SEO Tips - SEO Blog - Internet Marketing - Search Engine Optimization

» Security

  • Cookies
    By on January 13th, 2009 | 1 Comment1 Comment Comments
    You have little to fear from the edible variety, but the digital ones can be a major threat to your security and privacy. A cookie is a tiny text file (usually less than 1kb in size), which is created and stored on your hard drive whenever you visit a dynamic (or an interactive if you like) web site. These are used to log your personal details so that you can access members only areas of web sites without having to type in a password every time, or to retain your customised settings so that they are available the next time you visit. If you’re using a shared computer, anyone who visits t...
  • Why Hide Your IP Address?
    By on January 13th, 2009 | 1 Comment1 Comment Comments
    Why Hide Your IP Address?
    IP address is the Internet protocol address. This is the unique address of a computer on the Internet. The IP address consists of four numbers divided by periods. These numbers indicate the domain, the subnetwork, the network and the host computer. Each IP address mostly has an equivalent domain name address, spelled with four letters. It is very important to hide your IP address online. Hiding your IP address online ensures that your personal information is not leaked out to the outsiders. By installing software in your PC, you can hide your IP address. Anonymous surfing of the web will enabl...
  • Bypass Web filters
    By on January 12th, 2009 | 1 Comment1 Comment Comments
    Bypass Web filters
    There are several occasions where you will be at a public te How to bypass web filters rminal, and require access to a particular website that is blocked for some reason or another. How to bypass these restrictions is a very common question, and will be covered here. Lets pretend for a moment that the Internet is made up of 26 websites, A-Z. The web filter blocks your browser from accessing sites X-Z, but not sites A-W. Simply make the browser think youre going to A- W. There are a variety of ways to do this: Proxy Servers: This is a list of http proxies. These sites may not be up forever, so ...
  • Securing your WINDOWS XP computer
    By on January 9th, 2009 | 1 Comment1 Comment Comments
    Securing your WINDOWS XP computer
    Do you work in a corporate environment where you don’t appreciate your co-workers or boss having access to your comp and private files when you are not around? You can provide added level of security to your WINDOWS XP System. This is called securing your Windows XP accounts database. You can store all information related to your accounts in a encrypted form on a floppy disk. What this would do is that if You do not have access to your floppy disk, You can not access the system. I am not sure You realized what I just said ! Even if You know your userid/password, You will not be able to a...
  • User’s guide to avoiding virus infections
    By on January 9th, 2009 | 2 Comments2 Comments Comments
    User’s guide to avoiding virus infections
    Keeping an eye out for viruses Computer viruses are everywhere! This guide will show you how to stay alert and how to avoid getting infections on your computer. Having an updated virus scanner is only a small part of this, there are many ways that you can prevent having viruses other than a virus scanner, as it will not always save you. Types of viruses There are many type of viruses. Typical viruses are simply programs or scripts that will do various damage to your computer, such as corrupting files, copying itself into files, slowly deleting all your hard drive etc. This depends on the virus...
  • How do I Test My VirusScan Installation?
    By on January 9th, 2009 | 1 Comment1 Comment Comments
    How do I Test My VirusScan Installation?
    Description After installing VirusScan, you may logically wonder, how do I know if it’s working? The answer is a test virus. The EICAR Standard AntiVirus Test File is a combined effort by anti-virus vendors throughout the world to implement one standard by which customers can verify their anti-virus installations. Solution To test your installation, copy the following line into its own file, then save the file with the name EICAR.COM. More detailed instructions are found below. X5O!P%@AP[4PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H* The file size will be 68 or 70 bytes. If Vi...
  • What is Firewall ?
    By on January 9th, 2009 | 2 Comments2 Comments Comments
    What is Firewall ?
    A firewall is a program or hardware device that watches your network and Internet connection and helps block unauthorized access to your computer. The firewall controls what data can come across the thousands of ports that your computer can use to communicate with the outside world.Think of ports as the equivalent of phone numbers for various departments within your PC, such as Web access, file sharing, video chat, and gaming. The firewall ensures that only essential ports are accessible to the outside world, closing off the others so that they can’t be exploited by malware. You can choo...
  • Quick fix for spyware
    By on January 9th, 2009 | 1 Comment1 Comment Comments
    Quick fix for spyware
    OK, so now you realize that you’ve got some spyware junk on your system. Before you go headlong into deleting suspected files or editing the registry, try this simple disabling technique. First, see if you can determine what the offending files are. You can do this by running “msinfo32″ if you’re using Win98. I only have experience with Win98, so I don’t know the corresponding run command for this “Microsoft System Information” utility in WinXP. Go to the “Software Enviroment” section and poke around to see if you can locate an offensive ...
  • How to avoid phishing
    By on January 8th, 2009 | 1 Comment1 Comment Comments
    How to avoid phishing
    What is phishing Phishing is basically a fake login page in which when the user logs in the username and password are sent to the hacker. How to avoid Method 1: While logging in, input ur correct username and any false password.Iif it is a phisher it will not redirect u to a page telling u to enter correct username and password. But if it is not it will show the message. U can rest assured its not a phished page. Method 2 on the login page right click on the page and click view source. Find the word action.Check the text in double quotes, it shud not be a single word like post.php etc. like ac...
  • XP File Sharing and Permissions
    By on January 8th, 2009 | 1 Comment1 Comment Comments
    XP File Sharing and Permissions
    File sharing and permissions in Windows XP seem complicated. Microsoft provides a Knowledge Base article, but reading it is like walking through molasses: It describes in infinite detail a file security system based on a 1-to-5 scale. However, if you look for this 1-to-5 scale anywhere in your security-settings interface, you may come away a little confused. These numbers are nowhere to be found. Microsoft’s 1-to-5 scale means nothing to the individual user and relates in no way to the actual practice of setting your security protocols. Enter the Screen Savers. We are here to explain i...