Showing category "resources" (Show all posts)

How many ip addresses are there worldwide?

Posted by Oyya-Info on Friday, November 26, 2010, In : Computer Networking 
This page provides an overview of the number of IP addresses used in every country of the world. The numbers are generated from information published by the Regional Internet Registries (AfriNIC, APNIC, ARIN,LACNIC and RIPE NCC) published on their FTP servers. This information is retrieved at least once a week.
Total number of IPv4 addresses:

2^32: 4294967296 4294.97 million
Class D+E: 536870912 - 536.87 million -
Nets 0 and 127: 33554432 - 33.55 million -
RFC 19...

Continue reading ...
 

Cloud Computing Security

Posted by Oyya-Info on Sunday, November 21, 2010, In : Security 
Before diving into the security aspects of cloud computing, let us first understand the basic concept of cloud computing. In cloud computing, cloud stands for internet and computing means using computer technology, hardware, and software, i.e. using or sharing the computer technology, hardware and software over the internet. Different cloud service models are as follows:
  • Cloud Software as a Service (SaaS): In this service model, the consumer uses the provider’s applications on a cloud ...

Continue reading ...
 

How to Customize Firefox about:blank page

Posted by vijai on Thursday, June 24, 2010, In : Tweaks 
Every time I open a new tab in Firefox, I'm greeted with about:blank.  As far as creative names go, the name of this page is not very creative because it is just that - blank:



For most of us this isn't a big deal because we don't really spend much time staring at a new, open tab. However others may want to customize it. This article will teach you how to do just that.

To customize your about:blank page, you'll need a user-content.css file.  To make one, press the Windows key and R simultaneousl...

Continue reading ...
 

How to Block a Specific Website on your computer

Posted by vijai s on Tuesday, June 22, 2010, In : Security 

There are many reason why you need to know how to block a website. Some of the most common reasons are you have been targeted by spammers who use adware and popups to attack your PC. Other reasons may be to prevent your children from having access to certain site content such as porn and gambling.

Depending on the level of security you wish, learning how to block a website may require a adjustments of your web browser, the use of internet filtering software or editing of your host file. At any...

Continue reading ...
 

The Ten Most Important Steps You Can Take to Protect Your PC

Posted by Oyya-Info on Saturday, May 1, 2010, In : Security 

Many agree that Windows computers need to be protected with a strategy called defense in depth. This is not just for fighting off viruses. Clearly, network security and Internet Explorer also need defense in depth. When Internet Explorer was recently hacked in a public contest, Microsoft responded that "...defense in depth techniques aren't designed to prevent every attack forever, but to instead make it significantly harder to exploit a vulnerability."

To me, the term "defense in d...


Continue reading ...
 

Top 10 Hacker Attack Tools

Posted by Oyya-Info on Thursday, October 15, 2009, In : Security 

Computer security "agents" must master the same tools used by the hackers they seek, and many of these programs are available to download for free. The man-in-the middle attack, (also known as the monkey-in-the middle) is a useful method of scanning network data and extracting what is known as interesting data, (passwords, e-mail, data files). Listed below you will find 10 programs used to assault and defend networks around the world.

1. Ethereal is the most widely used network protocol analy...


Continue reading ...
 

Utilities for Nothing, Security for Free

Posted by Oyya-Info on Thursday, October 15, 2009, In : Security 

Free utilities may lack the polished interface and some of the features you typically get with commercial software, but for most people, free security software can be a cost-effective way to protect one or more PCs.

Protecting your PCs from online threats isn't as simple or inexpensive as it once was. Just like there's no single pill that covers everything from a headache to a sore throat, there's no one piece of software that will protect your system from the various Internet-borne nasties ...


Continue reading ...
 

NewFolder.exe Virus

Posted by Oyya-Info on Sunday, October 11, 2009, In : Security 

The real name of this virus is Iddono. This threat copies its file(s) to your hard disk. Its typical file name is Iddono. Then it creates new startup key with name Iddono and value newfolder.exe. You can also find it in your processes list with name newfolder.exe or Iddono.


NewFolder.exe File Behaviour

NEW FOLDER.EXE has been seen to perform the following behavior:
  • The Process is packed and/or encrypted using a software packing process
  • Found on infected systems and resists interrogatio...

Continue reading ...
 
 
 

 

Make a free website with Yola