Wednesday, October 5, 2011

Firewall Support, The Best Way to Block Hackers

Do you know you can protect your computer from unauthorized access with the help of firewall? A firewall is a security tool. It may be a hardware, a software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. It protects an entire network based on the nature or level of the network. Hardware firewalls are more expensive and harder to configure but have more options to manage desirable security features over any type of network. It is also usable to signify particular or customized data transmission. Don't you know how to configure firewall? For Firewall configuration you can talk to a computer repair company.

On the other hand, Software Firewalls are basically used for limiting access of internet for a particular local or domain user but can't be used to manage groups. It is usually less expensive and easier to configure. A firewall inspects each individual "packet" of data passing through either side of the firewall, incoming or outgoing from your computer and determines whether it should be allowed to pass through or should be blocked.

A firewall security can stop hackers from accessing computer remotely, protects personal information to be compromised, blocks malicious "pop up", ads and certain cookies which increases the chances of getting infected. Firewall security cannot be used to prevent e-mail viruses. Only an antivirus product with updated definitions can prevent e-mail viruses. The firewall will require periodic updates to the rule sets and the software itself for complete PC security.

If we don't initialize an action and the firewall picks up something automatically, we should most likely deny it and investigate it. If something stopped which was working prior to the installation, there is a good chance it might be because of the firewall. One of the primary functions of a firewall is to provide a buffer between trusted and untrusted networks. The most common place for this is between the corporate network and the Internet, protecting a group of R&D computers from the rest of the network, separating sensitive servers like finance from the corporate network. It can be used as a security gateway between two networks like between trusted and untrusted networks.


Source: http://EzineArticles.com/5283079

Thursday, September 29, 2011

How to Disable the Windows Firewall in SBS 2003



If you are working with a computer that is using the Windows Small Business Server (SBS) 2003, then you may need to turn off the firewall to help resolve connectivity problems and other issues for multiple users. To disable the Windows firewall, you must have administrator privileges to access and make changes to the Computer Management options. Also, when you are stopping the firewall, it's important to make sure the service isn't turned off for too long or that you immediately enable another firewall service.


Instructions

1. Click on the "Start" button on the desktop and then click on the "All Programs" option. Click on the "Administrative Tools" option.

2. Click on the "Computer Management" option and then the Computer Management dialog box will appear on your screen.

3. Right-click on the "Computer Management (Local)" option from the left navigation menu and then click on the "Connect to another computer" option.

4. Enter the computer name into the text box and then click on the "OK" button. Click on the "Services and Applications" option and then click on the "Services" option.

5. Right-click on the "Windows Firewall/Internet Connection Sharing (ICS)" option and then click on the "Stop" option. Close out of the dialog box and the firewall will be fully disabled.

Tuesday, September 27, 2011

Predicts 2012's SME security threats


Companies across the UK, irrespective of their industry sector or size, are increasingly targeted by cyber attacks from criminals and even their own employees.

The number of attacks is now so large and their sophistication so great, that many organisations are having trouble determining which new threats and vulnerabilities pose the greatest risk. Furthermore, planning how resources should be allocated, to ensure that the most probable and damaging attacks are dealt with appropriately, is a complex process.

For this reason, IT support provider Barton Technology has compiled these predictions for 2012.

1. Physical security: The least obvious threat comes from the physical location of an organisation's server. Although not often considered as part of an IT security policy, the server should always be located in a place with controlled access and egress. Making sure the server containing vital information is not easy to reach should be amongst the top priorities for any SME IT manager.

2. Viruses: The most common security threat comes from viruses and malware. Often these are delivered via spam e-mails containing pictures, videos and executable files but they can also be delivered via web sites, USB sticks, mobile phones and other portable memory devices. Just one click can be enough to infect an entire department or company. However, they are relatively easy to protect against, by ensuring that the company firewall and antivirus software is up to date.

3. Phishing attacks: The complexity and increase in frequency of PHISHING attacks, means that businesses, as well as individuals, are now at risk. There is no such thing as anti-phishing software, so the only way for SMEs to reduce the risk is to train their staff in how to deal with these e-mails. For instance, users can be taught to be more vigilant and aware of the warning signs associated with this kind of message. Banning porn, gambling and illegal downloads can also help reduce the risks associated with PHISHING. Unfortunately, this threat has an older and more mischievous brother; spearPHISHING, which is highly targeted and uses information, gathered from publically available Web and social media profiles to personalise the attack. SME staff have even been known to hand out the company's out bank account details as the result of particularly focussed PHISHING attacks. Again, training is the only solution.

4. Lost or stolen portable devices: Recent news stories about Government officials losing memory sticks and laptops holding the personal details of members of the public have provoked substantial criticism. For an SME, a lost or stolen external hard disk, containing sensitive company information can easily cost five or six figure sums. The best way to ensure data security on external memory devices is encryption and password protection.

5. Spyware: Spyware does not spread directly in the way that a computer virus or worm does; an infected system will not attempt to transmit the infection to other computers. Its objective is normally to obtain micro-information, such as surfing habits or Web history, but other functions such as changing the PC's homepage are not uncommon. Antispyware software includes programs designed to remove or block the unwelcome software but the best cure is preventative; not downloading unauthorized software and avoiding disreputable Web sites.

6. Internal hacking: Although external hackers consistently grab the headlines, surveys show that the biggest threat to a company's data security is its own employees. While there may be workers with a clear malicious intent, there are also cases in which employees unknowingly contribute to security lapses. In this situation, the best way to alleviate the risk of company computers being hacked is proper training. Furthermore, to minimise internal malicious hacking, companies can reduce the attractiveness of the information and data stored on their servers. For example, making CRM, financial and marketing databases secure is a good step towards reducing internal hacking.

