Tag Archives: network

Top 5 Tips to Keep Your Website And Network Secure

imageEvery day, innocent websites are compromised by malicious hackers. Google identifies almost 10,000 malware-infected websites each day, and half of those are genuine websites belonging to legitimate companies. These companies haven’t done anything wrong, but they find themselves blacklisted by Google, and that’s only the edge of the brutal iceberg.

Hackers inject vicious malware into these sites to infect visitors. They confuse and lure users to dodgy websites and they break in and steal important and often sensitive customer information.

It’s a real and constant problem, but there are easy and simple steps you can take to guard against these attacks and keep your site, your network, and your customers safe and sound.

1. Use strong passwords, keep them secure and change them frequently

We all know that we should choose complex passwords, but sometimes laziness takes over and we slack off. This is a crucial mistake. Obviously, you want to choose exceptionally strong passwords for your server and website admin area, because a vulnerable password here is a free ticket for hackers to cripple your site and do untold amounts of damage.

It can be inconvenient to remember frequently changing passwords, but in the end, it’s a simple solution that can save a lot of headaches in the future. It’s also imperative that you enforce good password practices for your users.

Compromised user accounts are a special hell of their own. Demanding that minimum password requirements are met for registration will force users to make smart choices. Insist on eight characters, at least an uppercase letter and a number or special character. It’s a bit of a hassle, but it’s worth it.

Make sure that any passwords are stored as encrypted values. Ideally, you’ll use a one way hashing algorithm like SHA. This method means that during authentication, only encrypted values are ever compared. In a worst-case scenario, if someone hacks in and steals passwords, this will limit the damage.

They can’t decrypt them, and they will be reduced to attempting dictionary or brute force attacks, trying every single combination until a match comes up. It’s time consuming and computationally expensive and just not worth the effort for most people.

Your wireless network password should be seriously strong, and the network should be protected by Wi-Fi Protected Access 2 (WPA2) rather than WEP (Wired Equivalent Privacy). WEP encryption is brittle and hackable in minutes these days and should never be relied upon.

It’s also imperative to ensure that your PCs are well protected against viruses at all times to prevent password theft.

2. Be discreet with your error messages

Make sure your error messages aren’t giving away too much information. If your website requires a login, you should pay attention to how your error messages deliver the message that their login attempt has failed. A quick-and-simple, very generic message such as “incorrect login information” is your best bet.

It doesn’t tell the user if half the query is right (especially not which half!) When a hacker is attempting brute force attacks to gain access to usernames and passwords and the error message identifies one field as correct, that’s valuable information for him. He then knows that he’s halfway there and can concentrate all his attention and effort on the remaining field. Don’t make it easy for them!

3. Keep software up to date

Make sure that you’re consistently and quickly applying security updates to all of your software. From your personal PC’s virus protection, to your server operating system, and website software like content management systems, blogging, forums, and blogging platforms.

Hackers are quick to exploit any known holes and bugs, and you want to get there first. Sign up to the mailing lists and RSS feeds of all your software vendors. They’ll be the first to alert you to any security issues and their solutions. Find out and follow it up.

4. Limit Use of your Administrator Account

Keep your computer’s admin account for installing updates and software, or for reconfiguring the host when you have to. Don’t go online while logged into your admin account. Non-privileged user accounts are not just for guests and visitors: you should have one yourself for everyday use. If you browse the web and read your email with an admin account, you leave yourself open for an attacker to gain entry and access to your host.

5. Ask the experts

You don’t have to do it all on your own. There are good tools out there for monitoring your own website, but not everyone has the time or inclination to stay on top of security 24/7.

It’s possible to find monitoring services for very reasonable prices. These companies will check for malicious activity, give you an alert if your website shows up on a blacklist, scan your site for vulnerabilities, and be there for support and repairs if you do fall prey to a hack.

If you’re dealing with databases of sensitive customer information that are attached to your site, it’s probably worth it to get an expert in from the start, sweeping your code for bugs and building in extra lines of defense from the ground up. For small businesses, companies such as SiteLock and Stop the Hacker offer packages for under $100 a year.

This guest post was provided by Amanda Gareis on behalf of Drexel University Online. Drexel expanded into the online learning sector in 1996 and now offers its recognized curricula to a worldwide audience. Drexel Online offers degrees in Information Science, Information Technology, and Computing and Security Technology. The university also provides an Information Technology Career and Salary Guide resource for those looking to enter the industry.

2 Comments

Filed under Cyber Crime, Education, Guest Writers, Internet Safety

Who’s Phoning Home On Your Internet Connection? Find Out With CurrPorts and, Process and Port Analyzer

imageThere’s not much point (from a cybercriminal’s perspective), in infecting a computer with malware unless the information which it’s been designed to capture, ends up in the nasty hands of the criminal.

Generally speaking then, it’s reasonable to say that the most important function of malware (again, from a cybercriminals perspective) is to “phone home” with the information it’s been designed to steal. It’s hardly surprising that much of the malware infecting the Internet does just that.

You can, if you like, trust that your AV solution will tip you off to any nasty behavior occurring in the background. But, as a follower of  the “better safe than sorry” school of thought, trusting in any AV solution to safeguard my systems in all instances, just doesn’t compute with me. There are no perfect AV solutions.

All to often, “new” malware has already rampaged through the Internet (despite the best AV providers have to offer), before average users become aware. As a result, I’ve long made it a practice to monitor my open ports and Internet connections frequently, throughout a browsing session.

At first glance you might think port checking is time consuming and not worth the effort. But it is worth the effort, and it’s not time consuming – it often takes no more than a few seconds. More to the point, in my view, it is a critical component of the layered defense approach to Internet security that regular readers of this site are familiar with.

There are a number of free real-time port analyzers available for download, and the following is a brief description of each. If you are familiar and comfortable with using the Windows command structure, then you may want to try the command line utility Netstat, which displays protocol statistics and current TCP/IP connections. This utility and the process, are covered later in this article.

But first:

CurrPorts (this is the port tool I use daily), allows you to view a list of ports that are currently in use, and the application (keep in mind, that malware, for all practical purposes – is an application) that is using those ports. You can close a selected connection as well as terminating the process using it.

In addition, you can export all, or selected items, to an HTML or text report. Additional information includes the local port name, local/remote IP address, highlighted status changes and more.

Shown in this screen capture – Browser is not running. No remote connections. Looks like I’m safe.

CurrPorts 2

Shown in this screen capture – Browser is running. Thirty remote connections, all of which are legitimate.

image

Fast Facts:

View current active ports and their starting applications

Close selected connections and processes

Save a text/ HTML report

Info on local port name, local/remote IP address, highlighted status changes

Download at: NirSoft (you’ll need to cursor down the page to the download link).

Next up:

Process and Port Analyzer is a real time process, port and network connections analyzer which will allow you to find which processes are using which ports. A good little utility that does what it says it will do.

image

Fast Facts:

View currently running processes along with the full path and file which started it

View the active TCP Listeners and the processes using them

View the active TCP and UDP connections along with Process ID

Double click on a process to view the list of DLL’s

Download at: http://sourceforge.net

Netstat:

Windows includes a command line utility which will help you determine if you have Spyware/Botware running on your system. Netstat displays protocol statistics and current TCP/IP connections.

I use this utility as a test, to ensure that the anti-malware tools and Firewall running on my systems are functioning correctly, and that there are no open outgoing connections to the Internet that I am not aware of.

image

How to use Netstat:

You should close all open programs before you begin the following process if you are unsure which ports/connections are normally open while you are connected to the Internet. On the other hand, if you are familiar with the ports/connections that are normally open, there is no need to close programs.

There are a number of methods that will take you to a command prompt, but the following works well.

Click Start>Run>type “cmd” – without the quotes>click OK> this will open a command box.

In Windows 8 – type “cmd” at the Metro screen.

From the command prompt, type Netstat –a (be sure to leave a space), to display all connections and listening ports.

You can obtain additional information by using the following switches.

Type Netstat -r to display the contents of the IP routing table, and any persistent routes.

The -n switch tells Netstat not to convert addresses and port numbers to names, which speeds up execution.

The Netstat -s option shows all protocol statistics.

The Netstat-p option can be used to show statistics for a specific protocol or together with the -s option to show connections only for the protocol specified.

The -e switch displays interface statistics.

Running Netstat occasionally is a prudent move, since it allows you to double check which applications are connecting to the Internet.

If you find there are application connections to the Internet, or open ports, that you are unfamiliar with, a Google search should provide answers.

Steve Gibson’s website, Shields Up, is a terrific source of information where you can test all the ports on your machine as well as testing the efficiency of your Firewall. I recommend that you take the Firewall test; you may be surprised at the results!

