Tag Archives: connection

InternetOff – Or Not?

imageI’m not in the habit of leaving the door to my home wide open – unlocked perhaps – depending on circumstances. But wide open? No. Nor, have I ever developed the habit of leaving my Internet connection wide open – unless I have a need to do so. Otherwise – I break the connection.

My Tablet computer is subject to the same set of rules. Unless I’m actively engaged with the Internet – off goes the Wi-Fi.

As a one-time user, and a big fan of the free ZoneAlarm Firewall (since the “olden days”), disconnecting from the Internet was as simple as flicking a switch from within the ZoneAlarm GUI –  “Stop All Internet Activity”. Until, that is, ZoneAlarm underwent “improvement” to the point that it became useless for my needs. But, that’s another story.

Next up, on the Firewall scene, was PC Tools Firewall Plus which offered the same – “switch off” capabilities. Unhappily though,  PC Tools Firewall Plus, went the way of the Dodo Bird (on Windows 8) – at least as a stand alone application.

Now running to catch up, I finally relented and activated Windows 8 internal firewall which, with the addition of the freebie application, Windows Firewall Control, suits my needs – for now.

image

Still, this is a fairly clunky method to accomplish a simple task such as shutting down a Network Adapter (Ethernet Card) – there has to be a better way. Other than pulling the Cat 5 cable.  Smile  And, there is.

Regular reader Hipockets, has reminded me (thank you Sir) that the freebie application – InternetOff – is designed to do just that – turn off an Internet connection.

Installation:

A couple of clicks ……..

image

…………… and, you’re finished.

image

Following the installation, you’ll find a “Globe” icon in the system tray which when activated, will bring up …….

image

Click – and you’re done – as shown in the following screen captures.

image

image

Reverse the process and, you’re back online. Quick, simple, and painless.

System requirements: Windows 2000, XP, Vista, Win7, 32/64 bit (Tested on Win 8/32 bit under which the application must be run as an administrator).

Download at: The developer’s site.

From the – “he got there first files.” Good friend and fellow blogger, Rick Robinette, posted on this application previously. You’ll enjoy reading Rick’s take on this neat little freebie.

13 Comments

Filed under 64 Bit Software, downloads, Freeware, Interconnectivity, Utilities

How to Speed Up Your Downloads

Twiddling your thumbs while you download? Then read on. Guest writer Jared Scott describes a solution you may not yet have considered.

imageDo you ever find yourself in a rush for no reason?

Sometimes I find myself glaring at the microwave impatiently waiting, as if it is plotting against me in some attempt to keep me from eating.

It’s easy to forget that just having the ability to microwave something is an advance in food preparation and the time it takes.

Improvements in technology have spoiled us.

Our generation is on the go like never before. We are always mobile, always looking for the fastest option.

I get angry at my computer daily for almost the same reasons I do my microwave. While it is not withholding food from me, it is stealing my time. It keeps me hostage while it restarts, slowly returning to a functional state.

If you have ever used a computer this is something you have probably experienced and can relate to as well.

Another time consuming task that I prefer not to spend my time doing is downloading.

Have you ever downloaded something before and it seems to take an eternity?

This is another frustrating problem that is usually the result of a slow or weak internet connection. Sometimes I find myself counting with the “Percentage Complete” pop-up window as I download updates for my computer.

Downloads can take an even larger amount of time depending on the size of the file.

Sometimes I have left my computer downloading something overnight only to find it still in progress the next morning.

If we have these super fast Internet connections with all this bandwidth, it seems like a shame not to be able to use them to their full capabilities.

Usenet – The past is the future.

Most people remember Usenet as the original social network. The Facebook of its day.

The modern Usenet however is a powerful storehouse of information that allows you to download as fast as your internet connection will allow.

By providing you a direct (encrypted) connection to a commercial grade server farm, you can push the limits of your Internet connection.

Peer-to-peer technologies clog up your speed by sharing connections with others.

With Usenet, you are connecting directly to the source and are not sharing anything with anybody else.

Like a fine wine, Usenet has certainly gotten better with age. Investments made by premium providers have allowed Usenet to move more than 9 Terabytes of information on a daily basis.

It has adapted to meet the needs of our modern world.

When Usenet first began it was a much like a social network. Users posted messages almost like posts in a web-based forum.

Usenet evolved to incorporate the ability for its users to upload all types of audio, video and image files as well.