7. Lack of appropriate company policies: Unfortunately, many SMEs who fall victim to hacking, PHISHING and spyware have brought their problems on themselves. Failing to create IT, internet, e-mail and social media procedures and proper employee handbooks is often the deep root cause of security problems. The remedial action to counter this problem is obvious, but when writing the documents it may well be worth taking the advice of your IT consultant to ensure that the measures you suggest are appropriate.

8. Cyber crime: Recognised as one of the fastest growing IT security threats of 2011, the profile of cyber theft will only increase in 2012. Inappropriate use of company data, internal hacking, inappropriate use of social media, e-mail or Web publishing and planting illegal documents in a company's IT system all fall into this category. Although it's very tricky to deal with, cyber crime can be avoided by making sure security procedures are in place and employees follow them accordingly. Furthermore, a strong organisational culture, based on honesty and rewarding professionalism could also help.

9. Lack of deep understanding: One of the key problems in SME security is actually a lack of understanding of the minutia of the industry and technology. The root cause of this problem is often that the person responsible for IT is rarely a specialist IT professional. It's normally just someone with a high level of working knowledge; sometimes a financial director as the result of their expertise with SAGE and similar database driven software. For example, a non IT professional will often choose a software based firewall instead of a hardware based system. This means that the firewall is dependent on software updates and, if it's the integral Windows firewall, dependent on the integrity of the Windows operating system. A hardware based system is completely independent of these factors and thus more reliable. There are examples like this littered across the IT security industry and there is no reason to expect someone without a specialist background to know about them.

10. Website and networking hacks: More and more businesses are using social media in their marketing campaigns. However, this leaves them open to attacks. Hackers can take over a company's Twitter or Facebook account, and then use it to discredit the company or SPAM its followers. Similarly, websites can be hijacked, and unwanted content can be uploaded, which can seriously damage an organisation's image.

Source :industrytoday

Monday, September 26, 2011

How to Go Through a Firewall With Yahoo Messenger


Yahoo! Messenger is an instant messaging client that allows users to talk to their friends from almost anywhere in the world. However, if it is used by a computer that has a firewall installed, certain problems can arise in trying to connect to the Yahoo! instant messaging servers. This can be remedied by changing settings in the firewall to allow Yahoo! Messenger through.

Instructions

1. Open your firewall software that is installed on your computer and look for the option on the main menu that says something like "Port Forwarding," "Exceptions" or something similar. Click on this option to open the part of the firewall software where you can choose to allow software programs through the firewall.

2. Add the following ports to the firewall software (if port exceptions are options in your firewall software): 5050 (Chat and Messenger access), 5000-5010 (Voice Chat access) and 5100 (WebCam access). Save the port exception settings.

3. Add the application titled "ypager.exe" to the list of program exceptions in the firewall software. This EXE file is the program that Yahoo! Messenger runs under, so adding it as an exception will allow all communications to and from the program to occur.

Source: eHow

Thursday, September 22, 2011

Set Up ESMTP on a Cisco Firewall


Extended Simple Mail Transport Protocol (ESMTP) enhances support for the Cisco Internetwork Operating System (IOS). When businesses can use ESMTP to install mail servers behind a firewall rather than Simple Mail Transport Protocol (SMTP). Both of these protocols establish a Transport Control Protocol (TCP) channel from server to client to exchange email. The difference is that ESMTP uses the Extended Hello (EHLO) command. This provides troubleshooting support by creating a series of extensions that allow error codes to go back to the client if a message transmission failure occurs


1.Type "enable" (without quotes) on the router to enter the privilege mode on the firewall. You enter all commands in the command line editor, which automatically starts when the router is turned on. The screen will look like this:

2.Privilege mode allows you to work only using certain configuration commands; for example, you cannot enter interface commands here. There are multiple modes on the router. Think of a mode like a floor in a building. In the higher floors, you can do certain things you could not do on lower floors.

2.Type "config t" (without quotes) in order to enter the global configuration mode. Type "ip inspect name email esmtp" (without quotes), where "email" can be any name you chose. This command configures inspection on the router. The inspection command will look at different parameters before the email transmission occurs. One extension is message size, another is the delivery status notification. In all, the router inspects eight extensions.

3. Type, "interface e0" (without quotes) to assign the inspection duties to an interface. The interface is the router's physical connection to the network. Here, it supports Ethernet.

4. Type "ip inspect email in" (without quotes) in order to apply the inspection rule to the Ethernet interface. Type "end" (without quotes) and then type "copy run start" (without quotes) to save the configuration.

Source : Ehow

Wednesday, September 21, 2011

Delivering remote plant-wide visualisation


Establishing a secure and reliable communication path over the Internet requires solving a number of technical challenges such as, firewalls and public IP addresses. Rather than using complex and expensive solutions to install and manage this such as VPN, special M2M SIM cards etc. HMS’s new Netbiter Argos 3 has been developed to provide a simpler firewall friendly solution. This enables the user to focus on the plant issues without the needs for specialist IT skills, or calling on others to address the extensive Internet, firewall, GPRS/APN configurations.

Using cloud based architecture, the secure online data centre automatically gathers and stores both site and equipment data from the remote communication gateways at intervals specified by the user. Through the remote server users can access their industrial installations, machines and devices from anywhere in the world. The information the user is viewing is effectively a mirror site in real-time on the secure server.

