Sep 27, 2008

Symantec Norton Antibot The Latest In Norton Computer Protection Software

It seems like every other month a new “program” comes along to make our lives that much easier. For example, first we could bookmark favorites, and then RSS feed them, and then came widgets and now “bots” which are robots that do a lot of our computer work for us in the background. Examples of friendly bots are weather bots, game playing bots, instant messaging and my favorites are those on AOL Instant Messenger which do all kinds of functions for me like shop, find movie times and even give updates on the Wall Street Journal.

Unfortunately not all bots were created “equal.” Some are friendly and some are not. The ones that are not friendly can be a form of malware that allows control of your computer to be released, providing hackers with the opportunity to access your information and spread harmful bots to others. This type of computer virus can then be used to spread spam and commit various types of identity theft and other online fraud.

So with new threats to our computers and information, new methods of protection are required. One of the oldest and most well known software protection designers has recently released a new protection program, Symantec Norton AntiBot. This is a software product designed to prevent the hijacking of one’s personal computer by bots and uses the bots on design programs against them, to located and destroy them.

Many people already employ some form of protection on their personal computer, such as increasing the protection level from internet information to “high.” But these cannot detect some of the most recent bot programs and may not be the most efficient means of information protection, especially with the Internet being used more and more frequently for online shopping, ticket purchases, travel and other “high risk” activities.

A more effective method of detecting and eliminating threats caused by bots is to install software designed specifically to detect, destroy and prevent bots from having access to your computer. With Symantec Norton AntiBot software, protection against bots is enhanced several times and the threat of bot attack is greatly diminished. It’s program protects against bots by blocking bots from entering your computer through downloads and e-mail attachments (two of the common ways bots enter a personal computer), checking for any unusual behavior on your personal computer and eliminating it, and detecting malicious bot software at all levels; keeping your personal, financial and credit card information safe and stopping identify theft before it can occur.

Because bots operate in the background and are not detectable by antivirus or antispyware programs, many computer users are completely unaware that their personal computer has become infected. Many problems caused by bots go undetected until it is too late. Warning signs that your computer may have been accessed include: slowness of computer speed and unusual or irrelevant error messages. However, many times com these symptoms are sporadic and computer users will take little notice. Many people will continue to use their personal computer, unaware that bots have hijacked their personal computer and are slowly at work; looking for credit card numbers, passwords, and logon information which can be used for identity theft and in committing other types of online crime. This program scans your personal computer on a continuous basis, closing the gaps that could allow bots to infect your personal computer and better ensuring that bots do not invade and gain control.

The use of Symantec Norton AntiBot to determine what a harmful or useful bot and allows you to continue using those bots you love and have come to depend on for information and services. It can be used in addition to several other antivirus and antispyware programs. Its compatibility is not limited to only Norton products.

The cost of this software is $29.95 for one year of service. It was awarded PC Magazine’s Editor’s Choice Award (2007) and underwent rigorous testing which included using AntiBot on computers with existing threats as well as allowing threats to try to access the computer after installation.

With the growing threat of identity theft and credit card fraud Symantec Norton AntiBot offers an additional level of protection needed to combat the threat of bots and prevent them from turning one’s personal computer into a robotic that turns into an instrument of destruction to both your personal and financial well-being.
Stumble Upon Toolbar Read more on this article... Read more on this article...

The new virus from microsoft

Microsoft launched new campaign to go against the piracy. Most of the people in the world are using pirated version of Microsoft windows xp.
To overcome this problem of microsoft and to promote the use of original software, microsoft made something like a virus. It turns your computer into black screen for about 1 hour. But don't worry it will do no harm for your system files and your recently saved documents.
This is the bad news for those people who are completely depending upon the pirated version of windows XP professional. But don't worry if you want your computer to work good and reliably then you just have to keep your computer away from internet. Yeap its true, microsoft crawls in to your system via internet without knowing just like a trojan viruses and spywares does. But microsoft's crawling robots much more clever than any other viruses because microsoft have already setup such feature to provide automatic updates.
And the main question is that, how to get rid of this problem? Of course there is always an alternative. Well I am not sure about it, but what do i think is that, you must disable all the features and programs that crawls to microsoft's website or any. Especially windows updates, i think this is one of the way that microsoft can copy the required codes to your computer and make your computer to go crazy.
Don't think that you are safe only by turning off automatic updates, You must go from the pipeline.


Here is how you do it,
Start-> RUN -> Type "gpedit.msc"

->Local Computer Policy
->Computer configuration or User configuration
-> administrative templates
->windows components
-> windows updates
-> now disable all the lists by double clicking it and marking a disable radio button.


also u can use windows validation patch which is easiy available on the net..just google it..
Stumble Upon Toolbar Read more on this article... Read more on this article...

Sep 15, 2008

PROXY

Proxy servers hide your IP address and thereby prevent unauthorized access to your computer through the Internet. They do not provide anyone with your IP address and effectively hide any information about you and your reading interests. Besides that, they don’t even let anyone know that you are surfing through a proxy server.

