|
|
Cisco CCNA Certification: Should You Take The One-Exam or Two-Exam Approach?
One question I’m often asked by CCNA candidates is whether to take the “one big exam”, or take the two separate exams required by Cisco to achieve the Cisco Certified Network Associate (CCNA) exam.
The question comes up because there are now...
Creating A Wireless Home Network
Creating a wireless home network
Most people have more than one computer in their home and it is
becoming absolutely essential to having all those computers
hooked up to the internet. A wireless home network can get all
the computers in your...
Finding What You Need
There are all sorts of different devices you can buy that will
give your computer wireless networking capabilities. If you've
taken a good look around, though, you probably have been
confused by all the different kinds of equipment being...
Intranet
Introduction to Intranets
What exactly is an intranet? It's one of those terms that's more thrown around than understood, and has become more of a buzzword than a commonly understood idea. Simply put, an intranet is a private network with...
Link Building for a New Web Site
Link building is such an important area of owning a business
website. It's a great way to promote your site and your
business. And it is also critical for search engine rankings.
Think of link building as networking for your site. The...
|
|
|
|
|
|
|
|
Is "Spyware" Watching You?
Imagine my surprise when I received a phone call from a friend who told me he'd been the victim of a "spyware" attack that left him shaking at his loss of privacy.
I listened to his horror story with a sympathetic ear, but I felt secure since I carry anti-virus software and a firewall (both by Norton).
At his suggestion - and to my surprise - I ran a program called "Spy Sweeper" and found a veritable minefield of dangerous and harmful programs lurking on my computer.
"Spyware" is software that gets onto your computer and literally "spies" on your activities.
The spying can range from relatively harmless use of cookies tracking you across multiple websites... to extremely dangerous "keystroke loggers" which record passwords, credit cards, and other personal data. That data then gets relayed to the person who put the software on your computer.
Three primary types of spyware exist to complicate your online life, including:
1. "cookies" 2. "adware" 3. malicious programs like "keystroke loggers"
Cookies represent mostly a danger of lost privacy.
In theory, someone could use a "cookie" to track you across multiple sites, combine that data with several databases, and figure out a lot more information about you than would make you comfortable.
"Adware" tracks more than just your movement across sites, it spies on your installed software and computer habits to then serve up advertising, modify websites before you see them, and generally do things without your knowledge with the intention of trying to get you to buy things.
"Keystroke loggers" and other malicious programs exist for one purpose: to cause personal mayhem and financial damage.
Spyware gets on your computer in one of several different ways.
First, it rides along with software you download from the 'Net and install on your system.
Second, they come as email attachments (much like viruses) and automatically install themselves on your computer when you open the email message.
Third, hackers find an open
port on your computer and use the "back door" to install basically anything they want.
And fourth, the more malicious types, like keystroke loggers, can even get installed by someone with direct physical access to your computer such as an employer, suspicious spouse, business competitor, or someone who wants to know exactly what you're doing.
Now, suppose you carry an up-to-date anti-virus program and a firewall - shouldn't that represent potent protection?
In a word: NO!
I can personally attest that even the most up-to-date anti- virus programs and firewalls will not (repeat, WILL NOT) catch all the spyware that can infest your computer.
You need a program that specifically scans your system for the tens-of-thousands of existing spyware programs along with the new ones appearing daily.
Check out "Spy Sweeper" from webroot.com - this is the program I used to discover the spyware on my computer.
One thing I noticed, however, is that this program is a memory hog, so once I scanned, I turned it off and then use it 2-3 times a week... not the best strategy, but I want to give you the "whole" picture.
I also got the following recommendations from numerous subscribers about 2 programs to specifically help identify and remove spyware from your system (PC):
1. "Ad Aware" from lavasoft.de 2. "Spybot Search & Destroy" from safer-networking.org
The overwhelmingly recommended firewall suggested by readers was Zone Alarm Pro from Zone Labs => http://www.ebookfire.com/zonealarm.html
The bottom line seems pretty simple (but lengthy) if you want to protect yourself against this growing threat.