In addition to basic reporting, the Netbiter servers provide a browser based graphical dashboard/user interface to view the plant data. This enables users to quickly and easily create a graphical layout of their remote installation. The dashboard includes functions for loading pictures into the layout, analogue and digital graphical components (such as gauges, meters, indicators, etc.), which makes it possible to detail a remote system with a visual layout that is easy to understand. Where appropriate GPS data makes it possible to view the location of each device in the field on an overview map (using Google maps) and the system also lets you build multiple installations.

Access to the server information means users can log historical data and produce graphical trends or diagnostics, manage alarms, or automatically backup or restore remote configurations. Although not originally conceived as a supervisory control and data acquisition (SCADA) package, the functionality exists to easily configure one. The data can also be accessed by the users own ERP system for further analysis and reporting.

Security of data and access

Moving data off-site raises concerns over both its security and availability. By using special firewall friendly communications between the remote communication gateways and the data centre makes it possible to keep existing broadband security infrastructure at the customer’s site. This procedure is accepted by almost all IT departments and gives confidence that the installation is secure from a security perspective.

Data storage is rigorously protected as the remote server/data centre is automatically backed up, so the risk of losing data, or downtime due to access problems with the server areminimised. Data centresrun on professional enterprise-class architecture that is designed to support both small and large-scale deployments. They provide 24/7 monitoring of the server health, redundant servers at different geographical locations, redundant storage, and protection against fire, theft and similar eventualities.

To ensure the security of wireless communications over GPRS, dedicated SIM cards can be selected. These mean that it is not possible to ping or try to access the remote site except through the data centre and also avoids unnecessary and costly GPRS traffic. If however the system does not need this added security normal data enabled SIM cards can be used.

Access to the online system is centrally controlled and requires password authentication. Multi-level password layers are used to provide permissions to access different functions, and the server authenticates users and ensures their correct access levels. Password activity is logged by the server, and all communications are secured using Secure Socket Layer (SSL) encryption. This is the same method banks use for secure online transactions.

Typical adopters have been machine monitoring and analysis, building automation and monitoring, monitoring tank farms, pump and pumping stations monitoring, and monitoring renewable energy sites. Mobile communications via GSM and GPRS mean that monitoring even the smallest sites is viable.

The costs are subscription based and reflect the functions required. One subscription is used together with each Netbiter gateway, and it is possible to host up to three remote gateways in one account with the free subscription option. Cloud based services may not be the answer to all manufacturing issues, but its secure performance and potential to reduce investment costs is likely to have a huge impact.

Most people are comfortable with online banking for checking their assets and transferring money from one place to another, so maybe remote management of our business assets is not such a big a leap into the unknown.

Source : threngineer

Monday, September 19, 2011

Firewall Support, The Best Way to Block Hackers


Do you know you can protect your computer from unauthorized access with the help of firewall? A firewall is a security tool. It may be a hardware, a software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing a private network and/or a single computer. It protects an entire network based on the nature or level of the network. Hardware firewalls are more expensive and harder to configure but have more options to manage desirable security features over any type of network. It is also usable to signify particular or customized data transmission. Don't you know how to configure firewall? For Firewall configuration you can talk to a computer repair company.

On the other hand, Software Firewalls are basically used for limiting access of internet for a particular local or domain user but can't be used to manage groups. It is usually less expensive and easier to configure. A firewall inspects each individual "packet" of data passing through either side of the firewall, incoming or outgoing from your computer and determines whether it should be allowed to pass through or should be blocked.

If we don't initialize an action and the firewall picks up something automatically, we should most likely deny it and investigate it. If something stopped which was working prior to the installation, there is a good chance it might be because of the firewall. One of the primary functions of a firewall is to provide a buffer between trusted and untrusted networks. The most common place for this is between the corporate network and the Internet, protecting a group of R&D computers from the rest of the network, separating sensitive servers like finance from the corporate network. It can be used as a security gateway between two networks like between trusted and untrusted networks.

A firewall security can stop hackers from accessing computer remotely, protects personal information to be compromised, blocks malicious "pop up", ads and certain cookies which increases the chances of getting infected. Firewall security cannot be used to prevent e-mail viruses. Only an antivirus product with updated definitions can prevent e-mail viruses. The firewall will require periodic updates to the rule sets and the software itself for complete PC security.


Source: EzineArticles

Thursday, September 15, 2011

5nine Software Announces Preview of Virtual Firewall 3.0


Today, at Microsoft Build Conference, 5nine Software announced Preview of 5nine Security Manager version 3.0 - first completely host - based Virtual Firewall with Anti-Virus (AV) for next version of Microsoft Windows 8 Platform.

5nine Security Manager 3.0 continues to support 5nine v-Firewall PowerShell APIs and will have Management application GUI similar to the popular 5nine Virtual Firewall and Security Manager version 2.x. However, new version is completely host - based, and does not require installation of In-Guest agents as previous version did to perform intra-VM network filtering and AV scans.

Such solution became possible with new Microsoft Windows 8 Server Platform WFP (Windows Filtering Platform) interfaces, and new architecture of Hyper-V 3.0 Virtual Switch. New 5nine Security Manager now consists of the user mode service effectively implementing and installing WFP provider on the host machine, and kernel mode driver implementing vSwitch WPF-callout filtering.

5nine Development work close with Microsoft Core Network Team to develop these state of the art Virtual Firewall and Anti-Virus applications that now allow the host-only deployments.

Setup, Traffic rules Management and support of multiple Guest OSs now is also significantly simplified. From ROI standpoint this also puts 5nine Hyper-V Security Solution much ahead of the current competition.

