Tuesday

Windows Firewall Security Protect Your Network System

Windows Firewall Security Protect Your Network System

Every  computer has a firewall,  for much the same reason – to keep you and your data from being burned by hackers and thieves who are the unfortunate creators of “Internet combustion” and destruction.
Without proper configuration, a firewall can simply become another worthless tool. Standard security practices call for a "default-deny" firewall rule, meaning that the only network connections that are allowed are the ones that have been explicitly okayed, after due investigation. Unfortunately, such a setup requires detailed understanding of network applications and a great deal of time and energy to establish and administer.

The firewall, a “combo” approach of software that regulates and monitors hardware and communications protocols, is there to inspect network traffic and all the “packets” of information that pass through to your inner sanctum, your CPU and hard drives. A firewall will rule out the possibility of harm, or at least greatly minimize, by noting and quarantining potentially harmful “zones” and will either deny or permit access to your computer based on the current set of rules that applies at the time, depending on many (very many) factors.

Basic tasks and settings

The basic task for a firewall is to regulate of the flow of traffic between different computer networks that have different “trust levels.” The Internet is full of countless overlapping zones, some safe and some totally deadly. On the other hand, internal networks are more likely to contain a zone or zones that offer a bit more trust. Zones that are in between the two, or are hard to categorize, are sometimes referred to as “perimeter networks” or, in a bit of geek humor, Demilitarized Zones (DMZ).


Without proper configuration, a firewall can simply become another worthless tool. Standard security practices call for a "default-deny" firewall rule, meaning that the only network connections that are allowed are the ones that have been explicitly okayed, after due investigation. Unfortunately, such a setup requires detailed understanding of network applications and a great deal of time and energy to establish and administer.
Who can do what?

Many businesses and individuals lack sufficient computer and network knowledge to set up a default-deny firewall, and will therefore use a riskier but simpler "default-allow" rule, in which all traffic is permitted unless it has been specifically blocked for one of a number of possible reasons. This way of setting up a firewall makes “mysterious” and unplanned network connections possible, and the chance your system may be compromised becomes much more likely.

Firewall technology had its first growth period in the computer technology revolution of the late 1980s, when the Internet was a fairly new in terms of its global reach and connectivity options. The predecessors to today’s hardware/software hybrid firewalls were the routers used in the mid 1980s to physically separate networks from each other. However small the Internet began, it was ultimately undone by supremely fast growth and the lack of security planning, and therefore there were the inevitable breaches caused by older (“prehistoric”) firewall formats. Fortunately, computer pros learn from their errors, and the firewall technology continues improving daily.

Hard Disk: Where Store Data In A Computer

Every computer has a hard drive. They are the main storage facility for your computer. Whenever you install a new program, save a document, or download something from the internet, it is stored somewhere on the computer hard drive. The storage size of a drive is in typically megabytes (1MB equals around one minute of music), gigabytes (made up of 1,000 megabytes), and terabytes (One terabyte equals 1,000 gigabytes). You

might expect that the greater the storage capacity the better the drive, but that is not necessarily true. Since so much that your computer does is dependent upon the hard drive, the speed of the hard drive is critical. Hard drive speed is measured in the rate per minute (rpm) that they spin. Most drives will spin at 5,400 or 7,200 rpm but premium specialty drives are available at 10,000 or 15,000 rpm. With a faster hard drive, data can be accessed faster, thus speeding up almost everything that you do on your computer.
While every computer has a internal hard drives, external hard drives are also available which can offer many of benefits. Many users safely store and back up all of their important data against disk failure by using an external hard drive. Additionally, one of the best ways to speed up your computer is by freeing up your hard disk. Many people choose to use an external hard drive to boot up their hard drive if their internal drive is slower. For example, if their internal hard drive spins at 5,400 rpm, they could use an external drive that spins at 7,200 rpm to boot their computer, a process that can often take several minutes, in a much quicker time.



Both internal and external drives have their benefits. Internal drives are safe because of their secure and stable casing. Plus, with the fan cooling available on internal drives ensures that the drive stays cool. External hard drives are housed in boxes outside of a computer and are connected by firewire or USB drives. The potential benefits of an external drive include improved performance if the external drive is faster than the internal drive on your computer, durability versus many laptop hard drives which can be jarred as they are moved and the ability to be used as backup storage.

Software Outsourcing:How Success Life

software outsourcing Company, software outsourcing, Software Development Outsourcing, Software IT Outsourcing, Offshore Software Outsourcing IT, Offshore Outsourcing Services India, Offshore software outsource.
Software outsourcing is a job contract awarded by a contracting party from a country to a company having a team of human resource with a definite skill set sitting in another country. On completion of the proposed job the software is shipped to the clients organization.