While the World Wide Web became the place we get our “news” from, Usenet transformed into a global repository for information.

Usenet survives in a fast paced world because it satisfies our need for speed.

Not many things last in this world.

But when something works, it works. Usenet hasn’t been around for 32 years for any other reason. It has continued to evolve and compete with emerging technologies.

And if you are looking for speed in downloading, Usenet is second to none.

Jared Scott is the public outreach manager for Binverse.com a leading Usenet provider. You can follow his updates on Twitter.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

14 Comments

Filed under downloads, Encryption, Geek Software and Tools, Guest Writers, Interconnectivity, Windows Tips and Tools

MagicJack – Is It Worth The Money?

Popular guest writer Rick Robinette loves to fiddle with the latest technology gadgets. In this guest post, Rick gives you his take on MagicJack – the good, and the bad. See what you think.

MagicJack – A device that you plug into your computer’s USB port that enables you to use your broadband internet connection to make FREE local and long distance phone calls. A phone line (standard RJ-11) plugs into the magicJack from a phone. Initial cost is typically around $40 dollars the first year, then $20 a year thereafter. There are other pricing packages available, as well.

magicJack

magicJack

Recently while browsing in the local RadioShack, I could not help overhearing a man and woman asking the salesperson a lot of questions about the magicJack. What they wanted to do was replace the landline phones in their home with a magicJack and this salesperson was laying it on heavy; making it sound like this $20 device was the “ultimate” solution to replacing their landline phone service.

After detecting skepticism from these folks, I could not take it any longer and piped in. I said, “Listen, I have been a magicJack owner for over a year.  It does work; however you need to know this about magicJack”.

  • This device is dependent on the speed and reliability of your broadband connection and your computer. If the broadband connection and/or computer is under heavy load, then expect problems.
  • This device depends on your computer being turned “on”; however, the service does have voicemail which can be forwarded to an email account (in the event the computer is turned “off”).
  • Call quality can vary; however, on my setup the call quality is better than cellular and most of the time as good (sometimes better) than my landline. Again, this varies, based on the factors previously reflected.
  • I have experienced occasional software issues with the magicJack software, which is driven by the magicJack device itself. Often a reboot of the PC will make it behave itself. When you get this thing, get everything plugged in and follow the registration instructions to setup your “new” phone number.

  • This device will not work through the phone jacks in your house. The salesperson was definitely giving that impression. One thing you can do, is purchase a cheap cordless phone and plug the main base into the magicJack.
  • Services included are FREE local and long distance calls, FREE voicemail, FREE call waiting, FREE Caller ID and FREE Directory Assistance.  Again, this all varies based on factors previously reflected; however these services are included.
  • You are going to see thousands of “pros” and thousands of “cons” on this device. For example, [ SEE HERE ] .  All I can tell you is, it works for me.
  • You are going to read where magicJack computers may analyze the phone numbers you call in order to improve the relevance of the ads you see in the magicJack software.  In other words, this could be a privacy concern.
  • You are going to find at the magicJack.com website, it is geared toward marketing; not tech support.

Is magicJack’s VoIP for you?

In this particular case, I set up a “win-win” situation for these folks (the customer) and the salesperson.

Replacing your landline phones in your home with magicJack, is not a good solution; unless you are living on bread alone (which did not appear to be the case here). Using magicJack to supplement other services you have is a good solution. For example, I dumped my long distance and use MagicJack to make my long distance calls, which is really not that many compared to other people. We also have pay-as-you-go cell phones and can use them in a pinch, if necessary.

I then turned to the salesperson and asked, “What is your return policy? AND, If these people buy this and do not like it can they bring it back to YOU? At this point, I really got the look. Once that was out of the way, I told these people, take this home and play with it and play with it a lot.  If it does not suit bring it back to this guy. They ended up buying it!

To my readers, magicJack does work; however it depends on many variables. If you want to play with one, go to Walmart to buy it.  Their return policy is probably the best around. If you can’t wait and want a decent buy, then check [ HERE ] .

This is a guest post by Rick Robinette, who brings a background as a security/police officer professional, and as an information technology specialist to the Blogging world.

Why not pay a visit to Rick’s site at What’s On My PC. Like me, you’re sure to become a frequent visitor.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

9 Comments

Filed under Interconnectivity, Software, Telephone, USB, VOIP

Another Layer of Internet Safety – Probe Your Ports

Each time that you connect to the Internet you are wandering through a raucous neighborhood which has a reputation for being jam-packed with predators. These predators are intent on stealing your money and personal information, installing damaging programs on your computer, or misleading you with an online scam.