5nine Security Manager is designed for Anti-Virus and v-Firewall protection of both Hyper-V SMB and large size Cloud deployments supporting different Guest Operating Systems such as Windows, Linux, BSD and other.

"Aside from traditional hardware firewalls, new 5nine Security Manager with Anti-Virus and Virtual Firewall for Hyper-V allows us to programmatically manage network security on both ‘Per-VM’ and ‘Per-Host’ basis," said Konstantin Malkov, 5nine Software CTO, “ This definitely decreases management costs and improves the security of Hyper-V Virtual environments, especially for large size Private and Public V-Cloud deployments. New Windows Platform and Hyper-V is awesome, and certainly will drive significant attention of SMB and Hosting providers. Including certain areas where the completion had advantage previously”.

-Utilizing the new Architecture - 5nine Security Manager uses Sophos Anti-Virus Enterprise engine, that now also is deployed on the host , together with virus/malware signatures, and does not require In - Guest scanning.

"Scalability and thus ROI of virtualization projects have been severely restricted by the intensity of security applications. Traditional Anti-Virus solutions were designed for a one to one relationship with the hardware, so customers had to run an instance of the security agent in each guest. All of these instances quickly add up to significant performance issues, with painful cost implications. In the new 5nine Security Manager, Sophos Anti-Virus can perform expensive security tasks centrally on the host, significantly enhancing performance while maintaining protection. “ - said James Lyne, Director of Technology Strategy, Sophos. - "We are pleased to report that 5nine Security Manager with Sophos Anti-Virus is the first fully host-based Anti-Virus and v-Firewall solution for the Microsoft Virtualization platform".

More and more companies, including those of highly regulated financial, insurance and healthcare industries, are looking to utilize Microsoft Hyper-V virtualization technology to reduce costs and optimize IT resources. Security and compliance are increasing concerns for broad range of virtualization deployments. 5nine Security Manager with Sophos Anti-Virus and Virtual Firewall provides strong protection for the virtual infrastructure without considerable performance overhead for the Hyper-V clusters/hosts and VMs.

Availability and Pricing

5nine Security Manager 3.0 will be commercially available simultaneously with the RTM release of Windows 8/Windows Server vNext, and will be licensed on per-VM basis.

5nine Security Manager 3.0 is a part of a broader management solution for Microsoft Cloud providers - 5nine Cloud Manager for Hyper-V , that is currently in Beta, and also includes Monitoring and Backup solutions for Microsoft Azure, Private and Public Cloud.

About 5nine Software

5nine Software helps organizations to safeguard their investment in virtual infrastructure by providing innovative systems management solutions designed to reduce costs, increase productivity and security.

5nine is an international company with its U.S. headquarters in New Jersey. 5nine is rapidly expanding its presence and its partner network around the world, and will continue to offer innovative and practical solutions to help IT professionals to better plan and manage their Cloud/Virtual infrastructures.


Source : prweb

Wednesday, September 14, 2011

Firewall Protection For PCs


Windows Firewall is a PC security product to protect computer and all its operations from external security threats and malware. It comes both as specific products as well as bundled with Microsoft operating systems such as Microsoft Windows XP, Window Server 2003, and Windows Vista. Windows Firewall basically serves as a protective boundary which unable intruders to peep into your PC. Such a function makes Windows Firewall a necessary asset for your computer's protection.

The inbuilt Windows Firewall automatically turns on by default. However, you may switch it off as well by making some changes in its settings. On the other hand, Firewall protection software offered by brands such as Symantec, Sonic Wall etc don't come with any operating systems and needs to be installed as stand alone products. Firewall protects by blocking the connection on identifying any unsolicited request i.e. when anyone makes attempts to access your computer via Web or any other network.

When you run a program that needs information from the Web or a network, your firewall send you a message asking whether to block or unblock the connection. A proper configuration of firewall is utmost important to let it know what kind of barriers you want to put for your network. Although firewall software monitors technical networking components and the internal working of operating systems, managing Windows Firewall is hassle-free.

Still, if you are not sure about the way to install or configure firewall, you can consider taking online firewall support. Such services are easily available with any online computer help vendors. Being online, they are 24x7 available and offer assistance at the convenience of your home. You must be wondering that how can it all be possible online? Well! This is the magic of remote support technology which enables technicians access your system with your permission and performs the required task. You feel as if the technician is sitting along with you.

Onsite computer help vendors eliminate the need for you to take your PC to expensive computer repair showrooms or call technician at your premises. This certainly helps you save loads of money.

Article Source: EzineArticles

Wednesday, September 7, 2011

How to Activate the Internet Firewall in Windows XP?

Firewalls are hardware or software components included in a computer to help protect against malicious activity over a network or the Internet. The Internet is an incredibly valuable resource, but one that also carries a lot of risks if not used properly and with care. Hackers, spyware and various other dangers are just a mouse click away. That's why it is important to activate your Windows XP Internet firewall and make sure it is working.


Activate Your Windows XP Internet Firewall

* 1 Ensure that you have the latest updates for Windows XP, including Service Pack 2. Service Pack 2 and the latest automatic updates provide functionality for the Windows XP integrated firewall.

* 2 Click on the "Start" menu button.

* 3 Click on the "Control Panel" selection.

* 4 Click on the "Security Center" link, or click the "Switch to Classic View" link to change the appearance of the control panel.

* 5 Examine the settings in the window that opens. The firewall settings will display either on or off. By default they are set to "on," unless you have changed your system settings or activated a firewall from a third-party application.

