Latest Security News | SecurityExtra.com

|

Latest Security News | SecurityExtra.com


Thales announces new crypto support for mobile payment issuers

Posted: 31 Aug 2011 11:30 AM PDT

Thales, leader in information systems and communications security, announces the world's first software for Hardware Security Modules (HSMs) that enables mobile payment issuers to deliver their mobile payment applications to mobile handsets Over-The-Air (OTA) in a simple, efficient and secure manner. According to Juniper Research mobile payments for digital and physical goods, money transfers and NFC (Near Field Communications) transactions will reach almost $630bn by 2014. The many recent announcements by handset manufacturers and Mobile Network Operators on the support for NFC on phones suggest 2011 could be the year when phones capable of mobile payments will become widely available. Today's mobile payments issuers have to use multiple core cryptographic function calls to build the data needed to issue a payment application and to create the secure messages required to personalize the mobile phone with the application Over-The-Air (OTA). This approach can be lengthy, inefficient, and less secure as it can potentially expose sensitive data. Thales HSMs now provide for the first time the ability to create a secure message to personalize a payment application hosted in a GlobalPlatform Secure Element, resident in a mobile phone using a single dedicated cryptographic HSM call. The new card and phone personalization software [...]

Spyware Techie

|

Spyware Techie


OpenCloud Antivirus Removal Guide

Posted: 29 Aug 2011 03:36 AM PDT

Do you know what OpenCloud Antivirus is? With all the sophistication invested into rogue security applications these days it has become increasingly more difficult for PC owners to distinguish...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

PC Repair Removal Guide

Posted: 29 Aug 2011 03:30 AM PDT

Do you know what PC Repair is? It would seem as though the developers of FakeHDD rogue defragmenter have been hard at work on their latest rogue application, PC Repair. This rubbish rogue...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

Reminder about your invitation from Ramachandran Pillai

|

LinkedIn

This is a reminder that on August 21, Ramachandran Pillai sent you an invitation to become part of his or her professional network at LinkedIn.

Follow this link to accept Ramachandran Pillai's invitation.

https://www.linkedin.com/e/1aif7h-grxavdsc-1z/doi/3910761742/k-mJeGiS/gir_988760636_1/EML-inv_18_rem/

Signing up is free and takes less than a minute.

On August 21, Ramachandran Pillai wrote:

> To: [programmingpc@gmail.com]
> From: Ramachandran Pillai [aprpillai@yahoo.com]
> Subject: Invitation to connect on LinkedIn

> I'd like to add you to my professional network on LinkedIn.
>
> - Ramachandran

The only way to get access to Ramachandran Pillai's professional network on LinkedIn is through the following link:

https://www.linkedin.com/e/1aif7h-grxavdsc-1z/doi/3910761742/k-mJeGiS/gir_988760636_1/EML-inv_18_rem/

You can remove yourself from Ramachandran Pillai's network at any time.


--------------

© 2011, LinkedIn Corporation

RE:Seven Hundred And Fifty Thousand Pounds was given to your Email In BPO Cash Splash.

|

.Provide Name,Address

Latest Security News | SecurityExtra.com

|

Latest Security News | SecurityExtra.com


AdaptiveMobile launches first global consumer SMS spam reporting and protection service

Posted: 26 Aug 2011 01:27 PM PDT

AdaptiveMobile, the world leader in mobile security, is today announcing the launch of a new SMS spam reporting service designed to enable consumers to report and protect themselves against mobile spam. A simple smartphone application can now be made available via an operator's portal, which will help a subscriber manage their own SMS inbox and remove, block and report unwanted SMS messages. The simple one-click reporting mechanism will make spam much easier to report and provide operators with more actionable information as to how best to protect their subscribers. While the incidences of SMS spam continues to rise, with one in three respondents to a recent AdaptiveMobile survey having received mobile spam in the past year, it is still difficult for network operators to see the levels of spam hitting networks at a global level. Current reporting services show SMS spam on only those networks where reporting technology has been installed and these fail to the protect the customer from future spam. With the launch of the SMS spam reporting service, operators will be provided with a much broader view of SMS spam attacks. These unique insights will help to ensure that their network protection solutions are tailored to defend [...]

Spyware Techie

|

Spyware Techie


Fast Antivirus 2011 Removal Guide

Posted: 26 Aug 2011 06:33 AM PDT

Do you know what Fast Antivirus 2011 is? If you are looking for a powerful and user friendly security application to augment your PC's security and performance, then steer well clear of Fast...

