Security

IP Hiding Software – Using Software to Hide IP

IP hiding software is faster than browser configured proxies, and can be configured to work however the user likes. Here, we’ll go over some basic information about this software, as well as some of the settings that users can configure.

Read more...

Be the first to comment - What do you think?
Posted by Rowland - February 4, 2011 at 4:06 pm

Categories: Security   Tags:

Hide Proxy – How to Hide a Proxy

Depending on the type of proxy you are using, your system may be displaying not only the fact that it is using a proxy, but its original IP address as well. Different types of proxy servers provide different types of information to the connections they establish, and knowing what types allow you to hide proxy information is crucial to keeping your information safe. Here, we’ll go over some of the different types of proxy server and what information they hide.

Read more...

Be the first to comment - What do you think?
Posted by Rowland - February 4, 2011 at 3:56 pm

Categories: Security   Tags:

Hide My IP Download – How to Hide your IP Address

There are many reasons I typically want to hide my IP download, and there are a number of different ways to do so. Here, we’ll go over how to use proxy servers to hide your IP.

Read more...

Be the first to comment - What do you think?
Posted by Rowland - February 4, 2011 at 3:46 pm

Categories: Security   Tags:

What exactly is the Difference When Comparing Spyware, Malware, Adware, and Trojan Horses?

Here’s a post which states several kinds of malicious computer software.

Spy ware

Spy ware applications usually are hidden software programs that monitor / record computer activity.

Example software
Key logger

Why crooks use this software
Obtaining bank or perhaps various other personal logon details, personal identity theft.

Malware

Malware is actually a common concept that comprises any software program which targets a person’s computing device with the… Continue reading

Be the first to comment - What do you think?
Posted by Rowland - January 13, 2011 at 7:43 pm

Categories: Security   Tags:

Broadband Security for Home and Small Office Computers (Part 2 of 2)

This is the second part article is essential reading for home and small businesses using broadband connections. Learn about why criminals want YOUR DATA and how they go about getting it. Then read about how to prevent yourselves becoming a victim of online / digital crime whilst using your broadband.

Read more...

Be the first to comment - What do you think?
Posted by Rowland - April 22, 2010 at 9:57 am

Categories: Security   Tags:

Broadband Security for Home and Small Office Computers (Part 1 of 2)

This is the 1st in a 2 part article is essential reading for home and small businesses using broadband connections. Learn about why criminals want YOUR DATA and how they go about getting it. Then read about how to prevent yourselves becoming a victim of online / digital crime whilst using your broadband.

Read more...

Be the first to comment - What do you think?
Posted by Rowland - April 22, 2010 at 9:56 am

Categories: Security   Tags:

What is Spyware?

Do you know that your computer, without your knowledge or consent, can send your personal details over the internet? Learn about "Spyware".

Read more...

Be the first to comment - What do you think?
Posted by Ryan.W - April 22, 2010 at 9:50 am

Categories: Security   Tags: