LinkedIn © 2011, LinkedIn Corporation
|
author:
programming
AdaptiveMobile launches first global consumer SMS spam reporting and protection service Posted: 26 Aug 2011 01:27 PM PDT AdaptiveMobile, the world leader in mobile security, is today announcing the launch of a new SMS spam reporting service designed to enable consumers to report and protect themselves against mobile spam. A simple smartphone application can now be made available via an operator's portal, which will help a subscriber manage their own SMS inbox and remove, block and report unwanted SMS messages. The simple one-click reporting mechanism will make spam much easier to report and provide operators with more actionable information as to how best to protect their subscribers. While the incidences of SMS spam continues to rise, with one in three respondents to a recent AdaptiveMobile survey having received mobile spam in the past year, it is still difficult for network operators to see the levels of spam hitting networks at a global level. Current reporting services show SMS spam on only those networks where reporting technology has been installed and these fail to the protect the customer from future spam. With the launch of the SMS spam reporting service, operators will be provided with a much broader view of SMS spam attacks. These unique insights will help to ensure that their network protection solutions are tailored to defend [...] |
|
author:
programming
Fast Antivirus 2011 Removal Guide Posted: 26 Aug 2011 06:33 AM PDT Do you know what Fast Antivirus 2011 is? If you are looking for a powerful and user friendly security application to augment your PC's security and performance, then steer well clear of Fast... [[ This is a content summary only. Visit my website for full links, other content, and more! ]] |
|
author:
programming
VPN Protocols – IPSec Posted: 24 Aug 2011 01:09 AM PDT I agree that reading too much about VPN Protocols might be boring at times but sometimes you got to plunge into the boring details of a technology in order to understand that technology better. I promise to stay away from such boring topics once I am done with this series on VPN Protocols, but for now please bear with me. I am trying to fill up the archives of How to Hide IP with some really good information. Till now, we have covered the below VPN Protocols (the list is being updated as and when new content is written): When I say IPSec then I guess the Windows based users should feel an adrenaline rush. After all, IPSec is their protocol which is used in partnership with the likes of Layer 2 Tunneling Protocol. IPSec can be used as a funneling protocol on its own. It has been tagged by many critics as the standard VPN solution due to its balanced nature and list of amazing features. One such important feature that helps IPSec achieve the status of standard VPN solution is its improved connectivity in case of gateway-to-fateway VPNs. IPSec operates at higher position in our network OSI model which we call as network layer (whose commercial name is Layer 3.) IPSec is also famous for its implementation by most of the hardware VPN machines. To take an example, Cisco’s VPN Concentrators and the PIX firewalls use IPsec. Others using IPSec are SonicWall, NetScreen, and WatchGuard machines. Some of the enterprise level software firewalls that support IPSec are CheckPoint, ISA Server, and Symantic Enterprise Firewall. Please understand that this was just a list of hardware and software that support IPSec. You will find a lot more once you start Googling. While in tunnel mode, IPSec smartly secures packets that are being moved from one gateway to other or from a client computer to a gateway. IPSec works with IP based applications and networks. Wasn’t that pretty obvious due to its name? Just like L2TP and PPTP, even IPSec looks for a client installed in the local machine for it to work properly. When it comes to authentication, IPSec uses Internet Key Exchange (IKE) protocol with digital certificates (the more secure method) accompanied. In some cases, preshared key is used in place of digital certificates. Due to these features, IPSec is smart enough to protect VPN services from famous hack attacks like – man-in-the-middle attack, Replay, and Denial-of-Service (DoS) attack. IPSec is supported by Windows XP/2000/2003 only. The older version of Windows Operating System do not support IPSec. Third party VPN vendors, like Cisco and CheckPoint, will provide client based custom software when they offer VPN services. Please understand that these might cost you some money. Post from: How to hide ip
VPN Protocols – IPSec Related Posts: - VPN Protocols – Layer 2 Tunneling Protocol
- VPN Protocols – Point-to-Point Tunneling Protocol
- How to Set Up an IPSec VPN Connection
|
|
author:
programming
VPN Protocols – Layer 2 Tunneling Protocol Posted: 23 Aug 2011 02:45 AM PDT As promised, let me continue with my venture with VPN protocols. You will get to read a lot about different free VPN services around the Internet but hardly will people tell you how these VPN services function. It is when you understand the technicalities hidden behind these VPN services, that you are able to chose for the best VPN service for yourself. Other VPN protocols that I have already discussed (list will be updated as and when new articles are written): NOTE: Remember to read these in the order given above so that you understand them more clearly. Today, we will throw some light on Layer 2 Tunneling Protocol which is also called as L2TP in short. This protocol was created in co-ordination with the likes of Microsoft and Cisco. Layer 2 Tunneling Protocol was actually a combination of two different protocols given below: - Layer 2 Forwarding (L2F) protocol owned and developed by Cisco.
- Point-to-Point tunneling protocol owned and developed by Microsoft.
L2TP had several advantages that made it shine when compared to PPTP. One of the most important of these advantages were its usage over non-IP networks such as frame relay, X.25 and ATM. L2TP, like PPTP, operates over the data link layer in the very famous OSI network model. Also, most of the major firewalls like WatchGuard, Cisco PIX, CheckPoint, and ISA server support L2TP without any hitches. The Windows based 2003, XP and 2000 carry the built in client for L2TP. If you are one of the legacy Windows users who are still using older versions of Windows (like Windows 98, NT4.0 or ME) then you can download clients that support L2TP. L2TP uses the features provided by IP Sec (IP security) and its enhanced form namely ESP (Encapsulating Security Payload) protocol to secure its connections. It also requires the usage of digital certificates for security reasons. L2TP can perform user authentication using the similar technology that was used by PPTP – the PPP authentication mechanism. L2TP provides computer based authentication which is not supported by PPTP. This is an extra security layer that is not present in PPTP. Let us check out some more advantages of L2TP over PPTP: - PPTP gives data confidentiality but L2TP provides data integrity. Basically, it is protection of data in between its flight from sender to receiver.