[[ This is a content summary only. Visit my website for full links, other content, and more! ]]

How to hide ip: VPN Protocols – IPSec

|

How to hide ip: VPN Protocols – IPSec


VPN Protocols – IPSec

Posted: 24 Aug 2011 01:09 AM PDT

I agree that reading too much about VPN Protocols might be boring at times but sometimes you got to plunge into the boring details of a technology in order to understand that technology better. I promise to stay away from such boring topics once I am done with this series on VPN Protocols, but for now please bear with me. I am trying to fill up the archives of How to Hide IP with some really good information.

Till now, we have covered the below VPN Protocols (the list is being updated as and when new content is written):

When I say IPSec then I guess the Windows based users should feel an adrenaline rush. After all, IPSec is their protocol which is used in partnership with the likes of Layer 2 Tunneling Protocol. IPSec can be used as a funneling protocol on its own. It has been tagged by many critics as the standard VPN solution due to its balanced nature and list of amazing features. One such important feature that helps IPSec achieve the status of standard VPN solution is its improved connectivity in case of gateway-to-fateway VPNs. IPSec operates at higher position in our network OSI model which we call as network layer (whose commercial name is Layer 3.)

IPSec is also famous for its implementation by most of the hardware VPN machines. To take an example, Cisco’s VPN Concentrators and the PIX firewalls use IPsec. Others using IPSec are SonicWall, NetScreen, and WatchGuard machines. Some of the enterprise level software firewalls that support IPSec are CheckPoint, ISA Server, and Symantic Enterprise Firewall. Please understand that this was just a list of hardware and software that support IPSec. You will find a lot more once you start Googling.

While in tunnel mode, IPSec smartly secures packets that are being moved from one gateway to other or from a client computer to a gateway. IPSec works with IP based applications and networks. Wasn’t that pretty obvious due to its name? Just like L2TP and PPTP, even IPSec looks for a client installed in the local machine for it to work properly.

When it comes to authentication, IPSec uses Internet Key Exchange (IKE) protocol with digital certificates (the more secure method) accompanied. In some cases, preshared key is used in place of digital certificates. Due to these features, IPSec is smart enough to protect VPN services from famous hack attacks like – man-in-the-middle attack, Replay, and Denial-of-Service (DoS) attack.

IPSec is supported by Windows XP/2000/2003 only. The older version of Windows Operating System do not support IPSec. Third party VPN vendors, like Cisco and CheckPoint, will provide client based custom software when they offer VPN services. Please understand that these might cost you some money.

Post from: How to hide ip

VPN Protocols – IPSec

Related Posts:

  1. VPN Protocols – Layer 2 Tunneling Protocol
  2. VPN Protocols – Point-to-Point Tunneling Protocol
  3. How to Set Up an IPSec VPN Connection


How to hide ip: VPN Protocols – Layer 2 Tunneling Protocol

|

How to hide ip: VPN Protocols – Layer 2 Tunneling Protocol


VPN Protocols – Layer 2 Tunneling Protocol

Posted: 23 Aug 2011 02:45 AM PDT

As promised, let me continue with my venture with VPN protocols. You will get to read a lot about different free VPN services around the Internet but hardly will people tell you how these VPN services function. It is when you understand the technicalities hidden behind these VPN services, that you are able to chose for the best VPN service for yourself.

Other VPN protocols that I have already discussed (list will be updated as and when new articles are written):

NOTE: Remember to read these in the order given above so that you understand them more clearly.

Today, we will throw some light on Layer 2 Tunneling Protocol which is also called as L2TP in short. This protocol was created in co-ordination with the likes of Microsoft and Cisco. Layer 2 Tunneling Protocol was actually a combination of two different protocols given below:

  • Layer 2 Forwarding (L2F) protocol owned and developed by Cisco.
  • Point-to-Point tunneling protocol owned and developed by Microsoft.

L2TP had several advantages that made it shine when compared to PPTP. One of the most important of these advantages were its usage over non-IP networks such as frame relay, X.25 and ATM. L2TP, like PPTP, operates over the data link layer in the very famous OSI network model. Also, most of the major firewalls like WatchGuard, Cisco PIX, CheckPoint, and ISA server support L2TP without any hitches.