* 6 Re-enable the Windows firewall by clicking on the "Recommendations" button within the firewall frame. This will bring you to a window in which you can change the settings for the firewall.

* 7 Click the "Enable Now" button to activate the firewall.

* 8 Click "Close" in the window that opens. It's simply a notification to let you know that the firewall has successfully activated.

* 9 Click "OK" to shut the Recommendations window and return to the Settings window.

* 10 Copy and paste file names and links if you need to add them to the firewall exceptions list. This will prevent Windows Firewall from blocking incoming and outgoing Internet traffic that is generated or received by the selected program.

Thursday, August 25, 2011

How to Increase Firewall Protection

With the constant threat of Internet hackers and identity thieves it is vital that your computer is fully protected and always updated for the latest viruses and malware. The Windows firewall, a default with most PCs, is a powerful anti-virus tool that can be configured to increase your computer's protection.

Instructions

Navigate to your Computer's Control Panel located in the Start Menu. Double-click on the "Windows Firewall" icon to open a new window. The Windows Firewall icon is represented by the image of a brick wall with the planet earth behind it.

Ensure that the Windows Firewall is switched on. If your firewall is not switched on your computer is susceptible to incoming viruses, Trojan horses and malicious files. Click the "On (recommended)" button to turn on your firewall.

Click the "Exceptions" tab at the top of the Windows Firewall window. You are still allowing certain programs and applications to download and transfer packages through your PC although your firewall is running. By altering the Exceptions of your firewall you can increase the protection of your PC. Clicking on the "Exceptions" tab opens a new window section.


Un-tick some of the programs that are more likely to contain or traffic malicious files. For example, P2P file-sharing programs such as Limewire, Ares and UTorrent are not 100 per cent regulated or checked for viruses.

Update your firewall with a Windows Service Pack. Windows is constantly updating the firewall software of its Operating Systems and this means that any new or previously-unknown malware will now be recognized and prevented from accessing your PC. Your computer will let you know and warn you when these new malicious files are accessing your computer.


Read more: http://goo.gl/LTpra

Thursday, August 18, 2011

Firefox Clipboard Problems


Firefox interacts with the operating system in which it is installed to utilize the clipboard functions--copy, cut and paste. As with any program that interacts with the clipboard, issues can arise that cause the clipboard to no longer function within Firefox. Fixing these issues is a simple matter of diagnosing the cause of the problem. With Firefox, clipboard issues usually arise because of a few different conflicts.

Troubleshooting

If you are having troubles with the clipboard in Firefox, it is important that you isolate what is causing the issue. Be sure to note all programs running when the problem started. Look closely at the exact scenario in which the clipboard is not working. Is it within an email program, in a text editor, in a simple comment box, in the Firefox chrome itself? Noting all of these details will aid in quickly resolving the problem.

Malware or Virus Infections

The most common cause of clipboard problems in Firefox are viruses and malware infections. These viruses and malware target the Windows registry to enable exploitation and abuse of the clipboard contents by third parties. Usually, these viruses or malware will create a registry item called AppInit_DLLs which will interfere with proper clipboard function in Firefox and other browsers. These problems can be resolved with frequent spyware and virus scans and by installing real-time virus and spyware protection software.

Multiple Windows

In Windows, the clipboard functionality is shared by virtually all applications. When running multiple windows, particularly programs that utilize the clipboard at a high rate such as word processing or spreadsheet software, it can often happen that the clipboard contents are lost when switching the window focus. As of November 2009, this bug exists at the operating system level and within Firefox. This problem is resolved by simply launching a new window of Firefox.

Rich Text Editors

Some rich text editors used on websites include toolbar items to copy, cut and paste. Firefox disables this functionality within the rich text editor as a security precaution. In opening the clipboard up to usage by websites, the possibility exists that other websites could exploit the information within the toolbar without explicit permission. Firefox does continue to allow the usage of keyboard shortcuts to copy, cut and paste thus providing a sufficient workaround to this issue.

Read more: http://goo.gl/iG4oG

Tuesday, July 26, 2011

Windows Firewall and Its Importance !!


Windows Firewall acts as a protective shield for your computer against possible safety intrusions. It is highly effective in blocking computer worms and viruses from reaching the computer and making unauthorized changes and "stealing" information. It is worth noting here that Windows Firewall protects your PC by five services: packet filtering, application filtering, proxy server, circuit-level, and Stateful inspection. Firewall prompts the user to accept or decline certain connection requests so that PC security is not compromised at any stage and all operations are authorized, to say the least. In other words, PC users can specify rules for source and destination IP addresses and port ranges.

It is, however, important to note that Windows Firewall does not block spam or unsolicited emails. Firewall also does not stop PC users from opening emails that can include dangerous attachments and doesn't detect or remove computer worms or viruses. It is, therefore, recommended that PC users must install powerful antivirus software and update the same on regular intervals so that PC security is not exposed before threats.

Now that we have read about Windows Firewall and its importance, it is now time to read what to do in case the very purpose of Windows Firewall, PC security, is defeated by an intrusion.
In case you are experiencing problems with Windows Firewall, you can always refer to computer troubleshooting service. This will help you identify the problem and even treat in some cases. In case the intrusion is severe, it is highly recommended that you opt for professional computer help desk service. This computer support service can be accessed for free or little cost from a reliable computer tech help provider.