As a savvy Internet user you are, most likely, generally well armed when it comes to ensuring your system is not open to compromise, or exploitation, by malware in the wild.

It is probable you have protected your machine with an appropriate defense system including a firewall (either software or hardware), a sound and effective malware suite (including anti-virus and spyware), and an additional protection layer against zero-day threats with the installation of an application such as ThreatFire 3, a free application developed by PC Tools.

But you can take your existing defense system to another level by installing a small application which will provide you with the tools you need to analyze the activity on your ports.

There are a number of free real-time port analyzers available for download and the following is a brief description of each. If you are familiar and comfortable with using the Windows command structure, then you may want to try the command line utility Netstat, which displays protocol statistics and current TCP/IP connections. This utility and the process are covered later in this article.

But first:

Process and Port Analyzer is a real time process, port and network connections analyzer which will allow you to find which processes are using which ports. A good little utility that does what it says it will do.

Quick Facts:

View currently running processes along with the full path and file which started it

View the active TCP Listeners and the processes using them

View the active TCP and UDP connections along with Process ID

Double click on a process to view the list of DLL’s

Download at: Download.com

CurrPorts allows you to view a list of ports that are currently in use, and the application that is using it. You can close a selected connection and also terminate the process using it. As well, you can export all, or selected items to an HTML or text report. Additional information includes the local port name, local/remote IP address, highlighted status changes and more.

Quick Facts:

View current active ports and there starting applications

Close selected connections and processes

Save a text/ HTML report

Info on local port name, local/remote IP address, highlighted status changes

Download at: Download.com

Netstat:

Windows XP includes a command line utility which will help you determine if you have Spyware/Botware running on your system. Netstat displays protocol statistics and current TCP/IP connections.

I use this utility as a test, to ensure that the anti-malware tools and Firewall running on my systems are functioning correctly, and that there are no open outgoing connections to the Internet that I am not aware of.

How to use Netstat:

You should close all open programs before you begin the following process, if you are unsure which ports/connections are normally open while you are connected to the Internet. On the other hand, if you are familiar with the ports/connections that are normally open, there is no need to close programs.

There are a number of methods that will take you to a command prompt, but the following works well.

Click Start>Run>type “cmd” – without the quotes>click OK> this will open a command box.

From the command prompt, type Netstat –a (be sure to leave a space), to display all connections and listening ports.

You can obtain additional information by using the following switches.

Type netstat -r to display the contents of the IP routing table, and any persistent routes.

The -n switch tells Netstat not to convert addresses and port numbers to names, which speeds up execution.

The netstat -s option shows all protocol statistics.

The netstat-p option can be used to show statistics for a specific protocol or together with the -s option to show connections only for the protocol specified.

The -e switch displays interface statistics.

Running Netstat occasionally is a prudent move, since it allows you to double check which applications are connecting to the Internet.

If you find there are application connections to the Internet, or open ports, that you are unfamiliar with, a Google search should provide answers. A very good source of information is Steve Gibson’s website, Shields Up, where you can test all the ports on your machine as well as testing the efficiency of your Firewall. Take the Firewall test; you may be surprised at the results!

2 Comments

Filed under Anti-Malware Tools, Freeware, Geek Software and Tools, Interconnectivity, Internet Safety, Internet Safety Tools, Online Safety, Software, Spyware - Adware Protection, System Security, Utilities, Windows Tips and Tools

Free Port Analyzers – Defeat Spyware/Botware


Windows XP has a command line utility which will help you determine if you have Spyware/Botware running on your system. Netstat displays protocol statistics and current TCP/IP connections.

I use this utility as a test, to ensure that the anti-malware tools and Firewall running on my systems are functioning correctly, and that there are no open outgoing connections to the Internet that I am not aware of.

How to use Netstat:

You should close all open programs before you begin the following process, if you are unsure which ports/connections are normally open while you are connected to the Internet. On the other hand, if you are familiar with the ports/connections that are normally open, there is no need to close programs.

There are a number of methods that will take you to a command prompt, but the following works well.

Click Start>Run>type “cmd” – without the quotes>click OK> this will open a command box.