TYPES OF PROXY

Transparent proxy

A transparent proxy announces to the world that it's a proxy, and passes on your information. It provides no privacy improvements. It can provide a benefit by caching frequently accessed pages; many companies also use this system for filtering purposes.

Anonymous proxy

An anonymous proxy offers the caching benefits of a transparent proxy, while hiding your IP address (by replacing with either the proxies IP, or a random address. The downside to this approach is that sites that use address detection to establish unique users (online games, voting, some logins) will not be able to distinguish you from others in your domain. Of course, that might be a bonus sometimes.

Highly Anonymous proxy

A highly anonymous (often known as an elite proxy) makes your system look the same as a non-proxied system (with the proxy server's IP address). This provides the best security; however, all the caveats of an anonymous proxy are still present. In addition, an anonymous proxy's existance can be detected, and the server can suggest workarounds, but there's no way to detect an elite proxy. Again, that may be your goal.

NOW A PROXY ADDRESS MAY LOOK LIKE xxx.xxx.xxx.xxx:xxxx

for eg. 192.168.1.1:3128

The part 192.168.1.1 represents the IP address of the proxy and 3128 the port through you connect to proxy.

There are many websites like www.hidemyip.com anonymouse.org , www.hidemyass.com.

These sites do not change your IP address but you can surf the internet with great privacy.

A good method to change your IP is to use a CGI based proxy. While there are thousands of proxies available but only a few will work in your browser. Now these type of proxies can assure full online privacy.

CHANGE YOUR IP IN INTERNET EXPLORER

Here is a step by step guide on HOW TO CONFIGURE IE WITH A WORKING PROXY

STEP-1 Get a list of working proxies from www.proxy-list.net or any other site just google proxy server list

STEP-2 CHECK THE PROXIES YOU RETRIVE FROM http://www.ip-adress.com/Proxy_Checker/

MAKE SURE TO MAKE A LIST OF AT LEAST 10 WORKING PROXIES BECAUSE ALL OF THEM MAY NOT WORY FROM YOUR COMPUTER OR MAY BE EXTREMELY SLOW

NOW GO TO IE-TOOLS-INTERNET OPTIONS-CONNECTIONS as shown below


You will see a section labeled proxy server. Just enter the proxy details there which you have just retrived. Don't forget to enter the port of the proxy.

If you want to use the proxy for other connection as well(like FTP) just click on advance tab and you will be presented with the following window.


click OK

TO Test the proxy open any site and see if it works. If not then try again. NOW again open www.tellmyip.com and see the difference!

IF YOU FEEL ANY PROBLEMS JUST LEAVE ME COMMENTS.

YOU CAN UNDO THIS OPERATION ANYTIME BY UNCHECKING THE PROXY SERVER SETTINGS.

Proxy list ::-
* Vtunnel.com (Supports SSL)

* Vtunnel.biz

* Vtunnel.info

* Vtunnel.us

* Vtunnel.tv

* V-tunnel.org (new)

* Atunnel.com

* Btunnel.com

* Ctunnel.com

* Dtunnel.com

* Ftunnel.com

* Gtunnel.com

* G-tunnel.com (new)

* H-tunnel.com (new)

* I-tunnel.net (new)

* Jtunnel.com

* J-tunnel.com (new)

* Ktunnel.com

* K-tunnel.com (new)

* Ltunnel.com

* L-tunnel.com (new)

* M-tunnel.com (new)

* Ntunnel.com

* N-tunnel.com (new)

* Otunnel.com

* O-tunnel.com (new)

* Ptunnel.com

* P-tunnel.com (new)

* Q-tunnel.com (new)

* Rtunnel.com

* R-tunnel.com (new)

* T-tunnel.net (new)

* Wtunnel.com

* Ztunnel.com

* Ftunnel.net

* Htunnel.net

* Jtunnel.net

* Ktunnel.net

* Ltunnel.net

* Ntunnel.net

* Otunnel.net

* Rtunnel.net

* Wtunnel.net

* W-tunnel.com (new)

* Ztunnel.org

* Unblock-Websense.com (new)

* Unblock-Bess.com (new)

* UnblockWebsense.com

* UnblockBess.com

* Polysolve.com

* VPNTunnel.net

* SafeForWork.net

* 24Proxy.com (new)

* 24Traffic.info (new)

* HideMyBox.com (new)

* ProxyButton.com (new)

* IraniProxy.com (new)

* WizProxy.com (new)

* Backfox.com

* Calculatepie.com

* DahProxy.com

* Englishtunnel.com

* EvProx.com

* FreeIam.info

* g2gToMyspace.com

http://62.193.249.41

http://62.193.245.234

http://62.193.236.96

http://62.193.236.100

http://62.193.235.46
Stumble Upon Toolbar Read more on this article... Read more on this article...
::SITES LINKING ME::

SetEnvIfNoCase Referer "^http://(www.)?securecomputing\.com" ref=1 "(.*)" Order Allow,Deny Allow from all Deny from 206.169.110.66 Deny from env=ref