Saturday, May 22, 2010

Bypass Your School or Workplace Firewall With School Proxy Sites



What is a proxy for school? 'S the answer to every problem the student? To understand what the school is a proxy, we take a closer look because there first. Let's talk a little history of the school 'proxy and how you can learn to use this type of instrument to suit your needs.

Most of the time, many people have a difficulty with access to your favorite sites such as Facebook, MySpace, Friendster or many other social networking sites because they are behind a firewall when they are at school or in an institution.

The reason this happens is because most educational institutions do not want their students to become addicted to Facebook or other sites that 'waste' valuable time study students. They want the children to concentrate on their studies and get good grades. They do not want people to waste their time playing computer games meaningless. Another reason why you want to block people from these sites is because they want to discourage them to stop the school server. When they do everything at once, it could cause a lot of time waiting for people who actually use the Internet to find information online.

Consequently, most adolescents or young adults who are in school facilities are unable to access sites and are always looking for alternatives when it comes to "turn around" the problem of firewalls.

The answer to this is the agent of the school. Is the response of the Internet firewall from school upset. Many students will be able to enjoy freedom of navigation provided to all sites that can master the tools.

When you look closely at a computer network, a proxy server is a computer or simply an application program that the customer requests transmission service requests to other servers. It also serves as an intelligent gateway as well.

A proxy is a web proxy that will allow the school trains students to bypass the restrictions of a firewall at school. These proxy sites allow free flow to navigate and access your Facebook profile with ease.

When it comes to finding the right school proxy, you must choose between a long list. The reason is that the firewall might even ban certain proxy sites once they are detected.

There are many ways you can use this to their advantage. All you have to do is get the right kind of information and know how to make full use of it easily. There are many other uses of the representation of the school. You can play your favorite games on the network, network with other friends and people around the world. You can play Diablo 2, Starcraft, Red Alert, Warcraft 3, Dota, Dawn of War and all sorts of other massively multiplayer role-playing games online, such as Ragnarok, Word of Warcraft, Age of Conan and many other games that are blocked by the school or firewall.

Source from Articlesbase

Friday, May 21, 2010

Home Networking - Firewalls



Contractors use the word firewall for a physical barrier to keep the fire from spreading from one room to another. Home networks also have (or should have) firewalls. These hardware, software or a combination that protects a network from unauthorized access and malicious software.

computer firewall that protects the system in two ways. You can keep the programs to make Internet connections, which maintains an infected program or a virus spreading. More commonly, however, the purpose of the network firewall at home to keep the system safe outside attempts to access it. unauthorized access attempts can be obtained from the Internet, other computers on your home network or even "wardrivers" (hackers go through the computer without cables) that can simply be guided by a virus and networking.

Protect the network from certain types of access may make it harder for them even if they can access their course network.Of, blocking all traffic in both directions would be a useless network. Network security is a balance between maintaining some of the traffic to allow access to the traffic you want. Where exactly this balance is a difficult question. A number of more or less standard items that people should be careful when trying to implement effective systems of firewalls. The two most common are TCP and UDP protocols.

UDP is a transmission protocol and does not require any two-way connection. TCP, but is two directions. UDP can be input or output, for example when you ping a server. To open a port on the firewall, it is usually necessary to specify both the port number and protocol. What we should aim to close the doors we do not know for sure that you need to open. Only open ports or allow certain protocols in the direction you need - and only when you know what you do. Closed in both directions must be the rule, unless it is necessary.

HTTP: This is the standard protocol used for data applications on the Internet and send (upload) or receive (web pages, downloading). Your system should have opened port 80 for HTTP firewall. Secure HHTP (or HTTPS) uses port 443 instead. Port 8080 is also common to HTTP connections.

FTP is commonly used to transfer files across networks, you must open the port 20 to this Protocol.

Uses SMTP to send and receive email, this protocol requires port 25 to be opened.

POP3: Used for many email systems. Open port 110 for incoming POP3 traffic.

DNS: DNS needs to send and receive, to perform the function of translating IP addresses to domain names. Open port 53 in both directions for this important functionality.

DHCP: If your IP address is assigned dynamically, not static must open the door 68 to allow this protocol.

DOOM: If you play Doom, you'll have to open port 666. Otherwise, as with any other port that is not used, is closed in both directions.

Many other ports are used for various services, such as port 1433 (Microsoft SQL Server requires this). Any program that needs a particular port must be mentioned in the documentation. Be careful when you configure the network firewall system, why do provide good security for you!

Source from Articlesbase

Thursday, May 20, 2010

Firewall Spam – Get Rid of Those Malicious Spams!