12 Comments

Filed under 64 Bit Software, Don't Get Hacked, downloads, Freeware, Internet Safety Tools, Malware Protection, Software, Utilities

Simple Network Scanning With Free Wireless Network Watcher

imageIn this age of connected devices, and the proliferation of Wi-Fi, the number of “open networks” has jumped considerably.

While it’s true that wireless routers are supplied with encryption software –  working through the manual is often a frustrating experience for less technically inclined users. As a result, it’s not unusual for users to continue to use (widely known) default network names and passwords.

In a study commissioned by  the Wi-Fi Alliance in August of last year, it was discovered that only 59 percent of users have implemented wireless passwords, or encryption methods, that meet the basic criteria for strength and privacy.

In addition, the survey revealed that while “eighty-five percent of survey respondents understood that their Wi-Fi devices should not be set for automatic sharing, …. only 62 percent actually had auto-sharing turned off.” It’s easy to conclude then, that piggybacking on an unprotected wireless access point is perhaps more common than many might imagine.

So, how would you know if your wireless signal is piggyback capable, and is perhaps being used as the neighborhood access point? You could of course, install any one of the comprehensive open source network monitoring packages widely available for download. Provided, that is, you’re prepared to dig into a host of complex instructions and procedures.

A much simpler, but very basic solution, is offered by NirSoft’s Wireless Network Watcher. This free utility “scans your wireless network and displays the list of all computers and devices that are currently connected to your network.”

As you can see in the following screen capture (click to expand)  – the following connected device information is displayed: IP address, MAC address, the network card manufacturer, and optionally, the computer name.

Wireless Network Watcher

Better yet, you can set the utility to continuously monitor so that it will notify you of any new devices connecting to your network (with an audible signal if you like) – as illustrated in the following screen shot.

Wireless Network Watcher 2

System requirements: Windows 2000, XP, 2003, Vista, Server 2008, Win 7.

Download at: NirSoft (you’ll need to skip down the page to locate the download link).

Bonus feature – you can also use Wireless Network Watcher to scan a small wired network.

Wireless Network Watcher may not be jam packed with features – but, it does what it’s designed to do, and it does it very well. Additionally, the advanced options menu will allow you to scan selected IP address ranges, choose which adapter to scan from, and save the results to html.

More information about Wi-Fi security, including innovations that make setting up security easier, is available at www.wi-fi.org/security. Users can test their own security knowledge with a quick online quiz, watch animations about home Wi-Fi security, and download white papers with detailed information.

10 Comments

Filed under Connected Devices, downloads, Freeware, Network Tools, Software, Utilities

TweakNow PowerPack 2012 – A Free Menu-Driven Windows Tweaking Application

Geeks know exactly how, and where, to tweak a Windows operating system – without necessarily running a dedicated tweaking application. Average users on the other hand, generally lack the background and experience, to venture into the dark and hidden spaces of a Windows environment.

But, that doesn’t mean an average user can’t tweak just like a pro. Luckily, there are more than a few free tweaking apps available that can help average users apply the most common system tweaks.

In past reviews of tweaking applications, more than a few readers have mentioned TweakNow PowerPack as their go-to tweaking application. So, I thought I’d take a very quick peek at TweakNow PowerPack’s capabilities.

As with most  tweaking applications, TweakNow PowerPack is menu-driven – making it easy to accomplish system changes without the drudgery of having to go through menu after menu, or manually editing the Registry.

TweakNow PowerPack has a clean, easy to understand interface that provides access to over 100 system settings, some of which are hidden, and others that are just hard to find. The interface is organized for easy navigation, so, I can see no reason why a careful average user should have any problem tweaking their system with TweakNow PowerPack.

Fast facts:

Fully-integrated suite of utilities that let you fine-tune every aspect of your computer’s operating system and Web browser.

Access to more than 100 hidden Windows settings.

Quick Optimizer.

Windows Cleaner includes – Disk Cleaner, Disk Usage Analyzer, Registry Defragmenter, Registry Cleaner, Secure Delete, Startup Manager, Tracks Cleaner and an Uninstaller.

Virtual Desktop module lets you run as many as four custom-designed desktop configurations simultaneously.

Detailed information on your motherboard, processor, video card, memory, hard disk and network.

Even more tweaks to suit your fancy.