If you are not aware of any such providers, you can go online to find a provider specializing in such services. For this, you need not make any special efforts. You can just search engines such as Google, Yahoo!, or MSN and type words such as "computer support service", "computer tech help", "computer troubleshooting service", or "computer help desk service". You will be redirected to sites of computer support service providers and then you can compare and choose from the available options. It will now be time to clarify any doubts (if any) from the provider and setting the computer tech help terms so that things are simplified for a better understanding.
Read more: http://goo.gl/F9KYB

Tuesday, July 19, 2011

How to Get Rid of a Sonicwall Firewall

A firewall is a software program that serves as a barrier between your computer and remote hackers, viruses and worms. It is a vital piece of equipment if you wish to keep your computer secure. Windows XP, Windows Vista and Windows 7 come equipped with a firewall, as do many antivirus programs. Consequently, if you have Sonicwall Firewall, you may want to remove it in favor of one of these other firewalls.

Instructions

Windows 7 and Vista

Click the "Start" menu, then "Control Panel." Click "Programs" and "Programs and Features."

Click "Sonicwall Firewall" and then "Uninstall."

Restart your computer.

Read more: http://goo.gl/RzPYO

Wednesday, July 13, 2011

Why Is My Firewall Blocking Windows Live Messenger

Windows Firewall is a protective computerized barrier integrated into Windows operating systems to prevent certain programs from accessing your computer. The firewall checks all programs and will automatically block programs it views as a potential hazard.

Cannot Log On

If you are having trouble logging into Windows Live Messenger, your firewall may not be giving the computer network permission to access it. Check your firewall settings by clicking "Start," "Settings," "Control Panel," and opening the Windows Firewall application. Click the "Exceptions" tab to see the list of programs being blocked.

Messenger

Messenger is executed by the msnmsgr.exe file. If you do not see this file or "Windows Live Messenger" in the list, you should click the "Add Program" button and look in the list for Messenger. If it is not in the list, click the "Browse" button and locate it through the programs folder. Click the "OK" button once the Messenger program has been added to the list.

Other Firewalls

Routers have firewalls to protect the computer from the external source of the router network. Anti-virus programs have their own firewall as part of their protection systems. If you have other firewalls running on your computer, access that firewall and give it permission to access the Messenger program.


Read more: http://goo.gl/VvY6w

Friday, July 8, 2011

IP Spoofing and IPS Protection with a Cisco ASA 5500 Firewall

The Cisco ASA firewall appliance provides great security protection out-of-the box with its default configuration. However, to increase the security protection even further, there are several configuration enhancements that can be used to implement additional security features. Two of these features are IP Spoofing protection and basic Intrusion Prevention (IPS) support.

IP Spoofing Protection:

IP spoofing attacks are those that change the actual source IP address of packets to obscure their true origin. This means that packets arriving at a particular interface (e.g inside) must have a valid source IP address that matches the correct source interface according to the firewall routing table. Normally the firewall only looks at the destination address of a packet in order to forward it accordingly. If you enable the IP Spoofing mechanism, the firewall checks also the source address of the packets.

If for example our inside interface connects to internal network 192.168.1.0/24, this means that packets arriving at the inside firewall interface must have a source address in the range 192.168.1.0/24 otherwise they will be dropped (if IP Spoofing is configured).

The IP Spoofing feature uses the Unicast Reverse Path Forwarding (Unicast RPF) mechanism, which dictates that for any traffic that you want to allow through the security appliance, the security appliance routing table must include a route back to the source address.

To enable IP Spoofing protection, enter the following command:

CiscoASA5500(config)# ip verify reverse-path interface "interface_name"

For example, to enable IP spoofing on the inside interface, use the following command:

CiscoASA5500(config)# ip verify reverse-path interface inside

Basic IPS Protection:

Although the ASA Firewall supports full IPS functionality with an extra IPS hardware module (AIP-SSM), it supports also basic IPS protection which is built-in by default without using an extra hardware module. The built-in IPS feature supports a basic list of signatures and you can configure the security appliance to perform one or more actions on traffic that matches a signature. The command that implements the basic IPS feature is called "ip audit".

There are two signature groups embedded in the firewall software: "Informational" and "Attack" signatures. You can define an IP audit policy for each signature group as following:

For informational signatures:

CiscoASA5500 (config)# ip audit name "name" info [action [alarm] [drop] [reset]]

For attack signatures:

CiscoASA5500 (config)# ip audit name "name" attack [action [alarm] [drop] [reset]]

The keywords [alarm], [drop], [reset] define the actions to perform on a malicious packet that matches one of the signatures. [alarm] generates a system message showing that a packet matched a signature, [drop] drops the packet, and [reset] drops the packet and closes the connection.

After defining an IP audit policy (IPS policy) as shown above, we need to attach the policy to a specific interface:

CiscoASA5500 (config)# ip audit interface "interface_name" " policy_name"

Let's see an actual example:

CiscoASA5500 (config)# ip audit name dropattacks attack action drop

CiscoASA5500 (config)# ip audit interface outside dropattacks

You can visit my website Cisco Tips for more information about Cisco products and solutions. You can also learn how to configure any Cisco ASA 5500 Firewall Here.

Article Source: http://goarticles.com/article/IP-Spoofing-and-IPS-Protection-with-a-Cisco-ASA-5500-Firewall/1237260/

Friday, June 24, 2011

How To Open Firewall Ports In Windows 7

All connections into and out from a computer to the Internet, have associated a number of roads or highways of data called Ports.

Generally, applications that need to interact with the Internet, require a way that power authorized by moving data in and out, but for security reasons, Windows 7 as well as other operating systems, by default only ports that are open brings necessary for the most basic functions.