The need to rapidly complete large development projects has cause many organizations in recent years to consider outsourcing work rather than perform development in-house. A major reason for doing this is the reduction in costs that can be achieved, compared to those incurred if the work is executed in their own IT department. Development time can also be shortened, especially if the company does not already have the skills required to undertake the project. Thus offshore software development has seen tremendous growth in the last few years. Offshore outsourcing provides the ability to hold skilled overseas staff at a small part of the human resource cost which is elating to several entrepreneurs.

So the key to success of a offshore software project is the smooth flow of communication between the offshore vendor and the onshore client. Continuous constructive dialogue between the two sides is not limited to verbal communication, but is aggressively pursued in writing, meetings and conferences. So local presence of the offshore vendor can be a huge advantage for the client though it might cost the client more.



The client should be very careful about the project budget. Proper budget forecast includes vendor rates, risk involvement, scope of change in the project specification and vendor resource matrix. The financial terms should also be decided and agreed upon beforehand. Both the parties should maintain adequate transparency in order to achieve successful completion of the work.

Further, offshore development requires a methodology quite different from local development. For example, an onsite development team can resolve critical issues by meeting in a conference room. When teams are diverse, you have to create a process that automatically keeps everyone in the loop.

So many companies are gradually setting up their own offshore development centers. Though it is not always a feasible solution to small or medium enterprises. They can consider the option is of taking a stake (in the form of equity partnership or acquisition or merger) in an existing offshore company with an impressive employee retention rate and a stellar track record, ensuring quality management and a loyal workforce.

Provided you adhere to process and ensure accurate and prompt completion of projects, there is a significant savings from moving work offshore. The hardest part to quantify is the ability to get something done quickly and getting it to market ahead of your competition. For others with the time to learn the culture and establish relationships, the need to have at their bidding a full-fledged offshore team, and the money to invest, starting their own offshore center makes sense.


Computer Virus :What Is Computer Virus

 What Is Computer Virus And How Can Attack Easily And How To Fix Them

Commercial and shareware programs have been created with the sole purpose of detecting and fixing suspect programs that might be viruses infected. These detection programs should be ran when any disk is put into your disk drive or every time your computer is first started up each day to scan the computer's hard drive.
 computer virus as a tiny computer program designed to perform mischief. Most computer users have heard about computer viruses. A computer virus is the result of a destructive program that someone has written and placed inside a computer program, which unsuspecting people then place in their computer system.

When this program enters your computer through your input device, it hides in your computer's memory and starts to duplicate itself like a disease. When you save your data, you also save the virus. Slowly but surely, the virus crowds out your data and causes major system problems. 

Some viruses can erase all the information from the place where it's stored on the computer's hard disk. But each virus is different. Some display strange messages on your computer screen; others make small changes in your computer programs.

Where do these viruses come from? They certainly don't float around in the air like some human viruses. Instead, like any other computer program, a human must create them.



Why do people create them? It's hard to say. Some people create these programs out of meanness to get even. While others create them just as a challenge. Why do you thing people create these very destructive programs? How does your computer get a virus? Almost exactly the way humans do. The computer gets exposed to one. Well, its not quiet that easy.

Many people get contaminated computer programs by trading programs with other people. Others get contaminated computer programs through the use of modems, which allow computers to communicate over telephone lines (ie. The Internet)

Most of the time, programs that arrive by modem or a trade are perfectly safe to use. However, you do stand a chance of getting a program that has been tampered with. Here a computer program virus is hiding inside the normal program. Many computer programs that are traded were copied illegally.

When this program enters your computer through your input device, it hides in your computer's memory and starts to duplicate itself like a disease. When you save your data, you also save the virus. Slowly but surely, the virus crowds out your data and causes major system problems.

The virus can't affect the computer's ROM (Read Only Memory), but it can affect RAM (Random Access Memory) and your computer disks. When your shut off your computer a virus that has been picked up will be lost, just like any other memory that is held in RAM.

If the virus is on your disk or hard drive, it will return to the computer when you use the program again. If you switch from one program to another without shutting down the machine, the virus will attach itself to the new program. In this way, it can slowly infect all your programs before you know that it exists. Today millions of dollars are being spent to rid and protect computer systems from these virus programs.

Send an Error Report to Microsoft How to Fix This Problem

"How to Disable "Send an Error Report to Microsoft"

To disable the stupid feature in WinXP which tries to send a report to
 Microsoft every time a program crashes you will have to do this:


* Open Control Panel

* Click on Performance and Maintenance.

* Click on System.

* Then click on the Advanced tab

* Click on the error reporting button on the bottom of the windows.

* Select Disable error reporting.

* Click OK



BlogCatalog

Education