Posts Tagged ‘access’
Control Panel provides the tools to “make or break” a system. But, if feel worried that someone else using your PC is more likely to break something if he has access to the Control Panel then why don’t you forbid all access to it?
First, click the Start button and type in gpedit.msc in the Start menu search box and press Enter:
Read the rest of this entry »
We will create a simple php application that uses PHPMailer to connect to Google\”s smtp server to send out an email. You can use this for any email provider who allows SMTP access. This is useful from an e-commerce point of view, to send out emails that will not go straight into the recipients junk mail inbox. This method is preferred over sendmail which uses and SMTP relay. If you are hosting your application on a shared host, using PhpMailer will get around email limits set for sendmail by your hosting provider. Read the rest of this entry »
Many applications need to have access to Internet to work properly. However a lot of them don’t need that access or you may wish to temporary disable it for some reason. Well this is actually a matter of a few clicks in Windows 7. Read the rest of this entry »
Not all documents are for the eyes of everyone. Sometimes we want to restrict the access to some documents. Or we want only a few people to be able to open them.
Well, lucky for us MS Word 2007 has a built in encrypt feature, and in this tutorial I will show you how to encrypt your document in MS Word.
Click the Microsoft Office button (upper left corner), select Prepare and click Encrypt Document: Read the rest of this entry »
This tutorial will show you how to install your own SSL certificate under Opera Browser. Opera Browser is the third most popular web browser in the world after Internet Explorer and Mozilla Firefox. Nowadays SSL certificates are widely used for personal identification, for example, for online banking systems. The certificate ensures that the person connection is the one who should only have access to the system.
To get to the proper place you must go to the Opera browser Button at the top left corner. You go to the Settings menu then select Preferences Read the rest of this entry »
Google Chrome is a web browser descended from the Chromium open source project, managed and developed by the Google Inc.
This tutorial will show you how to install your own SSL certificate. Such certificates are widely used for personal identification, for example, for online banking systems. The certificate ensures that the person connection is the one who should only have access to the system.
To get to the proper place you must go to the browser Options. You click on Customize and Control Google Chrome menu then select Options Read the rest of this entry »
After official iPhone 3G launch and after first euphoria waves in the network was started to appearing more sobered opinions.
Non-Government Organization – Free Software Foundation, founded in 1985 by Richard Stallman supports open source software projects and distribution. Their website says about iPhone 3G:
– iPhone will fully block and suppress open source software. Authors of any software application for iPhone have to pay taxes to Apple, and Apple says what can be installed on iPhone of customers.
– iPhone support Digital Restrictions Management (DRM) – technology for controlling the access to different digital content like music, software, video, etc.
– iPhone knows user”s geo-location and make possible for 3rd party company to track user position.
– iPhone cannot access to files, based on open source standards like Ogg Vorbis and Theora;
– iPhone is not the only one possibility.
Better possibilities are available, which respects personal freedom of users. They don”t spy him. These devices using open source software and plays free formats – Neo FreeRuner for example. Read the rest of this entry »
Windows XP like any other modern operation system works with users accounts with entire support and management tools of user account.
Also like other operation systems Windows XP have pre-setuped ”Guest” account which is some kind of basic, limited account with predefined low privilege abilities.
Nevertheless of this basic user abilities, this Guest account can be used by some harmful attacker for bad purposes about your system durability.
Everyday in security bulletins in websites oriented in safeness and security will come up news about security holes in Microsoft products and especially in Windows.
This operation system is most popular and her absence of security make very appetite for hackers. The new users, currently buying a PC with preinstalled Windows and which hardly start "walking" in Internet space can become a easy prey for ill-wishers.
This Article is oriented to home users with internet access through local area network (LAN). We will make Internet & Network security of Windows XP / 2003 more strong, will forbid danger services and protocols, will set up and tweak security options. Also we will filter every opened ports and will stop unneeded features offered by Windows and not so safe about network security. When we finish with this your PC will become a fortress. But here someone will say that every firewall program can protect the system, even we don”t have to making any set ups, any modification of the system. This is true. The firewall will protect you from outside attacks and will stealth the opened ports, but we will secure your Windows on higher level and even without firewall, the ports will be closed and most of features for remote access (most of this are implemented like services and protocols) will be stopped.
If you still have Windows without any updates ia better to do this immediately. Download the latest service pack for your Windows and install it.
Close all opened ports
The communication between remote computers connected in your LAN or within Internet realized by this ports. Think for this ports like small doors. Each port have a number and most important ports have names.
Stop the Guest Account
This is a special, system account, which cant be deleted or changed. You can only disable this account.
Change the port of Remote Desktop.
If your Windows wasn”t updated soon someone can easy exploit this service and take remote control of your computer without any limitation.
In most networks NetBIOS is not used and you can stop it. If after this your internet connection was droped, just turn it on back.
Like all we know, Windows offer features for sharing folders and drivers. But this is to risky, especially the administrative shared in professional, corporate and server versions of Widnows. This shares provide access for administration of the system, but can be used for unauthorized access or from viruses and trojan horses.
Protect from Buffer overflow attacks
If you have Windows XP with SP2, you can stop this kind of attacks by software method. I say "software", because also have a hardware method.
Install Anti-virus and firewall programs
If you already don”t have it – the moment was come. After all of this lets finally close the potential danger hacker doors. Choose some popular and proved anti-virus and firewall software and install both. Also you have to know that most often updating of this software programs will give you better protection.
Now, if someone want to hack your system, first he have to discredit the firewall (i suppose you don”t have firewall and now you will install) and next he have to find some security hole in the system. This will be more hard for the hacker if you do all described in this article about improving security of your system. Read the rest of this entry »