From the command prompt, type Netstat –a (be sure to leave a space), to display all connections and listening ports.

You can obtain additional information by using the following switches.

Type netstat -r to display the contents of the IP routing table and any persistent routes.

The -n switch tells Netstat not to convert addresses and port numbers to names, which speeds up execution.

The netstat -s option shows all protocol statistics.

The netstat-p option can be used to show statistics for a specific protocol or together with the -s option to show connections only for the protocol specified.

The -e switch displays interface statistics.

Running Netstat occasionally is a prudent move, since it allows you to double check which applications are connecting to the Internet.

If you find there are application connections to the Internet, or open ports, that you are unfamiliar with, a Google search should provide answers. A very good source of information is Steve Gibson’s website, Shields Up, where you can test all the ports on your machine, as well as testing the efficiency of your Firewall. Take the Firewall test; you may be surprised at the results!

If you are unfamiliar with, or uncomfortable with using the command structure, there are a number of free real-time port analyzers available for download.

Process and Port Analyzer is a real time process, port and network connections analyzer which will allow you to find which processes are using which ports. A good little utility that does what it says it will do.

Quick Facts:

· View currently running processes along with the full path and file which started it

· View the active TCP Listeners and the processes using them

· View the active TCP and UDP connections along with Process ID

· Double click on a process to view the list of DLL’s

Download at: Download.com

CurrPorts allows you to view a list of ports that are currently in use, and the application that is using it. You can close a selected connection and also terminate the process using it. As well, you can export all, or selected items to an HTML or text report. Additional information includes the local port name, local/remote IP address, highlighted status changes and more.

Quick Facts:

· View current active ports and there starting applications

· Close selected connections and processes

· Save a text/ HTML report

· Info on local port name, local/remote IP address, highlighted status changes

Download at: Download.com

1 Comment

Filed under Anti-Malware Tools, Diagnostic Software, Free Security Programs, Freeware, Interconnectivity, Internet Safety, Internet Safety Tools, Online Safety, Safe Surfing, Software, Spyware - Adware Protection, System Security, Utilities, Windows Tips and Tools

Peer to Peer File Sharing – Evaluate the Risks – Consider the Trade-Offs

Every day, millions of computer users share files online. Whether it is music, games, or software for example, file-sharing can provide computer users with access to a wealth of information.

All that’s required to participate in Peer to Peer file sharing is the installation of the necessary file sharing software such as LimeWire, FrostWire, or Ares, that connects your computer to an informal network of other computers running file sharing software. Millions of users could be connected to each other through this type of software at one time. File sharing applications are often free, and easily accessible as a download on the Internet.

Sounds promising, right? Maybe, but make sure that you consider the trade-offs and the very real risks involved. The number of times I have been called upon to rescue a friend’s computer because of system damage caused by peer to peer downloading, has convinced me to give this form of file sharing an automatic “thumbs down”.

Risk factors

Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share. So be sure to setup the file-sharing software very carefully. If you don’t check the proper settings when you install the software, you could allow access not just to the files you intend to share, but also to other information on your hard drive, such as your tax returns, email messages, medical records, photos, and other personal and financial documents.

It’s extremely important to be aware of the files that you place in, or download to, your shared folder. Don’t put information in your shared folder that you don’t want to share with others. Your shared folder is the folder that is shared automatically with others on peer to peer file sharing networks.

Copyright Issues: You may knowingly, or otherwise, download material that is protected by copyright laws and find yourself caught up in legal issues. Copyright infringement can result in significant monetary damages, fines, and even criminal penalties. Some statistics suggest as many as 70% of young people between the ages of 9 – 14, regularly download copyrighted digital music. I f you are a parent, you bear the ultimate responsibility for this illegal activity.

Adult Content: Again, if you are a parent you may not be aware that their children have downloaded file-sharing software on the family computer, and that they may have exchanged games, videos, music, pornography, or other material that may be unsuitable for them. It’s not unusual for other peoples’ files to be mislabeled and you or your children can unintentionally download these files.

Elsewhere in this Blog you can read an article on child safety on the Internet, and download a free parental control program that comes highly recommended.

Go to: Keep Your Kids Safe with Free Parental Control Bar.

Spyware

There’s a good chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. Spyware monitors a user’s browsing habits and then sends that data to third parties. Frequently the user gets ads based on the information that the spyware has collected and forwarded to these third parties. I can assure you that spyware can be difficult to detect and remove. Before you use any file-sharing program, you should buy, or download free software, that can help prevent the downloading or installation of spyware, or help to detect it on your hard drive if it has been installed.