In this manual, we will explain the steps to open ports on Windows 7 and so using this process, you can open ports for eMule in Windows 7 or to play online in Windows 7.

Configure the ports in Windows 7

The first thing we must do to open ports on Windows 7, is to access the Windows Firewall. To do this, enter the Control Panel and select Windows Firewall.

Then click on Advanced Settings (Advanced Settings) and in the window that opens, select the left, input rule (Inbound Rules).

Now, a list of all applications and access settings on the firewall in Windows 7 is opened. We can give full access to the connections of an application (which is not highly recommended if not familiar with this) or we can open the ports that need to perform a certain activity.

To open the ports in Windows 7, click on New Rule (New Rule) and we see a new window
Click on Ports (Port) and now must tell Windows 7, what we want to open ports.

Because Windows7 firewall provides support for managing multiple types of networks is also necessary to indicate which networks you want to apply this rule of ports.

Finally, to end of open ports on Windows 7, the firewall asks us to believe this kind of profile associated with ports that are open. In this window, we will assign a name (eg Messenger) and a description that we put the ports you have open this rule.

To finish the process, click on Finish and you've been able to open ports in Windows 7 games or other applications that require this process.

Source: http://goo.gl/KuXIe

Wednesday, June 1, 2011

Stop Intruders From Accessing to Your PC With Free Firewalls for Windows 7

Are you using Windows 7 operating system and looking for a free firewall so that you can block unwanted access to your PC? If the answer is yes, this article is worth reading. Although Windows 7 operating is an excellent operating system comprising a number of robust security features but still there are some loopholes which allow the hackers to access to your computer. There are viruses, spyware and adware designed by the hackers to make their job easier. So, how to block them and enjoy secure computing? In this article you will find some important tips and recommendations regarding firewall which will allow you to block the hackers.

Windows XP operating system boasts built-in firewall and in Windows 7 this integrated firewall has been beefed up. The Windows 7 free firewall is by default turned on that block unwanted access. You can configure the Windows 7 integrated firewall by accessing the Control Panel / Security Center. But this firewall could not pass through leak testing done by security researchers. So, even after using the firewall there is enough chance of data being theft.

The job of a firewall is not only to protect important and sensitive data but also block port scans, unwanted requests and hacking attempts. You can use a third party firewall as better security measures. There are many free Firewall software programs for Windows 7 that could be used for boosting your PC security.

Although the markets if flooded with many free Windows 7 compatible firewalls but all of them are not top products. So, you should do some research before installing one of them. Ashampoo FireWall, Blink Personal Edition, PC Tools Firewall Plus, Sunbelt Personal Firewall Version, VirusBuster Internet Security Suite, ZoneAlarm Basic Firewall, Comodo Firewall, Online Armor Firewall, Outpost Firewall, etc. are to name a few in this context.

A firewall alone could not be enough to safeguard your computer. Along with a firewall you should install powerful antivirus software. You may find innumerable free antivirus software available in the market. But for secure computing, it is recommended to go for a paid version. AVG, Norton, Avast, Kaspersky, etc. are some of the most renowned names in this regard. You can first try with the trial version and if you find the experience satisfactory, then go for the full version. Remember, for optimal protection there should be a good combination of anti-virus, antimalware and firewall on your computer.

If you find difficulties to install firewall or need firewall configuration support, you can get in touch with an online computer repair company. There are many such service providers available that offer tech support at a very reasonable price.

Source: http://goo.gl/8oBjY

Wednesday, May 25, 2011

Need For Firewall Support

A firewall software application aims at controlling access to or from a computer for security related concerns. A firewall is a software program, hardware device, or a combination of both that keeps a vigilant watch over your incoming data coming through the Internet connection into your computer. The firewall will only allow data in that you asked for. It will also monitor outgoing data of your computer to the Internet. It will only let information out that you say can go out.

Windows firewall is a fully developed firewall application which can start on its own and should be left on if you are not replacing it with any other firewall product. And, there is no doubt about efficiency of Windows firewall.

Windows XP's Internet Connect Firewall is half a firewall. It only checks incoming information of your PC and doesn't check outgoing data of your computer. Why is it still popular among computer users? If your system has by mistake become virus infected, your personal information is definitely in danger. Virus replicates itself and spread infection to other computers connected through a common network, or even allows hackers to access your computer to do whatever they want.

The only quality of a true firewall is that it will prevent infectious matter from getting out of your system & inform you about the existing problem so you can clean it up. This is what makes firewall software to be the most important thing for your PC security.

A managed firewall ensures the highest level of security for an enterprise network. As signified by its name, 24x7 firewall ensures that your data is secure and protected round the clock.
If you do not have an efficient monitoring and network reporting system in place then your database might not be running efficiently. You can think about buying support from computer support centers to for an effective data management and keep your database up and running on a 24x7 basis in an effective manner. However, be meticulous enough while choosing your technical support partner. The decision must be based on the factors like experience, market reputation and service prices.

Source: http://goo.gl/eGa3h

Thursday, May 19, 2011

Windows Firewall - What and How Basics

What is a Firewall?
Firewall is a software or hardware which helps users in detecting and keeping all the malware away from PC. Firewall is the most effective software that helps you in protecting your PC. It is also important to turn on your firewall prior to connecting to the Internet.

Need of Firewall -
Today's computer environment has become pretty unreceptive. Hence, it has become very important to get a complete protection for your computer security otherwise hackers can get access to your PC as well as your valuable data. Apart from hackers, your computer can also get affected by viruses and other malware. Firewall is used as a preventive measure to stay away from all such malicious items.