The interface is organized for easy navigation, so, I can see no reason why a careful average user should have any problem tweaking their system with Quick Optimizer.

The following screen captures illustrate just a few of the large feature set built into this free application.

Quick Optimizer:

image

Windows Secret:

image

Miscellaneous Tools:

image

System requirements: Windows 8, 7, Vista, XP.

Download at:  Author’s site.

4 Comments

Filed under downloads, Freeware, Software, System Tweaks

Download Miro – An HD Open Source Internet TV Platform And So Much More

imageThere continues to be much discussion in Tech media circles, on the benefits of  getting rid of expensive Cable TV where prices seem to be skyrocketing (I just got another $2 a month bump this week), and focusing instead on the multiple alternatives which the Internet now supports.

Given that your computer screen is, in reality, a high-definition display, you can easily enjoy Internet sourced videos in HD full screen. Pretty neat – especially if you have a wide screen LCD display.

Miro (last updated August 16, 2011), is a free (open source), Internet TV platform and Video Player (and so much more), that can certainly even out your path in breaking your reliance on Cable TV – and, the costs that go with it. Miro, in fact, might well be the perfect tool to help with your transition.

In my view, Miro is one of the most underappreciated open source applications available on the Internet. It never fails to amaze me how less deserving “media players”, which are often hyped to the max, can generate more downloads than this superb application.

Not only can Miro play virtually any video in HD, including, QuickTime, WMV, MPEG, AVI, and XVID, but on top of that this application, which sports major changes from previous editions, is effectively a media management center.  I must admit, I was more than a little surprised at how effective Miro is in this role.

For example, the application quickly, smoothly, and effectively, located my music files after prompting me to select a search path. Playback controls are typical and playlists are easily created.

Click on graphic to expand to original size.

image

The core of the program however, is the well designed video features including built-in Torrent download capabilities.

Click on graphic to expand to original size.

image

In the following example I downloaded a 1.4 GB movie using the Torrent client. The test torrent download  took full advantage of my Internet settings – 1.7 MB per second.

Click on graphic to expand to original size.

image

Playback of the downloaded file was a bit of a treat really. Definitely HD; smooth; quality sound.

Click on graphic to expand to original size.

image

image

Additional features include the ability to sync media to multiple devices –  including Android phones and tablets. Better yet, Miro will even convert video files to the right format to play on your phone.

Click on graphic to expand to original size.

image

Getting the application just right to meet your specific needs, using the Settings menu is straightforward and uncomplicated.

Click on graphic to expand to original size.

image

Fast facts:

Works with your current music library – It’s very easy to switch from iTunes to Miro– without any copying. Just point Miro to your music and video folders and those files will appear. If you don’t like Miro (impossible!), nothing’s changed.

Converts and syncs to Android – You’d have to be crazy to use a music player that doesn’t sync to your phone. Miro is simply the best music and video player for Android phones and tablets.

Download and play almost any video – Do you still use separate programs to download, play music, play videos, and sync to your phone? Miro plays almost any video or music format and downloads from YouTube, podcasts, Amazon, and bittorrent.

Convert any video – You can convert almost any video with Miro into mp4/h264, with presets for almost any device you can think of (including iPhones, iPods, iPads, Android phones, and more).

Share Your Media on your Network – When two Miro’s are on the same Wi-Fi network, they can stream and transfer music and videos to each other. It’s the easiest way to watch a video or play music upstairs if the file is downstairs.

Ultra-fast torrent downloading – Miro has some of the fastest bittorrent downloading in the world, built in. Try us head-to-head with any bittorrent application!

Open-source – don’t lock yourself in – Unlike some other media players, Miro is not trying to run your life. Not only is Miro 100% free and open-source, it’s made by a non-profit organization. You don’t need to be locked down by one corporation to have a great media experience.

Buy Music and Apps inside Miro – The Amazon MP3 store is built-in to Miro. Buy, download, and listen, seamlessly. Buy Android apps from the Amazon or Google app stores and they will sync to your device.

There are many more features in Miro that can be quickly covered in a short review. I haven’t, for example, covered the easy way to stream and share music and video on your local/home network, using Miro. Checkout the publisher’s features page.

This program continues to receive high praise from video geeks, and it’s worth considering as an addition to your entertainment applications.

System requirements: Windows 7, Vista, XP, Mac, Linux. (I have not tested this application in 64 bit – but, I understand 64 bit support is available).

