Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Best of Software Utilities for Windows By Try My Trick

Best of Software Utilities


When using windows it is better to go for  some of the software which can perform a task very easily without going for complex traditional methods.These utility software are very useful,powerful yet free. In some cases it is better to go for traditional methods and apps in windows which can perform the task without a software. 

In one of my posts i have provided each and every hidden app in windows. Hidden apps in Windows and see what are the apps hidden for normal user in windows.

Operating System

While going through operating System it is better to go for Windows operating system because as a normal or a limited user the way of operating system design and performance is better than other kind. For Home based users it is better to go for Windows XP or Windows7. But recently Microsoft have announced their discontinued Support for XP, so it is better to go for Windows 7. For touch screens and look and feel it is more suggested to go for windows8. For people with huge money in their banks and never mind of spending money i suggest Apple MAC. Mac on the other hand one of the best operating system for home based PC's but its cost is somewhat not reasonable. For low hardware configurations and no budget for operating system you can go for Linux flavors. Linux is open source and many of the vendors are providing Linux operating system for Free. As per my concern i suggest Ubuntu,Mandriva and Fedora. Linux supports low hardware configurations also. In Mainframe or Server PC's Many of them use linux because linux is secure operating system.

Cleaners

Cleaning refers to the removal of unwanted storage space or files from the computer memory. Unwanted data will be available at many locations, each and every app creates some files of its functioning and are temporary, some apps removes those files after the use and some of them wont they left unwanted files in the storage. the operating system also creates some of the files for its use and should be deleted by a tool. For this i first suggest traditional way i.e running the following commands through RUN, some of them are 'recent','temp','%temp%' etc, run without quotes. Anoter interesting tool is windows disk clean up for windows. Open Run(windows+R) and type 'cleanmgr.exe' and enter. You will now select the root drive and check the files you want to delete and clean. Open your browser and clean history,saved forms data etc. It is somehow complex to to go through each and every application and clean memory. A software called CCleaner will do this task automatically. In this you can clean up everything from OS files to Browser cache. 

Disk Clean Up                                                                    CCleaner



Browsers

Browsers used for surfing the internet. Its a Mirror of Servers data at client's Desktop. Any Operating system is shipped with a default browser as like windows shipped with Internet Explorer. While considering speed,performance and Connectivity browsers are ranked according to users usability. As per my concern for moderate conditions of speed of the data Mozilla Firefox and Chrome Serves better for low connectivity the solution is opera. If you have High speed data connection You may use any browser but i suggest Internet Explorer.  All these browsers are available for free of download.

Downloaders

For Downloading the content from the internet we need clients. Many of the clients are available in the market some of them are free and some are about money. For any content first search Torrentz, you may get the fresh and unseen content here. You can download the .torrent file and use the clients like Utorrent and Bittorrent clients to download the file. In these clients you go to settings and adjust the bandwidth settings with download speed to unlimited and upload speed to 1Kbps. This increase the performance of the software. Another interesting Download client is Internet Download Manager, Many people call it as IDM. It is available as 30 day trail and need to purchase activation key after it. Any how many crack software are also available use them with care.You ca download youtube videos with IDM, the better and best download tool for the century.

Registry

Registry maintenance and cleanup is critical task for a simple user who is not clear about it and its function. Using some of the registry cleaners in the market causes the complete breakage of the registry which causes the failure is OS functioning, So to do clean up the registry safely i recommend CCleaner, it not only cleans the computer and also cleans registry. I simply cleans the registry but will never cause the failures in the registry.

Security

System Security is a typical task for the novice users. Protecting system from viruses,trojans and worms is not an easy task. Anti virus can do this task well, but antivirus software are numerous in the era. Computer user will mainly search for better product at less or no cost. I too agree with the line of action by the end user.For securing your computer i suggest Microsoft Security Essentials(MSE) which will secure your computer more than a bank protecting your money. One thing for the anti virus users is that any antivirus will perform better by frequent update. the antivirus updates its virus database for the new viruses. It is available for free to download at Microsoft. In windows8 it is renamed as Windows Defender. It needs to update for every 7 days. Some of the other antivirus in this area are Kaspersky,Avast,Ecet,McAfe,Panda Cloud,CalmWin,Avira,AVG,K7 etc.

Firewall

A Firewall protects the computer from outbound and inbound connections. It is a Registry of Inbound and Outbound Policies.By default Windows is shipped with windows Firewall, in some cases it is turned off. So turn it On to get complete protection. Another Best firewall Software is ZoneAlarm which also perform the task well but need to invest some money.

PDF Readers

I suggest Foxit Reader as the best in this category because in foxit we may not only read a PDF but we can create a PDF using this. This kind of functionality is not available in Adobe reader. You can also create a PDF file by using DoPDF, download and install DoPDF and then Print the document you can find the DoPDF printer which outputs your document as PDF.

