and also print a copy of this and keep in a safe place. Make a duplicate and keep at another location.

If your computer does not come with a zip drive or CDRW drive, it would be a good idea to invest in one. Zip drives and CDRW drives are inexpensive and can be easily installed. The cost of a blank CD for example is less than $1.00 and can store up to 650MB of data.

If you lost some files or your hard disk crashed you can easily retrieve them from the backups. And if your computer is down for repair, you can take that backup CD and work from another machine.

4.Remove all unwanted files on your hard disk. You can safely remove files in your temporary internet folder. In Internet Explorer, select Tools > Internet options > Delete Files.

5.Increase your systems performance by defragmenting your hard disk regularly. As applications and files are saved and deleted they gradually cause your hard disk to fragment. By defragmenting your hard disk you can optimise the performance of your computer. Defragmenting may also save wear and tear on your hard disk and extend its lifespan.

Do this today.

About The Author

About the author: Ahmad Supaat provides workathome ideas and opportunites for anyone interested to start a business online. For more information please visit http://insiderprofit.com. Subscribe to the กInsiderprofit Home Business Tipsก: mailto:[email protected].

[email protected]

This article was posted on October 11, 2003

by Ahmad Supaat

Internet Firewalls That Hold Back Invaders

Internet Firewalls That Hold Back Invaders

by: Stacey Misope

Internet Firewalls Are These Deterrents As Effective As We Presume?

If someone sold you a filter for your furnace and said it can trap all dust particles and other pollutants forever, would you believe it? Odds are you know better. I mean, how can a filter trap each and every particle from traveling from your furnace up through your ductwork and into your room? After a certain amount of time and as the filter clogs, the filter looses strength. If you’re smart, youกll periodically change that filter to get maximum coverage with the latest technology. A computer firewall operates in pretty much the same manner. While the majority of firewalls can block ordinary spam and viruses from getting through, these nasty infiltrators sometimes find ways to get into your system and shimmy past your firewall.

So, are firewalls all they’re talked up to be? Yes, firewalls offer a protection that you certainly don’t want to be without. After all, would you be so foolish as to run through a wild storm without protection? Hopefully, you know better. You don’t want so much debris hitting your computer that it can’t recover or ends up stealing your private information. Firewalls offer the kind of protection that you need to ward off these mutating infiltrators. However, you have to make a conscious effort to upgrade your firewall frequently since it too must upgrade itself.

The best way to protect your computer from infiltrators is to build several tough layers between your system and the invader. A firewall works in several layers arranged like a maze to throw off invaders and tear them apart. These layers and tunnels work similar to how a sound wave is broken apart by loosing momentum and speed. As viruses change after learning the language of a firewall, the firewall has to work even harder to keep up with these changes. That is why upgrades are so essential to your systemกs protection.

Operating a computer thatกs connecting to another system and the Internet runs the risk of coming across encrypted messages with harmful or intrusive intentions. The thought of not having a firewall on your computer is similar to the action of running through a front line battle without armor You just don’t want to partake in that kind of foolish risk. A savvy Internet user relies on a firewall that has several protective layers: packet filtering, circuit relay and application gateway. Basically what this boils down to is prior to whatever wants to comes in must first go through a firewall and then whatever wants to go out must again first pass through a firewall. If information or systems operate separate of a firewall, the data and program is fully exposed to whatever elements come its way. To learn more about firewall layers, visit www.pchelp.org.

One multilayered firewall that is found on nearly every window system is Windows Firewall. This firewall blocks unsolicited messages, alerts you of intruders and automatically updates. The top firewalls for home computers according to PC World Online include:

Sygate Personal Firewall, VisNetic Firewall, Kerio Personal Firewall, Norton Internet Security for Macintosh, ZoneAlarm Free, McAfee Personal Firewall Plus, BlackIce PC Protection, and Tiny Personal Firewall.

While some firewalls are free, others are shareware or กbuy onlyก. Since deterrents that destroy information, rob our personal identity and basically intrude and track our movement without permission are as big of a threat as ever, always install the latest version of the best firewall for your hardware and software.

About The Author

Copyright 2005 Stacey Misope. All rights reserved.

Stacey Misope is the webmaster and operator for Firewall Club which is a leading online resource for the latest firewall information on the internet. For more details please visit her archive of articles: http://www.firewallclub.com/

This article was posted on August 16

by Stacey Misope