20101012
TechReally! Repair special!
From October 13-22 TechReally will be running a repair special for all local customers.50$ an hour computer repair. All laptop and PC models, free estimate. iPod and iPhones repaired as well. Contact kenddixon@gmail.com for information be sure to include the title of this post in your subject line.
Top Three Ways Hackers Get Your Password: Guessing, Dictionary and Brutal attacks
Our entire lives are kept on computers. In a typical household, personal information, tax records, banking and credit information, personal letters and journals, private photos, job information; in fact, virtually all of the information about everything in our lives is kept on computer files and on web sites protected by passwords of our own making and encryption provided by a computer program.
Hackers have a number of methods to get through these passwords and encryptions.
Guessing seems like an inefficient way of finding a password until you consider this; most passwords chosen by users fall into a very narrow group of word, making guessing a lot easier for would be hackers. The most commonly used passwords are a person's name or the name of their wife, children or pets. Their birthday, license plate number, street address or the name of a favorite celebrity are also used. More disturbing are the number of people that leave their password blank or use the factory default.
A dictionary attack relies on the above information and the knowledge that most passwords are a single simple word found in any dictionary. It uses a program that runs through all the words in a dictionary until it finds a hit. Other types of dictionary attacks search through all accounts looking for hits on blank or default passwords.
A more aggressive attack, called a brute force attack, requires unlimited time but will always work. If the parameters of the password are known, say, it's known that a certain site requires a password between 6-18 characters and must include both letters and numbers, a brute force attack will try every possible combination until it comes up with the right password. Given enough time it will always find the password, but the more possible combinations that are available, the longer it will take.
Fortunately, Logaway.com an online password
manager that can help by ensuring you keeps all of your passwords in one secure location. That allows you to choose some of the most secure password manager
ever, keeping your life safe.
William Peter - About the Author:
William Peter writes reviews on various Online password manager websites. In this piece of write up, the author highlights on various various process to use a secure password manager to keep your password safe.
Hackers have a number of methods to get through these passwords and encryptions.
Guessing seems like an inefficient way of finding a password until you consider this; most passwords chosen by users fall into a very narrow group of word, making guessing a lot easier for would be hackers. The most commonly used passwords are a person's name or the name of their wife, children or pets. Their birthday, license plate number, street address or the name of a favorite celebrity are also used. More disturbing are the number of people that leave their password blank or use the factory default.
A dictionary attack relies on the above information and the knowledge that most passwords are a single simple word found in any dictionary. It uses a program that runs through all the words in a dictionary until it finds a hit. Other types of dictionary attacks search through all accounts looking for hits on blank or default passwords.
A more aggressive attack, called a brute force attack, requires unlimited time but will always work. If the parameters of the password are known, say, it's known that a certain site requires a password between 6-18 characters and must include both letters and numbers, a brute force attack will try every possible combination until it comes up with the right password. Given enough time it will always find the password, but the more possible combinations that are available, the longer it will take.
Fortunately, Logaway.com an online password
manager that can help by ensuring you keeps all of your passwords in one secure location. That allows you to choose some of the most secure password manager
ever, keeping your life safe.
William Peter - About the Author:
William Peter writes reviews on various Online password manager websites. In this piece of write up, the author highlights on various various process to use a secure password manager to keep your password safe.
20101011
Choosing the Right Laptop Battery
There are many laptop battery in the electronic market, a large number of substandard products into the market, including many original batteries counterfeit, take many potential to consumers. For non-professional consumers, we suggest the customer select the notebook battery following to the next tips:
1. Check packaging
Battery packaging should be sealed anti-static bags, anti-static foam lining, which is to protect the basic configuration of the Compaq presario cq60 battery.
Battery packaging should have a bar code serial code. Bar code is provided by the factory management of commodity standards to identify the authority logo.
2.check the appearance
Batteries should not be scratched or the appearance of the old sense, or readily available second-hand goods renovation as OEM Compaq presario cq70 battery.
Battery case should be clear parameters, performance, application of model identification.
Joints up and down the Dell inspiron 1440 battery cover should have no marks have been opened.
