Wednesday, September 10, 2008

Windows Vs. Linux - Hosting

When you choose a hosting package, you've basically got two choices of platform: Windows or Linux. Each offers a variety of options for your needs, and as long as the server is reliable and your site stays up, it doesn't matter to most people what's really behind the site.
When it comes to choosing an OS for hosting, it's best to analyse what do you want to do with the server. If you are looking to use Microsoft applications, such as SharePoint or ASP.NET framework, then you'll obviously go with Windows, but Linux can be cheaper if all about is cost and money, Apache is a good example of this - not cost for licensing.
Home users have equal reason to go with Windows or Linux. Windows facilities a variety of designs and managment through a drag and drop feature via FrontPage, .NET, SharePoint and the new Expression Web. Linux provides more scope for fiddling and experimentation. In reality, Linux will be more suited to those who appreciate a freedom to build and adjust through scripting and automation.
Another consideration is what you use on your desktop. According with a friend, it's much easier to develop websites on a Linux server and vice versa when it comes to windows, because it reduces corruption on file transfers, and it's easy to stick with a technology that you already know.

Looking for a web host? Here are some options
  1. 1and 1 - www.1and1.com
  2. Blue Host - www.bluehost.com
  3. Go Daddy - www.godaddy.com
  4. My Hosting - www.myhosting.com
There are many hosting companies that provide many services; my suggestion is to compare, research and get a good one with a good customer service support.

Friday, September 5, 2008

Do Passwords Provide True Protection?

Your Password it may not be as private as you think. Getting around the password protection in such a programs as Office and Quicken is often as simple, as click and crack. If you really want to make certain that your files are private, there are some apps that you can give them Fort Knox protection.

The Web is filled with tools, like ElcomSoft Products, www.elcomsoft.com, which can puzzle out the passwords. What the program apps does is first tries to open the file using a list of typical passwords; failing that, it attempts to figure out the passwords through brute force, testing every possible combination of numbers, letters, and special characters until it finds the right one. Another product, is on the web called www.passwordnow.com, can hack passwords for office files within 36 hours.

Of course, these companies offer this products at people who have forgotten their passwords. But the programs can also be of service to someone whose intentions aren't good. Also, I found this webpage called www.internals.com/utilities_main.htm, interesting website that allow you to download few utilities that can be helpful to troubleshoot your computer but also dangerous for otherones whose intentions are crueless.

As mention, the web is filled with many apps, just google it and find out how many software is out there.

Security "Are you worry?"

Today's technology is high advanced that it takes a multifaceted strategy to fight complex range of security threats, which can no longer be neatly separated into categories. Worms may ride in with spam, and spyware apps may unleash Trojan horses.
You can build your system's defenses with stand-alone anti-virus, anti-spyware, and firewall products, but running them can be a complicated and expensive task. Also, attempting to install and run a full featured security can be a dauting proposition, especially if the task involves remplacing one vendor's product with another. So, here are 10 tips you can do:

1. Trash your old security software: You should run one anti-virus at a time. Completely unistall one anti-virus and reboot your PC before installing another one. Also, turn Windows' firewall off if you are using another company's firewall.

2. Check your hard drive's health: Is good to run Windows' Chkdsk utility several times before installation to rule out or repair problems with your system's hard drive.

3. Update Windows: Run Windows update to make sure your system is completely up-to-date, before installing any security software.

4. Make an ID Card: In case you need to call tech support, make a record of the install date, serial number, etc.

5. Run an extra anti-spyware, if you wish: It doesn't hurt the system to run an extra spyware, but make sure you are not running both at the same time.

6. Stay Networked: PCs connected to a network, like VPN, may have custom network settings. (Most products have a wizard to do this), so don't worry.

7. Handling printing and file sharing: Your firewall should have predefined profiles that enable this task; if it doesn't, you need to create it manually by getting inside your firewall that permit outbound TCP traffic to port 1023 and inbound traffic to port 139.

8. Document the problem: If a product gives you an indication of a problem, like error message or malware warning, write down exact wording of the entire message, if you can take a screen shot. Also, research the problem on the web, you might find that you might not be the only one with the same problem.

9. Send away the bad stuff: If you find suspicious files or e-mails messages, don't open and investigate them yourself. If you don't know how, send them to your security provider, making sure to follow the proper procedure (Remember, you bought the product and sometimes we don't use this service, but it's good to investigate, you will be surprise what you can find out).

10. Keep the subscription current: Security products are only as effective as their latest update, and updates are typically not provided after your annual subscription expires.

Thursday, September 4, 2008

Identity Theft

Today’s technology can make it difficult for you to protect your personal information. Identity thieves ussually use many tech methods to obtain your identity. For example, if someone steal your wallet or purse, or they steal your mail or a thief will break into your house or car with the porpose just to steal your personal information. Here are the most common methods used by ID thieves to steal your identity:

  • “Skimming” your credit cards from anywhere you shop
  • Shoulder shopping your pin at the ATM, or store
  • Hacking into your computer at home or at work
  • Stealing your laptop or cellphone
  • Sending you fake e-mails to trick you to get information
  • Stealing information from companies where you have account
This are a few common methods they used. The problem is that once a thief has your information, it can cost you time and money to get your identity back.