Download at: Miro

User Manual for Miro 4.0 (last updated June 30, 2011), available here.

A caveat: During the install process, pay particular attention so that you don’t install items you may not want (Yahoo Toolbar/homepage) .

image

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

4 Comments

Filed under 64 Bit Software, Digital Media, downloads, Freeware, High Definition Video Players, Internet TV, Linux, Mac OS X, Media Players, Multimedia Tools, Open Source, Software, Video Apps, Windows Tips and Tools

GigaTribe Private P2P – Share Your Videos, Pics, And Docs Privately

image A few days ago, I ran a few tests on peer to peer downloads, on the off chance that things had improved in this malware infested playground. No such luck, of course.

Of the five game files that I downloaded, every one came packed with a Trojan downloader, which, had I installed any of these applications, would have wrecked havoc on my test machine.

In a nutshell, that’s the main problem with public peer to peer file sharing. The chances are high, that you will not get what you think you will, and you will get what you don’t think you will.

Additional issues (but not the only issues) are:

Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share.

Spyware: There’s a chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. I can assure you that spyware can be difficult to detect and remove.

So what’s a fellow to do who enjoys file sharing, and who doesn’t want to be burned by the cybercriminals who skulk on public file sharing networks, searching for victims?

A terrific solution to this quandary is a free application from GigaTribe. An application which is designed to create a private network between you, and your friends, relatives, co-workers, or, whomever you choose.

If you have every used peer to peer software, then you’ll find no learning curve involved in using GigaTribe – it’s functional, efficient, attractive, and “follow the bouncing ball” intuitive.

How much more simply can it be than this:

GigaTribe

The following graphic is from the publisher’s site.

image

Fast facts:

GigaTribe has more than 1, 600,000 users.
Its unique technology has been developed by talented programmers with a strong history in the software industry.

There are no limitations on quantity or file size.
All your files are kept on your hard drive, eliminating the need to transfer them to an external server.

Files are available in their original format.
In just a few clicks, you can share and also find files as if you were in a virtual library. You will see files as they were organized on the hard drive, and you can download them in their original format.

You don’t waste time uploading files.
Once you select which folders you want to share, the contents of those folders are instantly accessible to your friends.

Your files remain yours!
Files you have decided to share are not saved on another company’s equipment. You keep your data under your control.

It´s a two-way sharing service.
Each contact can both share and download. You decide which content is worth downloading among the files available to you.

You may invite up to 500 friends.

Transfer automatically resumes.
If a download is interrupted (for example, if a contact goes offline), the transfer automatically resumes with no loss of data when your contact comes back online.

Security is, of course, GigaTribe´s major concern.

Only the people you have invited can see your files. Only the folders you have selected are visible to your contacts. Every exchange is strongly encrypted – No one can see what is being shared.

Downloads are encrypted (Blowfish 256-bit).

As an added bonus, users’ can create profiles, and have access to personal chat and a private blog, all from within the program. Now that’s cool!

According to the developers, GigaTribe (although I haven’t tested this), can also be used to access your PC from a remote location.

System requirements: Windows 2000, XP, 2003, Vista, Server 2008, Windows 7. (no indication on the publisher’s site of x64 compatibility).

Languages: English, Español, Français, Deutsch, Italiano, Português

Download at: Gigatribe

It’s not often that I can rate an application 100%, but GigaTribe comes very close. A superb application! If you’re into private file sharing, or it’s something that you’ve considered, then give GigaTribe a whirl – I think you’ll be glad you did.

For additional information checkout the developer’s FAQ.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under downloads, Freeware, Geek Software and Tools, Networking, Peer to Peer, Privacy, social networking, Software, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Download Miro HD Video Player – Sync Your Media To Multiple Devices And A Whole Lot More!

imageThere’s been much discussion lately, in Tech media circles, on the benefits of  getting rid of expensive Cable TV, where prices seem to be skyrocketing, and focusing instead on the multiple alternatives which the Internet now provides.

Given that your computer screen is, in reality, a high-definition display, you can easily enjoy Internet sourced videos in HD full screen. Pretty neat – especially if you have a wide screen LCD display.

Miro (last updated May 20th, 2011), is a free (open source), Internet TV platform and Video Player (and so much more), that can certainly even out your path in breaking your reliance on Cable TV – and, the costs that go with it. Miro, in fact, might well be the perfect tool to help with your transition.