- Authentication of Origin which is quiet self explanatory. This feature confirms that the sender of data is the actual sender of data.
- Replay protection which prevents the hacker from capturing the data after it is released from its origin. Hackers usually capture the data during its flights and edit it before it reaches its destination. This is prevented by this new feature of L2TP.
One must understand that L2TP might look a slow protocol when compared to PPTP because it provides extra features that are not present in PPTP. Post from: How to hide ip
VPN Protocols – Layer 2 Tunneling Protocol Related Posts: - VPN Protocols – Point-to-Point Tunneling Protocol
- China Blocks PPTP and L2TP VPN Protocols
- What’s the difference between PPTP VPN and OpenVPN?
|
|
author:
programming
LinkedIn © 2011, LinkedIn Corporation
|
author:
programming
Geolocation by IP Address Posted: 22 Aug 2011 01:08 AM PDT Did you know that geolocation and other geographic location services use your IP address, Wi-Fi connection and GPS coordinates to determine where you are located? That's right, in our present world where questions like "What is on your mind?" or "What are you doing?" are already getting old, the next big wave, even in social networks is "where are you?" Facebook , Foursquare and Gowalla are just some of the services that are revolutionizing the location-based services including the hundreds of apps that run on both Android and iPhone platforms. By determining your geographic location by use of the IP address, it is possible to offer more localized services and allow you to enjoy a much fuller user experience especially when using localized services like those mentioned above. Some common applications for geolocation by IP include chat programs, Weblogs and other distributed computing environments where location data is used to provide a local experience. How though can you use the geolocation by IP address to provide localized services? To implement this on a website or an application, you can use PEAR system which comes with a PHP package that can assist in retrieving such information. Alternatively, the PERL module can also be used. Another useful geolocation resource is the DNS LOC. This resource provides a means for expressing location information in the Domain Name System. This is done by adding the server location information on the DNS registration page. The use of DNS LOC makes it easy for applications to use this information without having to do any extra work. In addition, it allows location based services to estimate your location based on ping times and traffic even where the signal has been bounced to the second or third server. To help geolocation by IP address, some service providers associate the dynamic IP addresses of users to an internal naming scheme that they keep and then shortening this information to some name like a12-55-1-00.try.hereiam.com. Some resources can then be used to decipher the country code, associated city and the region of the city. One of these is the GNS (GEOnet Names Server). If you are uncomfortable using location-based services that track your IP, you can always use a proxy or simply disable the service on your end. Post from: How to hide ip
Geolocation by IP Address Related Posts: - Opera with Geolocation
- Test your IP address with MyIpTest.com
- How Can I Find the IP Address of a Web Site?
|
|
author:
programming
LinkedIn © 2011, LinkedIn Corporation
|
author:
programming
Habits of Social Networkers: 54 Percent of Users are Addicted Posted: 19 Aug 2011 02:18 AM PDT With malware showing no signs of abating on social networks and continuous news of the privacy implications of sharing personal details through social media, it's no surprise users are making more efforts to reduce their risk of exposure in 2011. So indicate findings from Webroot, the first Internet security service company, in its third annual look into the security habits of social networkers. In a survey of 4,000 social network users, Webroot assessed year-over-year trends in behaviours such as usage of privacy settings, incidence of security attacks, and usage of certain data-sharing features. In addition, Webroot explored several emerging areas including self-reported addiction to social networks, beliefs about who is responsible for our security on social networks, and security measures taken while accessing social networks via mobile devices. "Threats targeting social networks are continuously being regenerated in new versions so their makers can evade detection and spread their malicious programs relentlessly across users' accounts," said Jacques Erasmus, Webroot threat expert. "Over the last nine months, our threat intelligence network has detected more than 4,000 versions of the Koobface virus hit social network users. Cybercriminals continue to target social networks because they can quickly access a large pool of victims. But [...] |
Vida de bombeiro
Recipes
Informatica
Humor
Jokes
Mensagens
Curiosity
Saude
Video Games
Diario das Mensagens
Eletronica
Rei Jesus
News
Noticias da TV
Artesanato
Esportes
Noticias Atuais
Games
Pets
Career
Religion
Recreation
Business
Education
Autos
Academics
Style
Television
Programming
Motosport
Humor News
The Games
Home
Downs
World News
Internet
Design
Entertaimment
Celebrities
1001 Games
Doctor Pets
Net Downs
World Enter
Jesus
Mensagensr
Android
Rub
Letras
Dialogue
cosmetics
Genexus
Só Humor
Curiosity
Gifs
Medical
Female
American
Health
Madeira
Designer
PPS
Divertidas
Estate
Travel
Estate
Writing
Computer
Matilde
Ocultos
futebolcomnoticias
girassol
lettheworldturn
topdigitalnet
Bem amado
enjohnny
produceideas
foodasticos
cronicasdoimaginario
downloadsdegraca
compactandoletras
newcuriosidades
blogdoarmario
arrozinhoii
sonasol
halfbakedtaters
make-it-plain
amatha
lisboaohyeah
lasofia
thebushrajr
wingshock
tripedes
gorduravegetal
dainfamia
dejavu-transpersonal
jsbenfica
republicadasbadanas
ruiherbon
iranianforaryans
eaystcheyl
fotosdanadir
ojosmasabiertos
ceilasantos
|
|
|