Cyberspace is now attacked by viruses, spam, Trojan, spy items, etc with the main aim of causing problems for Internet users. Internet users thus feel very insecure and always in fear against this software, entering the operating system or the mailbox without your permission. The need for updated and efficient spam blockers, spam firewall, anti virus and pop-ups are very important to ensure the safety and protection against these hawkers. The latest products and powerful to eliminate the spam that are programmed to keep the spam mails at bay, but only the spam filter.

And the establishment of computer firewall blocks insecure and doubtful websites also discovered a spam firewall to block all spam mail to reach the inbox of users. spam messages are sent primarily for business purposes. But they can also transmit deadly virus and spy products, which could cause rupture of the system, or help transform the high-security information to anyone outside the computer that might misuse their personal information.

Spam can be sent to the mass of electronic identification that sellers receive various means. Most of them are useless and irrelevant ads ads. Whether they are relevant, or dangerous to be addressed in time with a firewall and spam should be kept away, and will save much of your valuable time. Anti spam exchange server are also useful for spam and firewall protection and keep out spam. These anti-spam application are also available as a free good. But if the utility is required for a wider problem, as a corporate environment, it is always good to buy business software companies that deal specifically with this software experts.

Spam Firewall can protect and prevent the mail that do not belong to your contacts list. They are also more efficient than general software, anti-spam filtering is just spam. But the application of Spam Firewall is much more potent in blocking or stop spam and allow only actual messages in your inbox. These applications can also collect mail from the spam that you might have accidentally touched the case. Spam Firewall new update is definitely a safe and guaranteed to protect your computer and your spam mailbox irrelevant. So, without wasting time, manage your inbox a firewall spam protection free download from the Internet. So, get up and run!

Source From http://www.articlesbase.com/security-articles/firewall-spam-get-rid-of-those-malicious-spams-201703.html

Tuesday, May 18, 2010

Why Should You Install a Firewall in Your Computer



You think your PC is secure because only you have access to it. You visit only secure sites. You do not open an email attachment without checking it for virus. Think again. Without proper protection for your system, when you go online, you are running the risk of malware and virus attacks. When you are online, clicking on that seemingly innocuous looking "check your computer for viruses" may lead to system malfunction, data theft and worse - losing your precious data for ever. For most of such ads are viruses and spyware in disguise waiting to take control of your system. When you use the search engines too the scores of sites that are listed may not be authentic ones. They may be designed to install a malware once you click anywhere in that site.

You cannot stop using the Internet, for the Internet holds large amounts of information and you use it at home and in business. Intelligence lies in knowing you are vulnerable when you connect to the Internet and taking precautions to protect your system.

So, what do you need to protect your data and system?

A firewall. A firewall can help you protect your system against hostile intrusions from the Internet by preventing unauthorized access to your system.

As you know, the Internet is a network of networks, and thousands of computers have access to your computer when you are online. Viruses can be written by anyone who has some programming skills. And you will have hundreds of them out there who think creating a virus is accomplishing something. So they spread the virus in the network and without a firewall in place, they have direct access to anyone on the Internet.

But with a firewall in your system, those malicious programs will have to return disappointed. For a firewall inspects and filters the information and all traffic routed between the Internet and your system to see if it meets certain security criteria. If it does, it is allowed otherwise it does not. A firewall is literally a protective fence that keeps off malicious programs from your system. That's why it s called a firewall.

Installing a firewall is easy and they are highly configurable. Sometimes it's frustrating to install a new program that you are not familiar with. In that case, you can get assistance from technical support providers for firewall installation and configuration. That shouldn't be costing you much. And once installed, they don't require much change in the settings - for most of us home users, it s safe enough to work with the default settings provided by the firewall program unless there is a specific need to change it.

With your PC protected by a firewall, you can relax, your PC is highly protected and there are no more security holes in your system to be exploited. You are secure!

Written by Thendral

Read more: http://www.articlesbase.com/computers-articles/why-should-you-install-a-firewall-in-your-computer-744107.html

Monday, May 17, 2010

Checklist for Internet Security Software and Firewall



If you connect an unprotected computer or computer without any security software to the internet, cyber criminals, hackers or identity thieves can attack your computer within seconds. So, to avoid such security problems and identity theft, you should have security software with at a minimum, firewall, antispyware and antivirus protection.

There are various internet security softwares available on the internet with basic firewall protection. However you should also look at the additional security tools and features available with these softwares for complete security on internet. The checklist below can help you to select the proper security software for your computer, so that you can go online and surf the internet with confidence.