The Windows based 2003, XP and 2000 carry the built in client for L2TP. If you are one of the legacy Windows users who are still using older versions of Windows (like Windows 98, NT4.0 or ME) then you can download clients that support L2TP.

L2TP uses the features provided by IP Sec (IP security) and its enhanced form namely ESP (Encapsulating Security Payload) protocol to secure its connections. It also requires the usage of digital certificates for security reasons. L2TP can perform user authentication using the similar technology that was used by PPTP – the PPP authentication mechanism. L2TP provides computer based authentication which is not supported by PPTP. This is an extra security layer that is not present in PPTP.

Let us check out some more advantages of L2TP over PPTP:

  • PPTP gives data confidentiality but L2TP provides data integrity. Basically, it is protection of data in between its flight from sender to receiver.
  • Authentication of Origin which is quiet self explanatory. This feature confirms that the sender of data is the actual sender of data.
  • Replay protection which prevents the hacker from capturing the data after it is released from its origin. Hackers usually capture the data during its flights and edit it before it reaches its destination. This is prevented by this new feature of L2TP.

One must understand that L2TP might look a slow protocol when compared to PPTP because it provides extra features that are not present in PPTP.

Post from: How to hide ip

VPN Protocols – Layer 2 Tunneling Protocol

Related Posts:

  1. VPN Protocols – Point-to-Point Tunneling Protocol
  2. China Blocks PPTP and L2TP VPN Protocols
  3. What’s the difference between PPTP VPN and OpenVPN?


Reminder about your invitation from Ramachandran Pillai

|

LinkedIn

This is a reminder that on August 21, Ramachandran Pillai sent you an invitation to become part of his or her professional network at LinkedIn.

Follow this link to accept Ramachandran Pillai's invitation.

https://www.linkedin.com/e/1aif7h-gronesbp-5g/doi/3910761742/k-mJeGiS/gir_988760636_0/EML-inv_18_rem/

Signing up is free and takes less than a minute.

On August 21, Ramachandran Pillai wrote:

> To: [programmingpc@gmail.com]
> From: Ramachandran Pillai [aprpillai@yahoo.com]
> Subject: Invitation to connect on LinkedIn

> I'd like to add you to my professional network on LinkedIn.
>
> - Ramachandran

The only way to get access to Ramachandran Pillai's professional network on LinkedIn is through the following link:

https://www.linkedin.com/e/1aif7h-gronesbp-5g/doi/3910761742/k-mJeGiS/gir_988760636_0/EML-inv_18_rem/

You can remove yourself from Ramachandran Pillai's network at any time.


--------------

© 2011, LinkedIn Corporation

How to hide ip: Geolocation by IP Address

|

How to hide ip: Geolocation by IP Address


Geolocation by IP Address

Posted: 22 Aug 2011 01:08 AM PDT

Did you know that geolocation and other geographic location services use your IP address, Wi-Fi connection and GPS coordinates to determine where you are located? That's right, in our present world where questions like "What is on your mind?" or "What are you doing?" are already getting old, the next big wave, even in social networks is "where are you?" Facebook , Foursquare and Gowalla are just some of the services that are revolutionizing the location-based services including the hundreds of apps that run on both Android and iPhone platforms.

By determining your geographic location by use of the IP address, it is possible to offer more localized services and allow you to enjoy a much fuller user experience especially when using localized services like those mentioned above. Some common applications for geolocation by IP include chat programs, Weblogs and other distributed computing environments where location data is used to provide a local experience.

How though can you use the geolocation by IP address to provide localized services?  To implement this on a website or an application, you can use PEAR system which comes with a PHP package that can assist in retrieving such information. Alternatively, the PERL module can also be used. Another useful geolocation resource is the DNS LOC. This resource provides a means for expressing location information in the Domain Name System. This is done by adding the server location information on the DNS registration page. The use of DNS LOC makes it easy for applications to use this information without having to do any extra work. In addition, it allows location based services to estimate your location based on ping times and traffic even where the signal has been bounced to the second or third server.

To help geolocation by IP address, some service providers associate the dynamic IP addresses of users to an internal naming scheme that they keep and then shortening this information to some name like a12-55-1-00.try.hereiam.com. Some resources can then be used to decipher the country code, associated city and the region of the city. One of these is the GNS (GEOnet Names Server).

If you are uncomfortable using location-based services that track your IP, you can always use a proxy or simply disable the service on your end.