Not only can Miro play virtually any video in HD, including, QuickTime, WMV, MPEG, AVI, and XVID, but on top of that this application, which sports major changes from previous editions, is effectively a media management center.  I must admit, I was more than a little surprised at how effective Miro is in this role.

For example, the application quickly, smoothly, and effectively, located my music files after prompting me to select a search path. Playback controls are typical and playlists are easily created.

Click on graphic to expand to original size.

image

The core of the program however, is the well designed video features including built-in Torrent download capabilities.

Click on graphic to expand to original size.

image

In the following example I downloaded a 1.4 GB movie using the Torrent client. The test torrent download  took full advantage of my Internet settings – 1.7 MB per second.

Click on graphic to expand to original size.

image

Playback of the downloaded file was a bit of a treat really. Definitely HD; smooth; quality sound.

Click on graphic to expand to original size.

image

Additional features include the ability to sync media to multiple devices –  including Android phones and tablets. Better yet, Miro will even convert video files to the right format to play on your phone.

Click on graphic to expand to original size.

image

Getting the application just right to meet your specific needs, using the Settings menu is straightforward and uncomplicated.

Click on graphic to expand to original size.

image

Fast facts:

Works with your current music library – It’s very easy to switch from iTunes to Miro– without any copying. Just point Miro to your music and video folders and those files will appear. If you don’t like Miro (impossible!), nothing’s changed.

Converts and syncs to Android – You’d have to be crazy to use a music player that doesn’t sync to your phone. Miro is simply the best music and video player for Android phones and tablets.

Download and play almost any video – Do you still use separate programs to download, play music, play videos, and sync to your phone? Miro plays almost any video or music format and downloads from YouTube, podcasts, Amazon, and bittorrent.

Convert any video – You can convert almost any video with Miro into mp4/h264, with presets for almost any device you can think of (including iPhones, iPods, iPads, Android phones, and more).

Share Your Media on your Network – When two Miro’s are on the same Wi-Fi network, they can stream and transfer music and videos to each other. It’s the easiest way to watch a video or play music upstairs if the file is downstairs.

Ultra-fast torrent downloading – Miro has some of the fastest bittorrent downloading in the world, built in. Try us head-to-head with any bittorrent application!

Open-source – don’t lock yourself in – Unlike some other media players, Miro is not trying to run your life. Not only is Miro 100% free and open-source, it’s made by a non-profit organization. You don’t need to be locked down by one corporation to have a great media experience.

Buy Music and Apps inside Miro – The Amazon MP3 store is built-in to Miro. Buy, download, and listen, seamlessly. Buy Android apps from the Amazon or Google app stores and they will sync to your device.

There are many more features in Miro that can be quickly covered in a short review. I haven’t, for example, covered the easy way to stream and share music and video on your local/home network, using Miro. Checkout the publisher’s features page.

This program continues to receive high praise from video geeks, and it’s worth considering as an addition to your entertainment applications.

System requirements: Windows 7, Vista, XP, Mac, Linux. (I have not tested this application in 64 bit – but, I understand 64 bit support is available).

Download at: Miro

User Manual for Miro 4.0 available here.

A caveat: During the install process, pay particular attention so that you don’t install items you may not want (Yahoo Toolbar/homepage) .

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

9 Comments

Filed under Connected Devices, Digital Media, downloads, Easy Computer Networking, File Sharing, Freeware, Interconnectivity, Internet TV, iPhone, Linux, Mac, Media Player Replacement, Media Players, Multimedia Tools, Release Candidate, Software, Ubuntu, Video Players, Video Tools, Windows Tips and Tools

Take Complete Control Of Windows Autorun With Free AutoRun Disable

If you need more control over Windows built-in Autorun feature, then take a look at AutoRun Disable – a simple, free application, from Endpoint Protector.

With  AutoRun Disable it’s easy to disable the Autorun feature based on device type – USB and other removable devices, CD/DVD, internal and network drives, or specific drive letters.

Disabling Autorun is always good practice, since it allows you an opportunity to scan devices for malware – including autorun based malware like Stuxnet, Conficker, Downadup and others.