3. Check the official commitment to the protection of that and after-sale
Formal professional laptop battery grade qualified products cylindrical Dell inspiron 1545 battery , since the date of the factory, there are bonds for one year warranty. If you can not have this commitment, then the use of batteries and other materials may not be the quality of very qualified sub-grade batteries but batteries. At present the market with large number of obsolete Japan, South Korea and the poor Dell vostro 1510 battery conversion, this product may seem cheap products are actually huge profits, as well as the normal use of notebook computers much damage, the explosion will be serious personal injury caused to consumers.
1. Check packaging
Battery packaging should be sealed anti-static bags, anti-static foam lining, which is to protect the basic configuration of the Compaq presario cq60 battery.
Battery packaging should have a bar code serial code. Bar code is provided by the factory management of commodity standards to identify the authority logo.
2.check the appearance
Batteries should not be scratched or the appearance of the old sense, or readily available second-hand goods renovation as OEM Compaq presario cq70 battery.
Battery case should be clear parameters, performance, application of model identification.
Joints up and down the Dell inspiron 1440 battery cover should have no marks have been opened.
3. Check the official commitment to the protection of that and after-sale
Formal professional laptop battery grade qualified products cylindrical Dell inspiron 1545 battery , since the date of the factory, there are bonds for one year warranty. If you can not have this commitment, then the use of batteries and other materials may not be the quality of very qualified sub-grade batteries but batteries. At present the market with large number of obsolete Japan, South Korea and the poor Dell vostro 1510 battery conversion, this product may seem cheap products are actually huge profits, as well as the normal use of notebook computers much damage, the explosion will be serious personal injury caused to consumers.
20100929
Anti-Viruses and Firewalls Explained
We've all heard the term Anti-Virus. Most of us have heard the term firewall. What do they mean? Perhaps you think that an anti-virus will do what a firewall will or vice-versa. This statement is true in the sense of software bundles but the two program types are completely different.
An anti-virus scans files real-time and scheduled. The files are checked for specific code that relates them to viruses. Anti-viruses keep a database of know virus code that it uses to check files against. This is what you are downloading when you download "Virus Definitions", without the definitions your anti-virus would be useless. Anti-viruses scan, clean, quarantine and delete the files you download/install. Firewalls are completely different.
Firewalls monitor the traffic in and out of your computer. Your computer is constantly talking to servers and receiving data back. Programs update all the time, reports are sent out if you are part of programs plans etc. this generates data going between your computer and the internet. Firewalls protect you by monitoring the traffic and making sure that it is approved. When you first set up your firewall you will be asked if different traffic is legitimate. Usually you know that the windows updater and iTunes updater are good traffic and should be allowed. When the firewall detects that you are sending out information that doesn't normally go out, it issues an alert to the user and asks for confirmation. The firewall can then block the traffic and stop the data. The firewall also monitors incoming traffic, if it detects data coming back that was not requested by the user then it will issue a warning.
In literal terms its pretty simple. The firewall is like a bouncer at a club, he checks IDs to make sure you're on the "list" and will stop you from getting in. If you upset the club owner the bouncer may also keep you in. In the same sense an anti-virus can be applied in the same way through a different person. An anti-virus is your bartender, they give you your drinks or in this case data. They know its clean they poured it, they also monitor your drinks for you while some more effectively than others they notice when someone has slipped you something. They may pour out your drink and warn you of the danger. The bartender also watches you and makes sure you don't get too drunk, you are at their will as to whether you are ejected from the the club or not. For both of these situations the person is data, bouncer a firewall, bartender the anti-virus. Without both of these the club does not function correctly, it may work for a little while but eventually there will be a problem.
This has been a TechReally technology post.
An anti-virus scans files real-time and scheduled. The files are checked for specific code that relates them to viruses. Anti-viruses keep a database of know virus code that it uses to check files against. This is what you are downloading when you download "Virus Definitions", without the definitions your anti-virus would be useless. Anti-viruses scan, clean, quarantine and delete the files you download/install. Firewalls are completely different.