~ Keep your anti-virus program current ~ Install a firewall ~ Carefully screen software before installing it ~ Scan for specifically for spyware weekly ~ Stay current on this growing threat.
About the Author
Jim Edwards is a syndicated newspaper columnist (http://www.TheNetReporter.com) and is the author of several best-selling ebooks, information products and software programs.
|
|
|
|
|
Computer networking - Wikipedia, the free encyclopedia |
Network cards such as this one can transmit data at high rates over Ethernet cables. ... Computer networking is sometimes considered a sub-discipline of ... |
en.wikipedia.org |
  |
Social network - Wikipedia, the free encyclopedia |
Social network analysis (related to network theory) has emerged as a key ... Social networking also refers to a category of Internet applications to help ... |
en.wikipedia.org |
  |
Networking on the Network |
Here, then, are some of the fundamentals of professional networking. ... Asking advice from the people in your network is part of the process. ... |
polaris.gseis.ucla.edu |
  |
Computer Networking - Wireless Networks - Home and Wireless ... |
Site offers coverage of computer network technology in basic networks, VPN, Web servers, Intranets and Extranets, tutorials, and troubleshooting. |
compnetworking.about.com |
  |
ITtoolbox Networking Knowledge Base |
A networking community for IT professionals. Focusing on connectivity, network management, network operating systems, security, and other aspects of ... |
networking.ittoolbox.com |
  |
Howstuffworks "How Home Networking Works" |
How home networking works and the different methods to create a home network. |
www.howstuffworks.com |
  |
SmallNetBuilder |
SmallNetBuilder provides networking and IT news, reviews, help and information for professional and "prosumer" SOHO and SMB users. |
www.smallnetbuilder.com |
  |
Network Computing - Computer Networking, Network Security and ... |
Network Computing - Computer Networking, Network Security & Management news. Enterprise product reviews, comparisons and analysis built by IT professionals ... |
www.networkcomputing.com |
  |
CareerJournal | Career Networking - Professional Network ... |
Professional Network - Career networking news and advice from The Wall Street ... Networking tips that will help you advance your job search or career. |
www.careerjournal.com |
  |
Trail: Custom Networking (The Java™ Tutorials) |
The first describes the networking capabilities of the Java platform that you ... The second provides a brief overview of networking to familiarize you with ... |
java.sun.com |
  |
Windows Server 2003, Longhorn Server & Vista Networking Articles |
Features a wealth of tutorials on various Windows networking related topics such as setting up Windows NT/XP/2000/2003 networks, troubleshooting, ... |
www.windowsnetworking.com |
  |
IBM Networking | IBM Networking |
The era of e-business on demand requires superlative networking capability. ... IBM Networking Services provides e-business solutions anywhere in the ... |
www.networking.ibm.com |
  |
Computerworld - Networking - Voip - Bluetooth - Firewall - Wireless |
Computerworld, the 'Voice of IT Management' is your information source for computer networking. Access up to date information on LAN/WAN, hardware/devices, ... |
www.computerworld.com |
  |
HP Networking products and solutions |
HP ProLiant networking products provide high-powered, simple solutions for enterprise, business, or home networking environments, including ProLiant and ... |
www.hp.com |
  |
Monster: Networking |
Networking Networking Timeline. Networking Timeline · Making New Contacts · How to Set Up and Run an Informational Interview · Nurturing and Keeping ... |
content.monster.com |
  |
Access | CNET News.com |
Phone company shrugs off competition concerns over Verizon's Fios network, saying existing copper is doing the bandwidth trick. ... |
news.com.com |
  |
Network Management: Covering today's Network topics |
Find the latest information on Network Management, Network Security, Network Design and more. |
searchnetworking.techtarget.com |
  |
cisco networking academy program |
cisco.netacad.net/ - 1k - Cached - Similar pages |
|
  |
Networking and Your Job Search: The Riley Guide |
Networking starts long before a job search, and you probably don't even realize you are doing it. ... In Terms of a Job Search, Networking is the way to Go! ... |
www.rileyguide.com |
  |
NetworkWorld.com |
Networking news, reviews, opinions and forums from the Leader in Network Knowledge. |
www.networkworld.com |
  |
|