Post from: How to hide ip

Geolocation by IP Address

Related Posts:

  1. Opera with Geolocation
  2. Test your IP address with MyIpTest.com
  3. How Can I Find the IP Address of a Web Site?


Invitation to connect on LinkedIn

|

LinkedIn

I'd like to add you to my professional network on LinkedIn.

- Ramachandran

Ramachandran Pillai
Dy. Manager - Audit at SBG
Oman

Confirm that you know Ramachandran

© 2011, LinkedIn Corporation

How to hide ip: Stay Away From Firefox If You Like Cocoon

|

How to hide ip: Stay Away From Firefox If You Like Cocoon


Stay Away From Firefox If You Like Cocoon

Posted: 20 Aug 2011 02:23 AM PDT

This is a quick update for the Firefox users who love to use Cocoon in order to hide their originating IP address. Mozilla recently launched version six of their Firefox web browser with all the hoopla attached around it. Well, I am not against Mozilla and neither am I asking people to stay away from the latest version but I was forced to write this article once I updated Firefox to version 6.

Your Cocoon add-on will stop working once you update Mozilla Firefox to version 6 as it isn’t compatible with the newly launched version 6. If you are a regular user of Cocoon security add-on then stay away from Mozilla Firefox version 6 otherwise you might just get frustrated.

Cocoon is one of the famous security add-ons that help you hide your self while surfing the Internet. It helps the user hide his IP address as cocoon converts your Firefox browser into a virtual VPN like system where your original IP address is hidden. It is one of the most famous security add-ons available for Mozilla Firefox and it is free!

We will keep you posted the moment we see any updates from Cocoon, but for now please don’t update your Firefox browser.

Post from: How to hide ip

Stay Away From Firefox If You Like Cocoon

Related Posts:

  1. Firefox Add-on ‘Cocoon’ Is Free!
  2. Understanding The Most Secure Firefox Add-on – Cocoon
  3. 7 Firefox Add-Ons To Browse Anonymously


Latest Security News | SecurityExtra.com

|

Latest Security News | SecurityExtra.com


Habits of Social Networkers: 54 Percent of Users are Addicted

Posted: 19 Aug 2011 02:18 AM PDT

With malware showing no signs of abating on social networks and continuous news of the privacy implications of sharing personal details through social media, it's no surprise users are making more efforts to reduce their risk of exposure in 2011. So indicate findings from Webroot, the first Internet security service company, in its third annual look into the security habits of social networkers. In a survey of 4,000 social network users, Webroot assessed year-over-year trends in behaviours such as usage of privacy settings, incidence of security attacks, and usage of certain data-sharing features. In addition, Webroot explored several emerging areas including self-reported addiction to social networks, beliefs about who is responsible for our security on social networks, and security measures taken while accessing social networks via mobile devices. "Threats targeting social networks are continuously being regenerated in new versions so their makers can evade detection and spread their malicious programs relentlessly across users' accounts," said Jacques Erasmus, Webroot threat expert. "Over the last nine months, our threat intelligence network has detected more than 4,000 versions of the Koobface virus hit social network users. Cybercriminals continue to target social networks because they can quickly access a large pool of victims. But [...]

 

©2009 Programming & Security | Template Blue by TNB

Vida de bombeiro Recipes Informatica Humor Jokes Mensagens Curiosity Saude Video Games Diario das Mensagens Eletronica Rei Jesus News Noticias da TV Artesanato Esportes Noticias Atuais Games Pets Career Religion Recreation Business Education Autos Academics Style Television Programming Motosport Humor News The Games Home Downs World News Internet Design Entertaimment Celebrities 1001 Games Doctor Pets Net Downs World Enter Jesus Mensagensr Android Rub Letras Dialogue cosmetics Genexus Só Humor Curiosity Gifs Medical Female American Health Madeira Designer PPS Divertidas Estate Travel Estate Writing Computer Matilde Ocultos futebolcomnoticias girassol lettheworldturn topdigitalnet Bem amado enjohnny produceideas foodasticos cronicasdoimaginario downloadsdegraca compactandoletras newcuriosidades blogdoarmario arrozinhoii sonasol halfbakedtaters make-it-plain amatha lisboaohyeah lasofia thebushrajr wingshock tripedes gorduravegetal dainfamia dejavu-transpersonal jsbenfica republicadasbadanas ruiherbon iranianforaryans eaystcheyl fotosdanadir ojosmasabiertos ceilasantos