How does Windows Firewall work?
Windows Firewall monitors every network traffic which is enabled. Firewall keeps track of every communication that is originated from your PC and also it prevents your PC from all the unsolicited items. If needed, Firewall dynamically opens ports and allows your computer to receive traffic that you have specifically requested, such as a web page for which you have clicked the address.

Windows Firewall also helps user in blocking of unidentified traffic that can reach to your PC. For special uses, such as networking, hosting online games, or hosting your own Web server, you can select ports which you want to leave open. This allows others to make connections to your computer, but it can also reduce security.

It is always suggested that a firewall product must be well aware of Windows Firewall basics and use procedure. Nonetheless, configuration of firewall creates issues in browsing of many websites, such as, gaming sites, web or other server. If you are also facing such issues, these problems can be well-treated with help of expert computer technicians.

(Note - Apart from handling the issues of Windows Firewall, technical support experts also help you configuration of complete PC protection system.)

Benefits

* Windows Firewall is considered of high importance for big corporate houses. They serve as a core of secure networking environment and keep hackers staying away from your computer and crucial information.
* It offers a secure web browsing environment and reduces of your worries any data theft. It also diminishes the percentage on internal threats.
* If you want an extensive reach on internet. You can customize your firewall settings. This would help you in blocking only unwanted IP address but rest would be functioning nice.
* You can decide upon the protocols to be included in your firewall's filters. You can customize it for some of the commonly used protocols, which are: IP, HTTP, TCP, FTP, SMTP etc.
* Your firewall can be to customized to allow or block any port number

How to configure Windows Firewall on Your PC

* Click the Windows icon & select Control Panel
* Click on System and Security.
* Click on Windows Firewall
* If a green check mark is visible, you are running Windows Firewall.

Types of Firewall
There are various types of Firewall which can be configured on your PC. These are respectably -

* Packet filtering firewall - this firewall is used to examine the information available in the header of message packet.
* Application-level gateways - This firewall work on the application layer of the protocol and it works in a pretty intelligent manner than the packet filtering firewall.
* Circuit-level gateways
* Hybrid firewall

Source: http://goo.gl/8pKJw

Thursday, May 12, 2011

Significance of Windows Firewall Support


With the computing environment become increasingly hostile, no tech savvy consumer can ignore the need to be protected by a firewall. The primary function of firewall protection is to prevent unauthorized access to a network. A network can consists of your local area network, wide area network, and the Internet or it can simply be an Internet Service Provider (ISP) trying to avoid improper access to the files.

Users who are already running a sophisticated firewall product must be well acquainted with the basics of windows firewall and how to use it.

However, they can encounter some common problems while using Windows Firewall. The array of these errors generally include unable to configure firewall, trouble in accessing games, Web or other server. Such nasty problems can only be treated by trained technicians with profound computer knowledge.

Apart from undertaking common problems with Windows Firewall, the tech people can also get you the installation as well as configuration of your PC protection system done. Some people undervalue the importance of configuring firewall. It is however necessary to access the internet. Indeed, you may need to change your configuration setting sometimes to enjoy your audio applications properly. A properly configured Windows Firewall system is must for all businesses no matter small or large.

Need for the solutions of these technical requirements are responsible for ongoing buzz about Windows Firewall support. The tech people engaged in offering such services have a vast array of resources to troubleshoot firewall errors, design and implement a perfect firewall structure according to your personal as well as business requirements.

Windows firewall hold high significance for big corporate and serve as a core of a secure networking environment. The application not only keeps hackers away from reaching your critical data but it is also helpful for the protection against internal threats.

Source: http://goo.gl/byKca

Wednesday, March 23, 2011

Fix Windows 7 Firewall Error 08x007042c

Problem :

Cannot start Windows 7 Firewall. Get Error 08x007042c.

More information I have found on the the problem.

The error log indicates: The Windows Firewall service depends on the Base Filtering Engine service which failed to start because of the following error:
Access is denied Event ID 7001.

The error logs indicate the Base Filtering Engine service terminated with the following error:
Access is denied Event ID 7023.

Also I checked the dependent services Remote Procedure Call (RPC), DCOM Service Process Launcher and RPC Endpoint Mapper are both started.



Solution :

If you have this crappy problem just do this: run-services.msc-base filtering engine: double click-make sure u have the local service, and empty password under LOGIN button. do the same on windows firewall in services. then go to regedit http://support.microsoft.com/kb/943996/en-us do that AND!!!! give another user to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services user must be called: NT Service\bfe with full control! Then you can start bfe, and then you can start that firewall in services.msc! cheers!

Tuesday, March 15, 2011

Fix Windows 7 Firewall Failure Error

Problem :

My first experience with Windows 7 64 bits...After adjusting Windows 7 Firewall to it's highest security level, the Gibson Research firewall leak test demonstrated that Windows 7 firewall failed to prevent breeching. I downloaded Zone Alarms free firewall and that was successful in plugging the leak, however, it seems that Zone Alarm was not compatible with 64bit OS and my computer was freezing upon startup! I am also running Microsoft Security Essentials which does not seem to contain any independent firewall settings. I have uninstalled Zone Alarm and now remain with only a leaky Windows 7 firewall. Any advise???


Solution :


Windows 7 also has a test application, Action Center. If there is any leak, it will be detected and the notification will pop up. If not, we usually consider that the system is safe and we need not modify anything. At this stage, I suggest you restore the Windows Firewall settings to default and check whether everything is fine. Meanwhile, regarding the report from the third party application, please contact the manufacturer for further assistance about the reported leak.