ZIP and RAR

Nothing found better than WinRAR in this category. WinZIP also performs well here. using WinRAR we can zip,rar or compress and decompress any file using Win RAR.7Zip also new and good as trending now.

Media and Players

Similar to browsers any operating system is shipped with a media player like windows media player in windows XP. For media I suggest VLC the product of the decade. Windows media player is also best but some codecs are required other than the application. 321 media Player,KMPlayer and media monkey are also considered. iTunes for MAC is the only best option for MAC.

Office

Office work is also the home work for many of the employes now a days. So Office produts like word,power point are more used at home too. I suggest Libre Office. Back to the line 'Computer User Searches for Best product with low or no cost' . Libre Office is open source so just download and use simply. Microsoft Office formley known as MSOffice is also best tool but need to buy this product from microsoft. Ashampoo's Office is little useful but cost seems high.

Video,Audio Editing

Here no competitors in reach for Format Factory. Audio Video Picture can be mixed or can make a movie or grab a portion of video or audio.
Read More


Protecting Firewalls -Part3

Protecting Firewalls -Part3

NetBIOS and Other Services?

The NetBIOS over TCP/IP (NBT) which is sometimes loosely called "NetBIOS", is a service which has some security problems with it. It is enabled by default in Windows default installations, and it is very common to see that a firewall does the job of preventing the efforts to get access to your computer via NBT. Yet, in almost all cases, this service is not needed, and thus can be disabled. To disable NBT in Win95/98/ME is not as simple as it is in Win2K/XP, but can still be done reliably. We explain how to do this in another article (#to be written soon). It is needless to say, that if NBT is disabled, there is no need for a firewall to block communication to it. Also, in the case of other services, such as RPC services, and others, in many cases you simply don't need those services and better disable them from within Windows rather than use the firewall to block them. There are various ways to know which services are running on your computer, and which of them are listening for communications from the outside. If there are ones that you don't need, they should be disabled.

Hiding the Computer?
In web sites of many personal firewall companies, they are putting a lot of weight on the ability of their firewall to hide the computer on the Internet. Yet, exposing your home computer on the Internet is by itself, neither a security nor a privacy threat. If you provide some services to the Internet on your computer, for example, you put a web server on your computer to allow other people to view web pages, then you might get rid of some of the crackers, by setting your firewall to unhide only this type of communications. Some attackers will not make a full scan of your computer, but only a partial scan, and if they did not scan for the specific service that you provided, they will not see your computer. Yet, if the service is a common one, there is a good chance for many of them to scan it and thus find the existence of your computer. If they "see" the existence of your computer, they might decide to scan it further, and find out the services you are providing, and scan it for security holes to use. Yet, there is no much meaning to it when we speak about simple home computers.

What a Firewall Cannot Do!