Installation is one click simple, and on execution, the application will audit your computer and report the current state of Autorun, as the following screen shot illustrates.

image

The major advantage in using AutoRun Disable is the fine control a user now has over all drives and devices, as shown in the following screen capture.

image

System requirements: Windows 7, Windows 2003, Windows Vista, Windows XP, Windows Server 2008

Download at: Download.com

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

4 Comments

Filed under Don't Get Hacked, downloads, flash drive, Free Security Programs, Freeware, Malware Protection, Software, System Security, USB, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

Free GigaTribe – Go Private With Your File Sharing

imageThe Recording Industry Association of America which represents the recording industry distributors in the United States, has managed to have LimeWire banished from the playing field – Boo, Hiss!!

I must confess though, I’ve never been a fan of public, peer to peer file sharing. Unfortunately, with public peer to peer file sharing, the risk factor that the user will not get what he thinks he will, is extremely high.

For example – the last time I tested public peer to peer file sharing, of the five game files that I downloaded, every one came packed with a Trojan downloader, which, had I installed any of these applications on my test machine., would have wrecked havoc.

The two main issues with peer to peer file sharing (but not the only issues) are:

Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share.

Spyware: There’s a good chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. I can assure you that spyware can be difficult to detect and remove.

So what’s a user to do who enjoys file sharing, and who doesn’t want to be burned by the cybercriminals who skulk on public file sharing networks searching for victims?

A terrific solution to this dilemma is provided by a free application from GigaTribe (last updated April 23th, 2010). An application which is designed to create a private network between you, and your friends, relatives, co-workers, or, whomever you choose.

If you have every used peer to peer software, then you’ll find no learning curve involved in using GigaTribe – it’s functional, efficient, attractive, and “follow the bouncing ball” intuitive.

How much more simply can it be than this:

GigaTribe

The following graphic is from the publisher’s site.

image

Fast facts:

GigaTribe has more than 1.5 Million users.
Its unique technology has been developed by talented programmers with a strong history in the software industry.

There are no limitations on quantity or file size.
All your files are kept on your hard drive, eliminating the need to transfer them to an external server.

Files are available in their original format.
In just a few clicks, you can share and also find files as if you were in a virtual library. You will see files as they were organized on the hard drive, and you can download them in their original format.

You don’t waste time uploading files.
Once you select which folders you want to share, the contents of those folders are instantly accessible to your friends.

Your files remain yours!
Files you have decided to share are not saved on another company’s equipment. You keep your data under your control.

It´s a two-way sharing service.
Each contact can both share and download. You decide which content is worth downloading among the files available to you.

You may invite up to 500 friends.

Transfer automatically resumes.
If a download is interrupted (for example, if a contact goes offline), the transfer automatically resumes with no loss of data when your contact comes back online.

Security is, of course, GigaTribe´s major concern.

Only the people you have invited can see your files. Only the folders you have selected are visible to your contacts. Every exchange is strongly encrypted – No one can see what is being shared.

As an added bonus, users’ can create profiles, and have access to personal chat and a private blog, all from within the program. Now that’s cool!

Here’s a great example of GigaTribe in action (testimonial from the publisher’s site).

GigaTribe allows us to exchange our course materials or photos and videos of our evenings. We do not need any more to transport our external disks for sharing the big files.

GigaTribe allowed to create a network of exchange exclusively intended for the students of the school. It facilitates sharing and the mutual help between students.

It’s not often that I can rate an application 100%, but GigaTribe comes very close. A superb application! If you’re into private file sharing, or it’s something that you’ve considered, then give GigaTribe a whirl – I think you’ll be glad you did.

Checkout GigaTribe’s one minute Guide.

System requirements: Windows 2000, XP, Vista, Windows 7.

Languages: English, Español, Français, Deutsch, Italiano, Português

Download at: Gigatribe

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

7 Comments

Filed under downloads, File Sharing, Freeware, Interconnectivity, Peer to Peer, social networking, Software, Utilities, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP

LimeWire Is Dead – Long Live FrostWire!

If you visit the official LimeWire website, you will, no doubt, be surprised to see the following message –  “This is an official notice that LimeWire is under a court-ordered injunction to stop distributing and supporting its file-sharing software. Downloading or sharing copyrighted content without authorization is illegal.”

The Recording Industry Association of America which represents the recording industry distributors in the United States, has struck once again in its aggressive battle to combat what it defines as copyright infringement. While I’m not a supporter of copyright infringement, I do consider RIIA’s tactics not far removed from those that were once employed by the Spanish Inquisition. Heavy handed – to say the least.

image

Unfortunately, if you were a LimeWire user you’ve noticed that searching, downloading, uploading, file sharing and so on, are no longer available. But, don’t despair – there are other solutions. Maybe now is the time to take a close look at a LimeWire alternative – FrostWire.