Firewall:

Firewall is necessary to block the unauthorized access to your computer data. It monitors the inbound and outbound traffic from your computer to the internet and blocks any suspicious traffic coming to your computer. Firewall could be network and program firewall and operating system firewall.

Network and program firewall:

Internet security softwares provide network and program firewall to protect your network from suspicious traffic and to shield your programs from malware. It should be a multi-layer firewall or with multiple layer of security for high level of security.

Operating system firewall:

Some internet security software also provides operating system firewall to protect your operating system. This tool blocks any malicious software from causing damage to files in your core windows operating system. It also blocks entry of hard to remove spyware with kernel-level threats to computer to protect your operating system from any damage.

Full Stealth Mode:

This feature is required to make you invisible to hackers, so that you can surf the internet without any fear of getting hacked.

Antivirus:

Antivirus is necessary to protect your computer from damages by viruses, worms and trojans. You should never connect your computer to the internet without updated antivirus program with the latest definition files.

Antispyware:

Integrated antispyware is required to protect your computer from spywares and intruders to protect your personal information. Spywares get installed on your computer without your knowledge and gather your personal data, information and web activities and transmit that data to others.

Complete Spy Site Blocking:

Spyware distribution websites are the main source for spywares. This feature blocks these websites and also blocks you from visiting these sites by mistake or redirection to websites, which distribute spywares.

Identity theft protection:

Identity theft protection is necessary to protect your identity and personal information on your computer. With increase in e-commerce, online buying and credit card usage on internet, identity theft could be major problem. So, nowadays, protection against identity theft is must while accessing the internet.

Real time updates:

Real-time security updates for protection against any new possible attacks and viruses.

Anti Spam and Anti Phishing and Email protection:

It protects you from phishing e-mails and e-mail fraud.

Instant messaging protection:

IM protection protects your instant messaging session from hackers, spammers, spywares and virus attacks. You can also use this tool to restrict your kid to use instant messengers only with trusted people.

Parental control:

This feature is necessary to prevent your kids from accessing inappropriate websites and objectionable content on web sites.

Credit Card Monitoring alerts:

Some internet security software provides credit card monitoring alerts which alert you if your credit card number appears online. This tool is very useful if you use your credit card on internet for transactions.

Although firewall, antispyware and antivirus protection is must in any internet security software, but additional security tools can also help you to improve your security on internet. With this checklist you can make the right choice for your security software program.

For more information on internet security softwares with all these features for complete security, please visit www.truevalue4money.com/pcprotect.html website.

Written by Stephen Thomson

Read more: http://www.articlesbase.com/security-articles/checklist-for-internet-security-software-and-firewall-124504.html

Broadband - How Firewall's Work



If you are a regular internet user, be it at home or at work, chances are you have heard the term “firewall”. When asked what exactly a firewall is though, many people have a limited amount of knowledge, knowing only that it is something that protects computer systems.

Quite simply, this is correct; the basic principle behind a firewall is to act as a barrier between the internet and a local computer
. This local computer can either be a standalone system, part of a home network or a larger office network.

Regardless, a firewall works the same way by keeping out unwanted hackers and/or preventing users from performing certain actions (e.g. viewing offensive websites or downloading programmes).

A firewall can either be located on a computer system, (known as a software firewall), within a network router, (known as a hardware firewall), or both.

Nearly all of today’s network routers have built in firewalls which can be configured via the computers internet browser to which they are connected. Most home computer systems are pre-installed with a software firewall; there is also a great deal of free firewalls available on the internet.

Both hardware and software firewalls work in similar ways to keep your system secure and for maximum security a combination of the two is recommended. In order to protect your system a firewall uses one or both of the following methods:

* Packet Filtering is used to compare data (or packets) that reach the firewall to predefined filters, if the data complies with the filters then it is allowed through, otherwise it is dropped.

* Stateful inspection is a newer technology which unlike packet filtering does not analyse the whole packet, but just key parts. Specific characteristics of outbound packets are compared to inbound packets and if the comparison is acceptable the data is allowed into the network, otherwise it is dropped.

By using the above technologies users are able to allow or deny traffic into and out of their network based upon IP addresses, domain names, protocols and ports.

Having a firewall set up on your broadband connection protects you from a whole host of problems such as remote login, virus's, DOS attacks etc. By protecting your broadband connection you can make your browsing experience much safer and faster. If you feels as though you could be getting a better a deal elsewhere then compare broadband online today.

Written by Liam G

Read more: http://www.articlesbase.com/communication-articles/broadband-how-firewalls-work-479236.html