Another misconception about personal firewalls is that they are incorrectly thought as if they claim to give an overall protection against "hackers" (i.e. intrusions). They are not.
Defense Against Exploitation of Security Holes
A firewall can allow or deny access to your computer or from your computer according to the type of communication, its source and destination, and according to the question which program on your computer is handling the communication. Yet, its ability to understand the details of the communication is very limited. For example, you may set the firewall to allow or to deny your e-mail program from getting and/or sending messages. It may allow or deny your web browser from browsing the Internet. But if you allowed your e-mail program to communicate with the e-mail servers for sending and receiving messages, (and you are likely to allow it if you want to use your e-mail program), or if you set the firewall to allow your web browser to communicate with web sites, the firewall will not be able to understand the content of the communication much further, and if your web browser has a security hole, and some remote site will try to exploit it, your firewall will not be able to make a distinction between the communication that exploits the security hole, and legitimate communication. The same principle goes with e-mail program. A personal firewall may block you from receiving or sending e-mail messages, but if you allowed it to receive messages, the personal firewall will not make a distinction between a legitimate message and a non-legitimate one (such as a one that carries a virus or a Trojan horse). Security holes in legitimate programs can be exploited and a personal firewall can do practically nothing about it.
I should comment, however, that some personal firewalls come combined with some Trojan horse detection, or intrusion detection. This is not part of the classical definition of a firewall, but it might be useful. Such tasks are usually taken by other tools such as antivirus programs or antiTrojan programs.
Tricks to Bypass or Disable Personal Firewalls
There are also various ways to disable, or bypass personal firewalls. During the time a few tricks to bypass or disable were demonstrated by various programs. Especially, tricks for an internal program to communicate with the outside bypassing or tricking the firewall. For some of them such as the one demonstrated by the Leaktest, and in which a non-legitimate program disguises itself as Internet Explorer, practically today, all personal firewalls are immuned. For other tricks, such as a one demonstrated by Outbound, which uses some non-standard type of communication directly to the network adapters bypassing the components of the operating system which are suppose to deal with Internet communication, and by that bypassing the firewall, are only now being patched against by the various firewalls, and yet other methods, such as the one demonstrated by Tooleaky, which uses Internet Explorer as a messenger to communicate with the outside, and is thus identified as a mere legitimate browsing, are still waiting for most of the personal firewall to find a fix.
Firewalls CANNOT Decide for You What is a Legitimate Communication and What is Not
One of the main problems with personal firewalls, is that you cannot simply install them and forget them, counting on them to do their job. They can deny or permit various types of communications according to some criteria, but what is this criteria, and who decides what is the criteria for whether they should permit or deny some communication?
The answer, is that it is the computer user's job to define the exact criteria when the firewall should allow a communication and when it should block it. The firewall may make it easier for you, but it should not take the decisions. There are too many programs, too many versions, and it is not possible for the firewall to decide accurately when a communication is legitimate and when it is not. One person might think that it is legitimate for some program to deliver some information to the outside in order to get some service, while another will think that it is not. One version of a program might communicate with its home server in order to check whether there is an upgrade, and another version might also install the upgrade even if you do not wish. Some firewalls will try to identify communication efforts which are largely considered as legitimate, and will let you the information so that it will be easier for you to decide whether such should be allowed. Others will suffice with more basic information, making no suggestions (and thus - no incorrect recommendations). One way or another, once you installed a firewall, you will have better means to understand what types of communications are running on your computer, but you will also have to understand them in order to be able to configure your firewall so that it will correctly know which communications to allow and which to block.
Common Problems and Deficiencies Regarding Personal Firewalls
A personal firewall might be a good contribution to security. Yet, if you do not understand much about the topic, then you are likely to be confused and misled by its alerts and queries, and thus find yourself spending hours in chasing after imaginary crackers, fear from imaginary threats, and misconfigure it due to misunderstanding. You may find yourself blocking legitimate and important communication believing it to be cracking efforts, and thus surprised to see why things work slowly or why you are disconnected from the Internet, or you might be misled to allow a non-legitimate communication by some software that tricked you to believe that it is a legitimate one. On the other side, if you are quite knowledgeable on computers and security, then you are likely to effectively defend your computer even without a firewall (by means discussed in section II.4) and it is thus that the role of personal firewall in securing your computer, is extremely small and not much important. We discuss here in brief some of the problems that personal firewalls may generate.
A False Sense of Security
As we've already learned here, a firewall is limited in its ability to secure your computer. Yet, many people believe that if they will install a personal firewall they will be secured against the various security threats. I was even surprised to find out that there are people who believe that give much higher priority in installing a personal firewall than in installing an antivirus program. An always updated antivirus program plays a much more important role in the security of a personal home computer than installing and maintaining a personal firewall. A personal firewall should not come on account of any other security measure that you use.
A False Sense of Insecurity
When you install a firewall and you look at all the communication efforts through it, you might be surprised at the amount of communication efforts from the Internet to your computer. Most of them are blocked by a typically configured firewall. There are all the times efforts to try to communicate with various backdoor Trojans on your computers. If you are not infected, there will be nothing to listen and to respond to those communication efforts, and they are thus practically harmless. There are efforts to communicate with your NBT driver, to see if your computer by mistake allows file sharing. There are other types of probes to see if your computer exists, or various efforts of servers to probe your computer in order to find the best path for legitimate communication to it. There are sometimes remnants of communications that were supposed to go to other computers, but made their way to yours (for advanced readers: because the IP number that your computer uses, were used by some other computer earlier). Those communication efforts are blocked even without a firewall. If your computer is not infected with a RAT, and if your computer don't have NetBIOS over TCP/IP enabled or even it does not have file and print sharing enabled (and on most computers this is disabled by default), then none of these pose any security threat. If your computer is not infected with a SubSeven Trojan, then no matter how often there will be efforts to communicate with it, they are all doomed to be failed.
Yet, some personal firewall (such as Norton Personal Firewall or ZoneAlarm) by default proudly announce that they have just blocked an effort to crack into your computer. Norton may even define those efforts that were blocked as "high security threats" while they were not a threat at all even if your computer didn't have a personal firewall at all. Such firewalls give you the false impression that they save your computer again and again from extremely dangerous threats on the Internet, so that you wonder how did you survive so much time without noticing any intrusion before you installed the firewall. I usually say, that those personal firewalls are set their "report level" to "promotional mode". Namely, the personal firewall is set to give you the false impression that it is much more important than it really is.
Read More


Advertise Here

Infolinks

Advertise Here


© Copyright 2012, Design by Srikanth Suryadevara. Powered by Blogger.