Firewalls monitor the traffic in and out of your computer. Your computer is constantly talking to servers and receiving data back. Programs update all the time, reports are sent out if you are part of programs plans etc. this generates data going between your computer and the internet. Firewalls protect you by monitoring the traffic and making sure that it is approved. When you first set up your firewall you will be asked if different traffic is legitimate. Usually you know that the windows updater and iTunes updater are good traffic and should be allowed. When the firewall detects that you are sending out information that doesn't normally go out, it issues an alert to the user and asks for confirmation. The firewall can then block the traffic and stop the data. The firewall also monitors incoming traffic, if it detects data coming back that was not requested by the user then it will issue a warning.
In literal terms its pretty simple. The firewall is like a bouncer at a club, he checks IDs to make sure you're on the "list" and will stop you from getting in. If you upset the club owner the bouncer may also keep you in. In the same sense an anti-virus can be applied in the same way through a different person. An anti-virus is your bartender, they give you your drinks or in this case data. They know its clean they poured it, they also monitor your drinks for you while some more effectively than others they notice when someone has slipped you something. They may pour out your drink and warn you of the danger. The bartender also watches you and makes sure you don't get too drunk, you are at their will as to whether you are ejected from the the club or not. For both of these situations the person is data, bouncer a firewall, bartender the anti-virus. Without both of these the club does not function correctly, it may work for a little while but eventually there will be a problem.
This has been a TechReally technology post.
20100928
Obtaining Your IP Address
Working in the IT field, technicians will always try to fix a problem remotely first. The one question that is asked 9 times out of 10 is usually "What is your IP address?". Internet Protocol Address, or IP for short, can tell the technician alot of things. An IP address is comprised of 4 numbers ranging from 0-255 and seperated by a period. EX: "192.168.1.254" This number can tell technicians how or if you are connected to the internet, in work situations it may allow the technician to connect to your machine. After about 15 minutes with some users you might be able to get an IP address from them. It's not because the users are illiterate or stupid its more about the gap that exsists between the technician who asks that question 30 times a day and the end-user who actually looks up their IP only when the PC is down. In this Techreally! we'll show you the simplest most easy way to obtain your ip address and some other key information.
Obtaining IP address in Windows XP:
Step 1: click Start
Step 2: click Run
Step 3: In the Run dialog box type "CMD" with no quotation marks and click "OK". This will open a black window.
Step 4: At the prompt(it usually says something like "c:\>") type "IPCONFIG" with no quotations, it does not have to be capital but there are no spaces. Press "Enter"
Voila! Your IP address, Subnet Mask, and Gateway are all there.
Obtaining IP address in Windows 7/Vista:
Step 1: click Start/Windows Logo
Step 2: in the search box type "CMD" and press "Enter". This will open the black command prompt window.
Step 3: At the prompt(it usually says something like "c:\>") type "IPCONFIG" with no quotations, it does not have to be capital but there are no spaces. Press "Enter"
Voila! Your IP address, Subnet Mask, and Gateway are all there.
Another thing you can do is type "IPCONFIG /all" for all of the information about your adapter and internet connections.
This has been a TechReally technology post.
Obtaining IP address in Windows XP:
Step 1: click Start
Step 2: click Run
Step 3: In the Run dialog box type "CMD" with no quotation marks and click "OK". This will open a black window.
Step 4: At the prompt(it usually says something like "c:\>") type "IPCONFIG" with no quotations, it does not have to be capital but there are no spaces. Press "Enter"
Voila! Your IP address, Subnet Mask, and Gateway are all there.
Obtaining IP address in Windows 7/Vista:
Step 1: click Start/Windows Logo
Step 2: in the search box type "CMD" and press "Enter". This will open the black command prompt window.
Step 3: At the prompt(it usually says something like "c:\>") type "IPCONFIG" with no quotations, it does not have to be capital but there are no spaces. Press "Enter"
Voila! Your IP address, Subnet Mask, and Gateway are all there.
Another thing you can do is type "IPCONFIG /all" for all of the information about your adapter and internet connections.
This has been a TechReally technology post.
Labels:
how to,
procedure,
technology,
tutorial,
windows 7,
Windows XP
Subscribe to:
Posts (Atom)