IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Formatting May Be the Answer but Is not the Only Answer

13 March 2007 By Saran

People who own computers who have given up hope for remedying the problems that their workstation has solicited, either from viruses, Trojans or spyware will normally resort to formatting and re-installation of all programs to make things easier for them. This is usually the case for people who would not bother finding ways on solving such issues, the less technical savvy people who want the best and fastest solution to such issues.

Formatting Computers

People, often referred to as geeks would go at anything to be able to find alternative solutions without having to resort to the dreaded formatting decision since it will entail a lot of issues such as data loss and re-programming as well. While it is true that it is like doing a general cleaning for the entire workstation, historical files and programs will surely be missing one by one. But it is also like starting from scratch and locating the files and programs that a person has been used to having around.

[tags]computer, formatting, programming, viruses, spyware[/tags]

Filed Under: Backups, IT Security Basics, Malware, Operating Systems, Programming, Real-World Issues, Spyware, Storage, Tips Tagged With: computer, formatting, Programming, Spyware, viruses

Firewalls and Wide Area Network (WAN ) Intrusions

18 January 2007 By Saran

Experiencing connection problems and slow transfer of data may occur at any given time for most networks. While most would immediately identify the network cards, computers, cabling or network configuration at first, the presence of unknown processes of the operating system or possible intrusions such as DOS or Ping attacks can also be considered as possible factors for the deteriorating speed issues for network administrators.

Firewalls

Such instances are only normal, especially for wide area networks, or networks exposed to the Internet. The mischief caused by such people can be expected, especially for people who love to try their talent in hacking and network intrusions. The prize of which is that of creating discomfort and headaches for companies that thrive on networks for business and profit.

While there are network monitors available, it would be best to get the best firewall software there is today. Some do not value the firewalls and their use until such issues arise, but just like the war on terrorism, it would be best to take on security measures before they occur to avoid bigger problems once their mischief succeeds.

Filed Under: IT Security Basics, Network Security, Operating Systems, Physical Security, Programming, Real-World Issues, Security Policies, Wireless Security Tagged With: IT Security Basics, Network Security, Operating Systems, Physical Security, Programming, Real-World Issues, Security Policies, Wireless Security

Unveiling Operating System Secrets

16 January 2007 By Saran

The complete commands and processes to which a computer operates cannot be covered in a day nor will be remembered in one sitting. Ideally, only the important things for consideration such as that of user friendly commands to allow proper interface between the computer and the user behind the keyboard will always be the only know-how that would remain.

Computer Secrets

Computer operating systems such as Linux and Windows offer a wide variety of benefits for people, especially in maximizing the capabilities of a computer and the installed software. Speed and reliability are among the important aspects that computer owner will always want and to be able to perform them, proper identification and references would need to be researched on.

It is a given that most people would not spend time studying all the aspects of a computer system. However, there will be instances when such accidental discoveries from exploring the computer operating system and its resources would ignite interest and push a person into further exploring information surrounding the issue and perhaps look at other benefits that operating systems provide but are not given much attention.

[tags]windows, linux, secrets, system hints, system resources[/tags]

Filed Under: Cryptography, IT Security Basics, Operating Systems, Programming, Tips Tagged With: Cryptography, IT Security Basics, linux, Operating Systems, Programming, secrets, system-hints, system-resources, Tips, windows

MajorGeek.com: A Download Site for Computer Care

8 January 2007 By Saran

Major Geek

Day-in and Day-out, people surf the web for possible downloads in the form of drivers, security stand alone cleaners, and free programs that will help them in their specific needs. One drawback is the potent threats and reliability of such sites since everyone is aware that such malicious Spyware or Trojans may be present in these programs which are usually compressed in zip files prior to free downloading.

Majorgeeks.com is one site that contains a lot of the helpful tools to aid computer users in their everyday issues and improvements for their overall operating system and performance. One notable thing that most users are aware about is that of intrusions in their system from the usual cookies and attachments that people get from the Internet. With the mischief going around, no one really knows how safe their computer is and what files are needed and not on their hard drives.

Filed Under: IT Security Basics, Malware, Network Security, Programming, Review, Spyware, Storage, Tips Tagged With: IT Security Basics, Malware, Network Security, Programming, Review, Spyware, Storage, Tips

Checking the Registry Integrity of your Computer

6 January 2007 By Saran

Ordinarily, all computers would evidently slow down owing to the number of programs installed and running and exposure over the web which injects some files for proper browsing of sites. At some point, boot-up speed of most computers as well as immediate shutdowns as performed by users may encounter some delays. These are only proper since the registry would be open to a lot of modifications from such activities.

Fixing Registries

This is why some companies have developed registry checkers and cleaners such as Registry Mechanic, to be able to determine the modifications and problems that have affected certain areas of the computer. Among the known issues would be improper deletion of shortcuts or programs without using the add/remove option on the control panel of the Windows operating system. This alone leaves a conflict that makes computers adjust to such occurrences.

Another thing is that of cookies gathered from the web. While cookies are stored in the temporary IE folder of a computer, some may tend to change some configurations on the machine and thus slow it down.

Registry cleaners are not guaranteed to speed up a computer speed at an instant. A user must also thoroughly evaluate if such modifications are okay for removal. A wrong decision may eventually make things worse, hence if a person is unsure, consulting computer experts or even the web for advice prior to action would be advisable.

Filed Under: Malware, Operating Systems, Programming, Spyware, Tips Tagged With: Malware, Operating Systems, Programming, Spyware, Tips

Scheduling Software Patch Updates and Upgrades

4 January 2007 By Saran

Computer Programmer

Most software tools that are used today are not perfect. Weaknesses and loopholes that may encounter system operation conflicts and problems will only be natural, especially for programs that are either not immediately compatible or are prone to breakdowns every now and then. The need for a continuous development as far as applying patches and updates towards such software, such as programming languages and operating systems like Windows and Linux, is a necessity.

This is only normal considering that chinks in the armor of anything will always be revealed at times when people least expect it. This is a continuing and ongoing trend that all software developers and administrators need to attend to, considering that as the height of demand for accurate programs are increasing, the same holds true for the need to provide features and flexibility on the programming aspect of installed systems for smooth flow of automations in most business organizations and entrepreneurial undertakings.

[tags]programmer, patch updates, systems, operating system, windows, linux [/tags]

Filed Under: IT Security Basics, Operating Systems, Programming, Security Policies, Storage, Tips Tagged With: IT Security Basics, linux, Operating Systems, operating-system, patch-updates, programmer, Programming, Security Policies, Storage, systems, Tips, windows

Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security