Join the God Side, Jesus is Coming…….

Archive for May, 2008

Free Remote Access tools

Remote Access tools

1. LogMeIN ->

2. ShowMyPC ->

3. VNC ->


Setting Ms Access 2003 DB Security

First Add new users and Set users & groups security on a new .mdw file
– Setting a default Admin user a password will let other user to log on that Database

Remember to secure a multiple database user you need to:
– change ownership of all the db object from the default admin user to the new created db admin
– Remove all permissions for the default admin user & users groups
– Grant permissions to the new users and groups.

Reference: “The complete reference Ms Access 2003” from Mc Graw Hill

Web surf anonymously

Whenever you surf the Web, you leave yourself open to being snooped upon by web sites. They can track your online travels, know what operating system and browser you’re running, find out your machine name, peer into your clipboard, uncover the last sites you’ve visited, examine your history list, delve into your cache, examine your IP address and use that to learn basic information about you such as your geographic location, and more. To a great extent, your Internet life is an open book when you visit.

The best way to make sure web sites can’t gather personal information about you and your computer is to surf anonymously


Reasons to configure your host files

For Windows XP Host files

  1. Blocking Unwanted Parasites
  2. Privacy Protection , Recover hijacked host files
  3. Making Internet Access Just a Little Bit Faster

Disk Defragmentation

Antivirus Scans are significantly faster on Desktop systems with regularly defragmented files and free space. As capacity to quickly respond to new anti-virus attacks is a critical component of any organization’s security plan, software that automatically keeps systems defragmented should not be overlooked as the tool that makes fast antivirus scans possible.

By Diskeeper®

What Your Browser Reveals About You

Back on November 1, I talked about MS Word, and how it could be revealing a lot of information about you. Your browser may be doing the same thing. When you visit a Web site, it gets your IP (Internet Protocol) address, of course. This string of numbers is the “real” address of your computer. It allows other computers and servers to locate each other, and Web sites, on the Internet.

Your IP address does not reveal directly who you are, but it easily shows your Internet Service Provider (ISP) and your city or region. If you are uncomfortable with this, you can set up a proxy server. Find one at your favorite search engine.

A proxy is a computer that sits between you and the Web. Other computers and Web sites see the proxy’s IP address instead of yours. But law enforcement agencies can still find you, so do not use this method for illegal purposes!

With your IP address in hand, malicious sites can scan your computer, looking for weaknesses such as open ports, or a Windows that has not been updated in a while. Ports are access points or communications links to Windows. There are 65,536 of them. (Note that this is not the same animal as the hardware ports on your computer, where you connect different devices.)

When an open is detected, it can often indicate which program is in use. For example, outgoing email will usually use SMTP on port 25, while browsers use port 80. Once the current program is known, a hacker will try to exploit known flaws in it.

The contents of your Clipboard can be easily seen as well, which is why you should never copy and paste IDs, passwords, or other sensitive info. Web sites also record which Web browser and Windows version you are using. Site owners use this data to ensure that their sites display correctly on your monitor, for instance.

Studies have shown that most malicious attacks attempt to exploit flaws in that were patched, or fixed, months previously. So your best and easiest defense is to simply update your Windows and security programs on a regular schedule.

Microsoft releases updates to Windows on the second Tuesday of each month, which has therefore become known as (you guessed it) Patch Tuesday. However, emergency fixes could be issued at any time, so it is a good idea to check the Windows Update or Microsoft Update site every week or two.

Syd Tash is a noted computer security consultant and author of How to Protect Your Computer Online. He has been keeping Internet surfers safe and secure since the last century. Find out how he does it; protect your own computer with five layers of protection right here:
= >

ID Theft Checklist – Please Print & Keep!

By Syd Tash ( Sun 11 May 2008)

Over the last few years I have written a lot, and you have no doubt read a lot about identity theft, and how to protect your personal data online and on your computer. So here, in one convenient list, are some dos and don’ts you should follow.

1. Before entering sensitive data on a Web site, look for the closed padlock in the upper or lower part of your screen. Make sure the site address begins with https://… That letter”s” means secure. However, these two indicators are not foolproof.

2. Never copy and paste login IDs or passwords. The contents of your Clipboard can easily be seen.

3. Avoid public computers. If you do use one, do not shop or do your banking. Never step away from the computer while an application is open that you had to log in to. Change your password as soon as you get home.

4. If you use your own laptop at a hot spot, make sure you have proper encryption set up. Do not just use the default factory settings. These usually provide little or no protection.

5. Regardless of where or how you do your online surfing, change your passwords every couple of months, or more often if you think they have been compromised. Choose passwords of at least six characters, and include numbers, letters and ?, !, *, #, $ if permitted.

6. Do not reply to emails supposedly from your bank, broker, utility company, government agency, PayPal, eBay, etc. Do not click on links in such emails. To go to one of these organizations, click your Desktop icon or Favorites link, or type the address manually into the browser address bar.

7. If you have fallen victim to a fake email (phishing) and have given out confidential information, change your password immediately and notify the company in question. Send them a copy of the spoofed email.

8. Do you travel with a laptop across international borders? Make sure you do not have any sensitive data on the machine that could cause you problems if the computer was inspected by customs agents. If your data is encrypted, you may have to reveal the decryption key, or risk having the laptop seized. Make sure you have a current backup at home or at the office.

9. Do not open email attachments, even if it is from your friend. His computer could unknowingly be infected. True friends do not send each other !

10. New threats and dangers generally evolve much faster than countermeasures. So your best defense is to keep your security programs up to date, including your antivirus, antispyware, firewall and of course Windows. Now be a good buddy and send this entire list to your friends. Suggest they save or print it. Click “ShareThis” just below.

Syd Tash is a noted computer security consultant and author of How to Protect Your Computer Online. He has been keeping Internet surfers safe and secure since the last century. Find out how he does it; protect your own computer with five layers of protection right here:
= >

Tag Cloud