FrostWire (newest version: 4.21), released September 29, 2010, is a free, open source Peer to Peer application which incorporates all of the now dead LimeWire’s functionality, as well as a number of the features of the old LimeWire Pro – including multi-threading downloads, and Turbo-Charged connections.

To insure broad appeal, FrostWire is a multi platform program running on Windows 7, Vista, XP, 2000, NT, Mac OS X 10.4 or later, Linux, and some flavors of Unix.

image

Fast facts:

Open-source

Firewall-to-firewall transfers

Built-in community chat

Connects to more sources

Creative commons license support

Broadband network connection

Junk result filters

Turbo-Charged download speeds

iTunes integration

Gnutella support

BitTorrent support

Proxy Support

If P2P file sharing is one of your interests, then you’ll find that this program, with its highly intuitive interface, should meet all of your needs. With almost 30 Million downloads on CNET alone, calling this application “very popular” is a bit of an understatement.

System requirements: Windows 7, Windows 2000, Windows Vista, Windows NT, Windows XP, Mac OS X 10.5 or later, Linux, Unix such as Solaris.

Additional requirements: Java Runtime Environment 1.6

Download at: FrostWire.com

Note: Consider the trade-offs, and the very real risks involved in Peer to Peer file sharing.

Privacy: When you are connected to file-sharing programs, you may unintentionally allow others to copy confidential files you did not intend to share. So be sure to setup the file-sharing software very carefully.

If you don’t check the proper settings when you install the software, you could allow access not just to the files you intend to share, but also to other information on your hard drive, such as your tax returns, email messages, medical records, photos, and other personal and financial documents.

It’s extremely important to be aware of the files that you place in, or download to, your shared folder. Don’t put information in your shared folder that you don’t want to share with others. Your shared folder is the folder that is shared automatically with others on peer to peer file sharing networks.

Copyright Issues: You may knowingly, or otherwise, download material that is protected by copyright laws and find yourself caught up in legal issues. Copyright infringement can result in significant monetary damages, fines, and even criminal penalties.

Some statistics suggest as many as 70% of young people between the ages of 9 – 14, regularly download copyrighted digital music. If you are a parent, you bear the ultimate responsibility for this illegal activity.

Adult Content: Again, if you are a parent you may not be aware that their children have downloaded file-sharing software on the family computer, (Susan Naulls), and that they may have exchanged games, videos, music, pornography, or other material that may be unsuitable for them. It’s not unusual for other peoples’ files to be mislabeled and you or your children can unintentionally download these files.

Spyware: There’s a good chance that the file-sharing program you’re using has installed other software known as spyware to your computer’s operating system. Spyware monitors a user’s browsing habits and then sends that data to third parties. Frequently the user gets ads based on the information that the spyware has collected and forwarded to these third parties.

I can assure you that spyware can be difficult to detect and remove. Before you use any file-sharing program, you should buy, or download free software, that can help prevent the downloading or installation of spyware, or help to detect it on your hard drive if it has been installed.

Viruses: Use and update your anti-virus software regularly. Files you download could be mislabeled, hiding a virus or other unwanted content. Use anti-virus software to protect your computer from viruses you might pick up from other users through the file-sharing program.

Generally, your virus filter should prevent your computer from receiving possibly destructive files. While downloading, you should avoid files with extensions such as .exe, .scr, .lnk, .bat, .vbs, .dll, .bin, and .cmd.

Default Closing Behavior: It is critical that you close your connection after you have finished using the software. In some instances, closing the file-sharing program window does not actually close your connection to the network. That allows file-sharing to continue and will increase your security risk. Be sure to turn off this feature in the programs “preferences” setting.

What’s more, some file-sharing programs automatically run every time you turn on your computer. As a preventive measure, you should adjust the file-sharing program’s controls to prevent the file-sharing program from automatically starting.

If you found this article useful, why not subscribe to this Blog via RSS, or email? It’s easy; just click on this link and you’ll never miss another Tech Thoughts article.

6 Comments

Filed under downloads, Freeware, FrostWire, Interconnectivity, Open Source, Peer to Peer, Software, Ubuntu, Windows 7, Windows Tips and Tools, Windows Vista, Windows XP