Elsewhere in this Blog you can read an article on free anti-malware programs, including anti-virus software, and you can download those that may suit your needs.

Go to: The Top 10 Best Free Security Applications.

Viruses

Use and update your anti-virus software regularly. Files you download could be mislabeled, hiding a virus or other unwanted content. Use anti-virus software to protect your computer from viruses you might pick up from other users through the file-sharing program. Generally, your virus filter should prevent your computer from receiving possibly destructive files. While downloading, you should avoid files with extensions such as .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd.

Default Closing Behavior

It is critical that you close your connection after you have finished using the software. In some instances, closing the file-sharing program window does not actually close your connection to the network. That allows file-sharing to continue and will increase your security risk. Be sure to turn off this feature in the programs “preferences” setting. What’s more, some file-sharing programs automatically run every time you turn on your computer. As a preventive measure, you should adjust the file-sharing program’s controls to prevent the file-sharing program from automatically starting.

If you decide peer to peer file sharing is for you, the following free applications are spyware free.

LimeWire

Ares

Share this post :

5 Comments

Filed under Freeware, Interconnectivity, Internet Safety, Malware Advisories, Online Safety, Peer to Peer, Privacy, System Security, Utilities, Windows Tips and Tools

Check Your Ports for Spyware/Botware Free – With Netstat, CurrPorts, Port Analyzer

dosbox.jpgWindows XP has a command line utility which will help you determine if you have Spyware/Botware running on your system. Netstat displays protocol statistics and current TCP/IP connections. I use this utility as a test, to ensure that the anti-malware tools and Firewall running on my systems are functioning correctly, and that there are no open outgoing connections to the Internet that I am not aware of.

How to use Netstat:

You should close all open programs before you begin the following process, if you are unsure which ports/connections are normally open while you are connected to the Internet. On the other hand, if you are familiar with the ports/connections that are normally open, there is no need to close programs.

There are a number of methods that will take you to a command prompt, but the following works well.

Click Start>Run>type “cmd” – without the quotes>click OK> this will open a command box.

From the command prompt, type Netstat –a (be sure to leave a space), to display all connections and listening ports.

You can obtain additional information by using the following switches.

Type netstat -r to display the contents of the IP routing table and any persistent routes.

The -n switch tells Netstat not to convert addresses and port numbers to names, which speeds up execution.

The netstat -s option shows all protocol statistics.

The netstat-p option can be used to show statistics for a specific protocol or together with the -s option to show connections only for the protocol specified.

The -e switch displays interface statistics.

Running Netstat occasionally is a prudent move, since it allows you to double check which applications are connecting to the Internet.

If you find there are application connections to the Internet, or open ports, that you are unfamiliar with, a Google search should provide answers. A very good source of information is Steve Gibson’s website, Shields Up, where you can test all the ports on your machine as well as testing the efficiency of your Firewall. Take the Firewall test; you may be surprised at the results!

If you are unfamiliar with, or uncomfortable with using the command structure, there are a number of free real-time port analyzers available for download. My favorite of the two is CurrPorts since it provides more of the type of information I require.

process-and-port-analyzer.jpgProcess and Port Analyzer is a real time process, port and network connections analyzer which will allow you to find which processes are using which ports. A good little utility that does what it says it will do.

 

 

Quick Facts:

  • View currently running processes along with the full path and file which started it
  • View the active TCP Listeners and the processes using them
  • View the active TCP and UDP connections along with Process ID
  • Double click on a process to view the list of DLL’s

Download at: Download.com

currports.pngCurrPorts allows you to view a list of ports that are currently in use, and the application that is using it. You can close a selected connection and also terminate the process using it. As well, you can export all, or selected items to an HTML or text report. Additional information includes the local port name, local/remote IP address, highlighted status changes and more.

Quick Facts:

  • View current active ports and there starting applications
  • Close selected connections and processes
  • Save a text/ HTML report
  • Info on local port name, local/remote IP address, highlighted status changes

Download at: Download.com

5 Comments

Filed under Application Vulnerabilities, Freeware, Internet Safety, Internet Safety Tools, Malware Advisories, Online Safety, Privacy, Software, System Security, System Utilities, Utilities, Windows Tips and Tools